CN113079161A - Method and system for sharing monitoring camera - Google Patents

Method and system for sharing monitoring camera Download PDF

Info

Publication number
CN113079161A
CN113079161A CN202110358371.7A CN202110358371A CN113079161A CN 113079161 A CN113079161 A CN 113079161A CN 202110358371 A CN202110358371 A CN 202110358371A CN 113079161 A CN113079161 A CN 113079161A
Authority
CN
China
Prior art keywords
user
camera
information
identity authentication
app
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110358371.7A
Other languages
Chinese (zh)
Other versions
CN113079161B (en
Inventor
杨曼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Kaibiao Information Technology Co ltd
Original Assignee
Wuhan Kaibiao Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Kaibiao Information Technology Co ltd filed Critical Wuhan Kaibiao Information Technology Co ltd
Priority to CN202110358371.7A priority Critical patent/CN113079161B/en
Publication of CN113079161A publication Critical patent/CN113079161A/en
Application granted granted Critical
Publication of CN113079161B publication Critical patent/CN113079161B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0025Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Closed-Circuit Television Systems (AREA)

Abstract

The invention relates to a sharing method and a system for monitoring video shot by a camera, wherein the method comprises the following steps: a user sends a request for sharing the monitoring camera to a management terminal by using an APP installed in the intelligent mobile equipment; after receiving the request, the management terminal sends identity authentication information to the intelligent mobile equipment; the user side receives the identity authentication information, then performs identity authentication through the intelligent mobile equipment, and sends the authenticated information to the management side; and the management terminal receives the authenticated information and verifies the authenticated information, if the authentication is passed, a request for using the camera by the user is sent to the control system, and the control system sends the video shot by the camera to the intelligent mobile equipment of the user. The invention can provide the sharing of the monitoring video for the user passing the identity authentication, can uniquely determine the identity of the user who provides the request for sharing the monitoring video, and can also avoid invading the privacy of other people after processing the monitoring video.

