CN114980097A - Camera information management method and camera information management device - Google Patents

Camera information management method and camera information management device Download PDF

Info

Publication number
CN114980097A
CN114980097A CN202210373804.0A CN202210373804A CN114980097A CN 114980097 A CN114980097 A CN 114980097A CN 202210373804 A CN202210373804 A CN 202210373804A CN 114980097 A CN114980097 A CN 114980097A
Authority
CN
China
Prior art keywords
camera
information
router
terminal equipment
local area
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210373804.0A
Other languages
Chinese (zh)
Other versions
CN114980097B (en
Inventor
黄子岩
宁博
李瑾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Honor Device Co Ltd
Original Assignee
Honor Device Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Honor Device Co Ltd filed Critical Honor Device Co Ltd
Priority to CN202210373804.0A priority Critical patent/CN114980097B/en
Publication of CN114980097A publication Critical patent/CN114980097A/en
Application granted granted Critical
Publication of CN114980097B publication Critical patent/CN114980097B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/71Hardware identity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application provides a camera information management method and a camera information management device, which can improve the information safety of a camera and prevent the information leakage of the camera. The method comprises the following steps: the router receives a first request message from the terminal equipment, wherein the first request message is used for requesting to acquire information of the camera; the router judges whether the terminal equipment is equipment corresponding to a legal user or not; and if the terminal equipment is equipment corresponding to the legal user, the router returns the information of the camera in the target local area network to the terminal equipment, and the target local area network is a local area network served by the router.

Description

Camera information management method and camera information management device
Technical Field
The present application relates to the field of wireless communication technologies, and in particular, to a camera information management method and a camera information management apparatus.
Background
The monitoring technology plays a very positive role in the aspects of security monitoring, fire control monitoring, public security evidence obtaining, road detection and the like, but the monitoring technology has a relatively large negative effect, for example, the flooding use of a pinhole camera causes the leakage of personal privacy, and property and life are threatened. For this phenomenon, there is an application program of "detect camera" in the market, which can be used to detect cameras existing in the lan.
At present, the application program of the "detection camera" has the following defects: any terminal device connected to the local area network can detect the camera deployed in the local area network by using the application program, which can cause the problem of camera information security. For example, a camera in a place with a higher security level, such as a public security evidence collection place or a home, can be detected by terminal equipment which is randomly accessed to a local area network, so that security layout leakage or individual privacy leakage is caused, and the problem of information security is caused.
Therefore, a method for managing camera information is needed to improve information security.
Disclosure of Invention
The application provides a camera information management method and a camera information management device, which can improve the information safety of a camera and prevent the information leakage of the camera.
In a first aspect, a method for managing camera information is provided, including: the router receives a first request message from the terminal equipment, wherein the first request message is used for requesting to acquire information of the camera; the router judges whether the terminal equipment is equipment corresponding to a legal user or not; and if the terminal equipment is equipment corresponding to the legal user, the router returns the information of the camera in the target local area network to the terminal equipment, and the target local area network is a local area network served by the router.
The first request message may be an open network video interface forum (online video interface forum, online video) discovery request, a real time streaming protocol (rtsp) description request, an online video discovery request and an rtsp description request, which is not limited in this application.
A legitimate user may be understood as a user who is allowed to detect camera information.
After receiving the first request message, the router may determine whether the terminal device is a device that is allowed to detect the camera information.
If the terminal device is a device corresponding to a legal user, that is, the terminal device is a device allowed to detect the information of the camera, the router may return the information of the camera in the target local area network to the terminal device. If the terminal device is not the device corresponding to the legal user, that is, the terminal device is the device which is not allowed to detect the information of the camera, the router will not return the information of the camera.
According to the camera information management method, when the request message for acquiring the camera is received, whether the request message is sent by the equipment corresponding to the legal user is judged, if the equipment for sending the request message is the equipment corresponding to the legal user, the information of the camera is returned, the judging step is added, the equipment corresponding to the illegal user can be filtered, the information of the camera is only sent to the equipment corresponding to the legal user, the information safety of the camera is improved, and the information leakage of the camera is prevented.
With reference to the first aspect, in some implementation manners of the first aspect, the determining, by the router, whether the terminal device is a device corresponding to a valid user includes: the router judges whether the identification information of the terminal equipment is in the information book; if the identification information of the terminal equipment is in the information book, the router determines the terminal equipment as equipment corresponding to a legal user.
The information book is used for storing identification information of a device corresponding to a valid user, and may also be referred to as a white list, which is not limited in the present application. The information in the information book may be added by an administrator, but the present application does not limit this.
The identification information of the terminal device may be a mobile phone number or a Media Access Control (MAC) address, but the present application is not limited thereto.
If the identification information of the terminal device is in the information book, that is, the information book includes the identification information of the terminal device, it may be stated that the terminal device is a device allowed to acquire the camera information, and the router may determine the terminal device as a device corresponding to a valid user.
According to the camera information management method, whether the terminal equipment is legal or not is determined through the identification information of the terminal equipment, different terminal equipment can be distinguished conveniently, and the camera information is sent only to the equipment corresponding to a legal user, so that the information safety of the camera is improved, and the camera information is prevented from being leaked.
With reference to the first aspect, in some implementations of the first aspect, before the determining, by the router, whether the identification information corresponding to the terminal device is in the information book, the method further includes: when the terminal equipment utilizes the target local area network to request for surfing the Internet, the router sends a second request message to the terminal equipment, wherein the second request message is used for requesting the identification information of the terminal equipment; the router receives a first response message of the terminal device, wherein the first response message comprises the identification information of the terminal device.
When the terminal device is in a target local area network (a local area network served by a router), the terminal device can request the router for the information of the camera, so that the terminal device firstly requests the router for joining the target local area network, and after joining the target local area network, the terminal device can send the information of the camera to the router. When the terminal device joins the target lan and uses the target lan to surf the internet, the router may send a second request message to the terminal device, where the second request message is used to request the identification information of the terminal device, and correspondingly, the terminal device receives the second request message, and the terminal device may respond to the second request message or may not respond to the second request message, which is not limited in this application.
With reference to the first aspect, in some implementation manners of the first aspect, if the terminal device is a device corresponding to a valid user, the returning, by the router, information of the camera in the target local area network to the terminal device includes: if the terminal equipment is equipment corresponding to a legal user, the router sends a first request message to a camera in a target local area network; and the router receives the information of the camera in the target local area network and returns the information of the camera in the target local area network to the terminal equipment.
According to the camera information management method, after the request for acquiring the information of the camera is received, the request can be forwarded in real time, the latest information of the camera is acquired in time, and the accuracy of the information of the camera is guaranteed.
With reference to the first aspect, in certain implementations of the first aspect, the method further includes: the router periodically sends a third request message to the camera in the target local area network, wherein the third request message is used for requesting to acquire the information of the camera; the router receives the information of the camera in the target local area network and stores the information of the camera in the target local area network in the memory; if the terminal equipment is the equipment corresponding to the legal user, the router returns the information of the camera to the terminal equipment, and the information comprises the following steps: and if the terminal equipment is the equipment corresponding to the legal user, the router returns the information of the camera in the memory to the terminal equipment.
According to the camera information management method, after the request for acquiring the information of the camera is received, the historical information of the camera can be returned, the response speed can be improved, and the efficiency of acquiring the information of the camera can be improved.
With reference to the first aspect, in some implementation manners of the first aspect, the cameras include an illegal camera and a security camera, the legal user is an administrator, and the terminal device is a device corresponding to the administrator; the router returns the information of the camera to the terminal equipment, including: and the router returns the information of the illegal camera and the information of the security camera to the terminal equipment.
According to the camera information management method, the authority for checking the security camera information is opened only for an administrator, the privacy information of the security camera can be protected, and the security camera information is prevented from being leaked.
With reference to the first aspect, in some implementation manners of the first aspect, the cameras include an illegal camera and a security camera, the legal user is a non-administrator, and the terminal device is a device corresponding to the non-administrator; the router returns the information of the camera to the terminal equipment, and the information comprises the following steps: and the router returns the information of the illegal camera to the terminal equipment.
The camera information management method provided by the application filters information of the security camera for a non-administrator, not only protects privacy information of the security camera, but also helps the non-administrator to complete filtering of non-suspicious camera information.
With reference to the first aspect, in certain implementations of the first aspect, the information of the camera includes at least one of: the number of cameras, the name of the camera, the Internet Protocol (IP) address of the camera, the media access control MAC address of the camera, or the distance between the camera and the router.
In a second aspect, there is provided a camera information management apparatus, including: a receiving and sending module and a processing module. Wherein, the transceiver module is used for: receiving a first request message from terminal equipment, wherein the first request message is used for requesting to acquire information of a camera; the processing module is used for: judging whether the terminal equipment is equipment corresponding to a legal user or not; the transceiver module is further configured to: and if the terminal equipment is equipment corresponding to the legal user, returning the information of the camera in the target local area network to the terminal equipment, wherein the target local area network is a serving local area network.
With reference to the second aspect, in some implementations of the second aspect, the processing module is further configured to: judging whether the identification information of the terminal equipment is in the information book; and if the identification information of the terminal equipment is in the information book, determining the terminal equipment as equipment corresponding to the legal user.
With reference to the second aspect, in some implementations of the second aspect, the transceiver module is further configured to: when the terminal equipment utilizes the target local area network to request for surfing the Internet, sending a second request message to the terminal equipment, wherein the second request message is used for requesting the identification information of the terminal equipment; and receiving a first response message of the terminal equipment, wherein the first response message comprises the identification information of the terminal equipment.
With reference to the second aspect, in some implementations of the second aspect, the transceiver module is further configured to: if the terminal equipment is equipment corresponding to a legal user, sending a first request message to a camera in a target local area network; and receiving the information of the camera in the target local area network, and returning the information of the camera in the target local area network to the terminal equipment.
With reference to the second aspect, in some implementations of the second aspect, the transceiver module is further configured to: periodically sending a third request message to a camera in the target local area network, wherein the third request message is used for requesting to acquire information of the camera; receiving information of a camera in a target local area network; the processing module is further configured to: storing the information of the camera in the target local area network in a memory; the transceiver module is further configured to: and if the terminal equipment is the equipment corresponding to the legal user, returning the information of the camera in the memory to the terminal equipment.
With reference to the second aspect, in some implementation manners of the second aspect, the cameras include an illegal camera and a security camera, the legal user is an administrator, and the terminal device is a device corresponding to the administrator; the transceiver module is further configured to: and returning the information of the illegal camera and the information of the security camera to the terminal equipment.
With reference to the second aspect, in some implementation manners of the second aspect, the cameras include an illegal camera and a security camera, the legal user is a non-administrator, and the terminal device is a device corresponding to the non-administrator; the transceiver module is further configured to: and returning the information of the illegal camera to the terminal equipment.
With reference to the second aspect, in some implementations of the second aspect, the information of the camera includes at least one of: the number of cameras, the name of the camera, the internet IP address of the camera, the media access control MAC address of the camera, or the distance between the camera and the camera.
In a third aspect, the present application provides a camera information management apparatus, including a processor, coupled to a memory, and configured to execute instructions in the memory to implement the method in any possible implementation manner of the first aspect. Optionally, the apparatus further comprises a memory. Optionally, the apparatus further comprises a communication interface, the processor being coupled to the communication interface.
In a fourth aspect, the present application provides a processor comprising: input circuit, output circuit and processing circuit. The processing circuit is configured to receive a signal via the input circuit and transmit a signal via the output circuit, so that the processor performs the method of any one of the possible implementations of the first aspect.
In a specific implementation process, the processor may be a chip, the input circuit may be an input pin, the output circuit may be an output pin, and the processing circuit may be a transistor, a gate circuit, a flip-flop, various logic circuits, and the like. The input signal received by the input circuit may be received and input by, for example, but not limited to, a receiver, the signal output by the output circuit may be, for example, but not limited to, output to and transmitted by a transmitter, and the input circuit and the output circuit may be the same circuit that functions as the input circuit and the output circuit, respectively, at different times. The specific implementation of the processor and various circuits are not limited in this application.
In a fifth aspect, the present application provides a processing apparatus comprising a processor and a memory. The processor is configured to read instructions stored in the memory, and may receive signals via the receiver and transmit signals via the transmitter to perform the method of any one of the possible implementations of the first aspect.
Optionally, there are one or more processors and one or more memories.
Alternatively, the memory may be integrated with the processor, or provided separately from the processor.
In a specific implementation process, the memory may be a non-transitory (non-transitory) memory, such as a Read Only Memory (ROM), which may be integrated on the same chip as the processor, or may be separately disposed on different chips.
It will be appreciated that the associated data interaction process, for example, sending the indication information, may be a process of outputting the indication information from the processor, and receiving the capability information may be a process of receiving the input capability information from the processor. In particular, the data output by the processing may be output to a transmitter and the input data received by the processor may be from a receiver. The transmitter and receiver may be collectively referred to as a transceiver, among others.
The processing device in the fifth aspect may be a chip, the processor may be implemented by hardware or software, and when implemented by hardware, the processor may be a logic circuit, an integrated circuit, or the like; when implemented in software, the processor may be a general-purpose processor implemented by reading software code stored in a memory, which may be integrated with the processor, located external to the processor, or stand-alone.
In a sixth aspect, the present application provides a computer-readable storage medium storing a computer program (which may also be referred to as code or instructions) which, when run on a computer, causes the computer to perform the method of any one of the possible implementations of the first aspect described above.
In a seventh aspect, the present application provides a computer program product comprising: computer program (also called code, or instructions), which when executed, causes a computer to perform the method of any of the possible implementations of the first aspect described above.
Drawings
Fig. 1 is a schematic diagram of a communication system to which embodiments of the present application are applicable;
FIG. 2 is a schematic flow chart of a method of acquiring camera information;
FIG. 3 is a schematic flow chart diagram of another method for acquiring camera information;
fig. 4 is a schematic flowchart of a camera information management method provided in an embodiment of the present application;
fig. 5 is a schematic flowchart of a method for acquiring identification information of a mobile phone by a router according to an embodiment of the present application;
fig. 6 is a schematic flow chart of a detection method of a camera provided in an embodiment of the present application;
fig. 7 is a schematic flow chart of another detection method for a camera provided in the embodiment of the present application;
fig. 8 is a schematic flowchart of another camera information management method provided in the embodiment of the present application;
fig. 9 is a schematic block diagram of a camera information management apparatus according to an embodiment of the present application;
fig. 10 is a schematic block diagram of another camera information management apparatus provided in an embodiment of the present application.
Detailed Description
The technical solution in the present application will be described below with reference to the accompanying drawings.
The monitoring technology plays a very positive role in the aspects of security monitoring, fire control monitoring, public security evidence obtaining, road detection and the like, but the monitoring technology has a large negative effect, for example, the flooding use of pinhole cameras causes the leakage of personal privacy, and property and life are threatened. For this phenomenon, there is an application program of "detect camera" in the market, which can be used to detect cameras existing in the lan. For example, when a guest enters a hotel, an illegal camera in an area such as a hotel room is detected through an application program of a detection camera.
The user can install the application program of "detecting the camera" on the terminal equipment, and in the interface that this application program shows, obtain the information of camera through clicking the controlling part, after the terminal equipment detects user's operation, link to each other with regional hotspot through wireless network, can detect the camera under the same network.
Illustratively, fig. 1 shows a schematic diagram of a communication system 100. As shown in fig. 1, the communication system 100 includes a terminal apparatus 101, a router 102, a camera 103, a camera 104, and a camera 105. The terminal device 101, the router 102, the camera 103, the camera 104, and the camera 105 are in the same local area network, and the terminal device 101, the camera 103, the camera 104, and the camera 105 may all be connected to the network through the router 102. It should be understood that the number of cameras is merely an example, and the embodiment of the present application is not limited thereto.
The terminal device 101 is installed with an application program of "detecting a camera", a user can acquire information of the camera by clicking a control in an interface displayed by the application program, and the terminal device 101 can detect information of the camera 103, the camera 104 and the camera 105 which are in the same network after detecting the operation of the user.
Currently, the terminal device 101 can acquire information of the camera in two ways.
In the first manner, the terminal device 101 may be implemented based on an open network video interface forum (online video interface forum, online) protocol.
Illustratively, fig. 2 shows a schematic flow chart of a method 200 for acquiring camera information. As shown in fig. 2, the method 200 may include the steps of:
s201, the terminal device 101 may send an advisory req (discovery req) to the router 102, where the advisory req is used to obtain information of a camera, and correspondingly, the router 102 receives the advisory req.
The Onvif protocol is the most mainstream international general protocol in the monitoring industry, and equipment supporting the Onvif protocol service can be discovered and detected. Specifically, the end device may send an Onvif discovery request to the multicast address 239.255.255.250 and port 3702 in the network segment.
S202, the router 102 forwards the Onvif discovery request to the cameras in the same network, and correspondingly, the cameras in the same network receive the Onvif discovery request.
The router 102 receives the Onvif discovery request through the multicast address, and performs multicast, that is, forwards the Onvif discovery request to the cameras in the same network.
It should be understood that the router, as a multicast member manager, already possesses network Protocol (IP) information of all clients in the multicast address, and may traverse to send the Onvif discovery request and search for camera information supporting the Onvif Protocol.
S203, the information of the cameras supporting the Onvif protocol in the cameras in the same network may return an Onvif discovery response (discovery resp) to the router 102, where the Onvif discovery response includes the information of the cameras, and correspondingly, the router 102 receives the Onvif discovery response.
If the cameras 103, 104 and 105 all support the ovif protocol, the router 102 may receive the ovif discovery response returned by the cameras 103, 104 and 105.
The information of the camera may include information such as an IP address of the camera, a universal Unique Identifier (universal Unique Identifier), and a service address of the device providing the ovif service.
S204, the router 102 forwards the Onvif discovery response to the terminal device 101, and correspondingly, the terminal device 101 receives the Onvif discovery response.
In the second way, the terminal device 101 may be implemented based on a real time streaming protocol (rtsp) protocol.
Illustratively, fig. 3 shows a schematic flow chart of a method 300 for acquiring camera information. As shown in fig. 3, the method 300 may include the steps of:
s301, the terminal device 101 may send an rtsp description request (rtsp DESCRIBE) to the router 102, where the rtsp description request is used to acquire information of the camera, and correspondingly, the router 102 receives the rtsp description request.
The rtsp description request is the first step of the rtsp protocol, and the terminal device 101 may acquire information of the camera through the rtsp description request.
S302, the router 102 forwards the rtsp description request to the cameras in the same network, and correspondingly, the cameras in the same network receive the rtsp description request.
The router, as a Dynamic Host Configuration Protocol (DHCP) server, already possesses IP information of all devices in the local area network, and may traverse to send an rtsp description request and receive a response from the camera.
S303, the camera in the same network that supports the rtsp protocol may return an rtsp response (rtsp reply) to the router 102, where the rtsp response includes information of the camera, and correspondingly, the router 102 receives the rtsp response.
The cameras 103, 104 and 105 are in the same network as the router 102 and all support an rtsp protocol, and the router 102 can receive an rtsp response returned by the cameras 103, 104 and 105.
It should be noted that, generally, a camera supporting the rtsp protocol needs to authenticate a Hyper Text Transfer Protocol (HTTP). If the camera turns on authentication, the rtsp response is an error status, e.g. 401. Router 102 can only determine that the camera is a camera that supports the rtsp protocol. If the camera does not turn on authentication, the rtsp response may include information about the camera.
S304, the router 102 forwards the rtsp response to the terminal device 101, and correspondingly, the terminal device 101 receives the rtsp response.
However, the above application program of "detecting camera" has the following disadvantages: any terminal device connected to the local area network can detect the camera deployed in the local area network by using the application program, which can cause the problem of camera information security.
For example, in the scenario shown in fig. 1, the terminal device 101 may obtain information of the camera 103, the camera 104, and the camera 105, and if the terminal device 106 connects to the router 102 and joins the local area network, the terminal device 106 may also obtain information of the camera 103, the camera 104, and the camera 105, which may cause leakage of the camera information and cause a camera information security problem.
If the method is applied to places with higher security level, such as public security evidence obtaining or families, the camera can be detected by terminal equipment which is randomly accessed into the local area network, security layout leakage or individual privacy leakage can be caused, and the problem of information security can occur.
In view of this, embodiments of the present application provide a camera information management method and a camera information management apparatus, which can improve camera information security and prevent camera information leakage.
Fig. 4 is a schematic flowchart of a camera information management method 400 according to an embodiment of the present application. The method 400 may be performed by a router, such as the router 102 described above. The method 400 may be applied to the communication system 100 shown in fig. 1, but the embodiment of the present application is not limited thereto.
The method 400 may include the steps of:
s401, the router receives a first request message from the terminal equipment, wherein the first request message is used for requesting to acquire information of the camera.
If the router is the router 102 shown in fig. 1, the terminal device may be the terminal device 101, but the embodiment of the present application is not limited thereto.
The first request message may be an ovif discovery request in the method 200, an rtsp description request in the method 300, or an ovif discovery request and an rtsp description request.
When the first request message is an Onvif discovery request, the terminal device may detect a camera supporting an Onvif protocol. When the first request message is an rtsp description request, the terminal device may detect a camera supporting an rtsp protocol. When the first request message is an Onvif discovery request and an rtsp description request, the terminal device can detect cameras supporting an Onvif protocol and cameras supporting an rtsp protocol, can detect more cameras, and is beneficial to more comprehensive detection.
S402, the router judges whether the terminal equipment is the equipment corresponding to the legal user.
A legitimate user may be understood as a user that is allowed to detect camera information, e.g. an administrator, a user that is allowed by an administrator to detect camera information, etc.
After receiving the first request message, the router may determine whether the terminal device is a device that is allowed to detect the camera information.
And S403, if the terminal equipment is equipment corresponding to a legal user, the router returns the information of the camera in the target local area network to the terminal equipment, and the target local area network is a local area network served by the router.
If the target lan is a lan served by the router, in the scenario shown in fig. 1, the target lan is a lan served by the router 102, that is, a lan formed by the terminal device 101, the router 102, the camera 103, the camera 104, and the camera 105.
Optionally, the information of the camera includes at least one of: the number of cameras, the name of the camera, the IP address of the camera, the Media Access Control (MAC) address of the camera, or the distance between the camera and the router.
Illustratively, the information of the camera may include information of a name of the camera, an IP address, a MAC address, a distance from the camera to the router, and the like. The returned information of the camera supporting the Onvif protocol may include the name of the camera. The cameras supporting the Onvif and rtsp protocols can return information such as IP addresses, MAC addresses, distances from the cameras to the router and the like.
The information of the camera can be shown in table one.
Information name Type of data Information length range or unit
Name of camera Character string (0, 256]
IP address Character string (0, 128]
MAC address Character string (0, 32]
Distance from camera to router Shaping machine Centimeter
As shown in table one, the information of the camera includes the name of the camera, IP address, MAC address, distance from the camera to the router, and the like. The data type of the name of the camera is a character string, the data type of the IP address can be (0, 256 ]. the length range is a character string, the data type of the MAC address can be (0, 128 ]. the length range is a character string, and the data type of the distance from the camera to the router can be (0, 32 ]. the length range is an integer, and the unit is centimeter.
If the terminal device is a device corresponding to a legal user, that is, the terminal device is a device allowed to detect the information of the camera, the router may return the information of the camera in the target lan to the terminal device. If the terminal device is not the device corresponding to the legal user, that is, the terminal device is the device which is not allowed to detect the information of the camera, the router will not return the information of the camera.
For example, in the scenario shown in fig. 1, if the terminal device 101 is a device corresponding to a valid user, the terminal device 101 sends a first request message to the router 102, where the first request message is an ovif discovery request and an rtsp description request, and the cameras 103 and 104 support the ovif protocol and the camera 105 supports the rtsp protocol, the router 102 may return information of the cameras 103, 104 and 105 to the terminal device 101. If the terminal device 106 is connected to the router 102 and joins the local area network, but the router 102 determines that the terminal device 106 is not a device corresponding to a valid user, the router 102 does not return the information of the camera.
Optionally, if the terminal device is not a device corresponding to a valid user, the router may not return information of the camera, but may return prompt information, where the prompt information is used to prompt the user to check the information of the camera without permission. The prompt information may be displayed in the form of a message or an interface, which is not limited in the embodiment of the present application.
According to the camera information management method provided by the embodiment of the application, when the request message for acquiring the camera is received, whether the request message is sent by the equipment corresponding to the legal user is judged firstly, if the equipment for sending the request message is the equipment corresponding to the legal user, the information of the camera is returned, the judgment step is added, the equipment corresponding to the illegal user can be filtered, the information of the camera is only sent to the equipment corresponding to the legal user, the information safety of the camera is improved, and the information leakage of the camera is prevented.
As an optional embodiment, the step S402 of determining, by the router, whether the terminal device is a device corresponding to a valid user includes: the router judges whether the identification information of the terminal equipment is in the information book or not; if the identification information of the terminal equipment is in the information book, the router determines the terminal equipment as equipment corresponding to a legal user.
The information book is used for storing identification information of a device corresponding to a valid user, and may also be referred to as a white list. The information in the information book may be added by an administrator, but the embodiment of the present application does not limit this.
The identification information of the terminal device may be a mobile phone number or a Media Access Control (MAC) address, but the embodiment of the present application is not limited thereto.
If the identification information of the terminal device is in the information book, that is, the information book includes the identification information of the terminal device, it may be stated that the terminal device is a device allowed to acquire the camera information, and the router may determine the terminal device as a device corresponding to a valid user.
According to the camera information management method provided by the embodiment of the application, whether the terminal equipment is legal or not is determined through the identification information of the terminal equipment, so that different terminal equipment can be distinguished, and the camera information is only sent to the equipment corresponding to a legal user, so that the information safety of the camera is improved, and the camera information is prevented from being leaked.
Optionally, before the router determines whether the identification information corresponding to the terminal device is in the information book, the method may further include: when the terminal equipment utilizes the target local area network to request for surfing the Internet, the router sends a second request message to the terminal equipment, wherein the second request message is used for requesting the identification information of the terminal equipment; the router receives a first response message of the terminal device, wherein the first response message comprises the identification information of the terminal device.
When the terminal device is in a target local area network (a local area network served by a router), the terminal device can request the router for the information of the camera, so that the terminal device firstly requests the router for joining the target local area network, and after joining the target local area network, the terminal device can send the information of the camera to the router. When the terminal device joins the target lan and uses the target lan to surf the internet, the router may send a second request message to the terminal device, where the second request message is used to request the identification information of the terminal device, and correspondingly, the terminal device receives the second request message, and the terminal device may respond to the second request message or may not respond to the second request message, which is not limited in the embodiment of the present application.
If the terminal device responds to the second request message, a first response message is sent to the router, the first response message comprises the identification information of the terminal device, correspondingly, the router receives the first response message and judges whether the identification information corresponding to the terminal device is in the information book, and if the identification information of the terminal device is in the information book, the router determines the terminal device as the device corresponding to the legal user.
If the terminal device does not respond to the second request message, the router may determine the terminal device as a device corresponding to the illegal user.
Illustratively, fig. 5 shows a schematic flow chart of a method 500 for a router to obtain identification information of a handset. As shown in fig. 5, the method 500 includes:
s501, when a guest enters the hotel, a worker can register guest information in a hotel entrance system of the computer, and the hotel entrance system can obtain the guest information and store the guest information in response to the operation of the worker.
The hotel check-in system is used for managing information of hotel rooms and guests, and the hotel check-in system is merely an example of a name and is not limited in the embodiment of the present application.
The guest information may include information such as a name, an identification number, and a mobile phone number, but the embodiment of the present application is not limited thereto.
S502, the hotel check-in system sends the information of the guest to the router through the interface, and correspondingly, the router receives the information of the guest.
The interface may be a restful interface, but the embodiments of the present application are not limited thereto. A hypertext transfer protocol (HTTP) or hypertext transfer protocol over Secure (HTTPs) interface may exist between the router and the hotel check-in system. The hotel check-in system may send the guest's information to the router through the restful interface.
S503, the router stores the information of the guest in an information book.
S504, when a guest enters a hotel room, a mobile phone can be used for connecting a network of the hotel room, the mobile phone can send an internet access request to the router, and correspondingly, the router receives the internet access request.
The hotel room generally provides a network name and a network password, and the guest can connect the mobile phone to the network according to the provided network name and the network password. After the mobile phone is connected with the network, a guest can surf the internet through the network. When a guest uses the network to surf the internet, the mobile phone can send a surfing request to the router, and correspondingly, the router receives the surfing request.
And S505, after receiving the internet access request, the router can send a verification interface to the mobile phone, wherein the verification interface is used for performing security verification through the mobile phone number. Correspondingly, the mobile phone displays the verification interface.
When a guest uses the network to surf the internet, for example, when the guest uses the network to browse a webpage, redirection is triggered, and the router can redirect the mobile phone to a verification interface which is used for safety verification through a mobile phone number.
If the guest uses the notebook computer to connect with the network of the hotel room, when the network is used for surfing the internet, the router can redirect the notebook computer to the verification interface, and other parts are the same and are not described again.
S506, the guest inputs the mobile phone number in the verification interface of the mobile phone for safety verification, and the mobile phone responds to the operation of the guest and obtains the mobile phone number of the guest.
S507, the mobile phone may send a first response message to the router, where the first response message includes the mobile phone number, and correspondingly, the router receives the first response message.
The router can acquire the mobile phone number of the guest in the security verification stage of the mobile phone verification code.
And S508, the router judges whether the mobile phone number is in the information book or not according to the first response message.
The information book includes the mobile phone numbers of all guests in the hotel, and if the mobile phone number is in the information book, the router may perform S509. If the mobile phone number is not in the information book, the router may perform S510.
The information in the information book may be added, deleted, modified, and viewed by an administrator. For example, an administrator may add, delete, modify, and view information in an information book through a router's web page or a cell phone application. It should be understood that a web page or cell phone application of the router is a way that may be used to manage the router.
And S509, if the mobile phone number is in the information book, the router determines the mobile phone as the device corresponding to the legal user.
If the mobile phone number is in the information book, it can be indicated that the user using the mobile phone is a guest of living, and the router can determine the mobile phone as a device corresponding to a legal user.
Optionally, before the router determines the mobile phone as the device corresponding to the valid user, the router may further send a manual verification message to the mobile phone, where the manual verification message is used to confirm again whether the guest is the valid user, and the mobile phone receives the manual verification message correspondingly. The guest may or may not select manual confirmation, which is not limited in the embodiment of the present application.
Whether the customer selects manual confirmation or not, the router determines the mobile phone as the equipment corresponding to the legal user.
Alternatively, if the method provided by the embodiment of the present application is applied to a security unit, for example, a police station, an administrator needs to strictly control the user.
The legal user may include an administrator in addition to the guest who has entered. The identity of the administrator can be verified through the mobile phone number or not, and the embodiment of the application does not limit the identity of the administrator.
And S510, if the mobile phone number is not in the information book, the router determines the mobile phone as a device corresponding to the illegal user.
If the mobile phone number is not in the information book, it can be indicated that the user using the mobile phone is not a guest living in, and the router can determine the mobile phone as a device corresponding to an illegal user.
If a customer who knows the network name and the network password exists in the hotel but does not check in the hotel, after the customer is connected with the network through the network name and the network password, and the Internet is accessed through the network, the router can determine that the mobile phone number of the customer is not in the information book and determine the mobile phone number as an illegal user.
As an optional embodiment, in the step S403, if the terminal device is a device corresponding to a valid user, the returning, by the router, information of the camera in the target lan to the terminal device includes: if the terminal equipment is equipment corresponding to a legal user, the router sends a first request message to a camera in a target local area network; and the router receives the information of the camera in the target local area network and returns the information of the camera in the target local area network to the terminal equipment.
If the terminal device is a device corresponding to a legal user, the router can immediately send the first request message to the camera in the target local area network after receiving the first request message of the terminal device, that is, the router forwards the first request message to the camera in the target local area network, correspondingly, the camera in the target local area network receives the first request message, then sends the information of the camera to the router, and the router returns the information of the camera to the terminal device after receiving the information of the camera.
Illustratively, fig. 6 shows a schematic flow chart of a detection method 600 of a camera. As shown in fig. 6, the method 600 may include:
s601, starting the router.
Router startup may be understood as the router starting up or the router powering on.
And S602, the router reads the configuration file.
The configuration file includes the code run by the router. The router reads the configuration file, which is equivalent to implementing initialization.
S603, the router detects whether a camera detection function is started.
The camera detection function is a function of sending a message to a camera in a target local area network.
The camera detection function is off by default and needs to be turned on by the administrator. The router may periodically detect whether the camera detection function is turned on.
S604, when the router detects that the camera detection function is started and receives a first request message of the terminal device, the router forwards the first request message to a camera in the target local area network, and correspondingly, the camera in the target local area network receives the first request message and then sends information of the camera to the router.
The user can trigger the real-time detection camera, namely, the first request message is sent to the router through the terminal equipment, and when the router detects that the camera detection function is started and receives the first request message of the terminal equipment, the first request message can be forwarded to the camera in the target local area network.
S605, the router receives information from the camera in the target local area network.
The router receives information from the camera in the target lan and may perform S402 and S403 in method 400 described above.
According to the camera information management method provided by the embodiment of the application, after the request for acquiring the information of the camera is received, the request can be forwarded in real time, the latest information of the camera can be acquired in time, and the accuracy of the information of the camera can be guaranteed.
As an optional embodiment, the method 400 may further include: the router periodically sends a third request message to the camera in the target local area network, wherein the third request message is used for requesting to acquire the information of the camera; the router receives the information of the camera in the target local area network and stores the information of the camera in the target local area network in the memory; s403, if the terminal equipment is the equipment corresponding to the legal user, the router returns the information of the camera to the terminal equipment, and the information comprises the following steps: and if the terminal equipment is the equipment corresponding to the legal user, the router returns the information of the camera in the memory to the terminal equipment.
Considering that the information of the camera changes infrequently, the terminal device obtains the last search result stored by the router, and the router has the advantage of quick response. Therefore, the router may periodically send a third request message to the camera in the target lan, where the third request message is used to request to acquire information of the camera, and after receiving the information of the camera in the target lan, the router may store the information in the memory, and when receiving the first request message of the terminal device, the router returns the information of the camera in the memory to the terminal device.
Illustratively, fig. 7 shows a schematic flow chart of a detection method 700 of a camera. As shown in fig. 7, the method 700 may include:
and S701, starting the router.
S702, the router reads the configuration file.
S703, the router detects whether the camera detection function is started.
S701-S703 can refer to the above S601-S603, and are not described herein again.
And S704, when the router detects that the camera detection function is started, judging whether a detection period is reached.
When the router starts the camera detection function, the camera can be detected periodically by default, and whether the detection time is reached or not is judged in real time.
If the router does not start the camera detection function, the router continues to detect whether the camera detection function is started.
S705, if the router reaches the detection period, sending a third request message to the camera in the target local area network, correspondingly, receiving the third request message by the camera in the target local area network, and then sending the information of the camera to the router.
If the router does not reach the detection period, whether the detection period is reached can be continuously judged.
S706, the router receives the information of the camera in the target local area network.
S707, the router may store the information of the camera in the target lan in the memory.
After the router stores the information of the camera in the target lan in the memory, S704 may be further executed, that is, whether the detection period is reached is continuously determined, and if the detection period is reached, the router sends a third request message to the camera in the target lan.
S708, upon receiving the first request message of the terminal device, the router may perform S402 and S403 in the above-described method 400.
According to the camera information management method provided by the embodiment of the application, after the information of the camera is requested to be acquired, the historical information of the camera can be returned, the response speed can be increased, and the efficiency of acquiring the camera information is improved.
The camera in above-mentioned target LAN can include illegal camera and security protection camera, if the camera in the target LAN includes the security protection camera, arbitrary legal user all can acquire the information of security protection camera, can cause revealing of security protection information, simultaneously, legal user can confirm the security protection camera as illegal camera, and that is can't distinguish which camera is illegal camera by the user, which camera is the security protection camera. Therefore, the router needs to filter the information of the security camera for some users who do not need to acquire the security camera information, and display the information of the security camera for some users who need to acquire the security camera information.
Illustratively, the router may set three user levels, which may be an administrator level, a general user level, and a guest level, respectively. The legitimate users may include users at the administrator level and users at the general user level. The general user level may also be referred to as a non-administrator level, and the guest level may also be referred to as an illegal level, which is not limited in the embodiments of the present application.
The permissions of the three level users may be as shown in table two.
Watch two
User ratings Manageable subscribers and routers Can look over security protection camera information Can look over illegal camera information
Administrator
General users × ×
Tourist × × ×
As shown in table two, the administrator level user can manage the user and the router, and can view the security camera information and view the illegal camera information. The users at the level of the common users can not manage the users and the router, can not check the security camera information, but can check the illegal camera information. Users at the visitor level can not manage the users and the router, can not check security camera information and can not check illegal camera information.
In a hotel scene, a hotel boss can be an administrator, a plurality of security cameras which are connected to a network and are positioned in a corridor, a corridor and the like can be added with a 'protection item' of the security cameras through a router management interface, and the security cameras are used for opening and checking permission only for users at the administrator level. The hotel boss is in manager level, the level of the checked-in guest is in common user level, and the level of the client which knows the network name and the network password but does not check in is in tourist level. Customers at the guest level are illegal users.
Specifically, if the camera includes an illegal camera and a security camera, the terminal device is a device corresponding to the administrator; s403, the router returns the information of the camera to the terminal equipment, and the information comprises the following steps: and the router returns the information of the illegal camera and the information of the security camera to the terminal equipment.
According to the camera information management method, the authority for checking the security camera information is only opened for an administrator, the privacy information of the security camera can be protected, and the security camera information is prevented from being leaked.
If the cameras comprise illegal cameras and security cameras, the terminal equipment is equipment corresponding to a non-administrator, namely equipment corresponding to a common user; s403, the router returns the information of the camera to the terminal equipment, and the information comprises the following steps: and the router returns the information of the illegal camera to the terminal equipment.
The camera information management method provided by the embodiment of the application filters the information of the security camera for a non-administrator, so that the privacy information of the security camera is protected, and the non-administrator can be helped to complete the filtering of the non-suspicious camera information.
Alternatively, considering that in a specific scene in work and life, there is a specific terminal device itself having a function of detecting a Camera, for example, a Personal Computer (PC) side internet Camera (IP Camera, IPC) manages device search of a client, Real Time Streaming Protocol (RTSP) streaming of a PC side player. To prevent the devices from being determined to be non-legitimate devices by embodiments of the present application, an administrator may add identification information of the devices to an information book or add it to a white list. When the devices request to acquire the information of the cameras, the router can return the information of the cameras to the devices, but can prompt an alarm to an administrator.
Based on the above-mentioned related method, the embodiment of the present application provides a specific implementation manner.
Illustratively, fig. 8 shows a schematic flow chart of a camera information management method 800. The method 800 can be applied to a local area network system including a router and a camera, wherein the router includes a message processing module, a configuration management module and an underlying function module. The message processing module is used for receiving or sending various messages or information. The configuration management module is used for determining whether the equipment is legal or not. The bottom layer functional module is used for detecting the camera in the local area network. The embodiments of the present application are not limited thereto.
It should be noted that the message processing module, the configuration management module, and the underlying functional module are merely an example of names, and the embodiments of the present application do not limit this.
As shown in fig. 8, the method 800 may include the steps of:
s801, a user applies for becoming a valid user by using a terminal device, the terminal device may send a request message to a message processing module in the router, where the request message is used to request to become a valid user, and correspondingly, the message processing module receives the request message.
For a specific method for a user to apply for becoming a legal user by using a terminal device, reference may be made to the method 500 described above, and details of the embodiment of the present application are not described herein.
S802, the message processing module transmits the request message to the configuration management module, and correspondingly, the configuration management module receives the request message.
S803, the configuration management module may determine the terminal device as a device corresponding to a valid user in response to an operation of the administrator.
S804, the configuration management module sends a response message to the message processing module, where the response message is used to indicate that the device is determined to be a device corresponding to a valid user, and correspondingly, the message processing module receives the response message.
S805, the message processing module forwards the response message to the terminal device, and correspondingly, the terminal device receives the response message.
And S806, the bottom layer function module detects that a detection period is reached, sends a third request message to the camera in the target local area network, and correspondingly, the camera in the target local area network receives the third request message, wherein the third request message is used for requesting to acquire information of the camera.
S807, the camera in the target local area network sends the information of the camera to the bottom layer functional module, and correspondingly, the bottom layer functional module receives the information of the camera in the target local area network.
And S808, the bottom layer functional module can store the information of the camera in the target local area network in the memory.
And S809, the terminal device sends a first request message to the message processing module, and correspondingly, the message processing module receives the first request message, wherein the first request message is used for requesting to acquire the information of the camera.
S810, the message processing module forwards the first request message to the bottom layer functional module, and correspondingly, the bottom layer functional module receives the first request message.
S811, the bottom layer function module sends a first request message to the camera in the target local area network, and correspondingly, the camera in the target local area network receives the first request message.
S812, the camera in the target local area network sends information of the camera to the bottom layer functional module, and correspondingly, the bottom layer functional module receives the information of the camera in the target local area network.
S811 and S812 are optional, and after the bottom-layer functional module receives the first request message, the bottom-layer functional module may obtain information of the camera in the memory, and then execute S813.
S813, the bottom layer functional module may send information of the camera to the message processing module, and correspondingly, the message processing module receives the information of the camera.
S814, the message processing module returns the information of the camera to the terminal equipment.
S815, the message processing module receives a fourth request message of another terminal device, where the fourth request message is used to request to acquire information of the camera.
S816, the message processing module sends a fourth request message to the configuration management module, and correspondingly, the configuration management module receives the fourth request message.
And S817, the configuration management module determines that the other terminal equipment is the equipment corresponding to the illegal user.
S818, the configuration management module sends a response message of the interception information to the message processing module, and correspondingly, the message processing module receives the response message of the interception information.
The message processing module can intercept information of another terminal device through a firewall.
Illustratively, the information processing module may intercept information of another terminal device through an Iptables, where the Iptables is a common firewall tool at present, the filter table is responsible for filtering and rules of the data packet, and the ORWARD chain is responsible for processing the forwarding data packet and matching the data packet flowing through the network. For the detection initiated by the terminal corresponding to the non-legal user, the message processing module can not FORWARD on the FORWARD chain, so as to realize interception.
According to the camera information management method provided by the embodiment of the application, the configuration management module is newly added, so that legal users and illegal users can be distinguished, information of the camera can be returned to the legal users, meanwhile, a request of the illegal users for detecting the camera can be intercepted, the camera information safety can be improved, and the camera information can be prevented from being leaked. In addition, the embodiment of the application provides two modes for detecting the camera information through the bottom functional module, one mode is to acquire the camera information in real time, and the other mode is to acquire historical camera information, so that different scene requirements can be met, and the application is wider.
The sequence numbers of the above processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not be limited in any way to the implementation process of the embodiments of the present application.
The camera information management method provided by the embodiment of the present application is described in detail above with reference to fig. 1 to 8, and the camera information management apparatus provided by the embodiment of the present application is described in detail below with reference to fig. 9 and 10.
Fig. 9 shows a camera information management apparatus 900 according to an embodiment of the present application, where the apparatus 900 includes: a transceiver module 910 and a processing module 920. The transceiver module 910 is configured to: receiving a first request message from terminal equipment, wherein the first request message is used for requesting to acquire information of a camera; the processing module 920 is configured to: judging whether the terminal equipment is equipment corresponding to a legal user or not; the transceiving module 910 is further configured to: and if the terminal equipment is equipment corresponding to the legal user, returning the information of the camera in the target local area network to the terminal equipment, wherein the target local area network is a serving local area network.
Optionally, the processing module 920 is further configured to: judging whether the identification information of the terminal equipment is in the information book; and if the identification information of the terminal equipment is in the information book, determining the terminal equipment as equipment corresponding to the legal user.
Optionally, the transceiver module 910 is further configured to: when the terminal equipment utilizes the target local area network to request for surfing the Internet, sending a second request message to the terminal equipment, wherein the second request message is used for requesting the identification information of the terminal equipment; and receiving a first response message of the terminal equipment, wherein the first response message comprises the identification information of the terminal equipment.
Optionally, the transceiver module 910 is further configured to: if the terminal equipment is equipment corresponding to a legal user, sending a first request message to a camera in a target local area network; and receiving the information of the camera in the target local area network, and returning the information of the camera in the target local area network to the terminal equipment.
Optionally, the transceiver module 910 is further configured to: periodically sending a third request message to a camera in the target local area network, wherein the third request message is used for requesting to acquire information of the camera; receiving information of a camera in a target local area network; the processing module 920 is further configured to: storing the information of the camera in the target local area network in a memory; the transceiver module 910 is further configured to: and if the terminal equipment is the equipment corresponding to the legal user, returning the information of the camera in the memory to the terminal equipment.
Optionally, the cameras include an illegal camera and a security camera, the legal user is an administrator, and the terminal device is a device corresponding to the administrator; the transceiver module 910 is further configured to: and returning the information of the illegal camera and the information of the security camera to the terminal equipment.
Optionally, the cameras include an illegal camera and a security camera, the legal user is a non-administrator, and the terminal device is a device corresponding to the non-administrator; the transceiver module 910 is further configured to: and returning the information of the illegal camera to the terminal equipment.
Optionally, the information of the camera includes at least one of: the number of cameras, the name of the camera, the internet IP address of the camera, the media access control MAC address of the camera, or the distance between the camera and the camera.
It should be appreciated that the apparatus 900 herein is embodied in the form of functional modules. The term module herein may refer to an Application Specific Integrated Circuit (ASIC), an electronic circuit, a processor (e.g., a shared, dedicated, or group processor) and memory that execute one or more software or firmware programs, a combinational logic circuit, and/or other suitable components that support the described functionality. In an optional example, it may be understood by those skilled in the art that the apparatus 900 may be specifically a router in the foregoing method embodiment, or the function of the router in the foregoing method embodiment may be integrated in the apparatus 900, and the apparatus 900 may be configured to execute each procedure and/or step corresponding to the router in the foregoing method embodiment, and is not described herein again to avoid repetition.
The above apparatus 900 has functions of implementing corresponding steps executed by the router in the above method embodiments; the above functions may be implemented by hardware, or may be implemented by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the functions described above.
In an embodiment of the present application, the apparatus 900 in fig. 9 may also be a chip or a chip system, for example: system on chip (SoC).
Fig. 10 is a schematic block diagram of another management apparatus 1000 for camera information according to an embodiment of the present application. The apparatus 1000 includes a processor 1010, a transceiver 1020, and a memory 1030. Wherein, the processor 1010, the transceiver 1020 and the memory 1030 are in communication with each other via an internal connection path, the memory 1030 is configured to store instructions, and the processor 1020 is configured to execute the instructions stored in the memory 1030 to control the transceiver 1020 to transmit and/or receive signals.
It should be understood that the apparatus 1000 may be embodied as a router in the above method embodiment, or the functions of the router in the above method embodiment may be integrated in the apparatus 1000, and the apparatus 1000 may be configured to perform each step and/or flow corresponding to the router in the above method embodiment. Alternatively, the memory 1030 may include a read-only memory and a random access memory, and provides instructions and data to the processor. The portion of memory may also include non-volatile random access memory. For example, the memory may also store device type information. The processor 1010 may be configured to execute the instructions stored in the memory, and when the processor executes the instructions, the processor may perform the steps and/or processes corresponding to the router in the above method embodiments.
It should be understood that, in the embodiment of the present application, the processor 1010 may be a Central Processing Unit (CPU), and the processor may also be other general processors, Digital Signal Processors (DSP), Application Specific Integrated Circuits (ASIC), Field Programmable Gate Arrays (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, and so on. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The steps of a method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware processor, or may be implemented by a combination of hardware and software modules in a processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor executes instructions in the memory, in combination with hardware thereof, to perform the steps of the above-described method. To avoid repetition, it is not described in detail here.
The application also provides a computer-readable storage medium for storing a computer program, where the computer program is used to implement the method corresponding to the router in the above method embodiments.
The application also provides a chip system, which is used for supporting the router in the method embodiment to realize the functions shown in the embodiment of the application.
The present application also provides a computer program product comprising a computer program (also referred to as code, or instructions) which, when run on a computer, can execute a method corresponding to the router shown in the above method embodiments.
Those of skill in the art would appreciate that the various illustrative modules and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the system, the apparatus and the module described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is merely a logical division, and in actual implementation, there may be other divisions, for example, multiple modules or components may be combined or integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or modules, and may be in an electrical, mechanical or other form.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present application may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only for the specific implementation of the present application, but the scope of the embodiments of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the embodiments of the present application, and all the changes or substitutions should be covered by the scope of the embodiments of the present application. Therefore, the protection scope of the embodiments of the present application shall be subject to the protection scope of the claims.

Claims (19)

1. A camera information management method is characterized by comprising the following steps:
the router receives a first request message from terminal equipment, wherein the first request message is used for requesting to acquire information of a camera;
the router judges whether the terminal equipment is equipment corresponding to a legal user or not;
and if the terminal equipment is the equipment corresponding to the legal user, the router returns the information of the camera in the target local area network to the terminal equipment, and the target local area network is the local area network served by the router.
2. The method of claim 1, wherein the determining, by the router, whether the terminal device is a device corresponding to a valid user includes:
the router judges whether the identification information of the terminal equipment is in an information book or not;
and if the identification information of the terminal equipment is in the information book, the router determines the terminal equipment as equipment corresponding to a legal user.
3. The method of claim 2, wherein before the router determines whether the identification information corresponding to the terminal device is in an information book, the method further comprises:
when the terminal equipment utilizes the target local area network to request for surfing the Internet, the router sends a second request message to the terminal equipment, wherein the second request message is used for requesting the identification information of the terminal equipment;
and the router receives a first response message of the terminal equipment, wherein the first response message comprises the identification information of the terminal equipment.
4. The method of claim 1, wherein if the terminal device is a device corresponding to the valid user, the router returns information of a camera in a target local area network to the terminal device, including:
if the terminal equipment is equipment corresponding to the legal user, the router sends the first request message to a camera in the target local area network;
and the router receives the information of the camera in the target local area network and returns the information of the camera in the target local area network to the terminal equipment.
5. The method of claim 1, further comprising:
the router periodically sends a third request message to the camera in the target local area network, wherein the third request message is used for requesting to acquire information of the camera;
the router receives the information of the camera in the target local area network and stores the information of the camera in the target local area network in the memory;
if the terminal device is a device corresponding to the legal user, the router returns the information of the camera to the terminal device, including:
and if the terminal equipment is the equipment corresponding to the legal user, the router returns the information of the camera in the memory to the terminal equipment.
6. The method according to claim 1, wherein the cameras comprise an illegal camera and a security camera, the legal user is an administrator, and the terminal device is a device corresponding to the administrator;
the router returns the information of the camera to the terminal equipment, and the information comprises the following steps:
and the router returns the information of the illegal camera and the information of the security camera to the terminal equipment.
7. The method according to claim 1, wherein the cameras comprise an illegal camera and a security camera, the legal user is a non-administrator, and the terminal device is a device corresponding to the non-administrator;
the router returns the information of the camera to the terminal equipment, and the information comprises the following steps:
and the router returns the information of the illegal camera to the terminal equipment.
8. The method according to any one of claims 1 to 7, wherein the information of the camera comprises at least one of:
the number of the cameras, the names of the cameras, the Internet IP addresses of the cameras, the media access control MAC addresses of the cameras, or the distances between the cameras and the router.
9. A camera information management apparatus, characterized by comprising:
the receiving and sending module is used for receiving a first request message from the terminal equipment, wherein the first request message is used for requesting to acquire the information of the camera;
the processing module is used for judging whether the terminal equipment is equipment corresponding to a legal user or not;
the transceiver module is further configured to: and if the terminal equipment is the equipment corresponding to the legal user, returning the information of the camera in the target local area network to the terminal equipment, wherein the target local area network is a serving local area network.
10. The apparatus of claim 9, wherein the processing module is further configured to:
judging whether the identification information of the terminal equipment is in an information book or not;
and if the identification information of the terminal equipment is in the information book, determining the terminal equipment as equipment corresponding to a legal user.
11. The apparatus of claim 10, wherein the transceiver module is further configured to:
when the terminal equipment utilizes the target local area network to request for surfing the Internet, sending a second request message to the terminal equipment, wherein the second request message is used for requesting the identification information of the terminal equipment;
and receiving a first response message of the terminal equipment, wherein the first response message comprises the identification information of the terminal equipment.
12. The apparatus of claim 9, wherein the transceiver module is further configured to:
if the terminal equipment is equipment corresponding to the legal user, sending the first request message to a camera in the target local area network;
and receiving the information of the camera in the target local area network, and returning the information of the camera in the target local area network to the terminal equipment.
13. The apparatus of claim 9, wherein the transceiver module is further configured to:
periodically sending a third request message to a camera in the target local area network, wherein the third request message is used for requesting to acquire information of the camera;
receiving information of a camera in the target local area network;
the processing module is further configured to:
storing the information of the camera in the target local area network in a memory;
the transceiver module is further configured to:
and if the terminal equipment is the equipment corresponding to the legal user, returning the information of the camera in the memory to the terminal equipment.
14. The device according to claim 9, wherein the cameras include an illegal camera and a security camera, the legal user is an administrator, and the terminal device is a device corresponding to the administrator;
the transceiver module is further configured to:
and returning the information of the illegal camera and the information of the security camera to the terminal equipment.
15. The apparatus according to claim 9, wherein the cameras include an illegal camera and a security camera, the legal user is a non-administrator, and the terminal device is a device corresponding to the non-administrator;
the transceiver module is further configured to:
and returning the information of the illegal camera to the terminal equipment.
16. The apparatus according to any one of claims 9 to 15, wherein the information of the camera comprises at least one of:
the number of the cameras, the names of the cameras, the Internet IP addresses of the cameras, the media access control MAC addresses of the cameras, or the distances between the cameras.
17. A camera information management apparatus, characterized by comprising: a processor coupled with a memory for storing a computer program that, when invoked by the processor, causes the apparatus to perform the method of any of claims 1 to 8.
18. A chip system, comprising: a processor for calling and running a computer program from a memory so that a device on which the system-on-chip is installed implements the method of any one of claims 1 to 8.
19. A computer-readable storage medium for storing a computer program comprising instructions for implementing the method of any one of claims 1 to 8.
CN202210373804.0A 2022-04-11 2022-04-11 Camera information management method and camera information management device Active CN114980097B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210373804.0A CN114980097B (en) 2022-04-11 2022-04-11 Camera information management method and camera information management device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210373804.0A CN114980097B (en) 2022-04-11 2022-04-11 Camera information management method and camera information management device

Publications (2)

Publication Number Publication Date
CN114980097A true CN114980097A (en) 2022-08-30
CN114980097B CN114980097B (en) 2023-07-18

Family

ID=82976880

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210373804.0A Active CN114980097B (en) 2022-04-11 2022-04-11 Camera information management method and camera information management device

Country Status (1)

Country Link
CN (1) CN114980097B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105429933A (en) * 2014-09-19 2016-03-23 中国电信股份有限公司 Access method of network equipment in local area network, access equipment and system
CN105872453A (en) * 2015-12-15 2016-08-17 乐视致新电子科技(天津)有限公司 Web camera monitoring method and system as well as server
CN105978844A (en) * 2015-06-04 2016-09-28 乐视致新电子科技(天津)有限公司 Network access control method, router and system based on router
US20170149771A1 (en) * 2015-11-25 2017-05-25 Microsoft Technology Licensing, Llc. Automated device discovery of pairing-eligible devices for authentication
CN107666592A (en) * 2017-08-18 2018-02-06 深圳市艾特智能科技有限公司 Camera head monitor method, system, storage medium and computer equipment
CN111132120A (en) * 2020-04-01 2020-05-08 北京三快在线科技有限公司 Method, system and equipment for identifying camera device in room local area network
US20210249146A1 (en) * 2020-02-06 2021-08-12 Arris Enterprises Llc Apparatuses, methods, and system for matching operations of client devices hosted on a network with contextual automations

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105429933A (en) * 2014-09-19 2016-03-23 中国电信股份有限公司 Access method of network equipment in local area network, access equipment and system
CN105978844A (en) * 2015-06-04 2016-09-28 乐视致新电子科技(天津)有限公司 Network access control method, router and system based on router
US20170149771A1 (en) * 2015-11-25 2017-05-25 Microsoft Technology Licensing, Llc. Automated device discovery of pairing-eligible devices for authentication
CN105872453A (en) * 2015-12-15 2016-08-17 乐视致新电子科技(天津)有限公司 Web camera monitoring method and system as well as server
CN107666592A (en) * 2017-08-18 2018-02-06 深圳市艾特智能科技有限公司 Camera head monitor method, system, storage medium and computer equipment
US20210249146A1 (en) * 2020-02-06 2021-08-12 Arris Enterprises Llc Apparatuses, methods, and system for matching operations of client devices hosted on a network with contextual automations
CN111132120A (en) * 2020-04-01 2020-05-08 北京三快在线科技有限公司 Method, system and equipment for identifying camera device in room local area network

Also Published As

Publication number Publication date
CN114980097B (en) 2023-07-18

Similar Documents

Publication Publication Date Title
CN105227538B (en) Cloud device identification and authentication
CN107086999B (en) Processing method of wireless network equipment, wireless network equipment and processor thereof
US9894630B2 (en) ADSS enabled global roaming system
KR101788495B1 (en) Security gateway for a regional/home network
CN105162768A (en) Method and device for detecting phishing Wi-Fi hotspots
JP5581141B2 (en) Management server, communication cutoff device, information processing system, method, and program
KR101910605B1 (en) System and method for controlling network access of wireless terminal
US9009792B1 (en) Method and apparatus for automatically configuring a secure wireless connection
US20080009266A1 (en) Communication Device, Wireless Network, Program, And Storage Medium
WO2016184380A1 (en) Processing method and device for network access
CN105430711B (en) Transmission method, device and the equipment of information
CN104540134B (en) Wireless access node detection method, wireless network detecting system and server
CN106332070B (en) Secure communication method, device and system
TWI462604B (en) Wireless network client-authentication system and wireless network connection method thereof
US9716703B2 (en) Systems and methods of geo-location based community of interest
KR101606352B1 (en) System, user terminal, and method for detecting rogue access point and computer program for the same
CN107454040B (en) Application login method and device
KR101281953B1 (en) Method for providing service using uid stored nfc tag and operating server using the method
US20160112464A1 (en) Session transfer protocol between different browsers on different devices
CN105025484B (en) Access the method and device of Wi-Fi Hotspot
KR101528851B1 (en) Apc(access point controller), control method thereof, and recording medium for recording program for executing the control method
KR101610584B1 (en) Network system and method for connecting same
Matte et al. Device-to-identity linking attack using targeted wi-fi geolocation spoofing
KR101323265B1 (en) Method for networking using ieee 802.11
US20110158172A1 (en) Method and device for enforcing internet users' geographical positioning traceability

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant