| (11) | EP 3 236 629 B1 |
(12) | EUROPEAN PATENT SPECIFICATION |
|
|
(54) | METHOD AND APPARATUS FOR PROCESSING SURVEILLANCE VIDEO VERFAHREN UND VORRICHTUNG ZUR VERARBEITUNG VON ÜBERWACHUNGSVIDEOS PROCÉDÉ ET APPAREIL POUR TRAITER UNE VIDÉO DE SURVEILLANCE |
|
| |||||||||||||||||||||||||||||||
Note: Within nine months from the publication of the mention of the grant of the European patent, any person may give notice to the European Patent Office of opposition to the European patent granted. Notice of opposition shall be filed in a written reasoned statement. It shall not be deemed to have been filed until the opposition fee has been paid. (Art. 99(1) European Patent Convention). |
TECHNICAL FIELD
BACKGROUND
SUMMARY
acquiring from a user account a view request for viewing a surveillance video file, the view request including authorization information of the user account;
performing an identity authentication on the user account according to the authorization information; and
allowing the user account to view the surveillance video file when the identity authentication is passed.
setting properties of the surveillance video file to be hidden; and
encrypting the surveillance video file.
acquiring a file key used for encrypting the surveillance video file; and
encrypting the surveillance video file based on the file key.
acquiring a user private key of a preset user account;
generating a user public key of the preset user account according to the file key and the user private key of the preset user account; and
sending the user public key to a corresponding preset user account, such that the preset user account generates a file key of the surveillance video file according to the user public key and the user private key.
modifying properties of the surveillance video file to be visible when the identity authentication is passed; and
putting the visible surveillance video file on display.
acquiring the file key inputted from the user account when the identity authentication is passed;
decrypting the surveillance video file based on the file key; and
putting the decrypted surveillance video file on display.
when it is determined, based on the authorization information, that the user account is the account of the owner who owns the camera device that captures the surveillance video file, decrypting the surveillance video file by using the user password of the account of the owner who owns the camera device that captures the surveillance video file; and
putting the decrypted surveillance video file on display.
a first acquiring module, configured to acquire from a user account a view request for viewing a surveillance video file, the view request including authorization information of the user account;
an authentication module, configured to perform an identity authentication on the user account according to the authorization information; and
a viewing module, configured to allow the user account to view the surveillance video file when the identity authentication is passed.
a setting submodule, configured to set properties of the surveillance video file to be hidden; and
an encrypting submodule, configured to encrypt the surveillance video file.
a second acquiring module, configured to acquire a user private key of a preset user account;
a generating module, configured to generate a user public key of the preset user account according to the file key and the user private key of the preset user account; and
a sending module, configured to send the user public key to a corresponding preset user account, such that the preset user account generates a file key of the surveillance video file according to the user public key and the user private key.
a modifying submodule, configured to, when properties of the surveillance video file are set to be hidden, modify properties of the surveillance video file to be visible when the identity authentication is passed; and
a display submodule, configured to put the visible surveillance video file on display.
an acquiring submodule, configured to, when the surveillance video file is encrypted, acquire the file key inputted from the user account when the identity authentication is passed;
a decrypting submodule, configured to decrypt the surveillance video file based on the file key; and
a display submodule, configured to put the decrypted surveillance video file on display.
a decrypting submodule, configured to, when it is determined based on the authorization information that the user account is the account of the owner who owns the camera device that captures the surveillance video file, decrypt the surveillance video file by using the user password of the account of the owner who owns the camera device that captures the surveillance video file; and
a display submodule, configured to put the decrypted surveillance video file on display.
a processor; and
a memory for storing instructions executable by the processor;
wherein the processor is configured to:
acquire from a user account a view request for viewing a surveillance video file, the view request including authorization information of the user account;
perform an identity authentication on the user account according to the authorization information; and
allow the user account to view the surveillance video file when the identity authentication is passed.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a flowchart illustrating a method for processing a surveillance video according to an exemplary embodiment;
FIG. 2 is a flowchart illustrating a method for processing a surveillance video according to another exemplary embodiment;
FIG. 3 is a flowchart illustrating a method for processing a surveillance video according to another exemplary embodiment;
FIG. 4 is a flowchart illustrating a method for processing a surveillance video according to another exemplary embodiment;
FIG. 5 is a flowchart illustrating a method for processing a surveillance video according to another exemplary embodiment;
FIG. 6 is a flowchart illustrating a method for processing a surveillance video according to another exemplary embodiment;
FIG. 7 is a flowchart illustrating a method for processing a surveillance video according to another exemplary embodiment;
FIG. 8 is a block diagram illustrating an apparatus for processing a surveillance video according to an exemplary embodiment;
FIG. 9 is a block diagram illustrating an apparatus for processing a surveillance video according to another exemplary embodiment;
FIG. 10 is a block diagram illustrating a performing module according to an exemplary embodiment;
FIG. 11 is a block diagram illustrating an apparatus for processing a surveillance video according to another exemplary embodiment;
FIG. 12 is a block diagram illustrating an apparatus for processing a surveillance video according to another exemplary embodiment;
FIG. 13 is a block diagram illustrating a viewing module according to an exemplary embodiment;
FIG. 14 is a block diagram illustrating a viewing module according to another exemplary embodiment;
FIG. 15 is a block diagram illustrating a viewing module according to another exemplary embodiment;
FIG. 16 is a block diagram illustrating an apparatus for processing a surveillance video according to an exemplary embodiment; and
FIG. 17 is a block diagram illustrating an apparatus for processing a surveillance video according to an exemplary embodiment.
DETAILED DESCRIPTION
In step S11, a view request for viewing a surveillance video file is acquired from a user account, the view request including authorization information of the user account;
In step S12, an identity authentication is performed on the user account according to the authorization information;
In step S13, the user account is allowed to view the surveillance video file when the identity authentication is passed.
setting properties of the surveillance video file to be hidden;
encrypting the surveillance video file.
In step S31, a file key used for encrypting the surveillance video file is acquired;
In step S32, the surveillance video file is encrypted based on the file key.
In step S41, a user private key of a preset user account is acquired;
In step S42, a user public key of the preset user account is generated according to the file key and the user private key of the preset user account;
In step S43, the user public key is sent to a corresponding preset user account, such that the preset user account generates a file key of the surveillance video file according to the user public key and the user private key.
In step S51, properties of the surveillance video file are modified to be visible when the identity authentication is passed;
In step S52, the visible surveillance video file is put on display.
In step S61, a file key inputted from the user account is acquired when the identity authentication is passed;
In step S62, the surveillance video file is decrypted based on the file key;
In step S63, the decrypted surveillance video file is put on display.
In step S71, when it is determined, based on the authorization information, that the user account is the account of the owner who owns the camera device that captures the surveillance video file, the surveillance video file is decrypted by using the user password of the account of the owner who owns the camera device that captures the surveillance video file;
In step S72, the decrypted surveillance video file is put on display.
a setting submodule 101, configured to set properties of the surveillance video file to be hidden; and
an encrypting submodule 102, configured to encrypt the surveillance video file.
a second acquiring module 86, configured to acquire a user private key of a preset user account;
a generating module 87, configured to generate a user public key of the preset user account according to the file key and the user private key of the preset user account; and
a sending module 88, configured to send the user public key to a corresponding preset user account, such that the preset user account generates a file key of the surveillance video file according to the user public key and the user private key.
a modifying submodule 131, configured to, when properties of the surveillance video file are set to be hidden, modify properties of the surveillance video file to be visible when the identity authentication is passed; and
a display submodule 132, configured to put the visible surveillance video file on display.
an acquiring submodule 141, configured to, when the surveillance video file is encrypted, acquire a file key inputted from the user account when the identity authentication is passed;
a decrypting submodule 142, configured to decrypt the surveillance video file based on the file key; and
a display submodule 143, configured to put the decrypted surveillance video file on display.
a decrypting submodule 151, configured to, when it is determined based on the authorization information that the user account is the account of the owner who owns the camera device that captures the surveillance video file, decrypt the surveillance video file by using the user password of the account of the owner who owns the camera device that captures the surveillance video file; and
a display submodule 152, configured to put the decrypted surveillance video file on display.
a processor; and
a memory for storing instructions executable by the processor;
wherein the processor is configured to:
acquire from a user account a view request for viewing a surveillance video file, the view request including authorization information of the user account;
perform an identity authentication on the user account according to the authorization information; and
allow the user account to view the surveillance video file when the identity authentication is passed.
acquiring from a user account a view request for viewing a surveillance video file, the view request including authorization information of the user account;
performing an identity authentication on the user account according to the authorization information; and
allowing the user account to view the surveillance video file when the identity authentication is passed.
setting properties of the surveillance video file to be hidden; and
encrypting the surveillance video file.
acquiring a file key used for encrypting the surveillance video file; and
encrypting the surveillance video file based on the file key.
acquiring a user private key of a preset user account;
generating a user public key of the preset user account according to the file key and the user private key of the preset user account; and
sending the user public key to a corresponding preset user account, such that the preset user account generates a file key of the surveillance video file according to the user public key and the user private key.
modifying properties of the surveillance video file to be visible when the identity authentication is passed; and
putting the visible surveillance video file on display.
acquiring a file key inputted from the user account when the identity authentication is passed;
decrypting the surveillance video file based on the file key; and
putting the decrypted surveillance video file on display.
when it is determined, based on the authorization information, that the user account is the account of the owner who owns the camera device that captures the surveillance video file, decrypting the surveillance video file by using the user password of the account of the owner who owns the camera device that captures the surveillance video file; and
putting the decrypted surveillance video file on display.
acquiring (S11) from a user account a view request for viewing a surveillance video file, the view request comprising authorization information of the user account;
performing (S12) an identity authentication on the user account according to the authorization information; and
allowing (S13) the user account to view the surveillance video file when the identity authentication is passed,
performing (S10) a privacy protection operation on the surveillance video file uploaded from a camera device, the step (S10) of performing a privacy protection operation on the surveillance video file uploaded from a camera device comprising the operation of encrypting the surveillance video file, the step of encrypting the surveillance video file comprising:
acquiring (S31) a file key used for encrypting the surveillance video file; and
encrypting (S32) the surveillance video file based on the file key, characterized in that the method further comprises:
acquiring (S41) a user private key of the user account;
generating (S42) a user public key of the user account according to the file key and the user private key of the user account; and
sending (S43) the user public key to the corresponding user account, such that the user account generates the file key of the surveillance video file according to the user public key and the user private key.
acquiring (S61) the file key inputted from the user account when the identity authentication is passed;
decrypting (S62) the surveillance video file based on the file key; and
putting (S63) the decrypted surveillance video file on display.
a first acquiring module (81), configured to acquire from a user account a view request for viewing a surveillance video file, the view request comprising authorization information of the user account;
an authentication module (82), configured to perform an identity authentication on the user account according to the authorization information; and
a viewing module (83), configured to allow the user account to view the surveillance video file when the identity authentication is passed,
a performing module (84), configured to perform a privacy protection operation on the surveillance video file uploaded from a camera device;
the performing module (84) comprising
an encrypting submodule (102), configured to encrypt the surveillance video file, by acquiring a file key used for encrypting the surveillance video file, and encrypting the surveillance video file based on the file key,
characterized in that the apparatus further comprises:
a second acquiring module (86), configured to acquire a user private key of the user account;
a generating module (87), configured to generate a user public key of the user account according to the file key and the user private key of the user account; and
a sending module (88), configured to send the user public key to a corresponding user account, such that the user account generates a file key of the surveillance video file according to the user public key and the user private key.
an acquiring submodule (141), configured to, when the surveillance video file is encrypted, acquire a file key inputted from the user account when the identity authentication is passed;
a decrypting submodule (142), configured to decrypt the surveillance video file based on the file key; and
a display submodule (143), configured to put the decrypted surveillance video file on display.
Erfassen (S11) von einem Benutzerkonto einer Ansichtsaufforderung zum Ansehen einer Überwachungsvideodatei, wobei die Ansichtsaufforderung Berechtigungsinformationen des Benutzerkontos umfasst,
Durchführen (S12) einer Identitätsauthentifizierung bezüglich des Benutzerkontos gemäß den Berechtigungsinformationen und
Erlauben (S13), dass das Benutzerkonto die Überwachungsvideodatei ansieht, wenn die Identitätsauthentifizierung durchlaufen ist,
Durchführen (S10) einer Privatsphärenschutzoperation bezüglich der Überwachungsvideodatei, die von einer Kameravorrichtung hochgeladen wurde, wobei der Schritt (S10) des Durchführens einer Privatsphärenschutzoperation bezüglich der Überwachungsvideodatei, die von einer Kameravorrichtung hochgeladen wurde, die Operation des Verschlüsselns der Überwachungsvideodatei umfasst, wobei der Schritt des Verschlüsselns der Überwachungsvideodatei umfasst:
Erfassen (S31) eines Dateischlüssels, der zum Verschlüsseln der Überwachungsvideodatei verwendet wird, und
Verschlüsseln (S32) der Überwachungsvideodatei basierend auf dem Dateischlüssel,
dadurch gekennzeichnet, dass das Verfahren ferner umfasst:
Erfassen (S41) eines privaten Benutzerschlüssels des Benutzerkontos,
Erzeugen (S42) eines öffentlichen Benutzerschlüssels des Benutzerkontos gemäß dem Dateischlüssel und dem privaten Benutzerschlüssel des Benutzerkontos und
Senden (S43) des öffentlichen Benutzerschlüssels zu dem entsprechenden Benutzerkonto, so dass das Benutzerkonto den Dateischlüssel der Überwachungsvideodatei gemäß dem öffentlichen Benutzerschlüssel und dem privaten Benutzerschlüssel erzeugt.
Erfassen (S61) des Dateischlüssels, der von dem Benutzerkonto eingegeben wird, wenn die Identitätsauthentifizierung durchlaufen ist,
Entschlüsseln (S62) der Überwachungsvideodatei basierend auf dem Dateischlüssel und
Platzieren (S63) der entschlüsselten Überwachungsvideodatei auf der Anzeige.
ein erstes Erfassungsmodul (81), das dazu konfiguriert ist, von einem Benutzerkonto eine Ansichtsaufforderung zum Ansehen einer Überwachungsvideodatei zu erfassen, wobei die Ansichtsaufforderung Berechtigungsinformationen des Benutzerkontos umfasst,
ein Authentifizierungsmodul (82), das dazu konfiguriert ist, eine Identitätsauthentifizierung bezüglich des Benutzerkontos gemäß den Berechtigungsinformationen durchzuführen, und
ein Ansichtsmodul (83), das dazu konfiguriert ist, zu erlauben, dass das Benutzerkonto die Überwachungsvideodatei ansieht, wenn die Identitätsauthentifizierung durchlaufen wird,
ein Durchführungsmodul (84), das dazu konfiguriert ist, eine Privatsphärenschutzoperation bezüglich der Überwachungsvideodatei, die von einer Kameravorrichtung hochgeladen wurde, durchzuführen,
das Durchführungsmodul (84) umfassend:
ein Verschlüsselungsteilmodul (102), das dazu konfiguriert ist, die Überwachungsvideodatei zu verschlüsseln, indem es einen Dateischlüssel erhält, der zur Verschlüsselung der Überwachungsvideodatei verwendet wird, und die Überwachungsvideodatei basierend auf dem Dateischlüssel verschlüsselt,
dadurch gekennzeichnet, dass die Vorrichtung ferner umfasst:
ein zweites Erfassungsmodul (86), das dazu konfiguriert ist, einen privaten Benutzerschlüssel des Benutzerkontos zu erfassen,
ein Erzeugungsmodul (87), das dazu konfiguriert ist, einen öffentlichen Benutzerschlüssel des Benutzerkontos gemäß dem Dateischlüssel und dem privaten Benutzerschlüssel des Benutzerkontos zu erzeugen, und
ein Sendemodul (88), das dazu konfiguriert ist, den öffentlichen Benutzerschlüssel zu einem entsprechenden Benutzerkonto zu senden, so dass das Benutzerkonto einen Dateischlüssel der Überwachungsvideodatei gemäß dem öffentlichen Benutzerschlüssel und dem privaten Benutzerschlüssel erzeugt.
ein Erfassungsteilmodul (141), das dazu konfiguriert ist, beim Verschlüsseln der Überwachungsvideodatei einen Dateischlüssel zu erfassen, der von dem Benutzerkonto eingegeben wird, wenn die Identitätsauthentifizierung durchlaufen wird,
ein Entschlüsselungsteilmodul (142), das dazu konfiguriert ist, die Überwachungsvideodatei basierend auf dem Dateischlüssel zu entschlüsseln, und
ein Anzeigeteilmodul (143), das dazu konfiguriert ist, die entschlüsselte Überwachungsvideodatei auf der Anzeige zu platzieren.
l'acquisition (S11), à partir d'un compte utilisateur, d'une requête de visualisation pour voir un fichier de vidéosurveillance, la requête de visualisation comprenant une information d'autorisation du compte utilisateur ;
l'exécution (S12) d'une authentification d'identité sur le compte utilisateur conformément à l'information d'autorisation ; et
l'autorisation (S13), au compte utilisateur, de voir le fichier de vidéosurveillance lorsque l'authentification d'identité est réussie,
l'exécution (S10) d'une opération de protection de la vie privée sur le fichier de vidéosurveillance téléchargé à partir d'un dispositif de caméra, l'étape (S10) d'exécution d'une opération de protection de la vie privée sur le fichier de vidéosurveillance téléchargé à partir d'un dispositif de caméra comprenant l'opération de chiffrement du fichier de vidéosurveillance, l'étape de chiffrement du fichier de vidéosurveillance comprenant :
l'acquisition (S31) d'une clé de fichier utilisée pour chiffrer le fichier de vidéosurveillance ; et
le chiffrement (S32) du fichier de vidéosurveillance sur la base de la clé de fichier, caractérisé en ce que
le procédé comprend en outre :
l'acquisition (S41) d'une clé privée utilisateur du compte utilisateur ;
la génération (S42) d'une clé publique utilisateur du compte utilisateur conformément à la clé de fichier et à la clé privée utilisateur du compte utilisateur ; et
l'envoi (S43) de la clé publique utilisateur au compte utilisateur correspondant, de sorte que le compte utilisateur génère la clé de fichier du fichier de vidéosurveillance conformément à la clé publique utilisateur et à la clé privée utilisateur.
l'acquisition (S61) de la clé de fichier entrée à partir du compte utilisateur lorsque l'authentification d'identité est réussie ;
le déchiffrement (S62) du fichier de vidéosurveillance sur la base de la clé de fichier ; et
l'affichage (S63) du fichier de vidéosurveillance déchiffré sur un afficheur.
un premier module d'acquisition (81), configuré pour acquérir à partir d'un compte utilisateur une requête de visualisation pour voir un fichier de vidéosurveillance, la requête de visualisation comprenant une information d'autorisation du compte utilisateur ;
un module d'authentification (82), configuré pour effectuer une authentification d'identité sur le compte utilisateur conformément à l'information d'autorisation ; et
un module de visualisation (83), configuré pour autoriser le compte utilisateur à voir le fichier de vidéosurveillance lorsque l'authentification d'identité est réussie,
un module d'exécution (84), configuré pour effectuer une opération de protection de la vie privée sur le fichier de vidéosurveillance téléchargé à partir d'un dispositif de caméra ;
le module d'exécution (84) comprenant :
un sous-module de chiffrement (102), configuré pour chiffrer le fichier de vidéosurveillance, en acquérant une clé de fichier utilisée pour chiffrer le fichier de vidéosurveillance, et en chiffrant le fichier de vidéosurveillance sur la base de la clé de fichier,
caractérisé en ce que l'appareil comprend en outre :
un deuxième module d'acquisition (86), configuré pour acquérir une clé privée utilisateur du compte utilisateur ;
un module de génération (87), configuré pour générer une clé publique utilisateur du compte utilisateur conformément à la clé de fichier et à la clé privée utilisateur du compte utilisateur ; et
un module d'envoi (88), configuré pour envoyer la clé publique utilisateur à un compte utilisateur correspondant, de sorte que le compte utilisateur génère une clé de fichier du fichier de vidéosurveillance conformément à la clé publique utilisateur et à la clé privée utilisateur.
un sous-module d'acquisition (141), configuré pour, lorsque le fichier de vidéosurveillance est chiffré, acquérir une clé de fichier entrée à partir du compte utilisateur lorsque l'authentification d'identité est réussie ;
un sous-module de déchiffrement (142), configuré pour déchiffrer le fichier de vidéosurveillance sur la base de la clé de fichier ; et
un sous-module d'affichage (143), configuré pour afficher le fichier de vidéosurveillance déchiffré sur un afficheur.
REFERENCES CITED IN THE DESCRIPTION
Patent documents cited in the description