Unlock instant, AI-driven research and patent intelligence for your innovation.

A camera identification method, authentication method, system and terminal

An authentication system and camera technology, applied in transmission systems, character and pattern recognition, instruments, etc., can solve problems such as key leaks, cameras without storage functions, and difficult pre-programming

Active Publication Date: 2021-10-22
HUAWEI TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most cameras are purchased from a third party, and it is difficult to pre-program, so the key is easily leaked during distribution, and the camera does not have a key storage function, which makes it easier to leak the key, thereby reducing the security of the camera authentication process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A camera identification method, authentication method, system and terminal
  • A camera identification method, authentication method, system and terminal
  • A camera identification method, authentication method, system and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] For terminals that require automatic control, such as self-driving vehicles, security facilities, Internet of Things (IoT) systems, etc., it is necessary to cooperate with the camera and the control system to achieve precise automatic control. Taking self-driving vehicles as an example, it is necessary to set up cameras at designated parts of the vehicle to capture corresponding images, such as setting up multiple cameras at the front, rear, sides of the vehicle, and inside the vehicle, and deploying on-board systems (control system), the vehicle-mounted system analyzes the video stream uploaded by the above-mentioned camera to judge the vehicle’s own vehicle condition and the surrounding environment of the vehicle, so as to control the various components of the vehicle (steering wheel, headlights, horn, windows, brakes, accelerator, etc.) , alarm, etc.) to achieve the effect of automatic driving.

[0045] Obviously, the video stream uploaded by the terminal's camera is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present application provide a camera identification method, authentication method, system, and terminal, which can use the sensitivity deviation of each pixel in the camera to be identified to identify the camera to be identified and generate corresponding identification data. The target camera can also be identified by using the photosensitive deviation of each pixel in the target camera, and the target camera can be authenticated by comparing the similarity between the data used to identify the target camera and the identification data of known cameras. It can be seen that this application does not need to improve the camera, and only needs to use the physical characteristics of the camera itself to identify and authenticate the camera. The data basis for identification and authentication will not be lost, and there is no need to store it. Therefore, the process of identification and authentication is safe. higher.

Description

technical field [0001] The present invention mainly relates to the technical field of image data processing, in particular to a camera identification method, authentication method, system and terminal. Background technique [0002] With people's requirements for simplified operations of various terminals, such as vehicles, more and more terminals use automatic control to liberate people's operations. In order to replace human operations, it is necessary to install a camera to replace the human eye and a control system to replace the human brain on the terminal. In this way, the combination of the camera and the control system can replace human beings to make decisions and control. The camera needs to be authenticated when it is used to ensure the legitimacy of the camera and avoid security risks brought by the operation of the control system such as the camera being maliciously replaced. [0003] Usually, the camera can be authenticated based on digital certificates and dig...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0876H04L67/06G06V10/50G06V20/90G06V10/761H04L63/0861G06T7/74G06T7/75H04N23/80H04N23/665G06T2207/10021
Inventor 马克·瑞安弗拉维奥·加西亚钟胤魏卓
Owner HUAWEI TECH CO LTD