Description

Method and system for sharing monitoring camera
Technical Field
The invention relates to processing of videos shot by a monitoring camera, in particular to a sharing method and a sharing system for videos shot by the monitoring camera.
Background
Along with the development of social activities, the demand for monitoring videos is more and more great, and especially, the monitoring videos for the whereabouts of old people and children are obtained, so that guardians can know the whereabouts of the old people and the children in real time, and the safety of the old people and the children is convenient to pay attention to, for example: in order to ensure the safety of students going to school or going home, parents need to monitor and obtain the walking track of the students to know whether the students safely arrive at school or go home; in some larger occasions, such as tourist sites or amusement places where there are many floating persons, it is also necessary to obtain videos of their whereabouts in order to obtain the whereabouts of children or old people in real time to pay attention to their safety, and so on, in these cases, if the corresponding monitoring videos can be obtained in real time to know their whereabouts, it would be advantageous to pay attention to them in real time and prevent their safety in advance. However, at present, the monitoring cameras are usually installed for corresponding management departments or public security departments, the cameras are not disclosed to the public, corresponding monitoring videos can be obtained only after the accidents occur and are approved by related departments, and at the moment, the whereabouts of the monitoring videos cannot be obtained in advance and safety prompts cannot be given, namely, the videos can be only checked after the accidents and the accidents cannot be warned through the videos. In addition, since the surveillance video relates to personal privacy, sharing of the surveillance video is not facilitated if the video is shared at will and suspected of invading the privacy of others, which may touch the law.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a method and a system for sharing videos shot by a monitoring camera.
The technical scheme adopted for realizing the aim of the invention is a sharing method for monitoring video shot by a camera, which comprises the following steps:
s1, the user sends a request for sharing the monitoring camera to the management terminal by using the APP installed in the intelligent mobile equipment;
s2, after receiving the request, the management terminal sends identity authentication information to the intelligent mobile equipment;
s3, after receiving the identity authentication information, the user side performs identity authentication through the intelligent mobile equipment, and sends the authenticated information to the management side;
and S4, the management terminal receives the authenticated information and verifies the authenticated information, if the authenticated information passes the verification, a request for using the camera by the user is sent to the control system, and the control system sends the video shot by the camera to the intelligent mobile equipment of the user.
In the above technical solution, the step S1 includes:
s1.1, a user scans a two-dimensional code representing unique marking information of a camera through a rear camera of intelligent mobile equipment by using the APP, and after the two-dimensional code is identified, the APP prompts the start of the front camera of the intelligent mobile equipment and provides a request for shooting a head portrait of the user;
s1.2, a user finishes shooting a head portrait of the user through a front camera of the intelligent mobile equipment;
s1.3, the user uploads a request for sharing the monitoring camera and a shot head portrait of the user to a management terminal through the APP.
In the above technical solution, the step S2 includes:
s2.1, receiving the request and the head portrait image of the user by a management terminal;
and S2.2, the management terminal sends identity authentication information to the APP according to the request.
In the above technical solution, the step S3 includes:
s3.1, the user receives the identity authentication information through the APP, then identity authentication is carried out, and the information after identity authentication is sent to a management end;
and S3.2, the management terminal receives the information after the user identity authentication, performs identity matching verification on the information after the user identity authentication and the head portrait image of the user, if the information after the identity authentication is matched with the head portrait image of the user, the management terminal sends a request for using the camera by the user to the control system, and otherwise sends authentication error information to the APP.
Further, before the step S3.2, the management end performs authenticity check on the avatar image, where the authenticity check includes comparing the background of the avatar image, and if the background of the avatar image is a background that can be shot by the camera, the avatar image is considered to be a real avatar.
In the above technical solution, the identity authentication information includes face recognition information.
In the technical scheme, the control system sends a video shot by the camera to the intelligent mobile equipment of the user, wherein the video is displayed in a fuzzy manner in a non-interest area except a user interest area; the interested region is an object viewed by a user, and the user transmits the viewed object to a management end through the APP in a specified form.
In the technical scheme, the region of interest is a person viewed by the user, and the face of the other person in the region of no interest is displayed in a fuzzy manner.
In addition, the invention also provides a system for sharing the monitoring camera, which comprises intelligent mobile equipment, a management end and a control system, wherein the intelligent mobile equipment is internally provided with an APP, a user communicates with the management end through the APP, and the management end controls the control system to send the video shot by the monitoring camera to the user.
Further, the system for monitoring video sharing during camera shooting further comprises:
the two-dimensional code is arranged near the monitoring camera and comprises a unique mark signal of the monitoring camera;
and the identity authentication module is used for authenticating identity authentication information sent by the user through the APP and simultaneously performing identity matching authentication on the identity authentication information and the head portrait image of the user.
In the method, a user scans the two-dimensional code of the monitoring camera and sends a request for acquiring the video shot by the monitoring camera, namely, sends a request for sharing the monitoring camera (hereinafter referred to as a sharing request). The method comprises the steps that a user uploads a request for sharing a monitoring camera and a shot head portrait to a management end through an APP, the management end located at a remote position verifies the identity of the user, and an authentication result is compared with the uploaded photo, if the photo is really the user, the user is allowed to obtain a video shot by the camera after authentication, the identity verification of the user comprises APP identity authentication and head portrait authentication, the user identity is verified through the two layers of authentication, the user identity of the sharing request can be uniquely determined, the authentication mode can effectively determine the identity of the user, and the video source tracing of the user obtaining the video after the video is disclosed is facilitated.
In addition, in order to prevent the video from leaking the identity information of people irrelevant to the user and ensure the privacy of the video, the video provided for the user is processed, namely the region (non-interesting region) except the interesting region of the user in the video is subjected to fuzzy processing, so that the condition that the user checks the interesting region can be met, and the privacy of other people can be prevented from being leaked by irrelevant information.
Drawings
Fig. 1 is a schematic flow chart of a method for sharing a surveillance camera according to the present invention.
Fig. 2 is a block diagram of a system for sharing a surveillance camera according to the present invention.
Detailed Description
The invention is described in further detail below with reference to the figures and the specific embodiments.
As shown in fig. 1, the method for sharing a surveillance camera of the present invention includes:
s1, the user sends a request for sharing the camera to the management end by using the APP installed in the smart mobile device, as shown in fig. 1, the specific operations are as follows:
s1.1, firstly, a user performs real-name registration through an APP and needs real-name authentication, and the operations of registration and real-name authentication are the prior art and are not described herein again.
