Monitoring data access method and device, indoor monitoring system and storage medium

文档序号:8008 发布日期:2021-09-17 浏览:37次 中文

1. A monitoring data access method, wherein the method is used for a control end device of an indoor monitoring system, the indoor monitoring system further comprises at least one radar sensor installed in a first monitoring area and at least one video monitor installed in a second monitoring area, and the indoor monitoring method comprises the following steps:

receiving a first access instruction sent by user end equipment, wherein the first access instruction comprises first access information and user identification information;

judging whether the user side equipment has the access right to the target monitoring data or not based on the user identification information; the target monitoring data is monitoring data corresponding to the first access information;

if so, sending the target monitoring data in the storage area to the user end equipment; the storage area stores first monitoring data and second monitoring data, the first monitoring data are acquired by the radar sensor, the second monitoring data are acquired by the video monitor, and the target monitoring data are the first monitoring data or the second monitoring data.

2. The monitoring data access method according to claim 1, wherein if the target monitoring data in the storage area is sent to the user end device, the step specifically includes:

if so, sending a dynamic verification password to the user end equipment so that the user end equipment outputs the dynamic verification password;

receiving an access password sent by user side equipment, wherein the access password is a password which is received by the user side equipment and is input by a user based on the dynamic verification password;

matching the access password with the dynamic verification password;

and if the access password is successfully matched with the dynamic verification password, transmitting the target monitoring data in the storage area to the user end equipment.

3. The monitoring data access method according to claim 1, wherein before the step of receiving the first access instruction sent by the client device, the monitoring data access method further comprises:

receiving a second access instruction sent by the user end equipment;

and sending first link information corresponding to the first monitoring data and/or second link information corresponding to the second monitoring data to the customer premise equipment based on the second access instruction, so that the customer premise equipment generates the first access instruction based on the received selection operation of the user on the first link information or the second link information.

4. The monitoring data access method according to claim 1, wherein before the step of receiving the first access instruction sent by the client device, the monitoring data access method further comprises:

receiving first monitoring data transmitted by the radar sensor and/or second monitoring data transmitted by the video monitor;

storing the first monitoring data and/or the second monitoring data in the storage area.

5. The monitored data access method of claim 4, wherein after the step of storing the first monitored data and/or the second monitored data in the storage area, further comprising:

identifying the first monitoring data and/or the second monitoring data to judge whether the first monitoring area and/or the second monitoring area are abnormal or not;

if so, sending alarm information to the user end equipment so as to enable the user end equipment to alarm.

6. A monitoring data access device, the monitoring data access device comprising:

the system comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving a first access instruction sent by user end equipment, and the first access instruction comprises first access information and user identification information;

the judging module is used for judging whether the user side equipment has the access right to the target monitoring data or not based on the user identification information; the target monitoring data is monitoring data corresponding to the first access information;

the sending module is used for sending the target monitoring data in the storage area to the user side equipment if the user side equipment has the access right to the target monitoring data; the storage area stores first monitoring data and second monitoring data, the first monitoring data are acquired by the radar sensor, the second monitoring data are acquired by the video monitor, and the target monitoring data are the first monitoring data or the second monitoring data.

7. A control-side device, characterized in that the control-side device comprises: memory, a processor and a monitoring data access program stored on the memory and executable on the processor, the monitoring data access program when executed by the processor implementing the steps of the monitoring data access method according to any of claims 1 to 5.

8. An indoor monitoring system, comprising:

the radar sensor is arranged in a first monitoring area and used for acquiring first monitoring data of the first monitoring area;

the video monitor is arranged in a second monitoring area and is used for acquiring second monitoring data of the second monitoring area; and

the control-side device of claim 7.

9. The indoor monitoring system of claim 8, wherein the radar sensor is a millimeter wave radar sensor.

10. A storage medium having stored thereon a monitoring data access program which, when executed by a processor, carries out the steps of the monitoring data access method according to any one of claims 1 to 5.

Background

The camera monitoring is the mainstream of the digital monitoring at present, plays an important role in daily life, and the shadow of the monitoring camera cannot be separated in traffic management, supermarkets, office places and key area monitoring. On one hand, videos stored by the monitoring camera can be used as important evidence of illegal crimes; on the other hand, the interested area can be remotely monitored through the network, so that dangerous behaviors can be prevented and stopped early.

However, video monitoring has a great disadvantage that personal privacy is easily revealed, and if indoor video monitoring information is illegally acquired, activities of people can be monitored, which causes serious privacy disclosure.

Therefore, how to realize indoor high-safety monitoring is a technical problem which needs to be solved urgently.

The above is only for the purpose of assisting understanding of the technical aspects of the present invention, and does not represent an admission that the above is prior art.

Disclosure of Invention

The invention mainly aims to provide a monitoring data access method, a monitoring data access device, an indoor monitoring system and a storage medium, and aims to solve the technical problem that in the prior art, personal privacy is easily revealed in indoor monitoring.

In order to achieve the above object, the present invention provides a monitoring data access method for a control end device of an indoor monitoring system, the indoor monitoring system further including at least one radar sensor installed in a first monitoring area and at least one video monitor installed in a second monitoring area, the indoor monitoring method including the steps of:

receiving a first access instruction sent by user end equipment, wherein the first access instruction comprises first access information and user identification information;

judging whether the user side equipment has the access right to the target monitoring data or not based on the user identification information; the target monitoring data is monitoring data corresponding to the first access information;

if so, sending the target monitoring data in the storage area to the user end equipment; the storage area stores first monitoring data and second monitoring data, the first monitoring data are acquired by the radar sensor, the second monitoring data are acquired by the video monitor, and the target monitoring data are the first monitoring data or the second monitoring data.

Optionally, if yes, the step of sending the target monitoring data in the storage area to the user end device specifically includes:

if so, sending a dynamic verification password to the user end equipment so that the user end equipment outputs the dynamic verification password;

receiving an access password sent by user side equipment, wherein the access password is a password which is received by the user side equipment and is input by a user based on the dynamic verification password;

matching the access password with the dynamic verification password;

and if the access password is successfully matched with the dynamic verification password, transmitting the target monitoring data in the storage area to the user end equipment.

Optionally, before the step of receiving the first access instruction sent by the user end device, the monitoring data access method further includes:

receiving a second access instruction sent by the user end equipment;

and sending first link information corresponding to the first monitoring data and/or second link information corresponding to the second monitoring data to the customer premise equipment based on the second access instruction, so that the customer premise equipment generates the first access instruction based on the received selection operation of the user on the first link information or the second link information.

Optionally, before the step of receiving the first access instruction sent by the user end device, the monitoring data access method further includes:

receiving first monitoring data transmitted by the radar sensor and/or second monitoring data transmitted by the video monitor;

storing the first monitoring data and/or the second monitoring data in the storage area.

Optionally, after the step of storing the first monitoring data and/or the second monitoring data in the storage area, the method further includes:

identifying the first monitoring data and/or the second monitoring data to judge whether the first monitoring area and/or the second monitoring area are abnormal or not;

if so, sending alarm information to the user end equipment so as to enable the user end equipment to alarm.

In addition, in order to achieve the above object, the present invention further provides a monitoring data access apparatus, including:

the system comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving a first access instruction sent by user end equipment, and the first access instruction comprises first access information and user identification information;

the judging module is used for judging whether the user side equipment has the access right to the target monitoring data or not based on the user identification information; the target monitoring data is monitoring data corresponding to the first access information;

the sending module is used for sending the target monitoring data in the storage area to the user side equipment if the user side equipment has the access right to the target monitoring data; the storage area stores first monitoring data and second monitoring data, the first monitoring data are acquired by the radar sensor, the second monitoring data are acquired by the video monitor, and the target monitoring data are the first monitoring data or the second monitoring data.

In addition, to achieve the above object, the present invention further provides a control end device, including: the monitoring data access program is stored on the memory and can run on the processor, and when being executed by the processor, the monitoring data access program realizes the steps of the monitoring data access method.

In addition, in order to achieve the above object, the present invention further provides an indoor monitoring system, including:

the radar sensor is arranged in a first monitoring area and used for acquiring first monitoring data of the first monitoring area;

the video monitor is arranged in a second monitoring area and is used for acquiring second monitoring data of the second monitoring area; and

and controlling the end equipment.

Optionally, the radar sensor is a millimeter wave radar sensor.

In addition, in order to achieve the above object, the present invention further provides a storage medium, in which a monitoring data access program is stored, and the monitoring data access program implements the steps of the monitoring data access method when executed by a processor.

In the invention, a first access instruction sent by user end equipment is received, wherein the first access instruction comprises first access information and user identification information; judging whether the user side equipment has the access right to the target monitoring data or not based on the user identification information; the target monitoring data is monitoring data corresponding to the first access information; if so, sending the target monitoring data in the storage area to the user end equipment; wherein the target monitoring data is the first monitoring data or the second monitoring data. According to the invention, different access authorities are set for the monitoring data collected by the indoor radar sensor and the video monitor, so that an access user can access the indoor monitoring data in different access authorities, the safe and reliable access of the indoor monitoring data is realized, and the privacy disclosure is prevented.

Drawings

Fig. 1 is a schematic structural diagram of an indoor monitoring system according to an embodiment of the present invention.

Fig. 2 is a schematic structural diagram of a recommendation device of a hardware operating environment and a monitoring data access method according to an embodiment of the present invention.

Fig. 3 is a diagram of a communication network system architecture according to an embodiment of the present invention.

Fig. 4 is a flowchart illustrating a monitoring data access method according to a first embodiment of the present invention.

Fig. 5 is a flowchart illustrating a monitoring data access method according to a second embodiment of the present invention.

Fig. 6 is a flowchart illustrating a monitoring data access method according to a third embodiment of the present invention.

Fig. 7 is a flowchart illustrating a monitoring data access method according to a fourth embodiment of the present invention.

FIG. 8 is a block diagram of an embodiment of a monitoring data access device according to the present invention.

The objects, features and advantages of the present invention will be further explained with reference to the accompanying drawings.

Detailed Description

It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.

The camera monitoring is the mainstream of the digital monitoring at present, plays an important role in daily life, and the shadow of the monitoring camera cannot be separated in traffic management, supermarkets, office places and key area monitoring. On one hand, videos stored by the monitoring camera can be used as important evidence of illegal crimes; on the other hand, the interested area can be remotely monitored through the network, so that dangerous behaviors can be prevented and stopped early. However, video monitoring has a great disadvantage that personal privacy is easily revealed, and if indoor video monitoring information is illegally acquired, activities of people can be monitored, which causes serious privacy disclosure.

To address this issue, various embodiments of the monitoring data access method of the present invention are presented. The monitoring data access method provided by the invention sets different access authorities for the monitoring data collected by the indoor radar sensor and the video monitor, so that an access user can access the indoor monitoring data in different access authorities, the safe and reliable access of the indoor monitoring data is realized, and the privacy disclosure is prevented.

The inventive concept of the present application is further illustrated below with reference to some specific embodiments.

Referring to fig. 1, fig. 1 is a schematic structural diagram of an indoor monitoring system according to an embodiment of the present invention.

The indoor monitoring system includes at least one radar sensor 100, at least one video monitor 200, and a control-end device 300. And the radar sensor 100, the video monitor 200 and the control end device 300 are all connected to the same home network through a home gateway, or remotely connected through the internet, so as to realize data transmission among the radar sensor 100, the video monitor 200 and the control end device 300.

The radar sensor 100 is installed in the first monitoring area, and is configured to collect and transmit first monitoring data of the first monitoring area to the control-end device. The first monitoring area is an indoor privacy area, and can be a household bedroom, a household toilet, an office meeting room, a private office area and the like; the first monitoring data is indoor layout, position information of objects and people.

The video monitor 200 is installed in the second monitoring area, and is configured to collect and transmit second monitoring data of the second monitoring area to the control-end device. The second monitoring area is an indoor non-private area, and can be a home living room, a home activity room, a public office area, an access passage, a gate and the like; the second monitoring data is indoor video image information.

The control-end device 300 may be a User Equipment (UE) such as a Mobile phone, a smart phone, a notebook computer, a digital broadcast receiver, a Personal Digital Assistant (PDA), a tablet computer (PAD), a handheld device, a vehicle-mounted device, a wearable device, a computing device or other processing device connected to a wireless modem, a Mobile Station (MS), or the like. The device may be referred to as a user terminal, portable terminal, desktop terminal, etc. It is easy to understand that the control end device may exist alone, may be integrated in the indoor monitoring terminal device, and may also be installed in the cloud platform, which is not limited in the embodiment of the present invention.

Referring to fig. 2, fig. 2 is a schematic structural diagram of a recommendation device of a hardware operating environment and a monitoring data access method according to an embodiment of the present invention.

Generally, the apparatus comprises: at least one processor 301, a memory 302, and a monitoring data access program stored on the memory and executable on the processor, the monitoring data access program configured to implement the steps of the monitoring data access method as described previously.

The processor 301 may include one or more processing cores, such as a 4-core processor, an 8-core processor, and so on. The processor 301 may be implemented in at least one hardware form of a DSP (Digital Signal Processing), an FPGA (Field-Programmable Gate Array), and a PLA (Programmable Logic Array). The processor 301 may also include a main processor and a coprocessor, where the main processor is a processor for processing data in an awake state, and is also called a Central Processing Unit (CPU); a coprocessor is a low power processor for processing data in a standby state. In some embodiments, the processor 301 may be integrated with a GPU (Graphics Processing Unit), which is responsible for rendering and drawing the content required to be displayed on the display screen. Processor 301 may also include an AI (Artificial Intelligence) processor for processing relevant monitoring data access operations such that a monitoring data access model may be trained autonomously for learning, improving efficiency and accuracy.

Memory 302 may include one or more computer-readable storage media, which may be non-transitory. Memory 302 may also include high speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In some embodiments, a non-transitory computer readable storage medium in memory 302 is used to store at least one instruction for execution by processor 301 to implement the monitoring data access method provided by the method embodiments herein.

In some embodiments, the terminal may further include: a communication interface 303 and at least one peripheral device. The processor 301, the memory 302 and the communication interface 303 may be connected by a bus or signal lines. Various peripheral devices may be connected to communication interface 303 via a bus, signal line, or circuit board. Specifically, the peripheral device includes: at least one of radio frequency circuitry 304, a display screen 305, and a power source 306.

The communication interface 303 may be used to connect at least one peripheral device related to I/O (Input/Output) to the processor 301 and the memory 302. The communication interface 303 is used for receiving the movement tracks of the plurality of mobile terminals uploaded by the user and other data through the peripheral device. In some embodiments, processor 301, memory 302, and communication interface 303 are integrated on the same chip or circuit board; in some other embodiments, any one or two of the processor 301, the memory 302 and the communication interface 303 may be implemented on a single chip or circuit board, which is not limited in this embodiment.

The Radio Frequency circuit 304 is used for receiving and transmitting RF (Radio Frequency) signals, also called electromagnetic signals. The radio frequency circuit 304 communicates with a communication network and other communication devices through electromagnetic signals, so as to obtain the movement tracks and other data of a plurality of mobile terminals. The rf circuit 304 converts an electrical signal into an electromagnetic signal to transmit, or converts a received electromagnetic signal into an electrical signal. Optionally, the radio frequency circuit 304 comprises: an antenna system, an RF transceiver, one or more amplifiers, a tuner, an oscillator, a digital signal processor, a codec chipset, a subscriber identity module card, and so forth. The radio frequency circuitry 304 may communicate with other terminals via at least one wireless communication protocol. The wireless communication protocols include, but are not limited to: metropolitan area networks, various generation mobile communication networks (2G, 3G, 4G, and 5G), Wireless local area networks, and/or WiFi (Wireless Fidelity) networks. In some embodiments, the rf circuit 304 may further include NFC (Near Field Communication) related circuits, which are not limited in this application.

The display screen 305 is used to display a UI (User Interface). The UI may include graphics, text, icons, video, and any combination thereof. When the display screen 305 is a touch display screen, the display screen 305 also has the ability to capture touch signals on or over the surface of the display screen 305. The touch signal may be input to the processor 301 as a control signal for processing. At this point, the display screen 305 may also be used to provide virtual buttons and/or a virtual keyboard, also referred to as soft buttons and/or a soft keyboard. In some embodiments, the display screen 305 may be one, the front panel of the electronic device; in other embodiments, the display screens 305 may be at least two, respectively disposed on different surfaces of the electronic device or in a folded design; in still other embodiments, the display screen 305 may be a flexible display screen disposed on a curved surface or a folded surface of the electronic device. Even further, the display screen 305 may be arranged in a non-rectangular irregular figure, i.e. a shaped screen. The Display screen 305 may be made of LCD (liquid crystal Display), OLED (Organic Light-Emitting Diode), and the like.

The power supply 306 is used to power various components in the electronic device. The power source 306 may be alternating current, direct current, disposable or rechargeable. When the power source 306 includes a rechargeable battery, the rechargeable battery may support wired or wireless charging. The rechargeable battery may also be used to support fast charge technology.

Those skilled in the art will appreciate that the configuration shown in fig. 2 does not constitute a limitation of the monitoring data access device and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.

In order to facilitate understanding of the embodiments of the present invention, a communication network system on which the monitoring data access device of the present invention is based is described below.

Referring to fig. 3, fig. 3 is an architecture diagram of a communication Network system according to an embodiment of the present invention, where the communication Network system is an LTE system of a universal mobile telecommunications technology, and the LTE system includes a UE (User Equipment) 201, an E-UTRAN (Evolved UMTS Terrestrial Radio Access Network) 202, an EPC (Evolved Packet Core) 203, and an IP service 204 of an operator, which are in communication connection in sequence.

Specifically, the UE201 may be the terminal 100 described above, and is not described herein again.

The E-UTRAN202 includes eNodeB2021 and other eNodeBs 2022, among others. Among them, the eNodeB2021 may be connected with other eNodeB2022 through backhaul (e.g., X2 interface), the eNodeB2021 is connected to the EPC203, and the eNodeB2021 may provide the UE201 access to the EPC 203.

The EPC203 may include an MME (Mobility Management Entity) 2031, an HSS (Home Subscriber Server) 2032, other MMEs 2033, an SGW (Serving gateway) 2034, a PGW (PDN gateway) 2035, and a PCRF (Policy and Charging Rules Function) 2036, and the like. The MME2031 is a control node that handles signaling between the UE201 and the EPC203, and provides bearer and connection management. HSS2032 is used to provide registers to manage functions such as home location register (not shown) and holds subscriber specific information about service characteristics, data rates, etc. All user data may be sent through SGW2034, PGW2035 may provide IP address assignment for UE201 and other functions, and PCRF2036 is a policy and charging control policy decision point for traffic data flow and IP bearer resources, which selects and provides available policy and charging control decisions for a policy and charging enforcement function (not shown).

The IP services 204 may include the internet, intranets, IMS (IP Multimedia Subsystem), or other IP services, among others.

Although the LTE system is described as an example, it should be understood by those skilled in the art that the present invention is not limited to the LTE system, but may also be applied to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA, and future new network systems.

Based on the above hardware structure of the monitoring data access device and the communication network system, an embodiment of the monitoring data access method of the present invention is provided. Referring to fig. 4, fig. 4 is a schematic flowchart of a monitoring data access method according to a first embodiment of the present invention, and proposes the monitoring data access method according to the first embodiment of the present invention.

In a first embodiment, the monitoring data access method is used in a control end device of an indoor monitoring system. In this embodiment, the monitoring data access method includes the following steps:

step S100: receiving a first access instruction sent by user end equipment, wherein the first access instruction comprises first access information and user identification information.

It should be noted that the execution subject of the method of the present embodiment is a monitoring data access device, and the monitoring data access device may be a mobile phone, a tablet, a computer, or other devices. Of course, other devices with similar functions may also be used, and the present embodiment is not limited thereto.

Specifically, when a user accesses indoor monitoring data through user side equipment, a first access instruction is sent to control side equipment of an indoor monitoring system through the user side equipment, wherein the first access instruction comprises first access information and user identification information; the first access information is access information of a plurality of monitoring data provided by a user to user end equipment based on control end equipment, and a calling request of the monitoring data selected by the user is sent to the control end equipment through the first access information; the user identification information is identification information for identifying the user end equipment, and the identification information is sent to the control end equipment and is used for judging whether the user end equipment has access authority corresponding to the monitoring data or not according to the identification information of the user after the control end equipment acquires the calling request.

It is easy to understand that, in this embodiment, by acquiring the first access information and the user identification information sent by the user end device, and acquiring the target monitoring data according to the user identification information and the first access information, it can be used to determine whether the user end device has an access right to the target monitoring data, so as to implement access right to the monitoring data.

Step S200: and judging whether the user end equipment has the access right to the target monitoring data or not based on the user identification information.

In this embodiment, after receiving the first access information and the user identification information sent by the user end device, the user end device accessing the target monitoring data can be authenticated according to the first access information and the user identification information; and the target monitoring data is monitoring data corresponding to the first access information. And judging whether the user end equipment has the access authority to the target monitoring data according to the user identification information and the monitoring data corresponding to the first access information, wherein the access authority can be realized through accessible user identification information preset by the target monitoring data.

Specifically, before the user end device sends the first access instruction, the user identification information of the user end device needs to be set at the control end device, the setting mode can be that the user end device is connected with the access control end device, and then the user identification information of the user end device corresponding to the access monitoring data is newly added, deleted and modified at the control end device by an administrator or the user end device with the highest authority, and the target monitoring data which can be accessed by each user identification information is selected according to the user identification information, so that the user end device corresponding to the user identification information and arranged at the control end device has the access authority of the target monitoring data in the subsequent access.

It is easy to understand that, in this embodiment, before the user end device accesses the target monitoring data, the administrator or the highest-authority user end device selects the user end device allowed to access the monitoring data and the monitoring data allowed to be accessed by the user end device at the control end device, so as to complete the authority setting of the user end device to access the target monitoring data, and based on the authority setting, whether the user end device has the access authority of the target monitoring data can be determined according to the first access instruction, so as to implement the authority access of the target monitoring data.

Step S300: and if so, sending the target monitoring data in the storage area to the customer premise equipment.

In this embodiment, target monitoring data corresponding to first access information is obtained by obtaining the first access information and user identification information sent by a user end device, and then whether the user end device corresponding to the user identification information has an access right to the target monitoring data is judged according to an access right preset by the target monitoring data; and if so, sending the target monitoring data in the storage area to the corresponding user end equipment.

Specifically, the target monitoring data stored in the storage area is first monitoring data acquired by a radar sensor of the indoor monitoring system and second monitoring data acquired by a video monitor, and the target storage area accessed by the user end device is the first monitoring data or the second monitoring data. When the monitoring data is stored, the first monitoring data and the second monitoring data are respectively stored in different storage areas by using a storage method of the subareas, so that the privacy monitoring data and the non-privacy monitoring data are respectively stored, and the user side equipment can conveniently and respectively access the monitoring data. When the user terminal equipment is authorized to access, after the user identification information of the user terminal equipment is obtained, the corresponding storage area can be selected according to the user identification information, so that the user terminal equipment can only access all monitoring data of the storage area.

In a first embodiment, a first access instruction sent by customer premise equipment is received, where the first access instruction includes first access information and user identification information; judging whether the user side equipment has the access right to the target monitoring data or not based on the user identification information; the target monitoring data is monitoring data corresponding to the first access information; if so, sending the target monitoring data in the storage area to the user end equipment; wherein the target monitoring data is the first monitoring data or the second monitoring data. According to the embodiment, different access authorities are set for the monitoring data collected by the indoor radar sensor and the video monitor, so that an access user can access the indoor monitoring data in different access authorities, the safe and reliable access of the indoor monitoring data is realized, and the privacy disclosure is prevented.

Referring to fig. 5, fig. 5 is a flowchart illustrating a monitoring data access method according to a second embodiment of the present invention, and the monitoring data access method according to the second embodiment of the present invention is proposed based on the first embodiment illustrated in fig. 4.

In the second embodiment, step S200: if yes, based on the user identification information, whether the user end equipment has an access right to the target monitoring data is judged, and the method specifically comprises the following steps:

step S201: and if so, sending a dynamic verification password to the user end equipment so that the user end equipment outputs the dynamic verification password.

Step S202: and receiving an access password sent by user equipment, wherein the access password is a password which is received by the user equipment and is input by a user based on the dynamic verification password.

Step S203: and matching the access password with the dynamic verification password.

Step S204: and if the access password is successfully matched with the dynamic verification password, transmitting the target monitoring data in the storage area to the user end equipment.

In this embodiment, after obtaining the first access information and the user identification information sent by the user end device, the user end device accessing the target monitoring data is subjected to authority authentication according to the first access information and the user identification information. In the process of authority authentication, the privacy of the monitoring data is considered, and an access password needs to be verified for the user equipment accessing the target monitoring data.

Specifically, if it is determined that the user end device has the access right to the target monitoring data according to the user identification information, the dynamic authentication password is sent to the user end device, so that the user holding the user end device receives the dynamic authentication password.

After that, receiving an access password sent by the user end equipment, matching the access password with a dynamic verification password sent to the user end equipment to judge whether the user end equipment has the authority of accessing the target monitoring data, and responding to a request for accessing the target monitoring data sent by the user end equipment at the moment when the access password is matched with the dynamic verification password; and when the access password is not matched with the dynamic verification password, ignoring the request for accessing the target monitoring data sent by the user end equipment at the moment. And when responding to a request for accessing the target monitoring data sent by the customer premise equipment at the moment, sending the target monitoring data in the storage area to the customer premise equipment.

In the second embodiment, after the first access information and the user identification information sent by the user end device are obtained, authority authentication is performed on the user end device accessing the target monitoring data according to the first access information and the user identification information, in order to make access to the monitoring data safer, after the user end device is judged to have the access authority on the target monitoring data according to the user identification information, further authority authentication is performed according to an access password sent by the user end device and a pre-generated dynamic verification password. After the access authority of the identification information is judged, a dynamic password verification mechanism is added, and the security of indoor monitoring data transmission and access is further improved.

Referring to fig. 6, fig. 6 is a flowchart illustrating a monitoring data access method according to a third embodiment of the present invention, and the monitoring data access method according to the third embodiment of the present invention is proposed based on the second embodiment shown in fig. 5.

In the third embodiment, step S100: receiving a first access instruction sent by a user end device, wherein the first access instruction comprises first access information and user identification information, and before the step of receiving the first access instruction, the method further comprises the following steps:

step A100: and receiving a second access instruction sent by the customer premise equipment.

Step A200: and sending first link information corresponding to the first monitoring data and/or second link information corresponding to the second monitoring data to the customer premise equipment based on the second access instruction, so that the customer premise equipment generates the first access instruction based on the received selection operation of the user on the first link information or the second link information.

In this embodiment, before accessing the target monitoring data, the user end device needs to query and select the monitoring data in the storage area, select the corresponding target monitoring data, that is, send the first access instruction, and then determine whether the user end device has the access right to the target monitoring data according to the user identification information and the access password of the user end device. Before receiving the first access instruction sent by the customer premise equipment, the method further comprises a process of generating the first access instruction.

It is easy to understand that the step of generating the first access instruction is to receive a second access instruction sent by the user end device, and send, to the user end device, first link information corresponding to the first monitoring data and/or second link information corresponding to the second monitoring data based on the second access instruction. The user end equipment can generate a first access instruction through the received selection operation of the user on the first link information or the second link information. Specifically, the second access instruction may be to log in the user end device and obtain a storage area that the user end device can access, the first access instruction may be to select target monitoring data in the storage area, the user end device may obtain connection information of a plurality of items of target monitoring data displayed in the storage area through the second access instruction, and then select the target monitoring data through the second access instruction, and the steps of verification, access, and the like may be performed.

It is worth mentioning that, in order to perform more detailed division and secure access on indoor monitoring, in each storage area, the monitoring area may be more finely divided according to the position of the radar sensor or the video monitor, for example, the first monitoring data (i.e. indoor privacy data) in the home is divided into more detailed monitoring data such as bathroom monitoring data and bedroom monitoring data; and dividing second monitoring data (namely indoor non-private data) in the home into updated monitoring data such as living room monitoring data and kitchen monitoring data. For more detailed division of the monitoring data, the monitoring data can be stored in a grading mode according to the division result, and then access authorities based on different user identification information and access authorities based on different access passwords are set according to different grading storage areas.

In the third embodiment, when the user end device accesses the target monitoring data, the user end device needs to select the corresponding target monitoring data based on the second access instruction and the first access instruction, and further perform permission judgment and access. The second access instruction may be to log in the customer premise equipment and obtain a storage area that the customer premise equipment can access, and the first access instruction may be to select target monitoring data of the storage area. In addition, the embodiment can also perform hierarchical storage on the monitoring data according to the requirement of monitoring data access to obtain a more detailed storage area, and further set access rights based on different user identification information and access rights based on different access passwords according to different hierarchical storage areas, so as to further improve the access security of the indoor monitoring data.

Referring to fig. 7, fig. 7 is a flowchart illustrating a monitoring data access method according to a fourth embodiment of the present invention, and the monitoring data access method according to the fourth embodiment of the present invention is proposed based on the third embodiment shown in fig. 6.

In the fourth embodiment, step S100: receiving a first access instruction sent by a user end device, wherein the first access instruction comprises first access information and user identification information, and before the step of receiving the first access instruction, the method further comprises the following steps:

step B100: and receiving first monitoring data transmitted by the radar sensor and/or second monitoring data transmitted by the video monitor.

Step B200: storing the first monitoring data and/or the second monitoring data in the storage area.

In this embodiment, the specific step of acquiring the monitoring data is to receive first monitoring data transmitted by the radar sensor and/or second monitoring data transmitted by the video monitor, and then store the first monitoring data and/or the second monitoring data in the storage area.

Specifically, the radar sensor is generally arranged in an indoor privacy area, and collects first monitoring data of the indoor privacy area, namely indoor privacy monitoring data; the video monitor is generally disposed in an indoor non-private area, and collects second monitoring data of the non-indoor non-private area, that is, indoor non-private monitoring data.

Furthermore, the indoor privacy monitoring data and the indoor non-privacy monitoring data are transmitted to a storage area, and the indoor privacy monitoring data and the indoor non-privacy monitoring data are stored in different areas according to privacy or non-privacy.

In step B200: after storing the first monitoring data and/or the second monitoring data in the storage area, the method further includes:

step B300: identifying the first monitoring data and/or the second monitoring data to judge whether the first monitoring area and/or the second monitoring area are abnormal or not;

step B400: if so, sending alarm information to the user end equipment so as to enable the user end equipment to alarm.

In this embodiment, the monitoring data stored in the storage area is generally called when a first access instruction or a second access instruction of a user is received, and then transmitted to the user end device.

Specifically, first monitoring data and/or second monitoring data of a storage area are identified to judge whether the first monitoring area and/or the second monitoring area are abnormal or not, and if yes, alarm information is sent to the customer premise equipment to enable the customer premise equipment to give an alarm.

It is easy to understand that when the identification is performed according to the position information collected by the radar sensor and the image information collected by the video monitor, the threshold value judgment of the position information can be adopted, for example, the waiting time of a child at a certain position in a bedroom; image recognition of image information, such as indoor environment pixel value change status, may be employed; the machine learning can also be used for carrying out artificial intelligence identification on the position information or the image information, such as intrusion identification; the embodiment does not impose a limitation on the identification of the monitoring data. When the monitoring data obtained through identification is abnormal, the alarm information and the corresponding monitoring data can be sent to the user end equipment together, so that a user holding the user end equipment can alarm in time according to the indoor condition.

In a fourth embodiment, the indoor monitoring system divides the monitoring data into the first monitoring data and the second monitoring data for storage in different areas after the monitoring data is collected by the radar sensor and/or the video monitor, and can store the first monitoring data and the second monitoring data in a grading manner according to the position of the radar sensor and/or the video monitor as required to obtain a more detailed and safer monitoring data storage scheme, so as to facilitate the calling of the user end equipment. Meanwhile, through the identification of the monitoring data, when the indoor environment state is abnormal, an alarm signal is sent to the user side equipment, and the effectiveness of indoor monitoring is improved.

In addition, referring to fig. 8, an embodiment of the present invention further provides a monitoring data access apparatus, where the monitoring data access apparatus includes:

a receiving module 10, configured to receive a first access instruction sent by a user end device, where the first access instruction includes first access information and user identification information;

a determining module 20, configured to determine whether the user end device has an access right to target monitoring data based on the user identification information; the target monitoring data is monitoring data corresponding to the first access information;

the sending module 30 is configured to send the target monitoring data in the storage area to the customer premise equipment if the customer premise equipment has an access right to the target monitoring data; the storage area stores first monitoring data and second monitoring data, the first monitoring data are acquired by the radar sensor, the second monitoring data are acquired by the video monitor, and the target monitoring data are the first monitoring data or the second monitoring data.

Other embodiments or specific implementation manners of the monitoring data access device according to the present invention may refer to the above method embodiments, and are not described herein again.

It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. An element defined by the phrase "comprising", without further limitation, does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.

The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The use of the terms first, second, etc. do not denote any order, but rather the terms first, second, etc. are used to denote any order.

Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, where the computer software product is stored in a storage medium (e.g., a Read Only Memory (ROM)/Random Access Memory (RAM), a magnetic disk, an optical disk), and includes several instructions for enabling a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the methods according to the embodiments of the present invention.

The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

完整详细技术资料下载
上一篇:石墨接头机器人自动装卡簧、装栓机
下一篇:一种雾节点初始态可信度量的方法

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类