CN108737395A - Access method, apparatus, storage medium and the camera of camera - Google Patents

Access method, apparatus, storage medium and the camera of camera Download PDF

Info

Publication number
CN108737395A
CN108737395A CN201810433717.3A CN201810433717A CN108737395A CN 108737395 A CN108737395 A CN 108737395A CN 201810433717 A CN201810433717 A CN 201810433717A CN 108737395 A CN108737395 A CN 108737395A
Authority
CN
China
Prior art keywords
user terminal
camera
user
binding
access request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810433717.3A
Other languages
Chinese (zh)
Inventor
孙永利
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201810433717.3A priority Critical patent/CN108737395A/en
Publication of CN108737395A publication Critical patent/CN108737395A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/183Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a single remote source

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Telephone Function (AREA)

Abstract

This disclosure relates to a kind of method, apparatus, storage medium and camera accessing camera, to solve existing camera there are the higher technical problem of monitored picture leakage of information risk, the method for the access camera includes:The access request of the first user terminal is received, the access request includes the identity information of the first user terminal;Identification is carried out according to the first user terminal of identity information pair, to determine whether the first user terminal is the user terminal bound with camera;In the user terminal of the non-camera binding of the first user terminal, executes and remind operation.

Description

Access method, apparatus, storage medium and the camera of camera
Technical field
This disclosure relates to equipment application field, and in particular, to a kind of to access the method, apparatus of camera, storage medium And camera.
Background technology
Currently, by by the home network of intelligent video camera head accessing user, camera can be checked using terminal device Monitored picture, realize the real-time dynamic in remote monitoring man, it is ensured that household safe.In the related art, intelligent video camera head Highest weight limit the use of family and checking for intelligent video camera head can be shared with other users with access right, expand intelligent video camera head The range checked with access right.Specifically, intelligent video camera head is after receiving the access request that a certain terminal is sent, if should The user of terminal is the user that highest weight limits the use of family or is authorized to, then receives the access request, and show to the user Monitored picture.
Invention content
Purpose of this disclosure is to provide a kind of method, apparatus, storage medium and cameras accessing camera, to solve There are the higher technical problems of monitored picture leakage of information risk for existing camera.
In order to achieve the above objectives, the embodiment of the present disclosure in a first aspect, provide it is a kind of access camera method, including:
The access request of the first user terminal is received, the access request includes the identity letter of first user terminal Breath;
Identification is carried out to first user terminal according to the identity information, with determination first user terminal Whether it is the user terminal bound with the camera;
In the user terminal of the non-camera binding of first user terminal, executes and remind operation.
Optionally, it in the user terminal of the non-camera binding of first user terminal, executes and reminds operation, packet It includes:
Judge whether first user terminal is that the user terminal that the camera is bound is awarded according to the identity information Power accesses the user terminal of the camera;
If first user terminal, which is the user terminal mandate of camera binding, accesses the user of the camera Terminal then receives the access request, and executes the prompting according to preset first indicating mode and operate.
Optionally, the method further includes:
If first user terminal, which is the user terminal mandate of the non-camera binding, accesses the use of the camera Family terminal then refuses the access request, and executes the prompting according to preset second indicating mode and operate.
Optionally, the execution, which is reminded to operate, includes:
The indicator light of the camera is switched to the second operating mode by the first operating mode, and/or, it opens voice and broadcasts It reports achievement energy.
Optionally, operation is reminded in the execution, including:
The user terminal bound to the camera sends reminder message, and the reminder message is for reminding whether user permits Perhaps camera described in described first user terminal access;
Receive the response message that the user terminal of the camera binding is sent;
Determine whether to receive the access request of first user terminal according to the response message.
Optionally, the method further includes:
Judge whether first user terminal is hidden danger user terminal according to the identity information;
When first user terminal is hidden danger user terminal, controls the camera and secrecy is taken to operate.
Optionally, the identity information include access user account information and/or first user terminal it is unique Identification information.
The second aspect of the embodiment of the present disclosure provides a kind of device accessing camera, including:
Receiving module is configured as receiving the access request of the first user terminal, and the access request includes described first The identity information of user terminal;
Determining module is configured as carrying out identification to first user terminal according to the identity information, with true Whether fixed first user terminal is the user terminal bound with the camera;
Reminding module is configured as, in the user terminal of the non-camera binding of first user terminal, executing Remind operation.
Optionally, in the user terminal of the non-camera binding of first user terminal, the reminding module quilt It is configured to:
Judge whether first user terminal is that the user terminal that the camera is bound is awarded according to the identity information Power accesses the user terminal of the camera;
If first user terminal, which is the user terminal mandate of camera binding, accesses the user of the camera Terminal then receives the access request, and executes the prompting according to preset first indicating mode and operate.
Optionally, the reminding module is configured as the indicator light of the camera being switched to by the first operating mode Two operating modes, and/or, open voice broadcast function.
Optionally, the reminding module is additionally configured to:
The use of the camera is accessed in the user terminal mandate that first user terminal is the non-camera binding When the terminal of family, then refuse the access request, and the prompting is executed according to preset second indicating mode and is operated.
Optionally, the reminding module is configured as:
The user terminal bound to the camera sends reminder message, and the reminder message is for reminding whether user permits Perhaps camera described in described first user terminal access;
Receive the response message that the user terminal of the camera binding is sent;
Determine whether to receive the access request of first user terminal according to the response message.
Optionally, the determining module is additionally configured to, and judges that first user terminal is according to the identity information No is hidden danger user terminal;
Described device further includes:Security module is configured as when first user terminal is hidden danger user terminal, control Making the camera takes secrecy to operate.
Optionally, the identity information include access user account information and/or first user terminal it is unique Identification information.
The third aspect of the embodiment of the present disclosure provides a kind of device accessing camera, including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as executing the access camera that the first aspect of the embodiment of the present disclosure is provided The step of method.
The fourth aspect of the embodiment of the present disclosure provides a kind of computer readable storage medium, is stored thereon with computer journey Sequence instructs, and the access camera that the first aspect of the embodiment of the present disclosure is provided is realized when which is executed by processor The step of method.
5th aspect of the embodiment of the present disclosure, provides a kind of camera, including:
Image capture module, for acquiring monitored picture information;
Communication module is used for the communication of the camera and user terminal;
Memory, for storing processor-executable instruction;
Processor is configured as running the instruction in the memory to realize that the first aspect of the embodiment of the present disclosure is carried The step of method of the access camera of confession.
The technical scheme provided by this disclosed embodiment can include the following benefits:
When receiving the access request of the first user terminal, according to the body for the first user terminal that access request includes Part information can carry out identification to the first user terminal, to determine whether the first user terminal be the use bound with camera Family terminal.If the first user terminal is not the user terminal of camera binding, prompting operation is executed.In this way, removing camera Except the user terminal of binding, when accessing there are other users terminal-pair camera, prompting operation can be executed, to image The home subscriber of head knows the access situation when preceding camera, notes abnormalities access phenomenon in time, reduces monitored picture information and lets out The risk of leakage.
It should be understood that above general description and following detailed description is only exemplary and explanatory, not The disclosure can be limited.
Description of the drawings
Attached drawing is for providing further understanding of the disclosure, and a part for constitution instruction, with following tool Body embodiment is used to explain the disclosure together, but does not constitute the limitation to the disclosure.In the accompanying drawings:
Fig. 1 is a kind of schematic diagram of application scenarios shown according to an exemplary embodiment;
Fig. 2 is a kind of method flow diagram of access camera shown according to an exemplary embodiment;
Fig. 3 is a kind of method flow diagram of access camera shown according to an exemplary embodiment;
Fig. 4 is a kind of method flow diagram of access camera shown according to an exemplary embodiment;
Fig. 5 is a kind of device block diagram of access camera shown according to an exemplary embodiment;
Fig. 6 is a kind of device block diagram of access camera shown according to an exemplary embodiment.
Specific implementation mode
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all implementations consistent with this disclosure.On the contrary, they be only with it is such as appended The example of the consistent device and method of some aspects be described in detail in claims, the disclosure.
Currently, camera is widely popularized, user can be checked by application program taken by camera Monitored picture, to achieve the purpose that remote monitoring and household safe protection.However the use of camera is brought just to life While sharp, a series of security risk is also produced, such as leakage of private information problem.
Fig. 1 is a kind of schematic diagram of application scenarios shown according to an exemplary embodiment, as shown in Figure 1, camera 10 Has network communications capability, after being powered on to camera 10 and pressing power on button, camera 10 can send network number to surrounding According to packet, user 11 then can have found the equipment by having connected the application program of the terminal device of upper home network, and at end The notification bar of end equipment shows the camera for needing to be connected.When user 11 clicks the message informing that notification bar is shown, so that it may with defeated Enter the account and password of the home network for being connected into equipment, application program is then by WIFI (WIreless-Fidelity, wireless guarantor The account that information and present procedure very) logs in is sent to camera 10 by local area network communication, so that camera 10 accesses Home network.When camera 10 accesses home network, account information and the identification information of itself of user 11 etc. can be carried, Camera 10 sends bind request to server, just can determine that the mapping relations one by one between 11 account of camera 10 and user, Realize the privately owned attribute of camera 10.
