Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for security protection monitoring for mobile multimedia

A mobile multimedia and security monitoring technology, applied in closed-circuit television systems, instruments, alarms, etc., can solve the problems of high complexity, incomplete and insufficient security and privacy protection, etc., to reduce processing computing resources and reduce coding and decoding. The effect of delay and low bandwidth

Inactive Publication Date: 2009-12-09
SHENZHEN LINGLANG TECH
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above four methods all have problems of complexity and specialization. The installation and commissioning of the equipment involved is heavy and complex, and the realization of all the functions of the system must rely on the system display and control equipment of the closed-circuit television monitoring center (“Technical Defense” ), the 24-hour on-duty monitoring of security personnel ("civil air defense"), the combination of the two can realize the security function, and its price and service cannot adapt to the construction of ultra-small-scale video security monitoring systems for families or small and medium-sized users need
At the same time relying on the traditional simple authorization mechanism of "username + password verification", the security monitoring of the existing technology can guarantee the security and privacy of home users, chain service users, and small and medium-sized enterprise users in CCTV monitoring and comprehensive security. also incomplete and inadequate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for security protection monitoring for mobile multimedia
  • Method and system for security protection monitoring for mobile multimedia
  • Method and system for security protection monitoring for mobile multimedia

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. The method for multi-code stream mobile multimedia security monitoring of the present invention comprises the following steps:

[0019] One, such as figure 1 As shown, more than one multi-stream security monitoring user terminal, more than one mobile user terminal of the user terminal, and a mobile user operation authentication management center are set. The multi-stream security monitoring terminal, mobile user terminal and mobile user operation authentication management center use the mobile wireless communication network GPRS / EDGE / TD or the Internet TCP / IP to network to form a mobile multimedia security monitoring network system. Such as figure 2 As shown, the multi-stream security monitoring user terminal is equipped with a security alarm processing module, which is connected to the multi-stream security video control dispatching module, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for security protection monitoring for mobile multimedia, and solves the technical problem to meet the security protection monitoring demands of household personal users and small and medium enterprise users. The method comprises that: a monitoring user terminal acquires signals, digitally codes the signals by D1 and QCIF formats respectively, stores the signals of the D1 format in a memory, and sends the signals of the QCIF format to a mobile terminal to file in a management center; and the mobile user terminal looks over alarm types or alarm video images after acquiring prompt. The security protection monitoring system for the mobile multimedia is provided with the monitoring user terminal, the mobile user terminal and a management center network. Compared with the prior art, the method and the system adopt a plurality of formats to synchronously code the same video input signal, meet different demands of storage and calling of local high-definition images and calling of a mobile communication terminal, reduce time delay for processing computing resources and coding / decoding, has low cost, and is applicable to security protection monitoring for the household personal users and small and medium enterprise users.

Description

technical field [0001] The invention relates to a video security monitoring method and device. Background technique [0002] The industrial and civilian security monitoring of the prior art adopts closed-circuit television monitoring, remote network monitoring based on closed-circuit television monitoring, real-time remote video collection and monitoring of IP or GPRS network cameras based on Internet applications, and remote networking alarm monitoring. The closed-circuit television monitoring method includes front-end video acquisition equipment (camera, lens or cloud platform), alarm signal acquisition equipment (active infrared detector), transmission system (video line or optical cable transmission network), central image processing unit (hard disk video recorder or picture processing device, video matrix, monitor or display), local image acquisition, storage, and processing all rely on the central hard disk video recorder or image processor. The characteristic of this...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04N7/18G08B25/00
Inventor 凌育韶顾牧君温瑞海闵清浩高靖韬凌育云
Owner SHENZHEN LINGLANG TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products