WO2017156960A1 - 访问智能摄像头的方法及装置 - Google Patents

访问智能摄像头的方法及装置 Download PDF

Info

Publication number
WO2017156960A1
WO2017156960A1 PCT/CN2016/092867 CN2016092867W WO2017156960A1 WO 2017156960 A1 WO2017156960 A1 WO 2017156960A1 CN 2016092867 W CN2016092867 W CN 2016092867W WO 2017156960 A1 WO2017156960 A1 WO 2017156960A1
Authority
WO
WIPO (PCT)
Prior art keywords
password
access
smart camera
token
server
Prior art date
Application number
PCT/CN2016/092867
Other languages
English (en)
French (fr)
Inventor
陈宏�
高自光
侯恩星
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to KR1020187030115A priority Critical patent/KR102044113B1/ko
Priority to RU2017133782A priority patent/RU2674311C1/ru
Priority to JP2017544782A priority patent/JP6580151B2/ja
Publication of WO2017156960A1 publication Critical patent/WO2017156960A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0846Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/60Control of cameras or camera modules
    • H04N23/66Remote control of cameras or camera parts, e.g. by remote control devices
    • H04N23/661Transmitting camera control signals through networks, e.g. control via the Internet

Definitions

  • the present disclosure relates to the field of network communication technologies, and in particular, to a method and apparatus for accessing a smart camera.
  • smart cameras for video surveillance have also been widely used.
  • the user can access the smart camera at any time through the Internet, so that the user can perform video monitoring in time.
  • the smart camera cannot be accessed, which increases the difficulty for the user to access the smart camera.
  • the present disclosure provides a method and apparatus for accessing a smart camera.
  • a method of accessing a smart camera comprising: detecting an access medium for accessing a first smart camera;
  • the access medium When detecting that the access medium is a local area network, generating a corresponding first access request, where the first access request carries an access password;
  • the generating a corresponding first access request, where the first access request carries an access password includes:
  • the access password is an access password input by the user; and the obtaining the access password includes:
  • the access password input by the user for the password input interface is received.
  • the method further includes:
  • the access password is a token password sent by the server; and the obtaining the access password includes:
  • the token password is determined as the access password.
  • the method further includes:
  • the determining the token password as the access password includes:
  • the token password is determined as the access password.
  • a method of accessing a smart camera comprising:
  • the verifying the access password includes:
  • the method further includes:
  • the verifying the access password includes:
  • the access password is the same as the token password, it is determined that the access password passes verification.
  • the method further includes:
  • determining that the access password passes the verification includes:
  • an apparatus for accessing a smart camera comprising:
  • a detection module configured to detect an access medium for accessing the first smart camera
  • the first access request generating module is configured to: when detecting that the access medium is a local area network, generate a corresponding first access request, where the first access request carries an access password;
  • the first sending module is configured to send the first access request to the first smart camera, so that the first smart camera accepts access after verifying the access password in the first access request.
  • the first access request generating module includes:
  • a first obtaining submodule configured to obtain an access password
  • Adding a submodule configured to add the access password to the first access request Adding a submodule configured to add the access password to the first access request.
  • the access password is an access password input by the user;
  • the first obtaining submodule includes:
  • An output submodule configured to output an access password input interface
  • the receiving submodule is configured to receive an access password input by the user for the password input interface.
  • the device further includes:
  • a first setting module configured to set an appointment password with the first smart camera before accessing the first smart camera
  • a second sending module configured to send the agreed password to the first smart camera, so that the first smart camera saves the agreed password, and determines the agreed password and the first access
  • the access password entered by the user in the request is the same and the access is accepted.
  • the access password is a token password sent by the server;
  • the first obtaining submodule includes:
  • the second obtaining submodule is configured to obtain a token password sent by the server
  • the first determining submodule is configured to determine the token password as the access password.
  • the device further includes:
  • the receiving module is configured to receive a token password issued by the server and an expiration date of the token password, where the token password is randomly generated after the server receives the password acquisition request sent by the first smart camera. And the token password is simultaneously sent by the server to the terminal and the first smart camera; or the token password is periodically generated by the server, and the token password is simultaneously sent by the server. Send to terminal And the first smart camera.
  • the first determining submodule includes:
  • a determining submodule configured to determine whether a validity period of the token password expires
  • a second determining submodule configured to determine the token password as the access password if the validity period of the token password has not expired.
  • an apparatus for accessing a smart camera comprising:
  • the first receiving module is configured to receive, by using a local area network, a first access request sent by the terminal, where the first access request carries an access password;
  • a verification module configured to verify the access password
  • the first accepting module is configured to accept access by the terminal if the verification is passed.
  • the verification module includes:
  • a first determining submodule configured to determine whether the access password is the same as a locally saved agreed password
  • the first determining submodule is configured to determine that the access password passes the verification if the access password and the agreed password are the same.
  • the device further includes:
  • the second receiving module is configured to receive the agreed password sent by the terminal, where the agreed password is an agreed password between the terminal and the first smart camera.
  • the verification module includes:
  • the second determining sub-module is configured to determine whether the access password is the same as the locally saved token password, where the token password is a password sent by the server;
  • a second determining submodule configured to determine that the access password passes the verification if the access password is the same as the token password.
  • the device further includes:
  • the sending module is configured to send a password acquisition request to the server, so that the server randomly generates a token password according to the password acquisition request, and simultaneously sends the token password to the terminal and the first smart camera;
  • the third receiving module is configured to receive a token password issued by the server and an expiration date of the token password.
  • the second determining submodule includes:
  • the determining submodule is configured to determine whether the validity period of the token password expires if the access password is the same as the token password;
  • a third determining submodule configured to determine that the access password passes the verification if the validity period of the token password has not expired.
  • an apparatus for accessing a smart camera comprising:
  • a memory for storing processor executable instructions
  • processor is configured to:
  • the access medium When detecting that the access medium is a local area network, generating a corresponding first access request, where the first access request carries an access password;
  • an apparatus for accessing a smart camera comprising:
  • a memory for storing processor executable instructions
  • processor is configured to:
  • the terminal may detect a access medium for accessing the first smart camera, and when detecting that the access medium is a local local area network, generate a corresponding first access request, where the first access request carries an access password, and the first access is performed.
  • the request is sent to the first smart camera, so that the first smart camera receives access after the access password verification in the first access request is passed, thereby realizing that the terminal is in the same local area network as the first smart camera but cannot access the Internet.
  • the local device access authentication mechanism can also access the first smart camera, improve the security of accessing the smart camera, and also meet the personalized needs of the user to access the smart camera, thereby improving the user experience.
  • the terminal may obtain the access password in a plurality of manners, and add the obtained access password to the first access request for security verification by the first smart camera, where the access password may be a password set by the terminal in advance. It can also be a password input by the user, or a password issued by the server, which expands the source range of the access password, thereby improving the efficiency and practicability of accessing the smart camera.
  • the terminal may also detect the access medium used to access the first smart camera, and when detecting that the access medium is the local local area network, obtain the token password sent by the server, and determine whether the validity period of the token password expires. If the validity period of the token password has not expired, the token password is determined as the access password and the access is made. The password is added to the first access request, and the first access request is sent to the first smart camera, so that the terminal cannot access the first smart camera through the local area network after the expiration of the validity period of the token password, and can only wait for the server to send the request. Another valid token password, which increases the security and reliability of accessing the smart camera. .
  • the first smart camera can receive the first access request sent by the terminal through the local area network, the first access request carries the access password, and the access password is verified, and if the terminal passes the access after the verification is passed, the first access is realized.
  • the local device access authentication mechanism can also complete the verification of the first access request, improve the security of accessing the smart camera, and satisfy the user's personality of accessing the smart camera. Demand has increased the user experience.
  • the first smart camera in the present disclosure may further receive a first access request sent by the terminal by using a local area network, where the first access request carries an access password, and determines whether the access password is the same as the locally saved token password, and the token password is a server.
  • the issued password if the access password is the same as the token password, determines whether the validity period of the token password expires. If the validity period of the token password has not expired, it is determined that the access password is verified, and the access of the terminal is accepted, so that the first The smart camera cannot accept access to the first smart camera after the validity period of the token password expires, thereby improving the security and reliability of accessing the smart camera.
  • FIG. 1 is a flowchart of a method for accessing a smart camera according to an exemplary embodiment of the present disclosure
  • FIG. 2 is a flow chart of another method for accessing a smart camera according to an exemplary embodiment of the present disclosure
  • FIG. 3 is a flowchart of another method for accessing a smart camera according to an exemplary embodiment of the present disclosure
  • FIG. 4 is a flowchart of a method for accessing a smart camera according to an exemplary embodiment of the present disclosure
  • FIG. 5 is a flowchart of another method for accessing a smart camera according to an exemplary embodiment of the present disclosure
  • FIG. 6 is an application scenario diagram of a method for accessing a smart camera according to an exemplary embodiment of the present disclosure
  • FIG. 7 is a block diagram of an apparatus for accessing a smart camera according to an exemplary embodiment of the present disclosure.
  • FIG. 8 is a block diagram of another apparatus for accessing a smart camera according to an exemplary embodiment of the present disclosure.
  • FIG. 9 is a block diagram of another apparatus for accessing a smart camera according to an exemplary embodiment of the present disclosure.
  • FIG. 10 is a block diagram of another apparatus for accessing a smart camera according to an exemplary embodiment of the present disclosure.
  • FIG. 11 is a block diagram of another apparatus for accessing a smart camera according to an exemplary embodiment of the present disclosure.
  • FIG. 12 is a block diagram of another apparatus for accessing a smart camera according to an exemplary embodiment of the present disclosure.
  • FIG. 13 is a block diagram of another apparatus for accessing a smart camera according to an exemplary embodiment of the present disclosure.
  • FIG. 14 is a block diagram of an apparatus for accessing a smart camera according to an exemplary embodiment of the present disclosure
  • FIG. 15 is a block diagram of another apparatus for accessing a smart camera according to an exemplary embodiment of the present disclosure.
  • 16 is a block diagram of another apparatus for accessing a smart camera, according to an exemplary embodiment of the present disclosure.
  • FIG. 17 is a block diagram of another apparatus for accessing a smart camera according to an exemplary embodiment of the present disclosure.
  • FIG. 18 is a block diagram of another apparatus for accessing a smart camera according to an exemplary embodiment of the present disclosure.
  • FIG. 19 is a block diagram of another apparatus for accessing a smart camera according to an exemplary embodiment of the present disclosure.
  • FIG. 20 is a schematic structural diagram of an apparatus for accessing a smart camera according to an exemplary embodiment of the present disclosure.
  • first, second, third, etc. may be used in the present disclosure to describe various information, such information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other.
  • first information may also be referred to as second information without departing from the scope of the present disclosure.
  • second information may also be referred to as first information.
  • word "if” as used herein may be interpreted as "when” or “when” or “in response to a determination.”
  • FIG. 1 is a flowchart of a method for accessing a smart camera according to an exemplary embodiment of the present disclosure.
  • the method may be used in a terminal, including the following steps:
  • step 110 an access medium for accessing the first smart camera is detected.
  • the terminal in the present disclosure may be any smart terminal with internet access function, for example, may be specifically a mobile phone, a tablet computer, a personal digital assistant (PDA), or the like.
  • the terminal can access the router through the wireless local area network and access the server on the public network through the router.
  • the access medium in the present disclosure may be the Internet or a local area network.
  • the terminal accesses the first smart camera, and the purpose thereof is to monitor the video captured by the first smart camera, or to adjust various performances of the first smart camera.
  • step 120 when it is detected that the access medium is a local area network, a corresponding first access request is generated, and the first access request carries an access password.
  • a secure local device access authentication mechanism is provided, and is used when the terminal and the first smart camera are under the same local area network but cannot access the Internet.
  • the terminal and the first smart camera can perform authentication by using a password verification method. Therefore, when the terminal sends an access request to the first smart camera, it needs to carry an access password.
  • step 130 the first access request is sent to the first smart camera to cause the first smart camera to accept access after the access password verification in the first access request is passed.
  • the access medium used for accessing the first smart camera when detecting that the access medium is a local local area network, a corresponding first access request is generated, and the first access request carries an access password, which will be the first
  • the access request is sent to the first smart camera, so that the first smart camera receives access after the access password verification in the first access request is passed, thereby realizing that the terminal is on the same local area network as the first smart camera but cannot access the Internet.
  • the local device access authentication mechanism can also access the first smart camera, improve the security of accessing the smart camera, and also meet the personalized needs of the user to access the smart camera, thereby improving the user experience.
  • FIG. 2 is a flowchart of another method for accessing a smart camera according to an exemplary embodiment of the present disclosure, which may be used in a terminal and built on the method shown in FIG.
  • a corresponding first access request is generated.
  • the first access request carries an access password
  • the following steps may be included:
  • step 210 an access password is obtained.
  • the access password may be a password set by the terminal in advance, or may be a password input by the user, or may be a password sent by the server.
  • the way to obtain an access password includes but is not limited to the following two ways:
  • Method 1 The access password is the access password entered by the user.
  • the acquisition process includes:
  • the agreement password with the first smart camera needs to be set, and the agreed password is sent to the first smart camera, so that the first smart camera saves the agreed password. And is used to determine that the appointment password is the same as the access password input by the user in the first access request, and then accepts the access.
  • the terminal in the Internet state, may send the agreed password to the first smart camera in advance, and is used when the terminal and the first smart camera are in the same local area network but cannot access the Internet.
  • the agreed password may be a user specified password.
  • the access password is the token password sent by the server.
  • the acquisition process includes:
  • the token password is determined as the access password.
  • the terminal receives the token password sent by the server, and updates the saved token password by using the newly received token password, so that the access password carried in the first access request is used.
  • the token password may be a randomly generated string of characters sent by the server according to the password acquisition request of the first smart camera to the first smart camera and the terminal for saving by the first smart camera and the terminal, and the order is
  • the card password is also valid. For example, a token password is valid for one hour, and the token password is invalid for more than one hour.
  • step 220 an access password is added to the first access request.
  • the access password can be obtained in a plurality of manners, and the obtained access password is added to the first access request for security verification by the first smart camera, wherein the access password can be set in advance by the terminal.
  • the password can also be the password entered by the user, or the password sent by the server, which expands the source range of the access password, thereby improving the efficiency and practicability of accessing the smart camera.
  • FIG. 3 is a flowchart of another method for accessing a smart camera according to an exemplary embodiment of the present disclosure.
  • the method may be used in a terminal and established on the basis of the method shown in FIG.
  • the steps can be included:
  • step 310 an access medium for accessing the first smart camera is detected.
  • step 320 when it is detected that the access medium is a local area network, the token password sent by the server is obtained.
  • the manner in which the triggering server sends the token password includes but is not limited to the following two modes:
  • the first smart camera can periodically send a password acquisition request to the server.
  • the server receives the password acquisition request sent by the first smart camera, the server randomly generates a string as a token password, and simultaneously downloads the token password. Send to the terminal and the first smart camera.
  • the first smart camera sends a password acquisition request to the server every hour.
  • the server can also generate a token password periodically, and send the token password to the terminal and the first smart camera at the same time.
  • the server sends a token password to the terminal and the first smart camera every hour, and the token password is valid for one hour.
  • the token password received by the terminal may be randomly generated by the server after receiving the password acquisition request sent by the first smart camera, and the token password is simultaneously sent by the server to the terminal and the first wisdom.
  • the camera password may be generated by the server periodically, and the token password is simultaneously sent by the server to the terminal and the first smart camera.
  • the server sends the token password to the terminal and the first smart camera at the same time, and the purpose is to enable the terminal to use the token password as the access password when accessing the first smart camera after receiving the token password.
  • the terminal after receiving the token password sent by the server, the terminal can also receive the validity period of the token password sent by the server.
  • step 330 it is determined whether the validity period of the token password has expired.
  • step 340 if the validity period of the token password has not expired, the token password is determined as an access password, and the access password is added to the first access request.
  • the token password may be determined as an access password; if the validity period of the token password has expired, indicating the order The card password has expired and the token password cannot be determined as the access code.
  • the token password issued by the server is valid for 1 hour. If the first smart camera is accessed during the validity period, the token password can be used as the access password. If the validity period is exceeded, the terminal cannot access the first local area network. The smart camera can only wait for access to the Internet to get a new token password.
  • step 350 the first access request is sent to the first smart camera to cause the first smart camera to accept access after the access password verification in the first access request is passed.
  • FIG. 4 is a flowchart of a method for accessing a smart camera according to an exemplary embodiment.
  • the method may be used in a first smart camera, where the first smart camera is a smart camera to be accessed. , can include the following steps:
  • the first access request sent by the terminal is received through the local area network, and the first access request carries an access password.
  • the access password may be a password set by the terminal in advance, or may be a password input by the user, or may be a password sent by the server.
  • step 420 the access password is verified.
  • the way to verify the access password includes but is not limited to the following two ways:
  • the access password may be the password set by the terminal in advance, or it may be the password entered by the user.
  • Test The certification process includes:
  • the first smart camera receives the agreed password sent by the terminal in advance, and the agreed password is an agreed password between the terminal and the first smart camera, and the agreed password may be set by the terminal according to actual conditions, May be user specified.
  • Method 2 The access password is the password sent by the server.
  • the verification process includes:
  • the first smart camera sends a password acquisition request to the server, and receives and saves the token password sent by the server, and updates the saved token password by using the newly received token password when saving.
  • the token password may be a randomly generated string of characters sent by the server according to the password acquisition request of the first smart camera to the first smart camera and the terminal for saving by the first smart camera and the terminal, and the order is
  • the card password is also valid. For example, a token password is valid for one hour, and the token password is invalid for more than one hour.
  • step 430 if the verification is passed, the access of the terminal is accepted.
  • the first access request sent by the terminal is received by the local area network, the first access request carries the access password, and the access password is verified, and if the terminal passes the access after the verification is passed, the first smart camera is realized.
  • the local device access authentication mechanism can also complete the verification of the first access request, improve the security of accessing the smart camera, and satisfy the personalized requirement of the user accessing the smart camera. , improved user experience.
  • FIG. 5 is a flowchart of another method for accessing a smart camera according to an exemplary embodiment of the present disclosure, which may be used in a first smart camera and established in the method shown in FIG. Based on the following steps, the following steps can be included:
  • step 510 the first access request sent by the terminal is received through the local area network, and the first access request carries an access password.
  • step 520 it is determined whether the access password is the same as the locally saved token password, and the token password is a password sent by the server. If the access password is the same as the token password, step 530 is performed; if the access password is different from the token password, step 560 is performed.
  • the manner in which the triggering server sends the token password includes but is not limited to the following two modes:
  • the first smart camera can periodically send a password acquisition request to the server, when the server receives After the password acquisition request sent by the first smart camera, a string of characters is randomly generated as a token password, and the token password is simultaneously sent to the terminal and the first smart camera.
  • the first smart camera sends a password acquisition request to the server every hour.
  • the server can also generate a token password periodically, and send the token password to the terminal and the first smart camera at the same time.
  • the server sends a token password to the terminal and the first smart camera every hour, and the token password is valid for one hour.
  • the token password received by the terminal may be randomly generated after the server receives the password acquisition request sent by the first smart camera, and the token password is simultaneously sent by the server to the terminal and the first smart camera.
  • the token password may be generated periodically by the server, and the token password is simultaneously sent by the server to the terminal and the first smart camera.
  • the server sends the token password to the terminal and the first smart camera at the same time, and the purpose is to enable the first smart camera to use the token password pair when receiving the access request of the terminal after receiving the token password.
  • the access password in the request is verified.
  • the terminal after receiving the token password sent by the server, the terminal can also receive the validity period of the token password sent by the server.
  • step 530 it is determined whether the validity period of the token password has expired. If the validity period of the token password has not expired, step 540 is performed; if the validity period of the token password has expired, step 560 is performed.
  • step 540 it is determined that the access password is verified.
  • the validity period of the token password is not expired, it indicates that the token password is still valid and can be used for verification; if the validity period of the token password has expired, it indicates that the token password has expired, and cannot be Used for verification.
  • step 550 the access of the terminal is accepted and the flow ends.
  • step 560 access to the terminal is denied and the process ends.
  • the first access request sent by the terminal is received by the local area network, and the first access request carries the access password, and the access password is determined to be the same as the locally saved token password.
  • the token password is sent by the server. Password, if the access password is the same as the token password, it is judged whether the validity period of the token password expires. If the validity period of the token password has not expired, it is determined that the access password is verified, and the access of the terminal is accepted, so that the first smart camera is After the validity period of the token password expires, the access of the first smart camera cannot be accepted, thereby improving the security and reliability of accessing the smart camera.
  • FIG. 6 is an application scenario diagram of a method for accessing a smart camera according to an exemplary embodiment of the present disclosure.
  • the application scenario includes a smart phone as a terminal, a first smart camera, and a server.
  • the smart phone detects the access medium used to access the first smart camera:
  • the smart phone When detecting that the access medium is a local area network, the smart phone generates a corresponding first access request, where the first access request carries an access password, and the first access request is sent to the first smart camera through the local area network.
  • the first smart camera After receiving the first access request sent by the terminal through the local area network, the first smart camera verifies the access password in the first access request, and accepts the access of the terminal after the verification is passed.
  • the access password may be an access password input by the user, or may be a token password issued by the server.
  • the present disclosure also provides an embodiment of an apparatus for accessing a smart camera.
  • FIG. 7 is a block diagram of an apparatus for accessing a smart camera, which may be applied to a terminal and used to execute the access smart camera shown in FIG. 1 according to an exemplary embodiment.
  • the method may include: a detecting module 71, a first access request generating module 72, and a first sending module 73.
  • the detecting module 71 is configured to detect an access medium for accessing the first smart camera
  • the first access request generating module 72 is configured to: when detecting that the access medium is a local area network, generate a corresponding first access request, where the first access request carries an access password;
  • the first sending module 73 is configured to send the first access request to the first smart camera, so that the first smart camera accepts access after verifying the access password in the first access request .
  • the access medium used for accessing the first smart camera when detecting that the access medium is a local local area network, a corresponding first access request is generated, and the first access request carries an access password, which will be the first
  • the access request is sent to the first smart camera, so that the first smart camera receives access after the access password verification in the first access request is passed, thereby realizing that the terminal is on the same local area network as the first smart camera but cannot access the Internet.
  • the local device access authentication mechanism can also access the first smart camera, improve the security of accessing the smart camera, and also meet the personalized needs of the user to access the smart camera, thereby improving the user experience.
  • FIG. 8 is a block diagram of another apparatus for accessing a smart camera according to an exemplary embodiment of the present disclosure. The embodiment is based on the foregoing embodiment shown in FIG.
  • the request generation module 72 may include a first acquisition submodule 81 and an addition submodule 82.
  • the first obtaining submodule 81 is configured to acquire an access password.
  • An add submodule 82 is configured to add the access password to the first access request.
  • FIG. 9 is another accessing smart camera according to an exemplary embodiment of the present disclosure.
  • the access password is an access password input by the user
  • the first obtaining sub-module 81 may include an output sub-module 91 and a receiving sub-module 92.
  • the output sub-module 91 is configured to output an access password input interface
  • the receiving sub-module 92 is configured to receive an access password input by the user for the password input interface.
  • FIG. 10 is a block diagram of another apparatus for accessing a smart camera according to an exemplary embodiment of the present disclosure.
  • the embodiment may further include the foregoing embodiment of FIG.
  • the first setting module 101 is configured to set an appointment password with the first smart camera before accessing the first smart camera.
  • the second sending module 102 is configured to send the agreement password to the first smart camera, so that the first smart camera saves the agreement password, and determines the agreement password and the first The access password entered by the user in the access request is the same and the access is accepted.
  • FIG. 11 is a block diagram of another apparatus for accessing a smart camera according to an exemplary embodiment of the present disclosure.
  • the embodiment is based on the foregoing embodiment shown in FIG.
  • the first acquisition sub-module 81 may include a second acquisition sub-module 111 and a determination sub-module 112.
  • the second obtaining sub-module 111 is configured to acquire a token password sent by the server.
  • the first determining sub-module 112 is configured to determine the token password as the access password.
  • the access password can be obtained in a plurality of manners, and the obtained access password is added to the first access request for security verification by the first smart camera, wherein the access password can be set in advance by the terminal.
  • the password can also be the password entered by the user, or the password sent by the server, which expands the source range of the access password, thereby improving the efficiency and practicability of accessing the smart camera.
  • FIG. 12 is a block diagram of another apparatus for accessing a smart camera according to an exemplary embodiment of the present disclosure.
  • the embodiment may further include the foregoing embodiment of FIG. : Receive module 121.
  • the receiving module 121 is configured to receive a token password issued by the server and a validity period of the token password, where the token password is randomly received by the server after receiving the password acquisition request sent by the first smart camera. Generating, and the token password is simultaneously sent by the server to the terminal and the first smart camera; or the token password is periodically generated by the server, and the token is used by the server The password is sent to both the terminal and the first smart camera.
  • a corresponding second access request is generated, where the second access request carries the user account and the device identifier of the first smart camera, and sends the second access request to the server. So that the server determines the user account in the second access request and the device identifier of the first smart camera. After being recognized as a binding relationship, the second access request is forwarded to the first smart camera, thereby realizing that the terminal preferentially adopts the server authentication mechanism when accessing the Internet, so that the rate of accessing the smart camera can be further improved.
  • FIG. 13 is a block diagram of another apparatus for accessing a smart camera according to an exemplary embodiment of the present disclosure.
  • the embodiment is based on the foregoing embodiment shown in FIG.
  • the submodule 112 may include a judging submodule 131 and a second determining submodule 132.
  • the determining sub-module 131 is configured to determine whether the validity period of the token password expires
  • the second determining sub-module 132 is configured to determine the token password as the access password if the validity period of the token password has not expired.
  • FIG. 14 is a block diagram of an apparatus for accessing a smart camera, which may be applied to a first smart camera, which is to be accessed, according to an exemplary embodiment.
  • the smart camera is used to execute the method for accessing the smart camera shown in FIG. 4, and the device may include: a first receiving module 141, a verification module 142, and a first accepting module 143.
  • the first receiving module 141 is configured to receive, by using a local area network, a first access request sent by the terminal, where the first access request carries an access password;
  • the verification module 142 is configured to verify the access password
  • the first accepting module 143 is configured to accept access by the terminal after the verification is passed.
  • the first access request sent by the terminal is received by the local area network, the first access request carries the access password, and the access password is verified, and if the terminal passes the access after the verification is passed, the first smart camera is realized.
  • the local device access authentication mechanism can also complete the verification of the first access request, improve the security of accessing the smart camera, and satisfy the personalized requirement of the user accessing the smart camera. , improved user experience.
  • FIG. 15 is a block diagram of another apparatus for accessing a smart camera according to an exemplary embodiment of the present disclosure. The embodiment is based on the foregoing embodiment shown in FIG.
  • the first determining submodule 151 and the first determining submodule 152 may be included.
  • the first determining submodule 151 is configured to determine whether the access password is the same as the locally saved agreed password.
  • the first determining submodule 152 is configured to determine that the access password passes the verification if the access password and the agreed password are the same.
  • FIG. 16 is another accessing smart camera according to an exemplary embodiment of the present disclosure.
  • a block diagram of the device which is based on the foregoing embodiment shown in FIG. 15, the device may further include: a second receiving module 161.
  • the second receiving module 161 is configured to receive the agreed password sent by the terminal, where the agreed password is an agreed password between the terminal and the first smart camera.
  • FIG. 17 is a block diagram of another apparatus for accessing a smart camera according to an exemplary embodiment of the present disclosure. The embodiment is based on the foregoing embodiment shown in FIG.
  • the second determination sub-module 171 and the second determination sub-module 172 may be included.
  • the second determining sub-module 171 is configured to determine whether the access password is the same as the locally stored token password, where the token password is a password sent by the server;
  • the second determining submodule 172 is configured to determine that the access password passes the verification if the access password is the same as the token password.
  • FIG. 18 is a block diagram of another apparatus for accessing a smart camera according to an exemplary embodiment of the present disclosure.
  • the embodiment may be based on the foregoing embodiment shown in FIG.
  • the method includes a sending module 181 and a third receiving module 182.
  • the sending module 181 is configured to send a password acquisition request to the server, so that the server randomly generates a token password according to the password acquisition request, and simultaneously sends the token password to the terminal and the first smart camera. ;
  • the third receiving module 182 is configured to receive a token password issued by the server and an expiration date of the token password.
  • FIG. 19 is a block diagram of another apparatus for accessing a smart camera according to an exemplary embodiment of the present disclosure.
  • the embodiment is based on the foregoing embodiment shown in FIG.
  • the sub-module 172 can include a determination sub-module 191 and a third determination sub-module 192.
  • the determining sub-module 191 is configured to determine whether the validity period of the token password expires if the access password is the same as the token password;
  • the third determining submodule 192 is configured to determine that the access password passes the verification if the validity period of the token password has not expired.
  • the present disclosure further provides another device for accessing a smart camera, and the device can be applied to a terminal, including:
  • a memory for storing processor executable instructions
  • processor is configured to:
  • the access medium When detecting that the access medium is a local area network, generating a corresponding first access request, where the first access request carries an access password;
  • the present disclosure further provides another device for accessing a smart camera, and the device can be applied to a first smart camera, including:
  • a memory for storing processor executable instructions
  • processor is configured to:
  • the device embodiment since it basically corresponds to the method embodiment, reference may be made to the partial description of the method embodiment.
  • the device embodiments described above are merely illustrative, wherein the units described as separate components may or may not be physically separate, and the components displayed as units may or may not be physical units, ie may be located A place, or it can be distributed to multiple network units. Some or all of the modules may be selected according to actual needs to achieve the objectives of the present disclosure. Those of ordinary skill in the art can understand and implement without any creative effort.
  • FIG. 20 is a schematic structural diagram (terminal side) of an apparatus 2000 for accessing a smart camera according to an exemplary embodiment of the present disclosure.
  • device 2000 can be a mobile phone with routing functionality, a computer, a digital broadcast terminal, a messaging device, a gaming console, a tablet device, a medical device, a fitness device, a personal digital assistant, and the like.
  • apparatus 2000 may include one or more of the following components: processing component 2002, memory 2004, power component 2006, multimedia component 2008, audio component 2010, input/output (I/O) interface 2012, sensor component 2014, And communication component 2016.
  • Processing component 2002 typically controls the overall operation of device 2000, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations.
  • Processing component 2002 can include one or more processors The instructions are executed 2020 to complete all or part of the steps of the above method.
  • processing component 2002 can include one or more modules to facilitate interaction between component 2002 and other components.
  • processing component 2002 can include a multimedia module to facilitate interaction between multimedia component 2008 and processing component 2002.
  • Memory 2004 is configured to store various types of data to support operation at device 2000. Examples of such data include instructions for any application or method operating on device 2000, contact data, phone book data, messages, pictures, videos, and the like.
  • the memory 2004 can be implemented by any type of volatile or non-volatile storage device, or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read only memory (EEPROM), erasable Programmable Read Only Memory (EPROM), Programmable Read Only Memory (PROM), Read Only Memory (ROM), Magnetic Memory, Flash Memory, Disk or Optical Disk.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read only memory
  • EPROM erasable Programmable Read Only Memory
  • PROM Programmable Read Only Memory
  • ROM Read Only Memory
  • Magnetic Memory Flash Memory
  • Disk Disk or Optical Disk.
  • Power component 2006 provides power to various components of device 2000.
  • Power component 2006 can include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for device 2000.
  • the multimedia component 2008 includes a screen between the device 2000 and the user that provides an output interface.
  • the screen can include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen can be implemented as a touch screen to receive input signals from the user.
  • the touch panel includes one or more touch sensors to sense touches, slides, and gestures on the touch panel. The touch sensor may sense not only the boundary of the touch or sliding action, but also the duration and pressure associated with the touch or slide operation.
  • the multimedia component 2008 includes a front camera and/or a rear camera. When the device 2000 is in an operation mode, such as a shooting mode or a video mode, the front camera and/or the rear camera can receive external multimedia data. Each front and rear camera can be a fixed optical lens system or have focal length and optical zoom capabilities.
  • the audio component 2010 is configured to output and/or input audio signals.
  • audio component 2010 includes a microphone (MIC) that is configured to receive an external audio signal when device 2000 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode.
  • the received audio signal may be further stored in memory 2004 or transmitted via communication component 2016.
  • the audio component 2010 also includes a speaker for outputting an audio signal.
  • the I/O interface 2012 provides an interface between the processing component 2002 and the peripheral interface module, which may be a keyboard, a click wheel, a button, or the like. These buttons may include, but are not limited to, a home button, a volume button, a start button, and a lock button.
  • the sensor assembly 2014 includes one or more sensors for providing a status assessment of various aspects to the device 2000.
  • sensor assembly 2014 can detect an open/closed state of device 2000, a relative positioning of components, such as the display and keypad of device 2000, and sensor component 2014 can also detect a change in position of a component of device 2000 or device 2000. The presence or absence of contact between the user and the device 2000, the device 2000 orientation or acceleration/deceleration and temperature change of device 2000.
  • the sensor assembly 2014 can include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
  • Sensor assembly 2014 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
  • the sensor assembly 2014 can also include an acceleration sensor, a gyro sensor, a magnetic sensor, a pressure sensor, a microwave sensor, or a temperature sensor.
  • Communication component 2016 is configured to facilitate wired or wireless communication between device 2000 and other devices.
  • the device 2000 can access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof.
  • the communication component 2016 receives broadcast signals or broadcast associated information from an external broadcast management system via a broadcast channel.
  • the communication component 2016 also includes a near field communication (NFC) module to facilitate short range communication.
  • NFC near field communication
  • the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
  • RFID radio frequency identification
  • IrDA infrared data association
  • UWB ultra-wideband
  • Bluetooth Bluetooth
  • device 2000 may be implemented by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable A gate array (FPGA), controller, microcontroller, microprocessor, or other electronic component implementation for performing the above methods.
  • ASICs application specific integrated circuits
  • DSPs digital signal processors
  • DSPDs digital signal processing devices
  • PLDs programmable logic devices
  • FPGA field programmable A gate array
  • controller microcontroller, microprocessor, or other electronic component implementation for performing the above methods.
  • non-transitory computer readable storage medium comprising instructions, such as a memory 2004 comprising instructions executable by processor 2020 of apparatus 2000 to perform the above method.
  • the non-transitory computer readable storage medium may be a ROM, a random access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, and an optical data storage device.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Multimedia (AREA)
  • Studio Devices (AREA)
  • Telephonic Communication Services (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

本公开是关于访问智能摄像头的方法及装置,所述方法包括:检测用于访问第一智能摄像头的访问媒介;在检测到所述访问媒介为本地局域网时,生成对应的第一访问请求,所述第一访问请求携带有访问密码;将所述第一访问请求发送至所述第一智能摄像头,以使所述第一智能摄像头在对所述第一访问请求中的访问密码验证通过后接受访问。因此,本公开实现了终端与第一智能摄像头处于同一局域网但无法接入互联网时,采用本地设备访问鉴权机制也能访问第一智能摄像头,提高了访问智能摄像头的安全性,还满足了用户访问智能摄像头的个性化需求,提高了用户体验。

Description

访问智能摄像头的方法及装置
相关申请的交叉引用
本申请基于申请号为201610158947.4、申请日为2016年03月18日的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此引入本申请作为参考。
技术领域
本公开涉及网络通信技术领域,尤其涉及访问智能摄像头的方法及装置。
背景技术
随着网络通信技术的不断发展,用于视频监控的智能摄像头也得到了广泛应用。相关技术中,用户可以通过互联网随时访问智能摄像头,便于用户及时进行视频监控。但是,用户终端无法接入互联网时,就不能访问智能摄像头了,提高了用户访问智能摄像头的难度。
发明内容
为克服相关技术中存在的问题,本公开提供了访问智能摄像头的方法及装置。
根据本公开实施例的第一方面,提供一种访问智能摄像头的方法,所述方法包括:检测用于访问第一智能摄像头的访问媒介;
在检测到所述访问媒介为本地局域网时,生成对应的第一访问请求,所述第一访问请求携带有访问密码;
将所述第一访问请求发送至所述第一智能摄像头,以使所述第一智能摄像头在对所述第一访问请求中的访问密码验证通过后接受访问。
可选的,所述生成对应的第一访问请求,所述第一访问请求携带有访问密码,包括:
获取访问密码;
将所述访问密码添加到所述第一访问请求中。
可选的,所述访问密码为用户输入的访问密码;所述获取访问密码包括:
输出访问密码输入界面;
接收用户针对所述密码输入界面输入的访问密码。
可选的,所述方法还包括:
在访问所述第一智能摄像头之前,设置与所述第一智能摄像头之间的约定密码;
将所述约定密码发送在至所述第一智能摄像头,以使所述第一智能摄像头保存所述约定密码,并在判定所述约定密码与所述第一访问请求中用户输入的访问密码相同后接受访问。
可选的,所述访问密码为服务器下发的令牌密码;所述获取访问密码包括:
获取服务器下发的令牌密码;
将所述令牌密码确定为所述访问密码。
可选的,所述方法还包括:
接收服务器下发的令牌密码和所述令牌密码的有效期,所述令牌密码是所述服务器接收到所述第一智能摄像头发送的密码获取请求后随机生成的,并由所述服务器将所述令牌密码同时下发至终端和第一智能摄像头;或者,所述令牌密码是所述服务器定期生成的,并由所述服务器将所述令牌密码同时下发至终端和第一智能摄像头。
可选的,所述将所述令牌密码确定为所述访问密码,包括:
判断所述令牌密码的有效期是否到期;
若所述令牌密码的有效期没有到期,则将所述令牌密码确定为所述访问密码。
根据本公开实施例的第二方面,提供一种访问智能摄像头的方法,所述方法包括:
通过本地局域网接收终端发送的第一访问请求,所述第一访问请求携带有访问密码;
对所述访问密码进行验证;
若所述验证通过后接受所述终端的访问。
可选的,所述对所述访问密码进行验证,包括:
判断所述访问密码与本地保存的约定密码是否相同;
若所述访问密码和所述约定密码相同,则确定所述访问密码通过验证。
可选的,所述方法还包括:
接收所述终端发送的所述约定密码,所述约定密码是所述终端与第一智能摄像头之间的约定密码。
可选的,所述对所述访问密码进行验证,包括:
判断所述访问密码与本地保存的令牌密码是否相同,所述令牌密码是服务器下发的密码;
若所述访问密码与所述令牌密码相同,则确定所述访问密码通过验证。
可选的,所述方法还包括:
向服务器发送密码获取请求,以使所述服务器根据所述密码获取请求随机生成令 牌密码,并将所述令牌密码同时下发至终端和第一智能摄像头;
接收所述服务器下发的令牌密码。
可选的,所述若所述访问密码与所述令牌密码相同,则确定所述访问密码通过验证,包括:
若所述访问密码与所述令牌密码相同,则判断所述令牌密码的有效期是否到期;
若所述令牌密码的有效期没有到期,则确定所述访问密码通过验证。
根据本公开实施例的第三方面,提供一种访问智能摄像头的装置,所述装置包括:
检测模块,被配置为检测用于访问第一智能摄像头的访问媒介;
第一访问请求生成模块,被配置为在检测到所述访问媒介为本地局域网时,生成对应的第一访问请求,所述第一访问请求携带有访问密码;
第一发送模块,被配置为将所述第一访问请求发送至所述第一智能摄像头,以使所述第一智能摄像头在对所述第一访问请求中的访问密码验证通过后接受访问。
可选的,所述第一访问请求生成模块包括:
第一获取子模块,被配置为获取访问密码;
添加子模块,被配置为将所述访问密码添加到所述第一访问请求中。
可选的,所述访问密码为用户输入的访问密码;所述第一获取子模块包括:
输出子模块,被配置为输出访问密码输入界面;
接收子模块,被配置为接收用户针对所述密码输入界面输入的访问密码。
可选的,所述装置还包括:
第一设置模块,被配置为在访问所述第一智能摄像头之前,设置与所述第一智能摄像头之间的约定密码;
第二发送模块,被配置为将所述约定密码发送在至所述第一智能摄像头,以使所述第一智能摄像头保存所述约定密码,并在判定所述约定密码与所述第一访问请求中用户输入的访问密码相同后接受访问。
可选的,所述访问密码为服务器下发的令牌密码;所述第一获取子模块包括:
第二获取子模块,被配置为获取服务器下发的令牌密码;
第一确定子模块,被配置为将所述令牌密码确定为所述访问密码。
可选的,所述装置还包括:
接收模块,被配置为接收服务器下发的令牌密码和所述令牌密码的有效期,所述令牌密码是所述服务器接收到所述第一智能摄像头发送的密码获取请求后随机生成的,并由所述服务器将所述令牌密码同时下发至终端和第一智能摄像头;或者,所述令牌密码是所述服务器定期生成的,并由所述服务器将所述令牌密码同时下发至终端 和第一智能摄像头。
可选的,所述第一确定子模块包括:
判断子模块,被配置为判断所述令牌密码的有效期是否到期;
第二确定子模块,被配置为若所述令牌密码的有效期没有到期,则将所述令牌密码确定为所述访问密码。
根据本公开实施例的第四方面,提供一种访问智能摄像头的装置,所述装置包括:
第一接收模块,被配置为通过本地局域网接收终端发送的第一访问请求,所述第一访问请求携带有访问密码;
验证模块,被配置为对所述访问密码进行验证;
第一接受模块,被配置为若所述验证通过后接受所述终端的访问。
可选的,所述验证模块包括:
第一判断子模块,被配置为判断所述访问密码与本地保存的约定密码是否相同;
第一确定子模块,被配置为若所述访问密码和所述约定密码相同,则确定所述访问密码通过验证。
可选的,所述装置还包括:
第二接收模块,被配置为接收所述终端发送的所述约定密码,所述约定密码是所述终端与第一智能摄像头之间的约定密码。
可选的,所述验证模块包括:
第二判断子模块,被配置为判断所述访问密码与本地保存的令牌密码是否相同,所述令牌密码是服务器下发的密码;
第二确定子模块,被配置为若所述访问密码与所述令牌密码相同,则确定所述访问密码通过验证。
可选的,所述装置还包括:
发送模块,被配置为向服务器发送密码获取请求,以使所述服务器根据所述密码获取请求随机生成令牌密码,并将所述令牌密码同时下发至终端和第一智能摄像头;
第三接收模块,被配置为接收所述服务器下发的令牌密码和所述令牌密码的有效期。
可选的,所述第二确定子模块,包括:
判断子模块,被配置为若所述访问密码与所述令牌密码相同,则判断所述令牌密码的有效期是否到期;
第三确定子模块,被配置为若所述令牌密码的有效期没有到期,则确定所述访问密码通过验证。
根据本公开实施例的第五方面,提供一种访问智能摄像头的装置,所述装置包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
检测用于访问第一智能摄像头的访问媒介;
在检测到所述访问媒介为本地局域网时,生成对应的第一访问请求,所述第一访问请求携带有访问密码;
将所述第一访问请求发送至所述第一智能摄像头,以使所述第一智能摄像头在对所述第一访问请求中的访问密码验证通过后接受访问。
根据本公开实施例的第六方面,提供一种访问智能摄像头的装置,所述装置包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
通过本地局域网接收终端发送的第一访问请求,所述第一访问请求携带有访问密码;
对所述访问密码进行验证;
若所述验证通过后接受所述终端的访问。
本公开的实施例提供的技术方案可以包括以下有益效果:
本公开中终端可以通过检测用于访问第一智能摄像头的访问媒介,在检测到访问媒介为本地局域网时,生成对应的第一访问请求,该第一访问请求携带有访问密码,将第一访问请求发送至第一智能摄像头,以使第一智能摄像头在对第一访问请求中的访问密码验证通过后接受访问,从而实现了终端与第一智能摄像头处于同一局域网但无法接入互联网时,采用本地设备访问鉴权机制也能访问第一智能摄像头,提高了访问智能摄像头的安全性,还满足了用户访问智能摄像头的个性化需求,提高了用户体验。
本公开中终端还可以采用多种方式获取访问密码,并将获取到的访问密码添加到第一访问请求中,用于第一智能摄像头进行安全验证,其中,访问密码可以是终端提前设置的密码,也可以是用户输入的密码,还可以是服务器下发的密码,扩大了访问密码的来源范围,从而提高了访问智能摄像头的效率和实用性。
本公开中终端还可以通过检测用于访问第一智能摄像头的访问媒介,在检测到访问媒介为本地局域网时,获取服务器下发的令牌密码,判断令牌密码的有效期是否到期,若该令牌密码的有效期没有到期,则将该令牌密码确定为访问密码,并将该访问 密码添加到第一访问请求中,并将第一访问请求发送至第一智能摄像头,使得终端在令牌密码的有效期到期后,无法通过本地局域网访问第一智能摄像头,只能等待服务器下发另一有效的令牌密码,从而提高了访问智能摄像头的安全性和可靠性。。
本公开中第一智能摄像头可以通过本地局域网接收终端发送的第一访问请求,该第一访问请求携带有访问密码,对访问密码进行验证,若验证通过后接受终端的访问,从而实现了第一智能摄像头与终端处于同一局域网但无法接入互联网时,利用本地设备访问鉴权机制也能完成对第一访问请求的验证,提高了访问智能摄像头的安全性,还满足了用户访问智能摄像头的个性化需求,提高了用户体验。
本公开中第一智能摄像头还可以通过本地局域网接收终端发送的第一访问请求,该第一访问请求携带有访问密码,判断访问密码与本地保存的令牌密码是否相同,该令牌密码是服务器下发的密码,若访问密码与令牌密码相同,则判断令牌密码的有效期是否到期,若令牌密码的有效期没有到期,则确定访问密码通过验证,接受终端的访问,使得第一智能摄像头在令牌密码的有效期到期后,无法接受第一智能摄像头的访问,从而提高了访问智能摄像头的安全性和可靠性。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开。
附图说明
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本公开的实施例,并与说明书一起用于解释本公开的原理。
图1是本公开根据一示例性实施例示出的一种访问智能摄像头的方法流程图;
图2是本公开根据一示例性实施例示出的另一种访问智能摄像头的方法流程图;
图3是本公开根据一示例性实施例示出的另一种访问智能摄像头的方法流程图;
图4是本公开根据一示例性实施例示出的一种访问智能摄像头的方法流程图;
图5是本公开根据一示例性实施例示出的另一种访问智能摄像头的方法流程图;
图6是本公开根据一示例性实施例示出的一种访问智能摄像头的方法的应用场景图;
图7是本公开根据一示例性实施例示出的一种访问智能摄像头的装置的框图;
图8是本公开根据一示例性实施例示出的另一种访问智能摄像头的装置的框图;
图9是本公开根据一示例性实施例示出的另一种访问智能摄像头的装置的框图;
图10是本公开根据一示例性实施例示出的另一种访问智能摄像头的装置的框图;
图11是本公开根据一示例性实施例示出的另一种访问智能摄像头的装置的框图;
图12是本公开根据一示例性实施例示出的另一种访问智能摄像头的装置的框图;
图13是本公开根据一示例性实施例示出的另一种访问智能摄像头的装置的框图;
图14是本公开根据一示例性实施例示出的一种访问智能摄像头的装置的框图;
图15是本公开根据一示例性实施例示出的另一种访问智能摄像头的装置的框图;
图16是本公开根据一示例性实施例示出的另一种访问智能摄像头的装置的框图;
图17是本公开根据一示例性实施例示出的另一种访问智能摄像头的装置的框图;
图18是本公开根据一示例性实施例示出的另一种访问智能摄像头的装置的框图;
图19是本公开根据一示例性实施例示出的另一种访问智能摄像头的装置的框图;
图20是本公开根据一示例性实施例示出的一种用于访问智能摄像头的装置的一结构示意图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本公开相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本公开的一些方面相一致的装置和方法的例子。
在本公开使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本公开。在本公开和所附权利要求书中所使用的单数形式的“一种”、“所述”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。
应当理解,尽管在本公开可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本公开范围的情况下,第一信息也可以被称为第二信息,类似地,第二信息也可以被称为第一信息。取决于语境,如在此所使用的词语“如果”可以被解释成为“在……时”或“当……时”或“响应于确定”。
如图1所示,图1是本公开根据一示例性实施例示出的一种访问智能摄像头的方法流程图,该方法可以用于终端中,包括以下步骤:
在步骤110中,检测用于访问第一智能摄像头的访问媒介。
本公开中的终端可以是任何具有上网功能的智能终端,例如,可以具体为手机、平板电脑、个人数字助理(Personal Digital Assistant,PDA)等。其中,终端可以通过无线局域网接入路由器,并通过路由器访问公网上的服务器。
本公开中的访问媒介可以是互联网,也可以是本地局域网。
本公开实施例中,终端访问第一智能摄像头,其目的是对第一智能摄像头采集到的视频进行监控,或者对第一智能摄像头各种性能进行调控。
在步骤120中,在检测到访问媒介为本地局域网时,生成对应的第一访问请求,该第一访问请求携带有访问密码。
本公开实施例中,提供了一种安全的本地设备访问鉴权机制,并用于终端和第一智能摄像头处于同一局域网下但又无法接入互联网时。在这种本地设备访问鉴权机制中,终端和第一智能摄像头可以采用密码验证的方式进行鉴权。故此,终端向第一智能摄像头发送访问请求时,需要携带有访问密码。
在步骤130中,将第一访问请求发送至第一智能摄像头,以使第一智能摄像头在对第一访问请求中的访问密码验证通过后接受访问。
由上述实施例可见,通过检测用于访问第一智能摄像头的访问媒介,在检测到访问媒介为本地局域网时,生成对应的第一访问请求,该第一访问请求携带有访问密码,将第一访问请求发送至第一智能摄像头,以使第一智能摄像头在对第一访问请求中的访问密码验证通过后接受访问,从而实现了终端与第一智能摄像头处于同一局域网但无法接入互联网时,采用本地设备访问鉴权机制也能访问第一智能摄像头,提高了访问智能摄像头的安全性,还满足了用户访问智能摄像头的个性化需求,提高了用户体验。
如图2所示,图2是本公开根据一示例性实施例示出的另一种访问智能摄像头的方法流程图,该方法可以用于终端中,并建立在图1所示方法的基础上,在执行步骤120中生成对应的第一访问请求,该第一访问请求携带有访问密码时,可以包括以下步骤:
在步骤210中,获取访问密码。
本公开实施例中,访问密码可以是终端提前设置的密码,也可以是用户输入的密码,还可以是服务器下发的密码。
至于获取访问密码的方式包括但不限于以下两种方式:
方式一:访问密码为用户输入的访问密码。其获取过程包括:
(1)输出访问密码输入界面。
(2)接收用户针对密码输入界面输入的访问密码。
另外,针对方式一,在访问第一智能摄像头之前,需要设置与第一智能摄像头之间的约定密码,并将该约定密码发送在至第一智能摄像头,以使第一智能摄像头保存该约定密码,并用于判定该约定密码与第一访问请求中用户输入的访问密码相同后接受访问。
本公开实施例中,在互联网状态下,终端可以提前将约定密码发送至第一智能摄像头,用于终端和第一智能摄像头处于同一局域网下但又无法接入互联网时使用。其中,该约定密码可以是用户指定密码。
方式二:访问密码为服务器下发的令牌密码(token)。其获取过程包括:
(1)获取服务器下发的令牌密码。
(2)将令牌密码确定为访问密码。另外,针对方式二,在互联网状态下,终端会接收服务器下发的令牌密码,并利用最新接收到的令牌密码更新已保存的令牌密码,以至于第一访问请求中携带的访问密码为最新接收到的令牌密码。其中,令牌密码可以是服务器根据第一智能摄像头的密码获取请求,随机生成的一段字符串,分别发送至第一智能摄像头和终端,用于第一智能摄像头和终端进行保存的,并且该令牌密码还有有效期。比如,令牌密码的有效期为一个小时,超过一个小时该令牌密码失效。
在步骤220中,将访问密码添加到第一访问请求中。
由上述实施例可见,可以采用多种方式获取访问密码,并将获取到的访问密码添加到第一访问请求中,用于第一智能摄像头进行安全验证,其中,访问密码可以是终端提前设置的密码,也可以是用户输入的密码,还可以是服务器下发的密码,扩大了访问密码的来源范围,从而提高了访问智能摄像头的效率和实用性。
如图3所示,图3是本公开根据一示例性实施例示出的另一种访问智能摄像头的方法流程图,该方法可以用于终端中,并建立在图1所示方法的基础上,可以包括以下步骤:
在步骤310中,检测用于访问第一智能摄像头的访问媒介。
在步骤320中,在检测到访问媒介为本地局域网时,获取服务器下发的令牌密码。
本公开实施例中,触发服务器下发令牌密码的方式包括但不限于以下两种方式:
方式一:第一智能摄像头可以定期向服务器发送密码获取请求,当服务器接收到第一智能摄像头发送的密码获取请求后,会随机生成一段字符串作为令牌密码,并将该令牌密码同时下发至终端和第一智能摄像头。
比如:第一智能摄像头每隔一个小时向服务器发送一次密码获取请求。
方式二:服务器还可以定期生成令牌密码,并将该令牌密码同时下发至终端和第一智能摄像头。
比如:服务器每隔一个小时向终端和第一智能摄像头下发一次令牌密码,且令牌密码的有效期为一个小时。
故此,终端接收到的令牌密码,该令牌密码可能是服务器接收到第一智能摄像头发送的密码获取请求后随机生成的,并由服务器将令牌密码同时下发至终端和第一智 能摄像头;或者,该令牌密码还可能是服务器定期生成的,并由服务器将所述令牌密码同时下发至终端和第一智能摄像头。
并且,服务器将令牌密码同时下发至终端和第一智能摄像头,其目的是让终端接收到令牌密码后,用于在访问第一智能摄像头时可以利用该令牌密码作为访问密码。
另外,终端接收到服务器下发的令牌密码后,还可以接收到服务器下发的该令牌密码的有效期。
在步骤330中,判断令牌密码的有效期是否到期。
在步骤340中,若该令牌密码的有效期没有到期,则将该令牌密码确定为访问密码,并将该访问密码添加到第一访问请求中。
本公开实施例中,若该令牌密码的有效期没有到期,表明该令牌密码还有效,可以将该令牌密码确定为访问密码;若该令牌密码的有效期已经到期,表明该令牌密码已经失效,不能将该令牌密码确定为访问密码。
比如:服务器下发的令牌密码的有效期为1个小时,若在有效期内访问第一智能摄像头,则可以将该令牌密码作为访问密码;若超过有效期,则终端无法通过本地局域网访问第一智能摄像头,只能等待接入互联网后获取新的令牌密码。
在步骤350中,将第一访问请求发送至第一智能摄像头,以使第一智能摄像头在对第一访问请求中的访问密码验证通过后接受访问。
由上述实施例可见,通过检测用于访问第一智能摄像头的访问媒介,在检测到访问媒介为本地局域网时,获取服务器下发的令牌密码,判断令牌密码的有效期是否到期,若该令牌密码的有效期没有到期,则将该令牌密码确定为访问密码,并将该访问密码添加到第一访问请求中,并将第一访问请求发送至第一智能摄像头,使得终端在令牌密码的有效期到期后,无法通过本地局域网访问第一智能摄像头,只能等待服务器下发另一有效的令牌密码,从而提高了访问智能摄像头的安全性和可靠性。
如图4所示,图4本公开根据一示例性实施例示出的一种访问智能摄像头的方法流程图,该方法可以用于第一智能摄像头中,该第一智能摄像头为待访问的智能摄像头,可以包括以下步骤:
在步骤410中,通过本地局域网接收终端发送的第一访问请求,该第一访问请求携带有访问密码。其中,访问密码可能是终端提前设置的密码,也可能是用户输入的密码,还可能是服务器下发的密码。
在步骤420中,对访问密码进行验证。
至于验证访问密码的方式包括但不限于以下两种方式:
方式一:访问密码可能为终端提前设置的密码,也可能是用户输入的密码。其验 证过程包括:
(1)判断访问密码与本地保存的约定密码是否相同。
(2)若访问密码和所述约定密码相同,则确定访问密码通过验证。
另外,针对方式一,第一智能摄像头会提前接收到终端发送的约定密码,该约定密码是终端与第一智能摄像头之间的约定密码,并且该约定密码可能是终端根据实际情况设置的,也可能是用户指定的。
方式二:访问密码是服务器下发的密码。其验证过程包括:
(1)判断访问密码与本地保存的令牌密码是否相同,该令牌密码是服务器下发的密码。
(2)若访问密码与令牌密码相同,则确定该访问密码通过验证。
另外,针对方式二,第一智能摄像头会向服务器发送密码获取请求,并接收并保存服务器下发的令牌密码,并且保存时会利用最新接收到的令牌密码更新已保存的令牌密码。其中,令牌密码可以是服务器根据第一智能摄像头的密码获取请求,随机生成的一段字符串,分别发送至第一智能摄像头和终端,用于第一智能摄像头和终端进行保存的,并且该令牌密码还有有效期。比如,令牌密码的有效期为一个小时,超过一个小时该令牌密码失效。
在步骤430中,若验证通过后接受终端的访问。
由上述实施例可见,通过本地局域网接收终端发送的第一访问请求,该第一访问请求携带有访问密码,对访问密码进行验证,若验证通过后接受终端的访问,从而实现了第一智能摄像头与终端处于同一局域网但无法接入互联网时,利用本地设备访问鉴权机制也能完成对第一访问请求的验证,提高了访问智能摄像头的安全性,还满足了用户访问智能摄像头的个性化需求,提高了用户体验。
如图5所示,图5是本公开根据一示例性实施例示出的另一种访问智能摄像头的方法流程图,该方法可以用于第一智能摄像头中,并建立在图4所示方法的基础上,可以包括以下步骤:
在步骤510中,通过本地局域网接收终端发送的第一访问请求,该第一访问请求携带有访问密码。
在步骤520中,判断访问密码与本地保存的令牌密码是否相同,该令牌密码是服务器下发的密码。若访问密码与令牌密码相同,则执行步骤530;若访问密码与令牌密码不同,则执行步骤560。
本公开实施例中,触发服务器下发令牌密码的方式包括但不限于以下两种方式:
方式一:第一智能摄像头可以定期向服务器发送密码获取请求,当服务器接收到 第一智能摄像头发送的密码获取请求后,会随机生成一段字符串作为令牌密码,并将该令牌密码同时下发至终端和第一智能摄像头。
比如:第一智能摄像头每隔一个小时向服务器发送一次密码获取请求。
方式二:服务器还可以定期生成令牌密码,并将该令牌密码同时下发至终端和第一智能摄像头。
比如:服务器每隔一个小时向终端和第一智能摄像头下发一次令牌密码,且令牌密码的有效期为一个小时。
故此,终端接收到的令牌密码,该令牌密码可能是服务器接收到第一智能摄像头发送的密码获取请求后随机生成的,并由服务器将令牌密码同时下发至终端和第一智能摄像头;或者,该令牌密码还可能是服务器定期生成的,并由服务器将所述令牌密码同时下发至终端和第一智能摄像头。
并且,服务器将令牌密码同时下发至终端和第一智能摄像头,其目的是让第一智能摄像头接收到令牌密码后,用于在接收到终端的访问请求时利用该令牌密码对访问请求中的访问密码进行验证。
另外,终端接收到服务器下发的令牌密码后,还可以接收到服务器下发的该令牌密码的有效期。
在步骤530中,判断令牌密码的有效期是否到期。若令牌密码的有效期没有到期,则执行步骤540;若令牌密码的有效期已经到期,,则执行步骤560。
在步骤540中,确定访问密码通过验证。
本公开实施例中,若该令牌密码的有效期没有到期,表明该令牌密码还有效,可以用于验证;若该令牌密码的有效期已经到期,表明该令牌密码已经失效,不能用于验证。
在步骤550中,接受终端的访问,流程结束。
在步骤560中,拒绝终端的访问,流程结束。
由上述实施例可见,通过本地局域网接收终端发送的第一访问请求,该第一访问请求携带有访问密码,判断访问密码与本地保存的令牌密码是否相同,该令牌密码是服务器下发的密码,若访问密码与令牌密码相同,则判断令牌密码的有效期是否到期,若令牌密码的有效期没有到期,则确定访问密码通过验证,接受终端的访问,使得第一智能摄像头在令牌密码的有效期到期后,无法接受第一智能摄像头的访问,从而提高了访问智能摄像头的安全性和可靠性。
如图6所示,图6是本公开根据一示例性实施例示出的一种访问智能摄像头的方法的应用场景图。该应用场景包括作为终端的智能手机、第一智能摄像头和服务器。
当用户需要利用智能手机访问第一智能摄像头时,智能手机会检测用于访问第一智能摄像头的访问媒介:
智能手机在检测到访问媒介为本地局域网时,生成对应的第一访问请求,该第一访问请求携带有访问密码,并将该第一访问请求通过本地局域网发送至第一智能摄像头。相应地,第一智能摄像头通过本地局域网接收终端发送的第一访问请求后,会对第一访问请求中的访问密码进行验证,若验证通过后接受所述终端的访问。
其中,访问密码可以为用户输入的访问密码,还可以是为服务器下发的令牌密码。
在图6所示应用场景中,实现访问智能摄像头的具体过程可以参见前述对图1至图5中的描述,在此不再赘述。
与前述访问智能摄像头的方法实施例相对应,本公开还提供了访问智能摄像头的装置的实施例。
如图7所示,图7是本公开根据一示例性实施例示出的一种访问智能摄像头的装置的框图,所述装置可以应用于终端上,并用于执行图1所示的访问智能摄像头的方法,所述装置可以包括:检测模块71、第一访问请求生成模块72和第一发送模块73。
其中,检测模块71,被配置为检测用于访问第一智能摄像头的访问媒介;
第一访问请求生成模块72,被配置为在检测到所述访问媒介为本地局域网时,生成对应的第一访问请求,所述第一访问请求携带有访问密码;
第一发送模块73,被配置为将所述第一访问请求发送至所述第一智能摄像头,以使所述第一智能摄像头在对所述第一访问请求中的访问密码验证通过后接受访问。
由上述实施例可见,通过检测用于访问第一智能摄像头的访问媒介,在检测到访问媒介为本地局域网时,生成对应的第一访问请求,该第一访问请求携带有访问密码,将第一访问请求发送至第一智能摄像头,以使第一智能摄像头在对第一访问请求中的访问密码验证通过后接受访问,从而实现了终端与第一智能摄像头处于同一局域网但无法接入互联网时,采用本地设备访问鉴权机制也能访问第一智能摄像头,提高了访问智能摄像头的安全性,还满足了用户访问智能摄像头的个性化需求,提高了用户体验。
如图8所示,图8是本公开根据一示例性实施例示出的另一种访问智能摄像头的装置的框图,该实施例在前述图7所示实施例的基础上,所述第一访问请求生成模块72可以包括:第一获取子模块81和添加子模块82。
其中,第一获取子模块81,被配置为获取访问密码;
添加子模块82,被配置为将所述访问密码添加到所述第一访问请求中。
如图9所示,图9是本公开根据一示例性实施例示出的另一种访问智能摄像头的 装置的框图,该实施例在前述图8所示实施例的基础上,访问密码为用户输入的访问密码,所述第一获取子模块81可以包括:输出子模块91和接收子模块92。
其中,输出子模块91,被配置为输出访问密码输入界面;
接收子模块92,被配置为接收用户针对所述密码输入界面输入的访问密码。
如图10所示,图10是本公开根据一示例性实施例示出的另一种访问智能摄像头的装置的框图,该实施例在前述图9所示实施例的基础上,该装置还可以包括:第一设置模块101和第二发送模块102。
其中,第一设置模块101,被配置为在访问所述第一智能摄像头之前,设置与所述第一智能摄像头之间的约定密码;
第二发送模块102,被配置为将所述约定密码发送在至所述第一智能摄像头,以使所述第一智能摄像头保存所述约定密码,并在判定所述约定密码与所述第一访问请求中用户输入的访问密码相同后接受访问。
如图11所示,图11是本公开根据一示例性实施例示出的另一种访问智能摄像头的装置的框图,该实施例在前述图8所示实施例的基础上,访问密码为服务器下发的令牌密码,所述第一获取子模块81可以包括:第二获取子模块111和确定子模块112。
其中,第二获取子模块111,被配置为获取服务器下发的令牌密码;
第一确定子模块112,被配置为将所述令牌密码确定为所述访问密码。
由上述实施例可见,可以采用多种方式获取访问密码,并将获取到的访问密码添加到第一访问请求中,用于第一智能摄像头进行安全验证,其中,访问密码可以是终端提前设置的密码,也可以是用户输入的密码,还可以是服务器下发的密码,扩大了访问密码的来源范围,从而提高了访问智能摄像头的效率和实用性。
如图12所示,图12是本公开根据一示例性实施例示出的另一种访问智能摄像头的装置的框图,该实施例在前述图11所示实施例的基础上,该装置还可以包括:接收模块121。
其中,接收模块121,被配置为接收服务器下发的令牌密码和所述令牌密码的有效期,所述令牌密码是所述服务器接收到所述第一智能摄像头发送的密码获取请求后随机生成的,并由所述服务器将所述令牌密码同时下发至终端和第一智能摄像头;或者,所述令牌密码是所述服务器定期生成的,并由所述服务器将所述令牌密码同时下发至终端和第一智能摄像头。
由上述实施例可见,在检测到访问媒介包括互联网时,生成对应的第二访问请求,该第二访问请求携带有用户账号和第一智能摄像头的设备标识,将第二访问请求发送至服务器,以使服务器在判定第二访问请求中的用户账号和第一智能摄像头的设备标 识为绑定关系后,将第二访问请求转发至第一智能摄像头,从而实现了终端在能够接入互联网时,优先采用服务器鉴权机制,这样可以进一步提高访问智能摄像头的速率。
如图13所示,图13是本公开根据一示例性实施例示出的另一种访问智能摄像头的装置的框图,该实施例在前述图12所示实施例的基础上,所述第一确定子模块112可以包括:判断子模块131和第二确定子模块132。
其中,判断子模块131,被配置为判断所述令牌密码的有效期是否到期;
第二确定子模块132,被配置为若所述令牌密码的有效期没有到期,则将所述令牌密码确定为所述访问密码。
由上述实施例可见,在令牌密码的有效期到期后,无法通过本地局域网访问第一智能摄像头,只能等待服务器下发另一有效的令牌密码,从而提高了访问智能摄像头的安全性和可靠性。
如图14所示,图14是本公开根据一示例性实施例示出的一种访问智能摄像头的装置的框图,所述装置可以应用于第一智能摄像头上,该第一智能摄像头为待访问的智能摄像头,并用于执行图4所示的访问智能摄像头的方法,所述装置可以包括:第一接收模块141、验证模块142和第一接受模块143。
其中,第一接收模块141,被配置为通过本地局域网接收终端发送的第一访问请求,所述第一访问请求携带有访问密码;
验证模块142,被配置为对所述访问密码进行验证;
第一接受模块143,被配置为若所述验证通过后接受所述终端的访问。
由上述实施例可见,通过本地局域网接收终端发送的第一访问请求,该第一访问请求携带有访问密码,对访问密码进行验证,若验证通过后接受终端的访问,从而实现了第一智能摄像头与终端处于同一局域网但无法接入互联网时,利用本地设备访问鉴权机制也能完成对第一访问请求的验证,提高了访问智能摄像头的安全性,还满足了用户访问智能摄像头的个性化需求,提高了用户体验。
如图15所示,图15是本公开根据一示例性实施例示出的另一种访问智能摄像头的装置的框图,该实施例在前述图14所示实施例的基础上,所述验证模块142可以包括:第一判断子模块151和第一确定子模块152。
其中,第一判断子模块151,被配置为判断所述访问密码与本地保存的约定密码是否相同;
第一确定子模块152,被配置为若所述访问密码和所述约定密码相同,则确定所述访问密码通过验证。
如图16所示,图16是本公开根据一示例性实施例示出的另一种访问智能摄像头 的装置的框图,该实施例在前述图15所示实施例的基础上,所述装置还可以包括:第二接收模块161。
其中,第二接收模块161,被配置为接收所述终端发送的所述约定密码,所述约定密码是所述终端与第一智能摄像头之间的约定密码。
如图17所示,图17是本公开根据一示例性实施例示出的另一种访问智能摄像头的装置的框图,该实施例在前述图14所示实施例的基础上,所述验证模块142可以包括:第二判断子模块171和第二确定子模块172。
其中,第二判断子模块171,被配置为判断所述访问密码与本地保存的令牌密码是否相同,所述令牌密码是服务器下发的密码;
第二确定子模块172,被配置为若所述访问密码与所述令牌密码相同,则确定所述访问密码通过验证。
如图18所示,图18是本公开根据一示例性实施例示出的另一种访问智能摄像头的装置的框图,该实施例在前述图17所示实施例的基础上,所述装置还可以包括:发送模块181和第三接收模块182。
其中,发送模块181,被配置为向服务器发送密码获取请求,以使所述服务器根据所述密码获取请求随机生成令牌密码,并将所述令牌密码同时下发至终端和第一智能摄像头;
第三接收模块182,被配置为接收所述服务器下发的令牌密码和所述令牌密码的有效期。
如图19所示,图19是本公开根据一示例性实施例示出的另一种访问智能摄像头的装置的框图,该实施例在前述图18所示实施例的基础上,所述第二确定子模块172可以包括:判断子模块191和第三确定子模块192。
其中,判断子模块191,被配置为若所述访问密码与所述令牌密码相同,则判断所述令牌密码的有效期是否到期;
第三确定子模块192,被配置为若所述令牌密码的有效期没有到期,则确定所述访问密码通过验证。
由上述实施例可见,在令牌密码的有效期到期后,无法接受第一智能摄像头的访问,从而提高了访问智能摄像头的安全性和可靠性。
与图7相应的,本公开还提供另一种访问智能摄像头的装置,所述装置可以应用于终端上,包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
检测用于访问第一智能摄像头的访问媒介;
在检测到所述访问媒介为本地局域网时,生成对应的第一访问请求,所述第一访问请求携带有访问密码;
将所述第一访问请求发送至所述第一智能摄像头,以使所述第一智能摄像头在对所述第一访问请求中的访问密码验证通过后接受访问。
与图14相应的,本公开还提供另一种访问智能摄像头的装置,所述装置可以应用于第一智能摄像头上,包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
通过本地局域网接收终端发送的第一访问请求,所述第一访问请求携带有访问密码;
对所述访问密码进行验证;
若所述验证通过后接受所述终端的访问。
上述装置中各个单元的功能和作用的实现过程具体详见上述方法中对应步骤的实现过程,在此不再赘述。
对于装置实施例而言,由于其基本对应于方法实施例,所以相关之处参见方法实施例的部分说明即可。以上所描述的装置实施例仅仅是示意性的,其中所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本公开方案的目的。本领域普通技术人员在不付出创造性劳动的情况下,即可以理解并实施。
如图20所示,图20是本公开根据一示例性实施例示出的一种用于访问智能摄像头的装置2000的一结构示意图(终端侧)。例如,装置2000可以是具有路由功能的移动电话,计算机,数字广播终端,消息收发设备,游戏控制台,平板设备,医疗设备,健身设备,个人数字助理等。
参照图20,装置2000可以包括以下一个或多个组件:处理组件2002,存储器2004,电源组件2006,多媒体组件2008,音频组件2010,输入/输出(I/O)的接口2012,传感器组件2014,以及通信组件2016。
处理组件2002通常控制装置2000的整体操作,诸如与显示,电话呼叫,数据通信,相机操作和记录操作相关联的操作。处理组件2002可以包括一个或多个处理器 2020来执行指令,以完成上述的方法的全部或部分步骤。此外,处理组件2002可以包括一个或多个模块,便于处理组件2002和其他组件之间的交互。例如,处理组件2002可以包括多媒体模块,以方便多媒体组件2008和处理组件2002之间的交互。
存储器2004被配置为存储各种类型的数据以支持在装置2000的操作。这些数据的示例包括用于在装置2000上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器2004可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。
电源组件2006为装置2000的各种组件提供电力。电源组件2006可以包括电源管理系统,一个或多个电源,及其他与为装置2000生成、管理和分配电力相关联的组件。
多媒体组件2008包括在所述装置2000和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。所述触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与所述触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件2008包括一个前置摄像头和/或后置摄像头。当装置2000处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜系统或具有焦距和光学变焦能力。
音频组件2010被配置为输出和/或输入音频信号。例如,音频组件2010包括一个麦克风(MIC),当装置2000处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器2004或经由通信组件2016发送。在一些实施例中,音频组件2010还包括一个扬声器,用于输出音频信号。
I/O接口2012为处理组件2002和外围接口模块之间提供接口,上述外围接口模块可以是键盘,点击轮,按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。
传感器组件2014包括一个或多个传感器,用于为装置2000提供各个方面的状态评估。例如,传感器组件2014可以检测到装置2000的打开/关闭状态,组件的相对定位,例如所述组件为装置2000的显示器和小键盘,传感器组件2014还可以检测装置2000或装置2000一个组件的位置改变,用户与装置2000接触的存在或不存在,装置 2000方位或加速/减速和装置2000的温度变化。传感器组件2014可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件2014还可以包括光传感器,如CMOS或CCD图像传感器,用于在成像应用中使用。在一些实施例中,该传感器组件2014还可以包括加速度传感器,陀螺仪传感器,磁传感器,压力传感器,微波传感器或温度传感器。
通信组件2016被配置为便于装置2000和其他设备之间有线或无线方式的通信。装置2000可以接入基于通信标准的无线网络,如WiFi,2G或3G,或它们的组合。在一个示例性实施例中,通信组件2016经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,所述通信组件2016还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其他技术来实现。
在示例性实施例中,装置2000可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述方法。
在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器2004,上述指令可由装置2000的处理器2020执行以完成上述方法。例如,所述非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。
本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本公开的其它实施方案。本公开旨在涵盖本公开的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本公开的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本公开的真正范围和精神由下面的权利要求指出。
应当理解的是,本公开并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本公开的范围仅由所附的权利要求来限制。

Claims (28)

  1. 一种访问智能摄像头的方法,其特征在于,所述方法包括:
    检测用于访问第一智能摄像头的访问媒介;
    在检测到所述访问媒介为本地局域网时,生成对应的第一访问请求,所述第一访问请求携带有访问密码;
    将所述第一访问请求发送至所述第一智能摄像头,以使所述第一智能摄像头在对所述第一访问请求中的访问密码验证通过后接受访问。
  2. 根据权利要求1所述的方法,其特征在于,所述生成对应的第一访问请求,所述第一访问请求携带有访问密码,包括:
    获取访问密码;
    将所述访问密码添加到所述第一访问请求中。
  3. 根据权利要求2所述的方法,其特征在于,所述访问密码为用户输入的访问密码;所述获取访问密码包括:
    输出访问密码输入界面;
    接收用户针对所述密码输入界面输入的访问密码。
  4. 根据权利要求3所述的方法,其特征在于,所述方法还包括:
    在访问所述第一智能摄像头之前,设置与所述第一智能摄像头之间的约定密码;
    将所述约定密码发送在至所述第一智能摄像头,以使所述第一智能摄像头保存所述约定密码,并在判定所述约定密码与所述第一访问请求中用户输入的访问密码相同后接受访问。
  5. 根据权利要求2所述的方法,其特征在于,所述访问密码为服务器下发的令牌密码;所述获取访问密码包括:
    获取服务器下发的令牌密码;
    将所述令牌密码确定为所述访问密码。
  6. 根据权利要求5所述的方法,其特征在于,所述方法还包括:
    接收服务器下发的令牌密码和所述令牌密码的有效期,所述令牌密码是所述服务器接收到所述第一智能摄像头发送的密码获取请求后随机生成的,并由所述服务器将所述令牌密码同时下发至终端和第一智能摄像头;或者,所述令牌密码是所述服务器定期生成的,并由所述服务器将所述令牌密码同时下发至终端和第一智能摄像头。
  7. 根据权利要求6所述的方法,其特征在于,所述将所述令牌密码确定为所述访问密码,包括:
    判断所述令牌密码的有效期是否到期;
    若所述令牌密码的有效期没有到期,则将所述令牌密码确定为所述访问密码。
  8. 一种访问智能摄像头的方法,其特征在于,所述方法包括:
    通过本地局域网接收终端发送的第一访问请求,所述第一访问请求携带有访问密码;
    对所述访问密码进行验证;
    若所述验证通过后接受所述终端的访问。
  9. 根据权利要求8所述的方法,其特征在于,所述对所述访问密码进行验证,包括:
    判断所述访问密码与本地保存的约定密码是否相同;
    若所述访问密码和所述约定密码相同,则确定所述访问密码通过验证。
  10. 根据权利要求9所述的方法,其特征在于,所述方法还包括:
    接收所述终端发送的所述约定密码,所述约定密码是所述终端与第一智能摄像头之间的约定密码。
  11. 根据权利要求8所述的方法,其特征在于,所述对所述访问密码进行验证,包括:
    判断所述访问密码与本地保存的令牌密码是否相同,所述令牌密码是服务器下发的密码;
    若所述访问密码与所述令牌密码相同,则确定所述访问密码通过验证。
  12. 根据权利要求11所述的方法,其特征在于,所述方法还包括:
    向服务器发送密码获取请求,以使所述服务器根据所述密码获取请求随机生成令牌密码,并将所述令牌密码同时下发至终端和第一智能摄像头;
    接收所述服务器下发的令牌密码和所述令牌密码的有效期。
  13. 根据权利要求12所述的方法,其特征在于,所述若所述访问密码与所述令牌密码相同,则确定所述访问密码通过验证,包括:
    若所述访问密码与所述令牌密码相同,则判断所述令牌密码的有效期是否到期;
    若所述令牌密码的有效期没有到期,则确定所述访问密码通过验证。
  14. 一种访问智能摄像头的装置,其特征在于,所述装置包括:
    检测模块,被配置为检测用于访问第一智能摄像头的访问媒介;
    第一访问请求生成模块,被配置为在检测到所述访问媒介为本地局域网时,生成对应的第一访问请求,所述第一访问请求携带有访问密码;
    第一发送模块,被配置为将所述第一访问请求发送至所述第一智能摄像头,以使所述第一智能摄像头在对所述第一访问请求中的访问密码验证通过后接受访问。
  15. 根据权利要求14所述的装置,其特征在于,所述第一访问请求生成模块包括:
    第一获取子模块,被配置为获取访问密码;
    添加子模块,被配置为将所述访问密码添加到所述第一访问请求中。
  16. 根据权利要求15所述的装置,其特征在于,所述访问密码为用户输入的访问密码;所述第一获取子模块包括:
    输出子模块,被配置为输出访问密码输入界面;
    接收子模块,被配置为接收用户针对所述密码输入界面输入的访问密码。
  17. 根据权利要求16所述的装置,其特征在于,所述装置还包括:
    第一设置模块,被配置为在访问所述第一智能摄像头之前,设置与所述第一智能摄像头之间的约定密码;
    第二发送模块,被配置为将所述约定密码发送在至所述第一智能摄像头,以使所述第一智能摄像头保存所述约定密码,并在判定所述约定密码与所述第一访问请求中用户输入的访问密码相同后接受访问。
  18. 根据权利要求15所述的装置,其特征在于,所述访问密码为服务器下发的令牌密码;所述第一获取子模块包括:
    第二获取子模块,被配置为获取服务器下发的令牌密码;
    第一确定子模块,被配置为将所述令牌密码确定为所述访问密码。
  19. 根据权利要求18所述的装置,其特征在于,所述装置还包括:
    接收模块,被配置为接收服务器下发的令牌密码和所述令牌密码的有效期,所述令牌密码是所述服务器接收到所述第一智能摄像头发送的密码获取请求后随机生成的,并由所述服务器将所述令牌密码同时下发至终端和第一智能摄像头;或者,所述令牌密码是所述服务器定期生成的,并由所述服务器将所述令牌密码同时下发至终端和第一智能摄像头。
  20. 根据权利要求19所述的装置,其特征在于,所述第一确定子模块包括:
    判断子模块,被配置为判断所述令牌密码的有效期是否到期;
    第二确定子模块,被配置为若所述令牌密码的有效期没有到期,则将所述令牌密码确定为所述访问密码。
  21. 一种访问智能摄像头的装置,其特征在于,所述装置包括:
    第一接收模块,被配置为通过本地局域网接收终端发送的第一访问请求,所述第一访问请求携带有访问密码;
    验证模块,被配置为对所述访问密码进行验证;
    第一接受模块,被配置为若所述验证通过后接受所述终端的访问。
  22. 根据权利要求21所述的装置,其特征在于,所述验证模块包括:
    第一判断子模块,被配置为判断所述访问密码与本地保存的约定密码是否相同;
    第一确定子模块,被配置为若所述访问密码和所述约定密码相同,则确定所述访问密码通过验证。
  23. 根据权利要求22所述的装置,其特征在于,所述装置还包括:
    第二接收模块,被配置为接收所述终端发送的所述约定密码,所述约定密码是所述终端与第一智能摄像头之间的约定密码。
  24. 根据权利要求21所述的装置,其特征在于,所述验证模块包括:
    第二判断子模块,被配置为判断所述访问密码与本地保存的令牌密码是否相同,所述令牌密码是服务器下发的密码;
    第二确定子模块,被配置为若所述访问密码与所述令牌密码相同,则确定所述访问密码通过验证。
  25. 根据权利要求24所述的装置,其特征在于,所述装置还包括:
    发送模块,被配置为向服务器发送密码获取请求,以使所述服务器根据所述密码获取请求随机生成令牌密码,并将所述令牌密码同时下发至终端和第一智能摄像头;
    第三接收模块,被配置为接收所述服务器下发的令牌密码和所述令牌密码的有效期。
  26. 根据权利要求25所述的装置,其特征在于,所述第二确定子模块,包括:
    判断子模块,被配置为若所述访问密码与所述令牌密码相同,则判断所述令牌密码的有效期是否到期;
    第三确定子模块,被配置为若所述令牌密码的有效期没有到期,则确定所述访问密码通过验证。
  27. 一种访问智能摄像头的装置,其特征在于,所述装置包括:
    处理器;
    用于存储处理器可执行指令的存储器;
    其中,所述处理器被配置为:
    检测用于访问第一智能摄像头的访问媒介;
    在检测到所述访问媒介为本地局域网时,生成对应的第一访问请求,所述第一访问请求携带有访问密码;
    将所述第一访问请求发送至所述第一智能摄像头,以使所述第一智能摄像头在对所述第一访问请求中的访问密码验证通过后接受访问。
  28. 一种访问智能摄像头的装置,其特征在于,所述装置包括:
    处理器;
    用于存储处理器可执行指令的存储器;
    其中,所述处理器被配置为:
    通过本地局域网接收终端发送的第一访问请求,所述第一访问请求携带有访问密码;
    对所述访问密码进行验证;
    若所述验证通过后接受所述终端的访问。
PCT/CN2016/092867 2016-03-18 2016-08-02 访问智能摄像头的方法及装置 WO2017156960A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
KR1020187030115A KR102044113B1 (ko) 2016-03-18 2016-08-02 스마트 카메라에 액세스하는 방법 및 장치
RU2017133782A RU2674311C1 (ru) 2016-03-18 2016-08-02 Способ и устройство для доступа к смарт-камере
JP2017544782A JP6580151B2 (ja) 2016-03-18 2016-08-02 スマートカメラにアクセスするための方法及び装置

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610158947.4 2016-03-18
CN201610158947.4A CN105847243B (zh) 2016-03-18 2016-03-18 访问智能摄像头的方法及装置

Publications (1)

Publication Number Publication Date
WO2017156960A1 true WO2017156960A1 (zh) 2017-09-21

Family

ID=56588194

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/092867 WO2017156960A1 (zh) 2016-03-18 2016-08-02 访问智能摄像头的方法及装置

Country Status (7)

Country Link
US (1) US10425403B2 (zh)
EP (1) EP3220602B1 (zh)
JP (1) JP6580151B2 (zh)
KR (1) KR102044113B1 (zh)
CN (1) CN105847243B (zh)
RU (1) RU2674311C1 (zh)
WO (1) WO2017156960A1 (zh)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10306129B1 (en) * 2016-06-28 2019-05-28 Amazon Technologies, Inc. Local and remote video-camera control
JP6910887B2 (ja) * 2016-09-26 2021-07-28 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカPanasonic Intellectual Property Corporation of America 撮影制御方法、撮影制御システム及び撮影制御サーバ
EP3382937B1 (en) * 2017-03-28 2022-05-18 Rohde & Schwarz GmbH & Co. KG Transmission device, system as well as method for transmitting monitoring information
CN109407528A (zh) * 2018-09-19 2019-03-01 北京小米移动软件有限公司 安全访问方法、装置、服务器及存储介质
CN111131528B (zh) * 2018-10-31 2022-07-05 杭州海康威视系统技术有限公司 一种设备网域确定方法、服务器及终端
US11412382B2 (en) 2019-11-07 2022-08-09 Humans, Inc Mobile application camera activation and de-activation based on physical object location
CN111147740B (zh) * 2019-12-27 2021-07-13 青岛海信智慧家居系统股份有限公司 一种控制智能摄像头的方法及装置
CN113489628A (zh) * 2020-05-28 2021-10-08 海信集团有限公司 一种智能终端的控制方法、人机交互设备及智能终端
US11696011B2 (en) 2021-10-21 2023-07-04 Raytheon Company Predictive field-of-view (FOV) and cueing to enforce data capture and transmission compliance in real and near real time video
US11792499B2 (en) 2021-10-21 2023-10-17 Raytheon Company Time-delay to enforce data capture and transmission compliance in real and near real time video
US11700448B1 (en) 2022-04-29 2023-07-11 Raytheon Company Computer/human generation, validation and use of a ground truth map to enforce data capture and transmission compliance in real and near real time video of a local scene
GB2622579A (en) * 2022-09-14 2024-03-27 Continental Automotive Tech Gmbh Method and system to authenticate camera device and camera data from common attacks

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104868997A (zh) * 2015-03-30 2015-08-26 廖小谦 安全智能硬件、智能终端用户数据保护方法及系统
CN105243318A (zh) * 2015-08-28 2016-01-13 小米科技有限责任公司 确定用户设备控制权限的方法、装置及终端设备
CN105245596A (zh) * 2015-09-30 2016-01-13 深圳市先河系统技术有限公司 一种远程控制方法、服务器及网络附属存储设备
CN105278337A (zh) * 2015-09-18 2016-01-27 宇龙计算机通信科技(深圳)有限公司 智能家居系统的访问控制方法及装置
CN105282159A (zh) * 2015-10-30 2016-01-27 青岛海尔智能家电科技有限公司 一种验证用户身份的方法、装置及智能终端
CN105357262A (zh) * 2015-09-29 2016-02-24 小米科技有限责任公司 设备控制方法及装置

Family Cites Families (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6993658B1 (en) * 2000-03-06 2006-01-31 April System Design Ab Use of personal communication devices for user authentication
JP2003299073A (ja) * 2002-04-03 2003-10-17 Matsushita Electric Ind Co Ltd 撮像装置の制御方法とそれを実施する装置
JP2005190286A (ja) * 2003-12-26 2005-07-14 Canon Sales Co Inc 認証サーバ、情報サーバ、クライアント、認証方法、認証システム、プログラム、記録媒体
WO2005076852A2 (en) * 2004-02-04 2005-08-25 Perseus Wireless, Inc. Method and system for providing information to remote clients
JP5148179B2 (ja) * 2007-06-21 2013-02-20 パナソニック株式会社 Ip端末装置及びip端末装置の映像モニタ方法
EP2071775A1 (en) * 2007-12-13 2009-06-17 British Telecommunications public limited company Data access
US8811948B2 (en) * 2010-07-09 2014-08-19 Microsoft Corporation Above-lock camera access
CN102413531B (zh) * 2011-11-30 2014-03-26 上海顶竹通讯技术有限公司 多模终端的网络切换装置及方法
JP2013236316A (ja) * 2012-05-10 2013-11-21 Sharp Corp 通信端末装置およびその通信方法
US8995903B2 (en) * 2012-07-25 2015-03-31 Gopro, Inc. Credential transfer management camera network
JP2014154131A (ja) 2013-02-14 2014-08-25 Nec Commun Syst Ltd 認証システムおよび認証方法
CN105408944A (zh) 2013-07-22 2016-03-16 因特立维森技术公司 用于可扩展视频云服务的系统和方法
JP6351222B2 (ja) * 2013-08-13 2018-07-04 キヤノン株式会社 情報処理装置およびその制御方法、プログラム
JP2015122671A (ja) * 2013-12-24 2015-07-02 キヤノン株式会社 データ供給装置、データ受信装置、ならびに遠隔通信システム
US20150222601A1 (en) * 2014-02-05 2015-08-06 Branto Inc. Systems for Securing Control and Data Transfer of Smart Camera
CN104202306B (zh) * 2014-08-15 2015-10-14 小米科技有限责任公司 访问认证方法、装置及系统
CN104243250B (zh) 2014-08-18 2017-12-12 小米科技有限责任公司 基于智能家居系统的访问授权方法、装置及设备
US9179105B1 (en) 2014-09-15 2015-11-03 Belkin International, Inc. Control of video camera with privacy feedback
CN104639549B (zh) * 2015-02-05 2018-09-04 小米科技有限责任公司 设备绑定方法和装置
CN106209816B (zh) 2016-07-01 2019-10-18 浙江宇视科技有限公司 一种网络摄像机登录方法及系统

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104868997A (zh) * 2015-03-30 2015-08-26 廖小谦 安全智能硬件、智能终端用户数据保护方法及系统
CN105243318A (zh) * 2015-08-28 2016-01-13 小米科技有限责任公司 确定用户设备控制权限的方法、装置及终端设备
CN105278337A (zh) * 2015-09-18 2016-01-27 宇龙计算机通信科技(深圳)有限公司 智能家居系统的访问控制方法及装置
CN105357262A (zh) * 2015-09-29 2016-02-24 小米科技有限责任公司 设备控制方法及装置
CN105245596A (zh) * 2015-09-30 2016-01-13 深圳市先河系统技术有限公司 一种远程控制方法、服务器及网络附属存储设备
CN105282159A (zh) * 2015-10-30 2016-01-27 青岛海尔智能家电科技有限公司 一种验证用户身份的方法、装置及智能终端

Also Published As

Publication number Publication date
EP3220602A1 (en) 2017-09-20
US10425403B2 (en) 2019-09-24
RU2674311C1 (ru) 2018-12-06
JP6580151B2 (ja) 2019-09-25
CN105847243B (zh) 2021-02-26
KR20190004700A (ko) 2019-01-14
EP3220602B1 (en) 2020-02-12
US20170272425A1 (en) 2017-09-21
KR102044113B1 (ko) 2019-11-12
JP2018511863A (ja) 2018-04-26
CN105847243A (zh) 2016-08-10

Similar Documents

Publication Publication Date Title
WO2017156960A1 (zh) 访问智能摄像头的方法及装置
WO2017035988A1 (zh) 确定用户设备控制权限的方法、装置及终端设备
WO2016155306A1 (zh) 网络接入方法及装置
WO2016145862A1 (zh) 设备绑定方法及装置
WO2017092417A1 (zh) 基于智能终端设备的网络接入的方法和装置
US9769667B2 (en) Methods for controlling smart device
WO2017113842A1 (zh) 控制智能设备的方法及装置
WO2016011744A1 (zh) 使用验证码进行验证的方法及装置
WO2016023367A1 (zh) 访问认证方法、装置及系统
WO2017031888A1 (zh) 指纹识别方法及装置
US10608988B2 (en) Method and apparatus for bluetooth-based identity recognition
WO2015196665A1 (zh) 绑定账号与令牌密钥的方法、装置
WO2016074586A1 (zh) 权限验证的方法及装置
WO2017096783A1 (zh) 账户管理方法及装置
WO2017177571A1 (zh) 一种执行业务处理的方法、装置及系统
WO2016127669A1 (zh) 终端设备接入无线网络的方法及装置
WO2017071074A1 (zh) 建立连接的方法及装置
WO2019047066A1 (zh) 无人机接入方法及装置
WO2016155231A1 (zh) 网络接入方法及装置
WO2019028746A1 (zh) 无人机接入方法及装置
WO2016015403A1 (zh) 一种接入wi-fi网络的方法及装置
KR101642019B1 (ko) 단말기 검증방법, 장치, 프로그램 및 기록매체
TWI761843B (zh) 門禁控制方法及裝置、電子設備和儲存介質
WO2018166102A1 (zh) 一种多设备无线连接方法和设备
WO2016011739A1 (zh) 防伪验证方法、装置和系统

Legal Events

Date Code Title Description
ENP Entry into the national phase

Ref document number: 2017544782

Country of ref document: JP

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2017133782

Country of ref document: RU

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 20187030115

Country of ref document: KR

Kind code of ref document: A

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16894121

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 16894121

Country of ref document: EP

Kind code of ref document: A1