CN113766186B - Method, device, system and electronic device for skipping configuration interface of network camera - Google Patents

Method, device, system and electronic device for skipping configuration interface of network camera Download PDF

Info

Publication number
CN113766186B
CN113766186B CN202110983165.5A CN202110983165A CN113766186B CN 113766186 B CN113766186 B CN 113766186B CN 202110983165 A CN202110983165 A CN 202110983165A CN 113766186 B CN113766186 B CN 113766186B
Authority
CN
China
Prior art keywords
network camera
configuration interface
login information
client
temporary
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110983165.5A
Other languages
Chinese (zh)
Other versions
CN113766186A (en
Inventor
黄云寿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Dahua Technology Co Ltd
Original Assignee
Zhejiang Dahua Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Dahua Technology Co Ltd filed Critical Zhejiang Dahua Technology Co Ltd
Priority to CN202110983165.5A priority Critical patent/CN113766186B/en
Publication of CN113766186A publication Critical patent/CN113766186A/en
Application granted granted Critical
Publication of CN113766186B publication Critical patent/CN113766186B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/957Browsing optimisation, e.g. caching or content distillation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms

Abstract

The application relates to a method, a device, a system and an electronic device for skipping a configuration interface of a network camera, wherein the method comprises the following steps: acquiring a jump request for jumping to a configuration interface of a network camera; accessing the corresponding network camera based on the jump request through the created proxy service to acquire temporary login information; and acquiring a uniform resource locator generated in the client according to the temporary login information and the forwarding port number of the proxy service, and returning the configuration interface of the corresponding network camera to the client for display based on the uniform resource locator. According to the method and the device, the problems that a large number of account numbers and passwords of the network cameras need to be recorded, the leaked security risk exists, and the configuration efficiency is low in the related technology are solved, temporary login information is utilized, and the risk of account number and password leakage is reduced; and the configuration interface can be directly accessed to improve the configuration efficiency.

