WO2023088040A1 - 摄像头控制方法及装置 - Google Patents

摄像头控制方法及装置 Download PDF

Info

Publication number
WO2023088040A1
WO2023088040A1 PCT/CN2022/127049 CN2022127049W WO2023088040A1 WO 2023088040 A1 WO2023088040 A1 WO 2023088040A1 CN 2022127049 W CN2022127049 W CN 2022127049W WO 2023088040 A1 WO2023088040 A1 WO 2023088040A1
Authority
WO
WIPO (PCT)
Prior art keywords
camera
application
application program
cameras
access
Prior art date
Application number
PCT/CN2022/127049
Other languages
English (en)
French (fr)
Inventor
史豪君
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2023088040A1 publication Critical patent/WO2023088040A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/60Control of cameras or camera modules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/60Control of cameras or camera modules
    • H04N23/617Upgrading or updating of programs or applications for camera control

Definitions

  • the present application relates to the field of camera control, in particular to a camera control method and device.
  • an embodiment of the present application provides a method for controlling a camera, the method comprising:
  • the access right record is used to record at least one first camera that the corresponding application is allowed to call and the first access right of the corresponding application to access the corresponding first camera,
  • the at least one first camera is part or all of the installed multiple cameras;
  • the corresponding invocation strategy and the corresponding first access right determine the second camera that the first application program can currently call from the at least one first camera and determining a second access right of the second camera;
  • the method further includes:
  • At least one third camera that is allowed to be accessed by the second application program is determined from a plurality of installed cameras, and A third access authority corresponding to each of the third cameras, where the third access authority includes control authority and/or data authority;
  • the access permission record of the second application program is updated according to the at least one third camera and the third access permission corresponding to each third camera, where the second application program includes the first application program.
  • updating the access permission record of the second application program according to the at least one third camera and the third access permission corresponding to each third camera includes:
  • the third camera and the corresponding third access authority are respectively determined as the first camera and the corresponding first access authority, and recorded in the access authority record of the second application program.
  • updating the access permission record of the second application program according to the at least one third camera and the third access permission corresponding to each third camera includes:
  • the method further includes:
  • the camera type of each of the cameras is set and the camera application scenarios corresponding to the exclusive camera and the shared camera are set, and the camera types of each of the cameras include exclusive, shared Either of classes and generic classes;
  • a mapping relationship between the application type and the camera is established, including:
  • the method further includes:
  • the first application is determined from the at least one first camera according to the current invocation status of each of the first cameras, the corresponding invocation strategy and the corresponding first access right.
  • the second camera currently capable of being called by the program and determining the second access right of the second camera include at least one of the following operations:
  • the first camera includes a dedicated camera, determine the dedicated camera whose current calling state is idle among the dedicated cameras as the second camera, and determine the corresponding first access authority as the corresponding first access right. 2. Access rights;
  • the first camera includes a shared camera, determine the shared camera whose current invocation status is idle among the shared cameras as the second camera, and determine the corresponding first access authority as the corresponding first access right. 2. Access rights;
  • the shared camera whose current invocation status is used among the shared cameras is determined as the second camera, and the data class in the corresponding first access authority is determined as the second camera.
  • the permission is determined as the corresponding second access permission
  • the general-purpose camera is determined as the second camera, and the corresponding first access right is determined as the corresponding second access right.
  • granting the second access authority of the second camera to the first application program includes: if there are multiple second cameras, determining a plurality of second cameras the target camera in the target camera; granting the second access permission of the target camera to the first application program.
  • determining a target camera among the multiple second cameras includes any one of the following operations:
  • the camera that was last called by the first application program among the plurality of second cameras is determined as the target camera.
  • receiving the camera selection report sent by the first application program, and determining the camera indicated in the camera selection report among the multiple second cameras as the target camera includes:
  • the camera selection report is used to indicate the selected target camera among the plurality of second cameras, and the target camera is selected by the first application program according to the detection determined by the user's operation in response to the camera selection prompt;
  • the method further includes:
  • the second camera invoked by the first application program is a general-purpose camera and multiple control commands for controlling the second camera are received at the same time, then determine a priority response control command from the multiple control commands;
  • a priority response control instruction is determined from multiple control instructions, including:
  • the priority of the application program is determined according to the application type of the application program.
  • an embodiment of the present application provides a data transmission device, including: a processor; a memory for storing instructions executable by the processor; wherein, the processor is configured to implement the first step when executing the instructions.
  • a data transmission device including: a processor; a memory for storing instructions executable by the processor; wherein, the processor is configured to implement the first step when executing the instructions.
  • a non-volatile computer-readable storage medium stores computer program instructions thereon, and when the computer program instructions are executed by a processor, the first aspect or various possible implementation manners of the first aspect are realized One or several camera control methods.
  • a computer program product includes computer-readable codes, or a non-volatile computer-readable storage medium bearing computer-readable codes, when the computer-readable codes are run in an electronic device, the The processor in the electronic device executes the camera control method in the first aspect or in one or more possible implementation manners of the first aspect.
  • FIG. 1 shows a schematic diagram of a prompt for an application program in a mobile phone to apply for a camera permission in the related art.
  • Fig. 2 shows a schematic diagram of an application scenario of a method for controlling a camera according to an embodiment of the present application.
  • Fig. 3 shows a flowchart of a method for controlling a camera according to an embodiment of the present application.
  • Fig. 4 shows a schematic flowchart of a method for controlling a camera according to an embodiment of the present application.
  • 5A-5C show schematic diagrams of a first prompt according to an embodiment of the present application.
  • Fig. 6 shows a schematic diagram of displaying permission of a camera by a car machine through an interface according to an embodiment of the present application.
  • Fig. 7 shows a structural block diagram of a control device according to an embodiment of the present application.
  • terminal devices such as mobile phones and tablets are equipped with at least one camera
  • the application program in the terminal device can apply for the permission to use the camera when it is first installed on the terminal device and opened by the user.
  • the permission includes whether to use the camera and The time the camera is used.
  • FIG. 1 shows a schematic diagram of a prompt for an application program in a mobile phone to apply for a camera permission in the related art.
  • the camera authorization in the related technology is granted to application 1 as a unified authorization for all cameras including the front and rear cameras of the mobile phone.
  • the use permission does not grant the use permission to the front and rear cameras separately, and the granularity of the camera use permission authorization is too rough, which is only applicable to relatively simple camera usage scenarios.
  • the terminal device if it is detected that the user wants to use the camera through application 2, the terminal device will stop the use of the camera by application 1, and then control the camera to be used by application 2. That is, at the same time, the camera can only be used by one application program, which restricts the user from calling the camera through the application program, so that the user cannot use the same camera through multiple application programs at the same time.
  • a car includes a camera 1 for driving recording, a camera 2 for reversing image display, a camera 3 for assisting driving, and a camera 4 for monitoring the safe driving of the driver in the car.
  • the user opens the driving record application C, the driver monitoring application A, and the assisted driving application in order to ensure driving safety while driving the car.
  • Cameras 1, 3, and 4 all need to be turned on, and they are different applications.
  • the program sends the collected data.
  • the data of cameras 1, 3, and 4 will only be used by the corresponding applications, and will not be authorized to be used by other applications controlled by the on-board installation in the car.
  • the car machine can be installed inside the car, and the screen of the car machine is installed on the center console. Users can install various applications in the car machine, such as music playback applications, video playback applications, etc.
  • the driver can By clicking on the user interface displayed on the screen of the car, you can control the various applications in the car and set the functions of the car. For example: the driver can click on the virtual button of the function of automatically closing all windows when the car is locked to close all the windows of the car when the car is locked.
  • the driver can click the icon of the music playing application on the car machine to enter the application and select a song to play.
  • the prior art does not provide an achievable way to authorize the use of multiple cameras separately.
  • the camera authorization methods for mobile phones, tablets, etc. given in the prior art are used to authorize and control multiple cameras in the car, It will happen when the camera 4 is being used for assisted driving. If other applications use the camera 4, the camera 4 will send data to the new application. No longer sending data to the assisted driving application will make the assisted driving application
  • the data of the program is interrupted, and the driver cannot be normally assisted in driving, which seriously endangers driving safety.
  • the application A controls the driver monitoring camera 4 to turn on to obtain the driver's face information, so as to be able to send a reminder message in time when the driver is tired of driving.
  • application B also obtains the control authority of the driver's monitoring camera, and sends a zoom image instruction to the camera 4, it will cause the face information obtained by application A to be generated based on the zoom image, thereby affecting The fatigue driving monitoring function of application A was compromised, which endangered the driving safety of the driver.
  • the user has controlled the driving recording camera 1 through the application program C during driving, and when the user sees a beautiful scene, the user starts the application program D and wants to record the scene.
  • the user in order to record a clear scene video through the application program D, the user partially zooms in on the picture of the camera 1 and shoots it. At this time, what application C gets is the enlarged driving video, which may not be able to record traffic normally in the event of a traffic accident, and may even have unrecorded reference images related to traffic accidents in the driving video , making the driving video lose its due effect.
  • the intelligent robot is equipped with an obstacle detection camera M, so that the robot can realize the automatic obstacle avoidance function by analyzing the images collected by the camera M.
  • the user wants to experience the perspective of the robot, he can obtain the control authority of the obstacle detection camera M through an application program 7 (which has obtained the use authority of the camera M).
  • embodiments of the present application provide a method and device for controlling a camera. It can realize precise management and control of the camera authority authorization control of the main body with multiple cameras installed, and control each camera according to the type of camera and the type of application program that calls each camera, so as to ensure the normal operation of the main body and realize the classification and classification of cameras Control to meet the needs of users in complex application scenarios using multi-camera subjects.
  • a smart car will be used as the main body installed with multiple cameras as an example, and the implementation of the camera control method and device will be described. The implementation of the camera control method and device will not be described in detail.
  • Fig. 2 shows a schematic diagram of an application scenario of a method for controlling a camera according to an embodiment of the present application.
  • Fig. 3 shows a flowchart of a method for controlling a camera according to an embodiment of the present application.
  • a camera C1 for driving record As shown in FIG. 2 , it is assumed that multiple cameras are installed in the car 10 , including: a camera C1 for driving record.
  • the rear view auxiliary monitoring camera C2 is used for monitoring the rear seats in the car.
  • Camera C3 for lane keeping assistance in assisted driving.
  • Camera C4 for driver safety monitoring.
  • the camera C5 is used to realize reverse assist in assisted driving.
  • Camera C6 for in-car entertainment for drivers and passengers.
  • the camera C7 used to monitor the cockpit of the car 10 .
  • the application program installed in the car machine 10 in the car 10 can call the camera of the car 10 .
  • the application program installed in the car 10 may include the built-in application program that can call the camera that matches the various functions of the car 10, for example, for driving record, driver monitoring, rear view monitoring, lane keeping assistance, reversing assistance , In-car entertainment camera control applications.
  • the application programs installed in the car 10 may also include application programs downloaded and installed by users according to their own needs, and so on.
  • the camera control method provided in the present application includes a setting stage step and a using stage step.
  • the "setting stage steps” can be performed before the actual use of the subject, and the research and development personnel of the subject can ensure that the subsequent "use stage steps” can be carried out as usual through the execution of each step in the "setting stage steps”.
  • the steps of the "setting stage” can be performed by the main body itself (such as a processor in the main body for controlling the main body and other control devices), external equipment that does not belong to the main body and is used for configuration of the main body, and so on.
  • the main body is a car
  • the research and development personnel of the car can use the car machine or the equipment that realizes the configuration of the car before the car leaves the factory to perform various steps in the setup stage before the car leaves the factory.
  • the developer of the robot can use the internal control device of the robot or the equipment configured before the robot leaves the factory to perform various steps in the setup stage before the robot leaves the factory.
  • the "setting stage steps" may include step S11-step S16.
  • the “steps in the use phase” can be applied to the main body and executed by the control device of the main body, so that the control device of the main body can control the camera according to the steps of the use phase during the user's use of the main body.
  • the "use phase steps” may include step S21-step S28.
  • the Set Phase Step is executed before the Use Phase Step.
  • the interval between the completion of the execution of the "setting stage step” and the start of the "use stage step” is not fixed.
  • the "use stage step” can be executed repeatedly, and the "use stage step”
  • the Setup Phase Step can no longer be executed before execution.
  • the "setting stage steps” are executed before the car leaves the factory, and the car machine only executes the "use stage steps” during the period when the car leaves the factory for use by users, and the "setting stage steps” are no longer executed.
  • the implementation of the "setting stage step” and "use stage step” will be described below with reference to examples.
  • the camera-related parameters of each camera to be controlled are determined.
  • the camera-related parameters may refer to parameters that are related to the cameras and can be used for subsequent classification of camera types and application scenarios.
  • the camera-related parameters may include: the function usage of the camera.
  • the installation parameters of the camera in the main body such as installation location, lens orientation, etc.
  • the type of subject where the camera is located for example, the type of subject may include: robot, vehicle, drone, and so on.
  • step S12 the camera type of each camera is set according to the camera-related parameters of each camera.
  • step S13 is executed after step S12 is executed. Wherein, step S13 may be performed after each camera type is determined, or step S13 may be performed after the types of all cameras in the subject are respectively determined.
  • step S12 multiple cameras installed in a vehicle or other main body may be directly divided into camera types according to different functional purposes of each camera.
  • Camera types can include: exclusive class (also called exclusive class, exclusive class, etc.), shared class (also called public class, shared class, etc.) and general class (also called common class, general class, etc. ).
  • the camera type of the camera can also be marked in a specific field in the configuration file of each camera whose camera type has been set, so that each camera can be passed in the subsequent "use phase step".
  • the configuration file determines the camera type of the camera. For example, assuming that the subject is a car 10 as shown in FIG.
  • the camera C1 may be determined to be a shared camera according to different functions and purposes of the camera.
  • Camera C2 is a dedicated camera.
  • Camera C3 is a shared camera.
  • Camera C4 is an exclusive camera.
  • Camera C5 is a shared camera.
  • Camera C6 is a general-purpose camera.
  • Camera C7 is a shared camera.
  • step S13 the type of the camera is determined, and if the camera is a dedicated camera or a shared camera, step S14 is executed. In the case that the camera is a general-purpose camera, step S15 is performed.
  • step S14 a camera application scene corresponding to the camera is set. And after step S14 is completed, step S15 is executed.
  • step S14 if the camera is a dedicated camera or a shared camera, the camera application scenario corresponding to the camera may be determined according to camera-related parameters of the camera. Due to the different actual functions of dedicated cameras and shared cameras in different subjects, according to the subject on which the cameras are installed, and the functions of dedicated cameras and shared cameras, each dedicated camera and each shared camera can be assigned Set the applicable camera application scenarios. Wherein, the camera application scenarios of cameras with different functional purposes may be different. There may be one or more camera application scenarios corresponding to the same camera. For example, assuming that the subject is a car 10 as shown in FIG.
  • camera application scenarios may include: driving recording scenarios, driver safety monitoring scenarios, cockpit monitoring scenarios, rearview assistance scenarios, reversing assistance scenarios, and lane keeping assistance scenarios ,etc.
  • the camera application scene corresponding to the camera C1 (shared camera) in Fig. 2 is the driving recording scene
  • the camera application scene corresponding to the camera C2 (exclusive camera) is the rear view auxiliary scene.
  • the camera application scene corresponding to the camera C3 (shared camera) is the lane keeping assistance scene.
  • the camera application scene corresponding to the camera C4 (exclusive camera) is the driver safety driving monitoring scene.
  • the camera application scene corresponding to the camera C5 (shared camera) is the reversing assistance scene.
  • the camera application scene corresponding to the camera C7 (shared camera) is the cockpit monitoring scene.
  • step S15 a mapping relationship between cameras and application types is established. And step S16 is executed after step S15 is executed.
  • step S15 it is possible to first determine all the application programs that the subject can install and determine the application type of each application program to obtain multiple application types; then determine the corresponding application type according to each application type.
  • the dedicated camera or shared camera that matches the camera application scenario and the program application scenario can be determined as the application of the application type corresponding to the program application scenario
  • the dedicated camera or shared camera that matches the camera application scenario and the program application scenario can be determined as the application of the application type corresponding to the program application scenario
  • the general-purpose camera can be determined as the camera that can be called by the application program of the application type corresponding to the application scenario of the program, and the application type corresponding to the application scenario of the program and the general-purpose camera can be established.
  • the camera that can be invoked by the application corresponding to the application type of the program application scene and the camera application scene can be set as a general-purpose camera, so that the same application type can only be used with one There is a mapping relationship between different types of cameras.
  • it is also possible to set the general-purpose camera to correspond to all application types then there is a mapping relationship between the application type that matches the program application scene and the camera application scene and the matching shared camera or dedicated camera, and the There is also a mapping relationship between the application type and the general-purpose camera; for the application type that does not match the application scene of the program and the application scene of the camera, there is only a mapping relationship with the general-purpose camera.
  • applications of all application types can call general-purpose cameras, and cameras whose program application scenarios match the camera application scenarios can call general-purpose cameras and shared or dedicated cameras whose camera application scenarios match the program application scenarios.
  • whether the application scene of the program matches the application scene of each camera can be determined by the degree of scene similarity. The higher the scene similarity, the higher the matching degree.
  • a similarity threshold can be set in advance, and if the similarity between the program application scene and the camera application scene is greater than or equal to the similarity threshold, it can be determined that the program application scene matches the camera application scene. For example, assuming that the similarity threshold is 80%, if the similarity between the program application scene and a certain camera application scene is greater than or equal to 80%, it can be determined that the camera application scene matches the program application scene.
  • the camera application scene corresponding to the camera C1 (shared camera) is the driving recording scene
  • the camera application scene corresponding to the camera C2 (exclusive camera) is the rear view auxiliary scene.
  • the camera application scene corresponding to the camera C3 (shared camera) is the lane keeping assistance scene.
  • the camera application scene corresponding to the camera C4 (exclusive camera) is the driver safety driving monitoring scene.
  • the camera application scene corresponding to the camera C5 (shared camera) is the reversing assistance scene.
  • the camera application scene corresponding to the camera C7 is the cockpit monitoring scene.
  • Camera C6 is a general-purpose camera.
  • step S15 when determining that the application types of the application programs that can be installed on the car 10 include: application type 1, application type 2 ... application type 9, the program application scenario corresponding to each application type can be determined ( As shown in Table 1 below), and then determine the mapping relationship between application type 1, application type 2 ... application type 10 and the camera of the car 10 based on the implementation of the above-mentioned step S15 (as shown in the following table 1), the following table is obtained The application type and camera mapping relationship table shown in 1.
  • mapping relationship between application type 1, application type 2 ... application type 9 and camera C6 there is a mapping relationship between application type 1 and camera C4. There is a mapping relationship between application type 2 and camera C2. There is a mapping relationship between application types 3 and 4 and camera C3. There is a mapping relationship between application type 6 and camera C5. There is a mapping relationship between application types 7 and 8 and camera C7. There is a mapping relationship between application type 9 and camera C6. Then, from the analysis of the permission to call the camera, it can be determined that:
  • the application of application type 1 has the permission to call cameras C4 and C6.
  • the application program of application type 2 has the permission to call cameras C2 and C6.
  • the application of application type 3 has the permission to call the cameras C1 and C6.
  • the application program of application type 4 has the permission to call the cameras C3 and C6.
  • the application program of application type 5 has the permission to call the cameras C3 and C6.
  • the application program of application type 6 has the permission to call the cameras C5 and C6.
  • the application of application type 7 has the permission to call the cameras C7 and C6.
  • the application program of application type 9 has the permission to call the camera C6.
  • the classification type corresponding to the application can also be set according to the application of different application types, and the classification type of the application can be one of the general class, shared class and exclusive class .
  • the classification type of the application may be set to general-purpose. If the cameras mapped to the application type of the application include general-purpose cameras and shared cameras, the classification type of the application can be set to the shared type. If the cameras mapped to the application type of the application include general-purpose cameras and dedicated cameras, the classification type of the application can be set to the dedicated category. Then the general-purpose application program can access the general-purpose camera.
  • Shared applications can access shared cameras and common cameras.
  • Exclusive class applications can access exclusive class cameras and general class cameras.
  • step S16 the calling strategy of each type of camera is determined.
  • corresponding invocation strategies may be set for different camera types according to the usage characteristics of different camera types, so as to ensure normal control of the cameras.
  • Exclusive cameras can also be called exclusive cameras, exclusive cameras, etc.
  • the dedicated camera may be installed in the main body and has a specific function and is exclusively used by an application program, for example, the driver safety driving monitoring camera C4 installed on the car 10 in FIG. 2 .
  • the invocation policy of the exclusive camera may include: each exclusive camera can only be called by an application program that first applies for invoking the exclusive camera and whose application type corresponds to the exclusive camera at the same time; and The application that is calling the exclusive class camera has full access to the exclusive class camera. Among them, the full access permission includes the control permission and data permission to the exclusive camera. In this way, the application that is calling the dedicated camera can exclusively use the dedicated camera to avoid interference from other applications.
  • the camera C4 (exclusive camera) is always only used by the application program for monitoring the driver's safe driving.
  • the application programs 1, 2, and 3 that can realize the driver's safe driving monitoring are installed in the car 10, the car machine 100, and it is assumed that the application program 1 is calling the camera C4 to monitor the driver's safe driving at a certain moment, and at this time, if the car
  • the mobile phone 100 detects that the application program 2 also applies for calling the camera C4, and since the mobile phone 100 determines that the camera C4 has been called by the application program 1 at this time, it will reject the application program 2 to call the camera C4.
  • Shared cameras can also be called shared cameras, shared cameras, etc.
  • the shared camera may be installed in the main body and has specific functions that can be called by multiple applications, for example, the driving recording camera C1 installed on the car 10 in FIG. 2 .
  • the calling policy of the shared camera may include: each shared camera may be called by one or more application programs whose application types correspond to the shared camera at the same time. And when there are multiple applications that call the shared camera, the application that first applies for calling the shared camera has full access to the shared camera, and the rest of the applications only have the data permission of the shared camera .
  • the application that first applies for calling the shared camera can use the shared camera completely and exclusively, avoiding the interference of other applications, and other applications have the data permission of the shared camera to ensure that these applications can Use the data collected by this shared camera.
  • the car machine 100 receives the call of the camera C1 by the application program 4
  • the car machine 100 judges that the camera C1 Having been called by the application program of the driving record
  • the car device 100 will allow the application program 4 to call the camera C1 and grant the application program 4 the data type permission to the camera C1.
  • a general-purpose camera can also be called a general-purpose camera, a general-purpose camera, etc.
  • the general-purpose camera may be installed in the main body and has no specific function that can be called by multiple application programs, for example, the in-car entertainment camera C6 installed on the car 10 in FIG. 2 .
  • the calling strategy of the general-purpose camera may include: each general-purpose camera may be called by one or more application programs whose application types correspond to the general-purpose camera at the same time. And each application that calls the general-purpose camera has full access authority to the general-purpose camera. Wherein, if multiple application programs send control commands to the general-purpose camera at the same time, the multiple control commands can be screened according to the preset response rules, and the priority response control command among the multiple control commands can be determined.
  • control instruction may be an instruction corresponding to the control permission and/or the data permission of the camera.
  • the response rule may include: determining a priority response control instruction from multiple control instructions according to a sequence of priorities of applications corresponding to each control instruction.
  • the priorities of different application types can be set in advance, for example, the priority order of the application types can be set from high to low as: the application type corresponding to the dedicated camera, the application type corresponding to the shared camera Application type, the application type corresponding to the general-purpose camera. That is, the order of priority of the application types may be set from high to low as follows: application types whose category type belongs to the exclusive category, application types whose category type belongs to the shared category, and application types whose category type belongs to the general category.
  • the response rule may also include: if there are multiple application programs with the highest priority among the multiple application programs that send control instructions to the general-purpose camera at the same time, then it may also be based on the application program corresponding to each control instruction.
  • the historical use records further select the priority response control command from the multiple control commands with the highest priority in the application program.
  • the content recorded in the historical use record may include the frequency of use of the application, the total duration of use, the interval between the last use and the current time, and other data representing the historical use of the application.
  • the control instructions corresponding to the application programs with high usage frequency, long total usage duration, and short interval duration may be determined as priority response control instructions.
  • the use status evaluation value of each application program can be determined according to the historical use records of each application program, and then the application with the highest use status evaluation value among the "multiple control instructions with the highest application priority level" The control instruction of the program is determined as the priority response control instruction.
  • a corresponding weight value can be set for each type of historical usage records, and then the usage status evaluation value of the application program can be calculated in a weighted summation manner. For example, assume that the camera C6 in the car 10 shown in FIG. 2 is called by the application programs a, b, c, d, and e at the same time, and all five application programs send control instructions to the camera C6 at the same time.
  • the control instruction sent by application e may be determined as the priority response control instruction. For example, if it is determined according to the priority levels that the three application programs a, b, and c have the same priority levels and are higher than the application programs d, e. Then the usage status evaluation values of the application programs a, b, and c can be calculated respectively, and then the application program with the highest usage status evaluation value among the application programs a, b, and c, such as the control command issued by the application program a, is determined as the priority response Control instruction.
  • the response rule may only be: according to the historical use record of the application program corresponding to each control instruction, select a priority response control instruction from multiple control instructions.
  • the control instructions corresponding to the application programs with high frequency of use, long total use time, and short interval time can be determined as priority response control instructions.
  • the control instruction using the application program with the highest status evaluation value may be determined as the priority response control instruction. For example, assume that the camera C6 in the car 10 shown in FIG. 2 is called by the application programs a, b, c, d, and e at the same time, and all five application programs send control instructions to the camera C6 at the same time. Then, if it is determined that application program d has the highest usage status evaluation value among application programs a, b, c, d, e, the control instruction issued by application program d may be determined as a priority response control instruction.
  • the access permission of the application program to each camera includes control permission and/or data permission to the camera, and the full access permission includes control permission and data permission.
  • the control permission can be the control permission that can change the way the camera collects images or changes the image or video captured by the camera.
  • the application After the application has the control permission, it can control the camera based on the user operation detected by the application.
  • the mode of the image or video, or the content of the captured image or video itself is adjusted or processed to change the image or video captured by the camera that is finally obtained by all applications that are currently calling the camera.
  • the control of the camera by the control authority may include: automatic or manual control of the exposure, focus, and white balance of the camera. Control the zoom, shooting angle, etc. of the image captured by the camera. Control whether the camera flash is on or not, for example, automatically adjust the flash on or off according to the intensity of the light, and manually control the flash on or off. Control the picture effect of the image or video captured by the camera, for example, add filters to the captured image, perform beautification, cropping, correction, etc., and set the algorithm for processing the image or video captured by the camera.
  • the data type permission can be the control permission to obtain and further display or store the data collected by the camera.
  • the application program After the application program has the data type permission, it can obtain the image or video collected by the camera based on the user operation detected by the application program. , will not change the image or video captured by the camera that is finally obtained by all applications that are currently calling the camera.
  • the control of the camera by the data permission can include: preview permission, which controls the preview of the image collected by the camera, so that the application that detects the user's preview operation can obtain the data collected by the camera to obtain the real-time image collected by the camera and then provide the user Display realizes preview, which allows users to watch the images captured by the camera in real time in the form of preview.
  • the permission to take pictures is to control the pictures collected by the camera, so that the application that detects the user's photo taking operation can obtain the data collected by the camera to obtain the real-time images collected by the camera, and then take pictures for the user.
  • Recording permission which controls the recording (or filming, shooting, etc.) of the images collected by the camera, so that the application that detects the user's recording operation can obtain the data collected by the camera to obtain the video (or video recording) recorded by the camera in real time ).
  • Real-time thumbnail permissions to obtain part or all of the data collected by the camera to obtain "small images” with a small amount of data, so as to further control the analysis and processing of "small images", so that the user's real-time thumbnails can be detected
  • the operating application can obtain the "small image” of the image captured by the camera for analysis and processing, and feedback the results of the analysis and processing to the user, allowing the user to make further responses based on the results of the analysis and processing.
  • "Small images” may refer to images that are smaller in size and/or smaller in resolution than the images captured by the camera in real time, which can facilitate the analysis and processing of "small images” by applications and improve the speed of analysis and processing .
  • AR applications can obtain continuous data streams of "small images” when they have real-time thumbnail permissions, so that AR applications can generate AR virtual images in real time and realize AR navigation functions.
  • the application programs that can be installed by the subject, the application types of the application programs, and the application scenarios of the programs may change, which may cause the difference between the camera and the application type.
  • the mapping relationship between cameras changes, and in order to optimize the user experience of using cameras, manufacturers of vehicles and other subjects may also continuously update the calling strategies of some or all types of cameras. Therefore, the subject can regularly update the "mapping relationship between cameras and application types" and/or "the calling strategy of each type of camera".
  • the update process may be initiated by the subject to the server and/or initiated by the server to the subject.
  • the calling strategy, camera type, camera application scene, mapping relationship between camera and application type, and application classification type can be stored in the read-only memory of the car, so as to reduce the risk of these information being maliciously modified. Probability of occurrence, to ensure the normal and safe operation of the subject.
  • the user may be allowed to modify at least one of the call strategy, camera type, camera application scenario, mapping relationship between camera and application type, and application classification type, In order to increase the manipulability of the user terminal and meet the diverse needs of users.
  • Fig. 4 shows a schematic flowchart of a method for controlling a camera according to an embodiment of the present application.
  • the car machine the control device of the main body
  • the "use stage step” may include: authority Authorization and camera calls.
  • Authorization authorization includes steps S21-S24.
  • authorities Authorization the in-vehicle device realizes the camera authorization authorization of different applications and the authorization selected by the user, and completes the storage of access authorization records for each application.
  • “Camera call” includes step S25-step S26, and the car machine can perform camera call control according to the access authority record.
  • the second application program is used to execute step S31-step S34 in "Authorization Authorization".
  • the second application program may be any application program installed in the vehicle.
  • “camera call” is a step that will be executed every time the first application calls the camera to use the CRRC; and "permission authorization” is actually the previous step of the "use phase step", which can only be performed when the request condition is met. In the case of , it is executed by the second application program (the second application program includes the first application program involved in "camera call”).
  • step S31 the second application sends an access request when it is determined that the request condition is met.
  • the request condition may include at least one of the following: the second application is opened and used for the first time and the second application needs to obtain camera access permission while the second application is running, the second application is opened and the second application The program does not have the camera access it needs to run. In this way, the second application program can issue an access request when it needs to obtain the camera access permission and has not obtained the camera access permission itself.
  • step S21 the vehicle machine receives an access request for applying for camera access permission, and determines the second application program corresponding to the access request.
  • the access request may indicate a second application that requests the camera access permission.
  • the access request may include a program identification for indicating that the second application program is one of the multiple application programs installed in the car machine (the control device of the main body), and the program identification may be the name, number, etc. of the application program that can be identified Application information, this application does not limit this.
  • the vehicle machine (control device of the main body) of the car can determine the second application program that sends the access request according to the program identifier in the access request.
  • the car unit can also directly determine the application program that issued the access request as the second application program.
  • step S22 as shown in Fig. 3 and Fig. 4, according to the mapping relationship between the application type of the second application program, the camera and the application type, it is determined from a plurality of installed cameras that the second application program is allowed to access at least one third camera and third access rights for each third camera.
  • the car machine in step S22, can determine from the multiple installed cameras according to the application type of the second application program and the mapping relationship between the camera and the application type that the car machine allows the second At least one third camera accessed by the app.
  • the access request may also include the application type of the second application program, and in step S22, the car-machine may directly use the mapping relationship between the application type in the access request, the locally stored camera, and the application type (above According to the mapping relationship determined in step S15 above), at least one third camera that is allowed to be accessed by the second application program is selected from the plurality of cameras installed in the car where the car machine is located.
  • the car machine can directly obtain the program type of the second application from the program configuration file of the second application, and then in step S22 According to the determined application type, the mapping relationship between the locally stored camera and the application type, CRRC can select at least one third camera that is allowed to be accessed by the second application program from multiple cameras installed in the car where the car is located .
  • the car machine can determine according to Table 1 that the second application program is allowed
  • the third camera accessed by the program includes camera C3 and camera C6.
  • the car machine may first screen out at least one candidate camera corresponding to the classification type from multiple cameras according to the classification type of the second application program. Then if the alternative cameras are all general-purpose cameras, then the alternative camera is directly determined as the third camera; The mapping relationship determines at least one third camera that is allowed to be accessed by the second application program from the candidate cameras. For example, assuming that the second application program is a shared application program, all shared cameras and general-purpose cameras can be determined as the third camera, and then determined according to the mapping relationship between the camera and the application type. The application type of the second application does not correspond to the non-selectable cameras, and finally determine the cameras in the alternative cameras except the non-selectable cameras as the third cameras.
  • the second application program is a dedicated application program
  • all dedicated cameras and general-purpose cameras can be determined as candidate cameras, and then determined according to the mapping relationship between the camera and the application type. For non-selectable cameras that do not correspond to the application type of the program, finally determine the cameras other than the non-selectable cameras among the optional cameras as the third cameras.
  • all general-purpose cameras may be determined as the third cameras. In this way, the process of determining the third camera can be simplified, and the speed of determining the third camera can be improved.
  • step S22 after determining at least one third camera or during the process of determining at least one third camera, the car machine can also determine the The second application program performs a third access right to each third camera, wherein the step of determining the third access right is an optional step.
  • the third access authority of the second application program to each third camera may include: having any one of full access authority (including control authority and data authority), data authority, and no authority .
  • the car machine determines the third access permission of each third camera, it can firstly determine the third access permission of each third camera according to the third camera.
  • the call record determines whether the third camera is always on and called. If the third camera is always on and called, the car machine can determine which type of third access authority the car machine can give the second application program to the third camera according to the calling strategy of the third camera. If the third camera is not always on and called, the car machine can determine that the third access right to the third camera that can be given to the second application program is full access right.
  • the camera C1 which is only used for driving recording, to be always on and invoked for driving recording and video recording in order to protect the safety of the vehicle.
  • the third camera includes camera C1, and according to the called record of camera C1, it is determined that camera C1 is always on and called, then according to the calling strategy of third camera C1 (such as the above-mentioned sharing camera-like calling strategy), it can be determined that the third access right of the second application program to the camera C1 is only a data-type right, and does not have the full access right of the camera C1 (that is, does not have the control-type right of the camera C1).
  • the third camera includes camera C4, and it is determined according to the called record of camera C4 that camera C4 is always on and called, then according to the calling strategy of the third camera C4 ( As described above (invoking strategy for exclusive cameras), it can be determined that the third access permission of the second application program to the camera C4 is no permission.
  • the third camera includes a camera C6, and it is determined that the camera C6 is always on and called according to the called record of the camera C6, then according to the calling strategy of the third camera C6 ( As described above (invoking strategy for general-purpose cameras), it can be determined that the third access right of the second application program to the camera C6 is the full access right.
  • step S23 as shown in Fig. 3 and Fig. 4, the first information of each third camera is sent, and the first information includes at least one of the camera identification of each third camera, the functional purpose of the camera, and the installation parameters. kind.
  • the first information may further include a third access right of each third camera.
  • step S32 may be executed.
  • the second application may display the first prompt to the user.
  • FIGS. 5A-5C show schematic diagrams of the first prompt according to an embodiment of the present application.
  • the first prompt may be used to remind the user of the third camera that the vehicle allows the second application program to invoke and access.
  • the first prompt may include at least one type of information in the first information.
  • the first prompt can be displayed to the user in a pop-up window, a sidebar, etc. Q11 as shown in FIG. 5A ), and/or a list (Q12 as shown in FIG. 5B ), etc.
  • the third camera is camera C1 and camera C6, then as shown in FIG. ) to display the first prompt, or as shown in FIG. 5A
  • the first prompt can be displayed for the user through a schematic diagram on the display screen of the vehicle.
  • the first prompt is used to remind the user that the vehicle machine allows the third camera to be called by the second application program, it can also be used to remind the user to select the user-specified second application from the third camera.
  • the program can invoke the first camera, and/or prompt the user to determine the first access right of the first camera.
  • the first access right may be an access right selected and determined by the user from third access rights of the third camera selected by the user as the first camera.
  • the third access authority of the third camera and the first selection control K1 corresponding to each third access authority may be displayed in the first prompt , and/or the second selection control K2 corresponding to each third camera.
  • the second selection control K2 can indicate whether the corresponding third camera is selected as the first camera by the user (as shown in Figures 5A and 5B, the state of K2 means that the corresponding third camera is selected as the first camera by the user, as shown in Figure 5C
  • the state of the corresponding K2 of the middle camera C6 means that C6 has been selected by the user not to be authorized to the second application program, and C6 is not the first camera).
  • the third access authority of the camera C1 includes: preview authority, photographing authority, video recording authority and real-time thumbnail image authority.
  • the third access authority of the camera C6 includes: exposure, focus, white balance control authority, zoom, flash, picture effect control authority, preview authority, photo authority, video recording authority and real-time thumbnail image authority.
  • the first selection control K1 can also indicate whether the corresponding third access right is currently authorized by the user to be assigned to the second application program (for example, the state of K1 shown in Figures 5A and 5B represents the corresponding third access right.
  • the authority is selected and authorized by the user to the second application program, as shown in Figure 5C, the state of K1 corresponding to the third access authority of the camera C6 indicates that the third access authority of C6 has been selected by the user not to be authorized to the second application program).
  • the second application program may control the second selection control K2 to determine that the user selects the determined first camera from the third cameras in response to the detected trigger operation of the user on K2 such as clicking or sliding.
  • the second application program may control the first selection control K1 to determine that the user selects the determined first access right from the third access rights in response to a detected trigger operation such as clicking or sliding by the user on K1.
  • the second application program may display the first prompt Q12 shown in FIG. 5B to the user according to the received first information.
  • the trigger operation of the second selection control K2 of the camera C6 by the user it is determined that the user chooses not to authorize C6 to the second application program call;
  • the trigger operation of K1" determines that the user does not authorize the "video recording authority and real-time thumbnail image authority" of C6 to the second application program.
  • the second application program shows the user the first prompt Q13 after the user operation is detected and the user's choice is determined as shown in Figure 5C. From Q13, the user can see that the third camera is the third access right of cameras C1 and C1 For preview permission and photo permission.
  • step S33 is an optional step.
  • step S33 the second application program can determine that the user specifies that the second application program in the third camera can Call the first camera and the first access to the first camera. If the first camera and the first access authority of the first camera are determined in step S33, then the second application program can also perform step S34.
  • step S34 the second application program sends a user-specified authority report to the car machine, and the user-specified authority report Can be used to indicate the first camera selected by the user from the third camera and the first access right of the first camera.
  • the user-specified permission report may include the camera identification of the first camera and the first access permission of the first camera; The camera identification of the third camera, the third access permission of the third camera, the user chooses not to authorize the access permission of the second application program control; and so on.
  • step S33 the authority adjustment operation is not detected in step S33, or in step S33 based on the authority adjustment operation, it is found that there is no change in the authority after adjustment (for example, all the third cameras are selected by the user as the third camera).
  • the third access authority of one camera and each third camera is the corresponding first access authority)
  • the second application program can directly execute step S34' after executing step S32 or not return any information to the vehicle.
  • step S34' the second application program returns a successful reception report to the vehicle machine, and the successful reception report is used to indicate that the second application program has successfully received the first information.
  • step S24 as shown in FIG. 3 and FIG. 4, the access authority record of the second application program is updated.
  • the access authority record records at least one first camera that the second application program can call upon authorization of the user and the first access authority corresponding to each first camera.
  • the in-vehicle device may directly transfer each third camera and the corresponding third access authority determined by the in-vehicle device to Update the access authority record of the second application program as the first camera and the corresponding first access authority. For example, if the car machine determines that camera C1 and camera C6 are the third camera, and the third access rights of C1 and C6 are both full access rights, then if the "reception success report" is received or any information from the second application program is not received Feedback, the car machine can directly use cameras C1 and C6 as the first camera, and the first access rights of C1 and C6 are both determined as full access rights, and these are recorded in the access rights record of the second application program to complete the second application Updates to the program's access rights record.
  • the car machine can determine the first camera specified by the user and the first access authority of each first camera according to the user-specified permission report after receiving the user-specified permission report, and update the record Go to the access authority record of the second application program, and complete the update of the access authority record of the second application program.
  • a specified storage space may be set locally on the vehicle to store access rights records of various application programs.
  • Each access permission record correspondingly records a first camera that can be invoked by the vehicle-machine application and authorized by the user, and the first access permission corresponding to the first camera.
  • the user can also set the camera access authority of each application installed in the car through the car. For example, the user can use the "Settings" function of the car to enter the functional interface that can set the permissions of each application program. In this interface, various permissions currently owned by each application program can be displayed. The car machine can update the permissions based on the user's operations on various permissions in the interface.
  • variable types of permissions may include camera permissions, and the interface can display the third camera that the car machine allows the corresponding application to access and the corresponding third access permissions, as well as the third camera that is authorized by the user. Camera and the first access to the first camera. Alternatively, the interface may also display other cameras that the car machine does not allow corresponding applications to access.
  • the authority update may include: if an adjustment operation for the first camera and the first access authority of the first camera is detected, then determine the first camera corresponding to the adjusted application program and the first access authority of the first camera, and perform corresponding The access rights record is updated.
  • FIG. 6 shows a schematic diagram of a vehicle-machine displaying camera permissions through an interface according to an embodiment of the present application.
  • the third camera, the first camera, and other cameras that the car machine does not allow the application program m to access are displayed in the interface Q2 through corresponding controls and signs, specifically: controls K31, K32, K41 and K42 All are user-operable controls, and B1 is the sign of prohibited access.
  • K31 and K32 can respectively indicate the first access authority and the third access authority in the access authority corresponding to the camera, K31 indicates that the corresponding access authority is the first access authority, and K32 indicates that the corresponding access authority is the third access authority but is currently blocked
  • K41 indicates that the corresponding camera is the third camera and the third camera has been selected by the user as the first camera
  • K42 indicates that the corresponding camera is the third camera but the application program m has been currently prohibited from being used by the user.
  • B1 is used to indicate that the corresponding camera is a camera that the vehicle machine does not allow the application program m to access.
  • the first camera of application program m is camera C1, and the first access authority of C1 is preview authority and photographing authority; the third camera of application program m is C1 and C6, and the third access authority of C1 is Preview permission, camera permission, video recording permission and real-time thumbnail permission, the third access permission of C6 is not shown in the figure (if it is detected that the control K42 corresponding to C6 is triggered to switch to K41, you can refer to C1 to show the third access of C6 permission); the camera that the car machine does not allow the application program m to access is the camera C5.
  • the car machine can switch K32 to K31, and can determine that the first access right of the first camera C1 of the application m is adjusted by the user to the preview right , Photo permission, video recording permission.
  • Steps S21 to S24 in the above "permission authorization” are to ensure that the finalized first camera of the second application program and the first access right of the first camera are obtained under the dual guarantees of vehicle permission and user authorization. And if the permissions granted by the vehicle to the application do not need to be specified by the user, there is another way to implement "permission authorization": when the vehicle detects that the second application is installed, receives an access request, or receives a call request, etc.
  • the mapping relationship between the application type and the camera determine at least one third camera that is allowed to be accessed by the second application program; and according to the called recording and calling strategy of the third camera, Determine the third access authority of the second application program to each third camera (refer to the implementation process of step S22 above). Then, the at least one third camera of the second application program is directly used as the first camera, and the third access right of each third camera is used as the corresponding first access right to update the record in the access right record. In this way, the implementation process of "permission authorization" can be simplified.
  • step S25 as shown in FIG. 3 , a call request for applying to call the camera is received, and a first application program corresponding to the call request is determined.
  • the first application program is any one of the above-mentioned second application programs.
  • the first application program may send a call request to the vehicle machine when it is determined that the camera call condition is met.
  • the camera invocation condition may be that the first application program is started spontaneously due to its own operation requirements, or may be an operation of the first application program in response to the user starting the camera, and the like.
  • the first application program is an application program w1 for taking photos and processing photos
  • the application program w1 detects that the user has issued an operation that needs to take pictures, it can be determined that the camera needs to be called, and a call request can be generated and sent to the car.
  • the first application program is an application program w2 that requires face recognition for login
  • the application program w2 detects that the user has issued an operation to start the application program w2
  • the call request may indicate the first application program that requests to call the camera.
  • the invocation request may include a program identifier for indicating which of the multiple application programs installed in the vehicle the first application program is, so as to indicate the first application program.
  • the vehicle-machine can determine the first application program that sends the calling request according to the program identification in the calling request.
  • the vehicle unit of the car may also directly determine the application program that issued the call request as the first application program.
  • step S26 as shown in FIG. 3 , after step S25 is executed, according to the access authority record of the first application, the first camera corresponding to the first application and the first camera that the first application accesses the first camera are determined. 1. Access rights.
  • the vehicle-machine after the vehicle-machine determines the first application program in step S26, it can obtain the permission access record of the first application program from the corresponding local storage space, and then determine the corresponding information of the first application program according to the permission access record.
  • step S27 as shown in FIG. 3, after step S26 is executed, according to the current invocation state of the first camera of the first application program, the corresponding invocation strategy and the corresponding first access authority, determine the The second camera that the first application program can currently call and the second access right of the second camera.
  • the car machine after the car machine determines at least one first camera corresponding to the first application program and the first access authority corresponding to each first camera in step S27, it can The type determines the calling strategy corresponding to the first camera. Then, according to the invocation strategy corresponding to each first camera and the current invocation state of the first camera, the second camera can be determined from at least one first camera, and the second access authority can be determined from the first access authority.
  • the current calling state of the first camera is an idle state or a used state. The idle state may indicate that the corresponding camera is not currently being called by other applications, and the used state may indicate that the corresponding camera is currently being called by other applications.
  • the first camera if the first camera is a dedicated camera and the call state of the first camera is in use, it can be determined that the first camera cannot authorize the first application to call, and the first camera cannot be used as a second camera. Camera. If the first camera is a dedicated camera and the calling state of the first camera is idle, then it may be determined that the first camera is the second camera, and the corresponding first access right is determined as the corresponding second access right.
  • the first camera is a shared camera and the invocation state of the first camera is in use, it can be determined that the first camera is the second camera, and the data class in the corresponding first access authority permission as the second access permission (for example, if the first access permission is full access permission, then the second access permission is the data category permission. If the first access permission is all permissions in the control category permission, preview permission (data category permission) ), photographing authority (data-type authority), then the second access authority is the data-type authority in the first access authority ("preview authority, photographing authority"). If the first camera is a shared camera and the invocation state of the first camera is idle, then it may be determined that the first camera is the second camera, and the corresponding first access right is used as the corresponding second access right.
  • the first camera is a general-purpose camera, no matter whether the first camera has been called by other applications, it can be determined that the first camera is the second camera, and the corresponding first access permission can be used as the corresponding secondary access rights for .
  • step S28 as shown in FIG. 3, after step S27 is executed, the second access right of the second camera is granted to the first application program.
  • the operation performed by the vehicle in step S28 may include: sending authorization information to the first application program, and the authorization information may indicate Granting the second camera to the first application and indicating which second access permissions the first application has got to the second camera.
  • the first application program may issue a camera selection prompt based on the received authorization information, and the camera selection prompt is used to remind the user to select one of the multiple second cameras. The first application currently needs to call the target camera immediately.
  • the first application program can determine the target camera in any of the following ways: according to the detected operation of the user in response to the camera selection prompt, select from multiple Select the target camera from the second camera. It is also possible to determine the camera preferred by the user among the plurality of second cameras as the target camera according to the camera invocation history of the first application program. It is also possible to determine, among the plurality of second cameras, the camera called last time by the first application program as the target camera according to the camera call history of the first application program. etc.
  • the first application program after the first application program determines the target camera, it can send a camera selection report to the car machine, so that the car machine can determine the selected target camera among the multiple second cameras based on the camera selection report, It also enables the first application program to acquire the data collected by the target camera in real time.
  • the first application program can directly control the display of the target generated according to the real-time data collected by the target camera on the display screen of the car machine. The images captured by the camera in real time.
  • the first application program may also display the camera switching control and/or at least one operation control corresponding to the second access authority of the target camera (for example, can A corresponding operation control is respectively set for each second access authority).
  • the first application when the first application obtains the target camera or the second camera (in the case of one second camera, there is no need to select the target camera, the second camera is the target camera) in real time
  • the first application program can directly control the display of the camera switching control and/or the second program corresponding to the target camera for the user on the display screen of the car machine. At least one operational control of the access right so that the user can perform camera switching and/or control the target camera.
  • the first application program when it detects a trigger operation such as clicking or sliding on any operation control issued by the user, it may generate a corresponding control based on the second access right corresponding to the triggered operation control.
  • instruction for example, if the second access authority corresponding to the triggered operation control is "photographing authority", the first application program can generate a control instruction for taking pictures. If the second access authority corresponding to the triggered operation control is "zoom permission", then the first application program can generate a control instruction for zooming out or zooming in on the target camera).
  • the first application program when the first application program detects that the user clicks or slides on the camera switching control, it can determine that the camera switching control is triggered, and then the first application program can follow the camera switching sequence (for multiple The camera switching sequence corresponding to the second camera can be arbitrary, and can also be arranged according to a set rule, which is not limited in the present application)
  • the target camera is switched to the next camera in the multiple second cameras. For example, assuming that the second camera that can be invoked by the first application program is camera C3, C5, and C6, and the camera switching sequence is C3, C5, and C6 from front to back, and the current target camera of the first application program is camera C3, if The first application program detects that the camera switching control is triggered and then switches the target camera to the camera C5.
  • the first application program may directly send the control instruction to the camera or send the control instruction to the car machine (so that the car machine The control command is forwarded to the camera), so that the target camera can respond to the control command in time.
  • the operations performed by the car-machine in step S28 may also include: when there is only one second camera, the car-machine The second camera can be directly determined as the target camera, and part or all of the data collected by the target camera in real time can be sent to the first application program according to the second access authority of the first application program to the target camera.
  • the car machine may also send a calling instruction to the target camera, where the calling instruction is used to instruct the first application program to call the target camera, and the first application program to call the second access authority owned by the target camera.
  • the controller inside the target camera can send part or all of the real-time data collected by the target camera to the first application program according to the second access authority of the first application program to the target camera.
  • the operations performed by the vehicle in step S28 may also include: when there are multiple second cameras, the vehicle The machine can directly determine the target camera according to the camera selection report. Or, in the case that there are multiple second cameras, if the vehicle does not receive a camera selection report, it can directly determine the target camera from multiple second cameras.
  • the calling history determines the camera preferred by the user among the plurality of second cameras as the target camera.
  • the car machine can also determine the camera that was last called by the first application program among the plurality of second cameras as the target camera according to the camera call history of the first application program. etc.
  • the target camera is a general-purpose camera
  • the target camera is currently called by multiple application programs (the multiple application programs include the first application program), and the vehicle machine (or target When the camera) receives control instructions from different application programs at the same time, it can select a priority response control instruction from multiple control instructions according to the response rules, and control the target camera to execute the priority response control instruction.
  • Fig. 7 shows a structural block diagram of a control device according to an embodiment of the present application.
  • the architecture of control devices such as car machines includes: application programs, camera service modules, and hardware physical modules.
  • the application program, the camera service module and the hardware physical module are used to perform some or all of the operations in each step.
  • Application program it can be used to realize the interaction with the user, and execute the above steps S31-S34.
  • Camera service module used to set the calling strategy of various types of cameras (execute the above step S16), and set the access rights of the cameras (control-type permissions and/or data-type permissions). It can also be used to execute the steps in "authorization authorization” (the above steps S21-step S24) and the steps in "camera calling” (the above-mentioned steps S25-step S28).
  • Hardware physical module used to set the camera type of each camera, define the camera application scenarios corresponding to dedicated cameras and shared cameras, and set the mapping relationship between application types and cameras.
  • the hardware physical module may execute the above steps S11-S15.
  • the application program involved in the camera control method of the present application may be an application program installed directly in the car machine, or an application program installed in a terminal device capable of remotely controlling the car machine .
  • Terminal devices can include cell phones, foldable electronic devices, tablet computers, laptop computers, handheld computers, notebook computers, ultra-mobile personal computers (UMPCs), netbooks, cellular phones, personal digital assistants assistant, PDA), augmented reality (augmented reality, AR) equipment, virtual reality (virtual reality, VR) equipment, artificial intelligence (AI) equipment, wearable equipment, vehicle equipment, smart home equipment, or smart city at least one of the devices.
  • augmented reality augmented reality, AR
  • VR virtual reality
  • AI artificial intelligence
  • wearable equipment wearable equipment
  • vehicle equipment smart home equipment
  • smart city at least one of the devices.
  • the embodiment of the present application does not specifically limit the specific type of the terminal device.
  • An embodiment of the present application also provides a camera control device, including: a processor and a memory for storing instructions executable by the processor; wherein the processor is configured to implement the above method when executing the instructions.
  • the embodiment of the present application also provides a non-volatile computer-readable storage medium, on which computer program instructions are stored, and the above-mentioned method is implemented when the computer program instructions are executed by a processor.
  • the embodiment of the present application also provides a computer program product, including computer-readable codes, or a non-volatile computer-readable storage medium carrying computer-readable codes, when the computer-readable codes are stored in the processor of the terminal device When running in the terminal device, the processor in the terminal device executes the above method.
  • a computer readable storage medium may be a tangible device that can retain and store instructions for use by an instruction execution device.
  • a computer readable storage medium may be, for example, but is not limited to, an electrical storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing.
  • Non-exhaustive list of computer-readable storage media include: portable computer disk, hard disk, random access memory (Random Access Memory, RAM), read only memory (Read Only Memory, ROM), erasable Electrically Programmable Read-Only-Memory (EPROM or flash memory), Static Random-Access Memory (Static Random-Access Memory, SRAM), Portable Compression Disk Read-Only Memory (Compact Disc Read-Only Memory, CD -ROM), Digital Video Disc (DVD), memory sticks, floppy disks, mechanically encoded devices such as punched cards or raised structures in grooves with instructions stored thereon, and any suitable combination of the foregoing .
  • RAM Random Access Memory
  • ROM read only memory
  • EPROM or flash memory erasable Electrically Programmable Read-Only-Memory
  • Static Random-Access Memory SRAM
  • Portable Compression Disk Read-Only Memory Compact Disc Read-Only Memory
  • CD -ROM Compact Disc Read-Only Memory
  • DVD Digital Video Disc
  • Computer readable program instructions or codes described herein may be downloaded from a computer readable storage medium to a respective computing/processing device, or downloaded to an external computer or external storage device over a network, such as the Internet, local area network, wide area network, and/or wireless network.
  • the network may include copper transmission cables, fiber optic transmission, wireless transmission, routers, firewalls, switches, gateway computers, and/or edge servers.
  • a network adapter card or a network interface in each computing/processing device receives computer-readable program instructions from the network and forwards the computer-readable program instructions for storage in a computer-readable storage medium in each computing/processing device .
  • Computer program instructions for performing the operations of the present application may be assembly instructions, instruction set architecture (Instruction Set Architecture, ISA) instructions, machine instructions, machine-related instructions, microcode, firmware instructions, state setting data, or in one or more source or object code written in any combination of programming languages, including object-oriented programming languages—such as Smalltalk, C++, etc., and conventional procedural programming languages—such as the “C” language or similar programming languages.
  • Computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer, or entirely on the remote computer or server implement.
  • the remote computer can be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or it can be connected to an external computer such as use an Internet service provider to connect via the Internet).
  • electronic circuits such as programmable logic circuits, field-programmable gate arrays (Field-Programmable Gate Array, FPGA) or programmable logic arrays (Programmable Logic Array, PLA), the electronic circuit can execute computer-readable program instructions, thereby realizing various aspects of the present application.
  • These computer-readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine such that when executed by the processor of the computer or other programmable data processing apparatus , producing an apparatus for realizing the functions/actions specified in one or more blocks in the flowchart and/or block diagram.
  • These computer-readable program instructions can also be stored in a computer-readable storage medium, and these instructions cause computers, programmable data processing devices and/or other devices to work in a specific way, so that the computer-readable medium storing instructions includes An article of manufacture comprising instructions for implementing various aspects of the functions/acts specified in one or more blocks in flowcharts and/or block diagrams.
  • each block in a flowchart or block diagram may represent a module, a portion of a program segment, or an instruction that includes one or more Executable instructions.
  • the functions noted in the block may occur out of the order noted in the figures. For example, two blocks in succession may, in fact, be executed substantially concurrently, or they may sometimes be executed in the reverse order, depending upon the functionality involved.
  • each block in the block diagrams and/or flowcharts, and combinations of blocks in the block diagrams and/or flowcharts can be implemented with hardware (such as circuits or ASIC (Application Specific Integrated Circuit, application-specific integrated circuit)), or it can be realized by a combination of hardware and software, such as firmware.
  • hardware such as circuits or ASIC (Application Specific Integrated Circuit, application-specific integrated circuit)
  • firmware such as firmware
  • each block in a flowchart or block diagram may represent a module, a portion of a program segment, or an instruction that includes one or more Executable instructions.
  • the functions noted in the block may occur out of the order noted in the figures. For example, two blocks in succession may, in fact, be executed substantially concurrently, or they may sometimes be executed in the reverse order, depending upon the functionality involved.
  • each block in the block diagrams and/or flowcharts, and combinations of blocks in the block diagrams and/or flowcharts can be implemented with hardware (such as circuits or ASIC (Application Specific Integrated Circuit, application-specific integrated circuit)), or it can be realized by a combination of hardware and software, such as firmware.
  • hardware such as circuits or ASIC (Application Specific Integrated Circuit, application-specific integrated circuit)
  • firmware such as firmware

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Studio Devices (AREA)

Abstract

本申请涉及一种摄像头控制方法及装置。该方法包括:接收并确定出调用请求对应的第一应用程序;获取第一应用程序的访问权限记录,至少一个第一摄像头为已安装的多个摄像头中的部分或全部;根据每个第一摄像头当前的调用状态、对应的调用策略和对应的第一访问权限,从至少一个第一摄像头中确定出第一应用程序当前能够调用的第二摄像头以及确定第二摄像头的第二访问权限;将第二摄像头的第二访问权限授予第一应用程序。可以对安装有多个摄像头权限授权控制实现精确管控,根据摄像头的类型和调用各摄像头的应用程序的类型对各摄像头进行控制,保证主体的正常运行的同时实现摄像头的分类、分级控制,满足用户在使用多摄像头主体的复杂应用场景需求。

Description

摄像头控制方法及装置
本申请要求于2021年11月16日提交中国专利局、申请号为202111355496.0、申请名称为“摄像头控制方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及摄像头控制领域,尤其涉及一种摄像头控制方法及装置。
背景技术
随着智能汽车、智能机器人等智能设备的不断发展和进步,为满足用户的不同需求智能设备中摄像头的数量越来越多,不同摄像头的功能用途也越来越多样化,摄像头的应用场景也变得越来越复杂。以智能汽车为例,智能汽车中会安装多个摄像头满足汽车的自动驾驶、倒车影像辅助、行车记录等汽车的功能需要。汽车的车机内可以安装有多个能够使用摄像头的应用程序,如何实现多应用程序对多个摄像头的可控精准调用,是亟待解决的技术问题。
发明内容
有鉴于此,提出了一种摄像头控制方法及装置,以解决上述技术问题。
第一方面,本申请的实施例提供了一种摄像头控制方法,所述方法包括:
接收用于申请调用摄像头的调用请求,并确定出所述调用请求对应的第一应用程序;
获取所述第一应用程序的访问权限记录,所述访问权限记录用于记录对应的应用程序被允许调用的至少一个第一摄像头和对应的应用程序访问对应的第一摄像头的第一访问权限,所述至少一个第一摄像头为已安装的多个摄像头中的部分或全部;
根据每个所述第一摄像头当前的调用状态、对应的调用策略和对应的第一访问权限,从所述至少一个第一摄像头中确定出所述第一应用程序当前能够调用的第二摄像头以及确定所述第二摄像头的第二访问权限;
将所述第二摄像头的第二访问权限授予所述第一应用程序。
在一种可能的实现方式中,所述方法还包括:
接收用于申请摄像头访问权限的访问请求,并确定出所述访问请求对应的第二应用程序;
根据所述第二应用程序的应用类型、每个所述摄像头与应用类型之间的映射关系,从已安装的多个摄像头中确定出允许所述第二应用程序访问的至少一个第三摄像头以及每个所述第三摄像头对应的第三访问权限,所述第三访问权限包括控制类权限和/或数据类权限;
根据所述至少一个第三摄像头以及每个所述第三摄像头对应的第三访问权限,更新所述第二应用程序的访问权限记录,所述第二应用程序包括所述第一应用程序。
在一种可能的实现方式中,根据所述至少一个第三摄像头以及每个所述第三摄像头对应的第三访问权限,更新所述第二应用程序的访问权限记录,包括:
将所述第三摄像头以及对应的第三访问权限,分别确定为作为第一摄像头以及对应的第一访问权限,记录到所述第二应用程序的访问权限记录中。
在一种可能的实现方式中,根据所述至少一个第三摄像头以及每个所述第三摄像头对应的第三访问权限,更新所述第二应用程序的访问权限记录,包括:
将每个所述第三摄像头的第一信息发送至所述第二应用程序,以使所述第二应用程序基于所述第一信息展示第一提示,所述第一提示用于提醒用户所述第二应用程序被允许访问的第三摄像头、提醒用户从所述第三摄像头中选择出用户指定所述第二应用程序能够调用的第一摄像头、和/或提醒用户确定每个第一摄像头的第一访问权限;
接收所述第二应用程序发送的用户指定权限报告,所述用户指定权限报告用于指示所述第二应用程序根据检测到的权限调整操作确定的所述第三摄像头中被用户指定的第一摄像头和用户指定的所述第一摄像头的第一访问权限;
将所述用户指定权限报告中指示的第一摄像头和对应的第一访问权限,记录到所述第二应用程序的访问权限记录中。
在一种可能的实现方式中,所述方法还包括:
根据每个所述摄像头的摄像头相关参数,对每个所述摄像头的摄像头类型进行设置以及设置专属类摄像头和共享类摄像头对应的摄像头应用场景,每个所述摄像头的摄像头类型包括专属类、共享类和通用类中的任意一种;
根据应用类型对应的程序应用场景与所述摄像头应用场景的匹配结果,建立应用类型与摄像头之间的映射关系;
根据不同摄像头类型的摄像头的使用特点,为每种摄像头类型设置对应的调用策略。
在一种可能的实现方式中,根据应用类型对应的程序应用场景与所述摄像头应用场景的匹配结果,建立应用类型与摄像头之间的映射关系,包括:
若所述应用类型对应的程序应用场景与共享类摄像头对应的摄像头应用场景匹配,则建立所述共享类摄像头与所述应用程序之间的映射关系;和/或
若所述应用类型对应的程序应用场景与专属类摄像头对应的摄像头应用场景匹配,则建立所述专属类摄像头与所述应用程序之间的映射关系;和/或
若所述应用类型对应的程序应用场景与任意摄像头应用场景均不匹配,则建立所述通用类摄像头与所述应用程序之间的映射关系。
在一种可能的实现方式中,所述方法还包括:
建立所有所述应用类型与所述通用类摄像头之间的映射关系。
在一种可能的实现方式中,根据每个所述第一摄像头当前的调用状态、对应的调用策略和对应的第一访问权限,从所述至少一个第一摄像头中确定出所述第一应用程序当前能够调用的第二摄像头以及确定所述第二摄像头的第二访问权限,包括以下操作中的至少一种:
若所述第一摄像头中包括专属类摄像头,则将所述专属类摄像头中当前的调用状态为空闲状态的专属类摄像头确定为第二摄像头,以及将对应的第一访问权限确定为 对应的第二访问权限;
若所述第一摄像头中包括共享类摄像头,则将所述共享类摄像头中当前的调用状态为空闲状态的共享类摄像头确定为第二摄像头,以及将对应的第一访问权限确定为对应的第二访问权限;
若所述第一摄像头中包括共享类摄像头,则将所述共享类摄像头中当前的调用状态为已用状态的共享类摄像头确定为第二摄像头,以及将对应的第一访问权限中的数据类权限确定为对应的第二访问权限;
若所述第一摄像头中包括通用类摄像头,则将所述通用类摄像头确定为第二摄像头,以及将对应的第一访问权限确定为对应的第二访问权限。
在一种可能的实现方式中,将所述第二摄像头的第二访问权限授予所述第一应用程序,包括:若所述第二摄像头的数量为多个,则确定出多个第二摄像头中的目标摄像头;将所述目标摄像头的第二访问权限授予所述第一应用程序。
在一种可能的实现方式中,若所述第二摄像头的数量为多个,则确定出多个第二摄像头中的目标摄像头,包括以下操作中的任意一种:
接收所述第一应用程序发送的摄像头选定报告,将多个第二摄像头中所述摄像头选定报告中指示的摄像头确定为目标摄像头,所述摄像头选定报告用于指示多个第二摄像头中被选定的目标摄像头;
根据所述第一应用程序的摄像头调用历史将多个第二摄像头中用户偏好的摄像头确定为目标摄像头;
根据所述第一应用程序的摄像头调用历史将多个第二摄像头中上一次被所述第一应用程序调用的摄像头确定为目标摄像头。
在一种可能的实现方式中,接收所述第一应用程序发送的摄像头选定报告,将多个第二摄像头中所述摄像头选定报告中指示的摄像头确定为目标摄像头,包括:
若所述第二摄像头为多个,则向所述第一应用程序发送授权信息,所述授权信息用于指示所述多个第二摄像头以及指示每个所述第二摄像头对应的第二访问权限,以使所述第一应用程序基于所述授权信息发出摄像头选择提示,所述摄像头选择提示用于提醒用户从多个第二摄像头中选择出目标摄像头;
接收所述第一应用程序发送的摄像头选定报告,所述摄像头选定报告用于指示所述多个第二摄像头中被选中的目标摄像头,所述目标摄像头是所述第一应用程序根据检测到的用户响应于所述摄像头选择提示的操作确定的;
将多个第二摄像头中所述摄像头选定报告中指示的摄像头确定为目标摄像头。
在一种可能的实现方式中,所述方法还包括:
若被所述第一应用程序调用的第二摄像头为通用类摄像头且同一时刻接收到控制所述第二摄像头的多个控制指令,则从多个控制指令中确定出优先响应控制指令;
控制所述第二摄像头执行所述优先响应控制指令。
在一种可能的实现方式中,从多个控制指令中确定出优先响应控制指令,包括:
根据每个控制指令对应的应用程序的优先级和/或每个控制指令对应的应用程序的历史使用记录,从所述多个控制指令中确定出优先响应控制指令;
其中,应用程序的优先级是根据应用程序的应用类型确定的。
第二方面,本申请的实施例提供了一种数据的传输装置,包括:处理器;用于存储处理器可执行指令的存储器;其中,所述处理器被配置为执行所述指令时实现第一方面或者第一方面的多种可能的实现方式中的一种或几种的摄像头控制方法。
第三方面,一种非易失性计算机可读存储介质,其上存储有计算机程序指令,所述计算机程序指令被处理器执行时实现第一方面或者第一方面的多种可能的实现方式中的一种或几种的摄像头控制方法。
第四方面,一种计算机程序产品,包括计算机可读代码,或者承载有计算机可读代码的非易失性计算机可读存储介质,当所述计算机可读代码在电子设备中运行时,所述电子设备中的处理器执行第一方面或者第一方面的多种可能的实现方式中的一种或几种的摄像头控制方法。
附图说明
包含在说明书中并且构成说明书的一部分的附图与说明书一起示出了本申请的示例性实施例、特征和方面,并且用于解释本申请的原理。
图1示出相关技术中手机中应用程序申请摄像头权限的提示示意图。
图2示出根据本申请一实施例的摄像头控制方法的应用场景的示意图。
图3示出根据本申请一实施例的摄像头控制方法的流程图。
图4示出根据本申请一实施例的摄像头控制方法的流程示意图。
图5A-图5C示出根据本申请一实施例的第一提示的示意图。
图6示出根据本申请一实施例中车机通过界面展示摄像头权限的示意图。
图7示出根据本申请一实施例的控制装置的架构框图。
具体实施方式
以下将参考附图详细说明本申请的各种示例性实施例、特征和方面。附图中相同的附图标记表示功能相同或相似的元件。尽管在附图中示出了实施例的各种方面,但是除非特别指出,不必按比例绘制附图。
在这里专用的词“示例性”意为“用作例子、实施例或说明性”。这里作为“示例性”所说明的任何实施例不必解释为优于或好于其它实施例。
另外,为了更好的说明本申请,在下文的具体实施方式中给出了众多的具体细节。本领域技术人员应当理解,没有某些具体细节,本申请同样可以实施。在一些实例中,对于本领域技术人员熟知的方法、手段、元件和电路未作详细描述,以便于凸显本申请的主旨。
相关技术中,手机、平板等终端设备中配置有至少一个摄像头,而终端设备中的应用程序可在首次安装到终端设备被用户打开时申请摄像头的使用权限,该使用权限包括能否使用摄像头以及使用摄像头的时间。例如,图1示出相关技术中手机中应用程序申请摄像头权限的提示示意图。如图1所示,以终端设备为手机为例,手机中某应用程序1在被首次打开之后,可以在根据应用程序1自身的配置参数确定需要申请获得手机的摄像头权限的情况下(例如,应用程序1可以通过自身的AndroidManifest.xml文件中的<uses-permission android:name="android.permission.CAMERA"/>语段确 定需要向手机的系统摄像头申请权限),在显示屏中展示摄像头权限申请提示T1,在该提示T1可以提醒用户选择“拒绝”、“询问”、“仅在使用中允许”三种使用权限中的任意一个授权给该应用程序1,而后根据检测到的用户的操作,向手机的系统申请以获取到用户授权的使用权限,使得该应用程序1可以根据被用户授予的权限调用手机的摄像头。但这样的摄像头使用权限授权方式,存在以下问题:
第一,以终端设备为包括前置摄像头和后置摄像头的手机为例,相关技术中的摄像头授权,授予应用程序1的是对手机的包括前、后摄像头在内的全部摄像头的一个统一的使用权限,并没有对前、后摄像头分别授予使用权限,对摄像头使用权限授权的粒度过于粗糙,仅适用于较为简单的摄像头使用场景。在摄像头正在被应用程序1使用的过程中,若检测到用户通过应用程序2要使用摄像头,终端设备会停止应用程序1对摄像头的使用,然后控制摄像头被应用程序2继续使用。也即,同一时刻,摄像头仅能被一个应用程序使用,限制了用户通过应用程序对摄像头的调用,使用户无法同时通过多个应用程序使用同一个摄像头。
第二,在包括多个摄像头的汽车等主体的复杂摄像头使用场景中,现有技术中为保证汽车的行车记录、驾驶员监控、辅助驾驶、倒车影像等各功能的正常实现,为汽车的不同功能需要设置对应的用来专门使用的摄像头。举例来说,假定汽车包括用于行车记录的摄像头1、用于倒车影像显示的摄像头2、用于进行辅助驾驶的摄像头3、用于进行车内驾驶员安全驾驶监控的摄像头4。用户在驾驶汽车行驶过程中为保障行车安全开启了汽车的行车记录应用程序C、驾驶员监控应用程序A和辅助驾驶的应用程序,摄像头1、3、4都需要开启,且分别为不同的应用程序输送采集到的数据。但摄像头1、3、4的数据仅会被对应的应用程序使用,不会授权给通过汽车内的车机安装控制的其他应用程序使用。其中,车机可为安装在汽车的内部,车机的屏幕安装于中控台上,用户可以在车机中安装各类应用程序,如音乐播放应用程序、视频播放应用程序等,驾驶员可通过点击车机屏幕中显示的用户界面,控制车机中的各应用程序以及对汽车的功能进行设置。例如:驾驶员可在车机上点击锁车自动关闭所有窗户功能的虚拟按键,以在锁车时关闭汽车的所有窗户。驾驶员可在车机上点击音乐播放应用程序的图标进入到应用程序中选择歌曲进行播放。现有技术中也没有提供针对多个摄像头分别进行使用权限授权的可实现方式,而若利用现有技术中给出的手机、平板等的摄像头使用权限授权方式进行汽车中多摄像头的授权控制,则会发生在摄像头4正在使用进行辅助驾驶的过程中,若其他应用程序使用摄像头4,摄像头4会将数据输送至新的应用程序,不再将数据输送至辅助驾驶应用程序会使得辅助驾驶应用程序的数据中断,无法正常辅助驾驶员进行驾驶,严重危害行车安全。
或者,即便同一摄像头的数据可以共享给不同的应用程序,但其也存在如下问题:
举例来说,假定应用程序A控制驾驶员监控摄像头4开启,以获取驾驶员的人脸信息,进而能够在驾驶员疲劳驾驶的情况下及时发出提醒信息。此时,若应用程序B也获取了驾驶员监控摄像头的控制权限,并发送缩放画面指令至该摄像头4,则会导致应用程序A获取到的人脸信息是基于缩放画面所生成的,进而影响了应用程序A的疲劳驾驶监测功能,危害了驾驶员的行车安全。再例如:用户在行车期间已通过应用程序C控制了行车记录摄像头1,在用户看到一处靓丽的景色时,用户启动了应用程 序D,想要记录该景色。然而用户为通过应用程序D记录清楚的景色录像,对摄像头1的画面进行了局部放大后拍摄。此时应用程序C所得到的就是放大后的行车录像,对于发生的交通事故等情况可能无法正常进行行车记录,甚至于行车录像中可能出现未记录到与交通事故等相关的可供参考的图像,使得行车录像失去应有的作用。
上述问题也可能出现在安装有多个摄像头的智能机器人这一主体中,例如:智能机器人设有障碍物检测摄像头M,以使机器人能够通过分析该摄像头M采集到的图像实现自动避障功能。此时,若用户若想体验机器人视角,则可通过一应用程序7(已经获得摄像头M的使用权限),获取障碍物检测摄像头M的控制权限。而若用户通过应用程序7放大或缩小摄像头M采集的图像时,即便摄像头M的数据同时输送给应用程序7以及作为进行障碍物判断的依据,由于此时摄像头M的采集的图像已经被放大或缩小将会导致机器人障碍物检测结果不准确或检测异常,使得机器人可能无法及时或准确躲避实际存在的障碍物,致使机器人损坏等情况发生。
可见,相关技术中的摄像头权限控制难以实现多个摄像头授权使用的精准管控,甚至出现安装有摄像头的汽车等主体被损坏、用户安全受到威胁等严重问题。
为解决上述问题,本申请实施例提供了一种摄像头控制方法以及装置。可以对安装有多个摄像头的主体的摄像头权限授权控制实现精确管控,根据摄像头的类型和调用各摄像头的应用程序的类型对各摄像头进行控制,保证主体的正常运行的同时实现摄像头的分类、分级控制,满足用户在使用多摄像头主体的复杂应用场景需求。
为说明本申请实施例所提供的摄像头控制方法及装置,本申请实施例中将以智能汽车为安装有多个摄像头的主体为例,对摄像头控制方法及装置的实现方式进行说明,其余主体中摄像头控制方法及装置的实现方式不再赘述。图2示出根据本申请一实施例的摄像头控制方法的应用场景的示意图。图3示出根据本申请一实施例的摄像头控制方法的流程图。
如图2所示,假定汽车10中安装有多个摄像头,包括:用于进行行车记录的摄像头C1。用于进行车内后排座椅监控的后视辅助监控摄像头C2。用于实现辅助驾驶中的车道保持辅助的摄像头C3。用于进行驾驶员安全驾驶监控的摄像头C4。用于实现辅助驾驶中的倒车辅助的摄像头C5。用于驾驶员以及乘车人进行车内娱乐的摄像头C6。用于实现汽车10内部座舱监控的摄像头C7。汽车10中的车机10内安装的应用程序可以调用汽车10的摄像头。其中,汽车10中安装的应用程序可以包括与汽车10的各功能相匹配的内设的能够调用摄像头的应用程序,例如,进行行车记录、驾驶员监测、后视监控、车道保持辅助、倒车辅助、车内娱乐镜头控制的应用程序。汽车10中安装的应用程序还可以包括用户根据自身需要下载安装的应用程序,等等。
如图3所示,本申请所提供的摄像头控制方法包括设置阶段步骤和使用阶段步骤。
“设置阶段步骤”可以是主体实际使用之前执行的,主体的研发人员可以预先通过“设置阶段步骤”各步骤的执行保证后续“使用阶段步骤”可以如常进行。执行“设置阶段步骤”各步骤的可以是主体本身(如主体中用于控制主体的处理器等控制装置)、外部的不属于主体的应用于进行主体配置的设备等等。例如,假定主体为汽车,则汽车的研发人员可以在汽车出厂之前利用汽车的车机或者实现汽车出厂前配置的设备执行设置阶段各步骤。假定主体为智能机器人,则机器人的研发人员可以在机器人出厂之前 利用机器人内部的控制装置或者实现机器人出厂前配置的设备执行设置阶段各步骤。其中,如图3所示,“设置阶段步骤”可包括步骤S11-步骤S16。
“使用阶段步骤”可以应用于主体,由主体的控制装置执行,使用户在使用主体期间主体的控制装置可以按照使用阶段的各步骤实现摄像头控制。其中,如图3所示,“使用阶段步骤”可包括步骤S21-步骤S28。
“设置阶段步骤”在“使用阶段步骤”之前执行。“设置阶段步骤”的执行完成与“使用阶段步骤”的开始执行之间的间隔是不固定的,“设置阶段步骤”执行完成后“使用阶段步骤”可以反复执行,“使用阶段步骤”每次执行之前可以不再执行“设置阶段步骤”。例如,假定主体为汽车,则“设置阶段步骤”在汽车出厂之前执行,出厂供用户使用的期间汽车的车机仅执行“使用阶段步骤”,不再执行“设置阶段步骤”。以下结合示例对“设置阶段步骤”和“使用阶段步骤”的实现方式进行描述。
“设置阶段步骤”
在步骤S11中,确定所需控制的每个摄像头的摄像头相关参数,所述摄像头相关参数可以是指与摄像头相关、且能够用于后续进行摄像头类型划分、应用场景划分的参数。在一些实施例中,摄像头相关参数可以包括:摄像头的功能用途。摄像头在主体中的安装参数,例如,安装位置、镜头朝向等。摄像头所在的主体的类型,例如,主体的类型可以包括:机器人、车辆、无人机、等等。
在步骤S12中,根据每个摄像头的摄像头相关参数,对每个摄像头的摄像头类型进行设置。并在执行完步骤S12之后执行步骤S13。其中,可以每次确定出一个摄像头的类型之后,执行步骤S13,也可以在分别确定出主体中所有摄像头的类型之后执行步骤S13。
在一种可能的实现方式中,步骤S12中可以直接根据各摄像头功能用途的不同,将汽车等主体中安装的多个摄像头进行摄像头类型划分。摄像头类型可以包括:专属类(也可以称为独占类、专享类等)、共享类(也可以称为公用类、同用类等)和通用类(也可以称为普通类、一般类等)。在一些实施例中,在步骤S12中,还可以在每个设置完摄像头类型的摄像头的配置文件中通过特定的字段标记摄像头的摄像头类型,以使得后续“使用阶段步骤”中可以通过每个摄像头的配置文件确定出摄像头的摄像头类型。举例来说,假定主体为如图2所示的汽车10,则根据摄像头功能用途的不同,可以确定摄像头C1为共享类摄像头。摄像头C2为专属类摄像头。摄像头C3为共享类摄像头。摄像头C4为专属类摄像头。摄像头C5为共享类摄像头。摄像头C6为通用类摄像头。摄像头C7为共享类摄像头。
在步骤S13中,对摄像头的类型进行判别,在摄像头为专属类摄像头或共享类摄像头的情况下,执行步骤S14。在摄像头为通用类摄像头的情况下,执行步骤S15。
在步骤S14中,设置摄像头对应的摄像头应用场景。并在完成步骤S14之后,执行步骤S15。
在一种可能的实现方式中,步骤S14中,在摄像头为专属类摄像头或共享类摄像头的情况下,可以根据摄像头的摄像头相关参数,确定出摄像头所对应的摄像头应用场景。因专属类摄像头和共享类摄像头在不同主体中的实际功能的不同,可以根据安装有摄像头的主体、以及专属类摄像头和共享类摄像头的功能,为每个专属类摄像头 和每个共享类摄像头所能应用的摄像头应用场景进行设置。其中,不同的功能用途摄像头的摄像头应用场景可以不同。同一摄像头所对应的摄像头应用场景可以为一个或多个。举例来说,假定主体为如图2所示的汽车10,摄像头应用场景可以包括:行车记录场景、驾驶员安全驾驶监控场景、座舱监控场景、后视辅助场景、倒车辅助场景、车道保持辅助场景、等等。则图2中摄像头C1(共享类摄像头)对应的摄像头应用场景即为行车记录场景,摄像头C2(专属类摄像头)对应的摄像头应用场景即为后视辅助场景。摄像头C3(共享类摄像头)对应的摄像头应用场景即为车道保持辅助场景。摄像头C4(专属类摄像头)对应的摄像头应用场景即为驾驶员安全驾驶监控场景。摄像头C5(共享类摄像头)对应的摄像头应用场景即为倒车辅助场景。摄像头C7(共享类摄像头)对应的摄像头应用场景即为座舱监控场景。
在步骤S15中,建立摄像头与应用类型之间的映射关系。并在执行完步骤S15之后执行步骤S16。
在一种可能的实现方式中,在步骤S15中,可以先确定主体所能安装的全部应用程序以及确定每个应用程序的应用类型,得到多个应用类型;而后根据每个应用类型确定出对应的应用程序在实际运行中所对应的程序应用场景;将程序应用场景与至少一个摄像头应用场景(包括共享类摄像头对应的摄像头应用场景和/或专属类摄像头对应的摄像头应用场景)进行匹配。若至少一个摄像头应用场景中存在与程序应用场景匹配的摄像头应用场景,则可以将摄像头应用场景与程序应用场景匹配的专属类摄像头或共享类摄像头,确定为该程序应用场景对应的应用类型的应用程序所能调用的摄像头,建立该程序应用场景对应的应用类型与摄像头应用场景与程序应用场景匹配的专属类摄像头或共享类摄像头之间的映射关系。若程序应用场景与摄像头应用场景均不匹配,则可以将通用类摄像头确定为该程序应用场景所对应的应用类型的应用程序所能调用的摄像头,建立该程序应用场景对应的应用类型与通用类摄像头之间的映射关系。
在一种可能的实现方式中,在步骤S15中,可以将程序应用场景与摄像头应用场景不同的应用类型对应的应用程序所能调用的摄像头设置为通用类摄像头,这样,同一应用类型仅与一种类型的摄像头存在映射关系。或者,在步骤S15中还可以设置通用类摄像头与全部应用类型对应,则对于程序应用场景与摄像头应用场景匹配的应用类型其与匹配的共享类摄像头或专属类摄像头之间存在映射关系、且该应用类型还与通用类摄像头存在映射关系;对于程序应用场景与摄像头应用场景不匹配的应用类型则仅与通用类摄像头存在映射关系。这样,所有应用类型的应用程序均可以调用通用类摄像头,程序应用场景与摄像头应用场景匹配的摄像头可以调用通用类摄像头和摄像头应用场景与程序应用场景匹配的共享类摄像头或专属类摄像头。
在一些实施例中,程序应用场景与每个摄像头应用场景是否匹配可以通过场景相似程度来确定。场景相似程度越高,则匹配程度越高。可以预先设置相似程度阈值,若程序应用场景与摄像头应用场景之间的相似度大于或等于相似度阈值,则可以确定程序应用场景与摄像头应用场景匹配。例如,假定相似度阈值为80%,则若程序应用场景与某一个摄像头应用场景的相似度大于或等于80%,则可以确定该摄像头应用场景与程序应用场景匹配。
举例来说,假定主体为如图2所示的汽车10,汽车10上安装有图2所示的摄像头C1、C2…C7。摄像头C1(共享类摄像头)对应的摄像头应用场景即为行车记录场景,摄像头C2(专属类摄像头)对应的摄像头应用场景即为后视辅助场景。摄像头C3(共享类摄像头)对应的摄像头应用场景即为车道保持辅助场景。摄像头C4(专属类摄像头)对应的摄像头应用场景即为驾驶员安全驾驶监控场景。摄像头C5(共享类摄像头)对应的摄像头应用场景即为倒车辅助场景。摄像头C7(共享类摄像头)对应的摄像头应用场景即为座舱监控场景。摄像头C6为通用类摄像头。则在步骤S15中,在确定汽车10上可以安装的应用程序的应用类型包括:应用类型1、应用类型2……应用类型9的情况下,可以确定每个应用类型所对应的程序应用场景(如下表1所示),而后基于上述步骤S15的实现方式确定出应用类型1、应用类型2……应用类型10与汽车10的摄像头之间的映射关系(如下表1所示),得到如下表1所示的应用类型与摄像头映射关系表。
其中,如表1所示,应用类型1、应用类型2……应用类型9与摄像头C6存在映射关系。应用类型1与摄像头C4存在映射关系。应用类型2与摄像头C2存在映射关系。应用类型3、4与摄像头C3存在映射关系。应用类型6与摄像头C5存在映射关系。应用类型7、8与摄像头C7存在映射关系。应用类型9与摄像头C6存在映射关系。则,从调用摄像头的权限上分析,可以确定:
应用类型1的应用程序具有调用摄像头C4和C6的权限。
应用类型2的应用程序具有调用摄像头C2和C6的权限。
应用类型3的应用程序具有调用摄像头C1和C6的权限。
应用类型4的应用程序具有调用摄像头C3和C6的权限。
应用类型5的应用程序具有调用摄像头C3和C6的权限。
应用类型6的应用程序具有调用摄像头C5和C6的权限。
应用类型7的应用程序具有调用摄像头C7和C6的权限。
应用类型8的应用程序具有调用摄像头C7和C6的权限。
应用类型9的应用程序具有调用摄像头C6的权限。
表1应用类型与摄像头映射关系表
Figure PCTCN2022127049-appb-000001
在一种可能的实现方式中,在步骤S15中,还可以根据不同应用类型的应用程序设置应用程序对应的分类类型,应用程序的分类类型可以为通用类、共享类和专属类中的一种。其中,若应用程序的应用类型所映射的摄像头仅包括通用类摄像头,则应用程序的分类类型可以设置为通用类。若应用程序的应用类型所映射的摄像头包括通用类摄像头和共享类摄像头,则应用程序的分类类型可以设置为共享类。若应用程序的应用类型所映射的摄像头包括通用类摄像头和专属类摄像头,则应用程序的分类类型可以设置为专属类。则通用类应用程序可以访问通用类摄像头。共享类应用程序可以访问共享类摄像头和通用类摄像头。专属类应用程序可以访问专属类摄像头和通用类摄像头。
在步骤S16中,确定每个类型的摄像头的调用策略。
在一种可能的实现方式中,在步骤S16中可以根据不同摄像头类型的摄像头的使用特点分别为不同的摄像头类型设置对应的调用策略,以保证摄像头的正常控制。
为说明不同类型的摄像头的区别,以下结合示例对专属类摄像头、共享类摄像头和通用类摄像头以及每种类型的摄像头的调用策略进行描述。
专属类摄像头,也可称独占类摄像头、专享类摄像头等。该专属类摄像头可以是安装在主体中的,具备特定功能仅由一个应用程序独占使用的摄像头,例如,图2中汽车10上安装的驾驶员安全驾驶监控摄像头C4。在一些实施例中,专属类摄像头的调用策略可以包括:每个专属类摄像头同一时刻仅能供一个最先申请调用该专属类摄像头的、应用类型与该专属类摄像头对应的应用程序调用;且正在调用该专属类摄像头的应用程序具有该专属类摄像头的完全访问权限。其中,完全访问权限包括对专属类摄像头的控制类权限和数据类权限。这样,正在调用该专属类摄像头的应用程序可以独占使用该专属类摄像头,避免其他应用程序的干扰。例如,在汽车10行进过程中,摄像头C4(专属类摄像头)始终仅供进行驾驶员安全驾驶监控的应用程序使用。而若假定汽车10车机100中安装有可以实现驾驶员安全驾驶监控的应用程序1、2、3,假定某一时刻应用程序1正在调用摄像头C4进行驾驶员安全驾驶监控,而此时若车机100检测到应用程序2也申请调用摄像头C4,则由于车机100判断出此时摄像头C4已经被应用程序1调用,则会拒绝应用程序2对摄像头C4调用。
共享类摄像头,也可以称共用类摄像头、同用类摄像头等。该共享类摄像头可以是主体中安装的,具备特定功能可以供多个应用程序共同调用的摄像头,例如,图2中汽车10上安装的行车记录摄像头C1。在一些实施例中,共享类摄像头的调用策略可以包括:每个共享类摄像头同一时刻可以被一个或多个应用类型与该共享类摄像头对应的应用程序调用。且在调用共享类摄像头的应用程序为多个的情况下,最先申请调用该共享类摄像头的应用程序具有该共享类摄像头的完全访问权限,其余应用程序仅具有该共享类摄像头的数据类权限。这样,可以保证最先申请调用该共享类摄像头的应用程序可以完全独占地使用该共享类摄像头,避免其他应用程序的干扰,而其他应用程序具有共享类摄像头的数据类权限可以保证这些应用程序可以使用该共享类摄像头采集到的数据。例如,在汽车10行进过程中,摄像头C1(共享类摄像头)在被行车记录的应用程序调用后,若车机100接收到应用程序4调用摄像头C1,则由于车机100判断出此时摄像头C1已经被行车记录的应用程序调用,车机100会允许应用 程序4调用摄像头C1且授予应用程序4对摄像头C1的数据类权限。
通用类摄像头,也可以称普通类摄像头、一般类摄像头等。该通用类摄像头可以是主体中安装的,没有特定功能可以供多个应用程序共同调用的摄像头,例如,图2中汽车10上安装的车内娱乐摄像头C6。通用类摄像头的调用策略可以包括:每个通用类摄像头同一时刻可以被一个或多个应用类型与通用类摄像头对应的应用程序调用。且调用该通用类摄像头的各应用程序均具有该通用类摄像头的完全访问权限。其中,若在同一时刻有多个应用程序向该通用类摄像头发送控制指令,可以根据先预设的响应规则对多个控制指令进行筛选,确定出多个控制指令中的优先响应控制指令。这样,即可以保证调用该通用类摄像头的多个应用程序可以分别对该通用类摄像头进行使用,也可以保证同一时刻有多个控制指令的情况下也能有序控制通用类摄像头响应控制指令。其中,控制指令可以是对应于摄像头的控制类权限和/或数据类权限的指令。
在一种可能的实现方式中,响应规则可以包括:根据每个控制指令对应的应用程序的优先级的顺序,从多个控制指令中确定出优先响应控制指令。在一些实施例中,可以预先对不同应用类型的优先级进行设置,例如,可以将应用类型的优先级顺序由高到低设置为:与专属类摄像头对应的应用类型、与共享类摄像头对应的应用类型、与通用类摄像头对应的应用类型。也即,可以将应用类型的优先级顺序由高到低设置为:分类类型属于专属类的应用类型、分类类型属于共享类的应用类型、分类类型属于通用类的应用类型。
在一些实施例中,响应规则还可以包括:若同时向通用类摄像头发出控制指令的多个应用程序中优先级别最高的应用程序为多个,则还可以根据每个控制指令对应的应用程序的历史使用记录,进一步从应用程序优先级别最高的多个控制指令中,最终选择出优先响应控制指令。历史使用记录所记录的内容可以包括应用程序被使用的频率、被使用的总时长、上次被使用与当前时刻之间的间隔时长等表征应用程序的历史使用状况的数据。在一些实施例中,可以将“应用程序优先级别最高的多个控制指令”中使用频率高、使用总时长较长、间隔时长短的应用程序对应的控制指令确定为优先响应控制指令。在一些实施例中,可以根据每个应用程序的历史使用记录确定出每个应用程序的使用状态评价值,而后将“应用程序优先级别最高的多个控制指令”中使用状态评价值最高的应用程序的控制指令确定为优先响应控制指令。在一些实施例中,可以为每一类历史使用记录设置对应的权值,而后以加权求和的方式计算出应用程序的使用状态评价值。举例来说,假定如图2所示的汽车10中的摄像头C6同时被应用程序a、b、c、d、e调用,且同一时刻5个应用程序均向摄像头C6发出控制指令。例如,若按照优先级别确定应用程序a、b、c、d、e中应用程序e的优先级最高,则可以将应用程序e所发出的控制指令确定为优先响应控制指令。例如,若按照优先级别确定a、b、c三个应用程序的优先级别相同且均高于应用程序d、e。则可以分别计算应用程序a、b、c的使用状态评价值,而后将应用程序a、b、c中使用状态评价值的数值最高的应用程序如应用程序a所发出的控制指令确定为优先响应控制指令。
在一种可能的实现方式中,响应规则也可以仅为:根据每个控制指令对应的应用程序的历史使用记录,从多个控制指令中选择出优先响应控制指令。在一些实施例中,可以将“多个控制指令”中使用频率高、使用总时长较长、间隔时长短的应用程序对应 的控制指令确定为优先响应控制指令。在一些实施例中,可以将多个控制指令中使用状态评价值最高的应用程序的控制指令确定为优先响应控制指令。举例来说,假定如图2所示的汽车10中的摄像头C6同时被应用程序a、b、c、d、e调用,且同一时刻5个应用程序均向摄像头C6发出控制指令。则,若确定出应用程序a、b、c、d、e中应用程序d的使用状态评价值最高,则可以将应用程序d发出的控制指令确定为优先响应控制指令。
在一种可能的实现方式中,应用程序对每个摄像头的访问权限包括对摄像头的控制类权限和/或数据类权限,完全访问权限包括控制类权限和数据类权限。
其中,控制类权限可以是能够改变摄像头进行图像采集的方式或者使得摄像头采集到的图像或视频发生变化的控制权限,应用程序拥有控制类权限之后可以基于应用程序检测到的用户操作对摄像头采集的图像或视频的方式、或者采集到的图像或视频内容本身进行调整或处理,使当前所有正在调用该摄像头的所有应用程序最终获得的摄像头采集到的图像或视频发生变化。控制类权限对摄像头的控制可以包括:对摄像头的曝光、对焦、白平衡的自动或手动控制。对摄像头采集的图像的缩放、拍摄角度等的控制。对摄像头的闪光灯是否开启的控制,例如,根据光线的强度自动调整闪光灯的开启或关闭,手动控制闪光灯的开启或关闭。对摄像头采集到的图像或视频的画面效果的控制,例如,为采集到的图像增加滤镜、进行美化、裁剪、校正等,设置对摄像头采集到的图像或视频进行处理的算法。
其中,数据类权限可以是对摄像头采集到的数据进行获取并进一步进行显示或存储的控制权限,应用程序拥有数据类权限之后可以基于应用程序检测到的用户操作对摄像头采集的图像或视频进行获取,不会使当前所有正在调用该摄像头的所有应用程序最终获得的摄像头采集到的图像或视频发生变化。数据类权限对摄像头的控制可以包括:预览权限,对摄像头采集到的图像进行预览的控制,使得检测到用户的预览操作的应用程序可以获取摄像头采集到的数据得到摄像头实时采集的图像进而为用户展示实现预览,可使得用户以预览的形式观看到摄像头实时采集到的图像。拍照权限,对摄像头采集到的图像进行拍照的控制,可使得检测到用户的拍照操作的应用程序可以获取摄像头采集到的数据得到摄像头实时采集的图像进而为用户拍照。录像权限,对摄像头采集到的图像进行录制(或称摄制、拍摄等)的控制,可使得检测到用户的录制操作的应用程序可以获取摄像头采集到的数据得到摄像头实时录制的视频(或称录像)。实时拇指图权限,对摄像头采集到的数据进行部分或全部数据的获取以得到数据量小的“小图像”,以进一步对“小图像”进行分析处理的控制,使得检测到用户的实时拇指图操作的应用程序可以获取摄像头采集到的图像的“小图像”进行分析处理,并未用户反馈分析处理的结果,可使得用户根据分析处理的结果进一步作出响应。“小图像”可以是指相比于摄像头实时采集到的图像的尺寸小、和/或分辨率小的图像,这样,可以便于应用程序对“小图像”的分析处理,并提高分析处理的速度。例如,AR类的应用程序在拥有实时拇指图权限的情况下,可以获取“小图像”的持续数据流,以便于AR应用程序可及时地实时生成AR虚拟影像,实现AR导航功能。
在本申请的摄像头控制方法中,执行完上述“设置阶段步骤”之后,由于主体可以安装的应用程序、应用程序的应用类型和程序应用场景可能会发生变化,这可能会使 得摄像头与应用类型之间的映射关系发生变化,并且为了优化用户使用摄像头的体验,汽车等主体的厂家也可能会不断更新部分或全部类型的摄像头的调用策略。因此主体可以定期更新“摄像头与应用类型之间的映射关系”和/或“每个类型的摄像头的调用策略”。更新过程可以是主体主动向服务器发起的和/或服务器主动向主体发起的。在一些实施例中,调用策略、摄像头类型、摄像头应用场景、摄像头与应用类型之间的映射关系、应用程序的分类类型可以存储在车机的只读内存中,以降低这些信息被恶意修改的发生概率,保证主体的正常、安全运行。示例性地,在不考虑安全性的情况下,可以开放用户对调用策略、摄像头类型、摄像头应用场景、摄像头与应用类型之间的映射关系、应用程序的分类类型中的至少一个的更改权限,以增加用户端的可操控性,满足用户的多样化需求。
“使用阶段步骤”
图4示出根据本申请一实施例的摄像头控制方法的流程示意图。如图3、图4所示,在“使用阶段步骤”汽车的车机(主体的控制装置)用于执行步骤S21-步骤S28,其中,如图3所示“使用阶段步骤”可以包括:权限授权和摄像头调用。“权限授权”包括步骤S21-步骤S24,车机通过“权限授权”实现不同应用程序的摄像头权限车机允许和用户选择的授权,并完成每个应用程序的访问权限记录存储。“摄像头调用”包括步骤S25-步骤S26,车机可以根据访问权限记录进行摄像头调用控制。在本申请实施例所提供的摄像头控制方法中,如图4所示,在“权限授权”中第二应用程序用于执行步骤S31-步骤S34。其中,第二应用程序可以是车机中安装的任意一个应用程序。其中,“摄像头调用”是每次第一应用程序调用摄像头使用中车机均会执行的步骤;而“权限授权”实际上是“使用阶段步骤”的前续步骤,其可以仅在满足请求条件的情况下由第二应用程序(第二应用程序包括“摄像头调用”中所涉及的第一应用程序)执行。
“权限授权”
如图4所示,在步骤S31中,第二应用程序在确定满足请求条件的情况下,发出访问请求。
在一种可能的实现方式中,请求条件可以包括以下至少一种:第二应用程序首次被打开使用且第二应用程序运行中需要获取到摄像头访问权限、第二应用程序被开启且第二应用程序没有获得运行所需的摄像头访问权限。这样,使得第二应用程序可以在需要获取到摄像头访问权限且自身没有获得摄像头访问权限的情况下,发出访问请求。
在步骤S21中,如图3图、图4所示,车机接收用于申请摄像头访问权限的访问请求,确定访问请求对应的第二应用程序。
在一种可能的实现方式中,访问请求可以指示请求摄像头访问权限的第二应用程序。访问请求中可以包括用于指示第二应用程序是汽车的车机(主体的控制装置)中安装的多个应用程序的哪一个的程序标识,程序标识可以是应用程序的名称、编号等能够标识应用程序的信息,本申请对此不作限制。汽车的车机(主体的控制装置)在接收到访问请求之后,可以根据访问请求中的程序标识确定发出访问请求的第二应用程序。在一种可能的实现方式中,若访问请求中不存在指示第二应用程序的程序标识 等信息,汽车的车机还可以直接将发出访问请求的应用程序确定为第二应用程序。
在步骤S22中,如图3图、图4所示,根据第二应用程序的应用类型、摄像头与应用类型之间的映射关系,从已安装的多个摄像头中确定出允许第二应用程序访问的至少一个第三摄像头以及每个第三摄像头的第三访问权限。
在一种可能的实现方式中,在步骤S22中,车机可以根据第二应用程序的应用类型、摄像头与应用类型之间的映射关系,从安装的多个摄像头中确定出车机允许第二应用程序访问的至少一个第三摄像头。在一些实施例中,访问请求中还可以包括第二应用程序的应用类型,在步骤S22中车机可以直接根据访问请求中的应用类型、本地存储的摄像头与应用类型之间的映射关系(上文步骤S15所确定出的映射关系),从车机所在的汽车安装的多个摄像头中筛选出允许第二应用程序访问的至少一个第三摄像头。在一些实施例中,若访问请求中并不包括第二应用程序的应用类型,则车机可以直接从第二应用程序的程序配置文件中获取到第二应用程序的程序类型,而后在步骤S22中车机可以根据确定出的应用类型、本地存储的摄像头与应用类型之间的映射关系,从车机所在的汽车安装的多个摄像头中筛选出允许第二应用程序访问的至少一个第三摄像头。举例来说,参照图2所示的汽车10、表1所示的映射关系示例,假定第二应用程序的应用类型为“应用类型3”,则车机根据表1可以确定出允许第二应用程序访问的第三摄像头包括摄像头C3和摄像头C6。
在一种可能的实现方式中,在步骤S22中,车机还可以先根据第二应用程序的分类类型先从多个摄像头中筛选出对应于分类类型的至少一个备选摄像头。而后若备选摄像头均为通用类摄像头则直接将备选摄像头确定为第三摄像头;否则若备选摄像头不完全是通用类摄像头可以再根据第二应用程序的应用类型、摄像头与应用类型之间的映射关系从备选摄像头中确定出车机允许第二应用程序访问的至少一个第三摄像头。例如,假定第二应用程序为共享类应用程序,则可以将所有共享类摄像头和通用类摄像头均确定为第三摄像头,而后根据摄像头与应用类型之间的映射关系确定出共享类摄像头中与第二应用程序的应用类型不对应的不可选摄像头,最终将备选摄像头中除不可选摄像头之外的其他摄像头确定为第三摄像头。假定第二应用程序为专属类应用程序,则可以将所有专属类摄像头和通用类摄像头均确定为备选摄像头,而后根据摄像头与应用类型之间的映射关系确定出专属类摄像头中与第二应用程序的应用类型不对应的不可选摄像头,最终将备选摄像头中除不可选摄像头之外的其他摄像头确定为第三摄像头。假定第二应用程序为通用类应用程序,则可以将所有通用类摄像头均确定为第三摄像头。这样,可以简化确定第三摄像头的过程,提高确定第三摄像头的速度。
在一种可能的实现方式中,在步骤S22中,车机在确定出至少一个第三摄像头之后或者确定第三摄像头的过程中,还可以根据第三摄像头的被调用记录和调用策略,确定出第二应用程序对每个第三摄像头进行访问的第三访问权限,其中,第三访问权限的确定步骤为可选步骤。在一些实施例中,第二应用程序对每个第三摄像头的第三访问权限可以包括:具有完全访问权限(包括控制类权限和数据类权限)、数据类权限、无权限中的任意一项。
在一些实施例中,由于不同摄像头的功能的不同,导致各个摄像头被调用的状态 存在区别,因此,车机在确定每个第三摄像头的第三访问权限时,可以先根据第三摄像头的被调用记录确定第三摄像头是否处于一直开启被调用的状态。若第三摄像头处于一直开启被调用的状态,则车机可以根据第三摄像头的调用策略确定出车机能够给予第二应用程序对第三摄像头的第三访问权限具体为哪一种。若第三摄像头并未处于一直开启被调用的状态,则车机可以确定能够给予第二应用程序对第三摄像头的第三访问权限为完全访问权限。
举例来说,以如图2的汽车10为例,部分汽车用户为保护车辆安全会设置仅用于行车记录的摄像头C1处于一直开启被调用的状态,以进行行车记录录像。则在这种情况下,若第三摄像头包括摄像头C1,且根据摄像头C1的被调用记录确定摄像头C1处于一直开启被调用的状态,则根据第三摄像头C1的调用策略(如上文所述的共享类摄像头的调用策略),可以确定出第二应用程序对摄像头C1的第三访问权限仅为数据类权限,不具有摄像头C1的完全访问权限(也即不具有摄像头C1的控制类权限)。又例如,以如图2的汽车10为例,若第三摄像头包括摄像头C4,且根据摄像头C4的被调用记录确定摄像头C4处于一直开启被调用的状态,则根据第三摄像头C4的调用策略(如上文所述的专属类摄像头的调用策略),可以确定出第二应用程序对摄像头C4的第三访问权限为无权限。再例如,以如图2的汽车10为例,若第三摄像头包括摄像头C6,且根据摄像头C6的被调用记录确定摄像头C6处于一直开启被调用的状态,则根据第三摄像头C6的调用策略(如上文所述的通用类摄像头的调用策略),可以确定出第二应用程序对摄像头C6的第三访问权限为完全访问权限。
在步骤S23中,如图3图、图4所示,发送每个第三摄像头的第一信息,第一信息包括每个第三摄像头的摄像头标识、摄像头的功能用途、安装参数中的至少一种。在一些实施例中,第一信息中还可以包括每个第三摄像头的第三访问权限。
在一种可能的实现方式中,如图4所示,第二应用程序接收到第一信息之后,可以执行步骤S32。在一些实施例中,在步骤S32中,第二应用程序接收到第一信息之后,可以为用户展示第一提示。为说明本申请所提供的第一提示的不同实现方式,图5A-图5C示出根据本申请一实施例的第一提示的示意图。
在一种可能的实现方式中,第一提示可以用于提醒用户车机允许第二应用程序调用访问的第三摄像头。第一提示中可以包括第一信息中的至少一种信息。在一些实施例中,第一提示可以在显示屏(如车机显示屏)中的弹窗、侧边栏等中为用户展示第一提示,第一提示可以是能够指示第三摄像头的示意图(如图5A所示的Q11)、和/或列表(如图5B所示的Q12)等等。例如,以图2所示的汽车10为例,假定第三摄像头为摄像头C1和摄像头C6,则如图5B所示可以在车机的显示屏中为用户通过列表(图中未示出表格线)展示第一提示,或者也可以如图5A所示在车机的显示屏中为用户通过示意图展示第一提示。
在一种可能的实现方式中,第一提示在用于提醒用户车机允许第二应用程序调用的第三摄像头的同时,还可以用于提醒用户从第三摄像头中选择出用户指定第二应用程序能够调用的第一摄像头、和/或提醒用户确定第一摄像头的第一访问权限。第一访问权限可以为用户从被用户选为第一摄像头的第三摄像头的第三访问权限中选择确定出的访问权限。
在一些实施例中,如图5A的Q11和图5B的Q12中所示,可以在第一提示中展示第三摄像头的第三访问权限以及与每个第三访问权限对应的第一选择控件K1,和/或对应于每个第三摄像头的第二选择控件K2。第二选择控件K2可以指示对应的第三摄像头是否被用户选择为第一摄像头(如图5A、5B中展示的K2的状态即表示对应的第三摄像头被用户选择为第一摄像头,如图5C中摄像头C6的对应的K2的状态即表示C6已经被用户选择不授权给第二应用程序、C6不是第一摄像头)。如图5A、图5B所示摄像头C1的第三访问权限包括:预览权限、拍照权限、录像权限和实时拇指图权限。摄像头C6的第三访问权限包括:曝光、对焦、白平衡控制权限,缩放、闪光灯、画面效果控制权限,预览权限,拍照权限,录像权限和实时拇指图权限。在一些实施例中,第一选择控件K1还可以指示对应的第三访问权限当前是否被用户授权指定给第二应用程序(如图5A、5B中展示的K1的状态即表示对应的第三访问权限被用户选择授权给第二应用程序,如图5C中摄像头C6的各第三访问权限对应的K1的状态即表示C6的各第三访问权限已经被用户选择不授权给第二应用程序)。第二应用程序可以控制第二选择控件K2响应于检测到的用户针对K2的点击、滑动等触发操作,确定出用户从第三摄像头中选择确定的第一摄像头。第二应用程序可以控制第一选择控件K1响应于检测到的用户针对K1的点击、滑动等触发操作,确定出用户从第三访问权限中选择确定的第一访问权限。举例来说,第二应用程序根据接收到的第一信息可以为用户展示图5B所示的第一提示Q12。而后根据用户对摄像头C6的第二选择控件K2的触发操作确定用户选择不将C6授权给第二应用程序调用;以及根据用户对C1的“录像权限对应的K1”、“实时拇指图权限对应的K1”的触发操作确定用户不将C6的“录像权限、实时拇指图权限”授权给第二应用程序。而后第二应用程序为用户展示如图5C所示的检测到用户操作确定出用户的选择后的第一提示Q13,从Q13中用户可以看出第三摄像头为摄像头C1、C1的第三访问权限为预览权限和拍照权限。
在一种可能的实现方式中,如图4所示,在第一提示可以提醒用户指定第一摄像头和/或指定第一摄像头的第一访问权限时,第二应用程序还可以执行步骤S33。其中,步骤S33为可选步骤。
在步骤S33中,第二应用程序可以根据检测到的用户针对第一提示的权限调整操作(如上文用户针对K1和/或K2的触发操作),确定第三摄像头中用户指定第二应用程序可以调用的第一摄像头和第一摄像头的第一访问权限。若步骤S33中确定出第一摄像头和第一摄像头的第一访问权限则第二应用程序还可以执行步骤S34,在步骤S34中第二应用程序向车机发送用户指定权限报告,用户指定权限报告可以用于指示用户从第三摄像头中选择的第一摄像头以及第一摄像头的第一访问权限。例如,用户指定权限报告中可以包括第一摄像头的摄像头标识、第一摄像头的第一访问权限;或者用户指定权限报告可以包括中可以包括第三摄像头中被用户选择不授权给第二应用程序调用的第三摄像头的摄像头标识、第三摄像头的第三访问权限中用户选择不授权给第二应用程序控制的访问权限;等等。
在一些实施例中,若无步骤S33、步骤S33中并未检测到权限调整操作、或者步骤S33中基于权限调整操作发现调整后权限无变化(如,全部第三摄像头均被用户选定为第一摄像头、每个第三摄像头的第三访问权限即为对应的第一访问权限),则第 二应用程序在执行完步骤S32之后,可以直接执行步骤S34’或不向车机返回任何信息。在步骤S34’中第二应用程序向车机返回接收成功报告,该接收成功报告用于指示第二应用程序已经成功收到第一信息。
在步骤S24中,如图3、图4所示,更新第二应用程序的访问权限记录。访问权限记录中记录了第二应用程序可以且经用户授权可以调用的至少一个第一摄像头以及每个第一摄像头对应的第一访问权限。
在一些实施例中,车机可以在接收到“接收成功报告”或者未接收到第二应用程序的任何反馈的情况下,直接将车机确定的各第三摄像头以及对应的第三访问权限,作为第一摄像头以及对应的第一访问权限进行第二应用程序的访问权限记录的更新。例如,若车机确定摄像头C1和摄像头C6为第三摄像头,且C1和C6的第三访问权限均为完全访问权限,则若接收到“接收成功报告”或者未接收到第二应用程序的任何反馈,车机可以直接将摄像头C1、C6作为第一摄像头、C1和C6的第一访问权限均确定为完全访问权限,并将这些记录到第二应用程序的访问权限记录中,完成第二应用程序的访问权限记录的更新。
在一些实施例中,车机可以在接收到用户指定权限报告的情况下,根据用户指定权限报告确定出用户指定的第一摄像头以及每个第一摄像头的第一访问权限,并将其更新记录到第二应用程序的访问权限记录中,完成第二应用程序的访问权限记录的更新。
在一种可能的实现方式中,车机本地可以设置指定的存储空间用于进行各个应用程序的访问权限记录的存储。每一个访问权限记录对应地记录一个应用程序车机允许且用户授权可以调用的第一摄像头以及第一摄像头对应的第一访问权限。在一些实施例中,用户还可以通过车机进行车机内安装的每个应用程序的摄像头访问权限的设置。例如,用户可以通过车机的“设置”功能进入到能够对每个应用程序的权限进行设置的功能界面,在该界面中可以展示每个应用程序当前所拥有的各类权限。车机可以基于用户针对该界面中各类权限的操作,进行权限更新。其中,“各类权限”中可以包括摄像头权限,界面中可以展示车机允许对应的应用程序访问的第三摄像头以及对应的各第三访问权限,以及第三摄像头中被用户选择授权的第一摄像头以及第一摄像头的第一访问权限。或者,界面中还可以展示车机不允许对应的应用程序访问的其他摄像头。权限更新可以包括:若检测到针对第一摄像头以及第一摄像头的第一访问权限的调整操作,则确定调整后应用程序对应的第一摄像头以及第一摄像头的第一访问权限,并进行对应的访问权限记录更新。
举例来说,图6示出根据本申请一实施例中车机通过界面展示摄像头权限的示意图。如图6所示,界面Q2中通过对应的控件和标识来进行第三摄像头、第一摄像头以及车机不允许应用程序m访问的其他摄像头的展示,具体地:控件K31、K32、K41和K42均为用户可操作控件,B1为禁止访问标识。K31、K32可以分别指示摄像头对应的访问权限中的第一访问权限和第三访问权限,K31表示对应的访问权限为第一访问权限、K32表示对应的访问权限为第三访问权限但当前已经被用户禁止应用程序m使用,K41表示对应的摄像头为第三摄像头且该第三摄像头已经被用户选择为第一摄像头、K42表示对应的摄像头为第三摄像头但当前已经被用户禁止应用程序m使用。 B1用于指示对应的摄像头为车机不允许应用程序m访问的摄像头。也即,如图6中应用程序m的第一摄像头为摄像头C1、C1的第一访问权限为预览权限和拍照权限;应用程序m的第三摄像头为C1和C6,C1的第三访问权限为预览权限、拍照权限、录像权限和实时拇指图权限,C6的第三访问权限图中未示出(若检测到C6对应的控件K42被触发切换为K41,则可以参照C1展示C6的第三访问权限);车机不允许应用程序m访问的摄像头为摄像头C5。若车机检测到针对C1的录像权限对应的控件K32的触发操作,则车机可以将K32切换为K31,以及可以确定应用程序m的第一摄像头C1的第一访问权限被用户调整为预览权限、拍照权限、录像权限。
上述“权限授权”中步骤S21-步骤S24是为了保证最终确定的第二应用程序的第一摄像头和第一摄像头的第一访问权限是在车机允许以及用户授权的双重保证下得到的。而若车机授予应用程序的权限无需用户选择指定,则“权限授权”还存在另外一种实现方式:车机在检测到第二应用程序被安装、接收到访问请求或者接收到调用请求等情况下,直接根据第二应用程序的应用类型、应用类型与摄像头之间的映射关系,确定出允许第二应用程序访问的至少一个第三摄像头;以及根据第三摄像头的被调用记录和调用策略,确定出第二应用程序对每个第三摄像头的第三访问权限(参见上文步骤S22的实现过程)。而后,将第二应用程序的至少一个第三摄像头直接作为第一摄像头、以及将每个第三摄像头的第三访问权限作为对应的第第一访问权限在访问权限记录中更新记录。这样,可以简化“权限授权”的实现过程。
“摄像头调用”
在步骤S25中,如图3所示,接收用于申请调用摄像头的调用请求,并确定出调用请求对应的第一应用程序。其中,第一应用程序为上述第二应用程序中的任意一个。
在一些实施例中,第一应用程序可以在确定满足摄像头调用条件的情况下,向车机发送调用请求。摄像头调用条件可以是第一应用程序因自身运行需要而自发启动的或者可以是第一应用程序响应于用户启动摄像头的操作等等。例如,若第一应用程序为用于进行照片拍摄、照片处理的应用程序w1,若该应用程序w1检测到用户发出了需要进行拍照的操作,则可以确定需要调用摄像头,可以生成调用请求并发送至车机。若第一应用程序为登录需要进行人脸识别的应用程序w2,若该应用程序w2检测到用户发出了启动应用程序w2的操作,则可以确定需要调用摄像头,可以生成调用请求并发送至车机。
在一种可能的实现方式中,调用请求可以指示请求调用摄像头的第一应用程序。调用请求中可以包括用于指示第一应用程序是车机中安装的多个应用程序的哪一个的程序标识,以指示第一应用程序。车机在接收到调用请求之后,可以根据调用请求中的程序标识确定发出调用请求的第一应用程序。在一种可能的实现方式中,若调用请求中不存在指示第一应用程序的程序标识等信息,汽车的车机还可以直接将发出调用请求的应用程序确定为第一应用程序。
在步骤S26中,如图3所示,在执行完步骤S25之后,根据第一应用程序的访问权限记录,确定出第一应用程序对应的第一摄像头和第一应用程序访问第一摄像头的第一访问权限。
在一些实施例中,步骤S26中车机确定出第一应用程序之后,可以从本地对应的存储空间中获取到第一应用程序的权限访问记录,进而根据权限访问记录确定出第一应用程序对应的第一摄像头和第一摄像头的第一访问权限。
在步骤S27中,如图3所示,在执行步骤S26之后,根据第一应用程序的第一摄像头当前的调用状态、对应的调用策略和对应的第一访问权限,从第一摄像头中确定出第一应用程序当前能够调用的第二摄像头以及第二摄像头的第二访问权限。
在一种可能的实现方式中,步骤S27中车机确定出第一应用程序对应的至少一个第一摄像头和每个第一摄像头对应的第一访问权限之后,可以根据每个第一摄像头的摄像头类型确定出第一摄像头对应的调用策略。而后可以根据每个第一摄像头对应的调用策略和第一摄像头当前的调用状态,从至少一个第一摄像头中确定出第二摄像头,以及从第一访问权限中确定出第二访问权限。第一摄像头当前的调用状态为空闲状态或已用状态,空闲状态可以指示对应的摄像头当前并未被其他应用程序调用,已用状态可以指示对应的摄像头当前正在处于被其他应用程序调用。
在一些实施例中,若第一摄像头为专属类摄像头且第一摄像头的调用状态为已用状态,则可以确定该第一摄像头不能授权第一应用程序进行调用,该第一摄像头不能作为第二摄像头。若第一摄像头为专属类摄像头且第一摄像头的调用状态为空闲状态,则可以确定该第一摄像头为第二摄像头、以及将对应的第一访问权限确定为对应的第二访问权限。
在一些实施例中,若第一摄像头为共享类摄像头且第一摄像头的调用状态为已用状态,则可以确定该第一摄像头为第二摄像头,以及将对应的第一访问权限中的数据类权限作为第二访问权限(例如,若第一访问权限为完全访问权限,则第二访问权限即为数据类权限。若第一访问权限为控制类权限中的全部权限、预览权限(数据类权限)、拍照权限(数据类权限),则第二访问权限即为第一访问权限中的数据类权限“预览权限、拍照权限”)。若第一摄像头为共享类摄像头且第一摄像头的调用状态为空闲状态,则可以确定该第一摄像头为第二摄像头,以及将对应的第一访问权限作为对应的第二访问权限。
在一些实施例中,若第一摄像头为通用类摄像头,则无论第一摄像头是否已经被其他应用程序调用,均可以确定该第一摄像头为第二摄像头,以及将对应的第一访问权限作为对应的第二访问权限。
在步骤S28中,如图3所示,步骤S27执行完后,将第二摄像头的第二访问权限授予第一应用程序。
在一种可能的实现方式中,为实现将第二摄像头的第二访问权限授予第一应用程序,步骤S28中车机执行的操作可以包括:向第一应用程序发送授权信息,授权信息可以指示授予第一应用程序的第二摄像头以及指示第一应用程序得到了第二摄像头的哪些第二访问权限。在一些实施例中,在第二摄像头为多个的情况下,第一应用程序可以基于接收到的授权信息发出摄像头选择提示,该摄像头选择提示用于提醒用户从多个第二摄像头中选择出第一应用程序当前需要立即调用的目标摄像头。在一些实施例中,在第二摄像头为多个的情况下,第一应用程序可以通过以下方式中的任意一种确定出目标摄像头:根据检测到的用户响应于摄像头选择提示的操作从多个第二摄像 头中选择出目标摄像头。也可以根据第一应用程序的摄像头调用历史将多个第二摄像头中用户偏好的摄像头确定为目标摄像头。还可以根据第一应用程序的摄像头调用历史将多个第二摄像头中上一次被第一应用程序调用的摄像头确定为目标摄像头。等等。在一些实施例中,第一应用程序确定出目标摄像头之后,可以向车机发送摄像头选定报告,以使得车机可以基于摄像头选定报告确定多个第二摄像头中被选定的目标摄像头,也使得第一应用程序可以获取目标摄像头实时采集的数据。
在一种可能的实现方式中,在第一应用程序获取到目标摄像头实时采集的数据之后,若第一应用程序为“用于为用户进行照片和/或视频拍摄的应用程序”、或“对应的第二访问权限包括预览权限”等需要为用户展示目标摄像头采集的画面的情况下,第一应用程序可以直接控制在车机的显示屏中为用户展示根据目标摄像头实时采集的数据生成的目标摄像头实时采集的画面。在一些实施例中,第一应用程序在显示屏中展示目标摄像头的实时画面的同时,还可以展示摄像头切换控件和/或对应于目标摄像的第二访问权限的至少一个操作控件(例如,可以为每一个第二访问权限分别设置一个对应的操作控件)。
在一种可能的实现方式中,在第一应用程序获取到目标摄像头或第二摄像头(在第二摄像头为一个的情况下,则无需选定目标摄像头,该第二摄像头即为目标摄像头)实时采集的数据之后,若第一应用程序为无需为用户展示目标摄像头采集的画面的情况下,可以直接控制在车机的显示屏中为用户展示摄像头切换控件和/或对应于目标摄像头的第二访问权限的至少一个操作控件,以便于用户可以进行摄像头切换和/或控制目标摄像头。
在一些实施例中,第一应用程序在检测到用户发出的针对任意一个操作控件的点击、滑动等触发操作的情况下,可以基于被触发的操作控件所对应的第二访问权限生成对应的控制指令(例如,若被触发的操作控件对应的第二访问权限为“拍照权限”,则第一应用程序即可以生成用于进行拍照的控制指令。若被触发的操作控件对应的第二访问权限为“缩放权限”,则第一应用程序即可以生成用于对目标摄像头进行缩小或放大的控制指令)。在一些实施例中,第一应用程序在检测到用户针对摄像头切换控件的点击、滑动等触发操作的情况下,可以确定摄像头切换控件被触发,则第一应用程序可以按照摄像头切换顺序(对于多个第二摄像头所对应的摄像头切换顺序可以是任意的,也可以是按照设定的规则排布的,本申请对此不作限制)将目标摄像头切换为多个第二摄像头中的下一个摄像头。举例来说,假定第一应用程序可调用的第二摄像头为摄像头C3、C5、C6且摄像头切换顺序从前到后依次为C3、C5、C6,第一应用程序当前的目标摄像头为摄像头C3,若第一应用程序检测到摄像头切换控件被触发则将目标摄像头切换为摄像头C5。
在一些实施例中,第一应用程序可以在确定控制指令中对应的第二访问权限为控制类权限的情况下,直接将控制指令发送至摄像头或者将控制指令发送至车机(以使得车机将该控制指令转发至摄像头),这样,目标摄像头就可以及时响应控制指令。
在一种可能的实现方式中,为实现将第二摄像头的第二访问权限授予第一应用程序,步骤S28中车机执行的操作还可以包括:在第二摄像头为一个的情况下,车机可以直接将该第二摄像头确定为目标摄像头,并按照第一应用程序对目标摄像头的第二 访问权限将目标摄像头实时采集的数据中的部分或全部发送至第一应用程序。或者,车机还可以向目标摄像头发送调用指令,调用指令用于指示调用目标摄像头的第一应用程序、第一应用程序调用目标摄像头所拥有的第二访问权限。这样,目标摄像头接收到调用指令后,目标摄像头内部的控制器可以按照第一应用程序对目标摄像头的第二访问权限将目标摄像头实时采集的数据中的部分或全部发送至第一应用程序。
在一种可能的实现方式中,为实现将第二摄像头的第二访问权限授予第一应用程序,步骤S28中车机执行的操作还可以包括:在第二摄像头为多个的情况下,车机可以直接根据摄像头选定报告确定出目标摄像头。或者,在第二摄像头为多个的情况下,车机若未接收到摄像头选定报告,可以直接从多个第二摄像头中确定出目标摄像头,例如,车机可以根据第一应用程序的摄像头调用历史将多个第二摄像头中用户偏好的摄像头确定为目标摄像头。车机还可以根据第一应用程序的摄像头调用历史将多个第二摄像头中上一次被第一应用程序调用的摄像头确定为目标摄像头。等等。
在一种可能的实现方式中,在步骤S28之后,若目标摄像头为通用类摄像头、目标摄像头当前被多个应用程序(多个应用程序中包括第一应用程序)调用,且车机(或目标摄像头)在同一时刻接收到来自不同应用程序的控制指令的情况下,可以按照响应规则从多个控制指令中选择出优先响应控制指令,并控制目标摄像头执行优先响应控制指令。
图7示出根据本申请一实施例的控制装置的架构框图。如图7所示,车机等控制装置的架构包括:应用程序、相机服务模块和硬件物理模块。车机在执行上述步骤S11-步骤S16、步骤S231-步骤S28的过程中应用程序、相机服务模块和硬件物理模块用于执行个步骤中的部分或全部操作。
应用程序:可以用于实现与用户之间的交互,执行上述步骤S31-步骤S34。
相机服务模块:用于设置各类型的摄像头的调用策略(执行上述步骤S16),设置摄像头的访问权限(控制类权限和/或数据类权限)。还可以用于执行“权限授权”中的各步骤(上述步骤S21-步骤S24)和“摄像头调用”中的各步骤(上述步骤S25-步骤S28)。
硬件物理模块:用于设置每个摄像头的摄像头类型,定义专属类摄像头和共享类摄像头对应的摄像头应用场景,设置应用类型与摄像头之间的映射关系。硬件物理模块可以执行上述步骤S11-步骤S15。
在一种可能的实现方式中,本申请摄像头控制方法中所涉及的应用程序,可以是直接安装在车机中的应用程序,还可以是安装在能够远程控制车机的终端设备中的应用程序。终端设备可以包括手机、可折叠电子设备、平板电脑、膝上型计算机、手持计算机、笔记本电脑、超级移动个人计算机(ultra-mobile personal computer,UMPC)、上网本、蜂窝电话、个人数字助理(personal digital assistant,PDA)、增强现实(augmented reality,AR)设备、虚拟现实(virtual reality,VR)设备、人工智能(artificial intelligence,AI)设备、可穿戴式设备、车载设备、智能家居设备、或智慧城市设备中的至少一种。本申请实施例对终端设备的具体类型不作特殊限制。
本申请实施例还提供了一种摄像头控制装置,包括:处理器以及用于存储处理器可执行指令的存储器;其中,所述处理器被配置为执行所述指令时实现上述方法。
本申请实施例还提供了一种非易失性计算机可读存储介质,其上存储有计算机程序指令,所述计算机程序指令被处理器执行时实现上述方法。
本申请实施例还提供了一种计算机程序产品,包括计算机可读代码,或者承载有计算机可读代码的非易失性计算机可读存储介质,当所述计算机可读代码在终端设备的处理器中运行时,所述终端设备中的处理器执行上述方法。
计算机可读存储介质可以是可以保持和存储由指令执行设备使用的指令的有形设备。计算机可读存储介质例如可以是――但不限于――电存储设备、磁存储设备、光存储设备、电磁存储设备、半导体存储设备或者上述的任意合适的组合。计算机可读存储介质的更具体的例子(非穷举的列表)包括:便携式计算机盘、硬盘、随机存取存储器(Random Access Memory,RAM)、只读存储器(Read Only Memory,ROM)、可擦式可编程只读存储器(Electrically Programmable Read-Only-Memory,EPROM或闪存)、静态随机存取存储器(Static Random-Access Memory,SRAM)、便携式压缩盘只读存储器(Compact Disc Read-Only Memory,CD-ROM)、数字多功能盘(Digital Video Disc,DVD)、记忆棒、软盘、机械编码设备、例如其上存储有指令的打孔卡或凹槽内凸起结构、以及上述的任意合适的组合。
这里所描述的计算机可读程序指令或代码可以从计算机可读存储介质下载到各个计算/处理设备,或者通过网络、例如因特网、局域网、广域网和/或无线网下载到外部计算机或外部存储设备。网络可以包括铜传输电缆、光纤传输、无线传输、路由器、防火墙、交换机、网关计算机和/或边缘服务器。每个计算/处理设备中的网络适配卡或者网络接口从网络接收计算机可读程序指令,并转发该计算机可读程序指令,以供存储在各个计算/处理设备中的计算机可读存储介质中。
用于执行本申请操作的计算机程序指令可以是汇编指令、指令集架构(Instruction Set Architecture,ISA)指令、机器指令、机器相关指令、微代码、固件指令、状态设置数据、或者以一种或多种编程语言的任意组合编写的源代码或目标代码,所述编程语言包括面向对象的编程语言—诸如Smalltalk、C++等,以及常规的过程式编程语言—诸如“C”语言或类似的编程语言。计算机可读程序指令可以完全地在用户计算机上执行、部分地在用户计算机上执行、作为一个独立的软件包执行、部分在用户计算机上部分在远程计算机上执行、或者完全在远程计算机或服务器上执行。在涉及远程计算机的情形中,远程计算机可以通过任意种类的网络—包括局域网(Local Area Network,LAN)或广域网(Wide Area Network,WAN)—连接到用户计算机,或者,可以连接到外部计算机(例如利用因特网服务提供商来通过因特网连接)。在一些实施例中,通过利用计算机可读程序指令的状态信息来个性化定制电子电路,例如可编程逻辑电路、现场可编程门阵列(Field-Programmable Gate Array,FPGA)或可编程逻辑阵列(Programmable Logic Array,PLA),该电子电路可以执行计算机可读程序指令,从而实现本申请的各个方面。
这里参照根据本申请实施例的方法、装置(系统)和计算机程序产品的流程图和/或框图描述了本申请的各个方面。应当理解,流程图和/或框图的每个方框以及流程图和/或框图中各方框的组合,都可以由计算机可读程序指令实现。
这些计算机可读程序指令可以提供给通用计算机、专用计算机或其它可编程数据 处理装置的处理器,从而生产出一种机器,使得这些指令在通过计算机或其它可编程数据处理装置的处理器执行时,产生了实现流程图和/或框图中的一个或多个方框中规定的功能/动作的装置。也可以把这些计算机可读程序指令存储在计算机可读存储介质中,这些指令使得计算机、可编程数据处理装置和/或其他设备以特定方式工作,从而,存储有指令的计算机可读介质则包括一个制造品,其包括实现流程图和/或框图中的一个或多个方框中规定的功能/动作的各个方面的指令。
也可以把计算机可读程序指令加载到计算机、其它可编程数据处理装置、或其它设备上,使得在计算机、其它可编程数据处理装置或其它设备上执行一系列操作步骤,以产生计算机实现的过程,从而使得在计算机、其它可编程数据处理装置、或其它设备上执行的指令实现流程图和/或框图中的一个或多个方框中规定的功能/动作。
附图中的流程图和框图显示了根据本申请的多个实施例的装置、系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段或指令的一部分,所述模块、程序段或指令的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个连续的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。
也要注意的是,框图和/或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以用执行相应的功能或动作的硬件(例如电路或ASIC(Application Specific Integrated Circuit,专用集成电路))来实现,或者可以用硬件和软件的组合,如固件等来实现。
尽管在此结合各实施例对本发明进行了描述,然而,在实施所要求保护的本发明过程中,本领域技术人员通过查看所述附图、公开内容、以及所附权利要求书,可理解并实现所述公开实施例的其它变化。在权利要求中,“包括”(comprising)一词不排除其他组成部分或步骤,“一”或“一个”不排除多个的情况。单个处理器或其它单元可以实现权利要求中列举的若干项功能。相互不同的从属权利要求中记载了某些措施,但这并不表示这些措施不能组合起来产生良好的效果。
附图中的流程图和框图显示了根据本申请的多个实施例的装置、系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段或指令的一部分,所述模块、程序段或指令的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个连续的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。
也要注意的是,框图和/或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以用执行相应的功能或动作的硬件(例如电路或ASIC(Application Specific Integrated Circuit,专用集成电路))来实现,或者可以用硬件和软件的组合,如固件等来实现。
尽管在此结合各实施例对本发明进行了描述,然而,在实施所要求保护的本发明 过程中,本领域技术人员通过查看所述附图、公开内容、以及所附权利要求书,可理解并实现所述公开实施例的其它变化。在权利要求中,“包括”(comprising)一词不排除其他组成部分或步骤,“一”或“一个”不排除多个的情况。单个处理器或其它单元可以实现权利要求中列举的若干项功能。相互不同的从属权利要求中记载了某些措施,但这并不表示这些措施不能组合起来产生良好的效果。
以上已经描述了本申请的各实施例,上述说明是示例性的,并非穷尽性的,并且也不限于所披露的各实施例。在不偏离所说明的各实施例的范围的情况下,对于本技术领域的普通技术人员来说许多修改和变更都是显而易见的。本文中所用术语的选择,旨在最好地解释各实施例的原理、实际应用或对市场中的技术的改进,或者使本技术领域的其它普通技术人员能理解本文披露的各实施例。

Claims (16)

  1. 一种摄像头控制方法,其特征在于,所述方法包括:
    接收用于申请调用摄像头的调用请求,并确定出所述调用请求对应的第一应用程序;
    获取所述第一应用程序的访问权限记录,所述访问权限记录用于记录对应的应用程序被允许调用的至少一个第一摄像头和对应的应用程序访问对应的第一摄像头的第一访问权限,所述至少一个第一摄像头为已安装的多个摄像头中的部分或全部;
    根据每个所述第一摄像头当前的调用状态、对应的调用策略和对应的第一访问权限,从所述至少一个第一摄像头中确定出所述第一应用程序当前能够调用的第二摄像头以及确定所述第二摄像头的第二访问权限;
    将所述第二摄像头的第二访问权限授予所述第一应用程序。
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    接收用于申请摄像头访问权限的访问请求,并确定出所述访问请求对应的第二应用程序;
    根据所述第二应用程序的应用类型、每个所述摄像头与应用类型之间的映射关系,从已安装的多个摄像头中确定出允许所述第二应用程序访问的至少一个第三摄像头以及每个所述第三摄像头对应的第三访问权限,所述第三访问权限包括控制类权限和/或数据类权限;
    根据所述至少一个第三摄像头以及每个所述第三摄像头对应的第三访问权限,更新所述第二应用程序的访问权限记录,所述第二应用程序包括所述第一应用程序。
  3. 根据权利要求2所述的方法,其特征在于,根据所述至少一个第三摄像头以及每个所述第三摄像头对应的第三访问权限,更新所述第二应用程序的访问权限记录,包括:
    将所述第三摄像头以及对应的第三访问权限,分别确定为作为第一摄像头以及对应的第一访问权限,记录到所述第二应用程序的访问权限记录中。
  4. 根据权利要求2所述的方法,其特征在于,根据所述至少一个第三摄像头以及每个所述第三摄像头对应的第三访问权限,更新所述第二应用程序的访问权限记录,包括:
    将每个所述第三摄像头的第一信息发送至所述第二应用程序,以使所述第二应用程序基于所述第一信息展示第一提示,所述第一提示用于提醒用户所述第二应用程序被允许访问的第三摄像头、提醒用户从所述第三摄像头中选择出用户指定所述第二应用程序能够调用的第一摄像头、和/或提醒用户确定每个第一摄像头的第一访问权限;
    接收所述第二应用程序发送的用户指定权限报告,所述用户指定权限报告用于指示所述第二应用程序根据检测到的权限调整操作确定的所述第三摄像头中被用户指定的第一摄像头和用户指定的所述第一摄像头的第一访问权限;
    将所述用户指定权限报告中指示的第一摄像头和对应的第一访问权限,记录到所述第二应用程序的访问权限记录中。
  5. 根据权利要求1-4任意一项所述的方法,其特征在于,所述方法还包括:
    根据每个所述摄像头的摄像头相关参数,对每个所述摄像头的摄像头类型进行设 置以及设置专属类摄像头和共享类摄像头对应的摄像头应用场景,每个所述摄像头的摄像头类型包括专属类、共享类和通用类中的任意一种;
    根据应用类型对应的程序应用场景与所述摄像头应用场景的匹配结果,建立应用类型与摄像头之间的映射关系;
    根据不同摄像头类型的摄像头的使用特点,为每种摄像头类型设置对应的调用策略。
  6. 根据权利要求5所述的方法,其特征在于,根据应用类型对应的程序应用场景与所述摄像头应用场景的匹配结果,建立应用类型与摄像头之间的映射关系,包括:
    若所述应用类型对应的程序应用场景与共享类摄像头对应的摄像头应用场景匹配,则建立所述共享类摄像头与所述应用程序之间的映射关系;和/或
    若所述应用类型对应的程序应用场景与专属类摄像头对应的摄像头应用场景匹配,则建立所述专属类摄像头与所述应用程序之间的映射关系;和/或
    若所述应用类型对应的程序应用场景与任意摄像头应用场景均不匹配,则建立所述通用类摄像头与所述应用程序之间的映射关系。
  7. 根据权利要求5所述的方法,其特征在于,所述方法还包括:
    建立所有所述应用类型与所述通用类摄像头之间的映射关系。
  8. 根据权利要求1所述的方法,其特征在于,根据每个所述第一摄像头当前的调用状态、对应的调用策略和对应的第一访问权限,从所述至少一个第一摄像头中确定出所述第一应用程序当前能够调用的第二摄像头以及确定所述第二摄像头的第二访问权限,包括以下操作中的至少一种:
    若所述第一摄像头中包括专属类摄像头,则将所述专属类摄像头中当前的调用状态为空闲状态的专属类摄像头确定为第二摄像头,以及将对应的第一访问权限确定为对应的第二访问权限;
    若所述第一摄像头中包括共享类摄像头,则将所述共享类摄像头中当前的调用状态为空闲状态的共享类摄像头确定为第二摄像头,以及将对应的第一访问权限确定为对应的第二访问权限;
    若所述第一摄像头中包括共享类摄像头,则将所述共享类摄像头中当前的调用状态为已用状态的共享类摄像头确定为第二摄像头,以及将对应的第一访问权限中的数据类权限确定为对应的第二访问权限;
    若所述第一摄像头中包括通用类摄像头,则将所述通用类摄像头确定为第二摄像头,以及将对应的第一访问权限确定为对应的第二访问权限。
  9. 根据权利要求1所述的方法,其特征在于,将所述第二摄像头的第二访问权限授予所述第一应用程序,包括:
    若所述第二摄像头的数量为多个,则确定出多个第二摄像头中的目标摄像头;
    将所述目标摄像头的第二访问权限授予所述第一应用程序。
  10. 根据权利要求9所述的方法,其特征在于,若所述第二摄像头的数量为多个,则确定出多个第二摄像头中的目标摄像头,包括以下操作中的任意一种:
    接收所述第一应用程序发送的摄像头选定报告,将多个第二摄像头中所述摄像头选定报告中指示的摄像头确定为目标摄像头,所述摄像头选定报告用于指示多个第二 摄像头中被选定的目标摄像头;
    根据所述第一应用程序的摄像头调用历史将多个第二摄像头中用户偏好的摄像头确定为目标摄像头;
    根据所述第一应用程序的摄像头调用历史将多个第二摄像头中上一次被所述第一应用程序调用的摄像头确定为目标摄像头。
  11. 根据权利要求10所述的方法,其特征在于,接收所述第一应用程序发送的摄像头选定报告,将多个第二摄像头中所述摄像头选定报告中指示的摄像头确定为目标摄像头,包括:
    若所述第二摄像头为多个,则向所述第一应用程序发送授权信息,所述授权信息用于指示所述多个第二摄像头以及指示每个所述第二摄像头对应的第二访问权限,以使所述第一应用程序基于所述授权信息发出摄像头选择提示,所述摄像头选择提示用于提醒用户从多个第二摄像头中选择出目标摄像头;
    接收所述第一应用程序发送的摄像头选定报告,所述摄像头选定报告用于指示所述多个第二摄像头中被选中的目标摄像头,所述目标摄像头是所述第一应用程序根据检测到的用户响应于所述摄像头选择提示的操作确定的;
    将多个第二摄像头中所述摄像头选定报告中指示的摄像头确定为目标摄像头。
  12. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    若被所述第一应用程序调用的第二摄像头为通用类摄像头且同一时刻接收到控制所述第二摄像头的多个控制指令,则从多个控制指令中确定出优先响应控制指令;
    控制所述第二摄像头执行所述优先响应控制指令。
  13. 根据权利要求12所述的方法,其特征在于,从多个控制指令中确定出优先响应控制指令,包括:
    根据每个控制指令对应的应用程序的优先级和/或每个控制指令对应的应用程序的历史使用记录,从所述多个控制指令中确定出优先响应控制指令;
    其中,应用程序的优先级是根据应用程序的应用类型确定的。
  14. 一种数据的传输装置,其特征在于,包括:
    处理器;
    用于存储处理器可执行指令的存储器;
    其中,所述处理器被配置为执行所述指令时实现权利要求1-13任意一项所述的方法。
  15. 一种非易失性计算机可读存储介质,其上存储有计算机程序指令,其特征在于,所述计算机程序指令被处理器执行时实现权利要求1-13中任意一项所述的方法。
  16. 一种计算机程序产品,包括计算机可读代码,或者承载有计算机可读代码的非易失性计算机可读存储介质,当所述计算机可读代码在电子设备中运行时,所述电子设备中的处理器执行权利要求1-13中任意一项所述的方法。
PCT/CN2022/127049 2021-11-16 2022-10-24 摄像头控制方法及装置 WO2023088040A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111355496.0 2021-11-16
CN202111355496.0A CN116156311A (zh) 2021-11-16 2021-11-16 摄像头控制方法及装置

Publications (1)

Publication Number Publication Date
WO2023088040A1 true WO2023088040A1 (zh) 2023-05-25

Family

ID=86351108

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/127049 WO2023088040A1 (zh) 2021-11-16 2022-10-24 摄像头控制方法及装置

Country Status (2)

Country Link
CN (1) CN116156311A (zh)
WO (1) WO2023088040A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116866545A (zh) * 2023-06-30 2023-10-10 荣耀终端有限公司 摄像头模组的映射关系调整方法、设备及存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109729270A (zh) * 2018-12-30 2019-05-07 联想(北京)有限公司 一种控制方法、装置及电子设备
CN112399232A (zh) * 2019-08-18 2021-02-23 海信视像科技股份有限公司 一种显示设备、摄像头优先级使用的控制方法及装置
CN112637508A (zh) * 2020-12-31 2021-04-09 维沃移动通信有限公司 摄像头的控制方法、装置和电子设备
CN112969024A (zh) * 2020-06-30 2021-06-15 华为技术有限公司 一种摄像头的调用方法、电子设备和摄像头
US20210306343A1 (en) * 2017-08-11 2021-09-30 Motorola Solutions, Inc. System, device, and method for transferring security access permissions between in-camera users

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210306343A1 (en) * 2017-08-11 2021-09-30 Motorola Solutions, Inc. System, device, and method for transferring security access permissions between in-camera users
CN109729270A (zh) * 2018-12-30 2019-05-07 联想(北京)有限公司 一种控制方法、装置及电子设备
CN112399232A (zh) * 2019-08-18 2021-02-23 海信视像科技股份有限公司 一种显示设备、摄像头优先级使用的控制方法及装置
CN112969024A (zh) * 2020-06-30 2021-06-15 华为技术有限公司 一种摄像头的调用方法、电子设备和摄像头
CN112637508A (zh) * 2020-12-31 2021-04-09 维沃移动通信有限公司 摄像头的控制方法、装置和电子设备

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116866545A (zh) * 2023-06-30 2023-10-10 荣耀终端有限公司 摄像头模组的映射关系调整方法、设备及存储介质

Also Published As

Publication number Publication date
CN116156311A (zh) 2023-05-23

Similar Documents

Publication Publication Date Title
US11126317B2 (en) Systems and methods for bulk redaction of recorded data
EP3540620B1 (en) Image processing device and image providing method therefor
US8531557B2 (en) Method, apparatus and system for performing a zoom operation
JP7026225B2 (ja) 生体検出方法、装置及びシステム、電子機器並びに記憶媒体
US11272100B2 (en) System and device having a mobile application executed thereon to record areas around and within a vehicle, and to provide direct audio-visual and/or textual telephonic contact with a licensed attorney within a predetermined jurisdiction based on a location of a user
WO2017181868A1 (zh) 应用处理方法、设备、界面系统、控制设备及操作系统
EP3979065A1 (en) Screen projection method and system
WO2023088040A1 (zh) 摄像头控制方法及装置
CN112394869B (zh) 基于车载终端的小程序控制方法、装置、设备及存储介质
US11863815B2 (en) Methods and systems for managing storage of videos in a storage device
KR20190129706A (ko) 제어장치 및 제어방법
US9525816B2 (en) Display control apparatus and camera system
CN111083444B (zh) 一种抓拍方法、装置、电子设备及存储介质
US20220108541A1 (en) Information processing device, information processing method, and program
CN117692771A (zh) 一种对焦方法及相关装置
WO2022161080A1 (zh) 一种摄像方法及装置
EP3383031A1 (en) Video display apparatus and control method of video display apparatus
EP3236377B1 (en) Method, device and system for preventing account from being broken into
CN114760417A (zh) 一种图像拍摄方法和装置、电子设备和存储介质
US11659268B2 (en) Imaging apparatus capable of automatically capturing image, control method, and recording medium
US20230345114A1 (en) Electronic apparatus
US11582392B2 (en) Augmented-reality-based video record and pause zone creation
EP4219250A1 (en) Methods, computer programs, and apparatuses for an augmented reality device and for a key of a vehicle, augmented reality device and key for a vehicle
US20220400207A1 (en) Electronic apparatus, control method for electronic apparatus, program, and storage medium
US20210105399A1 (en) Electronic apparatus and control method for electronic apparatus

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22894577

Country of ref document: EP

Kind code of ref document: A1