TWI700928B - Monitor system and setting method thereof - Google Patents
Monitor system and setting method thereof Download PDFInfo
- Publication number
- TWI700928B TWI700928B TW108101071A TW108101071A TWI700928B TW I700928 B TWI700928 B TW I700928B TW 108101071 A TW108101071 A TW 108101071A TW 108101071 A TW108101071 A TW 108101071A TW I700928 B TWI700928 B TW I700928B
- Authority
- TW
- Taiwan
- Prior art keywords
- parameter
- host
- identification code
- setting
- extension
- Prior art date
Links
Images
Landscapes
- Closed-Circuit Television Systems (AREA)
Abstract
Description
本發明提供一種保全監視系統,特別是一種能進行設定之保全監視系統。The present invention provides a security monitoring system, especially a security monitoring system that can be set.
由於科技的發展迅速,各地方都會裝設有保全監視系統。在先前技術中,保全監視系統皆採用由電腦連線方式處理,其需要準備相關設備與軟體,因此常造成處理程序的複雜及時間耗損。此外,也會因為人為疏失、操作錯誤而造成產品異常。Due to the rapid development of technology, security surveillance systems will be installed in various places. In the prior art, the security monitoring system is processed by a computer connection, which requires the preparation of related equipment and software, which often causes the processing procedures to be complicated and time-consuming. In addition, product abnormalities may also be caused due to human negligence and operating errors.
另外,因不同出廠值或客制參數在設備過多時會造成處理上的混亂,若技術人員未照SOP流程設定,而漏掉一個重要步驟,其嚴重程度甚至會導致客訴或公司損失問題發生。In addition, due to different factory values or customized parameters, when the equipment is too many, it will cause confusion in the processing. If the technician does not follow the SOP process and misses an important step, its severity may even lead to customer complaints or company losses. .
有鑑於此,本發明提出一種保全監視系統,包含:複數延伸設備,且具有通訊能力;影像主機,連接延伸設備,並儲存參數資料庫;及外接儲存裝置,包含有識別碼,當外接儲存裝置連接於影像主機時,影像主機驗證識別碼,當識別碼為正確時,影像主機依據參數資料庫設定延伸設備共用參數及特定用參數。In view of this, the present invention proposes a security monitoring system, which includes: a plurality of extension devices with communication capabilities; an image host, which is connected to the extension device, and stores a parameter database; and an external storage device, including an identification code, when the external storage device When connected to the image host, the image host verifies the identification code. When the identification code is correct, the image host sets the extended device shared parameters and specific parameters according to the parameter database.
其中,影像主機還依據參數資料庫設定影像主機。Among them, the image host also sets the image host according to the parameter database.
此外,參數資料庫儲存影像主機及延伸設備的網路設定參數。In addition, the parameter database stores the network setting parameters of the video host and extension devices.
再者,參數資料庫包含延伸設備設定參數及主機設定參數,影像主機驗證識別碼為與延伸設備設定參數對應時,依據延伸設備設定參數設定延伸設備,依據主機設定參數設定影像主機。Furthermore, the parameter database includes extension device setting parameters and host setting parameters. When the image host verification ID corresponds to the extension device setting parameters, the extension device is set according to the extension device setting parameters, and the image host is set according to the host setting parameters.
本發明更提出一種保全監視系統設定方法,包含:啟動影像主機;連接外接儲存裝置而使影像主機啟動驗證機制;接收外接儲存裝置之識別碼;及認證識別碼,當驗證機制確認識別碼正確時,影像主機依據參數資料庫設定延伸設備。The present invention further provides a security monitoring system setting method, which includes: starting the image host; connecting an external storage device to enable the image host to activate the verification mechanism; receiving the identification code of the external storage device; and the authentication identification code, when the verification mechanism confirms that the identification code is correct , The image host sets the extension device according to the parameter database.
此外,於認證識別碼之步驟中更包含:影像主機還依據參數資料庫設定影像主機。In addition, the step of authenticating the identification code further includes: the image host also sets the image host according to the parameter database.
其中,參數資料庫包含延伸設備設定參數及主機設定參數。Among them, the parameter database includes extended device setting parameters and host setting parameters.
此外,於認證識別碼之步驟後更包含:驗證識別碼為與延伸設備設定參數對應時,依據延伸設備設定參數設定延伸設備。In addition, after the step of verifying the identification code, it further includes: when the verification identification code corresponds to the extension device setting parameter, the extension device is set according to the extension device setting parameter.
再者,於認證識別碼之步驟後更包含:驗證識別碼為與主機設定參數對應時,依據主機設定參數設定影像主機。Furthermore, after the step of verifying the identification code, it further includes: when the verification identification code corresponds to the host setting parameters, the image host is set according to the host setting parameters.
以下在實施方式中詳細敘述本發明之詳細特徵及優點,其內容足以使任何熟習相關技藝者瞭解本發明之技術內容並據以實施,且根據本說明書所揭露之內容、申請專利範圍及圖式,任何熟習相關技藝者可輕易地理解本發明相關之目的及優點。The detailed features and advantages of the present invention are described in detail in the following embodiments, and the content is sufficient to enable anyone familiar with the relevant art to understand the technical content of the present invention and implement it accordingly, and according to the content disclosed in this specification, the scope of patent application and the drawings Anyone who is familiar with the relevant art can easily understand the related purpose and advantages of the present invention.
請參閱圖1,圖1為本發明保全監視系統之示意圖。本發明之保全監視系統,包含延伸設備10、影像主機20及外接儲存裝置30。Please refer to Figure 1. Figure 1 is a schematic diagram of the security monitoring system of the present invention. The security monitoring system of the present invention includes an
延伸設備10可為攝影機或及感測器,例如,攝影機係可用以執行拍攝影像或收錄音之功能,感測器可用以偵測經過或發生之人事物。以本發明而言,延伸設備10為攝影機,且其可為複數個,並且可裝設於不同地方。在此,影像主機20可同時與多個延伸設備10透過有線或無線之方式連接。The
影像主機20可為電腦主機,並儲存有參數資料庫21。參數資料庫21儲存影像主機20或/及延伸設備10的設備識別碼與對應的設定參數,例如,共用參數及特定用參數。影像主機20向複數個延伸設備10進行參數設定時,複數個延伸設備10皆會設定共用參數,但每一個延伸設備10之設定對應至一特定參數(如IP Address)。進一步來說,複數個延伸設備10會設定成相同的共用參數,但每一台延伸設備10會設定有與其對應之特定參數。基此,特定參數為延伸設備10的專屬參數值,例如,網路攝影機的IP位址若為相同的預設值,會造成影像主機20只能抓到一台網路攝影機。因此,透過特定參數之設定,影像主機20即能抓到複數個網路攝影機。The
在此,共用參數可以是解析度、FPS、Bit rate及延伸設備10的帳號密碼等。特定用參數可以是固定IP位址等,將參數資料庫21內特定用參數的預設值設定至對應之延伸設備10中,且此特定用參數為唯一值不可重複。若特定用參數非為唯一值,則將造成,例如,IP位址重複,造成IP衝突,使得延伸設備10無法正常運作。Here, the common parameters may be resolution, FPS, Bit rate, and the account password of the
外接儲存裝置30包含有識別碼31,當外接儲存裝置30連接於影像主機20時,影像主機20具有驗證程式,以對識別碼31進行驗證。於一實施例中,識別碼31係一被加密執行之編碼,僅能透過影像主機20之驗證程式對識別碼31進行解碼及驗證。當識別碼31為正確時,影像主機20能依據參數資料庫21設定延伸設備10。此外,影像主機20更能依據參數資料庫21而設定影像主機20本身之各項參數值,例如,回復出廠設定值等。在一些實施例中,外接儲存裝置30是隨插即用的儲存裝置,如隨身碟、隨身硬碟等。The
參數資料庫21更儲存有影像主機20與延伸設備10之網路設定參數。在此,影像主機20與延伸設備10之間可透過網路協定而彼此相互連通,例如,ONVIF、RTSP等之網路協定,而使得影像主機20與延伸設備10可相互連結並傳送資料。基此,當影像主機20連接外接儲存裝置30,並確認外接儲存裝置30儲存的識別碼31為正確後,影像主機20即能將參數資料庫21之網路設定參數傳送至延伸設備10做進一步設定。例如,前述之IP位址、DHCP、解析度、Bit rate及延伸設備10的帳號密碼等,即可透過網路協定連結後而傳送上述之網路設定參數。The
請參閱圖2,圖2為本發明參數資料庫之示意圖。參數資料庫21更儲存有延伸設備設定參數23及主機設定參數24。當外接儲存裝置30連接於影像主機20時,影像主機20驗證識別碼31與延伸設備設定參數23對應時,影像主機20即能依據延伸設備設定參數23設定延伸設備10。而當影像主機20驗證識別碼31與主機設定參數24對應時,影像主機20即能依據主機設定參數24設定影像主機20。換言之,在一些實施例中,一個外接儲存裝置30儲存有對應延伸設備設定參數23的識別碼31;另一個外接儲存裝置30儲存有對應主機設定參數24的識別碼31,藉此操作人員可透過不同的外接儲存裝置30進行想要的操作。Please refer to FIG. 2, which is a schematic diagram of the parameter database of the present invention. The
舉例而言,在工廠生產前端作業時,保全監視系統都會有固定出廠值,基此,可藉由外接儲存裝置30先設定識別碼,當產品於廠房將準備執行驗證時,使用此外接儲存裝置30將保全監視系統所需參數設置完成,除了可以簡化生產流程,也可以透過此外接儲存裝置30接收保全監視系統端發送的資訊。在客戶設備維護端作業時,當保全監視系統發生故障待修事件,可以使用外接儲存裝置30回復影像系統的初始值,若回復後即工作正常,就可以避免拆裝作業導致設備損壞的因素。For example, during the front-end operation of the factory production, the security monitoring system will have a fixed factory value. Based on this, the
請參閱圖3,圖3為本發明保全監視系統設定方法之流程圖。參考圖1,首先,啟動影像主機(步驟S10)。在步驟S10的一些實施例中,啟動影像主機20較佳地可透過影像主機20上之實體按鍵進行啟動,或是透過其他無線或有線遙控器,對影像主機20進行啟動。Please refer to FIG. 3, which is a flowchart of the method for setting the security monitoring system of the present invention. Referring to Fig. 1, first, the video host is started (step S10). In some embodiments of step S10, the
接著,連接外接儲存裝置而使影像主機啟動驗證機制(步驟S11)。在步驟S11的一些實施例中,影像主機20開始運作之後,當外接儲存裝置30連接至影像主機20時,影像主機20隨即自行啟動驗證機制。Then, the external storage device is connected to enable the image host to activate the verification mechanism (step S11). In some embodiments of step S11, after the
之後,接收外接儲存裝置之識別碼(步驟S12)。在步驟S12一些實施例中,當外接儲存裝置30連接至影像主機20時,影像主機20隨即自行啟動驗證機制。同時,影像主機20會接收外接儲存裝置30之識別碼31。After that, the identification code of the external storage device is received (step S12). In some embodiments of step S12, when the
接著,認證識別碼,當驗證機制確認識別碼正確時,影像主機依據參數資料庫設定延伸設備(步驟S13)。在步驟S13一些實施例中,影像主機20接收外接儲存裝置30之識別碼31之後,影像主機20隨即會透過先前所啟動之驗證機制,對所接收外接儲存裝置30之識別碼31進行驗證。當驗證機制確認識別碼31正確時,影像主機20即能依據參數資料庫21對延伸設備10進行設定。基此,影像主機20較佳地係可為一電腦主機,並儲存有一參數資料庫21。並且,影像主機20主要係與延伸設備10相互連接。在此,影像主機20可同時與多個延伸設備10透過有線或無線之方式連接。Then, the identification code is authenticated. When the verification mechanism confirms that the identification code is correct, the image host sets the extension device according to the parameter database (step S13). In some embodiments of step S13, after the
此外,在步驟S13一些實施例中,除了可透過參數資料庫21設定延伸設備10之外,更可依據參數資料庫21設定影像主機20。In addition, in some embodiments of step S13, in addition to setting the
請參閱圖4,圖4為本發明保全監視系統設定方法另一實施例之流程圖。在此,參數資料庫21更儲存有延伸設備設定參數23及主機設定參數24。在另一實施例中,於認證識別碼31之步驟後更包含,驗證識別碼為與延伸設備設定參數23對應時,依據延伸設備設定參數23設定延伸設備10(步驟S131)。在步驟S131一些實施例中,當外接儲存裝置30連接於影像主機20時,影像主機20驗證識別碼31與延伸設備設定參數23對應時,影像主機20即能依據延伸設備設定參數23設定延伸設備10。Please refer to FIG. 4, which is a flowchart of another embodiment of the security monitoring system setting method of the present invention. Here, the
請參閱圖5,圖5為本發明保全監視系統設定方法又一實施例之流程圖。在此又一實施例中,於認證識別碼31之步驟後更包含,驗證識別碼為與主機設定參數對應時,依據主機設定參數設定影像主機。(步驟S132)。在步驟S132一些實施例中,當外接儲存裝置30連接於影像主機20,而當影像主機20驗證識別碼31與主機設定參數24對應時,影像主機20即能依據主機設定參數24設定影像主機20。Please refer to FIG. 5. FIG. 5 is a flowchart of another embodiment of the security monitoring system setting method of the present invention. In this still another embodiment, after the step of authenticating the
本發明透過影像主機儲存有參數資料庫,外接儲存裝置包含有識別碼,當外接儲存裝置連接於影像主機時,影像主機驗證識別碼,若識別碼為正確時,影像主機及能依據參數資料庫設定直接設定延伸設備。解決習知技術上,保全監視系統需要準備相關設備與軟體,而造成處理程序的複雜及時間耗損的問題。同時也解決因為人為疏失、操作錯誤而造成產品異常之問題。以及,解決因不同出廠值或客制參數在設備過多時會造成處理上混亂之問題。The present invention stores a parameter database through the image host, and the external storage device contains an identification code. When the external storage device is connected to the image host, the image host verifies the identification code. If the identification code is correct, the image host can use the parameter database Set the extension device directly. To solve the problem of complicated processing procedures and time consumption due to the complexity of processing procedures and time consumption due to the need to prepare related equipment and software for the security monitoring system in the conventional technology. At the same time, it also solves the problem of product abnormality caused by human negligence and operating errors. And, to solve the problem of processing confusion caused by too many equipment due to different factory values or customized parameters.
雖然本發明的技術內容已經以較佳實施例揭露如上,然其並非用以限定本發明,任何熟習此技藝者,在不脫離本發明之精神所作些許之更動與潤飾,皆應涵蓋於本發明的範疇內,因此本發明之保護範圍當視後附之申請專利範圍所界定者為準。Although the technical content of the present invention has been disclosed in the preferred embodiment as above, it is not intended to limit the present invention. Anyone who is familiar with this technique and makes some changes and modifications without departing from the spirit of the present invention should be covered by the present invention Therefore, the scope of protection of the present invention shall be subject to the scope of the attached patent application.
[圖1] 係本發明保全監視系統之示意圖。 [圖2] 係本發明參數資料庫之示意圖。 [圖3] 係本發明保全監視系統設定方法之流程圖。 [圖4] 係本發明保全監視系統設定方法另一實施例之流程圖。 [圖5] 係本發明保全監視系統設定方法又一實施例之流程圖。[Figure 1] is a schematic diagram of the security monitoring system of the present invention. [Figure 2] is a schematic diagram of the parameter database of the present invention. [Figure 3] is a flowchart of the security monitoring system setting method of the present invention. [Figure 4] is a flowchart of another embodiment of the security monitoring system setting method of the present invention. [Figure 5] is a flowchart of another embodiment of the security monitoring system setting method of the present invention.
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW108101071A TWI700928B (en) | 2019-01-10 | 2019-01-10 | Monitor system and setting method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW108101071A TWI700928B (en) | 2019-01-10 | 2019-01-10 | Monitor system and setting method thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
TW202027488A TW202027488A (en) | 2020-07-16 |
TWI700928B true TWI700928B (en) | 2020-08-01 |
Family
ID=73003003
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW108101071A TWI700928B (en) | 2019-01-10 | 2019-01-10 | Monitor system and setting method thereof |
Country Status (1)
Country | Link |
---|---|
TW (1) | TWI700928B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100145899A1 (en) * | 2006-06-02 | 2010-06-10 | Buehler Christopher J | Systems and Methods for Distributed Monitoring of Remote Sites |
US20170109999A1 (en) * | 2010-09-28 | 2017-04-20 | Icontrol Networks, Inc. | Method, system and apparatus for automated reporting of account and sensor zone information to a central station |
-
2019
- 2019-01-10 TW TW108101071A patent/TWI700928B/en active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100145899A1 (en) * | 2006-06-02 | 2010-06-10 | Buehler Christopher J | Systems and Methods for Distributed Monitoring of Remote Sites |
US20170109999A1 (en) * | 2010-09-28 | 2017-04-20 | Icontrol Networks, Inc. | Method, system and apparatus for automated reporting of account and sensor zone information to a central station |
Also Published As
Publication number | Publication date |
---|---|
TW202027488A (en) | 2020-07-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9125049B2 (en) | Configuring secure wireless networks | |
US20190043150A1 (en) | Image Processing Apparatus And Robot System | |
KR101885720B1 (en) | IOT base remote control system for building equipment available for control air quality of each indoor space | |
US7558702B2 (en) | Computer apparatus, start-up controlling method, and storage medium | |
US20130212233A1 (en) | Method for configuring a wireless device | |
US20150373538A1 (en) | Configuring Secure Wireless Networks | |
US20020112064A1 (en) | Customer support network | |
US10924266B2 (en) | Communication apparatus, communication system, and communication control method | |
US11381459B2 (en) | Service providing system and method for preventing hidden camera, service providing apparatus therefor, and non-transitory computer readable medium having computer program recorded thereon | |
WO2014169645A1 (en) | Method for detecting fault of intelligent terminal, and intelligent terminal | |
US20130208109A1 (en) | Wireless security camera system | |
WO2016058306A1 (en) | Optical module authentication method and apparatus | |
TWI700928B (en) | Monitor system and setting method thereof | |
KR20210044595A (en) | Service providing system and method for preventing a hidden camera, a service providing apparatus therefor and non-transitory computer readable medium having computer program recorded thereon | |
WO2019080316A1 (en) | Method and device for automatic fault analysis of service robot | |
KR101457086B1 (en) | Apparatus for integrity verification of firmware of embedded system and method thereof | |
KR20150141095A (en) | Wireless camera, wireless Network Video Recoder and method for automatic registration ability thereof | |
WO2017170057A1 (en) | Intercom system | |
TW202105206A (en) | Verification system and verification method | |
KR101622610B1 (en) | Smart Certification System of Home Wireless Network Camera by Using UWB Sensor and Methof thereof | |
JP2009260557A (en) | Communication equipment, communication information setting method, and program | |
KR101534532B1 (en) | Video monitoring system comprising video recording apparatus and status processing method according to received request from the video recording apparatus | |
TW201805905A (en) | Identification security system applying augmented reality techniques and verification method using thereof | |
TW202230180A (en) | Method of isolating and authenticating network terminal equipment capable of preventing the terminal equipment from performing abnormal or frequent data access to cause harm to the system information security | |
KR102020845B1 (en) | Calibration system and method for camera using object identification |