Description

Method, device, system and electronic device for skipping configuration interface of network camera
Technical Field
The present disclosure relates to the field of communication networks, and in particular, to a method, an apparatus, a system, and an electronic device for skipping a configuration interface of a network camera.
Background
The network CAMERA is also called as IP CAMERA (IPC for short) and is formed by combining a network coding module and an analog CAMERA. The network camera is a new generation camera generated by combining the traditional camera and the network technology, and can transmit the image remotely, and a remote browser can monitor the image without any professional software as long as a standard network browser (such as Microsoft IE or Netscape) is used.
Along with the rapid development of the internet of things, the application range of the monitoring system consisting of the network cameras is also wider and wider. Currently, when networking configuration is performed on a large number of network cameras, each network camera needs to be logged in through an RPC protocol by using a corresponding account number and a corresponding password to perform corresponding configuration setting. Therefore, a large number of account numbers and passwords of the network cameras need to be recorded, the security risk of leakage exists, and the configuration efficiency is low.
At present, aiming at the problems that a large number of account numbers and passwords of network cameras need to be recorded in the related technology, the security risk of leakage exists and the configuration efficiency is low, no effective solution is proposed yet.
Disclosure of Invention
The embodiment of the application provides a method, a device, a system and an electronic device for skipping a network camera configuration interface, which are used for at least solving the problems that a large number of account numbers and passwords of network cameras need to be recorded in the related technology, the security risk of leakage exists and the configuration efficiency is low.
In a first aspect, an embodiment of the present application provides a method for skipping a configuration interface of a network camera, including:
acquiring a jump request for jumping to a configuration interface of a network camera;
accessing the corresponding network camera based on the jump request through the created proxy service to acquire temporary login information in the network camera;
and acquiring a uniform resource locator generated in the client according to the temporary login information and the forwarding port number of the proxy service, and returning the configuration interface of the corresponding network camera to the client for display based on the uniform resource locator.
In some embodiments, the method for skipping the configuration interface of the webcam provided in the embodiments of the present application further includes:
and creating a forwarding port for jumping the network camera by utilizing a socket technology, and binding the forwarding port and a client for initiating the jumping request so as to create the proxy service.
In some embodiments, the method for skipping the configuration interface of the webcam provided in the embodiments of the present application further includes:
and in the network camera, generating the temporary login information according to a preset rule and an original login account of the network camera.
In some embodiments, the method for skipping the configuration interface of the webcam provided in the embodiments of the present application further includes:
in the network camera, after the temporary login information is generated, the temporary login information is encrypted and transmitted by using an AES encryption algorithm.
In some embodiments, the method for skipping the configuration interface of the webcam provided in the embodiments of the present application further includes:
acquiring equipment information of the network camera, and judging whether the corresponding network camera supports jumping to the network camera configuration interface or not based on the equipment information;
and if the network camera supports to jump to the network camera configuration interface, acquiring the jump request for jumping to the network camera configuration interface.
In some embodiments, the returning the configuration interface of the corresponding webcam to the client for presentation based on the uniform resource locator includes:
and calling a corresponding forwarding port according to the forwarding port number in the uniform resource locator, sending the temporary login information in the uniform resource locator to the corresponding network camera so as to access a configuration interface of the corresponding network camera, and returning the configuration interface to the client for display.
In some embodiments, the method for skipping a configuration interface of a network camera provided in the embodiments of the present application further includes, after sending the temporary login information in the uniform resource locator to the corresponding network camera:
and in the network camera, checking the temporary login information.
In some embodiments, the obtaining generates, in the client, a uniform resource locator according to the temporary login information and a forwarding port number of the proxy service, including:
and acquiring a uniform resource locator generated in the client according to the temporary login information, the forwarding port number of the proxy service and the module information of the network camera.
In a second aspect, an embodiment of the present application provides a jump apparatus of a configuration interface of a network camera, including: the device comprises an acquisition module, an access module and a jump module;
the acquisition module is used for acquiring a jump request for jumping to the configuration interface of the network camera;
the access module is used for accessing the corresponding network camera based on the jump request through the created proxy service so as to acquire temporary login information;
the jump module is used for obtaining a uniform resource locator generated in the client according to the temporary login information and the forwarding port number of the proxy service, and returning the configuration interface of the corresponding network camera to the client for display based on the uniform resource locator.
In a third aspect, an embodiment of the present application provides a jump system of a configuration interface of a network camera, including: client, server and network camera;
the client is used for initiating the jump request;
the network camera is connected with the client through the server and used for generating temporary login information;
the server is configured to execute the method for skipping the configuration interface of the network camera according to the first aspect.
In a fourth aspect, an embodiment of the present application provides an electronic device, including a memory, a processor, and a computer program stored in the memory and capable of running on the processor, where the processor implements a method for skipping a network camera configuration interface according to the first aspect when executing the computer program.
In a fifth aspect, embodiments of the present application provide a storage medium having stored thereon a computer program which, when executed by a processor, implements a method for skipping a network camera configuration interface as described in the first aspect above.
Compared with the related art, the method, the device, the system and the electronic device for jumping to the configuration interface of the network camera are provided by the embodiment of the application, and the jump request for jumping to the configuration interface of the network camera is obtained; accessing the corresponding network camera based on the jump request through the created proxy service to acquire temporary login information; and acquiring a uniform resource locator generated in the client according to the temporary login information and the forwarding port number of the proxy service, and returning the configuration interface of the corresponding network camera to the client for display based on the uniform resource locator. The problems that a large number of account numbers and passwords of the network cameras need to be recorded, the security risk of leakage exists, and the configuration efficiency is low in the related technology are solved, temporary login information is utilized, and the risk of account number and password leakage is reduced; and the configuration interface can be directly accessed to improve the configuration efficiency.
The details of one or more embodiments of the application are set forth in the accompanying drawings and the description below to provide a more thorough understanding of the other features, objects, and advantages of the application.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute an undue limitation to the application. In the drawings:
FIG. 1 is a block diagram of a jump system of a webcam configuration interface according to an embodiment of the present application;
FIG. 2 is a block diagram of a part of hardware structure of a server device of a method for skipping a configuration interface of a network camera according to an embodiment of the present application;
FIG. 3 is a flow chart of a method for skipping a configuration interface of a webcam according to an embodiment of the present application;
fig. 4 is a block diagram of a configuration of a network camera configuration interface according to an embodiment of the present application.
In the figure: 10. a server; 20. a client; 30. a network camera; 210. an acquisition module; 220. an access module; 230. and a jump module.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described and illustrated below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden on the person of ordinary skill in the art based on the embodiments provided herein, are intended to be within the scope of the present application. Moreover, it should be appreciated that while such a development effort might be complex and lengthy, it would nevertheless be a routine undertaking of design, fabrication, or manufacture for those of ordinary skill having the benefit of this disclosure, and thus should not be construed as having the benefit of this disclosure.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is to be expressly and implicitly understood by those of ordinary skill in the art that the embodiments described herein can be combined with other embodiments without conflict.
Unless defined otherwise, technical or scientific terms used herein should be given the ordinary meaning as understood by one of ordinary skill in the art to which this application belongs. Reference to "a," "an," "the," and similar terms herein do not denote a limitation of quantity, but rather denote the singular or plural. The terms "comprising," "including," "having," and any variations thereof, are intended to cover a non-exclusive inclusion; for example, a process, method, system, article, or apparatus that comprises a list of steps or modules (elements) is not limited to only those steps or elements but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. The terms "connected," "coupled," and the like in this application are not limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. The term "plurality" as used herein means greater than or equal to two. "and/or" describes an association relationship of an association object, meaning that there may be three relationships, e.g., "a and/or B" may mean: a exists alone, A and B exist together, and B exists alone. The terms "first," "second," "third," and the like, as used herein, are merely distinguishing between similar objects and not representing a particular ordering of objects.
The jump system of the configuration interface of the network camera according to an embodiment of the present application, as shown in fig. 1, includes a client 20, a server 10, and a network camera 30; a client 20 for initiating a jump request; the network camera 30 is connected to the client 20 through the server 10, and generates temporary login information. The server 10 is configured to execute the method for skipping the configuration interface of the webcam provided in the embodiment of the present application.
The method embodiment provided by the embodiment can be executed in the server. Taking the operation on the server side as an example, fig. 2 is a partial hardware structure block diagram of the server side of the method for skipping the configuration interface of the network camera according to the embodiment of the invention. As shown in fig. 2, the server 10 may include one or more (only one is shown in fig. 2) processors 102 (the processor 102 may include, but is not limited to, a microprocessor MCU or a processing device such as a programmable logic device FPGA) and a memory 104 for storing data, and optionally, a transmission device 106 for communication functions and an input-output device 108. It will be appreciated by those skilled in the art that the structure shown in fig. 2 is merely illustrative, and the structure of the server is not limited thereto. For example, the server 10 may also include more or fewer components than shown in FIG. 2, or have a different configuration than shown in FIG. 2.
