CN109639691A - Method, apparatus, computer equipment and the storage medium of monitoring data encryption - Google Patents

Method, apparatus, computer equipment and the storage medium of monitoring data encryption Download PDF

Info

Publication number
CN109639691A
CN109639691A CN201811558427.8A CN201811558427A CN109639691A CN 109639691 A CN109639691 A CN 109639691A CN 201811558427 A CN201811558427 A CN 201811558427A CN 109639691 A CN109639691 A CN 109639691A
Authority
CN
China
Prior art keywords
data
network equipment
monitoring data
encrypted
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811558427.8A
Other languages
Chinese (zh)
Other versions
CN109639691B (en
Inventor
李禄燊
黄训涛
张颖
马幸晖
王家宾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianyi Shilian Technology Co ltd
Original Assignee
CENTURY DRAGON INFORMATION NETWORK Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CENTURY DRAGON INFORMATION NETWORK Co Ltd filed Critical CENTURY DRAGON INFORMATION NETWORK Co Ltd
Priority to CN201811558427.8A priority Critical patent/CN109639691B/en
Publication of CN109639691A publication Critical patent/CN109639691A/en
Application granted granted Critical
Publication of CN109639691B publication Critical patent/CN109639691B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephonic Communication Services (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to method, apparatus, computer equipment and the storage mediums of monitoring data encryption.The described method includes: obtaining the monitoring data of the network equipment;Obtain the encryption key of server distribution;The encryption key is associated with the device identification of the personal code work of target user and the network equipment;The target user is the user that the client of binding relationship is established with the network equipment;The personal code work is corresponding with the user identifier that the target user logs in the client;The monitoring data is encrypted using the encryption key.The embodiment of the present invention solves the problems, such as that network equipment monitoring data is unsafe.

Description

Method, apparatus, computer equipment and the storage medium of monitoring data encryption
Technical field
The present invention relates to encryption and decryption technique fields, method, network more particularly to the encryption of network equipment monitoring data Device, computer equipment and the storage medium of monitoring of tools data encryption.
Background technique
As the network equipments such as web camera enter average family, while offering convenience for people's lives, also bring Many information security hidden danger.The monitoring data of the network equipment is frequently necessary to upload to cloud, such as the monitoring of web camera Video data needs to upload to cloud, and network transmission, the storage safety of video data protect the safety of cloud " private data ", It has been unavoidable problem.
However, often there is quilt in links such as the transmission of the monitoring data of the network equipment, played/reproduced, downloading, distributions The safety of situations such as malicious user is stolen, distorted, the monitoring data of the network equipment is difficult to be protected, and is set at present for network Standby monitoring data encryption mechanism is all relatively simple, and the monitoring data of the network equipment is easy to be intercepted and cracked by malicious third parties, The safety of the monitoring data of the network equipment is caused to be difficult to be protected.
Summary of the invention
Based on this, it is necessary to which what the safety for the monitoring data of the existing way network equipment was difficult to be protected asks Topic provides method, apparatus, computer equipment and the storage medium of a kind of monitoring data encryption.
In a first aspect, the embodiment of the present invention provides a kind of method of network equipment monitoring data encryption, comprising:
Obtain the monitoring data of the network equipment;
Obtain the encryption key of server distribution;The personal code work and the network of the encryption key and target user The device identification of equipment is associated with;The target user is the user that the client of binding relationship is established with the network equipment; The personal code work is corresponding with the user identifier that the target user logs in the client;
The monitoring data is encrypted using the encryption key.
It is in one embodiment, described that the monitoring data is encrypted using the encryption key, comprising:
The monitoring data is decomposed into video data and non-video data;
The partial data in the video data is obtained, as be-encrypted data;
The be-encrypted data is encrypted using the encryption key;
Data, other data in the video data other than be-encrypted data and the non-video that encryption is obtained Data combination, obtains encrypted monitoring data.
In one embodiment, the be-encrypted data belongs to the I frame data of video data.
In one embodiment, the data length of the be-encrypted data is less than or equal to 2048 bytes.
In one embodiment, the be-encrypted data are as follows:
(if NALU length-starting code lengths -1 of I frame data) >=2048 bytes, the data of the be-encrypted data Length is 2048 bytes;
If (NALU length-starting code lengths -1 of I frame data) < 2048 bytes, the data of the be-encrypted data are long Degree=(NALU length-starting code length -1)-(NALU length-starting code length -1) %16.
In one embodiment, after being encrypted using the encryption key to the be-encrypted data, further includes:
The NALU_TYPE of I frame data in the video data is revised as reserved field type.
In one embodiment, described that the monitoring data is encrypted using the encryption key, later further include:
The encrypted monitoring data is sent to storage server or the client;The storage server is used In the monitoring data for storing the network equipment.
Second aspect, the embodiment of the present invention provide a kind of device of network equipment monitoring data encryption, comprising:
Data acquisition module, for obtaining the monitoring data of the network equipment;
Encryption key obtains module, for obtaining the encryption key of server distribution;The encryption key and target user Personal code work and the network equipment device identification association;The target user is to establish to tie up with the network equipment Determine the user of the client of relationship;The personal code work is corresponding with the user identifier that the target user logs in the client;
Data encryption module, for being encrypted using the encryption key to the monitoring data.
The third aspect, the embodiment of the present invention provide a kind of computer equipment, including memory and processor, the memory It is stored with computer program, the processor realizes the network as described in above-mentioned any embodiment when executing the computer program The method of monitoring of tools data encryption.
Fourth aspect, the embodiment of the present invention provide a kind of computer storage medium, are stored thereon with computer program, the journey The method of the network equipment monitoring data encryption as described in above-mentioned any embodiment is realized when sequence is executed by processor.
A technical solution in above-mentioned technical proposal has the following advantages that or the utility model has the advantages that side through the foregoing embodiment Method waits for that the monitoring data of network transmission encrypts to the network equipment, can take into account following two points: first is that, different user uses same A network equipment, the data encryption key that the corresponding network equipment of different user uses is different, the number that different user uses It is also different according to decruption key;Second is that the same user uses heterogeneous networks equipment, the data encryption that heterogeneous networks equipment uses Key is different, and the data decryption key that user uses for heterogeneous networks equipment is also different;Thus the network equipment has been ensured Monitoring data safety.
Detailed description of the invention
Fig. 1 is the applied environment figure of the method for network equipment monitoring data encryption in one embodiment;
Fig. 2 is the schematic flow chart for the method that the network equipment monitoring data of an embodiment encrypts;
Fig. 3 is that the network equipment of an embodiment establishes the schematic flow chart of binding relationship with client;
Fig. 4 is that the client of an embodiment obtains the schematic flow chart of decruption key;
Fig. 5 is the schematic flow chart of another embodiment encrypted to the monitoring data;
Fig. 6 is the schematic flow chart of the decryption method of the monitoring data of an embodiment;
Fig. 7 is the schematic flow chart that monitoring data is decrypted of an embodiment;
Fig. 8 is the schematic flow chart of the encryption of network equipment monitoring data and decryption under a scene;
Fig. 9 is the schematic flow chart of the encryption of network equipment monitoring data and decryption under another scene;
Figure 10 is the schematic diagram for the device that the network equipment monitoring data of an embodiment encrypts;
Figure 11 is the schematic diagram of the decryption device of the network equipment monitoring data of an embodiment;
Figure 12 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
Referenced herein " embodiment " is it is meant that a particular feature, structure, or characteristic described can wrap in conjunction with the embodiments It is contained at least one embodiment of the application.Each position in the description occur the phrase might not each mean it is identical Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art explicitly and Implicitly understand, embodiment described herein can be combined with other embodiments.
The method of network equipment monitoring data encryption provided by the present application, is suitable for hardware environment shown in fig. 1, including move Dynamic terminal 100, cloud server 200 and the network equipment 300.
Wherein, the network equipment 300 has network connecting function, its monitoring data can be uploaded to cloud server 200 Storage, wherein monitoring data includes video data, voice data etc.;Mobile terminal 100 also has network connecting function, mobile According to there is the corresponding client of the network equipment 300 in terminal 100, user can be obtained by the client from cloud server 200 It takes the real time data of the network equipment bound 300 and/or historical data and shows;In addition, when mobile terminal 100 is set with network When for 300 in same local area network, which can also obtain real time data and the displaying of the network equipment 300 by local area network.
In embodiments of the present invention, cloud server 200 can be a server, include multiple in this server The service of different function, such as may include first service (i.e. equipment management service), second service (i.e. encryption key distribution service) And storage service;Cloud server 200 can also be the server cluster or cloud computing center being made of multiple servers, example It such as may include first server (i.e. device management server), second server (i.e. key distribution servers) and storage clothes Business device;Wherein, equipment management service/device management server is used to be the binding for establishing the network equipment 300 Yu client user Relationship, encryption key distribution service/key distribution servers be used for for the network equipment 300 and client user distribution encrypt accordingly it is close Key and decruption key;Storage service/storage server can be used for the monitoring data of storage networking device 300, logical convenient for user Cross the historical data playback that client realizes the network equipment 300.
In the embodiment of the present invention, the network equipment 300 can use cloud server 200 before transmitting its monitoring data The encryption key of distribution encrypts monitoring data, then transmits encrypted monitoring data to client or cloud service Device 200;The prison for the network equipment 300 that the monitoring data for the network equipment 300 that client is got, cloud server 200 store Data are controlled, are by the monitoring data of 300 encryption of the network equipment, client can be distributed using cloud server 200 Decruption key monitoring data is decrypted, exoergic is checked.
According to an embodiment of the present invention, the network equipment 300 is the video camera that can be networked, and mobile terminal 100 can be hand Machine is equipped with corresponding APP (i.e. above-mentioned client) in mobile phone, and user can watch the video camera bound by the APP Real-time monitoring data, or the operation such as history playback is carried out to the monitoring data of the video camera bound;User logs in the APP Later, which just represents user identity.The APP also its log in the APP in user with two-dimensional code scanning and identification function Later, can be by the two dimensional code of APP smear camera, and then establish the binding that the current login user of APP retouches video camera with this Relationship.In the embodiment of the present invention, it is only bundled with the APP user of video camera, just has permission the monitoring data progress to video camera Viewing or playback operation etc. in real time.
Optionally, above-mentioned network is usually internet but it is also possible to be other networks, including but not limited to local area network (Local Area Network, LAN), Metropolitan Area Network (MAN) (Metropolitan Area Network, MAN), wide area network (Wide Area Network, WAN), the combination of one or more of dedicated network or Virtual Private Network.
In one embodiment, as shown in Fig. 2, a kind of method of network equipment monitoring data encryption is provided, with the party Method is applied to be illustrated for the network equipment end in Fig. 1, comprising the following steps:
S110 obtains the monitoring data of the network equipment.
S120 obtains the encryption key of server distribution;The personal code work and institute of the encryption key and target user State the device identification association of the network equipment;The target user is the client that binding relationship is established with the network equipment User;The personal code work is corresponding with the user identifier that the target user logs in the client.
In the embodiment of the present invention, the server be for distribute respectively for the network equipment and client user encrypt it is close The service of key and decruption key or server, encryption key distribution service/key distribution servers as escribed above.Wherein, it services Device is the network equipment and client user distributes encryption key respectively and the specific implementation of decruption key will hereinafter It illustrates.
In the embodiment of the present invention, client is mounted in the application program in the mobile terminals such as mobile phone, plate, such as APP, Different user can register corresponding account, and it is different that different user logs in the user identifier that client uses;Different user It is also different to identify corresponding personal code work.According to an embodiment of the present invention, corresponding personal code work is obtained based on user identifier Mode may include: according to user identifier generate setting length character string, such as by user identifier generate 64 words Symbol string, as the corresponding personal code work of user identifier.In the following description, personal code work also is indicated with UserKey.
In the embodiment of the present invention, client user and the network equipment are established after binding relationship, could pass through login visitor The monitoring data of the network equipment is watched at family end.One client user can establish binding relationship with multiple network equipments, and one A network equipment can also establish binding relationship with multiple client user;The server can be according to user and the network equipment Binding relationship, be that the login user of the network equipment and client distributes corresponding key, so that different user binding is the same as a When the network equipment, the network equipment is different for the corresponding encryption key used of different user, and different user is to the network equipment The data decryption key used when monitoring data is decrypted is also different;Also, the same user binds multiple and different networks and sets When standby, the encryption key that heterogeneous networks equipment is used for the user is different, which is directed to the solution that heterogeneous networks equipment uses Key is also different.Wherein, the specific implementation that the network equipment and client establish binding relationship will hereinafter specifically It is bright.
S130 encrypts the monitoring data using the encryption key.
Encryption method through the foregoing embodiment can be using a kind of preferred after the network equipment gets monitoring data Encryption key monitoring data is encrypted, the personal code work and equipment of itself of the encryption key and target user mark are closed Connection, thus bring technical effect includes: for different users, and the network equipment can be supervised using different encryption keys The encryption of data is controlled, and then after the monitoring data that receives of different user, will be unable to be solved according to the same decruption key It is close, the safety of the monitoring data of the network equipment has thus been ensured from data sending terminal.
An embodiment according to the present invention, as shown in connection with fig. 3, the network equipment establish the specific implementation of binding relationship with client Mode and server are the specific implementation side that the network equipment and client user distribute encryption key and decruption key respectively Formula, comprising the following steps:
S1, client obtain the device identification of the network equipment and the user identifier of login user;
According to an embodiment of the present invention, the mode that client obtains the device identification of the network equipment includes: that client is swept The two dimensional code on the network equipment is retouched, the device identification of the network equipment is obtained by the two dimensional code.Wherein, the two dimensional code can pass through The display screen of equipment is shown, is either printed or is attached on the shell of the network equipment.
S2, client carry the use in the apparatus bound request to first server sending device bind request Family mark and the device identification.
S3, the first server are requested to obtain the user identifier and the device identification by the apparatus bound, raw At personal code work corresponding with the user identifier, the personal code work is sent to the corresponding network of the device identification and is set It is standby.
S4 after the network equipment receives the personal code work, sends encryption key requests to second server;Institute State the device identification that the personal code work and the network equipment are carried in encryption key requests.
S5 after the second server receives the encryption key requests, is generated and the personal code work and institute The associated encryption key of device identification is stated, the Xiang Suoshu network equipment sends the encryption key.
In the embodiment of the present invention, first server, second server can be two independent servers, be also possible to belong to Two service processes in same server.
An embodiment according to the present invention, the network equipment are the video camera that can be networked, and the user identifier is User ID, described Device identification can be unique factory number of video camera;The personal code work can according to user identifier generate setting it is long The character string of degree, such as 64 character strings generated by user identifier.In the following description, UserKey table is also used Show personal code work.
S6, after receiving the encryption key that second server issues, Xiang Suoshu second server is sent the network equipment The successful response message of key reception;
S7, after the second server receives the response message, Xiang Suoshu client sending device binding success Message;
S8 after the client receives the successful message of apparatus bound, the network equipment is added to have bound sets It is standby, for example, the network equipment is added in bound device list.
So far, user sets up the binding relationship of user and the network equipment by the client installed in mobile terminal, this After user logs in client afterwards, the network equipment bound can be checked, and watch the real-time monitoring data of the network equipment And/or history monitoring data.But the real-time monitoring data and/or history prison that client checks the network equipment are logged in user Before controlling data, also need to obtain the corresponding decruption key of the network equipment, which is used for the real-time of the network equipment Monitoring data and/or history monitoring data are decrypted.
Further, according to an embodiment of the present invention, refering to what is shown in Fig. 4, what the acquisition of client login user had been bound The process of the decruption key of the network equipment includes:
1, user logs in APP (i.e. client), obtains the user identifier of currently logged on user;
2, the network equipment that selection active user has bound, as target device;
3, APP sends decryption key request to second server;Carry currently logged on user's in the decryption key request The device identification of user identifier and the target device.
4, second server obtains user corresponding with the user identifier after receiving decryption key request first Code;Then the associated decruption key of device identification with the personal code work and the target device is obtained, is sent to APP;
5, APP saves decruption key, is decrypted for the subsequent monitoring data to the target device.
An embodiment according to the present invention, the network equipment are the video camera that can be networked, and device identification can be for video camera only One factory number;User identifier can be the id information that user logs in client, and personal code work can be the setting length of generation Character string, such as by user identifier generate 64 character strings.
For the monitoring data of the network equipment, traditional Encryption Algorithm is usually monitoring data as straight binary number According to being encrypted using Encryption Algorithm such as DES, AES of standard, usual operand is larger, is unable to satisfy the monitoring of the network equipment The requirement of real-time property transmission.
An embodiment according to the present invention, refering to what is shown in Fig. 5, the network equipment is using the encryption key to the monitoring data The specific implementation encrypted can include:
The monitoring data is decomposed into video data and non-video data by S501;
S502 obtains the partial data in the video data, as be-encrypted data;
S503 encrypts the be-encrypted data using the encryption key;
S504, the data that encryption is obtained, other data in the video data other than be-encrypted data and described Non-video data combination, obtains encrypted monitoring data.
According to an embodiment of the present invention, the monitoring data encryption of the network equipment, is the key that in monitoring data Data encryption, the encryption of not all data.Such as: be-encrypted data can be the I frame data for belonging to video data;This Outside, the data length that can set the be-encrypted data is less than or equal to 2048 bytes, specifically for example:
(if NALU length-starting code lengths -1 of I frame data) >=2048 bytes, the data of the be-encrypted data Length is 2048 bytes;
If (NALU length-starting code lengths -1 of I frame data) < 2048 bytes, the data of the be-encrypted data are long Degree=(NALU length-starting code length -1)-(NALU length-starting code length -1) %16.
According to H.264 and H.265 agreement provides that H.264 and H.265 video stream format master data unit is NAL unit, Namely NALU.In order to extract NALU from byte stream, agreement regulation adds initial code before each NALU: 0x000001 or 0x00000001 (0x represents hexadecimal), i.e., H.264 or H.265 video stream format is as follows:
H.264 or H.265 bit stream=initial code+NALU+ initial code+NALU+ ...
Video flowing is exported in the form of NALU, and each NALU is in addition to initial code by the NALU of a byte Header and RBSP composition.Wherein:
RBSP: initial data byte stream (also known as payload data), the partial data belong to the embodiment of the present invention and need to encrypt Data.
NALU Header: some attribute informations for describing NAL unit.Wherein NAL unit type attribute (is hereafter used NALU_UNIT_TYPE is indicated), for describing NAL unit payload data (RBSP) type definition, different NALU_UNIT_TYPE Value represent different meanings unit payload data segment, for example, representing RBSP is IDR as NALU_UNIT_TYPE=5 The segment (also known as I frame) of image.
According to above-described embodiment, encrypted data are the H.264 or H.265 part numbers in each I frame of video flowing According to can both protect key video sequence data, can also reduce encryption/decryption processes to the expense of equipment;When encryption, non-I frame is skipped NALU (i.e. NALU data of the NALU_UNIT_TYPE not equal to 5 in NALU Header), for the NALU for belonging to I frame, removes Beginning code and the subsequent 2KB data of NALU Header are encrypted (the 2K data i.e. in RBSP data), if NALU curtailment 2KB, encrypted data length are 16 times of downward rounding values of length after removing initial code and NALU Header.Such as:
(if NALU length-initial code -1) >=2048 bytes;Encrypted data length=2048;
(if NALU length-initial code -1) < 2048 bytes;
Encrypted data length=(NALU length-initial code -1)-(NALU length-initial code -1) %16;Originate code length: It H.264 be 4, H265 is 6, H.265 two more than H264 byte is mark H.265.
It through the foregoing embodiment, before monitoring data transmission to network is encrypted by the network equipment, encryption is calculated Method can use the close SM4 of state, and encryption key is stored in advance in the encryption key in video camera.Client decryption uses corresponding SM4 algorithm and the decruption key for being stored in advance in client, by Video Decoder to after decryption frame and other frames fold Adduction rendering plays.Due to only carrying out encryption/decryption process to the data for being no more than 2048 bytes in I frame data, it ensure that and add The efficiency of close/decryption, ensure that the efficiency of transmission of monitoring data.
Further, according to an embodiment of the present invention, the network equipment is in the use encryption key to described to be encrypted After data are encrypted, the NALU_UNIT_TYPE of the I frame data in the video data is revised as reserved field type; Such as the NALU_UNIT_TYPE in I frame data is revised as 3 (NALU_UNIT_TYPE&0x1F=of reserved field Class1 13);Encrypted data are identified after obtaining data so as to client, and then are decrypted.
Through the foregoing embodiment, based on a small amount of encryption key data in monitoring data, the data file for encrypting front and back becomes Change and only increase by tens bytes, is consistent size substantially, does not increase network transmission pressure, ensure that the monitoring number of the network equipment According to encryption/decryption efficiency, advantageously ensure that the efficiency of the monitoring data transmission of the network equipment.
Further, after the critical data in monitoring data is encrypted in the network equipment, by encrypted prison Control data are sent to corresponding client and/or storage server;Here storage server is set for storing the network Standby monitoring data.When there is the real-time monitoring data of the client request viewing network equipment, can directly be asked to the network equipment Seek the real-time monitoring data by encryption;When there are the history playback data of the client request viewing network equipment, can pass through Access storage server obtains the monitoring data by encryption in setting historical time section of the network equipment.
Method through the foregoing embodiment encrypts the monitoring data of the network equipment, can take into account following two points: one It is that different user use is with a network equipment, and the data encryption key that the network equipment is used for different user is different, no The data decryption key used with user is also different;Second is that the same user uses heterogeneous networks equipment, heterogeneous networks equipment The data encryption key of use is different, and the data decryption key that user uses for heterogeneous networks equipment is also different.As a result, Guarantee the safety of the monitoring data of the network equipment to greatest extent.
In one embodiment, as shown in fig. 6, a kind of decryption method of network equipment monitoring data is provided, with the party Method is applied to be illustrated for the mobile terminal in above system environment, and the executing subject of following steps can be mobile whole The client (APP) installed in end.The decryption method of network equipment monitoring data the following steps are included:
S601 receives the monitoring data of the network equipment;It is established between the network equipment and the login user of client Binding relationship;
S602 obtains the decruption key of server distribution, the use of the decruption key and the login user of the client The device identification of family code and the network equipment is associated with;The user of the personal code work and the login user of the client Mark corresponds to;
S603 is decrypted the monitoring data using the decruption key.
According to an embodiment of the present invention, the implementation that client receives the monitoring data of the network equipment can wrap It includes:
Client receives the monitoring data from the network equipment;Alternatively, client is received from storage server The monitoring data of the network equipment, the storage server are used to store the monitoring data of the network equipment.
According to an embodiment of the present invention, it before client receives the step of monitoring data of the network equipment, also wraps Include: client sends the first request of data to the network equipment;Alternatively, client sends the second number to the storage server According to request;User's mark of the login user of the client is carried in first request of data, the second request of data Know.
According to an embodiment of the present invention, first request of data is real time data request;Second request of data For data readback request.Implement scene is for example:
If client receives the trigger event of the real-time monitoring data for watching the network equipment, to the net Network equipment sends the first request of data;If client receives the triggering thing of the playback of data for watching the network equipment Part then sends the second request of data to the storage server.
According to an embodiment of the present invention, shown in Figure 7, client is using the decruption key to the monitoring data The embodiment being decrypted specifically includes:
The monitoring data is decomposed into video data and non-video data by S701;
S702 obtains the encryption data in the video data, as data to be decrypted;
S703 is decrypted the data to be decrypted using the decruption key;
S704, the data that decryption is obtained, in the video data encryption data with for data and the non-video Data combination, the monitoring data after being decrypted.
According to an embodiment of the present invention, the data to be decrypted are corresponding with the be-encrypted data of above-described embodiment, that is, belong to I frame data in the video data, for details, reference can be made to described in above-described embodiment.
Below by taking the video camera that can be networked as an example, the network equipment monitoring data of above-described embodiment is encrypted and decrypted Method is further illustrated by.
Refering to what is shown in Fig. 8, after user logs in client, if the real-time monitoring data of selection viewing video camera, video camera Monitoring data encryption and decrypting process it is as follows:
1, user A logs in client, and video camera 001 is selected from bound device;
2, it is directed to video camera 001, user triggers the operation of real time data viewing;Client is sent in real time to video camera 001 Monitoring data request;It include the personal code work of user A in real-time monitoring data request, the personal code work can pass through user The user identifier of A generates;
3, video camera 001 generates real-time monitoring data;And it is identified according to the personal code work of user A and equipment of itself, selection Suitable encryption key;Real-time monitoring data is encrypted using the encryption key.
In one embodiment, real-time monitoring data is encrypted using SM4 algorithm, in order to further increase encryption Efficiency and data transmission efficiency are added using I frame of the SM4 algorithm to video data in real-time monitoring data in some embodiments It is close.SM4 algorithm and aes algorithm key length all having the same, are higher than DES algorithm in safety, and SM4 algorithm was calculating Increase nonlinear transformation in journey, the safety of its algorithm can be improved.
4, encrypted real-time monitoring data is transferred to client by video camera 001.
5, client selects suitable decruption key according to the device identification of the personal code work and video camera 001 of user A, The real-time monitoring data received is decrypted, the monitor video after playing decryption.
In one embodiment, client carries out data deciphering, the number that decrypting process and camera shooting generator terminal carry out using SM4 algorithm Corresponding according to ciphering process, the monitoring data after finally output decryption is played out to player.
Refering to what is shown in Fig. 9, in the case where the history monitoring data of client user B viewing video camera 002, video camera The encryption of monitoring data and decrypting process are as follows:
1, the monitoring data generated in 002 side of video camera, video camera 002;According to user's generation of the user B of current bindings Code and equipment of itself mark, select suitable encryption key;Monitoring data is encrypted using the encryption key.
2, video camera 002 gives encrypted monitoring data transmission to the storage server.
3, storage server receives the monitoring data by encryption and preservation that video camera 002 is sent.
4, user B logs in client, and video camera 002 is selected from bound device;
5, it is directed to video camera 002, user triggers the operation of history monitoring data viewing;Client is sent to storage server Historical data request;It include the device identification of the personal code work and video camera 002 of user B in monitoring data request, it is described Personal code work can be generated by the user identifier of user B;
6, when storage server receives the historical data request of client, from the monitoring data of preservation, acquisition is taken the photograph History monitoring data of the camera 002 in the corresponding period, and it is sent to client.
7, client selects suitable solution according to the device identification of the personal code work and video camera 002 of currently logged on user B The history monitoring data of the video camera 002 received is decrypted in key, and is regarded by the monitoring after client terminal playing decryption Frequently.
An embodiment according to the present invention, video camera is in being encrypted monitoring data, only to video counts therein According to being encrypted, PostScript format text is encapsulated into other data packings such as audio datas after video data encryption Part is sent to client or storage server.Therefore, the monitoring data of storage server storage is PostScript format text Part.When client checks history monitoring data, PostScript formatted file is pulled from storage server;It is view by file declustering Frequency evidence and other data (i.e. non-video data), other data include audio data etc.;Use SM4 algorithm and corresponding solution Obtained video data is decrypted in key, then by after decryption video data and non-video data be overlapped, obtain Monitoring data after to decryption;Monitoring data after being decrypted by the client terminal playing.
It should be understood that for the various method embodiments described above, although each step in flow chart is according to arrow Instruction is successively shown, but these steps are not that the inevitable sequence according to arrow instruction successively executes.Unless having herein bright True explanation, there is no stringent sequences to limit for the execution of these steps, these steps can execute in other order.And And at least part step in the flow chart of embodiment of the method may include multiple sub-steps or multiple stages, this is a little Step or stage are not necessarily to execute completion in synchronization, but can execute at different times, these sub-steps Perhaps the execution sequence in stage be also not necessarily successively carry out but can with the sub-step of other steps or other steps or At least part in person's stage executes in turn or alternately.
Based on thought identical with the method for network equipment monitoring data encryption in above-described embodiment, it is also provided herein one The embodiment of the device of kind network equipment monitoring data encryption.As shown in Figure 10, the network equipment monitoring data of the present embodiment adds Close device includes:
Data acquisition module 601, for obtaining the monitoring data of the network equipment;
Encryption key obtains module 602, for obtaining the encryption key of server distribution;The encryption key and target are used The device identification of the personal code work at family and the network equipment is associated with;The target user is to establish with the network equipment The user of the client of binding relationship;The personal code work and the target user log in the user identifier pair of the client It answers;
Data encryption module 603, for being encrypted using the encryption key to the monitoring data.
Based on thought identical with the decryption method of network equipment monitoring data in above-described embodiment, it is also provided herein one The embodiment of the decryption device of kind network equipment monitoring data.As shown in figure 11, the network equipment monitoring data of the present embodiment Decrypting device includes:
Data reception module 701, for receiving the monitoring data of the network equipment;The login of the network equipment and client Binding relationship is established between user;
Decruption key obtains module 702, for obtaining the decruption key of server distribution, the decruption key and the visitor The device identification of the personal code work of the login user at family end and the network equipment is associated with;The personal code work and the client The user identifier of the login user at end is corresponding;
Data decryption module 703, for the monitoring data to be decrypted using the decruption key.
About network equipment monitoring data encryption/decryption device, may refer to monitor number above for the network equipment According to the restriction of encrypting/decrypting method, details are not described herein.It is each in the device of above-mentioned network equipment monitoring data encryption/decryption A module can be realized fully or partially through software, hardware and combinations thereof.Above-mentioned each module can be embedded in the form of hardware or Independently of in the processor in computer equipment, can also be stored in a software form in the memory in computer equipment, with It is called convenient for processor and executes the corresponding operation of the above modules.
In addition, in the embodiment of network equipment monitoring data encryption/decryption device of above-mentioned example, each program module Logical partitioning be merely illustrative of, can according to need in practical application, for example, for corresponding hardware configuration requirement or The convenient of the realization of software considers, above-mentioned function distribution is completed by different program modules, i.e., is monitored the network equipment The internal structure of the device of data encryption/decryption is divided into different program modules, to complete whole described above or portion Divide function.
In one embodiment, a kind of computer equipment is provided, which can be mobile terminal or net Network equipment, internal structure chart are shown in Fig.12.The computer equipment includes the processor connected by system bus, deposits Reservoir, network interface and database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The calculating The memory of machine equipment includes non-volatile memory medium, built-in storage.The non-volatile memory medium be stored with operating system, Computer program and database.The built-in storage is the operation of the operating system and computer program in non-volatile memory medium Environment is provided.Device or network equipment prison of the database of the computer equipment for the encryption of storage networking device monitoring data Control the related data of the decryption device of data.The network interface of the computer equipment is used to pass through network connection with external terminal Communication.To realize a kind of method that network equipment monitoring data encrypts or a kind of net when the computer program is executed by processor The decryption method of network monitoring of tools data.
It will be understood by those skilled in the art that structure shown in Figure 12, only part relevant to application scheme The block diagram of structure, does not constitute the restriction for the computer equipment being applied thereon to application scheme, and specific computer is set Standby may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment, including memory and processor are provided, is stored in memory Computer program, the processor perform the steps of when executing computer program
Obtain the monitoring data of the network equipment;
Obtain the encryption key of server distribution;The personal code work and the network of the encryption key and target user The device identification of equipment is associated with;The target user is the user that the client of binding relationship is established with the network equipment; The personal code work is corresponding with the user identifier that the target user logs in the client;
The monitoring data is encrypted using the encryption key.
In one embodiment, also realize that network is set in above-mentioned other embodiments when the processor executes computer program The step of method of standby monitoring data encryption includes.
In one embodiment, a kind of computer equipment, including memory and processor are provided, is stored in memory Computer program, the processor perform the steps of when executing computer program
Receive the monitoring data of the network equipment;Binding is established between the network equipment and the login user of client to close System;
Obtain the decruption key of server distribution, the personal code work of the decruption key and the login user of the client And the device identification association of the network equipment;The user identifier pair of the personal code work and the login user of the client It answers;
The monitoring data is decrypted using the decruption key.
In one embodiment, also realize that network is set in above-mentioned other embodiments when the processor executes computer program The step of decryption method of standby monitoring data includes.
Another embodiment provides a kind of computer readable storage mediums, are stored thereon with computer program, meter Calculation machine program performs the steps of when being executed by processor
Obtain the monitoring data of the network equipment;
Obtain the encryption key of server distribution;The personal code work and the network of the encryption key and target user The device identification of equipment is associated with;The target user is the user that the client of binding relationship is established with the network equipment; The personal code work is corresponding with the user identifier that the target user logs in the client;
The monitoring data is encrypted using the encryption key.
Another embodiment provides a kind of computer readable storage mediums, are stored thereon with computer program, meter Calculation machine program performs the steps of when being executed by processor
Receive the monitoring data of the network equipment;Binding is established between the network equipment and the login user of client to close System;
Obtain the decruption key of server distribution, the personal code work of the decruption key and the login user of the client And the device identification association of the network equipment;The user identifier pair of the personal code work and the login user of the client It answers;
The monitoring data is decrypted using the decruption key.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, To any reference of memory, storage, database or other media used in each embodiment provided herein, Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance Shield all should be considered as described in this specification.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment Point, it may refer to the associated description of other embodiments.
The term " includes " of embodiment hereof and " having " and their any deformations, it is intended that cover non-exclusive packet Contain.Such as contain series of steps or the process, method, system, product or equipment of (module) unit are not limited to arrange Out the step of or unit, but optionally further comprising the step of not listing or unit, or optionally further comprising for these mistakes The intrinsic other step or units of journey, method, product or equipment.
Referenced herein " multiple " refer to two or more."and/or", the association for describing affiliated partner are closed System indicates may exist three kinds of relationships, for example, A and/or B, can indicate: individualism A exists simultaneously A and B, individualism These three situations of B.Character "/" typicallys represent the relationship that forward-backward correlation object is a kind of "or".
Referenced herein " first second " be only be the similar object of difference, do not represent for the specific of object Sequence, it is possible to understand that specific sequence or precedence can be interchanged in ground, " first second " in the case where permission.It should manage The object that solution " first second " is distinguished is interchangeable under appropriate circumstances so that the embodiments described herein can in addition to Here the sequence other than those of diagram or description is implemented.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.

Claims (10)

1. a kind of method of network equipment monitoring data encryption characterized by comprising
Obtain the monitoring data of the network equipment;
Obtain the encryption key of server distribution;The personal code work and the network equipment of the encryption key and target user Device identification association;The target user is the user that the client of binding relationship is established with the network equipment;It is described Personal code work is corresponding with the user identifier that the target user logs in the client;
The monitoring data is encrypted using the encryption key.
2. the method according to claim 1, wherein it is described using the encryption key to the monitoring data into Row encryption, comprising:
The monitoring data is decomposed into video data and non-video data;
The partial data in the video data is obtained, as be-encrypted data;
The be-encrypted data is encrypted using the encryption key;
Data, other data and the non-video data in the video data other than be-encrypted data that encryption is obtained Combination, obtains encrypted monitoring data.
3. according to the method described in claim 2, it is characterized in that,
The be-encrypted data belongs to the I frame data of video data.
4. according to the method described in claim 3, it is characterized in that,
The data length of the be-encrypted data is less than or equal to 2048 bytes.
5. according to the method described in claim 4, it is characterized in that, the be-encrypted data are as follows:
(if NALU length-starting code lengths -1 of I frame data) >=2048 bytes, the data length of the be-encrypted data For 2048 bytes;
If (NALU length-starting code lengths -1 of I frame data) < 2048 bytes, the data length of the be-encrypted data= (NALU length-starting code length -1)-(NALU length-starting code length -1) %16.
6. according to the method described in claim 5, it is characterized in that, using the encryption key to the be-encrypted data into After row encryption, further includes:
The NALU_TYPE of I frame data in the video data is revised as reserved field type.
7. method according to any one of claims 1 to 6, which is characterized in that described to use the encryption key to the prison Control data are encrypted, later further include:
The encrypted monitoring data is sent to storage server or the client;The storage server is for depositing Store up the monitoring data of the network equipment.
8. a kind of device of network equipment monitoring data encryption characterized by comprising
Data acquisition module, for obtaining the monitoring data of the network equipment;
Encryption key obtains module, for obtaining the encryption key of server distribution;The use of the encryption key and target user The device identification of family code and the network equipment is associated with;The target user is to establish binding with the network equipment to close The user of the client of system;The personal code work is corresponding with the user identifier that the target user logs in the client;
Data encryption module, for being encrypted using the encryption key to the monitoring data.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists In, the processor realizes claim 1 to 7 any the method when executing described program the step of.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor The step of claim 1 to 7 any the method is realized when execution.
CN201811558427.8A 2018-12-19 2018-12-19 Method and device for monitoring data encryption, computer equipment and storage medium Active CN109639691B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811558427.8A CN109639691B (en) 2018-12-19 2018-12-19 Method and device for monitoring data encryption, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811558427.8A CN109639691B (en) 2018-12-19 2018-12-19 Method and device for monitoring data encryption, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109639691A true CN109639691A (en) 2019-04-16
CN109639691B CN109639691B (en) 2021-11-12

Family

ID=66075618

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811558427.8A Active CN109639691B (en) 2018-12-19 2018-12-19 Method and device for monitoring data encryption, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109639691B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111918235A (en) * 2020-07-20 2020-11-10 南京暴走团电子商务有限公司 Data monitoring system for wireless communication and monitoring method thereof
CN112448811A (en) * 2019-09-03 2021-03-05 上海云从汇临人工智能科技有限公司 Data security management method, data security management device and data security management system
CN113038281A (en) * 2019-12-09 2021-06-25 浙江宇视科技有限公司 Video playing method, device, equipment and storage medium
CN113839922A (en) * 2021-08-25 2021-12-24 国网新疆电力有限公司喀什供电公司 Video monitoring system information safety protection system and method
CN114091041A (en) * 2022-01-13 2022-02-25 深圳市猿人创新科技有限公司 Data transmission method, device, equipment and medium based on embedded equipment
CN114827671A (en) * 2022-03-21 2022-07-29 慧之安信息技术股份有限公司 Stream media encryption transmission method based on hardware fingerprint
EP4084484A1 (en) * 2021-04-27 2022-11-02 Streamax Technology Co., Ltd. Method and device for encryption of video stream, communication equipment, and storage medium
WO2023184262A1 (en) * 2022-03-30 2023-10-05 北京小米移动软件有限公司 Secure transmission method and apparatus for data frames, electronic device and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102340650A (en) * 2010-07-19 2012-02-01 中国移动通信集团公司 Method and system for video monitoring of terminal
CN104244026A (en) * 2014-09-04 2014-12-24 浙江宇视科技有限公司 Secret key distribution device in video monitoring system
CN104270614A (en) * 2014-10-16 2015-01-07 浙江宇视科技有限公司 Video encryption and decryption method and device
CN104735457A (en) * 2015-03-27 2015-06-24 南京中新赛克科技有限责任公司 Video encryption and decryption method based on H.264 code
CN105812140A (en) * 2014-12-31 2016-07-27 上海庆科信息技术有限公司 Authorization access method
US20170127104A1 (en) * 2015-10-30 2017-05-04 Rovi Guides, Inc. Methods and systems for monitoring content subscription usage
CN108449563A (en) * 2018-02-01 2018-08-24 晨星半导体股份有限公司 To the method and system of audio and video encryption and decryption
CN108777677A (en) * 2018-05-18 2018-11-09 上海小蚁科技有限公司 cloud storage data security protection method and device, storage medium, camera, computing device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102340650A (en) * 2010-07-19 2012-02-01 中国移动通信集团公司 Method and system for video monitoring of terminal
CN104244026A (en) * 2014-09-04 2014-12-24 浙江宇视科技有限公司 Secret key distribution device in video monitoring system
CN104270614A (en) * 2014-10-16 2015-01-07 浙江宇视科技有限公司 Video encryption and decryption method and device
CN105812140A (en) * 2014-12-31 2016-07-27 上海庆科信息技术有限公司 Authorization access method
CN104735457A (en) * 2015-03-27 2015-06-24 南京中新赛克科技有限责任公司 Video encryption and decryption method based on H.264 code
US20170127104A1 (en) * 2015-10-30 2017-05-04 Rovi Guides, Inc. Methods and systems for monitoring content subscription usage
CN108449563A (en) * 2018-02-01 2018-08-24 晨星半导体股份有限公司 To the method and system of audio and video encryption and decryption
CN108777677A (en) * 2018-05-18 2018-11-09 上海小蚁科技有限公司 cloud storage data security protection method and device, storage medium, camera, computing device

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112448811A (en) * 2019-09-03 2021-03-05 上海云从汇临人工智能科技有限公司 Data security management method, data security management device and data security management system
CN113038281A (en) * 2019-12-09 2021-06-25 浙江宇视科技有限公司 Video playing method, device, equipment and storage medium
CN113038281B (en) * 2019-12-09 2023-05-05 浙江宇视科技有限公司 Video playing method, device, equipment and storage medium
CN111918235A (en) * 2020-07-20 2020-11-10 南京暴走团电子商务有限公司 Data monitoring system for wireless communication and monitoring method thereof
EP4084484A1 (en) * 2021-04-27 2022-11-02 Streamax Technology Co., Ltd. Method and device for encryption of video stream, communication equipment, and storage medium
CN113839922A (en) * 2021-08-25 2021-12-24 国网新疆电力有限公司喀什供电公司 Video monitoring system information safety protection system and method
CN113839922B (en) * 2021-08-25 2024-01-30 国网新疆电力有限公司喀什供电公司 Information safety protection system and method for video monitoring system
CN114091041A (en) * 2022-01-13 2022-02-25 深圳市猿人创新科技有限公司 Data transmission method, device, equipment and medium based on embedded equipment
CN114827671A (en) * 2022-03-21 2022-07-29 慧之安信息技术股份有限公司 Stream media encryption transmission method based on hardware fingerprint
WO2023184262A1 (en) * 2022-03-30 2023-10-05 北京小米移动软件有限公司 Secure transmission method and apparatus for data frames, electronic device and storage medium

Also Published As

Publication number Publication date
CN109639691B (en) 2021-11-12

Similar Documents

Publication Publication Date Title
CN109639691A (en) Method, apparatus, computer equipment and the storage medium of monitoring data encryption
CN109495258A (en) Method and device for decrypting monitoring data, computer equipment and storage medium
KR100957121B1 (en) Key distribution method and authentication server
DE60018716T2 (en) INFORMATION PROTECTION IN A TRANSMISSION SYSTEM
US7698568B2 (en) System and method for using DRM to control conditional access to broadband digital content
CN109218825B (en) Video encryption system
CN110401818B (en) Safe communication system for power video transmission
CN107948736A (en) A kind of audio and video preservation of evidence method and system
CN105704545B (en) A kind of crypto-synchronization information transmission method based on H.264 video flowing
CN107809436B (en) Authority authentication method, encryption method, device and system for network video access
US20080063195A1 (en) Method and system for encrypting or decrypting wmv streaming media
CN106470345A (en) Video-encryption transmission method and decryption method, apparatus and system
CN110912690A (en) Data encryption and decryption method, vehicle and storage medium
CN104519013B (en) Ensure the method, apparatus and system of media stream safety
CN107948676A (en) Method of transmitting video data and device
CN112104454B (en) Data secure transmission method and system
CN102100031A (en) Apparatus and method for providing a security service in a user interface
CN105049877A (en) Encryption method and device for live and recorded broadcast interaction system
CN106657110A (en) Encrypted transmission method and apparatus of streaming data
CN103973937A (en) Information hiding method based on wireless multimedia sensor network
CN112511299B (en) Interface data transmission method and device, electronic equipment and storage medium
CN101150395A (en) A L4 encryption method of double group of encrypted authorization management system
CN113727058A (en) Multimedia conference data processing method, system, equipment and storage medium
US20230208615A1 (en) Online-Streamer Image Model File Transmission in Co-Hosting During Livestreaming
CN112565922A (en) Advertisement monitoring method, advertisement monitoring device and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220223

Address after: Room 1423, No. 1256 and 1258, Wanrong Road, Jing'an District, Shanghai 200040

Patentee after: Tianyi Digital Life Technology Co.,Ltd.

Address before: 1 / F and 2 / F, East Garden, Huatian International Plaza, 211 Longkou Middle Road, Tianhe District, Guangzhou, Guangdong 510630

Patentee before: Century Dragon Information Network Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240326

Address after: Unit 1, Building 1, China Telecom Zhejiang Innovation Park, No. 8 Xiqin Street, Wuchang Street, Yuhang District, Hangzhou City, Zhejiang Province, 311100

Patentee after: Tianyi Shilian Technology Co.,Ltd.

Country or region after: China

Address before: Room 1423, No. 1256 and 1258, Wanrong Road, Jing'an District, Shanghai 200040

Patentee before: Tianyi Digital Life Technology Co.,Ltd.

Country or region before: China

TR01 Transfer of patent right