[go: up one dir, main page]

CN109495258A - Method and device for decrypting monitoring data, computer equipment and storage medium - Google Patents

Method and device for decrypting monitoring data, computer equipment and storage medium Download PDF

Info

Publication number
CN109495258A
CN109495258A CN201811558736.5A CN201811558736A CN109495258A CN 109495258 A CN109495258 A CN 109495258A CN 201811558736 A CN201811558736 A CN 201811558736A CN 109495258 A CN109495258 A CN 109495258A
Authority
CN
China
Prior art keywords
data
network equipment
monitoring data
client
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811558736.5A
Other languages
Chinese (zh)
Other versions
CN109495258B (en
Inventor
李禄燊
黄训涛
张颖
马幸晖
王家宾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianyi Shilian Technology Co ltd
Original Assignee
CENTURY DRAGON INFORMATION NETWORK CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CENTURY DRAGON INFORMATION NETWORK CO LTD filed Critical CENTURY DRAGON INFORMATION NETWORK CO LTD
Priority to CN201811558736.5A priority Critical patent/CN109495258B/en
Publication of CN109495258A publication Critical patent/CN109495258A/en
Application granted granted Critical
Publication of CN109495258B publication Critical patent/CN109495258B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention relates to a method and a device for monitoring data decryption, computer equipment and a storage medium. The method comprises the following steps: receiving monitoring data of network equipment; a binding relationship is established between the network equipment and a login user of the client; acquiring a decryption key distributed by a server, wherein the decryption key is associated with a user code of a login user of the client and an equipment identifier of the network equipment; the user code corresponds to a user identifier of a login user of the client; and decrypting the monitoring data by adopting the decryption key. The embodiment of the invention solves the problem that the monitoring data of the network equipment is unsafe.

Description

Method, apparatus, computer equipment and the storage medium of monitoring data decryption
Technical field
The present invention relates to encryption and decryption technique fields, method, network more particularly to the decryption of network equipment monitoring data Device, computer equipment and the storage medium of monitoring of tools data deciphering.
Background technique
As the network equipments such as web camera enter average family, while offering convenience for people's lives, also bring Many information security hidden danger.The monitoring data of the network equipment is frequently necessary to upload to cloud, such as the monitoring of web camera Video data needs to upload to cloud, and network transmission, the storage safety of video data protect the safety of cloud " private data ", It has been unavoidable problem.
However, often there is quilt in links such as the transmission of the monitoring data of the network equipment, played/reproduced, downloading, distributions The safety of situations such as malicious user is stolen, distorted, the monitoring data of the network equipment is difficult to be protected, and is set at present for network Standby monitoring data encryption and decryption mechanisms are all relatively simple, and the monitoring data of the network equipment is easy to be intercepted simultaneously by malicious third parties It cracks, the safety of the monitoring data of the network equipment is caused to be difficult to be protected.
Summary of the invention
Based on this, it is necessary to which what the safety for the monitoring data of the existing way network equipment was difficult to be protected asks Topic provides method, apparatus, computer equipment and the storage medium of a kind of monitoring data decryption.
In a first aspect, the embodiment of the present invention provides a kind of method of network equipment monitoring data decryption, comprising:
Receive the monitoring data of the network equipment;Binding is established between the network equipment and the login user of client to close System;
Obtain the decruption key of server distribution, the personal code work of the decruption key and the login user of the client And the device identification association of the network equipment;The user identifier pair of the personal code work and the login user of the client It answers;
The monitoring data is decrypted using the decruption key.
In one embodiment, the step of monitoring data for receiving the network equipment includes:
Receive the monitoring data from the network equipment;
Alternatively, receiving the monitoring data of the network equipment from storage server, the storage server is for depositing Store up the monitoring data of the network equipment.
In one embodiment, before the step of monitoring data for receiving the network equipment, further includes:
The first request of data is sent to the network equipment;
Alternatively, sending the second request of data to the storage server;
User's mark of the login user of the client is carried in first request of data, the second request of data Know.
In one embodiment, first request of data is real time data request;
Second request of data is data readback request.
In one embodiment, further includes:
If receiving the trigger event of the real-time monitoring data for watching the network equipment, Xiang Suoshu network equipment hair Send the first request of data;
If receiving the trigger event of the playback of data for watching the network equipment, Xiang Suoshu storage server is sent Second request of data.
In one embodiment, the described the step of monitoring data is decrypted using the decruption key, comprising:
The monitoring data is decomposed into video data and non-video data;
The encryption data in the video data is obtained, as data to be decrypted;
The data to be decrypted are decrypted using the decruption key;
Data, the data and the non-video data group in the video data other than encryption data that decryption is obtained It closes, the monitoring data after being decrypted.
In one embodiment, the data to be decrypted belong to the I frame data in the video data, and:
(if NALU length-starting code lengths -1 of I frame data) >=2048 bytes, the data of the data to be decrypted Length is 2048 bytes;
If (NALU length-starting code lengths -1 of I frame data) < 2048 bytes, the data of the data to be decrypted are long Degree=(NALU length-starting code length -1)-(NALU length-starting code length -1) %16.
Second aspect, the embodiment of the present invention provide a kind of device of network equipment monitoring data decryption, comprising:
Data reception module, for receiving the monitoring data of the network equipment;The login of the network equipment and client is used Binding relationship is established between family;
Decruption key obtains module, for obtaining the decruption key of server distribution, the decruption key and the client The device identification of the personal code work of the login user at end and the network equipment is associated with;The personal code work and the client Login user user identifier it is corresponding;
Data decryption module, for the monitoring data to be decrypted using the decruption key.
The third aspect, the embodiment of the present invention provide a kind of computer equipment, including memory and processor, the memory It is stored with computer program, the processor realizes the network as described in above-mentioned any embodiment when executing the computer program The method of monitoring of tools data encryption.
Fourth aspect, the embodiment of the present invention provide a kind of computer storage medium, are stored thereon with computer program, the journey The method of the network equipment monitoring data encryption as described in above-mentioned any embodiment is realized when sequence is executed by processor.
A technical solution in above-mentioned technical proposal has the following advantages that or the utility model has the advantages that side through the foregoing embodiment The monitoring data of the network equipment is decrypted in method, can take into account following two points: first is that, different user use is set with a network Standby, the data encryption key that the corresponding network equipment of different user uses is different, the data decryption key that different user uses Also different;Second is that the same user uses heterogeneous networks equipment, the data encryption key that heterogeneous networks equipment uses is different Sample, the data decryption key that user uses for heterogeneous networks equipment are also different;Thus the monitoring number of the network equipment has been ensured According to safety.
Detailed description of the invention
Fig. 1 is the applied environment figure of the method for network equipment monitoring data encryption in one embodiment;
Fig. 2 is the schematic flow chart for the method that the network equipment monitoring data of an embodiment encrypts;
Fig. 3 is that the network equipment of an embodiment establishes the schematic flow chart of binding relationship with client;
Fig. 4 is that the client of an embodiment obtains the schematic flow chart of decruption key;
Fig. 5 is the schematic flow chart of another embodiment encrypted to the monitoring data;
Fig. 6 is the schematic flow chart of the decryption method of the monitoring data of an embodiment;
Fig. 7 is the schematic flow chart that monitoring data is decrypted of an embodiment;
Fig. 8 is the schematic flow chart of the encryption of network equipment monitoring data and decryption under a scene;
Fig. 9 is the schematic flow chart of the encryption of network equipment monitoring data and decryption under another scene;
Figure 10 is the schematic diagram for the device that the network equipment monitoring data of an embodiment encrypts;
Figure 11 is the schematic diagram of the decryption device of the network equipment monitoring data of an embodiment;
Figure 12 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
Referenced herein " embodiment " is it is meant that a particular feature, structure, or characteristic described can wrap in conjunction with the embodiments It is contained at least one embodiment of the application.Each position in the description occur the phrase might not each mean it is identical Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art explicitly and Implicitly understand, embodiment described herein can be combined with other embodiments.
The method of network equipment monitoring data encryption provided by the present application, is suitable for hardware environment shown in fig. 1, including move Dynamic terminal 100, cloud server 200 and the network equipment 300.Wherein, the network equipment 300 has network connecting function, can Its monitoring data is uploaded to cloud server 200 to store, wherein monitoring data includes video data, voice data etc.;It is mobile Terminal 100 also has network connecting function, and according to there is the corresponding client of the network equipment 300 in mobile terminal 100, user can The real time data and/or historical data of the network equipment 300 bound by the client from the acquisition of cloud server 200 are simultaneously opened up Show;In addition, the client can also be obtained by local area network when mobile terminal 100 and the network equipment 300 are in same local area network The real time data of the network equipment 300 and displaying.
In embodiments of the present invention, cloud server 200 can be a server, include multiple in this server The service of different function, such as may include first service (i.e. equipment management service), second service (i.e. encryption key distribution service) And storage service;Cloud server 200 can also be the server cluster or cloud computing center being made of multiple servers, example It such as may include first server (i.e. device management server), second server (i.e. key distribution servers) and storage clothes Business device;Wherein, equipment management service/device management server is used to be the binding for establishing the network equipment 300 Yu client user Relationship, encryption key distribution service/key distribution servers be used for for the network equipment 300 and client user distribution encrypt accordingly it is close Key and decruption key;Storage service/storage server can be used for the monitoring data of storage networking device 300, logical convenient for user Cross the historical data playback that client realizes the network equipment 300.
In the embodiment of the present invention, the network equipment 300 can use cloud server 200 before transmitting its monitoring data The encryption key of distribution encrypts monitoring data, then transmits encrypted monitoring data to client or cloud service Device 200;The prison for the network equipment 300 that the monitoring data for the network equipment 300 that client is got, cloud server 200 store Data are controlled, are by the monitoring data of 300 encryption of the network equipment, client can be distributed using cloud server 200 Decruption key monitoring data is decrypted, exoergic is checked.
According to an embodiment of the present invention, the network equipment 300 is the video camera that can be networked, and mobile terminal 100 can be hand Machine is equipped with corresponding APP (i.e. above-mentioned client) in mobile phone, and user can watch the video camera bound by the APP Real-time monitoring data, or the operation such as history playback is carried out to the monitoring data of the video camera bound;User logs in the APP Later, which just represents user identity.The APP also its log in the APP in user with two-dimensional code scanning and identification function Later, can be by the two dimensional code of APP smear camera, and then establish the binding that the current login user of APP retouches video camera with this Relationship.In the embodiment of the present invention, it is only bundled with the APP user of video camera, just has permission the monitoring data progress to video camera Viewing or playback operation etc. in real time.
Optionally, above-mentioned network is usually internet but it is also possible to be other networks, including but not limited to local area network (Local Area Network, LAN), Metropolitan Area Network (MAN) (Metropolitan Area Network, MAN), wide area network (Wide Area Network, WAN), the combination of one or more of dedicated network or Virtual Private Network.
In one embodiment, as shown in Fig. 2, a kind of method of network equipment monitoring data encryption is provided, with the party Method is applied to be illustrated for the network equipment end in Fig. 1, comprising the following steps:
S110 obtains the monitoring data of the network equipment.
S120 obtains the encryption key of server distribution;The personal code work and institute of the encryption key and target user State the device identification association of the network equipment;The target user is the client that binding relationship is established with the network equipment User;The personal code work is corresponding with the user identifier that the target user logs in the client.
In the embodiment of the present invention, the server be for distribute respectively for the network equipment and client user encrypt it is close The service of key and decruption key or server, encryption key distribution service/key distribution servers as escribed above.Wherein, it services Device is the network equipment and client user distributes encryption key respectively and the specific implementation of decruption key will hereinafter It illustrates.
In the embodiment of the present invention, client is mounted in the application program in the mobile terminals such as mobile phone, plate, such as APP, Different user can register corresponding account, and it is different that different user logs in the user identifier that client uses;Different user It is also different to identify corresponding personal code work.According to an embodiment of the present invention, corresponding personal code work is obtained based on user identifier Mode may include: according to user identifier generate setting length character string, such as by user identifier generate 64 words Symbol string, as the corresponding personal code work of user identifier.In the following description, personal code work also is indicated with UserKey.
In the embodiment of the present invention, client user and the network equipment are established after binding relationship, could pass through login visitor The monitoring data of the network equipment is watched at family end.One client user can establish binding relationship with multiple network equipments, and one A network equipment can also establish binding relationship with multiple client user;The server can be according to user and the network equipment Binding relationship, be that the login user of the network equipment and client distributes corresponding key, so that different user binding is the same as a When the network equipment, the network equipment is different for the corresponding encryption key used of different user, and different user is to the network equipment The data decryption key used when monitoring data is decrypted is also different;Also, the same user binds multiple and different networks and sets When standby, the encryption key that heterogeneous networks equipment is used for the user is different, which is directed to the solution that heterogeneous networks equipment uses Key is also different.Wherein, the specific implementation that the network equipment and client establish binding relationship will hereinafter specifically It is bright.
S130 encrypts the monitoring data using the encryption key.
Encryption method through the foregoing embodiment can be using a kind of preferred after the network equipment gets monitoring data Encryption key monitoring data is encrypted, the personal code work and equipment of itself of the encryption key and target user mark are closed Connection, thus bring technical effect includes: for different users, and the network equipment can be supervised using different encryption keys The encryption of data is controlled, and then after the monitoring data that receives of different user, will be unable to be solved according to the same decruption key It is close, the safety of the monitoring data of the network equipment has thus been ensured from data sending terminal.
An embodiment according to the present invention, as shown in connection with fig. 3, the network equipment establish the specific implementation of binding relationship with client Mode and server are the specific implementation side that the network equipment and client user distribute encryption key and decruption key respectively Formula, comprising the following steps:
S1, client obtain the device identification of the network equipment and the user identifier of login user;
According to an embodiment of the present invention, the mode that client obtains the device identification of the network equipment includes: that client is swept The two dimensional code on the network equipment is retouched, the device identification of the network equipment is obtained by the two dimensional code.Wherein, the two dimensional code can pass through The display screen of equipment is shown, is either printed or is attached on the shell of the network equipment.
S2, client carry the use in the apparatus bound request to first server sending device bind request Family mark and the device identification.
S3, the first server are requested to obtain the user identifier and the device identification by the apparatus bound, raw At personal code work corresponding with the user identifier, the personal code work is sent to the corresponding network of the device identification and is set It is standby.
S4 after the network equipment receives the personal code work, sends encryption key requests to second server;Institute State the device identification that the personal code work and the network equipment are carried in encryption key requests.
S5 after the second server receives the encryption key requests, is generated and the personal code work and institute The associated encryption key of device identification is stated, the Xiang Suoshu network equipment sends the encryption key.
In the embodiment of the present invention, first server, second server can be two independent servers, be also possible to belong to Two service processes in same server.
An embodiment according to the present invention, the network equipment are the video camera that can be networked, and the user identifier is User ID, described Device identification can be unique factory number of video camera;The personal code work can according to user identifier generate setting it is long The character string of degree, such as 64 character strings generated by user identifier.In the following description, UserKey table is also used Show personal code work.
S6, after receiving the encryption key that second server issues, Xiang Suoshu second server is sent the network equipment The successful response message of key reception;
S7, after the second server receives the response message, Xiang Suoshu client sending device binding success Message;
S8 after the client receives the successful message of apparatus bound, the network equipment is added to have bound sets It is standby, for example, the network equipment is added in bound device list.
So far, user sets up the binding relationship of user and the network equipment by the client installed in mobile terminal, this After user logs in client afterwards, the network equipment bound can be checked, and watch the real-time monitoring data of the network equipment And/or history monitoring data.But the real-time monitoring data and/or history prison that client checks the network equipment are logged in user Before controlling data, also need to obtain the corresponding decruption key of the network equipment, which is used for the real-time of the network equipment Monitoring data and/or history monitoring data are decrypted.
Further, according to an embodiment of the present invention, refering to what is shown in Fig. 4, what the acquisition of client login user had been bound The process of the decruption key of the network equipment includes:
1, user logs in APP (i.e. client), obtains the user identifier of currently logged on user;
2, the network equipment that selection active user has bound, as target device;
3, APP sends decryption key request to second server;Carry currently logged on user's in the decryption key request The device identification of user identifier and the target device.
4, second server obtains user corresponding with the user identifier after receiving decryption key request first Code;Then the associated decruption key of device identification with the personal code work and the target device is obtained, is sent to APP;
5, APP saves decruption key, is decrypted for the subsequent monitoring data to the target device.
An embodiment according to the present invention, the network equipment are the video camera that can be networked, and device identification can be for video camera only One factory number;User identifier can be the id information that user logs in client, and personal code work can be the setting length of generation Character string, such as by user identifier generate 64 character strings.
For the monitoring data of the network equipment, traditional Encryption Algorithm is usually monitoring data as straight binary number According to being encrypted using Encryption Algorithm such as DES, AES of standard, usual operand is larger, is unable to satisfy the monitoring of the network equipment The requirement of real-time property transmission.
An embodiment according to the present invention, refering to what is shown in Fig. 5, the network equipment is using the encryption key to the monitoring data The specific implementation encrypted can include:
The monitoring data is decomposed into video data and non-video data by S501;
S502 obtains the partial data in the video data, as be-encrypted data;
S503 encrypts the be-encrypted data using the encryption key;
S504, the data that encryption is obtained, other data in the video data other than be-encrypted data and described Non-video data combination, obtains encrypted monitoring data.
According to an embodiment of the present invention, the monitoring data encryption of the network equipment, is the key that in monitoring data Data encryption, the encryption of not all data.Such as: be-encrypted data can be the I frame data for belonging to video data;This Outside, the data length that can set the be-encrypted data is less than or equal to 2048 bytes, specifically for example:
(if NALU length-starting code lengths -1 of I frame data) >=2048 bytes, the data of the be-encrypted data Length is 2048 bytes;
If (NALU length-starting code lengths -1 of I frame data) < 2048 bytes, the data of the be-encrypted data are long Degree=(NALU length-starting code length -1)-(NALU length-starting code length -1) %16.
According to H.264 and H.265 agreement provides that H.264 and H.265 video stream format master data unit is NAL unit, Namely NALU.In order to extract NALU from byte stream, agreement regulation adds initial code before each NALU: 0x000001 or 0x00000001 (0x represents hexadecimal), i.e., H.264 or H.265 video stream format is as follows:
H.264 or H.265 bit stream=initial code+NALU+ initial code+NALU+ ...
Video flowing is exported in the form of NALU, and each NALU is in addition to initial code by the NALU of a byte Header and RBSP composition.Wherein:
RBSP: initial data byte stream (also known as payload data), the partial data belong to the embodiment of the present invention and need to encrypt Data.
NALU Header: some attribute informations for describing NAL unit.Wherein NAL unit type attribute (is hereafter used NALU_UNIT_TYPE is indicated), for describing NAL unit payload data (RBSP) type definition, different NALU_UNIT_TYPE Value represent different meanings unit payload data segment, for example, representing RBSP is IDR as NALU_UNIT_TYPE=5 The segment (also known as I frame) of image.
According to above-described embodiment, encrypted data are the H.264 or H.265 part numbers in each I frame of video flowing According to can both protect key video sequence data, can also reduce encryption/decryption processes to the expense of equipment;When encryption, non-I frame is skipped NALU (i.e. NALU data of the NALU_UNIT_TYPE not equal to 5 in NALU Header), for the NALU for belonging to I frame, removes Beginning code and the subsequent 2KB data of NALU Header are encrypted (the 2K data i.e. in RBSP data), if NALU curtailment 2KB, encrypted data length are 16 times of downward rounding values of length after removing initial code and NALU Header.Such as:
(if NALU length-initial code -1) >=2048 bytes;Encrypted data length=2048;
(if NALU length-initial code -1) < 2048 bytes;
Encrypted data length=(NALU length-initial code -1)-(NALU length-initial code -1) %16;
It originates code length: be H.264 4, H265 being 6, H.265 two more than H264 byte is mark H.265.
It through the foregoing embodiment, before monitoring data transmission to network is encrypted by the network equipment, encryption is calculated Method can use the close SM4 of state, and encryption key is stored in advance in the encryption key in video camera.Client decryption uses corresponding SM4 algorithm and the decruption key for being stored in advance in client, by Video Decoder to after decryption frame and other frames fold Adduction rendering plays.Due to only carrying out encryption/decryption process to the data for being no more than 2048 bytes in I frame data, it ensure that and add The efficiency of close/decryption, ensure that the efficiency of transmission of monitoring data.
Further, according to an embodiment of the present invention, the network equipment is in the use encryption key to described to be encrypted After data are encrypted, the NALU_UNIT_TYPE of the I frame data in the video data is revised as reserved field type; Such as the NALU_UNIT_TYPE in I frame data is revised as 3 (NALU_UNIT_TYPE&0x1F=of reserved field Class1 13);Encrypted data are identified after obtaining data so as to client, and then are decrypted.
Through the foregoing embodiment, based on a small amount of encryption key data in monitoring data, the data file for encrypting front and back becomes Change and only increase by tens bytes, is consistent size substantially, does not increase network transmission pressure, ensure that the monitoring number of the network equipment According to encryption/decryption efficiency, advantageously ensure that the efficiency of the monitoring data transmission of the network equipment.
Further, after the critical data in monitoring data is encrypted in the network equipment, by encrypted prison Control data are sent to corresponding client and/or storage server;Here storage server is set for storing the network Standby monitoring data.When there is the real-time monitoring data of the client request viewing network equipment, can directly be asked to the network equipment Seek the real-time monitoring data by encryption;When there are the history playback data of the client request viewing network equipment, can pass through Access storage server obtains the monitoring data by encryption in setting historical time section of the network equipment.
Method through the foregoing embodiment encrypts the monitoring data of the network equipment, can take into account following two points: one It is that different user use is with a network equipment, and the data encryption key that the network equipment is used for different user is different, no The data decryption key used with user is also different;Second is that the same user uses heterogeneous networks equipment, heterogeneous networks equipment The data encryption key of use is different, and the data decryption key that user uses for heterogeneous networks equipment is also different.As a result, Guarantee the safety of the monitoring data of the network equipment to greatest extent.
In one embodiment, as shown in fig. 6, a kind of decryption method of network equipment monitoring data is provided, with the party Method is applied to be illustrated for the mobile terminal in above system environment, and the executing subject of following steps can be mobile whole The client (APP) installed in end.The decryption method of network equipment monitoring data the following steps are included:
S601 receives the monitoring data of the network equipment;It is established between the network equipment and the login user of client Binding relationship;
S602 obtains the decruption key of server distribution, the use of the decruption key and the login user of the client The device identification of family code and the network equipment is associated with;The user of the personal code work and the login user of the client Mark corresponds to;
S603 is decrypted the monitoring data using the decruption key.
According to an embodiment of the present invention, the implementation that client receives the monitoring data of the network equipment can wrap It includes:
Client receives the monitoring data from the network equipment;Alternatively, client is received from storage server The monitoring data of the network equipment, the storage server are used to store the monitoring data of the network equipment.
According to an embodiment of the present invention, it before client receives the step of monitoring data of the network equipment, also wraps Include: client sends the first request of data to the network equipment;Alternatively, client sends the second number to the storage server According to request;User's mark of the login user of the client is carried in first request of data, the second request of data Know.
According to an embodiment of the present invention, first request of data is real time data request;Second request of data For data readback request.Implement scene is for example:
If client receives the trigger event of the real-time monitoring data for watching the network equipment, to the net Network equipment sends the first request of data;If client receives the triggering thing of the playback of data for watching the network equipment Part then sends the second request of data to the storage server.
According to an embodiment of the present invention, shown in Figure 7, client is using the decruption key to the monitoring data The embodiment being decrypted specifically includes:
The monitoring data is decomposed into video data and non-video data by S701;
S702 obtains the encryption data in the video data, as data to be decrypted;
S703 is decrypted the data to be decrypted using the decruption key;
S704, the data that decryption is obtained, the data in the video data other than encryption data and the non-video Data combination, the monitoring data after being decrypted.
According to an embodiment of the present invention, the data to be decrypted are corresponding with the be-encrypted data of above-described embodiment, that is, belong to I frame data in the video data, for details, reference can be made to described in above-described embodiment.
Below by taking the video camera that can be networked as an example, the network equipment monitoring data of above-described embodiment is encrypted and decrypted Method is further illustrated by.
Refering to what is shown in Fig. 8, after user logs in client, if the real-time monitoring data of selection viewing video camera, video camera Monitoring data encryption and decrypting process it is as follows:
1, user A logs in client, and video camera 001 is selected from bound device;
2, it is directed to video camera 001, user triggers the operation of real time data viewing;Client is sent in real time to video camera 001 Monitoring data request;It include the personal code work of user A in real-time monitoring data request, the personal code work can pass through user The user identifier of A generates;
3, video camera 001 generates real-time monitoring data;And it is identified according to the personal code work of user A and equipment of itself, selection Suitable encryption key;Real-time monitoring data is encrypted using the encryption key.
In one embodiment, real-time monitoring data is encrypted using SM4 algorithm, in order to further increase encryption Efficiency and data transmission efficiency are added using I frame of the SM4 algorithm to video data in real-time monitoring data in some embodiments It is close.SM4 algorithm and aes algorithm key length all having the same, are higher than DES algorithm in safety, and SM4 algorithm was calculating Increase nonlinear transformation in journey, the safety of its algorithm can be improved.
4, encrypted real-time monitoring data is transferred to client by video camera 001.
5, client selects suitable decruption key according to the device identification of the personal code work and video camera 001 of user A, The real-time monitoring data received is decrypted, the monitor video after playing decryption.
In one embodiment, client carries out data deciphering, the number that decrypting process and camera shooting generator terminal carry out using SM4 algorithm Corresponding according to ciphering process, the monitoring data after finally output decryption is played out to player.
Refering to what is shown in Fig. 9, in the case where the history monitoring data of client user B viewing video camera 002, video camera The encryption of monitoring data and decrypting process are as follows:
1, the monitoring data generated in 002 side of video camera, video camera 002;According to user's generation of the user B of current bindings Code and equipment of itself mark, select suitable encryption key;Monitoring data is encrypted using the encryption key.
2, video camera 002 gives encrypted monitoring data transmission to the storage server.
3, storage server receives the monitoring data by encryption and preservation that video camera 002 is sent.
4, user B logs in client, and video camera 002 is selected from bound device;
5, it is directed to video camera 002, user triggers the operation of history monitoring data viewing;Client is sent to storage server Historical data request;It include the device identification of the personal code work and video camera 002 of user B in monitoring data request, it is described Personal code work can be generated by the user identifier of user B;
6, when storage server receives the historical data request of client, from the monitoring data of preservation, acquisition is taken the photograph History monitoring data of the camera 002 in the corresponding period, and it is sent to client.
7, client selects suitable solution according to the device identification of the personal code work and video camera 002 of currently logged on user B The history monitoring data of the video camera 002 received is decrypted in key, and is regarded by the monitoring after client terminal playing decryption Frequently.
An embodiment according to the present invention, video camera is in being encrypted monitoring data, only to video counts therein According to being encrypted, PostScript format text is encapsulated into other data packings such as audio datas after video data encryption Part is sent to client or storage server.Therefore, the monitoring data of storage server storage is PostScript format text Part.When client checks history monitoring data, PostScript formatted file is pulled from storage server;It is view by file declustering Frequency evidence and other data (i.e. non-video data), other data include audio data etc.;Use SM4 algorithm and corresponding solution Obtained video data is decrypted in key, then by after decryption video data and non-video data be overlapped, obtain Monitoring data after to decryption;Monitoring data after being decrypted by the client terminal playing.
It should be understood that for the various method embodiments described above, although each step in flow chart is according to arrow Instruction is successively shown, but these steps are not that the inevitable sequence according to arrow instruction successively executes.Unless having herein bright True explanation, there is no stringent sequences to limit for the execution of these steps, these steps can execute in other order.And And at least part step in the flow chart of embodiment of the method may include multiple sub-steps or multiple stages, this is a little Step or stage are not necessarily to execute completion in synchronization, but can execute at different times, these sub-steps Perhaps the execution sequence in stage be also not necessarily successively carry out but can with the sub-step of other steps or other steps or At least part in person's stage executes in turn or alternately.
Based on thought identical with the method for network equipment monitoring data encryption in above-described embodiment, it is also provided herein one The embodiment of the device of kind network equipment monitoring data encryption.As shown in Figure 10, the network equipment monitoring data of the present embodiment adds Close device includes:
Data acquisition module 601, for obtaining the monitoring data of the network equipment;
Encryption key obtains module 602, for obtaining the encryption key of server distribution;The encryption key and target are used The device identification of the personal code work at family and the network equipment is associated with;The target user is to establish with the network equipment The user of the client of binding relationship;The personal code work and the target user log in the user identifier pair of the client It answers;
Data encryption module 603, for being encrypted using the encryption key to the monitoring data.
Based on thought identical with the decryption method of network equipment monitoring data in above-described embodiment, it is also provided herein one The embodiment of the decryption device of kind network equipment monitoring data.As shown in figure 11, the network equipment monitoring data of the present embodiment Decrypting device includes:
Data reception module 701, for receiving the monitoring data of the network equipment;The login of the network equipment and client Binding relationship is established between user;
Decruption key obtains module 702, for obtaining the decruption key of server distribution, the decruption key and the visitor The device identification of the personal code work of the login user at family end and the network equipment is associated with;The personal code work and the client The user identifier of the login user at end is corresponding;
Data decryption module 703, for the monitoring data to be decrypted using the decruption key.
About network equipment monitoring data encryption/decryption device, may refer to monitor number above for the network equipment According to the restriction of encrypting/decrypting method, details are not described herein.It is each in the device of above-mentioned network equipment monitoring data encryption/decryption A module can be realized fully or partially through software, hardware and combinations thereof.Above-mentioned each module can be embedded in the form of hardware or Independently of in the processor in computer equipment, can also be stored in a software form in the memory in computer equipment, with It is called convenient for processor and executes the corresponding operation of the above modules.
In addition, in the embodiment of network equipment monitoring data encryption/decryption device of above-mentioned example, each program module Logical partitioning be merely illustrative of, can according to need in practical application, for example, for corresponding hardware configuration requirement or The convenient of the realization of software considers, above-mentioned function distribution is completed by different program modules, i.e., is monitored the network equipment The internal structure of the device of data encryption/decryption is divided into different program modules, to complete whole described above or portion Divide function.
In one embodiment, a kind of computer equipment is provided, which can be mobile terminal or net Network equipment, internal structure chart are shown in Fig.12.The computer equipment includes the processor connected by system bus, deposits Reservoir, network interface and database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The calculating The memory of machine equipment includes non-volatile memory medium, built-in storage.The non-volatile memory medium be stored with operating system, Computer program and database.The built-in storage is the operation of the operating system and computer program in non-volatile memory medium Environment is provided.Device or network equipment prison of the database of the computer equipment for the encryption of storage networking device monitoring data Control the related data of the decryption device of data.The network interface of the computer equipment is used to pass through network connection with external terminal Communication.To realize a kind of method that network equipment monitoring data encrypts or a kind of net when the computer program is executed by processor The decryption method of network monitoring of tools data.
It will be understood by those skilled in the art that structure shown in Figure 12, only part relevant to application scheme The block diagram of structure, does not constitute the restriction for the computer equipment being applied thereon to application scheme, and specific computer is set Standby may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment, including memory and processor are provided, is stored in memory Computer program, the processor perform the steps of when executing computer program
Obtain the monitoring data of the network equipment;Obtain the encryption key of server distribution;The encryption key and target are used The device identification of the personal code work at family and the network equipment is associated with;The target user is to establish with the network equipment The user of the client of binding relationship;The personal code work and the target user log in the user identifier pair of the client It answers;The monitoring data is encrypted using the encryption key.
In one embodiment, also realize that network is set in above-mentioned other embodiments when the processor executes computer program The step of method of standby monitoring data encryption includes.
In one embodiment, a kind of computer equipment, including memory and processor are provided, is stored in memory Computer program, the processor perform the steps of when executing computer program
Receive the monitoring data of the network equipment;Binding is established between the network equipment and the login user of client to close System;Obtain the decruption key of server distribution, the personal code work of the login user of the decruption key and the client and The device identification of the network equipment is associated with;The personal code work is corresponding with the user identifier of the login user of the client; The monitoring data is decrypted using the decruption key.
In one embodiment, also realize that network is set in above-mentioned other embodiments when the processor executes computer program The step of decryption method of standby monitoring data includes.
Another embodiment provides a kind of computer readable storage mediums, are stored thereon with computer program, meter Calculation machine program performs the steps of when being executed by processor
Obtain the monitoring data of the network equipment;Obtain the encryption key of server distribution;The encryption key and target are used The device identification of the personal code work at family and the network equipment is associated with;The target user is to establish with the network equipment The user of the client of binding relationship;The personal code work and the target user log in the user identifier pair of the client It answers;The monitoring data is encrypted using the encryption key.
Another embodiment provides a kind of computer readable storage mediums, are stored thereon with computer program, meter Calculation machine program performs the steps of when being executed by processor
Receive the monitoring data of the network equipment;Binding is established between the network equipment and the login user of client to close System;Obtain the decruption key of server distribution, the personal code work of the login user of the decruption key and the client and The device identification of the network equipment is associated with;The personal code work is corresponding with the user identifier of the login user of the client; The monitoring data is decrypted using the decruption key.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, To any reference of memory, storage, database or other media used in each embodiment provided herein, Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance Shield all should be considered as described in this specification.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment Point, it may refer to the associated description of other embodiments.
The term " includes " of embodiment hereof and " having " and their any deformations, it is intended that cover non-exclusive packet Contain.Such as contain series of steps or the process, method, system, product or equipment of (module) unit are not limited to arrange Out the step of or unit, but optionally further comprising the step of not listing or unit, or optionally further comprising for these mistakes The intrinsic other step or units of journey, method, product or equipment.
Referenced herein " multiple " refer to two or more."and/or", the association for describing affiliated partner are closed System indicates may exist three kinds of relationships, for example, A and/or B, can indicate: individualism A exists simultaneously A and B, individualism These three situations of B.Character "/" typicallys represent the relationship that forward-backward correlation object is a kind of "or".
Referenced herein " first second " be only be the similar object of difference, do not represent for the specific of object Sequence, it is possible to understand that specific sequence or precedence can be interchanged in ground, " first second " in the case where permission.It should manage The object that solution " first second " is distinguished is interchangeable under appropriate circumstances so that the embodiments described herein can in addition to Here the sequence other than those of diagram or description is implemented.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.

Claims (10)

1. a kind of method of network equipment monitoring data decryption characterized by comprising
Receive the monitoring data of the network equipment;Binding relationship is established between the network equipment and the login user of client;
Obtain the decruption key of server distribution, the personal code work of the login user of the decruption key and the client and The device identification of the network equipment is associated with;The personal code work is corresponding with the user identifier of the login user of the client;
The monitoring data is decrypted using the decruption key.
2. the method according to claim 1, wherein the step of monitoring data for receiving the network equipment Include:
Receive the monitoring data from the network equipment;
Alternatively, receiving the monitoring data of the network equipment from storage server, the storage server is for storing institute State the monitoring data of the network equipment.
3. according to the method described in claim 2, it is characterized in that, the step of the monitoring data for receiving the network equipment Before, further includes:
The first request of data is sent to the network equipment;
Alternatively, sending the second request of data to the storage server;
The user identifier of the login user of the client is carried in first request of data, the second request of data.
4. according to the method described in claim 3, it is characterized in that,
First request of data is real time data request;
Second request of data is data readback request.
5. according to the method described in claim 4, it is characterized by further comprising:
If receiving the trigger event of the real-time monitoring data for watching the network equipment, the Xiang Suoshu network equipment sends the One request of data;
If receiving the trigger event of the playback of data for watching the network equipment, Xiang Suoshu storage server sends second Request of data.
6. the method according to claim 1, wherein it is described using the decruption key to the monitoring data into The step of row decryption, comprising:
The monitoring data is decomposed into video data and non-video data;
The encryption data in the video data is obtained, as data to be decrypted;
The data to be decrypted are decrypted using the decruption key;
Data, the data in the video data other than encryption data and the non-video data combination that decryption is obtained, Monitoring data after being decrypted.
7. according to the method described in claim 6, it is characterized in that, the data to be decrypted belong to the I in the video data Frame data, and:
(if NALU length-starting code lengths -1 of I frame data) >=2048 bytes, the data length of the data to be decrypted For 2048 bytes;
If (NALU length-starting code lengths -1 of I frame data) < 2048 bytes, the data lengths of the data to be decrypted= (NALU length-starting code length -1)-(NALU length-starting code length -1) %16.
8. a kind of device of network equipment monitoring data decryption characterized by comprising
Data reception module, for receiving the monitoring data of the network equipment;The network equipment and the login user of client it Between establish binding relationship;
Decruption key obtains module, for obtaining the decruption key of server distribution, the decruption key and the client The device identification of the personal code work of login user and the network equipment is associated with;The personal code work is stepped on the client The user identifier for employing family is corresponding;
Data decryption module, for the monitoring data to be decrypted using the decruption key.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists In, the processor realizes claim 1 to 7 any the method when executing described program the step of.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor The step of claim 1 to 7 any the method is realized when execution.
CN201811558736.5A 2018-12-19 2018-12-19 Method and device for decrypting monitoring data, computer equipment and storage medium Active CN109495258B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811558736.5A CN109495258B (en) 2018-12-19 2018-12-19 Method and device for decrypting monitoring data, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811558736.5A CN109495258B (en) 2018-12-19 2018-12-19 Method and device for decrypting monitoring data, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109495258A true CN109495258A (en) 2019-03-19
CN109495258B CN109495258B (en) 2022-05-13

Family

ID=65710887

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811558736.5A Active CN109495258B (en) 2018-12-19 2018-12-19 Method and device for decrypting monitoring data, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109495258B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111159658A (en) * 2019-12-16 2020-05-15 广州三七互娱科技有限公司 Byte code processing method, system, device, computer equipment and storage medium
CN111953656A (en) * 2020-07-09 2020-11-17 视联动力信息技术股份有限公司 Monitoring video encryption transmission method, device, equipment and medium
CN113992427A (en) * 2020-12-23 2022-01-28 技象科技(浙江)有限公司 Data encryption sending method and device based on adjacent nodes
CN114154526A (en) * 2021-12-02 2022-03-08 京东科技信息技术有限公司 Two-dimensional code processing method and system, storage medium and electronic equipment
CN114902635A (en) * 2022-03-30 2022-08-12 北京小米移动软件有限公司 Flow proxy method and device, electronic equipment and storage medium
CN115280725A (en) * 2022-03-30 2022-11-01 北京小米移动软件有限公司 Data frame secure transmission method and device, electronic equipment and storage medium
CN115280743A (en) * 2022-03-30 2022-11-01 北京小米移动软件有限公司 Method and device for establishing User Datagram Protocol (UDP) transmission channel

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101437225A (en) * 2007-03-30 2009-05-20 特克特朗尼克公司 System and method for ciphering key forwarding and RRC packet deciphering in a UMTS monitoring system
CN103329162A (en) * 2010-12-20 2013-09-25 尼尔森(美国)有限公司 Methods and apparatus to determine media impressions using distributed demographic information
US20140096165A1 (en) * 2012-09-28 2014-04-03 Marvell World Trade Ltd. Enhanced user experience for miracast devices
CN103731679A (en) * 2013-12-30 2014-04-16 世纪龙信息网络有限责任公司 Mobile video display system and achieving method thereof
CN104093149A (en) * 2014-07-14 2014-10-08 浙江宇视科技有限公司 Wireless access method and device for monitoring equipment
CN104270614A (en) * 2014-10-16 2015-01-07 浙江宇视科技有限公司 Video encryption and decryption method and device
CN104869568A (en) * 2014-02-26 2015-08-26 中国科学院软件研究所 Audio-based monitoring system configuration method and system
CN105100708A (en) * 2015-06-26 2015-11-25 小米科技有限责任公司 Request processing method and device
CN105378749A (en) * 2013-05-20 2016-03-02 微软技术许可有限责任公司 Data protection for organizations on computing devices
CN105493116A (en) * 2013-05-15 2016-04-13 维萨国际服务协会 Methods and systems for provisioning payment credentials
CN106059757A (en) * 2016-07-07 2016-10-26 北京信长城技术研究院 Audio and video monitoring device, data encryption and decryption method, and audio and video display device
US20160352798A1 (en) * 2015-05-27 2016-12-01 USS Technologies, LLC Systems and methods for capture and streaming of video
US20170064408A1 (en) * 2015-06-08 2017-03-02 Teleste Oyj Method and system for providing access to a video content
CN106919850A (en) * 2015-12-25 2017-07-04 腾讯科技(深圳)有限公司 A kind of file encryption, decryption method and device
CN107911715A (en) * 2017-11-22 2018-04-13 中山大学 A Compatible Encryption Method for H.264/AVC Video Format Based on CAVLC Code
CN108667811A (en) * 2018-04-18 2018-10-16 成都零光量子科技有限公司 A kind of method and monitoring device of autonomous structure electronic evidence

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101437225A (en) * 2007-03-30 2009-05-20 特克特朗尼克公司 System and method for ciphering key forwarding and RRC packet deciphering in a UMTS monitoring system
CN103329162A (en) * 2010-12-20 2013-09-25 尼尔森(美国)有限公司 Methods and apparatus to determine media impressions using distributed demographic information
US20180248773A1 (en) * 2010-12-20 2018-08-30 The Nielsen Company (Us), Llc Methods and apparatus to determine media impressions using distributed demographic information
US20140096165A1 (en) * 2012-09-28 2014-04-03 Marvell World Trade Ltd. Enhanced user experience for miracast devices
CN105493116A (en) * 2013-05-15 2016-04-13 维萨国际服务协会 Methods and systems for provisioning payment credentials
CN105378749A (en) * 2013-05-20 2016-03-02 微软技术许可有限责任公司 Data protection for organizations on computing devices
CN103731679A (en) * 2013-12-30 2014-04-16 世纪龙信息网络有限责任公司 Mobile video display system and achieving method thereof
CN104869568A (en) * 2014-02-26 2015-08-26 中国科学院软件研究所 Audio-based monitoring system configuration method and system
CN104093149A (en) * 2014-07-14 2014-10-08 浙江宇视科技有限公司 Wireless access method and device for monitoring equipment
CN104270614A (en) * 2014-10-16 2015-01-07 浙江宇视科技有限公司 Video encryption and decryption method and device
US20160352798A1 (en) * 2015-05-27 2016-12-01 USS Technologies, LLC Systems and methods for capture and streaming of video
US20170064408A1 (en) * 2015-06-08 2017-03-02 Teleste Oyj Method and system for providing access to a video content
CN105100708A (en) * 2015-06-26 2015-11-25 小米科技有限责任公司 Request processing method and device
CN106919850A (en) * 2015-12-25 2017-07-04 腾讯科技(深圳)有限公司 A kind of file encryption, decryption method and device
CN106059757A (en) * 2016-07-07 2016-10-26 北京信长城技术研究院 Audio and video monitoring device, data encryption and decryption method, and audio and video display device
CN107911715A (en) * 2017-11-22 2018-04-13 中山大学 A Compatible Encryption Method for H.264/AVC Video Format Based on CAVLC Code
CN108667811A (en) * 2018-04-18 2018-10-16 成都零光量子科技有限公司 A kind of method and monitoring device of autonomous structure electronic evidence

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
谭伟杰等: "基于智能终端的发射台移动监控系统研究", 《广播与电视技术》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111159658A (en) * 2019-12-16 2020-05-15 广州三七互娱科技有限公司 Byte code processing method, system, device, computer equipment and storage medium
CN111159658B (en) * 2019-12-16 2022-04-01 广州三七互娱科技有限公司 Byte code processing method, system, device, computer equipment and storage medium
CN111953656A (en) * 2020-07-09 2020-11-17 视联动力信息技术股份有限公司 Monitoring video encryption transmission method, device, equipment and medium
CN111953656B (en) * 2020-07-09 2024-03-19 视联动力信息技术股份有限公司 Surveillance video encrypted transmission methods, devices, equipment and media
CN113992427A (en) * 2020-12-23 2022-01-28 技象科技(浙江)有限公司 Data encryption sending method and device based on adjacent nodes
CN113992427B (en) * 2020-12-23 2023-08-25 技象科技(南京)有限公司 Data encryption sending method and device based on adjacent nodes
CN114154526A (en) * 2021-12-02 2022-03-08 京东科技信息技术有限公司 Two-dimensional code processing method and system, storage medium and electronic equipment
CN114902635A (en) * 2022-03-30 2022-08-12 北京小米移动软件有限公司 Flow proxy method and device, electronic equipment and storage medium
CN115280725A (en) * 2022-03-30 2022-11-01 北京小米移动软件有限公司 Data frame secure transmission method and device, electronic equipment and storage medium
CN115280743A (en) * 2022-03-30 2022-11-01 北京小米移动软件有限公司 Method and device for establishing User Datagram Protocol (UDP) transmission channel

Also Published As

Publication number Publication date
CN109495258B (en) 2022-05-13

Similar Documents

Publication Publication Date Title
CN109639691A (en) Method, apparatus, computer equipment and the storage medium of monitoring data encryption
CN109495258A (en) Method and device for decrypting monitoring data, computer equipment and storage medium
KR100957121B1 (en) Key distribution method and certificate server
Yang et al. Multimedia recommendation and transmission system based on cloud platform
DE60018716T2 (en) INFORMATION PROTECTION IN A TRANSMISSION SYSTEM
CN110401818B (en) Safe communication system for power video transmission
CN111935080A (en) Data sharing method and device for block chain, computer equipment and storage medium
CN107277456A (en) A kind of video security monitoring system based on Android device
US20050100167A1 (en) System and method for using DRM to control conditional access to broadband digital content
CN107948736A (en) A kind of audio and video preservation of evidence method and system
US20080063195A1 (en) Method and system for encrypting or decrypting wmv streaming media
CN110912690A (en) Data encryption and decryption method, vehicle and storage medium
CN106470345A (en) Video-encryption transmission method and decryption method, apparatus and system
CN104519013B (en) Ensure the method, apparatus and system of media stream safety
CN112104454B (en) Data secure transmission method and system
CN102100031A (en) Apparatus and method for providing a security service in a user interface
CN110427762B (en) Encryption and decryption method for realizing video security transmission of power monitoring system
US10798067B2 (en) Recording encrypted media session
CN113727058A (en) Multimedia conference data processing method, system, equipment and storage medium
CN101150395A (en) A Four-layer Encryption Method for Encrypting Double Packets of Authorization Management System
CN112565922A (en) Advertisement monitoring method, advertisement monitoring device and computer readable storage medium
CN114286131A (en) Transmission method and device for anchor image model file in live broadcast wheat
CN115766002A (en) Method for realizing encryption and decryption of Ethernet data by adopting quantum key distribution and software definition
US20220150224A1 (en) Encryption using recursive key
CN109379190A (en) Method for distributing key, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20220128

Address after: Room 1423, No. 1256 and 1258, Wanrong Road, Jing'an District, Shanghai 200040

Applicant after: Tianyi Digital Life Technology Co.,Ltd.

Address before: 1 / F and 2 / F, East Garden, Huatian International Plaza, 211 Longkou Middle Road, Tianhe District, Guangzhou, Guangdong 510630

Applicant before: Century Dragon Information Network Co.,Ltd.

GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240314

Address after: Unit 1, Building 1, China Telecom Zhejiang Innovation Park, No. 8 Xiqin Street, Wuchang Street, Yuhang District, Hangzhou City, Zhejiang Province, 311100

Patentee after: Tianyi Shilian Technology Co.,Ltd.

Country or region after: China

Address before: Room 1423, No. 1256 and 1258, Wanrong Road, Jing'an District, Shanghai 200040

Patentee before: Tianyi Digital Life Technology Co.,Ltd.

Country or region before: China