The user uses APP to scan the two-dimensional code through the rear camera of the intelligent mobile device, the two-dimensional code is arranged near the monitoring camera, namely the user is prompted to share the monitoring camera as required, the two-dimensional code must be scanned, and the two-dimensional code contains the only mark information of the monitoring camera.
The user uses APP to scan the two-dimensional code through the rear camera of the intelligent mobile device, and after the two-dimensional code is recognized, the APP prompts the start of the front camera of the intelligent mobile device and provides a request for shooting the head portrait of the user.
S1.2, the user finishes shooting the head portrait of the user through a front camera of the intelligent mobile device, and the background of the head portrait photo contains the surrounding environment.
S1.3, the user uploads a request for sharing the monitoring camera and a shot head portrait of the user to a management terminal through the APP.
S2, after receiving the sharing request, the management terminal sends identity authentication information to the APP, and the specific operations include:
and S2.1, the management terminal receives the sharing request information and the head portrait photo of the user, and obtains the corresponding monitoring camera number obtained by the user request through the unique mark information in the sharing request information.
S2.2, the management terminal sends identity authentication information to the APP according to the sharing request information, the authentication information comprises information required by real-name authentication, the information required by the real-name authentication comprises face recognition information, the face recognition information can be obtained through the APP, and for example, the APP obtains the face information of a user through a front camera of the intelligent mobile device.
S3, the user side receives the identity authentication information and then performs identity authentication through the intelligent mobile device, and sends the authenticated information to the management side, wherein the specific operation comprises the following steps:
s3.1, the user receives the authentication information through the APP and then performs identity authentication, and the information after the identity authentication is sent to a management end;
and S3.2, the management terminal receives the information after the user identity authentication, performs identity matching verification on the information after the user identity authentication and the head portrait image of the user, if the information after the identity authentication is matched with the head portrait image of the user, the management terminal sends a request for using the camera by the user to the control system, and otherwise sends authentication error information to the APP.
Because there is uncertainty in scanning the two-dimensional code in step S1, the two-dimensional code may also be scanned at the non-monitoring camera position, for example, the two-dimensional code is sent to another person after being photographed, and the identity authentication is performed after the other person scans again, which may occur in this case: others falsely use the user identity information to authenticate and log in (such as receiving a verification code through a conventional mobile phone number). Under the circumstance, anyone can share the monitoring camera at any place, so that not only is the resource waste (bandwidth and flow rate of a broadband) caused, but also the potential safety hazard is brought, for example, once the illegal outflow of the video causes adverse effects, the source tracing of the video is difficult to carry out, and therefore, the person requesting to share the video needs to be ensured to be the user. For example, in order to obtain the whereabouts of children playing in a large-scale amusement park in real time, parents may make a request for sharing videos shot by a camera in the amusement park, where the sharing of the videos is limited to the time when the children play in the amusement park, and therefore, it is necessary to ensure that a user who makes a video sharing request is a parent of the children, and at the same time, it is also necessary to ensure that the parent is in the amusement park. In order to solve the above technical problem, the present invention provides a preferred embodiment, in order to ensure the accuracy and uniqueness of the identity of the user issuing the sharing request, before step S3.2, the management terminal performs an authenticity check on the head portrait image, where the authenticity check includes comparing the background of the head portrait image, and if the background of the head portrait image is the background that can be taken by the camera, the head portrait image is considered to be a real head portrait, specifically, a 360 ° panoramic image near the camera is previously taken as a photograph and stored in the database of the management terminal, and when the background in the head portrait photograph uploaded by the user is compared with the background photograph pre-stored in the database, and if the background in the head portrait photograph matches the background photograph pre-stored in the database, the user issuing the sharing request is considered to be near the monitoring camera, and the sharing request issued by the APP is the request of a real shared video, i.e. can pass the authentication.
And S4, the management terminal receives the authenticated information and verifies the authenticated information, if the authenticated information passes the verification, a request for using the camera by the user is sent to the control system, and the control system sends the video shot by the camera to the intelligent mobile equipment of the user.
In order to prevent the privacy of other people from being revealed due to the outflow of the video, the invention sends other non-interest areas except the user interest area in the video shot by the camera to the APP in the intelligent mobile equipment of the user through the control system, the interest area is an object viewed by the user, for example, the viewed object can be a face, and the area outside the face is the non-interest area. The object that the user will look over passes through according to prescribed form APP and transmits to the management end, for example, the user needs to acquire child or old man's whereabouts in real time through the video, and the region of interest in the video is child or old man promptly, and the region except child or old man in the video then carries out fuzzy processing, and the video after the processing is resent to the APP, and like this, the user can only see child or old man's head portrait through the surveillance video that the APP saw. The predetermined form may be to photograph the object to be viewed, highlight the object in the photograph, for example, a face of a child in one photograph is circled with a vivid color through a painting brush (which can be implemented by image processing software provided in the smart terminal device), so as to form a highlight region, when the management terminal processes the photograph, the management terminal recognizes the highlight region and obtains the object (face of the child) in the highlight region, processes the video with the object as shared information, and blurs a region of the video that does not include the object. As a preferred embodiment, only the person in the video may be processed, for example, only the face in the non-interest area in the video may be blurred.
In order to implement the method for sharing a surveillance camera, the embodiment further provides a sharing system for implementing the method, including: locate near surveillance camera head two-dimensional code, the intelligent Mobile device that the user used, be located the management end and the control system of remote server end, wherein, install APP in the intelligent Mobile device, the user passes through APP carries out radio communication with the management end, and management end control system sends the video that the surveillance camera head was shot to the user. The two-dimensional code comprises unique mark information of a monitoring camera, an identity authentication module is arranged in a management end and used for authenticating identity authentication information sent by a user through an APP (application), and meanwhile identity matching authentication is carried out on the identity authentication information and a head portrait image of the user.
The intelligent mobile equipment used in the invention can be an intelligent mobile phone or other intelligent equipment with the same function of the intelligent mobile phone, and the intelligent mobile equipment realizes the wireless communication of data with the management terminal through a wireless communication network, such as a 4G/5G/Wi-Fi network, which are common technical means in the technical field of wireless communication. In addition, APP (abbreviation of Application) in the present invention is software installed in the smart mobile device, and is a common technical means in the field of computer technology. The APPs obtained by programming to implement the functions of the present invention are all prior art and will not be described herein.

Claims (10)

1. A method of sharing a surveillance camera, comprising:
s1, the user sends a request for sharing the monitoring camera to the management terminal by using the APP installed in the intelligent mobile equipment;
s2, after receiving the request, the management terminal sends identity authentication information to the intelligent mobile equipment;
s3, after receiving the identity authentication information, the user side performs identity authentication through the intelligent mobile equipment, and sends the authenticated information to the management side;
and S4, the management terminal receives the authenticated information and verifies the authenticated information, if the authenticated information passes the verification, a request for using the camera by the user is sent to the control system, and the control system sends the video shot by the camera to the intelligent mobile equipment of the user.
2. The video sharing method according to claim 1, wherein the step S1 includes:
s1.1, a user scans a two-dimensional code representing unique marking information of a camera through a rear camera of intelligent mobile equipment by using the APP, and after the two-dimensional code is identified, the APP prompts the start of the front camera of the intelligent mobile equipment and provides a request for shooting a head portrait of the user;
s1.2, a user finishes shooting a head portrait of the user through a front camera of the intelligent mobile equipment;
s1.3, the user uploads a request for sharing the monitoring camera and a shot head portrait of the user to a management terminal through the APP.
3. The video sharing method according to claim 2, wherein the step S2 includes:
s2.1, receiving the request and the head portrait image of the user by a management terminal;
and S2.2, the management terminal sends identity authentication information to the APP according to the request.
4. The video sharing method according to claim 3, wherein the step S3 includes:
s3.1, the user receives the identity authentication information through the APP, then identity authentication is carried out, and the information after identity authentication is sent to a management end;
and S3.2, the management terminal receives the information after the user identity authentication, performs identity matching verification on the information after the user identity authentication and the head portrait image of the user, if the information after the identity authentication is matched with the head portrait image of the user, the management terminal sends a request for using the camera by the user to the control system, and otherwise sends authentication error information to the APP.
5. The video sharing method according to claim 4, wherein: before the step S3.2, the management end performs authenticity check on the head portrait image, where the authenticity check includes comparing the background of the head portrait image, and if the background of the head portrait image is the background that can be shot by the camera, the head portrait image is considered to be a real head portrait.
6. The video sharing method according to claim 3, wherein: the identity authentication information includes face recognition information.
7. The video sharing method according to any one of claims 1 to 5, wherein: the control system sends videos shot by the camera to the intelligent mobile equipment of the user, wherein the videos are not in the region of interest of the user and are displayed in a fuzzy mode, and the region of interest of the user is not the region of interest of the user; the interested region is an object viewed by a user, and the user transmits the viewed object to a management end through the APP in a specified form.
8. The video sharing method according to claim 7, wherein: the interested region is a person viewed by the user, and the face of the other person in the non-interested region is displayed in a fuzzy mode.
9. A system for sharing a surveillance camera, comprising: including intelligent Mobile device, management end and control system, install APP in the intelligent Mobile device, the user passes through APP communicates with the management end, and the management end control system sends the video that the surveillance camera head was shot to the user.
10. The system for sharing a surveillance camera of claim 9, further comprising:
the two-dimensional code is arranged near the monitoring camera and comprises a unique mark signal of the monitoring camera;
and the identity authentication module is used for authenticating identity authentication information sent by the user through the APP and simultaneously performing identity matching authentication on the identity authentication information and the head portrait image of the user.
CN202110358371.7A 2021-04-01 2021-04-01 Method and system for sharing monitoring camera Active CN113079161B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110358371.7A CN113079161B (en) 2021-04-01 2021-04-01 Method and system for sharing monitoring camera

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110358371.7A CN113079161B (en) 2021-04-01 2021-04-01 Method and system for sharing monitoring camera

Publications (2)

Publication Number Publication Date
CN113079161A true CN113079161A (en) 2021-07-06
CN113079161B CN113079161B (en) 2022-10-25

Family

ID=76614710

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110358371.7A Active CN113079161B (en) 2021-04-01 2021-04-01 Method and system for sharing monitoring camera

Country Status (1)

Country Link
CN (1) CN113079161B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114938465A (en) * 2022-07-25 2022-08-23 广州万协通信息技术有限公司 Encrypted data transmission method and device based on characteristic sequence

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008127194A1 (en) * 2007-04-12 2008-10-23 Yu Zhou Network camera monitoring and data sharing system and method
CN102789561A (en) * 2012-06-29 2012-11-21 奇智软件(北京)有限公司 Method and device for utilizing camera in browser
US8832801B1 (en) * 2012-05-11 2014-09-09 Ravi Ganesan JUBISM: judgement based information sharing with monitoring
CN105227316A (en) * 2015-09-01 2016-01-06 深圳市创想一登科技有限公司 Based on mobile Internet account login system and the method for facial image authentication
CN105809111A (en) * 2016-02-25 2016-07-27 曹宇 Identity authentication method, apparatus, device and system
US20160219032A1 (en) * 2014-12-19 2016-07-28 Xiaomi Inc. Method and apparatus for controlling access to surveillance video
CN105933657A (en) * 2016-05-17 2016-09-07 北京睿智荟聚科技发展有限公司 Method and system for network real-time live broadcasting of instant frame, and camera
CN106295522A (en) * 2016-07-29 2017-01-04 武汉理工大学 A kind of two-stage anti-fraud detection method based on multi-orientation Face and environmental information
CN107105199A (en) * 2017-04-20 2017-08-29 武汉康慧然信息技术咨询有限公司 Smart home nurse method and system based on technology of Internet of things
CN107862247A (en) * 2017-10-13 2018-03-30 平安科技(深圳)有限公司 A kind of human face in-vivo detection method and terminal device
CN107948592A (en) * 2017-11-22 2018-04-20 珠海格力电器股份有限公司 Method and device for sharing camera and intelligent terminal
CN110430348A (en) * 2019-08-05 2019-11-08 深圳市威尔电器有限公司 Go on patrol intelligent monitoring terminal and its working method
CN111192007A (en) * 2019-12-23 2020-05-22 杭州宇泛智能科技有限公司 Information approval method, device and system and electronic equipment
CN111193899A (en) * 2018-11-15 2020-05-22 杭州海康威视数字技术股份有限公司 Monitoring resource sharing method, device and system and electronic equipment
US20200396423A1 (en) * 2016-03-08 2020-12-17 Dean Drako Methods for sharing private video streams with first responders under facility administrator control

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008127194A1 (en) * 2007-04-12 2008-10-23 Yu Zhou Network camera monitoring and data sharing system and method
US8832801B1 (en) * 2012-05-11 2014-09-09 Ravi Ganesan JUBISM: judgement based information sharing with monitoring
CN102789561A (en) * 2012-06-29 2012-11-21 奇智软件(北京)有限公司 Method and device for utilizing camera in browser
US20160219032A1 (en) * 2014-12-19 2016-07-28 Xiaomi Inc. Method and apparatus for controlling access to surveillance video
CN105227316A (en) * 2015-09-01 2016-01-06 深圳市创想一登科技有限公司 Based on mobile Internet account login system and the method for facial image authentication
CN105809111A (en) * 2016-02-25 2016-07-27 曹宇 Identity authentication method, apparatus, device and system
US20200396423A1 (en) * 2016-03-08 2020-12-17 Dean Drako Methods for sharing private video streams with first responders under facility administrator control
CN105933657A (en) * 2016-05-17 2016-09-07 北京睿智荟聚科技发展有限公司 Method and system for network real-time live broadcasting of instant frame, and camera
CN106295522A (en) * 2016-07-29 2017-01-04 武汉理工大学 A kind of two-stage anti-fraud detection method based on multi-orientation Face and environmental information
CN107105199A (en) * 2017-04-20 2017-08-29 武汉康慧然信息技术咨询有限公司 Smart home nurse method and system based on technology of Internet of things
CN107862247A (en) * 2017-10-13 2018-03-30 平安科技(深圳)有限公司 A kind of human face in-vivo detection method and terminal device
CN107948592A (en) * 2017-11-22 2018-04-20 珠海格力电器股份有限公司 Method and device for sharing camera and intelligent terminal
CN111193899A (en) * 2018-11-15 2020-05-22 杭州海康威视数字技术股份有限公司 Monitoring resource sharing method, device and system and electronic equipment
CN110430348A (en) * 2019-08-05 2019-11-08 深圳市威尔电器有限公司 Go on patrol intelligent monitoring terminal and its working method
CN111192007A (en) * 2019-12-23 2020-05-22 杭州宇泛智能科技有限公司 Information approval method, device and system and electronic equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114938465A (en) * 2022-07-25 2022-08-23 广州万协通信息技术有限公司 Encrypted data transmission method and device based on characteristic sequence
CN114938465B (en) * 2022-07-25 2022-10-18 广州万协通信息技术有限公司 Encrypted data transmission method and device based on characteristic sequence

Also Published As

Publication number Publication date
CN113079161B (en) 2022-10-25

Similar Documents

Publication Publication Date Title
US10915777B2 (en) Communication terminal, communication system, and image processing method
CN103917727B (en) Utilize the locking device adding strong security of iris image
US11245707B2 (en) Communication terminal, communication system, communication control method, and recording medium
CN106453874B (en) Mobile phone control method and system
US10419728B2 (en) Monitoring system having personal information protection function and method thereof
CN109118606B (en) Facial recognition attendance process authentication method
KR101946317B1 (en) User Identification and Tracking Method Using CCTV System
CN104851171A (en) Intelligent access control method, device and system
JP2006331048A (en) Personal identification method and system by position information
JP5151931B2 (en) Authentication system, authentication device, authentication target terminal, authentication method, authentication device program, and authentication target terminal program
CN105574967A (en) Intelligent access control system and operation method thereof
CN112257124A (en) Image processing method and device
EP3623974A1 (en) Methods and systems for improved biometric identification using user devices proximity
US20230308881A1 (en) System and method for encounter identity verification
CN113079161B (en) Method and system for sharing monitoring camera
KR20220067918A (en) Apparatus and Method for Face Authentication using Digital ID
CN111325065A (en) Security management method, device, equipment and computer storage medium
CN113055194B (en) Cloud conference box rapid conference entering method, cloud conference box and readable storage medium
KR20100116124A (en) The remote identification method and apparatus in video phone call between computer and mobile phone
CN109785469A (en) Access control equipment control method and system
US10387634B1 (en) System and method for authenticating a person using biometric data
KR20150027462A (en) Attendance verification system
CN105336020A (en) Identity verification method and system
KR20200063294A (en) Object Tracking System and method automatically gathering in vehicle black box image
US11582274B2 (en) Videoconferencing system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant