Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
Referenced herein " embodiment " is it is meant that a particular feature, structure, or characteristic described can wrap in conjunction with the embodiments
It is contained at least one embodiment of the application.Each position in the description occur the phrase might not each mean it is identical
Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art explicitly and
Implicitly understand, embodiment described herein can be combined with other embodiments.
The method of network equipment monitoring data encryption provided by the present application, is suitable for hardware environment shown in fig. 1, including move
Dynamic terminal 100, cloud server 200 and the network equipment 300.Wherein, the network equipment 300 has network connecting function, can
Its monitoring data is uploaded to cloud server 200 to store, wherein monitoring data includes video data, voice data etc.;It is mobile
Terminal 100 also has network connecting function, and according to there is the corresponding client of the network equipment 300 in mobile terminal 100, user can
The real time data and/or historical data of the network equipment 300 bound by the client from the acquisition of cloud server 200 are simultaneously opened up
Show;In addition, the client can also be obtained by local area network when mobile terminal 100 and the network equipment 300 are in same local area network
The real time data of the network equipment 300 and displaying.
In embodiments of the present invention, cloud server 200 can be a server, include multiple in this server
The service of different function, such as may include first service (i.e. equipment management service), second service (i.e. encryption key distribution service)
And storage service;Cloud server 200 can also be the server cluster or cloud computing center being made of multiple servers, example
It such as may include first server (i.e. device management server), second server (i.e. key distribution servers) and storage clothes
Business device;Wherein, equipment management service/device management server is used to be the binding for establishing the network equipment 300 Yu client user
Relationship, encryption key distribution service/key distribution servers be used for for the network equipment 300 and client user distribution encrypt accordingly it is close
Key and decruption key;Storage service/storage server can be used for the monitoring data of storage networking device 300, logical convenient for user
Cross the historical data playback that client realizes the network equipment 300.
In the embodiment of the present invention, the network equipment 300 can use cloud server 200 before transmitting its monitoring data
The encryption key of distribution encrypts monitoring data, then transmits encrypted monitoring data to client or cloud service
Device 200;The prison for the network equipment 300 that the monitoring data for the network equipment 300 that client is got, cloud server 200 store
Data are controlled, are by the monitoring data of 300 encryption of the network equipment, client can be distributed using cloud server 200
Decruption key monitoring data is decrypted, exoergic is checked.
According to an embodiment of the present invention, the network equipment 300 is the video camera that can be networked, and mobile terminal 100 can be hand
Machine is equipped with corresponding APP (i.e. above-mentioned client) in mobile phone, and user can watch the video camera bound by the APP
Real-time monitoring data, or the operation such as history playback is carried out to the monitoring data of the video camera bound;User logs in the APP
Later, which just represents user identity.The APP also its log in the APP in user with two-dimensional code scanning and identification function
Later, can be by the two dimensional code of APP smear camera, and then establish the binding that the current login user of APP retouches video camera with this
Relationship.In the embodiment of the present invention, it is only bundled with the APP user of video camera, just has permission the monitoring data progress to video camera
Viewing or playback operation etc. in real time.
Optionally, above-mentioned network is usually internet but it is also possible to be other networks, including but not limited to local area network
(Local Area Network, LAN), Metropolitan Area Network (MAN) (Metropolitan Area Network, MAN), wide area network (Wide
Area Network, WAN), the combination of one or more of dedicated network or Virtual Private Network.
In one embodiment, as shown in Fig. 2, a kind of method of network equipment monitoring data encryption is provided, with the party
Method is applied to be illustrated for the network equipment end in Fig. 1, comprising the following steps:
S110 obtains the monitoring data of the network equipment.
S120 obtains the encryption key of server distribution;The personal code work and institute of the encryption key and target user
State the device identification association of the network equipment;The target user is the client that binding relationship is established with the network equipment
User;The personal code work is corresponding with the user identifier that the target user logs in the client.
In the embodiment of the present invention, the server be for distribute respectively for the network equipment and client user encrypt it is close
The service of key and decruption key or server, encryption key distribution service/key distribution servers as escribed above.Wherein, it services
Device is the network equipment and client user distributes encryption key respectively and the specific implementation of decruption key will hereinafter
It illustrates.
In the embodiment of the present invention, client is mounted in the application program in the mobile terminals such as mobile phone, plate, such as APP,
Different user can register corresponding account, and it is different that different user logs in the user identifier that client uses;Different user
It is also different to identify corresponding personal code work.According to an embodiment of the present invention, corresponding personal code work is obtained based on user identifier
Mode may include: according to user identifier generate setting length character string, such as by user identifier generate 64 words
Symbol string, as the corresponding personal code work of user identifier.In the following description, personal code work also is indicated with UserKey.
In the embodiment of the present invention, client user and the network equipment are established after binding relationship, could pass through login visitor
The monitoring data of the network equipment is watched at family end.One client user can establish binding relationship with multiple network equipments, and one
A network equipment can also establish binding relationship with multiple client user;The server can be according to user and the network equipment
Binding relationship, be that the login user of the network equipment and client distributes corresponding key, so that different user binding is the same as a
When the network equipment, the network equipment is different for the corresponding encryption key used of different user, and different user is to the network equipment
The data decryption key used when monitoring data is decrypted is also different;Also, the same user binds multiple and different networks and sets
When standby, the encryption key that heterogeneous networks equipment is used for the user is different, which is directed to the solution that heterogeneous networks equipment uses
Key is also different.Wherein, the specific implementation that the network equipment and client establish binding relationship will hereinafter specifically
It is bright.
S130 encrypts the monitoring data using the encryption key.
Encryption method through the foregoing embodiment can be using a kind of preferred after the network equipment gets monitoring data
Encryption key monitoring data is encrypted, the personal code work and equipment of itself of the encryption key and target user mark are closed
Connection, thus bring technical effect includes: for different users, and the network equipment can be supervised using different encryption keys
The encryption of data is controlled, and then after the monitoring data that receives of different user, will be unable to be solved according to the same decruption key
It is close, the safety of the monitoring data of the network equipment has thus been ensured from data sending terminal.
An embodiment according to the present invention, as shown in connection with fig. 3, the network equipment establish the specific implementation of binding relationship with client
Mode and server are the specific implementation side that the network equipment and client user distribute encryption key and decruption key respectively
Formula, comprising the following steps:
S1, client obtain the device identification of the network equipment and the user identifier of login user;
According to an embodiment of the present invention, the mode that client obtains the device identification of the network equipment includes: that client is swept
The two dimensional code on the network equipment is retouched, the device identification of the network equipment is obtained by the two dimensional code.Wherein, the two dimensional code can pass through
The display screen of equipment is shown, is either printed or is attached on the shell of the network equipment.
S2, client carry the use in the apparatus bound request to first server sending device bind request
Family mark and the device identification.
S3, the first server are requested to obtain the user identifier and the device identification by the apparatus bound, raw
At personal code work corresponding with the user identifier, the personal code work is sent to the corresponding network of the device identification and is set
It is standby.
S4 after the network equipment receives the personal code work, sends encryption key requests to second server;Institute
State the device identification that the personal code work and the network equipment are carried in encryption key requests.
S5 after the second server receives the encryption key requests, is generated and the personal code work and institute
The associated encryption key of device identification is stated, the Xiang Suoshu network equipment sends the encryption key.
In the embodiment of the present invention, first server, second server can be two independent servers, be also possible to belong to
Two service processes in same server.
An embodiment according to the present invention, the network equipment are the video camera that can be networked, and the user identifier is User ID, described
Device identification can be unique factory number of video camera;The personal code work can according to user identifier generate setting it is long
The character string of degree, such as 64 character strings generated by user identifier.In the following description, UserKey table is also used
Show personal code work.
S6, after receiving the encryption key that second server issues, Xiang Suoshu second server is sent the network equipment
The successful response message of key reception;
S7, after the second server receives the response message, Xiang Suoshu client sending device binding success
Message;
S8 after the client receives the successful message of apparatus bound, the network equipment is added to have bound sets
It is standby, for example, the network equipment is added in bound device list.
So far, user sets up the binding relationship of user and the network equipment by the client installed in mobile terminal, this
After user logs in client afterwards, the network equipment bound can be checked, and watch the real-time monitoring data of the network equipment
And/or history monitoring data.But the real-time monitoring data and/or history prison that client checks the network equipment are logged in user
Before controlling data, also need to obtain the corresponding decruption key of the network equipment, which is used for the real-time of the network equipment
Monitoring data and/or history monitoring data are decrypted.
Further, according to an embodiment of the present invention, refering to what is shown in Fig. 4, what the acquisition of client login user had been bound
The process of the decruption key of the network equipment includes:
1, user logs in APP (i.e. client), obtains the user identifier of currently logged on user;
2, the network equipment that selection active user has bound, as target device;
3, APP sends decryption key request to second server;Carry currently logged on user's in the decryption key request
The device identification of user identifier and the target device.
4, second server obtains user corresponding with the user identifier after receiving decryption key request first
Code;Then the associated decruption key of device identification with the personal code work and the target device is obtained, is sent to
APP;
5, APP saves decruption key, is decrypted for the subsequent monitoring data to the target device.
An embodiment according to the present invention, the network equipment are the video camera that can be networked, and device identification can be for video camera only
One factory number;User identifier can be the id information that user logs in client, and personal code work can be the setting length of generation
Character string, such as by user identifier generate 64 character strings.
For the monitoring data of the network equipment, traditional Encryption Algorithm is usually monitoring data as straight binary number
According to being encrypted using Encryption Algorithm such as DES, AES of standard, usual operand is larger, is unable to satisfy the monitoring of the network equipment
The requirement of real-time property transmission.
An embodiment according to the present invention, refering to what is shown in Fig. 5, the network equipment is using the encryption key to the monitoring data
The specific implementation encrypted can include:
The monitoring data is decomposed into video data and non-video data by S501;
S502 obtains the partial data in the video data, as be-encrypted data;
S503 encrypts the be-encrypted data using the encryption key;
S504, the data that encryption is obtained, other data in the video data other than be-encrypted data and described
Non-video data combination, obtains encrypted monitoring data.
According to an embodiment of the present invention, the monitoring data encryption of the network equipment, is the key that in monitoring data
Data encryption, the encryption of not all data.Such as: be-encrypted data can be the I frame data for belonging to video data;This
Outside, the data length that can set the be-encrypted data is less than or equal to 2048 bytes, specifically for example:
(if NALU length-starting code lengths -1 of I frame data) >=2048 bytes, the data of the be-encrypted data
Length is 2048 bytes;
If (NALU length-starting code lengths -1 of I frame data) < 2048 bytes, the data of the be-encrypted data are long
Degree=(NALU length-starting code length -1)-(NALU length-starting code length -1) %16.
According to H.264 and H.265 agreement provides that H.264 and H.265 video stream format master data unit is NAL unit,
Namely NALU.In order to extract NALU from byte stream, agreement regulation adds initial code before each NALU:
0x000001 or 0x00000001 (0x represents hexadecimal), i.e., H.264 or H.265 video stream format is as follows:
H.264 or H.265 bit stream=initial code+NALU+ initial code+NALU+ ...
Video flowing is exported in the form of NALU, and each NALU is in addition to initial code by the NALU of a byte
Header and RBSP composition.Wherein:
RBSP: initial data byte stream (also known as payload data), the partial data belong to the embodiment of the present invention and need to encrypt
Data.
NALU Header: some attribute informations for describing NAL unit.Wherein NAL unit type attribute (is hereafter used
NALU_UNIT_TYPE is indicated), for describing NAL unit payload data (RBSP) type definition, different NALU_UNIT_TYPE
Value represent different meanings unit payload data segment, for example, representing RBSP is IDR as NALU_UNIT_TYPE=5
The segment (also known as I frame) of image.
According to above-described embodiment, encrypted data are the H.264 or H.265 part numbers in each I frame of video flowing
According to can both protect key video sequence data, can also reduce encryption/decryption processes to the expense of equipment;When encryption, non-I frame is skipped
NALU (i.e. NALU data of the NALU_UNIT_TYPE not equal to 5 in NALU Header), for the NALU for belonging to I frame, removes
Beginning code and the subsequent 2KB data of NALU Header are encrypted (the 2K data i.e. in RBSP data), if NALU curtailment
2KB, encrypted data length are 16 times of downward rounding values of length after removing initial code and NALU Header.Such as:
(if NALU length-initial code -1) >=2048 bytes;Encrypted data length=2048;
(if NALU length-initial code -1) < 2048 bytes;
Encrypted data length=(NALU length-initial code -1)-(NALU length-initial code -1) %16;
It originates code length: be H.264 4, H265 being 6, H.265 two more than H264 byte is mark H.265.
It through the foregoing embodiment, before monitoring data transmission to network is encrypted by the network equipment, encryption is calculated
Method can use the close SM4 of state, and encryption key is stored in advance in the encryption key in video camera.Client decryption uses corresponding
SM4 algorithm and the decruption key for being stored in advance in client, by Video Decoder to after decryption frame and other frames fold
Adduction rendering plays.Due to only carrying out encryption/decryption process to the data for being no more than 2048 bytes in I frame data, it ensure that and add
The efficiency of close/decryption, ensure that the efficiency of transmission of monitoring data.
Further, according to an embodiment of the present invention, the network equipment is in the use encryption key to described to be encrypted
After data are encrypted, the NALU_UNIT_TYPE of the I frame data in the video data is revised as reserved field type;
Such as the NALU_UNIT_TYPE in I frame data is revised as 3 (NALU_UNIT_TYPE&0x1F=of reserved field Class1
13);Encrypted data are identified after obtaining data so as to client, and then are decrypted.
Through the foregoing embodiment, based on a small amount of encryption key data in monitoring data, the data file for encrypting front and back becomes
Change and only increase by tens bytes, is consistent size substantially, does not increase network transmission pressure, ensure that the monitoring number of the network equipment
According to encryption/decryption efficiency, advantageously ensure that the efficiency of the monitoring data transmission of the network equipment.
Further, after the critical data in monitoring data is encrypted in the network equipment, by encrypted prison
Control data are sent to corresponding client and/or storage server;Here storage server is set for storing the network
Standby monitoring data.When there is the real-time monitoring data of the client request viewing network equipment, can directly be asked to the network equipment
Seek the real-time monitoring data by encryption;When there are the history playback data of the client request viewing network equipment, can pass through
Access storage server obtains the monitoring data by encryption in setting historical time section of the network equipment.
Method through the foregoing embodiment encrypts the monitoring data of the network equipment, can take into account following two points: one
It is that different user use is with a network equipment, and the data encryption key that the network equipment is used for different user is different, no
The data decryption key used with user is also different;Second is that the same user uses heterogeneous networks equipment, heterogeneous networks equipment
The data encryption key of use is different, and the data decryption key that user uses for heterogeneous networks equipment is also different.As a result,
Guarantee the safety of the monitoring data of the network equipment to greatest extent.
In one embodiment, as shown in fig. 6, a kind of decryption method of network equipment monitoring data is provided, with the party
Method is applied to be illustrated for the mobile terminal in above system environment, and the executing subject of following steps can be mobile whole
The client (APP) installed in end.The decryption method of network equipment monitoring data the following steps are included:
S601 receives the monitoring data of the network equipment;It is established between the network equipment and the login user of client
Binding relationship;
S602 obtains the decruption key of server distribution, the use of the decruption key and the login user of the client
The device identification of family code and the network equipment is associated with;The user of the personal code work and the login user of the client
Mark corresponds to;
S603 is decrypted the monitoring data using the decruption key.
According to an embodiment of the present invention, the implementation that client receives the monitoring data of the network equipment can wrap
It includes:
Client receives the monitoring data from the network equipment;Alternatively, client is received from storage server
The monitoring data of the network equipment, the storage server are used to store the monitoring data of the network equipment.
According to an embodiment of the present invention, it before client receives the step of monitoring data of the network equipment, also wraps
Include: client sends the first request of data to the network equipment;Alternatively, client sends the second number to the storage server
According to request;User's mark of the login user of the client is carried in first request of data, the second request of data
Know.
According to an embodiment of the present invention, first request of data is real time data request;Second request of data
For data readback request.Implement scene is for example:
If client receives the trigger event of the real-time monitoring data for watching the network equipment, to the net
Network equipment sends the first request of data;If client receives the triggering thing of the playback of data for watching the network equipment
Part then sends the second request of data to the storage server.
According to an embodiment of the present invention, shown in Figure 7, client is using the decruption key to the monitoring data
The embodiment being decrypted specifically includes:
The monitoring data is decomposed into video data and non-video data by S701;
S702 obtains the encryption data in the video data, as data to be decrypted;
S703 is decrypted the data to be decrypted using the decruption key;
S704, the data that decryption is obtained, the data in the video data other than encryption data and the non-video
Data combination, the monitoring data after being decrypted.
According to an embodiment of the present invention, the data to be decrypted are corresponding with the be-encrypted data of above-described embodiment, that is, belong to
I frame data in the video data, for details, reference can be made to described in above-described embodiment.
Below by taking the video camera that can be networked as an example, the network equipment monitoring data of above-described embodiment is encrypted and decrypted
Method is further illustrated by.
Refering to what is shown in Fig. 8, after user logs in client, if the real-time monitoring data of selection viewing video camera, video camera
Monitoring data encryption and decrypting process it is as follows:
1, user A logs in client, and video camera 001 is selected from bound device;
2, it is directed to video camera 001, user triggers the operation of real time data viewing;Client is sent in real time to video camera 001
Monitoring data request;It include the personal code work of user A in real-time monitoring data request, the personal code work can pass through user
The user identifier of A generates;
3, video camera 001 generates real-time monitoring data;And it is identified according to the personal code work of user A and equipment of itself, selection
Suitable encryption key;Real-time monitoring data is encrypted using the encryption key.
In one embodiment, real-time monitoring data is encrypted using SM4 algorithm, in order to further increase encryption
Efficiency and data transmission efficiency are added using I frame of the SM4 algorithm to video data in real-time monitoring data in some embodiments
It is close.SM4 algorithm and aes algorithm key length all having the same, are higher than DES algorithm in safety, and SM4 algorithm was calculating
Increase nonlinear transformation in journey, the safety of its algorithm can be improved.
4, encrypted real-time monitoring data is transferred to client by video camera 001.
5, client selects suitable decruption key according to the device identification of the personal code work and video camera 001 of user A,
The real-time monitoring data received is decrypted, the monitor video after playing decryption.
In one embodiment, client carries out data deciphering, the number that decrypting process and camera shooting generator terminal carry out using SM4 algorithm
Corresponding according to ciphering process, the monitoring data after finally output decryption is played out to player.
Refering to what is shown in Fig. 9, in the case where the history monitoring data of client user B viewing video camera 002, video camera
The encryption of monitoring data and decrypting process are as follows:
1, the monitoring data generated in 002 side of video camera, video camera 002;According to user's generation of the user B of current bindings
Code and equipment of itself mark, select suitable encryption key;Monitoring data is encrypted using the encryption key.
2, video camera 002 gives encrypted monitoring data transmission to the storage server.
3, storage server receives the monitoring data by encryption and preservation that video camera 002 is sent.
4, user B logs in client, and video camera 002 is selected from bound device;
5, it is directed to video camera 002, user triggers the operation of history monitoring data viewing;Client is sent to storage server
Historical data request;It include the device identification of the personal code work and video camera 002 of user B in monitoring data request, it is described
Personal code work can be generated by the user identifier of user B;
6, when storage server receives the historical data request of client, from the monitoring data of preservation, acquisition is taken the photograph
History monitoring data of the camera 002 in the corresponding period, and it is sent to client.
7, client selects suitable solution according to the device identification of the personal code work and video camera 002 of currently logged on user B
The history monitoring data of the video camera 002 received is decrypted in key, and is regarded by the monitoring after client terminal playing decryption
Frequently.
An embodiment according to the present invention, video camera is in being encrypted monitoring data, only to video counts therein
According to being encrypted, PostScript format text is encapsulated into other data packings such as audio datas after video data encryption
Part is sent to client or storage server.Therefore, the monitoring data of storage server storage is PostScript format text
Part.When client checks history monitoring data, PostScript formatted file is pulled from storage server;It is view by file declustering
Frequency evidence and other data (i.e. non-video data), other data include audio data etc.;Use SM4 algorithm and corresponding solution
Obtained video data is decrypted in key, then by after decryption video data and non-video data be overlapped, obtain
Monitoring data after to decryption;Monitoring data after being decrypted by the client terminal playing.
It should be understood that for the various method embodiments described above, although each step in flow chart is according to arrow
Instruction is successively shown, but these steps are not that the inevitable sequence according to arrow instruction successively executes.Unless having herein bright
True explanation, there is no stringent sequences to limit for the execution of these steps, these steps can execute in other order.And
And at least part step in the flow chart of embodiment of the method may include multiple sub-steps or multiple stages, this is a little
Step or stage are not necessarily to execute completion in synchronization, but can execute at different times, these sub-steps
Perhaps the execution sequence in stage be also not necessarily successively carry out but can with the sub-step of other steps or other steps or
At least part in person's stage executes in turn or alternately.
Based on thought identical with the method for network equipment monitoring data encryption in above-described embodiment, it is also provided herein one
The embodiment of the device of kind network equipment monitoring data encryption.As shown in Figure 10, the network equipment monitoring data of the present embodiment adds
Close device includes:
Data acquisition module 601, for obtaining the monitoring data of the network equipment;
Encryption key obtains module 602, for obtaining the encryption key of server distribution;The encryption key and target are used
The device identification of the personal code work at family and the network equipment is associated with;The target user is to establish with the network equipment
The user of the client of binding relationship;The personal code work and the target user log in the user identifier pair of the client
It answers;
Data encryption module 603, for being encrypted using the encryption key to the monitoring data.
Based on thought identical with the decryption method of network equipment monitoring data in above-described embodiment, it is also provided herein one
The embodiment of the decryption device of kind network equipment monitoring data.As shown in figure 11, the network equipment monitoring data of the present embodiment
Decrypting device includes:
Data reception module 701, for receiving the monitoring data of the network equipment;The login of the network equipment and client
Binding relationship is established between user;
Decruption key obtains module 702, for obtaining the decruption key of server distribution, the decruption key and the visitor
The device identification of the personal code work of the login user at family end and the network equipment is associated with;The personal code work and the client
The user identifier of the login user at end is corresponding;
Data decryption module 703, for the monitoring data to be decrypted using the decruption key.
About network equipment monitoring data encryption/decryption device, may refer to monitor number above for the network equipment
According to the restriction of encrypting/decrypting method, details are not described herein.It is each in the device of above-mentioned network equipment monitoring data encryption/decryption
A module can be realized fully or partially through software, hardware and combinations thereof.Above-mentioned each module can be embedded in the form of hardware or
Independently of in the processor in computer equipment, can also be stored in a software form in the memory in computer equipment, with
It is called convenient for processor and executes the corresponding operation of the above modules.
In addition, in the embodiment of network equipment monitoring data encryption/decryption device of above-mentioned example, each program module
Logical partitioning be merely illustrative of, can according to need in practical application, for example, for corresponding hardware configuration requirement or
The convenient of the realization of software considers, above-mentioned function distribution is completed by different program modules, i.e., is monitored the network equipment
The internal structure of the device of data encryption/decryption is divided into different program modules, to complete whole described above or portion
Divide function.
In one embodiment, a kind of computer equipment is provided, which can be mobile terminal or net
Network equipment, internal structure chart are shown in Fig.12.The computer equipment includes the processor connected by system bus, deposits
Reservoir, network interface and database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The calculating
The memory of machine equipment includes non-volatile memory medium, built-in storage.The non-volatile memory medium be stored with operating system,
Computer program and database.The built-in storage is the operation of the operating system and computer program in non-volatile memory medium
Environment is provided.Device or network equipment prison of the database of the computer equipment for the encryption of storage networking device monitoring data
Control the related data of the decryption device of data.The network interface of the computer equipment is used to pass through network connection with external terminal
Communication.To realize a kind of method that network equipment monitoring data encrypts or a kind of net when the computer program is executed by processor
The decryption method of network monitoring of tools data.
It will be understood by those skilled in the art that structure shown in Figure 12, only part relevant to application scheme
The block diagram of structure, does not constitute the restriction for the computer equipment being applied thereon to application scheme, and specific computer is set
Standby may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment, including memory and processor are provided, is stored in memory
Computer program, the processor perform the steps of when executing computer program
Obtain the monitoring data of the network equipment;Obtain the encryption key of server distribution;The encryption key and target are used
The device identification of the personal code work at family and the network equipment is associated with;The target user is to establish with the network equipment
The user of the client of binding relationship;The personal code work and the target user log in the user identifier pair of the client
It answers;The monitoring data is encrypted using the encryption key.
In one embodiment, also realize that network is set in above-mentioned other embodiments when the processor executes computer program
The step of method of standby monitoring data encryption includes.
In one embodiment, a kind of computer equipment, including memory and processor are provided, is stored in memory
Computer program, the processor perform the steps of when executing computer program
Receive the monitoring data of the network equipment;Binding is established between the network equipment and the login user of client to close
System;Obtain the decruption key of server distribution, the personal code work of the login user of the decruption key and the client and
The device identification of the network equipment is associated with;The personal code work is corresponding with the user identifier of the login user of the client;
The monitoring data is decrypted using the decruption key.
In one embodiment, also realize that network is set in above-mentioned other embodiments when the processor executes computer program
The step of decryption method of standby monitoring data includes.
Another embodiment provides a kind of computer readable storage mediums, are stored thereon with computer program, meter
Calculation machine program performs the steps of when being executed by processor
Obtain the monitoring data of the network equipment;Obtain the encryption key of server distribution;The encryption key and target are used
The device identification of the personal code work at family and the network equipment is associated with;The target user is to establish with the network equipment
The user of the client of binding relationship;The personal code work and the target user log in the user identifier pair of the client
It answers;The monitoring data is encrypted using the encryption key.
Another embodiment provides a kind of computer readable storage mediums, are stored thereon with computer program, meter
Calculation machine program performs the steps of when being executed by processor
Receive the monitoring data of the network equipment;Binding is established between the network equipment and the login user of client to close
System;Obtain the decruption key of server distribution, the personal code work of the login user of the decruption key and the client and
The device identification of the network equipment is associated with;The personal code work is corresponding with the user identifier of the login user of the client;
The monitoring data is decrypted using the decruption key.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer
In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein,
To any reference of memory, storage, database or other media used in each embodiment provided herein,
Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM
(PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include
Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms,
Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing
Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment
In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance
Shield all should be considered as described in this specification.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment
Point, it may refer to the associated description of other embodiments.
The term " includes " of embodiment hereof and " having " and their any deformations, it is intended that cover non-exclusive packet
Contain.Such as contain series of steps or the process, method, system, product or equipment of (module) unit are not limited to arrange
Out the step of or unit, but optionally further comprising the step of not listing or unit, or optionally further comprising for these mistakes
The intrinsic other step or units of journey, method, product or equipment.
Referenced herein " multiple " refer to two or more."and/or", the association for describing affiliated partner are closed
System indicates may exist three kinds of relationships, for example, A and/or B, can indicate: individualism A exists simultaneously A and B, individualism
These three situations of B.Character "/" typicallys represent the relationship that forward-backward correlation object is a kind of "or".
Referenced herein " first second " be only be the similar object of difference, do not represent for the specific of object
Sequence, it is possible to understand that specific sequence or precedence can be interchanged in ground, " first second " in the case where permission.It should manage
The object that solution " first second " is distinguished is interchangeable under appropriate circumstances so that the embodiments described herein can in addition to
Here the sequence other than those of diagram or description is implemented.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art
It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application
Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.