WO2023040326A1 - 摄像头的入网方法、配置服务器、摄像头及安防系统 - Google Patents

摄像头的入网方法、配置服务器、摄像头及安防系统 Download PDF

Info

Publication number
WO2023040326A1
WO2023040326A1 PCT/CN2022/093998 CN2022093998W WO2023040326A1 WO 2023040326 A1 WO2023040326 A1 WO 2023040326A1 CN 2022093998 W CN2022093998 W CN 2022093998W WO 2023040326 A1 WO2023040326 A1 WO 2023040326A1
Authority
WO
WIPO (PCT)
Prior art keywords
camera
information
security system
configuration
user account
Prior art date
Application number
PCT/CN2022/093998
Other languages
English (en)
French (fr)
Inventor
唐志宇
吴红欣
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2023040326A1 publication Critical patent/WO2023040326A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/90Arrangement of cameras or camera modules, e.g. multiple cameras in TV studios or sports stadiums
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service

Definitions

  • the embodiment of the present application relates to the Internet field, and in particular to a network access technology of a camera.
  • the installation method of the Internet camera is as follows: power on the Internet camera; connect the Internet camera to the computer with a network cable; modify the IP address of the computer so that the computer and the wireless Internet camera are in the same network segment and can communicate through the network; install on the computer Dedicated client software; run dedicated client software; search for camera devices, add camera devices; configure wireless parameters and video management platform parameters, and connect to the current wireless router; restart the camera device to complete the camera configuration.
  • the above-mentioned configuration method requires a personal computer, and the technical setting process is also very complicated. It requires knowledge of both local area network configuration and wireless network configuration. If any problem occurs in one link, professional and technical personnel are required to solve it.
  • An embodiment of the present application provides a network access method for a camera, which is applied to a configuration server.
  • the method includes: receiving configuration information reported by the camera, the configuration information at least including: user account and camera factory identity information; authenticating the camera according to the configuration information, After the authentication is passed, the user account is sent to the security system for the security system to create a login account of the camera for the user account and assign the identification information of the camera; receive feedback information from the security system and send the feedback information to the camera for the camera to use according to the feedback.
  • the information and the security system complete the authentication; the feedback information includes the connection information of the security system, the login account of the camera, and the identification information of the camera.
  • the embodiment of the present application also provides a camera network access method, which is applied to the camera, including: reporting the configuration information of the camera to the configuration server, so that the configuration server can authenticate the camera according to the configuration information, and the configuration information includes at least: user account and camera Factory identity information; receive feedback information from the security system sent by the configuration server; the feedback information includes connection information of the security system, login account of the camera, and identification information of the camera; initiate an authentication request to the security system according to the feedback information.
  • a camera network access method which is applied to the camera, including: reporting the configuration information of the camera to the configuration server, so that the configuration server can authenticate the camera according to the configuration information, and the configuration information includes at least: user account and camera Factory identity information; receive feedback information from the security system sent by the configuration server; the feedback information includes connection information of the security system, login account of the camera, and identification information of the camera; initiate an authentication request to the security system according to the feedback information.
  • the embodiment of the present application also provides a camera network access method, which is applied to the security system, including: receiving the user account sent by the configuration server; creating a camera login account for the user account and assigning the identification information of the camera; creating the camera login account
  • the identification information of the camera and the connection information of the security system are sent to the camera through the configuration server as feedback information; after receiving the authentication request initiated by the camera according to the feedback information, the camera is authenticated.
  • the embodiment of the present application also provides a configuration server, including: a receiving module, configured to receive configuration information reported by the camera, the configuration information at least including: user account and camera factory identity information; an authentication module, configured to verify the camera according to the configuration information Perform authentication, and send the user account to the security system after the authentication is passed, for the security system to create a camera login account for the user account and assign the identification information of the camera; the sending module is used to receive the feedback information from the security system.
  • the feedback information is sent to the camera for the camera to complete authentication with the security system according to the feedback information; wherein, the feedback information includes the connection information of the security system, the login account of the camera, and the identification information of the camera.
  • the embodiment of the present application also provides a camera, including: a reporting module, configured to report the configuration information of the camera to the configuration server, so that the configuration server can authenticate the camera according to the configuration information, and the configuration information includes at least: user account and camera factory Identity information; the receiving module is used to receive the feedback information of the security system sent by the configuration server; wherein, the feedback information includes the connection information of the security system, the login account of the camera and the identification information of the camera; the authentication request module is used to receive the feedback information based on the feedback information Initiate an authentication request to the security system.
  • a reporting module configured to report the configuration information of the camera to the configuration server, so that the configuration server can authenticate the camera according to the configuration information
  • the configuration information includes at least: user account and camera factory Identity information
  • the receiving module is used to receive the feedback information of the security system sent by the configuration server; wherein, the feedback information includes the connection information of the security system, the login account of the camera and the identification information of the camera
  • the authentication request module is used to receive
  • the embodiment of the present application also provides a security system, including: a receiving module, used to receive the user account sent by the configuration server; a creating module, used to create a camera login account for the user account and assign the identification information of the camera; a sending module, It is used to send the created camera’s login account, the camera’s identification information, and the connection information of the security system as feedback information to the camera through the configuration server; the authentication module is used to receive the authentication request initiated by the camera according to the feedback information Then, authenticate the camera.
  • a security system including: a receiving module, used to receive the user account sent by the configuration server; a creating module, used to create a camera login account for the user account and assign the identification information of the camera; a sending module, It is used to send the created camera’s login account, the camera’s identification information, and the connection information of the security system as feedback information to the camera through the configuration server; the authentication module is used to receive the authentication request initiated by the camera according to the feedback information Then, authenticate the camera.
  • the embodiment of the present application also provides an electronic device, including: at least one processor; and a memory connected in communication with the at least one processor; wherein, the memory stores instructions executable by at least one processor, and the instructions are executed by at least one processor.
  • the processor is executed, so that at least one processor can execute the network access method of the above-mentioned camera.
  • the embodiment of the present application also provides a computer-readable storage medium storing a computer program, and when the computer program is executed by a processor, the above method for network access of a camera is realized.
  • Fig. 1 is the flowchart of the network access method of the camera of an embodiment of the present application
  • Fig. 2 is a schematic diagram of interaction between an account opening system and a configuration server according to an embodiment of the present application
  • Fig. 3 is the flow chart of the network access method of the camera of another embodiment of the present application.
  • FIG. 4 is a flow chart of a camera network access method according to another embodiment of the present application.
  • FIG. 5 is a schematic diagram of a systematic interaction of a camera network access method according to another embodiment of the present application.
  • Fig. 6 is a schematic diagram of a configuration server module according to another embodiment of the present application.
  • Fig. 7 is a schematic diagram of a camera module according to another embodiment of the present application.
  • Fig. 8 is a schematic diagram of a security system module according to another embodiment of the present application.
  • FIG. 9 is a schematic structural diagram of an electronic device according to another embodiment of the present application.
  • the main purpose of the embodiment of the present application is to propose a network access method for a camera, a configuration server, a camera, a security system, electronic equipment, and a computer-readable storage medium, which greatly reduces the configuration difficulty of a network camera, makes it widely used in the security field, and is easy to configure It is convenient to save manpower and material resources.
  • An embodiment of the present application relates to a network access method of a camera, which uses a configuration server.
  • the method includes: receiving configuration information reported by the camera, the configuration information at least including: user account and camera factory identity information; authenticating the camera according to the configuration information, After the authentication is passed, the user account is sent to the security system for the security system to create a login account of the camera for the user account and assign the identification information of the camera; receive feedback information from the security system and send the feedback information to the camera for the camera to use according to the feedback.
  • the information and the security system complete the authentication; the feedback information includes the connection information of the security system, the login account of the camera, and the identification information of the camera.
  • the embodiment of the present application provides a camera network access method
  • the configuration server receives the configuration information reported by the camera, authenticates the camera according to the configuration information, and sends the user account to the security system after the authentication is passed, for the security system to provide the user Account Create a login account for the camera and assign the identification information of the camera; configure the server to receive feedback information from the security system and send the feedback information to the camera for the camera to complete authentication with the security system based on the feedback information.
  • the camera under the action of the configuration server, the camera automatically completes the authentication of the camera and the security platform, which greatly reduces the configuration difficulty of the network camera, and ordinary users can also complete the access of the camera with one key, so that the network camera can be widely used , and the configuration is simple and convenient, saving manpower and material resources.
  • Step 101 receiving configuration information reported by the camera.
  • the configuration information includes at least: a user account (Identification, ID) and factory identity information of the camera.
  • the user account can be the user's mobile phone number
  • the factory identity information of the camera can be the machine code and authorization code provided by the business or service of the camera device when it leaves the factory.
  • Each camera device has a corresponding machine code and authorization code.
  • the operator or service provider presets the machine code and authorization code of the camera on the configuration server, so that the configuration server can authenticate the camera when receiving the machine code and authorization code reported by the camera.
  • the configuration server Before the configuration server receives the configuration information reported by the camera to be connected to the network, the camera to be connected to the network can scan the QR code generated by the user device to obtain the user account.
  • the user account information When a user purchases a camera at a business hall or a service provider store, the user account information will be entered into the account opening system, and the configuration server will detect whether there is a camera factory identity information that matches the camera factory identity information in the configuration information. If it exists, the authentication is successful. , that is, the user successfully opened an account. After the user opens an account successfully, the mobile APP displays the user information QR code. After the camera is powered on, the voice prompts to scan the user information. The camera is aimed at the mobile phone to scan, so that the camera obtains the user's mobile phone number, camera machine code, and authorization code.
  • step 102 the camera is authenticated according to the configuration information, and the user account is sent to the security system after the authentication is passed, so that the security system creates a login account of the camera for the user account and assigns the identification information of the camera.
  • the login account of the camera is the login account of the new camera created by the security system for the user account, that is to say, a random login account and password of the camera will be generated by the security system, and the camera ID is the identification information of the camera .
  • the configuration server After the configuration server receives the camera configuration information, it authenticates the received configuration information, including login account number, camera machine code and authorization code information. If the authentication is passed, it returns an authentication success message to the security system. response message.
  • the configuration server sends the user account information to the security system. After receiving the account information, the security system creates customer information in the system and automatically generates a random camera ID, camera login account and password.
  • the configuration information further includes: region information; after the configuration server passes the authentication, the configuration server sends the user account to the security system corresponding to the region information. That is to say, after the authentication of the configuration server is passed, the information security systems in different regions automatically generate random camera IDs, camera login accounts and passwords, which correspond to user accounts.
  • authenticating the camera according to the configuration information further includes: detecting whether there is any camera factory identity information matching the camera factory identity information in the configuration information among the preset camera factory identity information, and starting the account opening In the user account information received in the system, it is detected whether there is a user account matching the user account in the configuration information; if the detection results are all yes, it is determined that the authentication is successful.
  • FIG. 2 it is a schematic diagram of the interaction between the account opening system and the configuration server.
  • A1 The user goes to the business hall or the service provider's store to purchase a camera, and the account opening system sends the user's account number (mobile phone number) and the area information of the purchased device to the configuration server.
  • A2 The configuration server, from the user account information received from the account opening system, detects whether there is a user account that matches the user account in the configuration information. If the detection results are all yes, the authentication success message is fed back to the account opening after the configuration is successful. system, account opening is successful.
  • A3 If the detection results are all negative, the configuration server feeds back an authentication failure message to the account opening system after the configuration fails, and the account opening fails.
  • Step 103 receiving feedback information from the security system, and sending the feedback information to the camera, for the camera to complete authentication with the security system according to the feedback information.
  • the feedback information includes the connection information of the security system, the login account of the camera, and the identification information of the camera.
  • the connection information of the security system is that after the configuration server presets the unique machine code and/or authorization code of the camera on the camera, it assigns the security system login authentication IP address and port number to the camera.
  • the IP address of the address server is preset when the camera leaves the factory, and the configuration server obtains the IP address of the security login authentication fed back by the security system, the camera ID, and the camera ID through message interaction with the address server. login account and password information.
  • the configuration server sends the above feedback information to the camera for camera authentication to check whether the user’s camera is a legal camera in the security system. If the camera is legal in the security system, communication between the camera and the security system is possible.
  • the system can obtain the monitoring video from the camera, so that the user can obtain the monitoring video from the security system through the user account.
  • the security system receives the configuration information reported by the camera, authenticates the camera according to the configuration information, and sends the user account to the security system after the authentication is passed, so that the security system can create a login account of the camera for the user account and allocate the camera account.
  • Identification information the configuration server receives the feedback information from the security system and sends the feedback information to the camera for the camera to complete authentication with the security system based on the feedback information.
  • the camera under the action of the configuration server, the camera automatically completes the authentication of the camera and the security platform, which greatly reduces the configuration difficulty of the network camera, and ordinary users can also complete the access of the camera with one key, so that the network camera can be widely used , and the configuration is simple and convenient, saving manpower and material resources.
  • the method includes: reporting the configuration information of the camera to the configuration server, so that the configuration server can authenticate the camera according to the configuration information.
  • the configuration information includes at least: Account and camera factory identity information; receive feedback information from the security system sent by the configuration server; wherein, the feedback information includes connection information of the security system, login account of the camera, and identification information of the camera; initiate an authentication request to the security system according to the feedback information.
  • the implementation details of the network access method of the camera of this embodiment are described in detail below. The following content is only the implementation details provided for the convenience of understanding, and is not necessary for implementing this solution.
  • the figure is a flow chart of the network access method of the camera of this embodiment. Specifically Steps include:
  • step 201 the configuration information of the camera is reported to the configuration server, so that the configuration server can authenticate the camera according to the configuration information.
  • the configuration information includes at least: user account and camera factory identity information; the user account may be the user's mobile phone number, and the camera factory identity information is the machine code and authorization code provided by the business or service when the camera device leaves the factory. Each camera device has a corresponding machine code and authorization code.
  • the configuration information also includes: region information; the IP address of the region information security system for login authentication corresponds to the port.
  • the configuration server Before reporting the configuration information of the camera to the configuration server, it also includes obtaining the user account by scanning the two-dimensional code generated by the user device. Specifically, when a user purchases a camera at a business hall or a service provider store, the user account information will be entered into the account opening system, and the configuration server will detect whether there is a camera factory identity information that matches the camera factory identity information in the configuration information. If it exists, Then the authentication is successful, that is, the user opens an account successfully. After the user successfully opens an account, the mobile APP displays the user information QR code. After the camera is powered on, the voice prompts to scan the user information. The camera is aimed at the mobile phone to scan, so that the camera obtains the user's mobile phone number, camera machine code, authorization code, and area information.
  • the camera can report the user's mobile phone number, camera machine code, authorization code, and region information to the configuration server.
  • the configuration server After receiving the camera configuration information, the configuration server authenticates the received configuration information.
  • the specific authentication operation is the same as the previous embodiment. Step 102 is not described in detail to avoid repetition.
  • Step 202 receiving the feedback information of the security system sent by the configuration server.
  • the feedback information includes the connection information of the security system, the login account of the camera, and the identification information of the camera; the connection information of the security system is the IP address and port number for login authentication of the security system.
  • the security system After the configuration server authenticates the camera successfully in step 201, the security system sends information such as the security system login authentication IP address and port number, camera ID, camera login account and password to the configuration server, and the configuration server sends the above-mentioned Feedback information is sent to the camera.
  • Step 203 initiate an authentication request to the security system according to the feedback information.
  • the camera after the camera receives the feedback information from the security system sent by the configuration server, the camera initiates an authentication request to the security system based on information such as the security system login authentication IP address and port number, camera ID, camera login account and password, etc. , to request the security system to judge whether the camera is a legal camera in the security system, and whether communication between the camera and the security system is possible.
  • the configuration information of the camera is reported to the configuration server for the configuration server to authenticate the camera according to the configuration information, and the camera receives the feedback information of the security system sent by the configuration server; wherein the feedback information includes the connection information of the security system, The login account of the camera and the identification information of the camera; the camera initiates an authentication request to the security system according to the feedback information, which greatly reduces the configuration difficulty of the network camera, and ordinary users can also complete the access of the camera with one key, so that the network camera can be widely used , and the configuration is simple and convenient, saving manpower and material resources.
  • FIG. 4 is a schematic diagram of the network access method of the camera of this embodiment, with specific steps include:
  • Step 301 Receive the user account number sent by the configuration server
  • the configuration server after the configuration server authenticates the security system in step 102, the configuration server sends the user account information to the security system, and the security system receives the user account sent from the configuration server.
  • Step 302 Create a login account of the camera for the user account and assign the identification information of the camera;
  • the security system after receiving the user account sent by the configuration server, the security system creates a camera login account for the user account, that is, generates a new random camera login account, password, and camera ID.
  • Step 303 Send the created login account of the camera, the identification information of the camera, and the connection information of the security system to the camera through the configuration server as feedback information;
  • the security system will generate a new camera login account and password for the user account, and the camera ID and the IP address and port of the security system login authentication will be sent to the camera through the configuration server.
  • Step 304 After receiving the authentication request initiated by the camera according to the feedback information, perform authentication on the camera.
  • the camera receives the feedback information of the security system sent by the configuration server, and the camera initiates an authentication request to the security system according to the feedback information, and after the security system receives the authentication request initiated by the camera according to the feedback information , the security system authenticates whether the camera is a legitimate camera in the security system, and if the login authentication passes, the security system returns a successful login response to the camera.
  • the camera and the security system can communicate, and the security system can obtain the surveillance video from the camera, so that the user can obtain the surveillance video from the security system through the user account.
  • This embodiment receives the user account sent by the configuration server through the security system; creates the login account of the camera for the user account and assigns the identification information of the camera; uses the created login account of the camera, the identification information of the camera, and the connection information of the security system as feedback
  • the information is sent to the camera through the configuration server; after receiving the authentication request initiated by the camera based on the feedback information, the camera is authenticated.
  • the configuration steps of the network camera are greatly reduced, allowing ordinary users to complete the access of the camera with one key, so that the network camera can be widely used.
  • the network access method of the camera proposed in the embodiment of the application reduces the configuration difficulty of the network camera. Simple and convenient to save manpower and material resources.
  • FIG. 5 it is a systematic interaction diagram of the network access method of the camera.
  • the interactive system consists of a mobile phone APP, a configuration server, a security system, and a camera. It should be noted that before the user opens an account, the interaction process between the account opening system and the configuration server has been specifically described in the corresponding example in Figure 2. In order to avoid repetition, this embodiment mainly describes how the camera The specific interaction process of network access can be completed by B1-B10.
  • the mobile APP After the user successfully opens an account, the mobile APP displays the user information QR code. After the camera is powered on, it will voice prompt to scan the user information displayed on the mobile APP, and the camera is aimed at the mobile phone QR code to scan.
  • the mobile phone APP returns user information to the camera, and the user information may include user account number and user area information.
  • the camera After the camera receives the user information, the camera sends the user account, area information, machine code and authorization code of the network-connected camera to the configuration server.
  • the configuration server After receiving the above information, the configuration server returns a successful response message to the camera to be connected to the network.
  • the configuration server sends the user account to the security system, and the security system creates a new account for the user in the system after receiving the user account, and the security system generates a random camera login account and password, camera ID for the user account.
  • the security system returns the IP address of the security platform login authentication, the camera ID, and the login account and password of the camera to the configuration server.
  • the configuration server sends the login authentication IP address, camera ID, camera login account and password of the security platform to the camera to be connected to the network.
  • the camera sets the camera after receiving the information from the configuration server. After the setting is successful, it returns a response message to the security system that the setting is successful, and the camera automatically restarts to make the configuration take effect.
  • the embodiment of the present application provides a network access method of the camera, the camera automatically completes the authentication of the camera and the security platform, which greatly reduces the configuration difficulty of the network camera, and ordinary users can also complete the access of the camera with one key, making the network camera It can be widely used, and the configuration is simple and convenient, saving manpower and material resources.
  • this embodiment is a system embodiment corresponding to the above method embodiment, and this embodiment can be implemented in cooperation with the above method embodiment.
  • the relevant technical details and technical effects mentioned in the above embodiments are still valid in this embodiment, and will not be repeated here to reduce repetition.
  • the relevant technical details mentioned in this embodiment can also be applied in the above embodiments.
  • a configuration server including: a receiving module 401 , a receiving module 401 , an authentication module 402 , and a sending module 403 .
  • the receiving module 401 is used to receive the configuration information reported by the camera, the configuration information at least includes: user account number and camera factory identity information
  • the authentication module 402 is used to authenticate the camera according to the configuration information, and pass the user account Send to the security system, for the security system to create the login account of the camera for the user account and assign the identification information of the camera
  • the sending module 403 is used to send the feedback information to the camera after receiving the feedback information from the security system, for the camera to use according to the feedback information Complete the authentication with the security system; wherein, the feedback information includes the connection information of the security system, the login account of the camera, and the identification information of the camera.
  • the sending module 403 is further configured to send the user account to the security system after the authentication is passed, specifically including sending the user account to the security system corresponding to the region information according to the region information after the authentication is passed.
  • the authentication module 402 can also be used to authenticate the camera according to the configuration information, including: detecting whether there is a camera that matches the camera factory identity information in the configuration information in the preset camera factory identity information Factory identity information, and from the user account information received in the account opening system, detect whether there is a user account matching the user account in the configuration information; if the detection results are all yes, determine that the authentication is successful.
  • the reporting module 501 is used to report the configuration information of the camera to the configuration server, so that the configuration server can authenticate the camera according to the configuration information.
  • the configuration information includes at least: user account and camera factory identity information;
  • the receiving module 502 is used to receive configuration The feedback information of the security system sent by the server; wherein, the feedback information includes the connection information of the security system, the login account of the camera and the identification information of the camera;
  • the authentication request module 503 is used to initiate an authentication request to the security system according to the feedback information.
  • Each module of the camera executes the network access method of the camera in any one of the above embodiments.
  • FIG. 8 Another embodiment of the present application relates to a security system, as shown in FIG. 8 , including: a receiving module 601 , a creating module 602 , a receiving module 601 , a sending module 603 , and an authentication module 604 .
  • a receiving module 601 it is used to receive the user account sent by the configuration server;
  • the creation module 602 is used to create the login account of the camera for the user account and assign the identification information of the camera;
  • the sending module 603 is used to create the login account of the camera and the identification of the camera information, and the connection information of the security system are sent to the camera through the configuration server as feedback information;
  • the authentication module 604 is used to authenticate the camera after receiving the authentication request initiated by the camera according to the feedback information.
  • each module cooperates, and the camera automatically completes the authentication of the camera and the security platform, which greatly reduces the configuration difficulty of the network camera, and ordinary users can also complete the access of the camera with one key, making the network
  • the camera can be widely used, and the configuration is simple and convenient, saving manpower and material resources.
  • this embodiment is an apparatus embodiment corresponding to the above method embodiment, and this embodiment can be implemented in cooperation with the above method embodiment.
  • the relevant technical details and technical effects mentioned in the above embodiments are still valid in this embodiment, and will not be repeated here to reduce repetition.
  • the relevant technical details mentioned in this embodiment can also be applied in the above embodiments.
  • modules involved in this embodiment are logical modules.
  • a logical unit can be a physical unit, or a part of a physical unit, or multiple physical units. Combination of units.
  • units that are not closely related to solving the technical problem proposed in the present application are not introduced in this embodiment, but this does not mean that there are no other units in this embodiment.
  • FIG. 9 Another embodiment of the present application relates to an electronic device, as shown in FIG. 9 , including: at least one processor 701; and a memory 702 communicatively connected to at least one processor 701; The instructions executed by the processor 701 are executed by at least one processor 701, so that the at least one processor 701 can execute the network access method of the camera in each of the foregoing embodiments.
  • the memory and the processor are connected by a bus
  • the bus may include any number of interconnected buses and bridges, and the bus connects one or more processors and various circuits of the memory together.
  • the bus may also connect together various other circuits such as peripherals, voltage regulators, and power management circuits, all of which are well known in the art and therefore will not be further described herein.
  • the bus interface provides an interface between the bus and the transceivers.
  • a transceiver may be a single element or multiple elements, such as multiple receivers and transmitters, providing means for communicating with various other devices over a transmission medium.
  • the data processed by the processor is transmitted on the wireless medium through the antenna, further, the antenna also receives the data and transmits the data to the processor.
  • the processor is responsible for managing the bus and general processing, and can also provide various functions, including timing, peripheral interface, voltage regulation, power management, and other control functions. Instead, memory can be used to store data that the processor uses when performing operations.
  • Another embodiment of the present application relates to a computer-readable storage medium storing a computer program.
  • the above method embodiments are implemented when the computer program is executed by the processor.
  • the program is stored in a storage medium, and includes several instructions to make a device ( It may be a single-chip microcomputer, a chip, etc.) or a processor (processor) to execute all or part of the steps of the methods in the various embodiments of the present application.
  • the aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disk or optical disc, etc., which can store program codes. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Studio Devices (AREA)

Abstract

本申请实施例涉及互联网领域,公开了一种摄像头的入网方法、配置服务器、摄像头及安防系统。摄像头的入网方法包括:接收摄像头上报的配置信息,配置信息至少包括:用户账号和摄像头出厂身份信息;根据配置信息对摄像头进行鉴权,在鉴权通过后将用户账号发送给安防系统,供安防系统为用户账号创建摄像头的登录账号并分配摄像头的标识信息;接收安防系统的反馈信息,并将反馈信息发送给摄像头,供摄像头根据反馈信息与安防系统完成鉴权;其中,反馈信息包括安防系统的连接信息、摄像头的登录账号和摄像头的标识信息。

Description

摄像头的入网方法、配置服务器、摄像头及安防系统
相关申请的交叉引用
本申请基于申请号为“202111095309.X”、申请日为2021年09月17日的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此以引入方式并入本申请。
技术领域
本申请实施例涉及互联网领域,特别涉及一种摄像头的入网技术。
背景技术
目前,互联网摄像头的安装方法如下:给互联网摄像头上电;用网线把互联网摄像头与电脑相连;修改电脑的IP地址,使电脑与无线互联网摄像头在同一个网段,能够网络通信;在电脑上安装专用客户端软件;运行专用客户端软件;搜索摄像头设备,添加摄像头设备;配置无线参数以及视频管理平台参数,连接到当前无线路由器上;重启摄像头设备,完成摄像头配置。上述配置方法要一台个人电脑,设置技术过程也很繁杂,既需要懂局域网配置知识,也需要懂无线网络配置知识,一个环节出现问题,都需要专业技术人员才能解决。
因此,传统网络摄像机在安装配置时一方面存在比较高的技术门槛,很难由普通人来操作,必须有专业技术人员才能完成设备的安装调试,设备配置难度较大且很难普及应用。另一方面,若需大批量应用传统的网络摄像机,配置工程巨大,且手动配置难免存在错误,导致终端登录有问题,适配的接入地址、摄像头ID变了之后,重新配置需要人去现场,耗费人力物力。
发明内容
本申请实施例提供了一种摄像头的入网方法,应用于配置服务器,方法包括:接收摄像头上报的配置信息,配置信息至少包括:用户账号和摄像头出厂身份信息;根据配置信息对摄像头进行鉴权,在鉴权通过后将用户账号发送给安防系统,供安防系统为用户账号创建摄像头的登录账号并分配摄像头的标识信息;接收安防系统的反馈信息,并将反馈信息发送给摄像头,供摄像头根据反馈信息与安防系统完成鉴权;其中,反馈信息包括安防系统的连接信息、摄像头的登录账号和摄像头的标识信息。
本申请实施例还提供一种摄像头的入网方法,应用于摄像头,包括:将摄像头的配置信息上报给配置服务器,供配置服务器根据配置信息对摄像头进行鉴权,配置信息至少包括:用户账号和摄像头出厂身份信息;接收配置服务器发送的安防系统的反馈信息;其中,反馈信息包括安防系统的连接信息、摄像头的登录账号和摄像头的标识信息;根据反馈信息向安防系统发起鉴权请求。
本申请实施例还提供一种摄像头的入网方法,应用于安防系统,包括:接收配置服务器发送的用户账号;为用户账号创建摄像头的登录账号并分配摄像头的标识信息;将创建的摄像头的登录账号和摄像头的标识信息,以及安防系统的连接信息作为反馈信息,通过配置服 务器发送给摄像头;在接收到摄像头根据反馈信息发起的鉴权请求后,对摄像头进行鉴权。
本申请实施例还提供了一种配置服务器,包括:接收模块,用于接收摄像头上报的配置信息,配置信息至少包括:用户账号和摄像头出厂身份信息;鉴权模块,用于根据配置信息对摄像头进行鉴权,在鉴权通过后将用户账号发送给安防系统,供安防系统为用户账号创建摄像头的登录账号并分配摄像头的标识信息;发送模块,用于在接收安防系统的反馈信息后,将反馈信息发送给摄像头,供摄像头根据反馈信息与安防系统完成鉴权;其中,反馈信息包括安防系统的连接信息、摄像头的登录账号和摄像头的标识信息。
本申请实施例还提供了一种摄像头,包括:上报模块,用于将摄像头的配置信息上报给配置服务器,供配置服务器根据配置信息对摄像头进行鉴权,配置信息至少包括:用户账号和摄像头出厂身份信息;接收模块,用于接收配置服务器发送的安防系统的反馈信息;其中,反馈信息包括安防系统的连接信息、摄像头的登录账号和摄像头的标识信息;鉴权请求模块,用于根据反馈信息向安防系统发起鉴权请求。
本申请实施例还提供了一种安防系统,包括:接收模块,用于接收配置服务器发送的用户账号;创建模块,用于为用户账号创建摄像头的登录账号并分配摄像头的标识信息;发送模块,用于将创建的摄像头的登录账号和摄像头的标识信息,以及安防系统的连接信息作为反馈信息,通过配置服务器发送给摄像头;鉴权模块,用于在接收到摄像头根据反馈信息发起的鉴权请求后,对摄像头进行鉴权。
本申请实施例还提供了一种电子设备,包括:至少一个处理器;以及,与至少一个处理器通信连接的存储器;其中,存储器存储有可被至少一个处理器执行的指令,指令被至少一个处理器执行,以使至少一个处理器能够执行如上述摄像头的入网方法。
本申请实施例还提供了一种计算机可读存储介质,存储有计算机程序,计算机程序被处理器执行时实现上述的摄像头的入网方法。
附图说明
图1是本申请一个实施例的摄像头的入网方法的流程图;
图2是本申请一个实施例开户系统与配置服务器之间的交互示意图;
图3是本申请另一个实施例的摄像头的入网方法的流程图;
图4是本申请另一个实施例的摄像头的入网方法的流程图;
图5是本申请另一个实施例的摄像头的入网方法系统性交互示意图;
图6是本申请另一个实施例的配置服务器模块示意图;
图7是本申请另一个实施例的摄像头模块示意图;
图8是本申请另一个实施例的安防系统模块示意图;
图9是本申请另一个实施例的电子设备的结构示意图。
具体实施方式
为使本申请实施例的目的、技术方案和优点更加清楚,下面将结合附图对本申请的各实施例进行详细的阐述。然而,本领域的普通技术人员可以理解,在本申请各实施例中,为了使读者更好地理解本申请而提出了许多技术细节。但是,即使没有这些技术细节和基于以下各实施例的种种变化和修改,也可以实现本申请所要求保护的技术方案。以下各个实施例的 划分是为了描述方便,不应对本申请的具体实现方式构成任何限定,各个实施例在不矛盾的前提下可以相互结合相互引用。
本申请实施例的主要目的在于提出一种摄像头的入网方法、配置服务器、摄像头、安防系统、电子设备和计算机可读存储介质,大大降低网络摄像头配置难度,让其广泛应用于安防领域,配置简易方便节省人力物力。
本申请的一个实施例涉及一种摄像头的入网方法,应用配置服务器,方法包括:接收摄像头上报的配置信息,配置信息至少包括:用户账号和摄像头出厂身份信息;根据配置信息对摄像头进行鉴权,在鉴权通过后将用户账号发送给安防系统,供安防系统为用户账号创建摄像头的登录账号并分配摄像头的标识信息;接收安防系统的反馈信息,并将反馈信息发送给摄像头,供摄像头根据反馈信息与安防系统完成鉴权;其中,反馈信息包括安防系统的连接信息、摄像头的登录账号和摄像头的标识信息。
本申请实施例通过提供了一种摄像头的入网方法,配置服务器接收摄像头上报的配置信息,根据配置信息对摄像头进行鉴权,在鉴权通过后将用户账号发送给安防系统,供安防系统为用户账号创建摄像头的登录账号并分配摄像头的标识信息;配置服务器接收安防系统的反馈信息,并将反馈信息发送给摄像头,供摄像头根据反馈信息与安防系统完成鉴权。本申请实施例在配置服务器的作用下,摄像头自动完成摄像头和安防平台的鉴权,大大降低了网络摄像头的配置难度,普通的用户也能一键完成摄像头的接入,使得网络摄像头能广泛应用,且配置简易方便节省人力物力。
下面对本实施例的摄像头的入网方法的实现细节进行具体的说明,以下内容仅为方便理解提供的实现细节,并非实施本方案的必须。
本实施例的摄像头的入网方法的具体流程可以如图1所示,包括:
步骤101,接收摄像头上报的配置信息。
在本实施例中,配置信息至少包括:用户账号(Identification,ID)和摄像头出厂身份信息。用户账号可以是用户手机号,摄像头出厂身份信息可以是摄像头设备在出厂时营商或者服务提供的机器码和授权码,每个摄像头设备都有与之对应的机器码和授权码。运营商或者服务提供商把摄像头的机器码和授权码预置到配置服务器上,以便于配置服务器接收接收到摄像头上报的机器码和授权码时可以对摄像头进行鉴权。配置服务器接收待入网的摄像头上报的配置信息之前,待入网的摄像头可以扫描用户设备生成的二维码,获取用户账号。当用户到营业厅或者服务提供商门店购买摄像头时候,用户账号信息会录入开户系统,配置服务器检测是否存在与配置信息中的摄像头出厂身份信息匹配的摄像头出厂身份信息,若存在,则鉴权成功,即用户开户成功。用户开户成功后手机APP展示用户信息二维码,摄像头上电后语音提示扫描用户信息,摄像头对准手机进行扫描,这样摄像头就获取到了用户手机号、摄像头机器码、授权码。
步骤102,根据配置信息对摄像头进行鉴权,在鉴权通过后将用户账号发送给安防系统,供安防系统为用户账号创建摄像头的登录账号并分配摄像头的标识信息。
其中,区别于用户账号,摄像头的登录账号是安防系统为用户账号创建新的摄像头的登录账号,也就是说,安防系统会生成的一个随机的摄像头登录账号和密码,摄像头ID为摄像头的标识信息。
在本实施例中,配置服务器收到摄像头配置信息后,对收到的配置信息,包括登录账号、 摄像头机器码和授权码信息进行鉴权,若鉴权通过,返回给安防系统一个鉴权成功的响应消息。配置服务器将用户账号信息发送给安防系统,安防系统在接受到账号信息后,在系统中创建客户信息,并自动生成一个随机的摄像头ID、摄像头登录账号和密码。
在一个实施例中,配置信息还包括:地区信息;配置服务器在鉴权通过后,配置服务器将用户账号发送给与地区信息对应的安防系统。也就是说,在配置服务器鉴权通过后,不同地区信息安防系统自动生成随机的摄像头ID、摄像头登录账号和密码,与用户账号相对应。
在一个实施例中,根据配置信息对摄像头进行鉴权,还包括:在预置的摄像头出厂身份信息中,检测是否存在与配置信息中的摄像头出厂身份信息匹配的摄像头出厂身份信息,并从开户系统中接收到的用户账号信息中,检测是否存在与配置信息中的用户账号匹配的用户账号;在检测结果均为是的情况下,确定鉴权成功。在具体实施中,如图2所示,是开户系统与配置服务器之间的交互示意图。
A1:用户到营业厅或者服务提供商门店购买摄像头,从开户系统把用户的账号(手机号)和购买设备的使用区域信息发送给配置服务器。
A2:配置服务器,从开户系统中接收到的用户账号信息中,检测是否存在与配置信息中的用户账号匹配的用户账号,若检测结果均为是,配置成功后反馈鉴权成功的消息给开户系统,开户成功。
A3:若检测结果均为否,配置服务器配置失败后反馈鉴权失败的消息给开户系统,开户失败。
步骤103,接收安防系统的反馈信息,并将反馈信息发送给摄像头,供摄像头根据反馈信息与安防系统完成鉴权。
其中,反馈信息包括安防系统的连接信息、摄像头的登录账号和摄像头的标识信息。安防系统的连接信息为配置服务器在摄像头上预置摄像头的唯一机器码和/或授权码后,给摄像头分配安防系统登录鉴权IP地址和端口号。
本实施例中,在摄像头在出厂的时候就预置了地址服务器IP地址,配置服务器通过和地址服务器的消息交互,从而获取安防系统反馈过来的安防登录鉴权的IP地址,摄像头ID,摄像头ID的登录账号和密码等信息。配置服务器将上述反馈信息送给该摄像头,供摄像头鉴权,看用户的摄像头在安防系统中是否为合法的摄像头,若摄像头在安防系统中合法,则摄像头和安防系统之间可以进行通信,安防系统就可以从摄像头中获取监控视频,从而使得用户通过用户账号从安防系统中获取到监控视频。
本实施例通过安防系统接收摄像头上报的配置信息,根据配置信息对摄像头进行鉴权,在鉴权通过后将用户账号发送给安防系统,供安防系统为用户账号创建摄像头的登录账号并分配摄像头的标识信息;配置服务器接收安防系统的反馈信息,并将反馈信息发送给摄像头,供摄像头根据反馈信息与安防系统完成鉴权。本申请实施例在配置服务器的作用下,摄像头自动完成摄像头和安防平台的鉴权,大大降低了网络摄像头的配置难度,普通的用户也能一键完成摄像头的接入,使得网络摄像头能广泛应用,且配置简易方便节省人力物力。
本申请的另一个实施例涉及一种摄像头的入网方法,应用于摄像头,方法包括:将摄像头的配置信息上报给配置服务器,供配置服务器根据配置信息对摄像头进行鉴权,配置信息至少包括:用户账号和摄像头出厂身份信息;接收配置服务器发送的安防系统的反馈信息;其中,反馈信息包括安防系统的连接信息、摄像头的登录账号和摄像头的标识信息;根据反 馈信息向安防系统发起鉴权请求。下面对本实施例的摄像头的入网方法的实现细节进行具体的说明,以下内容仅为方便理解提供的实现细节,并非实施本方案的必须,图是本实施例的摄像头的入网方法的流程图,具体步骤包括:
步骤201,将摄像头的配置信息上报给配置服务器,供配置服务器根据配置信息对摄像头进行鉴权。
其中,配置信息至少包括:用户账号和摄像头出厂身份信息;用户账号可以是用户手机号,摄像头出厂身份信息是摄像头设备在出厂时营商或者服务提供的机器码和授权码。每个摄像头设备均有与之对应的机器码和授权码。此外,配置信息还包括:地区信息;地区信息安防系统的登录鉴权IP地址和端口相对应。
在将摄像头的配置信息上报给配置服务器之前,还包括通过扫描用户设备生成的二维码,获取用户账号。具体而言,当用户到营业厅或者服务提供商门店购买摄像头时候,用户账号信息会录入开户系统,配置服务器检测是否存在与配置信息中的摄像头出厂身份信息匹配的摄像头出厂身份信息,若存在,则鉴权成功,即用户开户成功。用户开户成功后手机APP展示用户信息二维码,摄像头上电后语音提示扫描用户信息,摄像头对准手机进行扫描,这样摄像头就获取到了用户手机号、摄像头机器码、授权码、地区信息。
因此,摄像头才能将用户手机号、摄像头机器码、授权码、地区信息上报给配置服务器,配置服务器收到摄像头配置信息后,对收到的配置信息进行鉴权,具体鉴权操作同上一个实施例步骤102,为避免重复不再赘述。
步骤202,接收配置服务器发送的安防系统的反馈信息。
其中,反馈信息包括安防系统的连接信息、摄像头的登录账号和摄像头的标识信息;安防系统的连接信息是安防系统登录鉴权的IP地址和端口号。
具体而言,在步骤201中配置服务器对摄像头鉴权成功后,安防系统给配置服务器发送安防系统登录鉴权IP地址和端口号、摄像头ID,摄像头的登录账号和密码等信息,配置服务器将上述反馈信息送给该摄像头。
步骤203,根据反馈信息向安防系统发起鉴权请求。
本实施例中,在摄像头接收配置服务器发送的安防系统的反馈信息后,摄像头根据安防系统登录鉴权IP地址和端口号、摄像头ID,摄像头的登录账号和密码等信息向安防系统发起鉴权请求,请求安防系统判断摄像头在安防系统中是否是合法的摄像头,摄像头和安防系统之间可以是否进行通信。
本申请实施例通过将摄像头的配置信息上报给配置服务器,供配置服务器根据配置信息对摄像头进行鉴权,摄像头接收配置服务器发送的安防系统的反馈信息;其中,反馈信息包括安防系统的连接信息、摄像头的登录账号和摄像头的标识信息;摄像头根据反馈信息向安防系统发起鉴权请求,大大降低了网络摄像头的配置难度,普通的用户也能一键完成摄像头的接入,使得网络摄像头能广泛应用,且配置简易方便节省人力物力。
本申请的另一个实施例涉及一种摄像头的入网方法,应用于安防系统,方法包括:接收配置服务器发送的用户账号;为用户账号创建摄像头的登录账号并分配摄像头的标识信息;将创建的摄像头的登录账号和摄像头的标识信息,以及安防系统的连接信息作为反馈信息,通过配置服务器发送给摄像头;在接收到摄像头根据反馈信息发起的鉴权请求后,对摄像头进行鉴权。下面对本实施例的摄像头的入网方法的细节进行具体的说明,以下内容仅为方便 理解提供的实现细节,并非实施本例的必须,图4是本实施例的摄像头的入网方法的示意图,具体步骤包括:
步骤301:接收配置服务器发送的用户账号;
本实施例中,在步骤102中配置服务器对安防系统进行鉴权通过后,配置服务器将用户账号信息发送安防系统,安防系统即就接受到了来自配置服务器发送的用户账号。
步骤302:为用户账号创建摄像头的登录账号并分配摄像头的标识信息;
本实施例中,安防系统在接收到配置服务器发送的用户账号后,为用户账号创建摄像头的登录账号,即生成一个新的随机的摄像头登录账号和密码,摄像头ID。
步骤303:将创建的摄像头的登录账号和摄像头的标识信息,以及安防系统的连接信息作为反馈信息,通过配置服务器发送给摄像头;
本实施例中,安防系统将为户账号生成新的摄像头的登录账号和密码,摄像头ID以及安防系统登录鉴权的IP地址和端口通过配置服务器发送给摄像头。
步骤304:在接收到摄像头根据反馈信息发起的鉴权请求后,对摄像头进行鉴权。
本实施例中,在上一个实施例步骤中摄像头接收配置服务器发送的安防系统的反馈信息,摄像头根据反馈信息向安防系统发起鉴权请求,安防系统接收到摄像头根据反馈信息发起的鉴权请求后,安防系统对摄像头在安防系统中是否是个合法的摄像头进行鉴权,若登陆鉴权通过,安防系统给摄像头返回一个登陆成功的响应。摄像头和安防系统之间可以进行通信,安防系统就可以从摄像头中获取监控视频,从而使得用户通过用户账号从安防系统中获取到监控视频。
本实施例通过安防系统接收配置服务器发送的用户账号;为用户账号创建摄像头的登录账号并分配摄像头的标识信息;将创建的摄像头的登录账号和摄像头的标识信息,以及安防系统的连接信息作为反馈信息,通过配置服务器发送给摄像头;在接收到摄像头根据反馈信息发起的鉴权请求后,对摄像头进行鉴权。大大降低了网络摄像头的配置步骤,让普通的用户也能一键完成摄像头的接入,使得网络摄像头能广泛应用,本申请实施例提出的摄像头的入网方法,降低了网络摄像头的配置难度,配置简易方便节省人力物力。
下面以一个实施例,对本申请的摄像头的入网方法具体步骤进行说明,如图5所示,为摄像头的入网方法系统性交互示意图,交互系统由手机APP、配置服务器、安防系统、摄像头组成。需要说明的是,在用户开户前,开户系统与配置服务器的交互过程已经在图2对应的例子具体说明,为避免重复不再赘述,本实施例主要叙述在用户在开户系统开户成功后,摄像头入网的具体交互过程可由B1-B10完成。
B1:在用户开户成功后,手机APP展示用户信息二维码,摄像头上电后会语音提示扫描手机APP所展示用户信息,摄像头对准手机二维码进行扫描。
B2:手机APP返回用户信息给摄像头,用户信息可以包括用户账号、用户地区信息。
B3:摄像头收到用户信息后,摄像头将用户账号、地区信息、入网摄像头的机器码和授权码发给配置服务器。
B4:配置服务器收到上述信息后给待入网摄像头返回一个成功响应消息。
B5:配置服务器将用户账号发送给安防系统,安防系统收到用户账号后在系统中给用户创建新的账户,安防系统为用户账号生成一个随机的摄像头登录账号和密码、摄像头ID。
B6:安防系统返回安防平台登录鉴权的IP地址、摄像头ID、以及摄像头的登录账号和密 码给配置服务器。
B7:配置服务器将安防平台的登录鉴权IP地址、摄像头ID、摄像头的登录账号和密码发送给待入网摄像头。
B8:摄像头收到配置服务器的下发信息后对摄像头进行设置,设置成功后,返回给安防系统设置成功的响应消息,并且摄像头自动重启让配置生效。
B9:重启完成后,摄像头向安防平台发起登录鉴权的消息。
B10:安防系统登录鉴权成功后返回给摄像头登陆成功的消息,摄像头在安防系统显示在线。
本申请实施例通过提供了一种摄像头的入网方法,摄像头自动完成摄像头和安防平台的鉴权,大大降低了网络摄像头的配置难度,普通的用户也能一键完成摄像头的接入,使得网络摄像头能广泛应用,且配置简易方便节省人力物力。
不难发现,本实施例为与上述方法实施例对应的系统实施例,本实施例可以与上述方法实施例互相配合实施。上述实施例中提到的相关技术细节和技术效果在本实施例中依然有效,为了减少重复,这里不再赘述。相应地,本实施例中提到的相关技术细节也可应用在上述实施例中。
本申请的另一个实施例涉及一种配置服务器,如图6所示,包括:接收模块401,接收模块401,鉴权模块402,发送模块403。其中接收模块401用于接收摄像头上报的配置信息,配置信息至少包括:用户账号和摄像头出厂身份信息;鉴权模块402,用于根据配置信息对摄像头进行鉴权,在鉴权通过后将用户账号发送给安防系统,供安防系统为用户账号创建摄像头的登录账号并分配摄像头的标识信息;发送模块403,用于在接收安防系统的反馈信息后,将反馈信息发送给摄像头,供摄像头根据反馈信息与安防系统完成鉴权;其中,反馈信息包括安防系统的连接信息、摄像头的登录账号和摄像头的标识信息。
在一个例子中,发送模块403还可用于在鉴权通过后将用户账号发送给安防系统,具体包括在鉴权通过后根据地区信息,将用户账号发送给与地区信息对应的安防系统。
在一个例子中,鉴权模块402还可用于根据配置信息对所述摄像头进行鉴权,包括:在预置的摄像头出厂身份信息中,检测是否存在与配置信息中的摄像头出厂身份信息匹配的摄像头出厂身份信息,并从开户系统中接收到的用户账号信息中,检测是否存在与所述配置信息中的用户账号匹配的用户账号;在检测结果均为是的情况下,确定鉴权成功。
本申请的另一个实施例涉及一种摄像头,如图7所示,包括:上报模块501,接收模块502,上报模块501,鉴权请求模块503。其中,上报模块501用于将摄像头的配置信息上报给配置服务器,供配置服务器根据配置信息对摄像头进行鉴权,配置信息至少包括:用户账号和摄像头出厂身份信息;接收模块502,用于接收配置服务器发送的安防系统的反馈信息;其中,反馈信息包括安防系统的连接信息、摄像头的登录账号和摄像头的标识信息;鉴权请求模块503,用于根据反馈信息向安防系统发起鉴权请求。摄像头的各个模块执行上述任一项实施例摄像头的入网方法。
本申请的另一个实施例涉及一种安防系统,如图8所示,包括:接收模块601,创建模块602,接收模块601,发送模块603,鉴权模块604。其中,用于接收配置服务器发送的用户账号;创建模块602,用于为用户账号创建摄像头的登录账号并分配摄像头的标识信息; 发送模块603,用于将创建的摄像头的登录账号和摄像头的标识信息,以及安防系统的连接信息作为反馈信息,通过配置服务器发送给摄像头;鉴权模块604,用于在接收到摄像头根据反馈信息发起的鉴权请求后,对摄像头进行鉴权。
本申请的各模块的实施例中,各个模块相配合,摄像头自动完成摄像头和安防平台的鉴权,大大降低了网络摄像头的配置难度,普通的用户也能一键完成摄像头的接入,使得网络摄像头能广泛应用,且配置简易方便节省人力物力。
不难发现,本实施例为与上述方法实施例对应的装置实施例,本实施例可以与上述方法实施例互相配合实施。上述实施例中提到的相关技术细节和技术效果在本实施例中依然有效,为了减少重复,这里不再赘述。相应地,本实施例中提到的相关技术细节也可应用在上述实施例中。
值得一提的是,本实施例中所涉及到的各模块均为逻辑模块,在实际应用中,一个逻辑单元可以是一个物理单元,也可以是一个物理单元的一部分,还可以以多个物理单元的组合实现。此外,为了突出本申请的创新部分,本实施例中并没有将与解决本申请所提出的技术问题关系不太密切的单元引入,但这并不表明本实施例中不存在其它的单元。
本申请另一个实施例涉及一种电子设备,如图9所示,包括:至少一个处理器701;以及,与至少一个处理器701通信连接的存储器702;其中,存储器702存储有可被至少一个处理器701执行的指令,指令被至少一个处理器701执行,以使至少一个处理器701能够执行上述各实施例中种摄像头的入网方法方法。
其中,存储器和处理器采用总线方式连接,总线可以包括任意数量的互联的总线和桥,总线将一个或多个处理器和存储器的各种电路连接在一起。总线还可以将诸如外围设备、稳压器和功率管理电路等之类的各种其他电路连接在一起,这些都是本领域所公知的,因此,本文不再对其进行进一步描述。总线接口在总线和收发机之间提供接口。收发机可以是一个元件,也可以是多个元件,比如多个接收器和发送器,提供用于在传输介质上与各种其他装置通信的单元。经处理器处理的数据通过天线在无线介质上进行传输,进一步,天线还接收数据并将数据传送给处理器。
处理器负责管理总线和通常的处理,还可以提供各种功能,包括定时,外围接口,电压调节、电源管理以及其他控制功能。而存储器可以被用于存储处理器在执行操作时所使用的数据。
本申请另一个实施例涉及一种计算机可读存储介质,存储有计算机程序。计算机程序被处理器执行时实现上述方法实施例。
即,本领域技术人员可以理解,实现上述实施例方法中的全部或部分步骤是可以通过程序来指令相关的硬件来完成,该程序存储在一个存储介质中,包括若干指令用以使得一个设备(可以是单片机,芯片等)或处理器(processor)执行本申请各个实施例方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
本领域的普通技术人员可以理解,上述各实施方式是实现本申请的具体实施例,而在实际应用中,可以在形式上和细节上对其作各种改变,而不偏离本申请的精神和范围。

Claims (13)

  1. 一种摄像头的入网方法,应用于配置服务器,包括:
    接收摄像头上报的配置信息,所述配置信息至少包括:用户账号和摄像头出厂身份信息;
    根据所述配置信息对所述摄像头进行鉴权,在鉴权通过后将所述用户账号发送给安防系统,供所述安防系统为所述用户账号创建摄像头的登录账号并分配摄像头的标识信息;
    接收所述安防系统的反馈信息,并将所述反馈信息发送给所述摄像头,供所述摄像头根据所述反馈信息与所述安防系统完成鉴权;其中,所述反馈信息包括所述安防系统的连接信息、所述摄像头的登录账号和所述摄像头的标识信息。
  2. 根据权利要求1所述的摄像头的入网方法,其中,所述配置信息还包括:地区信息;所述在鉴权通过后将所述用户账号发送给安防系统,包括:
    在鉴权通过后根据地区信息,将所述用户账号发送给与所述地区信息对应的安防系统。
  3. 根据权利要求1或2所述的摄像头的入网方法,其中,所述根据所述配置信息对所述摄像头进行鉴权,包括:
    在预置的摄像头出厂身份信息中,检测是否存在与所述配置信息中的摄像头出厂身份信息匹配的摄像头出厂身份信息,并从开户系统中接收到的用户账号信息中,检测是否存在与所述配置信息中的用户账号匹配的用户账号;
    在检测结果均为是的情况下,确定鉴权成功。
  4. 根据权利要求1至3中任一项所述的摄像头的入网方法,其中,所述摄像头出厂身份信息包括:摄像头的唯一机器码和/或授权码;
    所述安防系统的连接信息包括安防系统的IP地址和端口号。
  5. 一种摄像头的入网方法,应用于摄像头,包括:
    将摄像头的配置信息上报给配置服务器,供所述配置服务器根据所述配置信息对所述摄像头进行鉴权,所述配置信息至少包括:用户账号和摄像头出厂身份信息;
    接收所述配置服务器发送的安防系统的反馈信息;其中,所述反馈信息包括所述安防系统的连接信息、所述摄像头的登录账号和所述摄像头的标识信息;
    根据所述反馈信息向所述安防系统发起鉴权请求。
  6. 根据权利要求5所述的摄像头的入网方法,其中,在所述将摄像头的配置信息上报给配置服务器之前,还包括:
    通过扫描用户设备生成的二维码,获取所述用户账号。
  7. 根据权利要求5或6所述的摄像头的入网方法,其中,所述配置信息还包括:地区信息;所述安防系统的连接信息包括与所述地区信息对应的安防系统的IP地址和端口。
  8. 一种摄像头的入网方法,应用于安防系统,包括:
    接收配置服务器发送的用户账号;
    为所述用户账号创建摄像头的登录账号并分配摄像头的标识信息;
    将创建的所述摄像头的登录账号和所述摄像头的标识信息,以及所述安防系统的连接信息作为反馈信息,通过所述配置服务器发送给摄像头;
    在接收到所述摄像头根据所述反馈信息发起的鉴权请求后,对所述摄像头进行鉴权。
  9. 一种配置服务器,包括:
    接收模块,用于接收摄像头上报的配置信息,所述配置信息至少包括:用户账号和摄像头出厂身份信息;
    鉴权模块,用于根据所述配置信息对所述摄像头进行鉴权,在鉴权通过后将所述用户账号发送给安防系统,供所述安防系统为所述用户账号创建摄像头的登录账号并分配摄像头的标识信息;
    发送模块,用于在接收所述安防系统的反馈信息后,将所述反馈信息发送给所述摄像头,供所述摄像头根据所述反馈信息与所述安防系统完成鉴权;其中,所述反馈信息包括所述安防系统的连接信息、所述摄像头的登录账号和所述摄像头的标识信息。
  10. 一种摄像头,包括:
    上报模块,用于将摄像头的配置信息上报给配置服务器,供所述配置服务器根据所述配置信息对所述摄像头进行鉴权,所述配置信息至少包括:用户账号和摄像头出厂身份信息;
    接收模块,用于接收所述配置服务器发送的安防系统的反馈信息;其中,所述反馈信息包括所述安防系统的连接信息、所述摄像头的登录账号和所述摄像头的标识信息;
    鉴权请求模块,用于根据所述反馈信息向所述安防系统发起鉴权请求。
  11. 一种安防系统,包括:
    接收模块,用于接收配置服务器发送的用户账号;
    创建模块,用于为所述用户账号创建摄像头的登录账号并分配摄像头的标识信息;
    发送模块,用于将创建的所述摄像头的登录账号和所述摄像头的标识信息,以及所述安防系统的连接信息作为反馈信息,通过所述配置服务器发送给摄像头;
    鉴权模块,用于在接收到所述摄像头根据所述反馈信息发起的鉴权请求后,对所述摄像头进行鉴权。
  12. 一种电子设备,包括:
    至少一个处理器;以及,
    与所述至少一个处理器通信连接的存储器;其中,
    所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够执行如权利要求1至4中任一项所述的摄像头的入网方法,或者,执行如权利要求5至7中任一项所述的摄像头的入网方法,或者,执行如权利要求8所述的摄像头的入网方法。
  13. 一种计算机可读存储介质,存储有计算机程序,所述计算机程序被处理器执行时实现如权利要求1至4中任一项所述的摄像头的入网方法,或者,执行如权利要求5至7中任一项所述的摄像头的入网方法,或者,执行如权利要求8所述的摄像头的入网方法。
PCT/CN2022/093998 2021-09-17 2022-05-19 摄像头的入网方法、配置服务器、摄像头及安防系统 WO2023040326A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111095309.XA CN115835239A (zh) 2021-09-17 2021-09-17 摄像头的入网方法、配置服务器、摄像头及安防系统
CN202111095309.X 2021-09-17

Publications (1)

Publication Number Publication Date
WO2023040326A1 true WO2023040326A1 (zh) 2023-03-23

Family

ID=85515921

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/093998 WO2023040326A1 (zh) 2021-09-17 2022-05-19 摄像头的入网方法、配置服务器、摄像头及安防系统

Country Status (2)

Country Link
CN (1) CN115835239A (zh)
WO (1) WO2023040326A1 (zh)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006126990A (ja) * 2004-10-27 2006-05-18 Matsushita Electric Ind Co Ltd 本人認証装置および携帯情報機器
US20120278855A1 (en) * 2011-04-28 2012-11-01 Panasonic Corporation Communication apparatus, authentication apparatus, communication method and authentication method
CN104702573A (zh) * 2013-12-09 2015-06-10 中国电信股份有限公司 家庭网络终端及其自动鉴权方法和自动鉴权系统
CN106791627A (zh) * 2016-12-12 2017-05-31 广东合正网络技术有限公司 网络视频监控和安防报警集成系统及其安全访问鉴权方法
CN110300287A (zh) * 2019-07-26 2019-10-01 华东师范大学 一种公共安全视频监控联网摄像头接入认证方法
CN112422479A (zh) * 2019-08-22 2021-02-26 北京奇虎科技有限公司 一种设备绑定方法及装置、系统

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006126990A (ja) * 2004-10-27 2006-05-18 Matsushita Electric Ind Co Ltd 本人認証装置および携帯情報機器
US20120278855A1 (en) * 2011-04-28 2012-11-01 Panasonic Corporation Communication apparatus, authentication apparatus, communication method and authentication method
CN104702573A (zh) * 2013-12-09 2015-06-10 中国电信股份有限公司 家庭网络终端及其自动鉴权方法和自动鉴权系统
CN106791627A (zh) * 2016-12-12 2017-05-31 广东合正网络技术有限公司 网络视频监控和安防报警集成系统及其安全访问鉴权方法
CN110300287A (zh) * 2019-07-26 2019-10-01 华东师范大学 一种公共安全视频监控联网摄像头接入认证方法
CN112422479A (zh) * 2019-08-22 2021-02-26 北京奇虎科技有限公司 一种设备绑定方法及装置、系统

Also Published As

Publication number Publication date
CN115835239A (zh) 2023-03-21

Similar Documents

Publication Publication Date Title
CN107018119B (zh) 身份验证系统、方法和平台
US20180241779A1 (en) Query system and method to determine authentication capabilities
TWI728261B (zh) 判定認證能力之查詢系統、方法及非暫態機器可讀媒體
US9781105B2 (en) Fallback identity authentication techniques
US10013692B2 (en) Systems and methods for authorizing transactions via a digital device
US9306754B2 (en) System and method for implementing transaction signing within an authentication framework
WO2019232996A1 (zh) 基于视频的业务处理系统、方法、用户终端及存储介质
WO2015154488A1 (zh) 一种访问路由器的方法及装置
CN112822222B (zh) 登录验证方法、自动登录的验证方法、服务端及客户端
JP6141041B2 (ja) 情報処理装置及びプログラム、制御方法
US8191123B2 (en) Provisioning a network appliance
CN113746633B (zh) 物联网设备绑定方法、装置、系统、云服务器和存储介质
WO2016082548A1 (zh) 一种Windows桌面的用户登录方法、设备及系统
CN103986584A (zh) 基于智能设备的双因子身份验证方法
WO2009037700A2 (en) Remote computer access authentication using a mobile device
CN100512107C (zh) 一种安全认证方法
CN113302894A (zh) 安全账户访问
CN110336870B (zh) 远程办公运维通道的建立方法、装置、系统及存储介质
CN100418033C (zh) 一种底层身份认证的计算机系统和方法
WO2023040326A1 (zh) 摄像头的入网方法、配置服务器、摄像头及安防系统
CN106856471B (zh) 802.1x下ad域登录认证方法
US20230092275A1 (en) Device management based on blockchain network
US9246902B1 (en) Device-agnostic user authentication
US20160070895A1 (en) Verification that an authenticated user is in physical possession of a client device
KR20180039037A (ko) 온라인 서비스 서버와 클라이언트 간의 상호 인증 방법 및 시스템

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22868703

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE