Disclosure of Invention
In view of this, it is actually necessary to provide a video monitoring system based on a new network architecture, so as to improve the resource access efficiency.
In a first aspect, a video surveillance system is provided, the video surveillance system comprising: the system comprises a first-level networking platform and a second-level networking platform, wherein the first-level networking platform is a superior platform of the second-level networking platform; the central service function is connected with the first-level networking platform and the second-level networking platform, is used for receiving and storing the resource data injected by the first-level networking platform or the second-level networking platform, and is also used for receiving and responding to the resource access request of the first-level networking platform or the second-level networking platform; and the access agent function runs on the first-level networking platform and the second-level networking platform and is used for forwarding communication messages between the first-level networking platform or the second-level networking platform and the central service function.
Optionally, the video monitoring system further includes a third-level networking platform, and the third-level networking platform is a lower-level platform of the second-level networking. In actual networking, the video monitoring system can also comprise more layers of networking platforms. Networking platforms of various levels in the video monitoring system can be distributed and deployed in a plurality of data centers across regions, each networking platform is associated with a logic organization of a user, and a tree-shaped logic structure can be formed according to the upper and lower level relation of the logic organization of the user.
In the scene of tree networking of the multilevel video monitoring platform, unified resource data management is realized by constructing a central service function, unified management of resources of the multilevel networking platform is realized, resource access processes among the networking platforms can be optimized, and resource access efficiency is improved.
Optionally, the central service function includes: the service interface is used for being called by the access agent function and providing resource injection and resource access functions for the first-level or second-level networking platform; and the database system is used for storing the resource data injected by the first-level or second-level networking platform.
Optionally, the service interface includes: the resource injection interface is used for the access agent function to call and is used for receiving and responding to a resource injection request sent by the first-level networking platform or the second-level networking platform; the resource acquisition interface is used for the access agent function to call and is used for receiving and responding to the resource access request sent by the first or second-level networking platform; and the authentication interface is used for the access agent function to call and is used for receiving and responding to the authentication request sent by the first-level networking platform or the second-level networking platform.
According to the mode, the plurality of service interfaces are set for the access proxy function to call, so that various service requirements of all levels of networking platforms can be met quickly.
Optionally, the resource injection interface is called by the access agent function, and may specifically be configured to:
and reporting the associated networking platform information, or requesting to inject the equipment directory of the associated networking platform into the database system, or inquiring the processing result of the injection request.
Specifically, the reported networking platform information includes a networking platform identifier and a superior networking platform identifier of the networking platform, and if the networking platform does not have the superior networking platform, the superior networking platform identifier may be null. The central service function can maintain the tree row topological structure information of the whole video monitoring system through the information of each networking platform reported by each access agent function.
Specifically, if the request reports the device directory of the networking platform, the request may include: identification of the networked platform, list of device directories requesting injection.
Specifically, if the processing result of the injection request is queried, the request may include: identification of the networking platform and injection request acceptance identification.
Optionally, the resource obtaining interface is called by the access agent function, and may specifically be configured to:
the method comprises the steps of obtaining topology information of a system, or obtaining a device directory of a specified networking platform, or obtaining routing information of specified devices.
Specifically, if the device directory of the specified networking platform is obtained, the request can carry the identifier of the networking platform and the identifier of the specified networking platform.
If the routing information of the specified device is acquired, the request can carry the identification of the networking platform and the identification of the specified device.
The video monitoring system of the embodiment of the invention comprises a tree-row networking architecture formed by a plurality of levels of networking platforms, and also comprises an access agent function which runs on each level of networking platform and is used for communicating with a central service function, and the central service function provides uniform resource storage and management service. The unified management of the resources of the multilevel networking platforms is realized, the resource access flow among the networking platforms can be optimized, and the resource access efficiency is improved.
In a second aspect, a resource access method is provided, which is applied to a video monitoring system, where the video monitoring system includes a multi-level networking platform in a tree form, an access agent function running on the multi-level networking platform, and a central service function connected to the multi-level networking platform, and the method includes:
a first networking platform receives a resource access request sent by a second networking platform, wherein the resource access request comprises a specified device identifier, the second networking platform identifier and an access type;
the first networking platform sends an authentication request to the central service function through the associated access agent function, wherein the authentication request comprises a designated equipment identifier, the second networking platform identifier and an access type;
the first networking platform receives an authentication response returned by the central service function;
and the first networking platform returns a resource access request response to the second networking platform according to the authentication response.
Optionally, the access types may include, but are not limited to: accessing real-time audio and video of the first networking platform, accessing historical audio and video of the first networking platform, and performing PTZ control, configuration, upgrading and restarting on equipment of the first networking platform.
Optionally, the first networking platform sends a resource injection request to the central service function, where the resource injection request includes: a device directory to be shared, the first networking platform identification;
and the first networking platform receives a resource injection acceptance response returned by the central service function, wherein the resource injection acceptance response comprises an acceptance identifier.
Optionally, the first networking platform sends a resource injection result query request to the central service function, where the resource injection result query request includes the acceptance identifier;
and the first networking platform receives a resource injection result query response returned by the central service function.
Optionally, the resource injection result response includes: a successful full device directory injection, a successful partial device directory injection, or a failed full device directory injection.
In a fourth aspect, a networking platform is provided, comprising:
a receiving unit, configured to receive a resource access request sent by a first networking platform, where the resource access request includes a specified device identifier, the first networking platform identifier, and an access type;
a sending unit, configured to send an authentication request to a central service function through an associated access proxy function, where the authentication request is used to determine an access right of the first networking platform, and the authentication request includes a specified device identifier and an identifier of the first networking platform;
the receiving unit is also used for receiving an authentication response returned by the central service function according to the access authority of the first networking platform;
the sending unit is further configured to return a resource access response to the first networking platform according to the authentication response.
In a fourth aspect, an embodiment of the present application further provides a computer storage medium, where a software program is stored, and the software program can implement the resource access method according to the second aspect when being read and executed by one or more processors.
In a fifth aspect, the present application further provides a computer program product containing instructions, which when run on a computer, causes the computer to execute the resource access method described in the second aspect or various possible implementations.
According to the resource access method provided by the embodiment of the invention, the resource access can be directly carried out between the two networking platforms, the step-by-step access process of a multistage networking platform in the prior art is avoided, and the resource access efficiency is improved.
Detailed Description
The technical solutions in the embodiments of the present invention will be described below with reference to the drawings in the embodiments of the present invention.
The current video monitoring system is composed of multiple levels of monitoring platforms, each monitoring platform is a hardware and software system which is constructed by multiple servers, storage servers, network equipment, professional monitoring equipment and software systems, the multiple monitoring platforms are distributed and deployed in multiple data centers across regions, each monitoring platform is associated with a logic organization of a user, and a tree-shaped logic structure is formed according to the upper-lower level relation of the logic organization of the user.
The invention is based on the scene of tree-type networking of the multi-level video monitoring platform, realizes the unified management of the multi-level networking system resources and the optimization of signaling and media access routing between the monitoring platforms by constructing a central resource management database and related services.
Fig. 1 is a schematic diagram of a logic structure of a video surveillance system 100 according to an embodiment of the present invention.
As shown in fig. 1, the video surveillance system 100 includes: a first level networking platform 110 and second networking platforms 120, 121, wherein the second level networking platforms 120, 121 both belong to a subordinate platform of the first level networking platform 110.
Optionally, the video surveillance system further includes third-level networking platforms 130 and 131, where the third-level networking platforms 130 and 131 both belong to a subordinate platform of the second-level networking platform 120.
In a practical networking architecture, the video surveillance system may include more levels of networking platforms.
The networking platform in this embodiment refers to a video monitoring platform with networking capability.
The video surveillance system 100 also includes a central service function 140 for providing resource storage and management services to the various levels of networking platforms. Specifically, the central service function may be a server disposed in the data center, and may be specifically configured to receive and store resource data injected by each level of networking platform, and may also provide a resource access service for each level of networking platform.
The video surveillance system 100 also includes an access proxy function 150, which may operate as a client on top of various levels of networking platforms, for communicating with the central service function 140. The access proxy function is in one-to-one relationship with the networking platform with which it is associated, and the access proxy function is mainly used for forwarding communication messages between the networking platform and the central service function. In addition, the access proxy function is allowed to be inconsistent with the networking platform and the interface implementation technology at both ends of the central service function, for example, the communication between the access proxy function and the networking platform is implemented based on the interface in the GT/T28181 specification, and the communication with the central service function can be implemented based on the RestFull interface.
In addition, the access proxy function 150 may establish a connection with the central service function 140 and complete mutual authentication before communicating with the central service function 140. The Secure connection can be established by adopting a Transport Layer Security (TLS) protocol or a Secure Socket Layer (SSL) protocol, a Secure tunnel can also be established by using a physical network, and mutual authentication between the access agent function and the central service function can adopt digital digest authentication or bidirectional authentication based on a digital certificate, and certainly, other authentication modes can also be adopted.
Specifically, as shown in fig. 2, the central service function 140 includes: a business interface and management service function 141 and a data storage and retrieval function 142. The service interface and management service function 141 further includes:
the resource injection interface 1411 is used for providing a resource injection service for each level of networking platform, calling the access agent function, and providing a resource injection and resource access function for the first or second level of networking platform; a resource obtaining interface 1412, configured to provide a resource access service to each level of networking platform, for the access agent function to call, and to receive and respond to a resource access request sent by the first or second level of networking platform; and the authentication service interface 1413 is used for performing authentication service on each level of networking platform of the resource access request, calling the access agent function, and receiving and responding to the authentication request sent by the first or second level of networking platform.
Specifically, the access proxy function 150 may invoke the resource injection interface 1411 to inject the monitoring device resource of the networking platform in which the access proxy function resides into the database system. The access proxy function may implement the following functions by calling the resource injection interface 1411:
requesting to report the associated networking platform information, including but not limited to the networking platform ID where the access agent function is located and the superior networking platform ID of the networking platform. The central service function can maintain tree topology information of the whole system through the networking platform information reported by each access agent function, and each piece of data of the tree topology information includes but is not limited to: networking platform ID, parent platform ID, networking platform name, networking platform access entry, networking platform access protocol, networking platform other attributes, for a root networking platform, its parent platform ID may be null.
The monitoring device directory information requesting to inject the associated networking platform includes, but is not limited to, the networking platform ID associated with the access agent, a monitoring device directory list, and the like, and for each resource item in the monitoring device directory list, it may be noted that the resource item is in a state of being newly injected, being modified and injected, or being deleted and the like. The central service function returns whether to accept the response aiming at the request, if so, an acceptance ID can be returned, and the subsequent access agent function can inquire the information whether the audit of the injection request passes or not based on the acceptance ID.
And inquiring the processing condition of the injection request, wherein the inquiry request can comprise a networking platform ID and an injection request acceptance ID. The central service function may return a flag of whether it has been audited based on the query injection request. If the application is approved, the processing condition of each resource item in the monitoring equipment directory list can be returned, wherein the application is accepted or rejected as a whole, or the processing condition of each resource item in the monitoring equipment directory list is returned item by item.
The access agent function may obtain a resource directory list and access routing information for each level of networking platform from the database system through the resource obtaining interface 1412. Specifically, the access proxy function may request the following information through the resource acquisition interface 1412:
and requesting the networking platform tree topology information of the whole system.
And a certain networking platform is appointed to request to acquire the equipment directory list of the networking platform. The request data may include an ID specifying the networking platform, a networking platform ID associated with the access agent functionality. The central service function sends a device directory listing for the specified networked platform in response to the request, and optionally the device directory listings may be sent serially or in parallel.
And appointing a certain equipment ID and obtaining the access route information of the equipment. The request data may include a networking platform ID, a specified device ID, associated with the access agent functionality. The central service function inquires whether the networking platform has access authority to the specified equipment, and returns refusal inquiry or returns routing information of the networking platform to which the specified equipment belongs, wherein the routing information comprises information such as an access entrance, an access protocol and the like of the networking platform to which the specified equipment belongs.
The authentication service interface 1413 is used to provide a query service for querying whether an access request from another networking platform is authorized for a device to which the networking platform belongs when the networking platform receives the access request.
Specifically, the access agent function queries, by specifying a device ID and an access networking platform ID, the central service function whether the access networking platform has an access right to a specified device to which the networking platform associated with the access agent belongs, and the type of the access right. The central service function responds to whether or not access is granted, and the type of access rights, including but not limited to browsing real-time video, querying or downloading historical video, PTZ controlling the device, etc.
Optionally, the service interface and management service function 141 further includes:
a resource injection auditing function 1414, which is used for auditing the resources requested to be injected by each level of networking platform by an operator;
a system management and operation function 1415, configured to perform management, operation, and maintenance services on each sub-function unit of the central service function;
a resource authorization function 1416 to authorize the shared resources to the respective networked platforms.
Specifically, the data storage and retrieval function 142 may be a database system, including a database 1421, for storing and managing resources injected by each level of networking platform. Optionally, the database 1412 may adopt a centralized database management system, or may adopt a distributed database management system, and if a distributed database management system is adopted, each distributed database node may be deployed in proximity to each level of networking platform.
It should be noted that the "resources" referred to in this embodiment include, but are not limited to, one or more of the following:
device directory, surveillance video, audio, image, etc.
The following further describes a related operation method of the video monitoring system in the embodiment of the present invention based on the drawings. As shown in fig. 2, which is a schematic flowchart of a resource injection database system, as shown in the figure, the resource injection method includes:
step 201, the networking platform sends a resource injection request to the central service function through the access agent function.
The resource injection request may include a device directory listing to be shared by the networked platform, the device directory listing including a plurality of device data entries, the device data entries including: device ID, device name, and other relevant information for the device.
It should be noted that the device IDs within the database system are globally unique.
Step 202, the central service function returns a resource injection acceptance response to the networking platform through the access agent function.
The resource injection acceptance response can report an acceptance identification, and a subsequent networking platform can inquire the progress of the resource injection processing according to the acceptance identification.
In step 203, the administrator reviews the injected resource, including but not limited to determining the validity, consistency and validity of the resource.
Specifically, the database system may provide an audit interface for an administrator to use, and the administrator may approve whether the resource injection request passes through the networking platform according to the following rules.
Rule 1, whether the networking platform submitting the resource injection request is valid or not, and whether the injected device directory is the device managed by the networking platform or not.
Rule 2, whether the injected device ID meets the global uniqueness principle or not, and whether the number consistency management specification of the multi-level networking platform is met or not.
Rule 3, whether the relevant information of the injection device is complete and valid.
And step 204, after the resource audit is passed, the administrator returns a resource audit passing instruction to the central service function.
Optionally, the administrator may return an audit indication that a partial data entry passed and a partial data entry failed for the resource to be injected.
And step 205, the central service function performs resource warehousing processing on the injected resources according to the resource auditing pass indication.
And if the returned resource audit pass indication shows that only part of the resources are approved, only storing the part of the resources which pass the audit in a warehouse.
The equipment catalog stored in the warehouse needs to be associated with the network platform where the equipment catalog is located, and the stored data items comprise: networking platform ID, device name, device other information. The multiple device data items are associated with a networking platform ID to form a device directory list shared by the networking platform. The equipment ID in the database system is globally unique, and the networking platforms at all levels guarantee the global uniqueness of the equipment ID through uniform management specifications.
Alternatively, the naming convention for device IDs may be defined in the device number of appendix D of GB/T28181.
Step 206, the central service function may actively return the result of resource injection to the networking platform after the resource is warehoused or after the networking platform requests it.
According to the resource injection method provided by the embodiment of the invention, each level of networking platform can actively share the equipment resources managed by the networking platform to the unified database, so that the purpose of sharing the resources to all networking platforms can be realized, the condition that one networking platform needs to share the resources to a plurality of networking platforms in the prior art is avoided, and the resource sharing efficiency is improved. In addition, the problem that the ID numbers of the platform devices are not consistent can be maintained more conveniently and rapidly by uniformly managing the resources scattered on the networking platforms.
The resource authorization and authentication method of the database system will be further described below.
The networking platform and the resources between the networking platforms can be mutually accessed, and the authorization and the authentication of the resources can be carried out through the database system. And the administrator of the database system can authorize the resources shared in the database system to each networking platform according to the service requirement. The central service function may maintain an authorization directory, which may include the following information: authorized networking platform ID, authorized device ID, granted permissions, etc.
The authorization may be a single device or a set of all devices shared by a certain networked platform, and the granted permissions include but are not limited to: accessing real-time video (including audio), accessing historical video (including audio), performing omni-directional (left-right/up-down) movement and Zoom on a lens of the device, performing Pan/Tilt/Zoom (PTZ) control, configuring, upgrading, restarting the device, and the like.
Fig. 3 is a schematic diagram of an authentication process of resource access, as shown in fig. 3, the authentication process includes:
step 301, the networking platform a sends a resource access request to the networking platform B where the resource is located.
The resource access request includes the ID of the networking platform a, the ID of the networking platform B where the resource is located, the request type, and the like. Request types include, but are not limited to, accessing real-time video (including audio), accessing historical video (including audio), performing full-scale (left-right/up-down) movements and zooming of a device, Zoom (Pan/Tilt/Zoom, PTZ) control, configuring, upgrading, restarting a device, and so forth.
Step 302, the networking platform B sends an authentication request to the central service function through the access agent function.
The authentication request may include the ID of networking platform a, the ID of resource platform B, the ID of the device to be accessed, the type of access, etc.
Step 303, the central service function processes the authentication request, and performs resource access authentication on the networking platform a.
The central service function may determine whether the networking platform a has access to the specified device based on the information in the authentication request and the locally maintained authorization directory.
Step 304, the central service function returns the authentication result to the networking platform B where the resource is located through the access agent function.
And 305, allowing or rejecting the resource access request A of the networking platform according to the authentication result by the networking platform B where the resource is positioned.
The resource authorization and authentication method of the embodiment can enable an administrator to authorize the resources sharing the data to each networking platform according to specific services or authorities, and when the networking platforms access the resources, the central service function performs authentication uniformly, so that the consistency of resource management is improved, and the efficiency of resource access is also improved.
As shown in fig. 4, which is a schematic flow chart of the resource access method, when one networking platform needs to access a resource of a certain device of another networking platform, it first needs to obtain related device information and routing information of the device. As shown in fig. 4, the resource access method includes the following steps:
step 401, the networking platform a initiates a resource access request to the central service function through the access agent function, where the resource access request includes information such as a device ID and a networking platform ID.
Step 402, the central service function determines relevant device information and routing information of the device according to the device ID, for example, if the device belongs to the networking platform B, the routing information may include an IP address and an access protocol of the networking platform B.
Specifically, the central service function may determine information such as an IP address of the networking platform B of the device according to locally maintained system topology information and a device ID.
And step 403, the central service function returns the device information and the routing information to the networking platform a through the access agent function.
And step 404, the networking platform A directly sends a resource access request to the networking platform B according to the routing information.
Step 405, the networking platform B initiates an authentication request to the central service function through its own access agent function to identify whether the networking platform a has the right to access the resources of the specified device.
Step 406, the central service function authenticates the networking platform a.
Step 407, the networking platform B receives the authentication result returned by the central service function.
And step 408, the networking platform B returns a resource access response to the second networking platform according to the authentication result.
Specifically, if the authentication result shows that the networking platform a does not have the access right to the specified device of the networking platform B, the networking platform B may return a response of the resource access failure to the networking platform a. If the authentication result shows that the networking platform A has the right to access the specified equipment of the networking platform B, the networking platform B can return the requested resources of the specified equipment to the networking platform.
Steps 405-408 may refer to an authentication procedure as shown in fig. 3.
According to the resource access method provided by the embodiment of the invention, the resource access can be directly carried out between the two networking platforms, the step-by-step access process of a multistage networking platform in the prior art is avoided, and the resource access efficiency is improved. A
As shown in fig. 6, which is a schematic structural diagram of a networking platform according to an embodiment of the present invention, as shown in fig. 6, the networking platform 500 includes:
a receiving unit 501, configured to receive a resource access request sent by a first networking platform, where the resource access request includes a specified device identifier, the first networking platform identifier, and an access type;
a sending unit 502, configured to send an authentication request to a central service function through an associated access agent function, where the authentication request is used to determine an access right of the first networking platform, and the authentication request includes a specified device identifier and an identifier of the first networking platform. The receiving unit 501 is further configured to receive an authentication response returned by the central service function according to the access right of the first networking platform. The sending unit 502 is further configured to return a resource access response to the first networking platform according to the authentication response.
In particular, the networked platform may be used to implement a resource access method as shown in FIG. 5. For a specific implementation, refer to fig. 5 and related descriptions, which are not described herein again.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be embodied in electronic hardware, computer software, or combinations of both, and that the components and steps of the examples have been described in a functional general in the foregoing description for the purpose of illustrating clearly the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may also be an electric, mechanical or other form of connection.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment of the present invention.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention essentially or partially contributes to the prior art, or all or part of the technical solution can be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
While the invention has been described with reference to specific embodiments, the invention is not limited thereto, and various equivalent modifications and substitutions can be easily made by those skilled in the art within the technical scope of the invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.