CN108989034A - A kind of audio-video monitoring method, system, monitoring server and computer media - Google Patents
A kind of audio-video monitoring method, system, monitoring server and computer media Download PDFInfo
- Publication number
- CN108989034A CN108989034A CN201810878561.XA CN201810878561A CN108989034A CN 108989034 A CN108989034 A CN 108989034A CN 201810878561 A CN201810878561 A CN 201810878561A CN 108989034 A CN108989034 A CN 108989034A
- Authority
- CN
- China
- Prior art keywords
- target
- camera
- certificate
- client
- audio
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Closed-Circuit Television Systems (AREA)
- Alarm Systems (AREA)
Abstract
This application discloses a kind of audio-video monitoring method, system, server and computer medias, applied in monitoring server, wherein this method comprises: according to the respective CA certificate of camera and monitor client for logging on to itself, determine that the CA certificate of CA certificate and target monitoring client belongs to the camera at same family's ca authentication center, for the target camera of target monitoring client, so that target monitoring client obtains the audio, video data of target camera acquisition;Wherein, camera and the respective CA certificate of monitor client are the certificate that respectively affiliated family's ca authentication center is issued, and family's ca authentication center of each family is different.In a kind of audio-video monitoring method disclosed in the present application, ca authentication center is rested in family oneself hand, can improve safety to a certain extent.A kind of audio/video monitor and control system, server and computer readable storage medium disclosed in the present application also solve the problems, such as relevant art.
Description
Technical field
This application involves security video monitoring technology fields, more specifically to a kind of audio-video monitoring method, are
System, monitoring server and computer media.
Background technique
With the continuous development of IP Camera, home video monitoring system is more and more easily accepted by a user and uses,
User can receive the audio, video data of camera acquisition by monitor client, so as to according to audio, video data realization pair
The monitoring namely video monitoring method of home environment.In audio-video monitoring method, in order to guarantee the safety of home environment, need
Guarantee the safety of audio-video monitoring method.
A kind of method of existing safety for guaranteeing audio-video monitoring method is: monitoring server is according to the third-party institution
Or the operator CA certificate issued realizes the matching between camera and monitor client.
However, CA certificate is by third party's machine in a kind of method of existing safety for guaranteeing audio-video monitoring method
What structure or operator issued, and the third-party institution or operator can save encryption key pair under normal circumstances, this meeting is so that family
The safety of environment rests in the third-party institution or operator's hand, when attacker gets what the third-party institution or operator saved
Encryption key is to rear, and family can only passively be on the defensive, and the safety of home environment is lower.
In conclusion the safety for how improving existing audio-video monitoring method be current those skilled in the art urgently
It solves the problems, such as.
Summary of the invention
The purpose of the application is to provide a kind of audio-video monitoring method, can solve how to improve to a certain extent existing
Audio-video monitoring method safety the technical issues of.Present invention also provides a kind of audio/video monitor and control systems, monitoring service
Device and computer readable storage medium.
To achieve the goals above, the application provides the following technical solutions:
A kind of audio-video monitoring method is applied in monitoring server, comprising:
According to the respective CA certificate of camera and monitor client for logging on to itself, CA certificate and target monitoring visitor are determined
The CA certificate at family end belongs to the camera at same family's ca authentication center, is that the target of the target monitoring client images
Head, so that the target monitoring client obtains the audio, video data of the target camera acquisition;
Wherein, the camera and the respective CA certificate of the monitor client are respectively affiliated family's ca authentication center
The certificate issued, and family's ca authentication center of each family is different.
Preferably, the basis logs on to before the camera and the respective CA certificate of monitor client of itself, further includes:
It is that target object issues CA certificate by family's ca authentication center;The target object includes the camera shooting
Head, the monitor client;
Wherein, family's ca authentication center is that the target object issues the process of CA certificate and includes:
Receive the signing certificate request that the target object is sent;
Signing certificate is signed and issued, and is sent to the target object;
The target object is received to receive and the signing certificate is written to the first confirmation message sent behind;
Generate encryption key to and sign and issue encrypted certificate;
The encryption key pair and the encrypted certificate are sent to the target object;
Receive the target object import the encryption key to and the encrypted certificate is written to the sent behind
Two confirmation messages;
CA certificate is sent to the target object;
It receives the target object and the CA certificate is written to the third confirmation message sent behind.
Preferably, the basis logs on to before the camera and the respective CA certificate of monitor client of itself, further includes:
The logging request that target object is sent is received, the target object includes the camera or the monitoring client
End;
Challenge corresponding with the logging request is returned to the target object;
Receive that the target object sends to the identity documents generated after challenge signature;
Verify whether the identity documents are existing, if so, allowing the login of the target object.
Preferably, the basis logs on to before the camera and the respective CA certificate of monitor client of itself, further includes:
The authorization administration information that Administrator Client sends is received, the authorization administration information is for indicating the monitoring visitor
Family end allows the camera information for belonging to the same family connected;
According to the respective CA certificate of camera and monitor client for logging on to itself, CA certificate and target monitoring visitor are determined
The CA certificate at family end belongs to the camera at same family's ca authentication center, is that the target of the target monitoring client images
Head, comprising:
According to the respective CA certificate of camera and monitor client for logging on to itself, CA certificate and target monitoring visitor are determined
The CA certificate at family end belongs to same family's ca authentication center, and meets the camera of the authorization administration information, is described
The target camera of target monitoring client.
Preferably, the determining CA certificate and the CA certificate of target monitoring client belong to same family's ca authentication center
Camera, be the target monitoring client target camera after, further includes:
The information of the target camera is sent to the target monitoring client;
Connection request that the target monitoring client is sent is transmitted to the target camera;
The first ID authentication request and first key for transmitting the target camera transmission negotiate request to the target
Monitor client;
The second ID authentication request that the target monitoring client is sent and the second key negotiation request are transmitted to described
Target camera;
To the target camera and the target monitoring client by first ID authentication request and described the
The identity that two ID authentication requests verify other side is correct, and negotiates request and second key agreement by the first key
After arranging key is determined in request, forward the request of the acquisition audio, video data of the target monitoring client transmission to the mesh
Mark camera;
Judge whether to receive the original audio-video by the arranging key to acquisition that the target camera is sent
The encrypted audio/video data that data generate after being encrypted, if so, the encrypted audio/video data to the target is forwarded to supervise
Control client.
Preferably, the second ID authentication request and the second key agreement that the transmission target monitoring client is sent
After request to the target camera, the request for the acquisition audio, video data that the forwarding target monitoring client is sent
Before to the target camera, further includes:
The acquisition P2P that the target camera and the target monitoring client are sent is received to burrow the request of parameter;
It sends the P2P and burrows parameter to the target camera and the target monitoring client;
Judge whether to receive the notice using transfer mode that the target monitoring client is sent, if so, forwarding
The notice using transfer mode executes what the forwarding target monitoring client was sent to the target camera
The step of obtaining request to the target camera of audio, video data;If it is not, then directly executing the forwarding target prison
The step of controlling request to the target camera for the acquisition audio, video data that client is sent.
Preferably, after the forwarding encrypted audio/video data to the target monitoring client, further includes:
Forward the request of the target monitoring client transmission disconnected to the target camera;
Forward confirming message to the request disconnected the corresponding 4th for the target camera transmission described
Target monitoring client.
A kind of audio/video monitor and control system is applied in monitoring server, comprising:
Determining module logs on to itself camera and the respective CA certificate of monitor client for basis, determines that CA is demonstrate,proved
Book and the CA certificate of target monitoring client belong to the camera at same family's ca authentication center, are the target monitoring client
The target camera at end, so that the target monitoring client obtains the audio, video data of the target camera acquisition;
Wherein, the camera and the respective CA certificate of the monitor client are respectively affiliated family's ca authentication center
The certificate issued, and family's ca authentication center of each family is different.
A kind of audio-video monitoring server, comprising:
Memory, for storing computer program;
Processor realizes the step of as above any audio-video monitoring method when for executing the computer program
Suddenly.
A kind of computer readable storage medium is stored with computer program in the computer readable storage medium, described
The step of as above any described audio-video monitoring method is realized when computer program is executed by processor.
A kind of audio-video monitoring method provided by the present application is applied in monitoring server, according to logging on to taking the photograph for itself
As head and the respective CA certificate of monitor client, determine that CA certificate and the CA certificate of target monitoring client belong to the same family
The camera at ca authentication center is the target camera of target monitoring client, so that target monitoring client obtains target and takes the photograph
The audio, video data acquired as head;Wherein, camera and the respective CA certificate of monitor client are that respectively affiliated family CA recognizes
The certificate that card center is issued, and family's ca authentication center of each family is different.A kind of audio-video monitoring provided by the present application
In method, the certificate that camera and the respective CA certificate of monitor client are issued for family's ca authentication center belonging to respectively, and
Family's ca authentication center of each family is different namely there is oneself family's ca authentication center in each family, namely
Ca authentication center rests in family oneself hand, and the respective CA of camera and monitor client that monitoring server is applied to
Certificate is that family's ca authentication center is issued, so that the control of camera and the respective certificate of monitor client is slapped
It is held in family oneself hand, compared with ca authentication center in the prior art rests in the third-party institution or operator's hand, even if
Attacker gets encryption key pair, and family oneself can change family's ca authentication center completely, generates the CA card of new safety
Book can improve safety to a certain extent.A kind of audio/video monitor and control system, server and computer provided by the present application can
It reads storage medium and also solves the problems, such as relevant art.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow chart of audio-video monitoring method provided by the embodiments of the present application;
Fig. 2 is that family's ca authentication center is the flow chart that target object issues CA certificate;
Fig. 3 is target object registration, the flow chart for logging on to monitoring server;
Fig. 4 is a kind of real time process flow figure of audio-video monitoring method provided by the embodiments of the present application;
Fig. 5 is a kind of structural schematic diagram of audio/video monitor and control system provided by the embodiments of the present application;
Fig. 6 is a kind of structural schematic diagram and data of audio-video monitoring device provided by the embodiments of the present application in practical application
Transmission figure;
Fig. 7 is a kind of structural schematic diagram of audio-video monitoring server provided by the embodiments of the present application;
Fig. 8 is a kind of another structural schematic diagram of audio-video monitoring server provided by the embodiments of the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on
Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall in the protection scope of this application.
Referring to Fig. 1, Fig. 1 is a kind of flow chart of audio-video monitoring method provided by the embodiments of the present application.
A kind of audio-video monitoring method provided by the embodiments of the present application is applied in monitoring server, may include following
Step:
Step S101: being that target object issues CA certificate by family's ca authentication center, target object includes camera, prison
Control client, wherein camera and the respective CA certificate of monitor client be respectively belonging to family's ca authentication center issue
Certificate, and family's ca authentication center of each family is different.
It is understood that family's ca authentication center can be built in monitoring server, can also be taken independently of monitoring
It is engaged in except device, need to only can satisfy monitoring server by ca authentication center is that camera, monitor client issue CA certificate i.e.
It can.Family described herein does not refer specifically to be in the general designation namely the application of a regional scope for a certain family
Family may refer to a certain family other, also may refer to certain company, certain enterprise, some region etc., as long as it is desirable
By camera head monitor environment, client is needed to check the region of the environmental information of camera acquisition.
Referring to Fig. 2, it is the flow chart that target object issues CA certificate that Fig. 2, which is family's ca authentication center,.ACK table in figure
Show confirmation message.
Optionally, the process that CA certificate is issued for target object in family's ca authentication center may comprise steps of: receive
The signing certificate request that target object is sent;Signing certificate is signed and issued, and is sent to target object;Target object is received to receive and write
Enter signing certificate to the first confirmation message sent behind;Generate encryption key to and sign and issue encrypted certificate;It is close to send encryption
Key pair and encrypted certificate are to target object;Receive target object import encryption key to and be written encrypted certificate to from behind send
The second confirmation message;CA certificate is sent to target object;It receives target object and CA certificate is written to the third sent behind
Confirmation message.In practical application, before the signing certificate request that family's ca authentication center receives that target object is sent, target object
Signature key pair can also be generated, target object itself grant a certificate is used for.In concrete application scene, family's ca authentication center can
The private key of family CA to be stored in UKEY, UKEY be it is a kind of by USB (Universal Serial Bus Interface) directly and computer
It is connected, the small memory device with cryptographic authorization functions, reliable high speed, correspondingly, family's ca authentication center is target every time
Object is both needed to when issuing CA certificate using UKEY, at this point it is possible to which PIN code is arranged for UKEY, user is only inputting correct PIN
In the case where code to UKRY, UKEY just can be used normally, borrowed so as to improve family's ca authentication center to a certain extent
Helping UKEY is the safety that target object issues CA certificate;And when the UKEY at family's ca authentication center loses, it is necessary to set again
New UKEY is set, and re-creates family's ca authentication center, and issues CA certificate again for target object.
Step S102: according to the respective CA certificate of camera and monitor client for logging on to itself, determine CA certificate with
The CA certificate of target monitoring client belongs to the camera at same family's ca authentication center, is the target of target monitoring client
Camera, so that target monitoring client obtains the audio, video data of target camera acquisition.
It can be appreciated that by step S102 according to logging on to itself camera and monitor client respective CA certificate
Description is it is found that camera and monitor client need to first log on to monitoring server in the application, correspondingly, in login process,
Monitoring server can verify the identity of camera and monitor client, be further ensured that a kind of sound provided by the present application
The safety of video monitoring method.
Referring to Fig. 3, Fig. 3 is target object registration, the flow chart for logging on to monitoring server.ACK in figure indicates true
Recognize message.
Optionally, the process that monitoring server was registered, logged on to target object may comprise steps of: target object hair
Send logging request to monitoring server;After monitoring server receives logging request, Challenge is returned to target object;Mesh
Mark object carries out signature to Challenge and generates identity documents, sends identity documents to monitoring server;Monitoring server verifying
Whether identity documents are existing, if so, allowing the login of target object, require the instruction of registration to target if it is not, then sending
Object;Target object receive require registration instruction after, to Challenge or itself License signature generate identity with
Card sends License or identity documents to monitoring server;Monitoring server receives and saves License or identity documents, from
And complete registration process.
In concrete application scene, in order to further increase a kind of safety of audio-video monitoring method provided by the present application,
Target object can be registered using challenge response formula digital signature encryption mode, log on to monitoring server, at this time, it may be necessary to supervise in advance
Dynamic password card is set on control server and target object, seed key and Encryption Algorithm built in dynamic password card.It steps on accordingly
Record, registration process may comprise steps of: target object sends logging request to monitoring server;Monitoring server is given birth at random
At challenge character string, challenge character string is sent to target object;Target object is calculated based on the seed key and encryption itself saved
Method carries out challenge character string the first response character string is calculated, and sends the first response character string to monitor client;Prison
Control client to challenge character string carries out that the second response character is calculated based on the seed key and Encryption Algorithm itself saved
String, judges whether the first response character string and the second response character string are consistent, if so, allow the login of target object, if it is not,
The dynamic password card of itself is then sent to target object, to complete to register.Optionally, provided by the present application in order to further enhance
A kind of safety of audio-video monitoring method, monitoring server can also issue PIN code for target object, correspondingly, target pair
As after sending logging request, can first send itself PIN code to monitoring server, monitoring server, which first verifies PIN code, is
It is no correct, if so, the random operation for generating challenge character string is executed again, if it is not, then not allowing target object to log in;It should refer to
Out, the PIN code of camera can be stored in camera itself, and be arranged after camera is powered automatically by the PIN code of itself
It is sent to monitoring server, the login of camera is completed with this.In concrete application scene, monitoring server can also timing or
Real-time query, the state for safeguarding camera.In addition, target object can also use TCP (Transmission Control
Protocol, transmission control protocol) etc. protocol entries, be registered to monitoring server, the application is not specifically limited herein.
After camera, monitor client log on to monitoring server, monitoring server can determine that CA certificate is and mesh
The CA certificate of mark monitor client belongs to the camera at one family ca authentication center, is the corresponding target camera shooting in destination client
Head, so that target monitoring client obtains the audio, video data of target camera acquisition.By taking family A and family B as an example, due to family
Family's ca authentication center of front yard A and family B is different, so family A and family B is the same camera and same monitoring visitor
The certificate that family end is issued is different, and in the target camera for determining target monitoring client, monitoring server can first root
It is determined as camera to issue family's ca authentication center of CA certificate being to belong to family A to still fall within family according to the CA certificate of camera
B, correspondingly, further according to monitor client CA certificate be determined as monitor client and issue family's ca authentication center of CA certificate be
Belong to family A or family B, if family's ca authentication center of camera and monitoring server belongs to the same family, such as
Family A, then monitoring server can be using the camera as the target camera of the monitor client, and allows monitoring client
End connects the camera.
A kind of audio-video monitoring method provided by the present application is applied in monitoring server, according to logging on to taking the photograph for itself
As head and the respective CA certificate of monitor client, determine that CA certificate and the CA certificate of target monitoring client belong to the same family
The camera at ca authentication center is the target camera of target monitoring client, so that target monitoring client obtains target and takes the photograph
The audio, video data acquired as head;Wherein, camera and the respective CA certificate of monitor client are that respectively affiliated family CA recognizes
The certificate that card center is issued, and family's ca authentication center of each family is different.A kind of audio-video monitoring provided by the present application
In method, the certificate that camera and the respective CA certificate of monitor client are issued for family's ca authentication center belonging to respectively, and
Family's ca authentication center of each family is different namely there is oneself family's ca authentication center in each family, namely
Ca authentication center rests in family oneself hand, and the respective CA of camera and monitor client that monitoring server is applied to
Certificate is that family's ca authentication center is issued, so that the control of camera and the respective certificate of monitor client is slapped
It is held in family oneself hand, compared with ca authentication center in the prior art rests in the third-party institution or operator's hand, even if
Attacker gets encryption key pair, and family oneself can change family's ca authentication center completely, generates the CA card of new safety
Book can improve safety to a certain extent.
Referring to Fig. 4, Fig. 4 is a kind of real time process flow figure of audio-video monitoring method provided by the embodiments of the present application.In figure
ACK indicate corresponding confirmation message.
It is objective according to the camera and monitoring that log on to itself in a kind of audio-video monitoring method provided by the embodiments of the present application
Before the respective CA certificate in family end, can also include:
The authorization administration information that Administrator Client sends is received, authorization administration information is for indicating that monitor client is permitted
Perhaps what is connected belongs to the camera information of the same family;
According to the respective CA certificate of camera and monitor client for logging on to itself, CA certificate and target monitoring visitor are determined
The CA certificate at family end belongs to the camera at same family's ca authentication center, is the target camera of target monitoring client, can
With specifically:
According to the respective CA certificate of camera and monitor client for logging on to itself, CA certificate and target monitoring visitor are determined
The CA certificate at family end belongs to same family's ca authentication center, and meets the camera of authorization administration information, is target monitoring
The target camera of client.
In practical application, in order to further increase a kind of safety of audio-video monitoring method provided by the present application, monitoring
Server can also determine the target that destination client can connect according to the authorization administration information that Administrator Client is arranged
Camera.By taking the camera in one family is mounted on kitchen, bedroom, parlor, lavatory, doorway as an example, if administrator client
The authorization administration information of end setting shows that monitor client can only access the camera for being installed on parlor, bedroom, then monitoring service
Device determines that the monitor client can connect the family and be installed on kitchen in the CA certificate according to camera and monitor client
Room, bedroom, parlor, lavatory, doorway camera after, also need according to Administrator Client be arranged authorization administration information, determine
The target camera of the monitor client is only the camera for being installed on parlor, bedroom.It, can be by one in concrete application scene
First logs on to the monitor client of monitoring server as Administrator Client in a family.Have in monitor client multiple
When, Administrator Client can determine the rights management letter of each monitor client by the identification information of each monitor client
Breath.In addition, Administrator Client also has the quantity of one connected monitor client of camera of setting, and revoke monitoring
Client jurisdiction.In addition, Administrator Client can also request the rights management for being stored in monitoring server to monitoring server
Information, and operation is modified etc. to authorization administration information according to actual needs.
Referring to Fig. 4, determining CA certificate and target monitoring in a kind of audio-video monitoring method provided by the embodiments of the present application
The CA certificate of client belongs to the camera at same family's ca authentication center, be target monitoring client target camera it
Afterwards, can also include:
Step 1: the information of transmission target camera to target monitoring client.
In practical application, the information of target camera may include the mark, installation site, presence of target camera
Deng target monitoring client can be according to the information of target camera to determine whether linking objective camera.Concrete application field
Jing Zhong, monitoring server can be after receiving the request of inquiry camera of monitor client transmission, just execute and send mesh
The information of camera is marked to the operation of destination client.
Step 2: the connection request that transmission objectives monitor client is sent to target camera.
After target monitoring client wants linking objective camera according to the information of target camera is determining, monitoring server meeting
The connection request that transmission objectives monitor client is sent is to target camera.
Step 3: the first ID authentication request and first key that transmission objectives camera is sent are negotiated request to target and are supervised
Control client;The second ID authentication request and the second key negotiation request that transmission objectives monitor client is sent to target image
Head.
After target camera receives connection request, need to complete mutual authentication with target monitoring client, and
And arranging key is determined in authentication procedures, arranging key is used for target camera encrypted audio/video data or target
Monitor client decrypts encrypted audio, video data.In the mutual identity authentication mistake of target monitoring client and target camera
Cheng Zhong can be arranged the first validation problem in target camera in advance, and the first answer of the first validation problem is set to
The second validation problem can be set in target monitoring client in target monitoring client connected to it, and by the second verifying
Second answer of problem is set to can be in target camera connected to it, correspondingly, the first identity that target camera is sent
Answer of the target camera for Second Problem can be carried in certification request, target monitoring client is in verifying target camera shooting
After head is consistent with the second answer for the answer of Second Problem, the identity for verifying target camera is correct, and target is allowed to image
Head connection itself sends itself answer for first problem to target camera, and target camera is in verifying target monitoring visitor
After family end is consistent with the first answer for the answer of first problem, the identity for verifying target monitoring client is correct, allows mesh
Mark monitor client connects itself, at this point, completing connection between target monitoring client and target camera;Concrete application scene
In, target monitoring client and target camera can also be by PKI (Public Key Infrastructure, public bases
Facility) mutual authentication is completed, principle sees the original for completing both sides' authentication by PKI in the prior art
Reason, it is, of course, also possible to there is the process of other authentications, the application is not specifically limited herein.For arranging key, the
It may include the arranging key that target camera generates in one key negotiation request, and may include in the second key negotiation request
Negotiate the confirmation message of the arranging key in request to first key;Namely target camera generates arranging key and will negotiate close
First key, which is written, in key negotiates to be sent to target monitoring client, target monitoring client solution via monitoring server in request
The arranging key that first key is negotiated in request is precipitated and saves the arranging key if accepting, and will confirm that message write-in second
It is sent to target camera via monitoring server in key negotiation request, target camera parses the second key negotiation request
In confirmation message after, determine that the arranging key is arranging key between the two;And when target monitoring client does not accept target
When the arranging key that camera generates, target monitoring client can be written in the second key negotiation request and not accept message,
The arranging key that oneself approval can also be written, so that target camera determines final association by the second key negotiation request
In quotient's key namely concrete application scene, target monitoring client and target camera may repeatedly be negotiated by first key
It requests to determine final arranging key with the second key negotiation request.
Step 4: to target camera and target monitoring client by the first ID authentication request and the second authentication
The identity of requests verification other side is correct, and determines arranging key by first key negotiation request and the second key negotiation request
Afterwards, forward the request of the acquisition audio, video data of target monitoring client transmission to target camera.
Confirm that the identity of other side is correct to target camera and target monitoring client, and the two determines arranging key
Afterwards, the request for the acquisition audio, video data that monitoring server can forward target monitoring client to send to target camera, with
The encryption audio-video generated after encrypting the transmission of target camera to the original audio, video data of acquisition using arranging key
Data.
Step 5: judging whether to receive the original audio-video number by arranging key to acquisition of target camera transmission
According to the encrypted audio/video data generated after being encrypted, if so, forwarding encrypted audio/video data to target monitoring client.
In practical application, target camera can send encrypted audio/video data to target monitoring visitor by monitoring server
Family end, due in monitoring server there is no arranging key, and monitoring server and the Encryption Algorithm for being unaware of target camera,
So monitoring server can not be decrypted encrypted audio/video data to obtain the audio, video data of target camera acquisition.No
Indigestibility, when original audio, video data is more, target camera need to recycle the operation for executing and being encrypted to initial data, phase
It answers, monitoring server needs to recycle the step of executing forwarding encrypted audio/video data to target monitoring client.
Referring to Fig. 4, in a kind of audio-video monitoring method provided by the embodiments of the present application, transmission objectives monitor client hair
After the second ID authentication request and the second key negotiation request to target camera sent, forwarding target monitoring client is sent
Acquisition audio, video data request to target camera before, can also include:
The acquisition P2P that target camera and target monitoring client are sent is received to burrow the request of parameter;
It sends P2P and burrows parameter to target camera and target monitoring client;
Judge whether to receive the notice using transfer mode that target monitoring client is sent, if so, forwarding uses
The notice of transfer mode executes the request for the acquisition audio, video data that forwarding target monitoring client is sent to target camera
The step of to target camera;If it is not, then directly executing asking for the acquisition audio, video data that forwarding target monitoring client is sent
The step of asking to target camera.
In practical application, in order to save flow consumed by a kind of audio-video monitoring method provided by the embodiments of the present application,
Monitoring server can also receive the acquisition P2P that target camera and target monitoring client are sent and burrow the request of parameter, so
Send P2P afterwards and burrow parameter to target camera and target monitoring client, target monitoring client and target camera by
The P2P parameter that burrows is completed to burrow by P2P and directly carry out data transmission after P2P burrows.In concrete application scene, mesh
Marking monitor client and target camera can come by UDP (User Datagram Protocol, User Datagram Protocol)
P2P is completed to burrow.
Referring to Fig. 4, forwarding encrypted audio/video data is extremely in a kind of audio-video monitoring method provided by the embodiments of the present application
After target monitoring client, can also include:
Forward the request of target monitoring client transmission disconnected to target camera;
The corresponding with the request disconnected the 4th of forwarding target camera transmission confirms message to target monitoring client
End.
In practical application, monitoring server can also turn after forwarding encrypted audio/video data to target monitoring client
The request disconnected that target monitoring client is sent is sent out to target camera, and the agreement for forwarding target camera to send is disconnected
Open connection the 4th confirms message to target monitoring client, to complete target monitoring client and the separated company of target camera
The operation connect.
Present invention also provides a kind of audio/video monitor and control systems, with a kind of audio-video prison provided by the embodiments of the present application
The correspondence effect that prosecutor method has.Referring to Fig. 5, Fig. 5 is a kind of knot of audio/video monitor and control system provided by the embodiments of the present application
Structure schematic diagram.
A kind of audio/video monitor and control system provided by the embodiments of the present application, which is characterized in that be applied to monitoring server 101
In, comprising:
Determining module 1011, for respective according to the camera 102 and monitor client 103 that log on to monitoring server
CA certificate determines that the CA certificate of CA certificate and target monitoring client belongs to the camera at same family's ca authentication center, is
The target camera of target monitoring client, so that target monitoring client obtains the audio, video data of target camera acquisition;
Wherein, camera and the respective CA certificate of monitor client are the card that respectively affiliated family's ca authentication center is issued
Book, and family's ca authentication center of each family is different.
In a kind of audio/video monitor and control system provided by the embodiments of the present application, can also include:
Module is issued, for determining module according to the respective CA of camera and monitor client for logging on to monitoring server
It is target object certificate by family's ca authentication center before certificate;Target object includes camera, monitor client;
Wherein, module is issued to be specifically used for:
Receive the signing certificate request that target object is sent;
Signing certificate is signed and issued, and is sent to target object;
Target object is received to receive and signing certificate is written to the first confirmation message sent behind;
Generate encryption key to and sign and issue encrypted certificate;
Encryption key pair and encrypted certificate are sent to target object;
Receive target object import encryption key to and be written encrypted certificate to from behind send the second confirmation message;
CA certificate is sent to target object;
It receives target object and CA certificate is written to the third confirmation message sent behind.
In a kind of audio/video monitor and control system provided by the embodiments of the present application, can also include:
First receiving module, for determining module according to the camera and monitor client for logging on to monitoring server respectively
CA certificate before, receive target object send logging request, target object includes camera or monitor client;
Return module, for returning to challenge corresponding with logging request to target object;
Second receiving module, for receive target object transmission to the identity documents that generate after challenge signature;
Authentication module, for verifying whether identity documents are existing, if so, allowing the login of target object.
In a kind of audio/video monitor and control system provided by the embodiments of the present application, can also include:
Third receiving module is demonstrate,proved for determining module according to the respective CA of the camera and monitor client that log on to itself
Before book, the authorization administration information that Administrator Client sends is received, authorization administration information is for indicating that monitor client is permitted
Perhaps what is connected belongs to the camera information of the same family;
Correspondingly, determining module may include:
Determination unit logs on to itself camera and the respective CA certificate of monitor client for basis, determines that CA is demonstrate,proved
Book and the CA certificate of target monitoring client belong to same family's ca authentication center, and meet the camera shooting of authorization administration information
Head is the target camera of target monitoring client.
In a kind of audio/video monitor and control system provided by the embodiments of the present application, can also include:
First sending module, for determining module determine CA certificate and target monitoring client CA certificate belong to it is same
The camera at family's ca authentication center sends the information of target camera after the target camera of target monitoring client
To target monitoring client;
First transmission module is used for transmission the connection request of target monitoring client transmission to target camera;
Second transmission module, the first ID authentication request and first key negotiation for being used for transmission the transmission of target camera are asked
It asks to target monitoring client;
Third transmission module is used for transmission the second ID authentication request and the second key association of the transmission of target monitoring client
It consults and request and asks to target camera;
First forwarding module, for target camera and target monitoring client by the first ID authentication request and the
The identity that two ID authentication requests verify other side is correct, and determines by first key negotiation request and the second key negotiation request
Out after arranging key, forward the request of the acquisition audio, video data of target monitoring client transmission to target camera;
First judgment module, for judging whether to receive the original by arranging key to acquisition of target camera transmission
The encrypted audio/video data that beginning audio, video data generates after being encrypted, if so, forwarding encrypted audio/video data to target is supervised
Control client.
In a kind of audio/video monitor and control system provided by the embodiments of the present application, can also include:
4th receiving module transmits the second ID authentication request that request transmission objectives monitor client is sent for third
And second after key negotiation request to target camera, the acquisition sound that the first forwarding module forwards target monitoring client to send
Before the request of video data to target camera, the acquisition P2P for receiving target camera and the transmission of target monitoring client is beaten
The request of hole parameter;
Second sending module burrows parameter to target camera and target monitoring client for sending P2P;
Second judgment module, for judge whether to receive the transmission of target monitoring client using the logical of transfer mode
Know, if so, forwarding using the notice of transfer mode to target camera, and the first forwarding module is prompted to execute forwarding target prison
The step of controlling request to the target camera for the acquisition audio, video data that client is sent;If it is not, then directly the first forwarding of prompt
Module executes the step of request to target camera for the acquisition audio, video data that forwarding target monitoring client is sent.
In a kind of audio/video monitor and control system provided by the embodiments of the present application, can also include:
Second forwarding module, after the first forwarding module forwarding encrypted audio/video data to target monitoring client,
Forward the request of target monitoring client transmission disconnected to target camera;
Third forwarding module, the 4th confirmation corresponding with the request disconnected for forwarding target camera to send disappear
It ceases to target monitoring client.
Referring to Fig. 6, Fig. 6 is that a kind of structure of audio-video monitoring device provided by the embodiments of the present application is shown in practical application
Intention and data transmission scheme.A kind of audio-video monitoring device provided by the present application include family's ca authentication center, monitoring server,
Associated description in parameter above-described embodiment is asked in monitor client, camera, the effect of each device;Camera and monitor client
It is built-in with crypto module, the crypto module of camera and the crypto module of monitor client are for realizing camera and monitoring visitor
Authentication, key agreement and P2P between the end of family burrow negotiation, and pass through TCP for realizing camera and monitor client
Agreement and monitoring server establish connection;Camera acquires original audio, video data by the audio-video sensor of itself, to original
Beginning audio, video data generates coding audio/video data after performing the encoding operation, in conjunction with arranging key to coding audio/video data into
Encrypted audio/video data is generated after row encryption, camera can burrow by P2P is directly sent to prison for encrypted audio/video data
Client is controlled, can also will go to monitor client in encrypted audio/video data by monitor client;Monitor client uses
Arranging key obtains coding audio/video data after encrypted audio/video data is decrypted, and is decoded to coding audio/video data
Original audio, video data is obtained after operation, monitor client can choose video and show or store original audio, video data later.
Present invention also provides a kind of audio-video monitoring server and computer readable storage mediums, all have the application
The correspondence effect that a kind of audio-video monitoring method that embodiment provides has.Referring to Fig. 7, Fig. 7 provides for the embodiment of the present application
A kind of audio-video monitoring server structural schematic diagram.
A kind of audio-video monitoring server provided by the embodiments of the present application may include:
Memory 201, for storing computer program;
Processor 202 realizes audio-video monitoring side described in any embodiment as above when for executing computer program
The step of method.
Referring to Fig. 8, can also include: in another kind audio-video monitoring server provided by the embodiments of the present application and handle
The input port 203 that device 202 connects is used for transmission the extraneous order inputted to processor 202;What is connect with processor 202 is aobvious
Show unit 204, the processing result for video-stream processor 202 is to the external world;The communication module 205 connecting with processor 202, is used for
Realize audio-video monitoring server and extraneous communication.Display unit 202 can make display for display panel, laser scanning
Deng;Communication mode used by communication module 205 includes but is not limited to that mobile high definition chained technology (HML), general serial are total
Line (USB), is wirelessly connected high-definition media interface (HDMI): adopting wireless fidelity technology (WiFi), Bluetooth Communication Technology, low-power consumption
Bluetooth Communication Technology, the communication technology based on IEEE802.11s.
A kind of computer readable storage medium provided by the embodiments of the present application is stored with meter in computer readable storage medium
Calculation machine program, realizes the step of audio-video monitoring method described in any embodiment as above when computer program is executed by processor
Suddenly.
Computer readable storage medium involved in the application includes random access memory (RAM), memory, read-only memory
(ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field
Any other form of storage medium well known to interior.
It is related in a kind of audio/video monitor and control system provided by the embodiments of the present application, server and computer readable storage medium
Partial explanation refers to the detailed description of corresponding part in a kind of audio-video monitoring method provided by the embodiments of the present application, herein
It repeats no more.In addition, in above-mentioned technical proposal provided by the embodiments of the present application with correspond in the prior art technical solution realize it is former
Consistent part and unspecified is managed, in order to avoid excessively repeat.
It should also be noted that, herein, relational terms such as first and second and the like are used merely to one
Entity or operation are distinguished with another entity or operation, without necessarily requiring or implying between these entities or operation
There are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant are intended to contain
Lid non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those
Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment
Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that
There is also other identical elements in process, method, article or equipment including the element.
The foregoing description of the disclosed embodiments makes those skilled in the art can be realized or use the application.To this
A variety of modifications of a little embodiments will be apparent for a person skilled in the art, and the general principles defined herein can
Without departing from the spirit or scope of the application, to realize in other embodiments.Therefore, the application will not be limited
It is formed on the embodiments shown herein, and is to fit to consistent with the principles and novel features disclosed in this article widest
Range.
Claims (10)
1. a kind of audio-video monitoring method, which is characterized in that be applied in monitoring server, comprising:
According to the respective CA certificate of camera and monitor client for logging on to itself, CA certificate and target monitoring client are determined
CA certificate belong to the camera at same family's ca authentication center, be the target camera of the target monitoring client, with
The target monitoring client is set to obtain the audio, video data of the target camera acquisition;
Wherein, the camera and the respective CA certificate of the monitor client are that respectively affiliated family's ca authentication center is issued
Certificate, and family's ca authentication center of each family is different.
2. the method according to claim 1, wherein the basis logs on to camera and the monitoring client of itself
Before holding respective CA certificate, further includes:
It is that target object issues CA certificate by family's ca authentication center;The target object includes the camera, institute
State monitor client;
Wherein, family's ca authentication center is that the target object issues the process of CA certificate and includes:
Receive the signing certificate request that the target object is sent;
Signing certificate is signed and issued, and is sent to the target object;
The target object is received to receive and the signing certificate is written to the first confirmation message sent behind;
Generate encryption key to and sign and issue encrypted certificate;
The encryption key pair and the encrypted certificate are sent to the target object;
Receive the target object import the encryption key to and be written the encrypted certificate to from behind send second really
Recognize message;
CA certificate is sent to the target object;
It receives the target object and the CA certificate is written to the third confirmation message sent behind.
3. the method according to claim 1, wherein the basis logs on to camera and the monitoring client of itself
Before holding respective CA certificate, further includes:
The logging request that target object is sent is received, the target object includes the camera or the monitor client;
Challenge corresponding with the logging request is returned to the target object;
Receive that the target object sends to the identity documents generated after challenge signature;
Verify whether the identity documents are existing, if so, allowing the login of the target object.
4. the method according to claim 1, wherein the basis logs on to camera and the monitoring client of itself
Before holding respective CA certificate, further includes:
The authorization administration information that Administrator Client sends is received, the authorization administration information is for indicating the monitor client
Allow the camera information for belonging to the same family connected;
According to the respective CA certificate of camera and monitor client for logging on to itself, CA certificate and target monitoring client are determined
CA certificate belong to the camera at same family's ca authentication center, be the target camera of the target monitoring client, packet
It includes:
According to the respective CA certificate of camera and monitor client for logging on to itself, CA certificate and target monitoring client are determined
CA certificate belong to same family's ca authentication center, and meet the camera of the authorization administration information, be the target
The target camera of monitor client.
5. method according to any one of claims 1 to 4, which is characterized in that the determining CA certificate and target monitoring visitor
The CA certificate at family end belongs to the camera at same family's ca authentication center, is the target camera of the target monitoring client
Later, further includes:
The information of the target camera is sent to the target monitoring client;
Connection request that the target monitoring client is sent is transmitted to the target camera;
The first ID authentication request and first key for transmitting the target camera transmission negotiate request to the target monitoring
Client;
The second ID authentication request that the target monitoring client is sent and the second key negotiation request are transmitted to the target
Camera;
To the target camera and the target monitoring client by first ID authentication request and second body
The identity of part certification request verifying other side is correct, and negotiates request and second key negotiation request by the first key
After determining arranging key, request to the target for the acquisition audio, video data for forwarding the target monitoring client to send is taken the photograph
As head;
Judge whether to receive the original audio, video data by the arranging key to acquisition that the target camera is sent
The encrypted audio/video data generated after being encrypted, if so, forwarding the encrypted audio/video data to the target monitoring visitor
Family end.
6. according to the method described in claim 5, it is characterized in that, the second of the transmission target monitoring client transmission
After ID authentication request and the second key negotiation request to the target camera, the forwarding target monitoring client
Before the request to the target camera of the acquisition audio, video data of transmission, further includes:
The acquisition P2P that the target camera and the target monitoring client are sent is received to burrow the request of parameter;
It sends the P2P and burrows parameter to the target camera and the target monitoring client;
Judge whether to receive the notice using transfer mode that the target monitoring client is sent, if so, described in forwarding
Using the notice of transfer mode to the target camera, and execute the acquisition that the forwarding target monitoring client is sent
The step of request of audio, video data to target camera;If it is not, then directly executing the forwarding target monitoring visitor
The step of request to target camera for the acquisition audio, video data that family end is sent.
7. according to the method described in claim 5, it is characterized in that, described forward the encrypted audio/video data to the target
After monitor client, further includes:
Forward the request of the target monitoring client transmission disconnected to the target camera;
Forward the target camera transmission confirms message to the target with the request disconnected the corresponding 4th
Monitor client.
8. a kind of audio/video monitor and control system, which is characterized in that be applied in monitoring server, comprising:
Determining module, for according to itself camera and the respective CA certificate of monitor client is logged on to, determine CA certificate with
The CA certificate of target monitoring client belongs to the camera at same family's ca authentication center, is the target monitoring client
Target camera, so that the target monitoring client obtains the audio, video data of the target camera acquisition;
Wherein, the camera and the respective CA certificate of the monitor client are that respectively affiliated family's ca authentication center is issued
Certificate, and family's ca authentication center of each family is different.
9. a kind of audio-video monitoring server characterized by comprising
Memory, for storing computer program;
Processor realizes audio-video monitoring side as described in any one of claim 1 to 7 when for executing the computer program
The step of method.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer in the computer readable storage medium
Program, the computer program realize audio-video monitoring method as described in any one of claim 1 to 7 when being executed by processor
The step of.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810878561.XA CN108989034B (en) | 2018-08-03 | 2018-08-03 | Audio and video monitoring method and system, monitoring server and computer medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810878561.XA CN108989034B (en) | 2018-08-03 | 2018-08-03 | Audio and video monitoring method and system, monitoring server and computer medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108989034A true CN108989034A (en) | 2018-12-11 |
CN108989034B CN108989034B (en) | 2021-09-14 |
Family
ID=64554839
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810878561.XA Active CN108989034B (en) | 2018-08-03 | 2018-08-03 | Audio and video monitoring method and system, monitoring server and computer medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108989034B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114157646A (en) * | 2021-11-05 | 2022-03-08 | 北方工业大学 | Domestic password application system and application method for video monitoring terminal |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1750650A (en) * | 2005-10-31 | 2006-03-22 | 北京中星微电子有限公司 | Monitoring system based on internet |
CN101374141A (en) * | 2007-08-23 | 2009-02-25 | 浙江省电信有限公司 | TCP NAT crossing method base on PCP protocol |
CN101848374A (en) * | 2010-04-30 | 2010-09-29 | 大唐电信科技股份有限公司 | Wireless video monitoring system and wireless video monitoring method thereof |
CN103491540A (en) * | 2013-09-18 | 2014-01-01 | 东北大学 | Wireless local area network two-way access authentication system and method based on identity certificates |
CN107888560A (en) * | 2017-10-12 | 2018-04-06 | 深圳市中易通安全芯科技有限公司 | A kind of mobile intelligent terminal mail security Transmission system and method |
-
2018
- 2018-08-03 CN CN201810878561.XA patent/CN108989034B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1750650A (en) * | 2005-10-31 | 2006-03-22 | 北京中星微电子有限公司 | Monitoring system based on internet |
CN101374141A (en) * | 2007-08-23 | 2009-02-25 | 浙江省电信有限公司 | TCP NAT crossing method base on PCP protocol |
CN101848374A (en) * | 2010-04-30 | 2010-09-29 | 大唐电信科技股份有限公司 | Wireless video monitoring system and wireless video monitoring method thereof |
CN103491540A (en) * | 2013-09-18 | 2014-01-01 | 东北大学 | Wireless local area network two-way access authentication system and method based on identity certificates |
CN107888560A (en) * | 2017-10-12 | 2018-04-06 | 深圳市中易通安全芯科技有限公司 | A kind of mobile intelligent terminal mail security Transmission system and method |
Non-Patent Citations (1)
Title |
---|
HOLGER KINKELIN等: "On Using TPM for Secure Identities in Future Home Networks", 《FUTURE INTERNET 2011》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114157646A (en) * | 2021-11-05 | 2022-03-08 | 北方工业大学 | Domestic password application system and application method for video monitoring terminal |
Also Published As
Publication number | Publication date |
---|---|
CN108989034B (en) | 2021-09-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108270571B (en) | Internet of Things identity authorization system and its method based on block chain | |
US7552322B2 (en) | Using a portable security token to facilitate public key certification for devices in a network | |
CN100580610C (en) | Security link management method in dynamic networks | |
CN101547095B (en) | Application service management system and management method based on digital certificate | |
WO2018090183A1 (en) | Identity authentication method, terminal device, authentication server and electronic device | |
TWI497336B (en) | Data security devices and computer program | |
CN101340436B (en) | Method and apparatus implementing remote access control based on portable memory apparatus | |
CN110537346A (en) | Safe decentralization domain name system | |
US20120249292A1 (en) | Proximity based biometric identification systems and methods | |
CN106713279B (en) | video terminal identity authentication system | |
TW201805846A (en) | System and method for identity authentication | |
CN107277079A (en) | A kind of across cloud customer certification system towards mixed cloud | |
TW201701226A (en) | System, method, and apparatus for electronic prescription | |
CN101610150B (en) | Third-party digital signature method and data transmission system | |
JP6609788B1 (en) | Information communication device, authentication program for information communication device, and authentication method | |
JP2008042882A (en) | Apparatus and method for managing station by wireless network in wpa-psk environment | |
CN103248491B (en) | A kind of backup method of electronic signature token private key and system | |
JP6438901B2 (en) | Authentication system, key processing cooperation method, and key processing cooperation program | |
CN111080858A (en) | Bluetooth key logout method and device | |
CN109309910A (en) | Communication data transmission method, system, equipment and computer readable storage medium | |
CN104539420A (en) | General intelligent hardware safe secret key management method | |
CN108989034A (en) | A kind of audio-video monitoring method, system, monitoring server and computer media | |
CN106331136A (en) | Health record information processing system | |
CN111127715A (en) | Bluetooth key replacement method and device | |
JP3914193B2 (en) | Method for performing encrypted communication with authentication, authentication system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 215011 23rd Floor, Building 3, Suzhou Pioneer Park, 209 Zhuyuan Road, Suzhou High-tech Zone, Jiangsu Province Applicant after: Suzhou Guoxin Technology Co., Ltd. Address before: 215011 23rd Floor, Building 3, Suzhou Pioneer Park, 209 Zhuyuan Road, Suzhou High-tech Zone, Jiangsu Province Applicant before: C*Core Technology (Suzhou) Co., Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |