CN108989034A - A kind of audio-video monitoring method, system, monitoring server and computer media - Google Patents

A kind of audio-video monitoring method, system, monitoring server and computer media Download PDF

Info

Publication number
CN108989034A
CN108989034A CN201810878561.XA CN201810878561A CN108989034A CN 108989034 A CN108989034 A CN 108989034A CN 201810878561 A CN201810878561 A CN 201810878561A CN 108989034 A CN108989034 A CN 108989034A
Authority
CN
China
Prior art keywords
target
camera
certificate
client
audio
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810878561.XA
Other languages
Chinese (zh)
Other versions
CN108989034B (en
Inventor
顾金东
郑茳
肖佐楠
匡启和
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CCore Technology Suzhou Co Ltd
Original Assignee
CCore Technology Suzhou Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CCore Technology Suzhou Co Ltd filed Critical CCore Technology Suzhou Co Ltd
Priority to CN201810878561.XA priority Critical patent/CN108989034B/en
Publication of CN108989034A publication Critical patent/CN108989034A/en
Application granted granted Critical
Publication of CN108989034B publication Critical patent/CN108989034B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Closed-Circuit Television Systems (AREA)
  • Alarm Systems (AREA)

Abstract

This application discloses a kind of audio-video monitoring method, system, server and computer medias, applied in monitoring server, wherein this method comprises: according to the respective CA certificate of camera and monitor client for logging on to itself, determine that the CA certificate of CA certificate and target monitoring client belongs to the camera at same family's ca authentication center, for the target camera of target monitoring client, so that target monitoring client obtains the audio, video data of target camera acquisition;Wherein, camera and the respective CA certificate of monitor client are the certificate that respectively affiliated family's ca authentication center is issued, and family's ca authentication center of each family is different.In a kind of audio-video monitoring method disclosed in the present application, ca authentication center is rested in family oneself hand, can improve safety to a certain extent.A kind of audio/video monitor and control system, server and computer readable storage medium disclosed in the present application also solve the problems, such as relevant art.

Description

A kind of audio-video monitoring method, system, monitoring server and computer media
Technical field
This application involves security video monitoring technology fields, more specifically to a kind of audio-video monitoring method, are System, monitoring server and computer media.
Background technique
With the continuous development of IP Camera, home video monitoring system is more and more easily accepted by a user and uses, User can receive the audio, video data of camera acquisition by monitor client, so as to according to audio, video data realization pair The monitoring namely video monitoring method of home environment.In audio-video monitoring method, in order to guarantee the safety of home environment, need Guarantee the safety of audio-video monitoring method.
A kind of method of existing safety for guaranteeing audio-video monitoring method is: monitoring server is according to the third-party institution Or the operator CA certificate issued realizes the matching between camera and monitor client.
However, CA certificate is by third party's machine in a kind of method of existing safety for guaranteeing audio-video monitoring method What structure or operator issued, and the third-party institution or operator can save encryption key pair under normal circumstances, this meeting is so that family The safety of environment rests in the third-party institution or operator's hand, when attacker gets what the third-party institution or operator saved Encryption key is to rear, and family can only passively be on the defensive, and the safety of home environment is lower.
In conclusion the safety for how improving existing audio-video monitoring method be current those skilled in the art urgently It solves the problems, such as.
Summary of the invention
The purpose of the application is to provide a kind of audio-video monitoring method, can solve how to improve to a certain extent existing Audio-video monitoring method safety the technical issues of.Present invention also provides a kind of audio/video monitor and control systems, monitoring service Device and computer readable storage medium.
To achieve the goals above, the application provides the following technical solutions:
A kind of audio-video monitoring method is applied in monitoring server, comprising:
According to the respective CA certificate of camera and monitor client for logging on to itself, CA certificate and target monitoring visitor are determined The CA certificate at family end belongs to the camera at same family's ca authentication center, is that the target of the target monitoring client images Head, so that the target monitoring client obtains the audio, video data of the target camera acquisition;
Wherein, the camera and the respective CA certificate of the monitor client are respectively affiliated family's ca authentication center The certificate issued, and family's ca authentication center of each family is different.
Preferably, the basis logs on to before the camera and the respective CA certificate of monitor client of itself, further includes:
It is that target object issues CA certificate by family's ca authentication center;The target object includes the camera shooting Head, the monitor client;
Wherein, family's ca authentication center is that the target object issues the process of CA certificate and includes:
Receive the signing certificate request that the target object is sent;
Signing certificate is signed and issued, and is sent to the target object;
The target object is received to receive and the signing certificate is written to the first confirmation message sent behind;
Generate encryption key to and sign and issue encrypted certificate;
The encryption key pair and the encrypted certificate are sent to the target object;
Receive the target object import the encryption key to and the encrypted certificate is written to the sent behind Two confirmation messages;
CA certificate is sent to the target object;
It receives the target object and the CA certificate is written to the third confirmation message sent behind.
Preferably, the basis logs on to before the camera and the respective CA certificate of monitor client of itself, further includes:
The logging request that target object is sent is received, the target object includes the camera or the monitoring client End;
Challenge corresponding with the logging request is returned to the target object;
Receive that the target object sends to the identity documents generated after challenge signature;
Verify whether the identity documents are existing, if so, allowing the login of the target object.
Preferably, the basis logs on to before the camera and the respective CA certificate of monitor client of itself, further includes:
The authorization administration information that Administrator Client sends is received, the authorization administration information is for indicating the monitoring visitor Family end allows the camera information for belonging to the same family connected;
According to the respective CA certificate of camera and monitor client for logging on to itself, CA certificate and target monitoring visitor are determined The CA certificate at family end belongs to the camera at same family's ca authentication center, is that the target of the target monitoring client images Head, comprising:
According to the respective CA certificate of camera and monitor client for logging on to itself, CA certificate and target monitoring visitor are determined The CA certificate at family end belongs to same family's ca authentication center, and meets the camera of the authorization administration information, is described The target camera of target monitoring client.
Preferably, the determining CA certificate and the CA certificate of target monitoring client belong to same family's ca authentication center Camera, be the target monitoring client target camera after, further includes:
The information of the target camera is sent to the target monitoring client;
Connection request that the target monitoring client is sent is transmitted to the target camera;
The first ID authentication request and first key for transmitting the target camera transmission negotiate request to the target Monitor client;
The second ID authentication request that the target monitoring client is sent and the second key negotiation request are transmitted to described Target camera;
To the target camera and the target monitoring client by first ID authentication request and described the The identity that two ID authentication requests verify other side is correct, and negotiates request and second key agreement by the first key After arranging key is determined in request, forward the request of the acquisition audio, video data of the target monitoring client transmission to the mesh Mark camera;
Judge whether to receive the original audio-video by the arranging key to acquisition that the target camera is sent The encrypted audio/video data that data generate after being encrypted, if so, the encrypted audio/video data to the target is forwarded to supervise Control client.
Preferably, the second ID authentication request and the second key agreement that the transmission target monitoring client is sent After request to the target camera, the request for the acquisition audio, video data that the forwarding target monitoring client is sent Before to the target camera, further includes:
The acquisition P2P that the target camera and the target monitoring client are sent is received to burrow the request of parameter;
It sends the P2P and burrows parameter to the target camera and the target monitoring client;
Judge whether to receive the notice using transfer mode that the target monitoring client is sent, if so, forwarding The notice using transfer mode executes what the forwarding target monitoring client was sent to the target camera The step of obtaining request to the target camera of audio, video data;If it is not, then directly executing the forwarding target prison The step of controlling request to the target camera for the acquisition audio, video data that client is sent.
Preferably, after the forwarding encrypted audio/video data to the target monitoring client, further includes:
Forward the request of the target monitoring client transmission disconnected to the target camera;
Forward confirming message to the request disconnected the corresponding 4th for the target camera transmission described Target monitoring client.
A kind of audio/video monitor and control system is applied in monitoring server, comprising:
Determining module logs on to itself camera and the respective CA certificate of monitor client for basis, determines that CA is demonstrate,proved Book and the CA certificate of target monitoring client belong to the camera at same family's ca authentication center, are the target monitoring client The target camera at end, so that the target monitoring client obtains the audio, video data of the target camera acquisition;
Wherein, the camera and the respective CA certificate of the monitor client are respectively affiliated family's ca authentication center The certificate issued, and family's ca authentication center of each family is different.
A kind of audio-video monitoring server, comprising:
Memory, for storing computer program;
Processor realizes the step of as above any audio-video monitoring method when for executing the computer program Suddenly.
A kind of computer readable storage medium is stored with computer program in the computer readable storage medium, described The step of as above any described audio-video monitoring method is realized when computer program is executed by processor.
A kind of audio-video monitoring method provided by the present application is applied in monitoring server, according to logging on to taking the photograph for itself As head and the respective CA certificate of monitor client, determine that CA certificate and the CA certificate of target monitoring client belong to the same family The camera at ca authentication center is the target camera of target monitoring client, so that target monitoring client obtains target and takes the photograph The audio, video data acquired as head;Wherein, camera and the respective CA certificate of monitor client are that respectively affiliated family CA recognizes The certificate that card center is issued, and family's ca authentication center of each family is different.A kind of audio-video monitoring provided by the present application In method, the certificate that camera and the respective CA certificate of monitor client are issued for family's ca authentication center belonging to respectively, and Family's ca authentication center of each family is different namely there is oneself family's ca authentication center in each family, namely Ca authentication center rests in family oneself hand, and the respective CA of camera and monitor client that monitoring server is applied to Certificate is that family's ca authentication center is issued, so that the control of camera and the respective certificate of monitor client is slapped It is held in family oneself hand, compared with ca authentication center in the prior art rests in the third-party institution or operator's hand, even if Attacker gets encryption key pair, and family oneself can change family's ca authentication center completely, generates the CA card of new safety Book can improve safety to a certain extent.A kind of audio/video monitor and control system, server and computer provided by the present application can It reads storage medium and also solves the problems, such as relevant art.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow chart of audio-video monitoring method provided by the embodiments of the present application;
Fig. 2 is that family's ca authentication center is the flow chart that target object issues CA certificate;
Fig. 3 is target object registration, the flow chart for logging on to monitoring server;
Fig. 4 is a kind of real time process flow figure of audio-video monitoring method provided by the embodiments of the present application;
Fig. 5 is a kind of structural schematic diagram of audio/video monitor and control system provided by the embodiments of the present application;
Fig. 6 is a kind of structural schematic diagram and data of audio-video monitoring device provided by the embodiments of the present application in practical application Transmission figure;
Fig. 7 is a kind of structural schematic diagram of audio-video monitoring server provided by the embodiments of the present application;
Fig. 8 is a kind of another structural schematic diagram of audio-video monitoring server provided by the embodiments of the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall in the protection scope of this application.
Referring to Fig. 1, Fig. 1 is a kind of flow chart of audio-video monitoring method provided by the embodiments of the present application.
A kind of audio-video monitoring method provided by the embodiments of the present application is applied in monitoring server, may include following Step:
Step S101: being that target object issues CA certificate by family's ca authentication center, target object includes camera, prison Control client, wherein camera and the respective CA certificate of monitor client be respectively belonging to family's ca authentication center issue Certificate, and family's ca authentication center of each family is different.
It is understood that family's ca authentication center can be built in monitoring server, can also be taken independently of monitoring It is engaged in except device, need to only can satisfy monitoring server by ca authentication center is that camera, monitor client issue CA certificate i.e. It can.Family described herein does not refer specifically to be in the general designation namely the application of a regional scope for a certain family Family may refer to a certain family other, also may refer to certain company, certain enterprise, some region etc., as long as it is desirable By camera head monitor environment, client is needed to check the region of the environmental information of camera acquisition.
Referring to Fig. 2, it is the flow chart that target object issues CA certificate that Fig. 2, which is family's ca authentication center,.ACK table in figure Show confirmation message.
Optionally, the process that CA certificate is issued for target object in family's ca authentication center may comprise steps of: receive The signing certificate request that target object is sent;Signing certificate is signed and issued, and is sent to target object;Target object is received to receive and write Enter signing certificate to the first confirmation message sent behind;Generate encryption key to and sign and issue encrypted certificate;It is close to send encryption Key pair and encrypted certificate are to target object;Receive target object import encryption key to and be written encrypted certificate to from behind send The second confirmation message;CA certificate is sent to target object;It receives target object and CA certificate is written to the third sent behind Confirmation message.In practical application, before the signing certificate request that family's ca authentication center receives that target object is sent, target object Signature key pair can also be generated, target object itself grant a certificate is used for.In concrete application scene, family's ca authentication center can The private key of family CA to be stored in UKEY, UKEY be it is a kind of by USB (Universal Serial Bus Interface) directly and computer It is connected, the small memory device with cryptographic authorization functions, reliable high speed, correspondingly, family's ca authentication center is target every time Object is both needed to when issuing CA certificate using UKEY, at this point it is possible to which PIN code is arranged for UKEY, user is only inputting correct PIN In the case where code to UKRY, UKEY just can be used normally, borrowed so as to improve family's ca authentication center to a certain extent Helping UKEY is the safety that target object issues CA certificate;And when the UKEY at family's ca authentication center loses, it is necessary to set again New UKEY is set, and re-creates family's ca authentication center, and issues CA certificate again for target object.
Step S102: according to the respective CA certificate of camera and monitor client for logging on to itself, determine CA certificate with The CA certificate of target monitoring client belongs to the camera at same family's ca authentication center, is the target of target monitoring client Camera, so that target monitoring client obtains the audio, video data of target camera acquisition.
It can be appreciated that by step S102 according to logging on to itself camera and monitor client respective CA certificate Description is it is found that camera and monitor client need to first log on to monitoring server in the application, correspondingly, in login process, Monitoring server can verify the identity of camera and monitor client, be further ensured that a kind of sound provided by the present application The safety of video monitoring method.
Referring to Fig. 3, Fig. 3 is target object registration, the flow chart for logging on to monitoring server.ACK in figure indicates true Recognize message.
Optionally, the process that monitoring server was registered, logged on to target object may comprise steps of: target object hair Send logging request to monitoring server;After monitoring server receives logging request, Challenge is returned to target object;Mesh Mark object carries out signature to Challenge and generates identity documents, sends identity documents to monitoring server;Monitoring server verifying Whether identity documents are existing, if so, allowing the login of target object, require the instruction of registration to target if it is not, then sending Object;Target object receive require registration instruction after, to Challenge or itself License signature generate identity with Card sends License or identity documents to monitoring server;Monitoring server receives and saves License or identity documents, from And complete registration process.
In concrete application scene, in order to further increase a kind of safety of audio-video monitoring method provided by the present application, Target object can be registered using challenge response formula digital signature encryption mode, log on to monitoring server, at this time, it may be necessary to supervise in advance Dynamic password card is set on control server and target object, seed key and Encryption Algorithm built in dynamic password card.It steps on accordingly Record, registration process may comprise steps of: target object sends logging request to monitoring server;Monitoring server is given birth at random At challenge character string, challenge character string is sent to target object;Target object is calculated based on the seed key and encryption itself saved Method carries out challenge character string the first response character string is calculated, and sends the first response character string to monitor client;Prison Control client to challenge character string carries out that the second response character is calculated based on the seed key and Encryption Algorithm itself saved String, judges whether the first response character string and the second response character string are consistent, if so, allow the login of target object, if it is not, The dynamic password card of itself is then sent to target object, to complete to register.Optionally, provided by the present application in order to further enhance A kind of safety of audio-video monitoring method, monitoring server can also issue PIN code for target object, correspondingly, target pair As after sending logging request, can first send itself PIN code to monitoring server, monitoring server, which first verifies PIN code, is It is no correct, if so, the random operation for generating challenge character string is executed again, if it is not, then not allowing target object to log in;It should refer to Out, the PIN code of camera can be stored in camera itself, and be arranged after camera is powered automatically by the PIN code of itself It is sent to monitoring server, the login of camera is completed with this.In concrete application scene, monitoring server can also timing or Real-time query, the state for safeguarding camera.In addition, target object can also use TCP (Transmission Control Protocol, transmission control protocol) etc. protocol entries, be registered to monitoring server, the application is not specifically limited herein.
After camera, monitor client log on to monitoring server, monitoring server can determine that CA certificate is and mesh The CA certificate of mark monitor client belongs to the camera at one family ca authentication center, is the corresponding target camera shooting in destination client Head, so that target monitoring client obtains the audio, video data of target camera acquisition.By taking family A and family B as an example, due to family Family's ca authentication center of front yard A and family B is different, so family A and family B is the same camera and same monitoring visitor The certificate that family end is issued is different, and in the target camera for determining target monitoring client, monitoring server can first root It is determined as camera to issue family's ca authentication center of CA certificate being to belong to family A to still fall within family according to the CA certificate of camera B, correspondingly, further according to monitor client CA certificate be determined as monitor client and issue family's ca authentication center of CA certificate be Belong to family A or family B, if family's ca authentication center of camera and monitoring server belongs to the same family, such as Family A, then monitoring server can be using the camera as the target camera of the monitor client, and allows monitoring client End connects the camera.
A kind of audio-video monitoring method provided by the present application is applied in monitoring server, according to logging on to taking the photograph for itself As head and the respective CA certificate of monitor client, determine that CA certificate and the CA certificate of target monitoring client belong to the same family The camera at ca authentication center is the target camera of target monitoring client, so that target monitoring client obtains target and takes the photograph The audio, video data acquired as head;Wherein, camera and the respective CA certificate of monitor client are that respectively affiliated family CA recognizes The certificate that card center is issued, and family's ca authentication center of each family is different.A kind of audio-video monitoring provided by the present application In method, the certificate that camera and the respective CA certificate of monitor client are issued for family's ca authentication center belonging to respectively, and Family's ca authentication center of each family is different namely there is oneself family's ca authentication center in each family, namely Ca authentication center rests in family oneself hand, and the respective CA of camera and monitor client that monitoring server is applied to Certificate is that family's ca authentication center is issued, so that the control of camera and the respective certificate of monitor client is slapped It is held in family oneself hand, compared with ca authentication center in the prior art rests in the third-party institution or operator's hand, even if Attacker gets encryption key pair, and family oneself can change family's ca authentication center completely, generates the CA card of new safety Book can improve safety to a certain extent.
Referring to Fig. 4, Fig. 4 is a kind of real time process flow figure of audio-video monitoring method provided by the embodiments of the present application.In figure ACK indicate corresponding confirmation message.
It is objective according to the camera and monitoring that log on to itself in a kind of audio-video monitoring method provided by the embodiments of the present application Before the respective CA certificate in family end, can also include:
The authorization administration information that Administrator Client sends is received, authorization administration information is for indicating that monitor client is permitted Perhaps what is connected belongs to the camera information of the same family;
According to the respective CA certificate of camera and monitor client for logging on to itself, CA certificate and target monitoring visitor are determined The CA certificate at family end belongs to the camera at same family's ca authentication center, is the target camera of target monitoring client, can With specifically:
According to the respective CA certificate of camera and monitor client for logging on to itself, CA certificate and target monitoring visitor are determined The CA certificate at family end belongs to same family's ca authentication center, and meets the camera of authorization administration information, is target monitoring The target camera of client.
In practical application, in order to further increase a kind of safety of audio-video monitoring method provided by the present application, monitoring Server can also determine the target that destination client can connect according to the authorization administration information that Administrator Client is arranged Camera.By taking the camera in one family is mounted on kitchen, bedroom, parlor, lavatory, doorway as an example, if administrator client The authorization administration information of end setting shows that monitor client can only access the camera for being installed on parlor, bedroom, then monitoring service Device determines that the monitor client can connect the family and be installed on kitchen in the CA certificate according to camera and monitor client Room, bedroom, parlor, lavatory, doorway camera after, also need according to Administrator Client be arranged authorization administration information, determine The target camera of the monitor client is only the camera for being installed on parlor, bedroom.It, can be by one in concrete application scene First logs on to the monitor client of monitoring server as Administrator Client in a family.Have in monitor client multiple When, Administrator Client can determine the rights management letter of each monitor client by the identification information of each monitor client Breath.In addition, Administrator Client also has the quantity of one connected monitor client of camera of setting, and revoke monitoring Client jurisdiction.In addition, Administrator Client can also request the rights management for being stored in monitoring server to monitoring server Information, and operation is modified etc. to authorization administration information according to actual needs.
Referring to Fig. 4, determining CA certificate and target monitoring in a kind of audio-video monitoring method provided by the embodiments of the present application The CA certificate of client belongs to the camera at same family's ca authentication center, be target monitoring client target camera it Afterwards, can also include:
Step 1: the information of transmission target camera to target monitoring client.
In practical application, the information of target camera may include the mark, installation site, presence of target camera Deng target monitoring client can be according to the information of target camera to determine whether linking objective camera.Concrete application field Jing Zhong, monitoring server can be after receiving the request of inquiry camera of monitor client transmission, just execute and send mesh The information of camera is marked to the operation of destination client.
Step 2: the connection request that transmission objectives monitor client is sent to target camera.
After target monitoring client wants linking objective camera according to the information of target camera is determining, monitoring server meeting The connection request that transmission objectives monitor client is sent is to target camera.
Step 3: the first ID authentication request and first key that transmission objectives camera is sent are negotiated request to target and are supervised Control client;The second ID authentication request and the second key negotiation request that transmission objectives monitor client is sent to target image Head.
After target camera receives connection request, need to complete mutual authentication with target monitoring client, and And arranging key is determined in authentication procedures, arranging key is used for target camera encrypted audio/video data or target Monitor client decrypts encrypted audio, video data.In the mutual identity authentication mistake of target monitoring client and target camera Cheng Zhong can be arranged the first validation problem in target camera in advance, and the first answer of the first validation problem is set to The second validation problem can be set in target monitoring client in target monitoring client connected to it, and by the second verifying Second answer of problem is set to can be in target camera connected to it, correspondingly, the first identity that target camera is sent Answer of the target camera for Second Problem can be carried in certification request, target monitoring client is in verifying target camera shooting After head is consistent with the second answer for the answer of Second Problem, the identity for verifying target camera is correct, and target is allowed to image Head connection itself sends itself answer for first problem to target camera, and target camera is in verifying target monitoring visitor After family end is consistent with the first answer for the answer of first problem, the identity for verifying target monitoring client is correct, allows mesh Mark monitor client connects itself, at this point, completing connection between target monitoring client and target camera;Concrete application scene In, target monitoring client and target camera can also be by PKI (Public Key Infrastructure, public bases Facility) mutual authentication is completed, principle sees the original for completing both sides' authentication by PKI in the prior art Reason, it is, of course, also possible to there is the process of other authentications, the application is not specifically limited herein.For arranging key, the It may include the arranging key that target camera generates in one key negotiation request, and may include in the second key negotiation request Negotiate the confirmation message of the arranging key in request to first key;Namely target camera generates arranging key and will negotiate close First key, which is written, in key negotiates to be sent to target monitoring client, target monitoring client solution via monitoring server in request The arranging key that first key is negotiated in request is precipitated and saves the arranging key if accepting, and will confirm that message write-in second It is sent to target camera via monitoring server in key negotiation request, target camera parses the second key negotiation request In confirmation message after, determine that the arranging key is arranging key between the two;And when target monitoring client does not accept target When the arranging key that camera generates, target monitoring client can be written in the second key negotiation request and not accept message, The arranging key that oneself approval can also be written, so that target camera determines final association by the second key negotiation request In quotient's key namely concrete application scene, target monitoring client and target camera may repeatedly be negotiated by first key It requests to determine final arranging key with the second key negotiation request.
Step 4: to target camera and target monitoring client by the first ID authentication request and the second authentication The identity of requests verification other side is correct, and determines arranging key by first key negotiation request and the second key negotiation request Afterwards, forward the request of the acquisition audio, video data of target monitoring client transmission to target camera.
Confirm that the identity of other side is correct to target camera and target monitoring client, and the two determines arranging key Afterwards, the request for the acquisition audio, video data that monitoring server can forward target monitoring client to send to target camera, with The encryption audio-video generated after encrypting the transmission of target camera to the original audio, video data of acquisition using arranging key Data.
Step 5: judging whether to receive the original audio-video number by arranging key to acquisition of target camera transmission According to the encrypted audio/video data generated after being encrypted, if so, forwarding encrypted audio/video data to target monitoring client.
In practical application, target camera can send encrypted audio/video data to target monitoring visitor by monitoring server Family end, due in monitoring server there is no arranging key, and monitoring server and the Encryption Algorithm for being unaware of target camera, So monitoring server can not be decrypted encrypted audio/video data to obtain the audio, video data of target camera acquisition.No Indigestibility, when original audio, video data is more, target camera need to recycle the operation for executing and being encrypted to initial data, phase It answers, monitoring server needs to recycle the step of executing forwarding encrypted audio/video data to target monitoring client.
Referring to Fig. 4, in a kind of audio-video monitoring method provided by the embodiments of the present application, transmission objectives monitor client hair After the second ID authentication request and the second key negotiation request to target camera sent, forwarding target monitoring client is sent Acquisition audio, video data request to target camera before, can also include:
The acquisition P2P that target camera and target monitoring client are sent is received to burrow the request of parameter;
It sends P2P and burrows parameter to target camera and target monitoring client;
Judge whether to receive the notice using transfer mode that target monitoring client is sent, if so, forwarding uses The notice of transfer mode executes the request for the acquisition audio, video data that forwarding target monitoring client is sent to target camera The step of to target camera;If it is not, then directly executing asking for the acquisition audio, video data that forwarding target monitoring client is sent The step of asking to target camera.
In practical application, in order to save flow consumed by a kind of audio-video monitoring method provided by the embodiments of the present application, Monitoring server can also receive the acquisition P2P that target camera and target monitoring client are sent and burrow the request of parameter, so Send P2P afterwards and burrow parameter to target camera and target monitoring client, target monitoring client and target camera by The P2P parameter that burrows is completed to burrow by P2P and directly carry out data transmission after P2P burrows.In concrete application scene, mesh Marking monitor client and target camera can come by UDP (User Datagram Protocol, User Datagram Protocol) P2P is completed to burrow.
Referring to Fig. 4, forwarding encrypted audio/video data is extremely in a kind of audio-video monitoring method provided by the embodiments of the present application After target monitoring client, can also include:
Forward the request of target monitoring client transmission disconnected to target camera;
The corresponding with the request disconnected the 4th of forwarding target camera transmission confirms message to target monitoring client End.
In practical application, monitoring server can also turn after forwarding encrypted audio/video data to target monitoring client The request disconnected that target monitoring client is sent is sent out to target camera, and the agreement for forwarding target camera to send is disconnected Open connection the 4th confirms message to target monitoring client, to complete target monitoring client and the separated company of target camera The operation connect.
Present invention also provides a kind of audio/video monitor and control systems, with a kind of audio-video prison provided by the embodiments of the present application The correspondence effect that prosecutor method has.Referring to Fig. 5, Fig. 5 is a kind of knot of audio/video monitor and control system provided by the embodiments of the present application Structure schematic diagram.
A kind of audio/video monitor and control system provided by the embodiments of the present application, which is characterized in that be applied to monitoring server 101 In, comprising:
Determining module 1011, for respective according to the camera 102 and monitor client 103 that log on to monitoring server CA certificate determines that the CA certificate of CA certificate and target monitoring client belongs to the camera at same family's ca authentication center, is The target camera of target monitoring client, so that target monitoring client obtains the audio, video data of target camera acquisition;
Wherein, camera and the respective CA certificate of monitor client are the card that respectively affiliated family's ca authentication center is issued Book, and family's ca authentication center of each family is different.
In a kind of audio/video monitor and control system provided by the embodiments of the present application, can also include:
Module is issued, for determining module according to the respective CA of camera and monitor client for logging on to monitoring server It is target object certificate by family's ca authentication center before certificate;Target object includes camera, monitor client;
Wherein, module is issued to be specifically used for:
Receive the signing certificate request that target object is sent;
Signing certificate is signed and issued, and is sent to target object;
Target object is received to receive and signing certificate is written to the first confirmation message sent behind;
Generate encryption key to and sign and issue encrypted certificate;
Encryption key pair and encrypted certificate are sent to target object;
Receive target object import encryption key to and be written encrypted certificate to from behind send the second confirmation message;
CA certificate is sent to target object;
It receives target object and CA certificate is written to the third confirmation message sent behind.
In a kind of audio/video monitor and control system provided by the embodiments of the present application, can also include:
First receiving module, for determining module according to the camera and monitor client for logging on to monitoring server respectively CA certificate before, receive target object send logging request, target object includes camera or monitor client;
Return module, for returning to challenge corresponding with logging request to target object;
Second receiving module, for receive target object transmission to the identity documents that generate after challenge signature;
Authentication module, for verifying whether identity documents are existing, if so, allowing the login of target object.
In a kind of audio/video monitor and control system provided by the embodiments of the present application, can also include:
Third receiving module is demonstrate,proved for determining module according to the respective CA of the camera and monitor client that log on to itself Before book, the authorization administration information that Administrator Client sends is received, authorization administration information is for indicating that monitor client is permitted Perhaps what is connected belongs to the camera information of the same family;
Correspondingly, determining module may include:
Determination unit logs on to itself camera and the respective CA certificate of monitor client for basis, determines that CA is demonstrate,proved Book and the CA certificate of target monitoring client belong to same family's ca authentication center, and meet the camera shooting of authorization administration information Head is the target camera of target monitoring client.
In a kind of audio/video monitor and control system provided by the embodiments of the present application, can also include:
First sending module, for determining module determine CA certificate and target monitoring client CA certificate belong to it is same The camera at family's ca authentication center sends the information of target camera after the target camera of target monitoring client To target monitoring client;
First transmission module is used for transmission the connection request of target monitoring client transmission to target camera;
Second transmission module, the first ID authentication request and first key negotiation for being used for transmission the transmission of target camera are asked It asks to target monitoring client;
Third transmission module is used for transmission the second ID authentication request and the second key association of the transmission of target monitoring client It consults and request and asks to target camera;
First forwarding module, for target camera and target monitoring client by the first ID authentication request and the The identity that two ID authentication requests verify other side is correct, and determines by first key negotiation request and the second key negotiation request Out after arranging key, forward the request of the acquisition audio, video data of target monitoring client transmission to target camera;
First judgment module, for judging whether to receive the original by arranging key to acquisition of target camera transmission The encrypted audio/video data that beginning audio, video data generates after being encrypted, if so, forwarding encrypted audio/video data to target is supervised Control client.
In a kind of audio/video monitor and control system provided by the embodiments of the present application, can also include:
4th receiving module transmits the second ID authentication request that request transmission objectives monitor client is sent for third And second after key negotiation request to target camera, the acquisition sound that the first forwarding module forwards target monitoring client to send Before the request of video data to target camera, the acquisition P2P for receiving target camera and the transmission of target monitoring client is beaten The request of hole parameter;
Second sending module burrows parameter to target camera and target monitoring client for sending P2P;
Second judgment module, for judge whether to receive the transmission of target monitoring client using the logical of transfer mode Know, if so, forwarding using the notice of transfer mode to target camera, and the first forwarding module is prompted to execute forwarding target prison The step of controlling request to the target camera for the acquisition audio, video data that client is sent;If it is not, then directly the first forwarding of prompt Module executes the step of request to target camera for the acquisition audio, video data that forwarding target monitoring client is sent.
In a kind of audio/video monitor and control system provided by the embodiments of the present application, can also include:
Second forwarding module, after the first forwarding module forwarding encrypted audio/video data to target monitoring client, Forward the request of target monitoring client transmission disconnected to target camera;
Third forwarding module, the 4th confirmation corresponding with the request disconnected for forwarding target camera to send disappear It ceases to target monitoring client.
Referring to Fig. 6, Fig. 6 is that a kind of structure of audio-video monitoring device provided by the embodiments of the present application is shown in practical application Intention and data transmission scheme.A kind of audio-video monitoring device provided by the present application include family's ca authentication center, monitoring server, Associated description in parameter above-described embodiment is asked in monitor client, camera, the effect of each device;Camera and monitor client It is built-in with crypto module, the crypto module of camera and the crypto module of monitor client are for realizing camera and monitoring visitor Authentication, key agreement and P2P between the end of family burrow negotiation, and pass through TCP for realizing camera and monitor client Agreement and monitoring server establish connection;Camera acquires original audio, video data by the audio-video sensor of itself, to original Beginning audio, video data generates coding audio/video data after performing the encoding operation, in conjunction with arranging key to coding audio/video data into Encrypted audio/video data is generated after row encryption, camera can burrow by P2P is directly sent to prison for encrypted audio/video data Client is controlled, can also will go to monitor client in encrypted audio/video data by monitor client;Monitor client uses Arranging key obtains coding audio/video data after encrypted audio/video data is decrypted, and is decoded to coding audio/video data Original audio, video data is obtained after operation, monitor client can choose video and show or store original audio, video data later.
Present invention also provides a kind of audio-video monitoring server and computer readable storage mediums, all have the application The correspondence effect that a kind of audio-video monitoring method that embodiment provides has.Referring to Fig. 7, Fig. 7 provides for the embodiment of the present application A kind of audio-video monitoring server structural schematic diagram.
A kind of audio-video monitoring server provided by the embodiments of the present application may include:
Memory 201, for storing computer program;
Processor 202 realizes audio-video monitoring side described in any embodiment as above when for executing computer program The step of method.
Referring to Fig. 8, can also include: in another kind audio-video monitoring server provided by the embodiments of the present application and handle The input port 203 that device 202 connects is used for transmission the extraneous order inputted to processor 202;What is connect with processor 202 is aobvious Show unit 204, the processing result for video-stream processor 202 is to the external world;The communication module 205 connecting with processor 202, is used for Realize audio-video monitoring server and extraneous communication.Display unit 202 can make display for display panel, laser scanning Deng;Communication mode used by communication module 205 includes but is not limited to that mobile high definition chained technology (HML), general serial are total Line (USB), is wirelessly connected high-definition media interface (HDMI): adopting wireless fidelity technology (WiFi), Bluetooth Communication Technology, low-power consumption Bluetooth Communication Technology, the communication technology based on IEEE802.11s.
A kind of computer readable storage medium provided by the embodiments of the present application is stored with meter in computer readable storage medium Calculation machine program, realizes the step of audio-video monitoring method described in any embodiment as above when computer program is executed by processor Suddenly.
Computer readable storage medium involved in the application includes random access memory (RAM), memory, read-only memory (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field Any other form of storage medium well known to interior.
It is related in a kind of audio/video monitor and control system provided by the embodiments of the present application, server and computer readable storage medium Partial explanation refers to the detailed description of corresponding part in a kind of audio-video monitoring method provided by the embodiments of the present application, herein It repeats no more.In addition, in above-mentioned technical proposal provided by the embodiments of the present application with correspond in the prior art technical solution realize it is former Consistent part and unspecified is managed, in order to avoid excessively repeat.
It should also be noted that, herein, relational terms such as first and second and the like are used merely to one Entity or operation are distinguished with another entity or operation, without necessarily requiring or implying between these entities or operation There are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant are intended to contain Lid non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or equipment including the element.
The foregoing description of the disclosed embodiments makes those skilled in the art can be realized or use the application.To this A variety of modifications of a little embodiments will be apparent for a person skilled in the art, and the general principles defined herein can Without departing from the spirit or scope of the application, to realize in other embodiments.Therefore, the application will not be limited It is formed on the embodiments shown herein, and is to fit to consistent with the principles and novel features disclosed in this article widest Range.

Claims (10)

1. a kind of audio-video monitoring method, which is characterized in that be applied in monitoring server, comprising:
According to the respective CA certificate of camera and monitor client for logging on to itself, CA certificate and target monitoring client are determined CA certificate belong to the camera at same family's ca authentication center, be the target camera of the target monitoring client, with The target monitoring client is set to obtain the audio, video data of the target camera acquisition;
Wherein, the camera and the respective CA certificate of the monitor client are that respectively affiliated family's ca authentication center is issued Certificate, and family's ca authentication center of each family is different.
2. the method according to claim 1, wherein the basis logs on to camera and the monitoring client of itself Before holding respective CA certificate, further includes:
It is that target object issues CA certificate by family's ca authentication center;The target object includes the camera, institute State monitor client;
Wherein, family's ca authentication center is that the target object issues the process of CA certificate and includes:
Receive the signing certificate request that the target object is sent;
Signing certificate is signed and issued, and is sent to the target object;
The target object is received to receive and the signing certificate is written to the first confirmation message sent behind;
Generate encryption key to and sign and issue encrypted certificate;
The encryption key pair and the encrypted certificate are sent to the target object;
Receive the target object import the encryption key to and be written the encrypted certificate to from behind send second really Recognize message;
CA certificate is sent to the target object;
It receives the target object and the CA certificate is written to the third confirmation message sent behind.
3. the method according to claim 1, wherein the basis logs on to camera and the monitoring client of itself Before holding respective CA certificate, further includes:
The logging request that target object is sent is received, the target object includes the camera or the monitor client;
Challenge corresponding with the logging request is returned to the target object;
Receive that the target object sends to the identity documents generated after challenge signature;
Verify whether the identity documents are existing, if so, allowing the login of the target object.
4. the method according to claim 1, wherein the basis logs on to camera and the monitoring client of itself Before holding respective CA certificate, further includes:
The authorization administration information that Administrator Client sends is received, the authorization administration information is for indicating the monitor client Allow the camera information for belonging to the same family connected;
According to the respective CA certificate of camera and monitor client for logging on to itself, CA certificate and target monitoring client are determined CA certificate belong to the camera at same family's ca authentication center, be the target camera of the target monitoring client, packet It includes:
According to the respective CA certificate of camera and monitor client for logging on to itself, CA certificate and target monitoring client are determined CA certificate belong to same family's ca authentication center, and meet the camera of the authorization administration information, be the target The target camera of monitor client.
5. method according to any one of claims 1 to 4, which is characterized in that the determining CA certificate and target monitoring visitor The CA certificate at family end belongs to the camera at same family's ca authentication center, is the target camera of the target monitoring client Later, further includes:
The information of the target camera is sent to the target monitoring client;
Connection request that the target monitoring client is sent is transmitted to the target camera;
The first ID authentication request and first key for transmitting the target camera transmission negotiate request to the target monitoring Client;
The second ID authentication request that the target monitoring client is sent and the second key negotiation request are transmitted to the target Camera;
To the target camera and the target monitoring client by first ID authentication request and second body The identity of part certification request verifying other side is correct, and negotiates request and second key negotiation request by the first key After determining arranging key, request to the target for the acquisition audio, video data for forwarding the target monitoring client to send is taken the photograph As head;
Judge whether to receive the original audio, video data by the arranging key to acquisition that the target camera is sent The encrypted audio/video data generated after being encrypted, if so, forwarding the encrypted audio/video data to the target monitoring visitor Family end.
6. according to the method described in claim 5, it is characterized in that, the second of the transmission target monitoring client transmission After ID authentication request and the second key negotiation request to the target camera, the forwarding target monitoring client Before the request to the target camera of the acquisition audio, video data of transmission, further includes:
The acquisition P2P that the target camera and the target monitoring client are sent is received to burrow the request of parameter;
It sends the P2P and burrows parameter to the target camera and the target monitoring client;
Judge whether to receive the notice using transfer mode that the target monitoring client is sent, if so, described in forwarding Using the notice of transfer mode to the target camera, and execute the acquisition that the forwarding target monitoring client is sent The step of request of audio, video data to target camera;If it is not, then directly executing the forwarding target monitoring visitor The step of request to target camera for the acquisition audio, video data that family end is sent.
7. according to the method described in claim 5, it is characterized in that, described forward the encrypted audio/video data to the target After monitor client, further includes:
Forward the request of the target monitoring client transmission disconnected to the target camera;
Forward the target camera transmission confirms message to the target with the request disconnected the corresponding 4th Monitor client.
8. a kind of audio/video monitor and control system, which is characterized in that be applied in monitoring server, comprising:
Determining module, for according to itself camera and the respective CA certificate of monitor client is logged on to, determine CA certificate with The CA certificate of target monitoring client belongs to the camera at same family's ca authentication center, is the target monitoring client Target camera, so that the target monitoring client obtains the audio, video data of the target camera acquisition;
Wherein, the camera and the respective CA certificate of the monitor client are that respectively affiliated family's ca authentication center is issued Certificate, and family's ca authentication center of each family is different.
9. a kind of audio-video monitoring server characterized by comprising
Memory, for storing computer program;
Processor realizes audio-video monitoring side as described in any one of claim 1 to 7 when for executing the computer program The step of method.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer in the computer readable storage medium Program, the computer program realize audio-video monitoring method as described in any one of claim 1 to 7 when being executed by processor The step of.
CN201810878561.XA 2018-08-03 2018-08-03 Audio and video monitoring method and system, monitoring server and computer medium Active CN108989034B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810878561.XA CN108989034B (en) 2018-08-03 2018-08-03 Audio and video monitoring method and system, monitoring server and computer medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810878561.XA CN108989034B (en) 2018-08-03 2018-08-03 Audio and video monitoring method and system, monitoring server and computer medium

Publications (2)

Publication Number Publication Date
CN108989034A true CN108989034A (en) 2018-12-11
CN108989034B CN108989034B (en) 2021-09-14

Family

ID=64554839

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810878561.XA Active CN108989034B (en) 2018-08-03 2018-08-03 Audio and video monitoring method and system, monitoring server and computer medium

Country Status (1)

Country Link
CN (1) CN108989034B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114157646A (en) * 2021-11-05 2022-03-08 北方工业大学 Domestic password application system and application method for video monitoring terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1750650A (en) * 2005-10-31 2006-03-22 北京中星微电子有限公司 Monitoring system based on internet
CN101374141A (en) * 2007-08-23 2009-02-25 浙江省电信有限公司 TCP NAT crossing method base on PCP protocol
CN101848374A (en) * 2010-04-30 2010-09-29 大唐电信科技股份有限公司 Wireless video monitoring system and wireless video monitoring method thereof
CN103491540A (en) * 2013-09-18 2014-01-01 东北大学 Wireless local area network two-way access authentication system and method based on identity certificates
CN107888560A (en) * 2017-10-12 2018-04-06 深圳市中易通安全芯科技有限公司 A kind of mobile intelligent terminal mail security Transmission system and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1750650A (en) * 2005-10-31 2006-03-22 北京中星微电子有限公司 Monitoring system based on internet
CN101374141A (en) * 2007-08-23 2009-02-25 浙江省电信有限公司 TCP NAT crossing method base on PCP protocol
CN101848374A (en) * 2010-04-30 2010-09-29 大唐电信科技股份有限公司 Wireless video monitoring system and wireless video monitoring method thereof
CN103491540A (en) * 2013-09-18 2014-01-01 东北大学 Wireless local area network two-way access authentication system and method based on identity certificates
CN107888560A (en) * 2017-10-12 2018-04-06 深圳市中易通安全芯科技有限公司 A kind of mobile intelligent terminal mail security Transmission system and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
HOLGER KINKELIN等: "On Using TPM for Secure Identities in Future Home Networks", 《FUTURE INTERNET 2011》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114157646A (en) * 2021-11-05 2022-03-08 北方工业大学 Domestic password application system and application method for video monitoring terminal

Also Published As

Publication number Publication date
CN108989034B (en) 2021-09-14

Similar Documents

Publication Publication Date Title
CN108270571B (en) Internet of Things identity authorization system and its method based on block chain
US7552322B2 (en) Using a portable security token to facilitate public key certification for devices in a network
CN100580610C (en) Security link management method in dynamic networks
WO2018090183A1 (en) Identity authentication method, terminal device, authentication server and electronic device
TWI497336B (en) Data security devices and computer program
US8988187B2 (en) Proximity based biometric identification systems and methods
CN101340436B (en) Method and apparatus implementing remote access control based on portable memory apparatus
CN110537346A (en) Safe decentralization domain name system
CN106713279B (en) video terminal identity authentication system
CN105933280A (en) Identity authentication method and system
CN107277079A (en) A kind of across cloud customer certification system towards mixed cloud
TW201701226A (en) System, method, and apparatus for electronic prescription
CN105939196B (en) Identity identifying method and system
CN109412790A (en) A kind of user authentication of internet of things oriented and key agreement system and method
CN101610150B (en) Third-party digital signature method and data transmission system
CN101547095A (en) Application service management system and management method based on digital certificate
JP6609788B1 (en) Information communication device, authentication program for information communication device, and authentication method
CN105453099B (en) For showing the information processing equipment, information processing method and the computer program that correspond to the information of encryption key
JP6438901B2 (en) Authentication system, key processing cooperation method, and key processing cooperation program
CN111080858A (en) Bluetooth key logout method and device
CN109309910A (en) Communication data transmission method, system, equipment and computer readable storage medium
WO2014187210A1 (en) Method and system for backing up private key of electronic signature token
CN104539420A (en) General intelligent hardware safe secret key management method
CN108989034A (en) A kind of audio-video monitoring method, system, monitoring server and computer media
CN106331136A (en) Health record information processing system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 215011 23rd Floor, Building 3, Suzhou Pioneer Park, 209 Zhuyuan Road, Suzhou High-tech Zone, Jiangsu Province

Applicant after: Suzhou Guoxin Technology Co., Ltd.

Address before: 215011 23rd Floor, Building 3, Suzhou Pioneer Park, 209 Zhuyuan Road, Suzhou High-tech Zone, Jiangsu Province

Applicant before: C*Core Technology (Suzhou) Co., Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant