Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method applied to mobile phone video surveillance

A mobile phone video and mobile phone technology, which is applied in the authentication field of mobile phone video surveillance, can solve the problems of insufficient security and hinder the pace of mobile video surveillance, and achieve the effect of improving security

Active Publication Date: 2016-05-18
SHENZHEN ZTE NETVIEW TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] To sum up, the authentication method of the video surveillance platform through the mobile phone user account and IMEI number, because the security is not high enough, it is obviously unsatisfactory for some specific industries with extremely high security requirements
This method hinders the promotion of mobile video surveillance in specific industries

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method applied to mobile phone video surveillance
  • Authentication method applied to mobile phone video surveillance

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0026] figure 1 It is a schematic flow chart of an embodiment of the authentication method provided by the present invention.

[0027] When the mobile phone user uses the mobile phone video surveillance software for the first time, the video surveillance software sends a login protocol to the destination video surveillance platform (monitoring platform for short) through the wireless network (the wireless network can be any one of GSM, CDMA, GRPS, and 3G network). , the agreement comes with the mobile phone username test, the MD5-encrypted password 21218cca77804d2ba1922c33e0151105, the mobile phon...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is an authentication method applied to mobile phone video surveillance. When the mobile phone logs in for the first time, the monitoring platform authorizes the mobile phone, and at the same time sends the platform authorization code to the mobile phone, and stores the platform authorization code corresponding to the mobile phone. When logging in to the monitoring platform for the first time, in addition to judging the user name and password of the mobile phone, the monitoring platform also needs to authenticate the platform authorization code to determine the only legal mobile phone. This method allows the video surveillance software to authenticate the user name, password, and platform authorization code at the same time during the user login process, so that the user account and the mobile phone hardware itself are bound to prevent the user account from being stolen on other mobile phones. The use of the situation, so that mobile phone users have a more secure and reliable monitoring guarantee.

Description

technical field [0001] The invention relates to mobile phone video monitoring technology, in particular to an authentication method applied to mobile phone video monitoring. Background technique [0002] With the advent of the 3G era, mobile phone video surveillance is on the rise, and a large number of PC services have extended from the traditional fixed network model to the wireless network model. Through the mobile video monitoring platform, users use mobile terminals as clients to access the fixed network platform, share related resources of the fixed network, and carry out various services existing on the fixed network, which greatly meets the needs of people to use related services anytime and anywhere. At present, mobile phone applications are experiencing a technological revolution. As mobile phone video surveillance applications become more and more widespread, higher-level industry needs have also been derived. [0003] In order to prevent the user's relevant conf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04W8/18H04W12/06
Inventor 侯腾蛟向稳新谢斌庄建东
Owner SHENZHEN ZTE NETVIEW TECH