Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and apparatus for accessing monitoring equipment

A technology for monitoring equipment and visitors, applied in closed-circuit television systems, digital data authentication, etc., can solve problems such as user privacy information leakage, achieve the effect of improving security and reducing monitoring screen leakage

Active Publication Date: 2019-01-04
BEIJING XIAOMI MOBILE SOFTWARE CO LTD
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] When the account information of the bound user or shared user is stolen, the intruder user can view the monitoring screen conveniently through the terminal, resulting in the leakage of user privacy information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for accessing monitoring equipment
  • Method and apparatus for accessing monitoring equipment
  • Method and apparatus for accessing monitoring equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0042] figure 1 It is a flowchart of a method for accessing a monitoring device according to an exemplary embodiment, and the method can be applied to a terminal, such as a mobile phone, a tablet computer, or a computer. like figure 1 As shown, the method for accessing monitoring equipment may include the following steps:

[0043] In step S101, a request for accessing the monitoring...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for accessing a monitoring device. The method is applied to a terminal. The method comprises: sending a request for accessing the monitoring device, photographing an image of a visitor, and obtaining first account information logged in by the visitor, wherein the visitor's image comprises first head image information; sending an authentication requestto a server, the authentication request including the first head image information, the first account information, and device information of an accessed monitoring device; upon receiving a message ofauthentication passing returned by the server in response to the authentication request, allowing the visitor to access a monitoring screen of the monitoring device through first account information.By limiting the user who views the monitoring screen and the account number of the monitoring screen, the method and the device for accessing the monitoring device according to the embodiment of the present disclosure reduce the possibility of the monitoring screen leakage caused by the account number information leakage, and improve the security of the monitoring device.

Description

technical field [0001] The present disclosure relates to the technical field of video monitoring, in particular to a method and device for accessing monitoring equipment. Background technique [0002] Monitoring devices such as smart cameras are more and more widely used in the field of home monitoring. The monitoring device can be connected to the user's home network and bound with the user's account information to identify the user to which the monitoring device belongs. The bound user can also share the authority of the monitoring device to other users, so as to realize the shared use of the same device. Binding users and sharing users can view the monitoring screen of the monitoring device in real time after logging in to the terminal, so as to monitor the situation in the family. When the monitoring device detects suspicious activities in the monitored area, it can report the abnormal information to the server, and the server can push the abnormal information to the te...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32H04N7/18
CPCH04N7/18G06F21/32
Inventor 孙永利
Owner BEIJING XIAOMI MOBILE SOFTWARE CO LTD