It is worth noting that user 11 is properly termed as the user bound of camera 10, possess to 10 highest control of camera Permission processed.Illustratively, camera 10 can be shared with other users by user bound, if user 12 uses, make user 12 Camera 10 can also be checked and operated by application program, to realize the shared attribute of camera 10.
In actual use, different users can check the monitoring picture of camera by different terminal devices Face.For user bound, if there is the monitoring that other users check camera shooting by the application program on terminal device Picture is often unaware, i.e., user bound is not aware that other people when using terminal equipment has checked monitored picture.That , in the case where invading checking monitoring picture there are disabled user, user bound can not know and prevent the behaviour of disabled user Make behavior, is likely to result in the serious leak of the privacy informations such as user monitoring picture.
There is technical issues that monitored picture leakage of information, the embodiment of the present disclosure provide to solve above-mentioned camera A method of accessing camera.
Fig. 2 is a kind of method flow diagram of access camera shown according to an exemplary embodiment, as shown in Fig. 2, visiting The method for asking camera includes the following steps:
Step 201, the access request of the first user terminal is received, which includes the identity letter of the first user terminal Breath.
Specifically, when the first user wants to check the monitored picture of camera by the application program on terminal device, Access request can be sent by the first user terminal.Also, it is worth noting that the executive agent of the embodiment of the present disclosure can be with It is camera, can also be the other equipment other than camera, such as cloud server, or be in same with intelligent video camera head Other smart machines of LAN, the disclosure do not limit.It wherein, in the specific implementation, should if executive agent is camera Camera can directly receive the access request of the first user terminal, and execute corresponding remind according to the access request and operate. If the executive agent is to be authorized to that the first use can be being received to the other equipment that camera function is controlled, the equipment After the access request of family terminal, which can be sent to camera.
Wherein, access request includes the identity information of the first user terminal, and identity information includes the account letter for accessing user The unique identification information of breath and/or the first user terminal, for example, the unique identification information of the first user terminal can be the first use IMEI (International Mobile Equipment Identity, International Mobile Station Equipment Identification) code of family terminal.
Step 202, identification is carried out according to the first user terminal of identity information pair, whether to determine the first user terminal For the user terminal bound with camera.
According to the camera stored in the identity information and server of the first user terminal received and user bound account Mapping relations one by one between number, it can be determined that whether the first user terminal is the user terminal bound with camera.Illustratively, It is stored with the user bound account information of camera and the IMEI code of the user terminal of binding in server, wherein camera User bound account information is:User name, abc;Password, 123.If the login account information and user bound of the first user terminal Account information is consistent, and the IMEI code of the first user terminal is consistent with the IMEI code of the user terminal of binding, then can determine One user terminal is the user terminal bound with camera, otherwise, the user terminal of the non-camera binding of the first user terminal.
Step 203, it in the user terminal of the non-camera binding of the first user terminal, executes and reminds operation.
When the judging result of step 202 is the user terminal of the non-camera binding of the first user terminal, due to user's body Part has uncertainty, is likely to result in the leakage of the privacy informations such as user monitoring picture.In this case, then prompting is executed Operation notes abnormalities convenient for user bound to notify user bound that there are other people to check using camera and accesses phenomenon simultaneously in time It prevents.For example, when the executive agent of above method step is cloud server, if the cloud server determines the first user terminal The user terminal of non-camera binding, then remote control camera executes reminds operation accordingly.
Illustratively, it can be that the indicator light of camera is switched to the by the first operating mode to execute and remind the mode of operation Two operating modes, and/or, open voice broadcast function.For example, the first operating mode of indicator light is always on for green, executing When reminding operation, indicator light is switched to the second operating mode, i.e. indicator light colors are transformed to red and flicker.Optionally, it executes Voice broadcast, or the identity according to the first user terminal can also be carried out when operation to the first user terminal identity information by reminding Information sends reminder message to user bound.
Using the above method, when receiving the access request of the first user terminal, include according to access request The identity information of one user terminal can to the first user terminal carry out identification, with determine the first user terminal whether be with The user terminal of camera binding.If the first user terminal is not the user terminal of camera binding, prompting operation is executed. In this way, in addition to the user terminal of camera binding, when accessing there are other users terminal-pair camera, prompting can be executed Operation notes abnormalities access phenomenon in time so that the user bound of camera knows the access situation when preceding camera, reduces prison Control the risk of image information leakage.
Fig. 3 is a kind of method flow diagram of access camera shown according to an exemplary embodiment, as shown in figure 3, visiting The method for asking camera includes the following steps:
Step 301, the access request of the first user terminal is received, which includes the identity letter of the first user terminal Breath.
Step 302, judge whether the first user terminal is the user terminal bound with camera.
In the user terminal of the non-camera binding of the first user terminal, step 303 is executed, it is no to then follow the steps 307.
Step 303, judge whether the first user terminal is that the user terminal mandate of camera binding accesses the use of camera Family terminal.
Camera can be shared with other users and carry out checking use by user bound, receive the first user terminal After access request, the identity information that the access request according to the first user terminal includes may determine that the first user terminal is The no user terminal mandate for camera binding accesses the user terminal of camera, and is bound for camera in the first user terminal User terminal mandate when accessing the user terminal of camera, execute step 304, otherwise, execute step 305 and step 306.
Step 304, it accepts the interview request, and is executed according to preset first indicating mode and remind operation.
When the user terminal mandate that the first user terminal is camera binding accesses the user terminal of camera, camera Receive the access request of the first user terminal, and is executed according to preset first indicating mode and remind operation.Illustratively, it first carries Awake pattern is that the indicator light colors of camera are blue, and are flickered with middling speed, and voice broadcast is default to remind ringing tone, to remind binding User's camera is being authorized to end-user access.
Step 305, denied access is asked, and is executed according to preset second indicating mode and reminded operation.
When the user terminal mandate that the first user terminal is the binding of non-camera accesses the user terminal of camera, camera shooting The access request of head the first user terminal of refusal, and executed according to preset second indicating mode and remind operation.Illustratively, second Indicating mode is that the indicator light colors of camera are red, and fast blink, voice broadcast preset ring alert tone, to remind binding User's camera is by unauthorized user terminal access.
Step 306, control camera takes secrecy to operate.
After carrying out identity judgement according to the identity information of the first user terminal, if the first user terminal, that is, non-camera The user terminal mandate of user terminal nor the camera binding of binding accesses the user terminal of camera, it is determined that this first User terminal is hidden danger terminal, and the access operation of progress is abnormal access.In this case, to prevent monitored picture information from letting out Leakage, control camera take secrecy to operate.
Illustratively, when detecting that the first user terminal is hidden danger terminal, and carrying out abnormal access, the secrecy taken is grasped Work can be that the first user terminal of control is forced to disconnect network connection with camera, can also be that control camera enters suspend mode shape State can prevent hidden danger terminal using aforesaid operations and continue to check and operate camera, reduce monitored picture leakage of information in time Risk.
Step 307, it accepts the interview request.
It should be noted that above-mentioned steps 305 are no execution later in step 303 judging result with step 306, but this The execution sequence of two steps can be configured according to actual needs, can execute step again after first carrying out step 305 306, step 306 can also be first carried out and execute step 305 again.
Using the above method, by judging whether the first user terminal is that the user terminal mandate access that camera is bound is taken the photograph The user terminal of camera is accessed as the user terminal of head, and in the user terminal mandate that the first user terminal is camera binding When, request of accepting the interview is performed simultaneously the operation for reminding camera being accessed.In this way, expand camera check and While operating right range, the safety of monitored picture information has been ensured, reduce the risk of monitored picture leakage of information.
Fig. 4 is a kind of method flow diagram of access camera shown according to an exemplary embodiment, as shown in figure 4, visiting The method for asking camera includes the following steps:
Step 401, the access request of the first user terminal is received, which includes the identity letter of the first user terminal Breath.
Step 402, judge whether the first user terminal is the user terminal bound with camera.
In the user terminal of the non-camera binding of the first user terminal, step 403 is executed, it is no to then follow the steps 406.
Step 403, the user terminal bound to camera sends reminder message.
In a kind of possible embodiment, by determining the non-camera binding of the first user terminal after identification User terminal, the then user terminal bound to camera send reminder message, and the reminder message is for reminding whether user allows First user terminal access camera.Illustratively, the user terminal of camera binding, can be in terminal when receiving reminder message The notification bar of equipment shows pending message informing, and clicking the message informing that notification bar is shown when user bound can select The access request whether allowed through the first user terminal is selected, and generates corresponding response message and is sent to camera.
Step 404, the response message that the user terminal of camera binding is sent is received.
Step 405, message determines whether to receive the access request of the first user terminal according to response.
Step 406, it accepts the interview request.
Using the above method, in the user terminal of the non-camera binding of the first user terminal, to the use of camera binding Family terminal sends reminder message, to remind user bound that there is currently other people to ask access camera, permits in user bound selection Perhaps when the first user terminal access camera, just receive the access request of the first user terminal, it is ensured that monitored picture information Safety reduces the risk of the privacy leakage caused by abnormal access.
Fig. 5 is a kind of block diagram of the device 500 of access camera shown according to an exemplary embodiment, accesses camera Device 500 can be implemented in combination with as some or all of of electronic equipment by software, hardware or both.Reference Fig. 5, The device 500 includes:
Receiving module 510 is configured as receiving the access request of the first user terminal, and access request includes that the first user is whole The identity information at end, wherein identity information include the unique mark letter for account information and/or the first user terminal for accessing user Breath;
Determining module 520 is configured as carrying out identification according to the first user terminal of identity information pair, to determine first Whether user terminal is the user terminal bound with camera;
Reminding module 530 is configured as, in the user terminal of the non-camera binding of the first user terminal, executing and reminding behaviour Make.
Optionally, in the user terminal of the non-camera binding of the first user terminal, reminding module 530 is configured as:
Judge whether the first user terminal is that the user terminal mandate that camera is bound accesses camera according to identity information User terminal;
If the first user terminal, which is the user terminal mandate of camera binding, accesses the user terminal of camera, receive visit It asks request, and is executed according to preset first indicating mode and remind operation.
Optionally, reminding module 530 is configured as the indicator light of camera being switched to the second work by the first operating mode Operation mode, and/or, open voice broadcast function.
Optionally, reminding module 530 is additionally configured to, and is awarded in the user terminal that the first user terminal is the binding of non-camera Power accesses the user terminal of camera, then denied access is asked, and is executed according to preset second indicating mode and remind operation.
Optionally, reminding module 530 is configured as:
The user terminal bound to camera sends reminder message, and reminder message is for reminding whether user allows the first use Family terminal access camera;
Receive the response message that the user terminal of camera binding is sent;
Message determines whether to receive the access request of the first user terminal according to response.
Optionally it is determined that module 520 is additionally configured to, judge whether the first user terminal is that hidden danger is used according to identity information Family terminal;
Device 500 further includes:Security module 540 is configured as when the first user terminal is hidden danger user terminal, control Camera takes secrecy to operate.
Using above-mentioned apparatus, when receiving module 510 receives the access request of the first user terminal, according to access request The identity information for the first user terminal for including can carry out identification to the first user terminal, to determine that the first user is whole Whether end is that the user terminal mandate that the user terminal bound with camera or camera are bound accesses user's end of camera End, and executed according to identification result and remind operation.In this way, in addition to the user terminal of camera binding, if there are other User terminal accesses to camera, can execute prompting operation, so that the user bound of camera knows when preceding camera Situation is accessed, notes abnormalities access phenomenon in time, reduces the risk of monitored picture leakage of information.
The embodiment of the present disclosure also provides a kind of device accessing camera, including:
Processor;
Memory for storing processor-executable instruction;
Wherein, processor is configured as the instruction in run memory to realize visit that disclosure any embodiment is provided The step of asking the method for camera.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method Embodiment in be described in detail, explanation will be not set forth in detail herein.
The disclosure also provides a kind of computer readable storage medium, is stored thereon with computer program instructions, which refers to The step of enabling the method for the access camera for realizing that disclosure any embodiment is provided when being executed by processor.
Fig. 6 is a kind of block diagram of the device 600 of access camera shown according to an exemplary embodiment.For example, device 600 can be mobile phone, tablet device, personal digital assistant etc..
With reference to Fig. 6, device 600 may include following one or more components:Processing component 601, memory 602, electric power Component 603, multimedia component 604, audio component 605, the interface 606 of input/output (I/O), sensor module 607, and Communication component 608.
The integrated operation of 601 usual control device 600 of processing component such as operates phase with display, touch operation and record Associated operation.Processing component 601 may include one or more processors 609 to execute instruction, and be taken the photograph with completing above-mentioned access As all or part of step of the method for head.In addition, processing component 601 may include one or more modules, it is convenient for processing group Interaction between part 601 and other assemblies.For example, processing component 601 may include multi-media module, to facilitate multimedia component Interaction between 604 and processing component 601.
Memory 602 is configured as storing various types of data to support the operation in device 600.These data are shown Example includes instruction for any application program or method that are operated on device 600, contact data, and telephone book data disappears Breath, picture, video etc..Memory 602 can be by any kind of volatibility or non-volatile memory device or their group It closes and realizes, such as static RAM (SRAM), electrically erasable programmable read-only memory (EEPROM) is erasable to compile Journey read-only memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash Device, disk or CD.
Electric power assembly 603 provides electric power for the various assemblies of device 600.Electric power assembly 603 may include power management system System, one or more power supplys and other generated with for device 600, management and the associated component of distribution electric power.
Multimedia component 604 is included in the screen of one output interface of offer between device 600 and user.In some realities It applies in example, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen can To be implemented as touch screen, to receive input signal from the user.Touch panel include one or more touch sensors with Sense the gesture on touch, slide, and touch panel.Touch sensor can not only sense the boundary of a touch or slide action, and And also detection and touch or the relevant duration and pressure of slide.In some embodiments, multimedia component 604 includes One front camera and/or rear camera.It is preceding when such as screening-mode or video mode when device 600 is in operation mode External multi-medium data can be received by setting camera and/or rear camera.Each front camera and rear camera can Be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio component 605 is configured as output and/or input audio signal.For example, audio component 605 includes a Mike Wind (MIC), when device 600 is in operation mode, when such as call model, logging mode and speech recognition mode, microphone by with It is set to reception external audio signal.The received audio signal can be further stored in memory 602 or via communication set Part 608 is sent.In some embodiments, audio component 605 further includes a loud speaker, is used for exports audio signal.
I/O interfaces 606 provide interface between processing component 601 and peripheral interface module, and above-mentioned peripheral interface module can To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock Determine button.
Sensor module 607 includes one or more sensors, and the state for providing various aspects for device 600 is commented Estimate.For example, sensor module 607 can detect the state that opens/closes of device 600, the relative positioning of component, such as component For the display and keypad of device 600, sensor module 607 can be with the position of 600 1 components of detection device 600 or device Set change, the existence or non-existence that user contacts with device 600, the temperature of 600 orientation of device or acceleration/deceleration and device 600 Variation.Sensor module 607 may include proximity sensor, be configured to detect without any physical contact near The presence of object.Sensor module 607 can also include optical sensor, such as CMOS or ccd image sensor, for being answered in imaging With middle use.In some embodiments, which can also include acceleration transducer, gyro sensor, magnetic Sensor, pressure sensor or temperature sensor.
Communication component 608 is configured to facilitate the communication of wired or wireless way between device 600 and other equipment.Device 600 can access the wireless network based on communication standard, such as Wi-Fi (Wireless-Fidelity, Wireless Fidelity), 2G/3G or 4G or combination thereof.In one exemplary embodiment, communication component 608 receives via broadcast channel and comes from external broadcasting The broadcast singal or broadcast related information of management system.In one exemplary embodiment, communication component 608 further includes that near field is logical (NFC) module is believed, to promote short range communication.For example, radio frequency identification (RFID) technology, infrared data association can be based in NFC module Meeting (IrDA) technology, ultra wide band (UWB) technology, bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 600 can be believed by one or more application application-specific integrated circuit (ASIC), number Number processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are realized, the side for executing above-mentioned access camera Method.
In the exemplary embodiment, it includes the non-transitorycomputer readable storage medium instructed, example to additionally provide a kind of Such as include the memory 602 of instruction, above-metioned instruction can be executed by the processor of device 600 to complete the side of above-mentioned access camera Method.For example, non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, Floppy disk and optical data storage devices etc..
The disclosure also provides a kind of camera, including:Image capture module, for acquiring monitored picture information;Communicate mould Block is used for the communication of camera and user terminal;Memory, for storing processor-executable instruction;Processor is configured as The step of method to realize access camera that disclosure any embodiment is provided of instruction in run memory.
Those skilled in the art will readily occur to other embodiment party of the disclosure after considering specification and putting into practice the disclosure Case.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or adaptability Variation follows the general principles of this disclosure and includes the undocumented common knowledge in the art of the disclosure or usual skill Art means.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by following claim It points out.
It should be understood that the present disclosure is not limited to the precise structures that have been described above and shown in the drawings, and And various modifications and changes may be made without departing from the scope thereof.The scope of the present disclosure is only limited by the accompanying claims.

Claims (10)

1. a kind of method accessing camera, which is characterized in that including:
The access request of the first user terminal is received, the access request includes the identity information of first user terminal;
According to the identity information to first user terminal carry out identification, with determination first user terminal whether For the user terminal bound with the camera;
In the user terminal of the non-camera binding of first user terminal, executes and remind operation.
2. according to the method described in claim 1, it is characterized in that, in the non-camera binding of first user terminal When user terminal, executes and remind operation, including:
Judge whether first user terminal is that the user terminal mandate that the camera is bound is visited according to the identity information Ask the user terminal of the camera;
If first user terminal, which is the user terminal mandate of camera binding, accesses the user terminal of the camera, Then receive the access request, and the prompting is executed according to preset first indicating mode and is operated.
3. according to the method described in claim 2, it is characterized in that, the method further includes:
If the user that the user terminal mandate that first user terminal is the non-camera binding accesses the camera is whole Then refuse the access request, and the prompting is executed according to preset second indicating mode and is operated in end.
4. according to the method described in claim 1, it is characterized in that, execution prompting operation includes:By the camera Indicator light is switched to the second operating mode by the first operating mode, and/or, open voice broadcast function.
5. according to the method described in claim 1, it is characterized in that, the execution remind operation, including:
The user terminal bound to the camera sends reminder message, and the reminder message is for reminding whether user allows institute State camera described in the first user terminal access;
Receive the response message that the user terminal of the camera binding is sent;
Determine whether to receive the access request of first user terminal according to the response message.
6. the method according to any one of claims 1 to 5, it is characterized in that, the method further includes:
Judge whether first user terminal is hidden danger user terminal according to the identity information;
When first user terminal is hidden danger user terminal, controls the camera and secrecy is taken to operate.
7. the method according to any one of claims 1 to 5, it is characterized in that, the identity information includes accessing user Account information and/or first user terminal unique identification information.
8. a kind of device accessing camera, which is characterized in that including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as the step of perform claim requires any one of 1 to 7 the method.
9. a kind of computer readable storage medium, is stored thereon with computer program instructions, which is characterized in that the program instruction quilt The step of any one of claim 1 to 7 the method is realized when processor executes.
10. a kind of camera, which is characterized in that including:
Image capture module, for acquiring monitored picture information;
Communication module is used for the communication of the camera and user terminal;
Memory, for storing processor-executable instruction;
Processor is configured as running the instruction in the memory to realize any one of claim 1 to 7 the method Step.
CN201810433717.3A 2018-05-08 2018-05-08 Access method, apparatus, storage medium and the camera of camera Pending CN108737395A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810433717.3A CN108737395A (en) 2018-05-08 2018-05-08 Access method, apparatus, storage medium and the camera of camera

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810433717.3A CN108737395A (en) 2018-05-08 2018-05-08 Access method, apparatus, storage medium and the camera of camera

Publications (1)

Publication Number Publication Date
CN108737395A true CN108737395A (en) 2018-11-02

Family

ID=63937204

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810433717.3A Pending CN108737395A (en) 2018-05-08 2018-05-08 Access method, apparatus, storage medium and the camera of camera

Country Status (1)

Country Link
CN (1) CN108737395A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109635532A (en) * 2018-12-05 2019-04-16 上海碳蓝网络科技有限公司 A kind of picture pick-up device and its binding method
CN110430164A (en) * 2019-07-01 2019-11-08 珠海格力电器股份有限公司 Network camera monitoring method, device and system and storage medium
CN110659473A (en) * 2019-09-24 2020-01-07 深圳创维-Rgb电子有限公司 AI camera authorization method, user terminal and computer readable storage medium
CN111783640A (en) * 2020-06-30 2020-10-16 北京百度网讯科技有限公司 Detection method, device, equipment and storage medium
CN111901567A (en) * 2020-07-31 2020-11-06 平安信托有限责任公司 Privacy protection method, device, equipment and computer readable storage medium
CN113378135A (en) * 2021-06-08 2021-09-10 华中科技大学 Method for inquiring and verifying private data of computer
CN115002403A (en) * 2022-04-28 2022-09-02 青岛海尔科技有限公司 Method and apparatus for transmitting multimedia data, storage medium, and electronic apparatus

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105100708A (en) * 2015-06-26 2015-11-25 小米科技有限责任公司 Request processing method and device
WO2016054571A1 (en) * 2014-10-03 2016-04-07 Gopro, Inc. Authenticating a limited input device via an authenticated application
CN105872463A (en) * 2016-04-01 2016-08-17 北京小米移动软件有限公司 Remind method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016054571A1 (en) * 2014-10-03 2016-04-07 Gopro, Inc. Authenticating a limited input device via an authenticated application
CN105100708A (en) * 2015-06-26 2015-11-25 小米科技有限责任公司 Request processing method and device
CN105872463A (en) * 2016-04-01 2016-08-17 北京小米移动软件有限公司 Remind method and device

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109635532A (en) * 2018-12-05 2019-04-16 上海碳蓝网络科技有限公司 A kind of picture pick-up device and its binding method
CN110430164A (en) * 2019-07-01 2019-11-08 珠海格力电器股份有限公司 Network camera monitoring method, device and system and storage medium
CN110659473A (en) * 2019-09-24 2020-01-07 深圳创维-Rgb电子有限公司 AI camera authorization method, user terminal and computer readable storage medium
CN111783640A (en) * 2020-06-30 2020-10-16 北京百度网讯科技有限公司 Detection method, device, equipment and storage medium
CN111901567A (en) * 2020-07-31 2020-11-06 平安信托有限责任公司 Privacy protection method, device, equipment and computer readable storage medium
CN113378135A (en) * 2021-06-08 2021-09-10 华中科技大学 Method for inquiring and verifying private data of computer
CN113378135B (en) * 2021-06-08 2023-08-25 华中科技大学 Method for inquiring and verifying privacy data of computer
CN115002403A (en) * 2022-04-28 2022-09-02 青岛海尔科技有限公司 Method and apparatus for transmitting multimedia data, storage medium, and electronic apparatus

Similar Documents

Publication Publication Date Title
CN108737395A (en) Access method, apparatus, storage medium and the camera of camera
CN104765990B (en) The setting method and device of intelligent device management account
US10798552B2 (en) Emergency call-for-help method and system based on fingerprint identification for mobile terminal, and mobile terminal
CN104468524B (en) The method and device of Authority Verification
CN104580730B (en) Alarm clock prompting method and device
CN104507034B (en) Equipment connection method, device and terminal device
CN105162668B (en) Connect method and device for removing
EP3745747A1 (en) Method and apparatus for controlling electronic device
CN106095220B (en) Notification message reminding method and device
CN105246138A (en) Control method and device of Internet-of-things device
CN105554255B (en) Method of controlling operation thereof and device for terminal device
CN105550568A (en) Mobile terminal data protection method and apparatus
WO2021185255A1 (en) Method and device for calling vehicle owner, server, client, terminal and storage medium
JP2018514820A (en) ONLINE PAYMENT METHOD, DEVICE, PROGRAM, AND RECORDING MEDIUM
CN106534551B (en) Information display method and device
CN105450861B (en) Information cuing method and device
CN107864460A (en) Call transferring method, device and equipment
CN105069344B (en) mobile terminal locking method and device
CN108377302A (en) Shield the method and device of harassing call
CN103974377B (en) Wireless network connecting method and device
CN108833728A (en) Adjust the method and device of incoming call prompting volume
CN107945341A (en) Intelligent door lock control method and device
CN105100473B (en) Communication modes switching method and device
CN107911535A (en) Adjustment locks screen automatically the method and device of time
CN108696914B (en) Method and device for scanning intelligent equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181102

RJ01 Rejection of invention patent application after publication