The memory 104 may be used to store a computer program, for example, a software program of application software and a module, such as a computer program corresponding to a method for skipping a configuration interface of a network camera in an embodiment of the present invention, and the processor 102 executes the computer program stored in the memory 104, thereby performing various functional applications and data processing, that is, implementing the above-mentioned method. Memory 104 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, memory 104 may further include memory located remotely from processor 102, which may be connected to server 10 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device 106 is used to receive or transmit data via a network. The specific example of the network described above may include a wireless network provided by a communication provider of the server 10. In one example, the transmission device 106 includes a network adapter (Network Interface Controller, simply referred to as NIC) that can connect to other network devices through a base station to communicate with the internet. In one example, the transmission device 106 may be a Radio Frequency (RF) module, which is configured to communicate with the internet wirelessly.
The present embodiment provides a method for skipping a configuration interface of a network camera, and fig. 3 is a flowchart of a method for skipping a configuration interface of a network camera according to an embodiment of the present application, as shown in fig. 3, where the flowchart includes the following steps:
step S210, obtaining a jump request for jumping to a network camera configuration interface;
step S220, accessing the corresponding network camera based on the jump request through the created proxy service to acquire temporary login information in the network camera;
step S230, a uniform resource locator is generated in the client according to the temporary login information and the forwarding port number of the proxy service, and a configuration interface of the corresponding network camera is returned to the client for display based on the uniform resource locator.
It should be noted that, the network CAMERA is also called IP CAMERA (IPC for short) and is formed by combining a network coding module and an analog CAMERA. When the network camera is accessed to the server for use, the client needs to jump to a configuration interface for relevant parameter configuration. That is, in the present embodiment, the client, the server, and the network camera are involved; the jump request to the webcam configuration interface may be initiated by the client and then acquired by the server. The jump request includes access information of the network camera IPC, server IP, protocol information, and the like.
Because the client side has multi-level routing in the middle of accessing the network camera, if the client side directly accesses the network camera, port mapping is needed or networking is carried out through hole punching, so that the matched development workload is large, and the development period is long. In this embodiment, communication between the client and the network camera is directly established through the created proxy service, and the corresponding network camera is accessed based on the jump request, so as to obtain temporary login information in the network camera. The specific process of creating proxy services may be: and creating a forwarding port of the jump network camera by using socket technology, and binding the forwarding port with the client side initiating the jump request. After the forwarding port is bound with the client, the forwarding port forwards the jump request to the corresponding network camera so as to return related data such as temporary login information and the like as long as the client initiates the jump request. Among them, in the field of computer communication, socket is a contract or a way to communicate between computers. By socket, one computer may receive data from other computers or may send data to other computers, which is not described herein.
The temporary login information comprises a temporary account number and a temporary password, and can be used for temporarily logging in a configuration interface of the network camera without revealing the account number and the password of the original network camera. The safety is improved. A Uniform Resource Locator (URL) enables a client program to query different information resources with a uniform access method. All resources have unique URL addresses on the Internet. In this embodiment, a uniform resource locator generated in the client according to the temporary login information and the forwarding port number of the proxy service may be acquired in the client. By using the uniform resource locator, the configuration interface of the corresponding network camera can be directly returned to the client for display without inputting an original account and a password on the login interface.
Through the steps, the problems that a large number of account numbers and passwords of the network cameras need to be recorded, the security risk of leakage exists, and the configuration efficiency is low in the related art are solved, temporary login information is utilized, and the risk of account number and password leakage is reduced; and the configuration interface can be directly accessed to improve the configuration efficiency.
In some embodiments, in the network camera, temporary login information is generated according to preset rules and an original login account of the network camera.
The preset rule refers to that the temporary account is an original login account and 16 character strings are randomly generated; the temporary password randomly generates 16 character strings; then the sha256 obtains a 64-bit character string as a token, and the token is temporary login information. In this embodiment, the temporary login information may have limitations on the time-lapse and usage times. After the time period or the number of times of use is exceeded, the temporary login information is invalid. The timeliness and the number of uses may be reflected in checking the temporary log-in information. Such as: aging was 10 seconds; the number of times of use is 2 times; then the temporary login information is disabled within 10 seconds or 2 times of use, and the configuration interface of the corresponding network camera cannot be logged in. In other embodiments, the time period is 5 seconds for further safety improvement; the number of uses was 1. The time and the number of times of use may be other values, and this is not a limitation.
In order to further improve the security of data, in the network camera, after the temporary login information is generated, the temporary login information is encrypted and transmitted by using an AES encryption algorithm. In other embodiments, other encryption algorithms may be used to encrypt the temporary login information, which is not limited in this respect.
In some embodiments, the method for skipping the configuration interface of the webcam provided by the application further includes:
acquiring equipment information of the network camera, and judging whether the corresponding network camera supports jumping to the network camera configuration interface or not based on the equipment information;
and if the network camera supports the jump network camera configuration interface, acquiring a jump request for jumping to the network camera configuration interface.
When each network camera is accessed to the server, corresponding equipment information is provided, and the equipment information comprises supporting information of whether to support the jump network camera configuration interface. Such as: if the support information is 1; and if yes, acquiring a jump request for jumping to the network camera configuration interface, and continuing to execute step S220 and step S230 to jump to the configuration interface of the corresponding network camera. If the support information is 0; the corresponding network camera does not support to jump to the network camera configuration interface, and a jump request for jumping to the network camera configuration interface is acquired; but access to the corresponding network camera based on the jump request through the created proxy service does not obtain temporary login information in the network camera. The lack of temporary login information in generating the url results in the url being able to jump to the login interface of the webcam based on the url, and the login also requires the use of the original account and password. The filtering of the configuration interface of the network camera can be rapidly completed whether the network camera supports the jump network camera or not so as to improve the configuration efficiency.
In some embodiments, the configuration interface of the corresponding webcam is returned to the client for presentation based on the uniform resource locator, and the method comprises the following steps:
and calling a corresponding forwarding port according to the forwarding port number in the uniform resource locator, and sending the temporary login information in the uniform resource locator to the corresponding network camera so as to access the configuration interface of the corresponding network camera and return the configuration interface to the client for display.
It should be noted that, the url in this embodiment is added with temporary login information and forwarding ports based on the existing url, and the url can be used to quickly access the configuration interface of the corresponding webcam, so as to return the configuration interface to the client for display. For example, the generated uniform resource locator may be:
http://127.X.X.1:3000/#/?token=a5df484bXXXf6e692984ca4&targetPage=/index/EventManage/alarmConfig。
3000 is a forwarding port, and targetPage is a page to be accessed; the token is temporary login information.
In order to improve the security of the use of the temporary login information, the temporary login information in the uniform resource locator is checked in the network camera after being transmitted to the corresponding network camera.
The verification principle is as follows: whether the temporary account number and the temporary password exist, whether the temporary account number and the temporary password are used in the effective period or not, and whether the limit of the using times is exceeded or not. And if the conditions are met, checking to pass so as to access the configuration interface of the corresponding network camera. After the temporary login information is generated, the network camera records the time of generating the temporary login information as the starting time of the effective period, and generates corresponding time effect. The verification will determine whether the valid period is within the time period according to the start time, the current verification time and the aging. The number of uses is checked several times. For example, the aging is 5 seconds; the number of uses was 1. The time for generating the temporary login information is 19 points 05 minutes 55 seconds. Then the verification is satisfied for 5 seconds before 19 o' clock 06 minutes. The current temporary login information is used 1 time and becomes invalid.
In some embodiments, the obtaining in step S230 generates, in the client, a uniform resource locator according to the temporary login information and the forwarding port number of the proxy service, including the steps of:
and acquiring a uniform resource locator generated in the client according to the temporary login information, the forwarding port number of the proxy service and the module information of the network camera.
The module information includes, but is not limited to, an intelligent module, an event management module, a user management module, a system management module, and the like. The module information of the network camera is acquired in the client, and the acquisition of the module information can also be acquired in a request mode. In other embodiments, the module information may be obtained in other manners, for example, a database is preset in the client, and corresponding module information is called from the database. By adopting the uniform resource locator containing the module information, after the module information is automatically logged in through the temporary login information, whether the module information is contained or not can be checked, and if the module information is contained, the module information directly enters a configuration interface of a designated module page. For example, the generated uniform resource locator may be:
http://127.X.X.1:3000/#/?token=a5df484bXXXf6e692984ca4&targetPage=/index/EventManage/alarmConfig&userName-admin&targetTab=User&allHide[&headHide&sideHide&tabHide]。
3000 is a forwarding port, and targetPage is a page to be accessed; the token is temporary login information; the targetTab is a page to be accessed and has a plurality of sub-pages, one of which is selected for display.
The user can directly and quickly jump to the configuration interface of user management in the client through the uniform resource locator without processing the operations of logging in and switching to the configuration interface of user management.
It should be noted that the steps illustrated in the above-described flow or flow diagrams of the figures may be performed in a computer system, such as a set of computer-executable instructions, and that, although a logical order is illustrated in the flow diagrams, in some cases, the steps illustrated or described may be performed in an order other than that illustrated herein.
The embodiment also provides a device for jumping a configuration interface of a network camera, which is used for implementing the above embodiment and the preferred embodiment, and the description is omitted. As used below, the terms "module," "unit," "sub-unit," and the like may be a combination of software and/or hardware that implements a predetermined function. While the means described in the following embodiments are preferably implemented in software, implementation in hardware, or a combination of software and hardware, is also possible and contemplated.
FIG. 4 is a block diagram of a network camera configuration interface according to an embodiment of the present application, where the device includes an acquisition module, an access module, and a jump module, as shown in FIG. 4;
the acquisition module is used for acquiring a jump request for jumping to the configuration interface of the network camera;
the access module is used for accessing the corresponding network camera based on the jump request through the created proxy service so as to acquire temporary login information;
and the jump module is used for acquiring the generation of a uniform resource locator in the client according to the temporary login information and the forwarding port number of the proxy service, and returning the configuration interface of the corresponding network camera to the client for display based on the uniform resource locator.
By the device, the problems that a large number of account numbers and passwords of the network cameras need to be recorded, the security risk of leakage exists, and the configuration efficiency is low in the related art are solved, temporary login information is utilized, and the risk of account number and password leakage is reduced; and the configuration interface can be directly accessed to improve the configuration efficiency.
In some of these embodiments, on the basis of fig. 4, a creation module is further included;
and the creation module is used for creating a forwarding port for jumping the network camera by utilizing a socket technology and binding the forwarding port with a client side for initiating the jumping request so as to create the proxy service.
In some of these embodiments, on the basis of fig. 4, a generating module is further included;
and the generation module is used for generating the temporary login information in the network camera according to a preset rule and an original login account of the network camera.
In some of these embodiments, an encryption module is further included on the basis of fig. 4;
and the encryption module is used for encrypting and transmitting the temporary login information by using an AES encryption algorithm after generating the temporary login information in the network camera.
In some embodiments, on the basis of fig. 4, a judging module is further included;
the judging module is used for acquiring the equipment information of the network camera and judging whether the corresponding network camera supports to jump to the network camera configuration interface or not based on the equipment information;
and if the network camera supports to jump to the network camera configuration interface, acquiring the jump request for jumping to the network camera configuration interface.
In some embodiments, the jump module is further configured to invoke a corresponding forwarding port according to the forwarding port number in the uniform resource locator, send the temporary login information in the uniform resource locator to the corresponding webcam, access a configuration interface of the corresponding webcam, and return the configuration interface to the client for display.
In some of these embodiments, a verification module is also included;
and the verification module is used for verifying the temporary login information in the network camera.
In some embodiments, the jump module is further configured to obtain a uniform resource locator generated in the client according to the temporary login information, the forwarding port number of the proxy service, and the module information of the network camera.
The above-described respective modules may be functional modules or program modules, and may be implemented by software or hardware. For modules implemented in hardware, the various modules described above may be located in the same processor; or the above modules may be located in different processors in any combination.
The present embodiment also provides an electronic device comprising a memory having stored therein a computer program and a processor arranged to run the computer program to perform the steps of any of the method embodiments described above.
Optionally, the electronic apparatus may further include a transmission device and an input/output device, where the transmission device is connected to the processor, and the input/output device is connected to the processor.
Alternatively, in the present embodiment, the above-described processor may be configured to execute the following steps by a computer program:
s1, obtaining a jump request for jumping to a configuration interface of a network camera;
s2, accessing the corresponding network camera based on the jump request through the created proxy service to acquire temporary login information in the network camera;
and S3, acquiring a uniform resource locator generated in the client according to the temporary login information and the forwarding port number of the proxy service, and returning the configuration interface of the corresponding network camera to the client for display based on the uniform resource locator.
It should be noted that, specific examples in this embodiment may refer to examples described in the foregoing embodiments and alternative implementations, and this embodiment is not repeated herein.
In addition, in combination with the method for skipping the configuration interface of the network camera in the above embodiment, the embodiments of the present application may provide a storage medium for implementation. The storage medium has a computer program stored thereon; the computer program when executed by a processor implements the method of skipping the configuration interface of any one of the network cameras in the above embodiments.
It should be understood by those skilled in the art that the technical features of the above-described embodiments may be combined in any manner, and for brevity, all of the possible combinations of the technical features of the above-described embodiments are not described, however, they should be considered as being within the scope of the description provided herein, as long as there is no contradiction between the combinations of the technical features.
The above examples merely represent a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the invention. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application is to be determined by the claims appended hereto.

Claims (10)

1. A method for jumping a configuration interface of a network camera, comprising:
acquiring equipment information of the network camera, and judging whether the corresponding network camera supports jumping to the network camera configuration interface or not based on the equipment information;
if the network camera does not support to jump to the network camera configuration interface, logging in the network camera configuration interface through an original login account number and an original password of the network camera;
if the network camera supports to jump to the network camera configuration interface, acquiring a jump request for jumping to the network camera configuration interface;
accessing the corresponding network camera based on the jump request through the created proxy service to acquire temporary login information in the network camera; the temporary login information is generated according to a preset rule and an original login account of the network camera; the preset rule is as follows: the temporary account number in the temporary login information is determined by the original login account number and a random character string, and the temporary password in the temporary login information is determined by the random character string;
and acquiring a uniform resource locator generated in the client according to the temporary login information and the forwarding port number of the proxy service, and returning the configuration interface of the corresponding network camera to the client for display based on the uniform resource locator.
2. The method for jumping a network camera configuration interface according to claim 1, further comprising:
and creating a forwarding port for jumping the network camera by utilizing a socket technology, and binding the forwarding port and a client for initiating the jumping request so as to create the proxy service.
3. The method for jumping a network camera configuration interface according to claim 1, further comprising:
in the network camera, after the temporary login information is generated, the temporary login information is encrypted and transmitted by using an AES encryption algorithm.
4. The method for skipping configuration interfaces of network cameras according to claim 1, wherein returning the configuration interfaces of the corresponding network cameras to the client for presentation based on the uniform resource locator comprises:
and calling a corresponding forwarding port according to the forwarding port number in the uniform resource locator, sending the temporary login information in the uniform resource locator to the corresponding network camera so as to access a configuration interface of the corresponding network camera, and returning the configuration interface to the client for display.
5. The method for skipping a network camera configuration interface according to claim 4, further comprising, after transmitting the temporary login information in the uniform resource locator to the corresponding network camera:
and in the network camera, checking the temporary login information.
6. The method for skipping a configuration interface of a network camera according to claim 1, wherein the obtaining, in the client, generates a uniform resource locator according to the temporary login information and a forwarding port number of the proxy service, includes:
and acquiring a uniform resource locator generated in the client according to the temporary login information, the forwarding port number of the proxy service and the module information of the network camera.
7. A jump apparatus for a network camera configuration interface, comprising: the device comprises a judging module, an acquiring module, an accessing module and a jumping module;
the judging module is used for acquiring the equipment information of the network camera and judging whether the corresponding network camera supports to jump to the network camera configuration interface or not based on the equipment information;
if the network camera does not support to jump to the network camera configuration interface, logging in the network camera configuration interface through an original login account number and an original password of the network camera;
the acquisition module is used for acquiring a jump request for jumping to the network camera configuration interface if the network camera supports jumping to the network camera configuration interface;
the access module is used for accessing the corresponding network camera based on the jump request through the created proxy service so as to acquire temporary login information; the temporary login information is generated according to a preset rule and an original login account of the network camera; the preset rule is as follows: the temporary account number in the temporary login information is determined by the original login account number and a random character string, and the temporary password in the temporary login information is determined by the random character string;
the jump module is used for obtaining a uniform resource locator generated in the client according to the temporary login information and the forwarding port number of the proxy service, and returning the configuration interface of the corresponding network camera to the client for display based on the uniform resource locator.
8. A jump system for a web camera configuration interface, comprising: client, server and network camera;
the client is used for initiating the jump request;
the network camera is connected with the client through the server and used for generating temporary login information;
the server is configured to execute the method for skipping the configuration interface of the network camera according to any one of claims 1 to 6.
9. An electronic device comprising a memory and a processor, wherein the memory has stored therein a computer program, the processor being arranged to run the computer program to perform the method of skipping the webcam configuration interface of any of claims 1 to 6.
10. A storage medium having a computer program stored therein, wherein a processor when executing the computer program implements the method of skipping a network camera configuration interface of any of claims 1 to 6.
CN202110983165.5A 2021-08-25 2021-08-25 Method, device, system and electronic device for skipping configuration interface of network camera Active CN113766186B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110983165.5A CN113766186B (en) 2021-08-25 2021-08-25 Method, device, system and electronic device for skipping configuration interface of network camera

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110983165.5A CN113766186B (en) 2021-08-25 2021-08-25 Method, device, system and electronic device for skipping configuration interface of network camera

Publications (2)

Publication Number Publication Date
CN113766186A CN113766186A (en) 2021-12-07
CN113766186B true CN113766186B (en) 2023-05-23

Family

ID=78791226

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110983165.5A Active CN113766186B (en) 2021-08-25 2021-08-25 Method, device, system and electronic device for skipping configuration interface of network camera

Country Status (1)

Country Link
CN (1) CN113766186B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006165686A (en) * 2004-12-02 2006-06-22 Canon Inc Communication terminal, communication control method, and program
CN101982958A (en) * 2010-10-29 2011-03-02 青岛雄博科技有限公司 Processing method and system for automatically setting network monitoring system
CN107888868A (en) * 2016-09-28 2018-04-06 华为数字技术(苏州)有限公司 A kind of method and device for accessing video camera

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101552804A (en) * 2008-12-22 2009-10-07 北京大学深圳研究生院 Network video distribution system and network video access method thereof
US9860490B2 (en) * 2010-11-05 2018-01-02 Tom Galvin Network video recorder system
CN103369015B (en) * 2012-04-10 2017-03-15 深圳市高斯贝尔家居智能电子有限公司 A kind of method for easily passing through web access web camera
CN103533039B (en) * 2013-09-27 2017-04-19 深圳市瑞彩电子技术有限公司 P2P (Peer-to-Peer) data transmission method, forwarding proxy server and system
US20160080205A1 (en) * 2014-09-16 2016-03-17 Sentry360 Plug and Play Camera Configuration Tool for Internet Protocol Cameras with Export to Third-Party Video Management Software Support, Batch Firmware Update, and Other Capabilities
CN106209816B (en) * 2016-07-01 2019-10-18 浙江宇视科技有限公司 A kind of web camera login method and system
CN106210132B (en) * 2016-08-19 2019-06-11 浙江宇视科技有限公司 A kind of web camera configuration method, apparatus and system
US10938801B2 (en) * 2018-09-21 2021-03-02 Microsoft Technology Licensing, Llc Nonce handler for single sign on authentication in reverse proxy solutions

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006165686A (en) * 2004-12-02 2006-06-22 Canon Inc Communication terminal, communication control method, and program
CN101982958A (en) * 2010-10-29 2011-03-02 青岛雄博科技有限公司 Processing method and system for automatically setting network monitoring system
CN107888868A (en) * 2016-09-28 2018-04-06 华为数字技术(苏州)有限公司 A kind of method and device for accessing video camera

Also Published As

Publication number Publication date
CN113766186A (en) 2021-12-07

Similar Documents

Publication Publication Date Title
EP3902199A1 (en) Identity check method for network function service, and related device
US11140162B2 (en) Response method and system in virtual network computing authentication, and proxy server
CN112738805B (en) Device control method and apparatus, storage medium, and electronic device
US9596233B1 (en) Management and authentication in hosted directory service
EP3333744A1 (en) Authorization code flow for in-browser applications
US11368842B2 (en) Session establishment method and means and communication system
CN103561121B (en) Method and device for analyzing DNS and browser
CN107015996A (en) A kind of resource access method, apparatus and system
CN113538739B (en) Pairing method of intelligent lock, electronic device and storage medium
CN113672896A (en) Interface authority verification method, system, electronic device and storage medium
CN108965311A (en) Encryption of communicated data method and apparatus
CN106453349A (en) An account number login method and apparatus
CN107196983A (en) A kind of resource distribution method and device
CN105722072A (en) Business authorization method, device, system and router
RU2474073C2 (en) Network and method for initialising trust centre link key
CN111737681A (en) Resource acquisition method and device, storage medium and electronic device
CN111786932B (en) Account login method and device, electronic equipment and computer storage medium
CN117251837A (en) System access method and device, electronic equipment and storage medium
CN113766186B (en) Method, device, system and electronic device for skipping configuration interface of network camera
CN112019358A (en) Network configuration method, device, equipment and system
CN114585055A (en) Vehicle-mounted WiFi access method, vehicle controller, cloud server and mobile terminal
CN113132332B (en) Networking login method, household electrical appliance system and storage medium
CN110086893A (en) Domain name analytic method, device and computer readable storage medium
CN117061115B (en) Key negotiation method, key negotiation apparatus, computer device, and computer-readable storage medium
JP2015049910A (en) Connection management method, program, and connection management system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant