[go: up one dir, main page]

GB2461596A - IP network camera and server system - Google Patents

IP network camera and server system Download PDF

Info

Publication number
GB2461596A
GB2461596A GB0812351A GB0812351A GB2461596A GB 2461596 A GB2461596 A GB 2461596A GB 0812351 A GB0812351 A GB 0812351A GB 0812351 A GB0812351 A GB 0812351A GB 2461596 A GB2461596 A GB 2461596A
Authority
GB
United Kingdom
Prior art keywords
camera
server
network
image data
session
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0812351A
Other versions
GB0812351D0 (en
Inventor
Conrad Charles Spiteri
Tang Zheng
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
VIEW NETWORK SOLUTIONS Ltd
Original Assignee
VIEW NETWORK SOLUTIONS Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by VIEW NETWORK SOLUTIONS Ltd filed Critical VIEW NETWORK SOLUTIONS Ltd
Priority to GB0812351A priority Critical patent/GB2461596A/en
Publication of GB0812351D0 publication Critical patent/GB0812351D0/en
Publication of GB2461596A publication Critical patent/GB2461596A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/143Termination or inactivation of sessions, e.g. event-controlled end of session
    • H04L67/145Termination or inactivation of sessions, e.g. event-controlled end of session avoiding end of session, e.g. keep-alive, heartbeats, resumption message or wake-up for inactive or interrupted session
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00127Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture
    • H04N1/00204Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture with a digital computer or a digital computer system, e.g. an internet server
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/21Server components or server architectures
    • H04N21/218Source of audio or video content, e.g. local disk arrays
    • H04N21/2187Live feed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/422Input-only peripherals, i.e. input devices connected to specially adapted client devices, e.g. global positioning system [GPS]
    • H04N21/4223Cameras
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/61Network physical structure; Signal processing
    • H04N21/6106Network physical structure; Signal processing specially adapted to the downstream path of the transmission network
    • H04N21/6125Network physical structure; Signal processing specially adapted to the downstream path of the transmission network involving transmission via Internet
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/765Interface circuits between an apparatus for recording and another apparatus
    • H04N5/77Interface circuits between an apparatus for recording and another apparatus between a recording apparatus and a television camera
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/173Analogue secrecy systems; Analogue subscription systems with two-way working, e.g. subscriber sending a programme selection signal
    • H04N7/17309Transmission or handling of upstream communications
    • H04N7/17318Direct or substantially direct transmission and handling of requests
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/029Firewall traversal, e.g. tunnelling or, creating pinholes

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Cardiology (AREA)
  • Databases & Information Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Closed-Circuit Television Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

An IP network camera 2 and a server system 5 is shown. The camera has detection means to detect the presence of a local internet connection and generation means to generate a predetermined outbound server address communication with the camera logging on upon detection of the local internet connection. The server is programmed with the server address and has initiation means to receive a communication from the camera and to validate the camera credentials and to send the camera log on confirmation. In use, the camera receives the confirmation and opens a TCP/UDP or other session with the server. A 6 user can communicate with the camera using the server as a relay and fooling the camera into thinking the commands come are a response to camera requests and overcomes security devices such as firewalls and network address translation. When the user requests to view live video, in order to minimize server bandwidth, the server will ask the camera and the client computer to start a connectionless UDP session with each other without having the data pass directly through the server.

Description

Title: IP Network Camera and Server System The present invention relates to an IP network camera and remote server system, especially for use as a security/monitoring system.
The protocols used for communicating over IP networks usually conflict with most network security devices such as firewalls and network address translation (NATs). These devices work to protect the network from intruders getting into the organisation's private data resources.
Firewalls examine the IP address and destination port of each data packet received from the outside world. Firewalls are often configured so that if a computer on the inside of the firewall requests data from a computer on the outside of the firewall (i.e. an outbound connection), for example if a user downloads a file from a website, the firewall will let the data from the computer outside the firewall pass. However this is only if it sends the data packets to the same IP address and port number of the computer on the inside of the firewall that originated the request.
It is known to place remote IP cameras in locations and transfer images and pictures taken by the camera onto a server for storage and retrospective viewing. There are a number of remote monitoring and storage services available in the market and they mainly use one of two available methods.
In the first method the camera uploads snapshots at regular intervals through an internet connection to an FTP server where the images are processed and compiled into a video. This method is not dependant on any firewalls along the connection between the camera and the server (since it is an outbound connection). Its main disadvantage is the lack of ability of the server to configure the camera or change upload intervals and other setting.; The second method is to allow the server to communicate with the camera directly in order to retrieve video streams and modify any setting. This is a much more flexible solution, however any firewalls in between the server and the camera will block access to the camera and specific ports need to be opened manually for this system to work. This makes it much less user friendly than the FTP method.
The invention seeks to provide a solution to this problem to allow a camera to form a "plug and view" connection to a remote server through a local internet connection and allow communication from the server to control the camera without need for adjustment to any firewalls or other security measures.
According to the present invention there is provided IP network camera and server system comprising: a) a camera having detection means to detect the presence of a local internet connection, and generation means to generate an outbound predetermined server address communication with camera credentials upon detection of a local internet connection, b) a server programmed with said server address, said server having initiation means to receive a server address communication from the camera and to validate the camera credentials and to send said camera "log on" confirmation, in use the camera upon receipt of confirmation opening a TCPIUDP or other session with said server.
An embodiment of the invention will now be described with reference to the accompanying drawing.
Referring to the drawing there is shown a system 1. System 1 has a camera 2 in use connected to a local internet connection 3 through a firewall 4. Camera 2 may connect to the internet through a wireless connection. Camera 2 communicates with a server 5 with a server address. The system works as follows.
When the camera 2 is turned "on", detection means in the camera 2 detects the presence of a local internet connection 3, and generation means in the camera generates an outbound predetermined server address communication only upon detection of a local internet connection (a routine within the software (firmware) would contain the pre-programmed IP address of the server 5). When the server 5 is discovered the camera 2 sends the server 5 camera credentials (login details).
Server 5 has initiation means to receive the server address communication from the camera and to validate the camera credentials, including checking account details, and to send said camera "log on" confirmation.
The camera, upon receipt of confirmation, opens a TCPIUDP or other session with the said server. This allows the remote user 6 to send commands to the camera using the server as a relay station (Dashed lines) since commands from the server to the camera are sent as a form of reply to the cameras requests. This will fool the firewall into thinking that the commands are being requested by the camera which is located behind the firewall. The server may also request video and/or audio streams from the camera for storage or other audio/video manipulation purposes.
At any point the user may require to view the live video, however, having a large number of cameras streaming audio and/or video through one or more servers will consume a very high amount of bandwidth. In order to keep bandwidth consumption to a minimum on the server side, when the user requests to view live video, the server will ask the camera and the client computer to start a connectionless UDP session with each other without having the data pass directly through the server (Dotted Lines).
This is achieved by having the remote user request a video session from the server (Dashed Lines). The server contacts the camera and sends the IP address and UDP port number of the user. The camera will try to contact the user but this is blocked by the user's firewall, however the camera's firewall doesn't know that. It now thinks that anything which comes from the user IP and UDP port is addressed to the camera's IP address and is legitimate. On the other hand, the server will pass the camera's IP address and UDP port to the user, who will attempt to contact the camera. The camera's firewall sees the recognised sender address and passes the apparent response on to the camera. This will allow data to flow between the camera and the user with both firewalls thinking that the device on their respective networks initiated the communication (Dotted Lines).
As the camera initiates communication with the server, it is therefore immune to any firewalls or other security devices since the connection is outbound. When the server receives a pre-determined set of strings (commands) that identify and validate the camera, the server is able to request various items from the camera such as video stream and still images. The server will also be able to change settings within the camera by returning various strings to the camera. For example the server may create a file or a set of strings in a pre-determined location. The camera will search for the file or strings in that!ocation, compare its settings with the settings generated by the server and proceed to change its setting if they are different.
It will be appreciated that once a session has been opened and the camera has punched a "hole" through the firewall or router, communication between the camera and server can take place without further obstruction. This has effectively solved any potential configuration problems for the user and made the system truly plug and play.
The invention may take a form different to that specifically described above. It is envisaged that system may include a number of cameras each at the same or different locations, and each camera addressing the same server.
Further modifications will be apparent to those skilled in the art without departing from the scope of the present invention.

Claims (2)

  1. Claims 1. A camera for transmitting image data over the internet, comprising: an image data generating device configured to generate image data in an active state and to disable image data generation in a passive state; a network device configured to establish a connection to the internet via a local network so as to communicate with a server, wherein: said network device transfers image data to said server during said active state; and said network device maintains a session with the server during said passive state.
  2. 2. An IP network camera and server system comprising: a camera having detection means to detect the presence of a local Internet connection, and generation means to generate an outbound predetermined server address communication with camera credentials upon detection of a local Internet connection; and a server programmed with said server address, said server having initiation means to receive a server address communication from the camera *... and to validate the camera credentials and to send said camera "log on" * * confirmation, **** such that, when in use, *S*I the camera upon receipt of confirmation opens a TCP/UDP or *** * other session with the server. * * * S S*S
GB0812351A 2008-07-07 2008-07-07 IP network camera and server system Withdrawn GB2461596A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0812351A GB2461596A (en) 2008-07-07 2008-07-07 IP network camera and server system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0812351A GB2461596A (en) 2008-07-07 2008-07-07 IP network camera and server system

Publications (2)

Publication Number Publication Date
GB0812351D0 GB0812351D0 (en) 2008-08-13
GB2461596A true GB2461596A (en) 2010-01-13

Family

ID=39718049

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0812351A Withdrawn GB2461596A (en) 2008-07-07 2008-07-07 IP network camera and server system

Country Status (1)

Country Link
GB (1) GB2461596A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013055249A1 (en) 2011-10-14 2013-04-18 Milenkovic Milica System and method for baby observation in maternity hospital
US11044503B1 (en) 2010-03-11 2021-06-22 BoxCast, LLC Systems and methods for autonomous broadcasting
US11330341B1 (en) 2016-07-05 2022-05-10 BoxCast, LLC System, method, and protocol for transmission of video and audio data

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003110560A (en) * 2001-10-01 2003-04-11 Sanyo Electric Co Ltd Data communication system
US20050055727A1 (en) * 1997-12-04 2005-03-10 Pentax U.S.A., Inc. Integrated internet/intranet camera
JP2006086940A (en) * 2004-09-17 2006-03-30 Megachips System Solutions Inc Image distribution system
WO2006072994A1 (en) * 2005-01-07 2006-07-13 Systemk Corporation Login-to-network-camera authentication system
WO2007073314A2 (en) * 2005-12-22 2007-06-28 Axis Ab Monitoring system and method for connecting a monitoring device to a service server

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050055727A1 (en) * 1997-12-04 2005-03-10 Pentax U.S.A., Inc. Integrated internet/intranet camera
JP2003110560A (en) * 2001-10-01 2003-04-11 Sanyo Electric Co Ltd Data communication system
JP2006086940A (en) * 2004-09-17 2006-03-30 Megachips System Solutions Inc Image distribution system
WO2006072994A1 (en) * 2005-01-07 2006-07-13 Systemk Corporation Login-to-network-camera authentication system
WO2007073314A2 (en) * 2005-12-22 2007-06-28 Axis Ab Monitoring system and method for connecting a monitoring device to a service server

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11044503B1 (en) 2010-03-11 2021-06-22 BoxCast, LLC Systems and methods for autonomous broadcasting
US12155879B2 (en) 2010-03-11 2024-11-26 Boxcast Inc. Methods for uploading video data
WO2013055249A1 (en) 2011-10-14 2013-04-18 Milenkovic Milica System and method for baby observation in maternity hospital
US11330341B1 (en) 2016-07-05 2022-05-10 BoxCast, LLC System, method, and protocol for transmission of video and audio data
US11483626B1 (en) 2016-07-05 2022-10-25 BoxCast, LLC Method and protocol for transmission of video and audio data
US12126873B1 (en) 2016-07-05 2024-10-22 Boxcast Inc. Method and protocol for transmission of video and audio data

Also Published As

Publication number Publication date
GB0812351D0 (en) 2008-08-13

Similar Documents

Publication Publication Date Title
KR101758681B1 (en) Communication system, and data transmitting method in the system
Keranen et al. Interactive connectivity establishment (ICE): A protocol for network address translator (NAT) traversal
Srisuresh et al. State of peer-to-peer (P2P) communication across network address translators (NATs)
US8086740B2 (en) Method and apparatus for remotely controlling a computer with peer-to-peer command and data transfer
US9021573B2 (en) Control of security application in a LAN from outside the LAN
US7602784B2 (en) Method and apparatus to permit data transmission to traverse firewalls
JP2018525935A5 (en)
US20170034174A1 (en) Method for providing access to a web server
US8219679B2 (en) Detection and control of peer-to-peer communication
JP7398251B2 (en) How to remotely control video cameras and video surveillance systems
US7594259B1 (en) Method and system for enabling firewall traversal
WO2006082576A2 (en) A method and apparatus for server-side nat detection
US11894947B2 (en) Network layer performance and security provided by a distributed cloud computing network
JP5216018B2 (en) Streaming media services for mobile phones
US20110145426A1 (en) Networking method of communication apparatus, communication apparatus and storage medium
US20230054029A1 (en) Methods and systems for proxy relay implementation for client-server connections over wide area network
US9088542B2 (en) Firewall traversal driven by proximity
GB2461596A (en) IP network camera and server system
Pandey et al. Attacks & defense mechanisms for TCP/IP based protocols
CN104813632A (en) Monitoring system, method and computer program with message forwarding
Goldberg et al. A Network Address Translator (NAT) Traversal Mechanism for Media Controlled by the Real-Time Streaming Protocol (RTSP)
JP2015231225A (en) Tunnel connection device, tunnel termination device, connection control method, and program
Duarte Jr et al. Transparent communications for applications behind NAT/firewall over any transport protocol
KR100660123B1 (en) Vpn server system and vpn terminal for a nat traversal
Kinicki An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)