CN110674512A - Cascade file sending method and device, electronic equipment and storage medium - Google Patents

Cascade file sending method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN110674512A
CN110674512A CN201910818963.5A CN201910818963A CN110674512A CN 110674512 A CN110674512 A CN 110674512A CN 201910818963 A CN201910818963 A CN 201910818963A CN 110674512 A CN110674512 A CN 110674512A
Authority
CN
China
Prior art keywords
networking
file
video
monitoring
cascading
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201910818963.5A
Other languages
Chinese (zh)
Inventor
李明亮
沈军
杨传坤
韩强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Visionvera Information Technology Co Ltd
Original Assignee
Visionvera Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Visionvera Information Technology Co Ltd filed Critical Visionvera Information Technology Co Ltd
Priority to CN201910818963.5A priority Critical patent/CN110674512A/en
Publication of CN110674512A publication Critical patent/CN110674512A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The embodiment of the invention provides a method and a device for sending a cascade file, electronic equipment and a storage medium, the method is applied to the video networking, the embodiment of the invention adopts a video networking monitoring networking management scheduling subordinate system to carry out encryption calculation on the cascade files stored in the MySQL database, then the lower video network monitoring, networking, managing and dispatching system obtains the target cascade file and carries out encryption verification on the target cascade file according to the cascade file request command sent by the upper video network monitoring, networking, managing and dispatching system, by comparing the encrypted values of the two encryption calculations, whether the target cascade file is tampered can be judged, and the untampered cascade file is finally sent to the video networking monitoring and networking management and dispatching superior system, so that the accuracy and the integrity of the cascade file synchronized by the video networking monitoring and networking management and dispatching superior system are guaranteed.

Description

Cascade file sending method and device, electronic equipment and storage medium
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a method and an apparatus for sending a concatenated file, an electronic device, and a storage medium.
Background
In the video network, the video network monitoring and managing and dispatching lower-level system and the video network monitoring and managing and dispatching upper-level system synchronize data in a cascading file mode.
If the cascade file is maliciously modified or deleted by people, the upper-level system of the video networking monitoring, networking, managing and scheduling system cannot obtain accurate cascade file data, and the normal development of services is influenced.
Disclosure of Invention
In view of the above problems, embodiments of the present invention are proposed to provide a cascading file sending method, a cascading file sending apparatus, and a computer-readable storage medium and an electronic device that overcome or at least partially solve the above problems.
In order to solve the above problems, an embodiment of the present invention discloses a method for sending a concatenated file, which is applied to a video network, wherein the video network is in communication connection with an ethernet, the video network includes a video network monitoring and networking management scheduling upper-level system and a video network monitoring and networking management scheduling lower-level system that are in communication connection, and the ethernet includes a MySQL database; the MySQL database is in communication connection with the video networking monitoring, networking, managing and scheduling lower-level system, and a cascading file is stored in the MySQL database and has an encrypted value; the method comprises the following steps:
the video networking monitoring and networking management scheduling lower-level system receives a cascading file request instruction sent by the video networking monitoring and networking management scheduling upper-level system;
the video networking monitoring networking management scheduling subordinate system reads the cascading files and the first encryption values of the cascading files from the MySQL database according to the cascading file request instruction;
the video networking monitoring networking management scheduling subordinate system performs encryption calculation on the cascade file to generate a second encryption value;
the video networking monitoring networking management scheduling subordinate system compares whether the first encryption value is the same as the second encryption value;
and if the first encryption value is the same as the second encryption value, the video networking monitoring and managing lower-level system sends the cascading file to the video networking monitoring and managing upper-level system.
Optionally, the MySQL database includes a cascading table, and a file name, an identification number, and an encrypted value of the cascading file are recorded in the cascading table.
Optionally, a plurality of cascading files are stored in the MySQL database;
the cascade file request instruction comprises an identification number of a target cascade file;
the step that the video networking monitoring networking management scheduling subordinate system reads the cascading file and the first encryption value of the cascading file from the MySQL database according to the cascading file request instruction comprises the following steps:
and the video networking monitoring, networking, managing and scheduling lower-level system reads the target cascading file corresponding to the identification number and the first encryption value of the target cascading file from the MySQL database according to the cascading file request instruction.
Optionally, the step of performing encryption calculation on the target cascade file by the video networking monitoring, networking, managing, and scheduling subordinate system to generate a second encryption value further includes:
and the video networking monitoring, networking, managing and scheduling subordinate system performs cyclic redundancy check code crc calculation on the target cascade file to generate a second encryption value.
Optionally, the method includes:
if the first encryption value is different from the second encryption value, the video networking monitoring, networking, managing and scheduling subordinate system determines that the cascade file is tampered, and generates a request failure message;
and the lower video networking monitoring and networking management scheduling system sends the request failure message to the upper video networking monitoring and networking management scheduling system.
In order to solve the above problem, an embodiment of the present invention further discloses a device for sending a cascaded file, which is applied to a video networking, wherein the video networking is in communication connection with an ethernet, the video networking comprises a video networking monitoring and networking management scheduling upper-level system and a video networking monitoring and networking management scheduling lower-level system which are in communication connection, and the ethernet comprises a MySQL database; the MySQL database is in communication connection with the video networking monitoring, networking, managing and scheduling lower-level system, and a cascading file is stored in the MySQL database and has an encrypted value; the video networking monitoring, networking, managing and scheduling subordinate system comprises:
the request instruction receiving module is used for receiving a cascade file request instruction sent by the video networking monitoring, networking, managing and scheduling superior system;
the first encryption value reading module is used for reading the cascading file and the first encryption value of the cascading file from the MySQL database according to the cascading file request instruction;
the second encryption value generating module is used for carrying out encryption calculation on the cascade file to generate a second encryption value;
a cryptographic value comparison module for comparing whether the first cryptographic value is the same as the second cryptographic value;
and the cascading file sending module is used for sending the cascading file to the video networking monitoring networking management dispatching superior system when the first encryption value is the same as the second encryption value.
Optionally, the second cryptographic value generating module further includes:
and the crc calculation submodule is used for performing cyclic redundancy check (crc) calculation on the target cascade file to generate a second encryption value.
Optionally, the video networking monitoring, networking management, and scheduling subordinate system includes:
a request failure message generation module, configured to determine that the cascaded file is tampered when the first encrypted value is different from the second encrypted value, and generate a request failure message;
and the request failure message sending module is used for sending the request failure message to the video networking monitoring networking management scheduling superior system.
According to another aspect of the present invention, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, enables execution of the above-described cascaded file transmission method.
According to still another aspect of the present invention, an electronic device is provided, which includes a memory, a processor and a computer program stored in the memory and executable on the processor, and the processor implements the cascaded file transmission method when executing the computer program.
The embodiment of the invention has the following advantages:
the embodiment of the invention adopts the lower system to carry out encryption calculation on the cascade files stored in the MySQL database, then the lower system obtains the target cascade files and carries out encryption verification on the target cascade files according to the cascade file request instruction sent by the upper video networking monitoring and managing system, and the target cascade files can be judged whether to be tampered by comparing the encryption values of the two times of encryption calculation, and finally the cascade files which are not tampered are sent to the upper video networking monitoring and managing system, so that the accuracy and the integrity of the cascade files synchronized by the upper video networking monitoring and managing system are ensured.
Drawings
FIG. 1 is a schematic networking diagram of a video network of the present invention;
FIG. 2 is a schematic diagram of a hardware architecture of a node server according to the present invention;
fig. 3 is a schematic diagram of a hardware structure of an access switch of the present invention;
fig. 4 is a schematic diagram of a hardware structure of an ethernet protocol conversion gateway according to the present invention;
fig. 5 is a schematic structural diagram of a cascaded file transmission system according to an embodiment of the present invention;
fig. 6 is a flowchart illustrating a first step of a method for sending a concatenated file according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a second embodiment of a cascaded file sending apparatus according to the present invention.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
The video networking is an important milestone for network development, is a real-time network, can realize high-definition video real-time transmission, and pushes a plurality of internet applications to high-definition video, and high-definition faces each other.
The video networking adopts a real-time high-definition video exchange technology, can integrate required services such as dozens of services of video, voice, pictures, characters, communication, data and the like on a system platform on a network platform, such as high-definition video conference, video monitoring, intelligent monitoring analysis, emergency command, digital broadcast television, delayed television, network teaching, live broadcast, VOD on demand, television mail, Personal Video Recorder (PVR), intranet (self-office) channels, intelligent video broadcast control, information distribution and the like, and realizes high-definition quality video broadcast through a television or a computer.
To better understand the embodiments of the present invention, the following description refers to the internet of view:
some of the technologies applied in the video networking are as follows:
network Technology (Network Technology)
Network technology innovation in video networking has improved the traditional Ethernet (Ethernet) to face the potentially huge first video traffic on the network. Unlike pure network Packet Switching (Packet Switching) or network Circuit Switching (Circuit Switching), the Packet Switching is adopted by the technology of the video networking to meet the Streaming requirement. The video networking technology has the advantages of flexibility, simplicity and low price of packet switching, and simultaneously has the quality and safety guarantee of circuit switching, thereby realizing the seamless connection of the whole network switching type virtual circuit and the data format.
Switching Technology (Switching Technology)
The video network adopts two advantages of asynchronism and packet switching of the Ethernet, eliminates the defects of the Ethernet on the premise of full compatibility, has end-to-end seamless connection of the whole network, is directly communicated with a user terminal, and directly bears an IP data packet. The user data does not require any format conversion across the entire network. The video networking is a higher-level form of the Ethernet, is a real-time exchange platform, can realize the real-time transmission of the whole-network large-scale high-definition video which cannot be realized by the existing Internet, and pushes a plurality of network video applications to high-definition and unification.
Server Technology (Server Technology)
The server technology on the video networking and unified video platform is different from the traditional server, the streaming media transmission of the video networking and unified video platform is established on the basis of connection orientation, the data processing capacity of the video networking and unified video platform is independent of flow and communication time, and a single network layer can contain signaling and data transmission. For voice and video services, the complexity of video networking and unified video platform streaming media processing is much simpler than that of data processing, and the efficiency is greatly improved by more than one hundred times compared with that of a traditional server.
Storage Technology (Storage Technology)
The super-high speed storage technology of the unified video platform adopts the most advanced real-time operating system in order to adapt to the media content with super-large capacity and super-large flow, the program information in the server instruction is mapped to the specific hard disk space, the media content is not passed through the server any more, and is directly sent to the user terminal instantly, and the general waiting time of the user is less than 0.2 second. The optimized sector distribution greatly reduces the mechanical motion of the magnetic head track seeking of the hard disk, the resource consumption only accounts for 20% of that of the IP internet of the same grade, but concurrent flow which is 3 times larger than that of the traditional hard disk array is generated, and the comprehensive efficiency is improved by more than 10 times.
Network Security Technology (Network Security Technology)
The structural design of the video network completely eliminates the network security problem troubling the internet structurally by the modes of independent service permission control each time, complete isolation of equipment and user data and the like, generally does not need antivirus programs and firewalls, avoids the attack of hackers and viruses, and provides a structural carefree security network for users.
Service Innovation Technology (Service Innovation Technology)
The unified video platform integrates services and transmission, and is not only automatically connected once whether a single user, a private network user or a network aggregate. The user terminal, the set-top box or the PC are directly connected to the unified video platform to obtain various multimedia video services in various forms. The unified video platform adopts a menu type configuration table mode to replace the traditional complex application programming, can realize complex application by using very few codes, and realizes infinite new service innovation.
Networking of the video network is as follows:
the video network is a centralized control network structure, and the network can be a tree network, a star network, a ring network and the like, but on the basis of the centralized control node, the whole network is controlled by the centralized control node in the network.
As shown in fig. 1, the video network is divided into an access network and a metropolitan network.
The devices of the access network part can be mainly classified into 3 types: node server, access switch, terminal (including various set-top boxes, coding boards, memories, etc.). The node server is connected to an access switch, which may be connected to a plurality of terminals and may be connected to an ethernet network.
The node server is a node which plays a centralized control function in the access network and can control the access switch and the terminal. The node server can be directly connected with the access switch or directly connected with the terminal.
Similarly, devices of the metropolitan network portion may also be classified into 3 types: a metropolitan area server, a node switch and a node server. The metro server is connected to a node switch, which may be connected to a plurality of node servers.
The node server is a node server of the access network part, namely the node server belongs to both the access network part and the metropolitan area network part.
The metropolitan area server is a node which plays a centralized control function in the metropolitan area network and can control a node switch and a node server. The metropolitan area server can be directly connected with the node switch or directly connected with the node server.
Therefore, the whole video network is a network structure with layered centralized control, and the network controlled by the node server and the metropolitan area server can be in various structures such as tree, star and ring.
The access network part can form a unified video platform (the part in the dotted circle), and a plurality of unified video platforms can form a video network; each unified video platform may be interconnected via metropolitan area and wide area video networking.
Video networking device classification
1.1 devices in the video network of the embodiment of the present invention can be mainly classified into 3 types: server, exchanger (including Ethernet protocol conversion gateway), terminal (including various set-top boxes, code board, memory, etc.). The video network as a whole can be divided into a metropolitan area network (or national network, global network, etc.) and an access network.
1.2 wherein the devices of the access network part can be mainly classified into 3 types: node server, access exchanger (including Ethernet protocol conversion gateway), terminal (including various set-top boxes, coding board, memory, etc.).
The specific hardware structure of each access network device is as follows:
a node server:
as shown in fig. 2, the system mainly includes a network interface module 201, a switching engine module 202, a CPU module 203, and a disk array module 204;
the network interface module 201, the CPU module 203, and the disk array module 204 all enter the switching engine module 202; the switching engine module 202 performs an operation of looking up the address table 205 on the incoming packet, thereby obtaining the direction information of the packet; and stores the packet in a queue of the corresponding packet buffer 206 based on the packet's steering information; if the queue of the packet buffer 206 is nearly full, it is discarded; the switching engine module 202 polls all packet buffer queues for forwarding if the following conditions are met: 1) the port send buffer is not full; 2) the queue packet counter is greater than zero. The disk array module 204 mainly implements control over the hard disk, including initialization, read-write, and other operations on the hard disk; the CPU module 203 is mainly responsible for protocol processing with an access switch and a terminal (not shown in the figure), configuring an address table 205 (including a downlink protocol packet address table, an uplink protocol packet address table, and a data packet address table), and configuring the disk array module 204.
The access switch:
as shown in fig. 3, the network interface module mainly includes a network interface module (a downlink network interface module 301 and an uplink network interface module 302), a switching engine module 303 and a CPU module 304;
wherein, the packet (uplink data) coming from the downlink network interface module 301 enters the packet detection module 305; the packet detection module 305 detects whether the Destination Address (DA), the Source Address (SA), the packet type, and the packet length of the packet meet the requirements, and if so, allocates a corresponding stream identifier (stream-id) and enters the switching engine module 303, otherwise, discards the stream identifier; the packet (downstream data) coming from the upstream network interface module 302 enters the switching engine module 303; the incoming data packet of the CPU module 304 enters the switching engine module 303; the switching engine module 303 performs an operation of looking up the address table 306 on the incoming packet, thereby obtaining the direction information of the packet; if the packet entering the switching engine module 303 is from the downstream network interface to the upstream network interface, the packet is stored in the queue of the corresponding packet buffer 307 in association with the stream-id; if the queue of the packet buffer 307 is nearly full, it is discarded; if the packet entering the switching engine module 303 is not from the downlink network interface to the uplink network interface, the data packet is stored in the queue of the corresponding packet buffer 307 according to the guiding information of the packet; if the queue of the packet buffer 307 is nearly full, it is discarded.
The switching engine module 303 polls all packet buffer queues and may include two cases:
if the queue is from the downlink network interface to the uplink network interface, the following conditions are met for forwarding: 1) the port send buffer is not full; 2) the queued packet counter is greater than zero; 3) obtaining a token generated by a code rate control module;
if the queue is not from the downlink network interface to the uplink network interface, the following conditions are met for forwarding: 1) the port send buffer is not full; 2) the queue packet counter is greater than zero.
The rate control module 308 is configured by the CPU module 304, and generates tokens for packet buffer queues from all downstream network interfaces to upstream network interfaces at programmable intervals to control the rate of upstream forwarding.
The CPU module 304 is mainly responsible for protocol processing with the node server, configuration of the address table 306, and configuration of the code rate control module 308.
Ethernet protocol conversion gateway
As shown in fig. 4, the apparatus mainly includes a network interface module (a downlink network interface module 401 and an uplink network interface module 402), a switching engine module 403, a CPU module 404, a packet detection module 405, a rate control module 408, an address table 406, a packet buffer 407, a MAC adding module 409, and a MAC deleting module 410.
Wherein, the data packet coming from the downlink network interface module 401 enters the packet detection module 405; the packet detection module 405 detects whether the ethernet MAC DA, the ethernet MAC SA, the ethernet length or frame type, the video network destination address DA, the video network source address SA, the video network packet type, and the packet length of the packet meet the requirements, and if so, allocates a corresponding stream identifier (stream-id); then, the MAC deletion module 410 subtracts MAC DA, MAC SA, length or frame type (2byte) and enters the corresponding receiving buffer, otherwise, discards it;
the downlink network interface module 401 detects the sending buffer of the port, and if there is a packet, obtains the ethernet MAC DA of the corresponding terminal according to the destination address DA of the packet, adds the ethernet MAC DA of the terminal, the MACSA of the ethernet coordination gateway, and the ethernet length or frame type, and sends the packet.
The other modules in the ethernet protocol gateway function similarly to the access switch.
A terminal:
the system mainly comprises a network interface module, a service processing module and a CPU module; for example, the set-top box mainly comprises a network interface module, a video and audio coding and decoding engine module and a CPU module; the coding board mainly comprises a network interface module, a video and audio coding engine module and a CPU module; the memory mainly comprises a network interface module, a CPU module and a disk array module.
1.3 devices of the metropolitan area network part can be mainly classified into 2 types: node server, node exchanger, metropolitan area server. The node switch mainly comprises a network interface module, a switching engine module and a CPU module; the metropolitan area server mainly comprises a network interface module, a switching engine module and a CPU module.
2. Video networking packet definition
2.1 Access network packet definition
The data packet of the access network mainly comprises the following parts: destination Address (DA), Source Address (SA), reserved bytes, payload (pdu), CRC.
As shown in the following table, the data packet of the access network mainly includes the following parts:
DA SA Reserved Payload CRC
wherein:
the Destination Address (DA) is composed of 8 bytes (byte), the first byte represents the type of the data packet (such as various protocol packets, multicast data packets, unicast data packets, etc.), there are 256 possibilities at most, the second byte to the sixth byte are metropolitan area network addresses, and the seventh byte and the eighth byte are access network addresses;
the Source Address (SA) is also composed of 8 bytes (byte), defined as the same as the Destination Address (DA);
the reserved byte consists of 2 bytes;
the payload part has different lengths according to different types of datagrams, and is 64 bytes if the datagram is various types of protocol packets, and is 32+1024 or 1056 bytes if the datagram is a unicast packet, of course, the length is not limited to the above 2 types;
the CRC consists of 4 bytes and is calculated in accordance with the standard ethernet CRC algorithm.
2.2 metropolitan area network packet definition
The topology of a metropolitan area network is a graph and there may be 2, or even more than 2, connections between two devices, i.e., there may be more than 2 connections between a node switch and a node server, a node switch and a node switch, and a node switch and a node server. However, the metro network address of the metro network device is unique, and in order to accurately describe the connection relationship between the metro network devices, parameters are introduced in the embodiment of the present invention: a label to uniquely describe a metropolitan area network device.
In this specification, the definition of the Label is similar to that of the Label of MPLS (Multi-Protocol Label Switch), and assuming that there are two connections between the device a and the device B, there are 2 labels for the packet from the device a to the device B, and 2 labels for the packet from the device B to the device a. The label is classified into an incoming label and an outgoing label, and assuming that the label (incoming label) of the packet entering the device a is 0x0000, the label (outgoing label) of the packet leaving the device a may become 0x 0001. The network access process of the metro network is a network access process under centralized control, that is, address allocation and label allocation of the metro network are both dominated by the metro server, and the node switch and the node server are both passively executed, which is different from label allocation of MPLS, and label allocation of MPLS is a result of mutual negotiation between the switch and the server.
As shown in the following table, the data packet of the metro network mainly includes the following parts:
DA SA Reserved label (R) Payload CRC
Namely Destination Address (DA), Source Address (SA), Reserved byte (Reserved), tag, payload (pdu), CRC. The format of the tag may be defined by reference to the following: the tag is 32 bits with the upper 16 bits reserved and only the lower 16 bits used, and its position is between the reserved bytes and payload of the packet.
In order to make the technical scheme of the present invention better understood by those skilled in the art, the present invention further analyzes the problems in the existing cascade synchronization process:
in the video network, the video network monitoring and managing and dispatching lower-level system and the video network monitoring and managing and dispatching upper-level system synchronize data in a cascading file mode. In the synchronization process, data is displayed in a file in a plaintext JSON format, and the contents of JSON-based cascaded files are finally spliced into SQL sentences to be executed in a MySQL database system. The MySQL database is an open source relational MySQL database (RDBMS) that is managed using the most common database management language, Structured Query Language (SQL), and therefore can be downloaded by anyone with permission from general public License and modified as needed for personalization. Therefore, certain potential safety hazards exist in the current cascading mode, if the contents in the JSON format are understood, the data contents of the cascading files in the database can be easily written and deleted or modified in the JSON files, so that the upper-level system of the monitoring, networking and managing scheduling of the video networking cannot obtain accurate cascading file data, and the normal development of services is influenced.
In view of the above technical problems, those skilled in the art can easily conceive of encrypting the concatenated files in the database to ensure the security of the concatenated files. However, for the encrypted cascade files, the upper-level system of the video networking monitoring networking management scheduling needs to decrypt and then synchronize each cascade file every time, and the process consumes a long time. In the video networking, a video networking monitoring and networking management and scheduling superior system is connected with dozens or hundreds of video networking monitoring and networking management and scheduling subordinate systems (hereinafter, the subordinate systems are simply represented), and hundreds of cascaded files in each subordinate system need to be synchronized with the superior system, so that the data volume of the cascaded files needing to be decrypted by the video networking monitoring and networking management and scheduling superior system is hundreds of thousands or millions of levels, the CPU resources of the video networking monitoring and networking management and scheduling superior system are occupied, the normal development of other video networking services of the video networking monitoring and networking management and scheduling superior system is influenced, and the operation speed and the operation efficiency of the video networking monitoring and networking management and scheduling superior system are reduced.
In view of the above technical problem, based on the characteristics of the above video networking, referring to fig. 5, a schematic structural diagram of a cascaded file sending system according to an embodiment of the present invention is shown, where the system is applied to a video networking, and the video networking is in communication connection with an ethernet, where the video networking includes a video networking monitoring, networking, managing, and scheduling upper-level system 501 and a video networking monitoring, networking, managing, and scheduling lower-level system 502 that are in communication connection, and the ethernet includes a MySQL database 503; the MySQL database 503 is in communication connection with the video networking monitoring, networking, managing and scheduling lower system 502, and a cascading file is stored in the MySQL database 503, and the cascading file has an encrypted value.
The upper level system 501 and the lower level system 502 of the video networking monitoring, networking and managing, and managing and scheduling system may be collectively referred to as a video networking monitoring, networking and managing and scheduling system, which is a management system in video networking services and is responsible for managing and scheduling tens of millions of levels of monitoring resource information accessed in the system, such as monitoring picture viewing, video recording and playback, video intelligent analysis and other functions of the monitoring resource information. In the embodiment of the present invention, the upper level system 501 and the lower level systems thereof for the video networking monitoring and networking management scheduling may be distinguished based on a certain management authority, where the upper level and the lower level are relative and not completely absolute, the upper level of a certain lower level system may be the lower level of another upper level system 501 for the video networking monitoring and networking management scheduling, and a certain lower level system may also be the upper level of another upper level system 501 for the video networking monitoring and networking management scheduling. For example, when the regions are distinguished according to regional levels, the upper level is provincial level, and the lower level is city level; when the upper level is at the city level, the lower level is at the county level.
The data received or updated by the lower system (the received or updated data is a message of change in the lower system) is stored in the cascaded file in the MySQL database 503, so that the upper system 501 can synchronize with the lower system 502 through the cascaded file. Aiming at the technical problem of the invention, in the embodiment of the invention, an encryption value is set for the cascading file in the MySQL database 503 to ensure that the monitoring, networking, managing and scheduling superior system 501 of the video networking can obtain accurate cascading file data.
Next, based on the system shown in fig. 5, referring to fig. 6, a flowchart of a first step of a method for sending a concatenated file according to an embodiment of the present invention is shown, where the method specifically includes the following steps:
step S601, the video networking monitoring, networking, managing and scheduling lower level system 502 receives a cascade file request instruction sent by the video networking monitoring, networking, managing and scheduling upper level system 501;
since the video networking monitoring, networking, managing and scheduling system has a WEB end facing a user, and the video networking monitoring, networking, managing and scheduling superior system 501 may also receive a message sent by the superior system or other devices, in the embodiment of the present invention, the request instruction of the cascade file may be generated according to a trigger operation of the user at the WEB end of the video networking monitoring, networking, managing and scheduling superior system 501, or may be a received request instruction sent by other devices.
According to different specific service requirements, the cascade file request instruction may include a plurality of target cascade files, and the target cascade files may be requested by time, project, cascade file number or target identification number.
A user can select a cascading file in a specific time period in a WEB page of the video networking monitoring, networking, managing and scheduling superior system 501, for example, select a week of cascading files from 10 days 5 and 10 months 2019 to 16 days 5 and 16 months 2019, or click an option of a next week, so as to select a week of cascading files; the user can also search a specific service in a search box in a WEB page, for example, searching 'urban high and new district and street', the WEB can present all monitoring resource cascading files or recently updated cascading files under the street, and the user can select to request part or all cascading files under the service; of course, the user may directly search for a concatenated file name or identification number to request the concatenated file.
Then, the upper level system 501 sends the request command of the cascaded file to the lower level system 502 through the internet of vision. The embodiment of the invention adopts the network channel of the video network to send the request instruction of the cascade file, and the non-video network user can not access the network channel, so that compared with the internet, the security of the request instruction of the cascade file in the sending process can be greatly ensured, and the request instruction of the video network monitoring, networking, managing and scheduling superior system 501 can be correctly sent to the inferior system.
Step S602, the video networking monitoring, networking, managing, scheduling lower system 502 reads the cascading file and the first encrypted value of the cascading file from the MySQL database 503 according to the cascading file request instruction;
as described in step S601, the MySQL database 503 stores a plurality of cascading files, and each cascading file is provided with an encrypted value according to the embodiment of the present invention. Preferably, in order to enhance the manageability of the database on the concatenated files, the MySQL database 503 according to the embodiment of the present invention includes a concatenated table, and a file name, an identification number, and an encryption value of the concatenated file are recorded in the concatenated table.
In an optional embodiment of the present invention, the concatenated file request instruction includes an identifier of the target concatenated file; step S602 further includes:
the video networking monitoring networking management scheduling lower system 502 reads the target cascading file corresponding to the identification number and the first encryption value of the target cascading file from the MySQL database 503 according to the cascading file request instruction.
After the video networking monitoring, networking, managing and scheduling subordinate system 502 obtains the cascading file and the first encryption value of the cascading file, the following steps are completed:
step S603, the video networking monitoring, networking, managing and scheduling lower system 502 performs encryption calculation on the cascade file to generate a second encryption value;
the cryptographic values mentioned in the various embodiments of the present invention are not cryptographic values in common cryptographic methods, and the first cryptographic value and the second cryptographic value are more reliable and should be referred to as check values for the concatenated file. Such a check value is a string of identification codes, such as 0100, generated by performing an encryption calculation on the concatenated file. Based on the above description, preferably, step S603 further includes:
the video networking monitoring networking management scheduling subordinate system 502 performs cyclic redundancy check code crc calculation on the target cascade file to generate a second encryption value.
Similarly, the first encrypted value of the target cascaded file is also generated by the video networking monitoring networking management scheduling subordinate system 502 through crc calculation, and then the calculated cascaded file is stored in the MySQL database 503, and the cascaded table in the MySQL database 503 is updated, that is, the cascaded information of the cascaded file is added.
Step S604, the video networking monitoring, networking, managing and scheduling subordinate system 502 compares whether the first encrypted value is the same as the second encrypted value;
in step S605, if the first encryption value is the same as the second encryption value, the video networking monitoring and managing subordinate system 502 sends the cascade file to the video networking monitoring and managing superior system 501.
In the preferred embodiment of the present invention, a crc calculation method is used to calculate the content of the target cascade file, and the crc calculation method is the prior art, and the operation principle thereof is not described herein again. The crc calculation method is mature and convenient to use, and the generated encrypted value has the advantage of small data volume, so that the embodiment of the invention is applied to the video network to calculate the integrity and correctness of the cascaded file, can quickly judge whether the cascaded file is tampered, and greatly saves the verification time of the cascaded file. When the cascade file is not tampered, the subordinate system sends the cascade file to the video networking monitoring and networking management and dispatching superior system 501, so that the video networking monitoring and networking management and dispatching superior system 501 can obtain accurate and complete cascade file data, and normal development of video networking services is guaranteed.
Of course, if the cascaded file in the database is attacked or modified, and the second encrypted value calculated by the second calculation is different from the first encrypted value, at this time, the video networking monitoring, networking, managing, and scheduling lower system 502 determines that the cascaded file is tampered, and generates a request failure message; the lower video networking monitoring and networking management scheduling system 502 sends the request failure message to the upper video networking monitoring and networking management scheduling system 501. Through the request failure message, the superior system can know the request state of the cascading file in time so that the user can decide the next service step.
To sum up, the embodiment of the present invention employs a lower system to perform encryption calculation on the cascade files stored in the MySQL database 503, then the lower system acquires the target cascade file and performs encryption verification on the target cascade file according to the cascade file request instruction sent by the upper video networking monitoring and managing system 501, and by comparing the encryption values of the two encryption calculations, it can determine whether the target cascade file is tampered, and finally sends the non-tampered cascade file to the upper video networking monitoring and managing system 501, thereby ensuring the accuracy and integrity of the cascade files synchronized by the upper video networking monitoring and managing system 501; compared with the decryption method of the upper level system 501 of the video networking monitoring, networking, managing and scheduling, the method ensures the accuracy of the cascading files sent to the upper level system 501 of the video networking monitoring, networking, managing and scheduling by utilizing each lower level system, the CPU resource occupied by the lower level system is very small, the normal development of other video networking services of the lower level system and the upper level system 501 of the video networking monitoring, networking, managing and scheduling can be ensured, and the running speed and the running efficiency of the system can be ensured.
It should be noted that, for simplicity of description, the method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the illustrated order of acts, as some steps may occur in other orders or concurrently in accordance with the embodiments of the present invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no particular act is required to implement the invention.
Based on the system shown in fig. 5, referring to fig. 7, a schematic structural diagram of a second embodiment of a cascaded file sending apparatus according to the embodiment of the present invention is shown, in the apparatus, the video networking monitoring and managing scheduling subordinate system 502 may include the following modules:
a request instruction receiving module 701, configured to receive a cascade file request instruction sent by the video networking monitoring, networking, managing, and scheduling upper-level system 501;
a first encrypted value reading module 702, configured to read the concatenated file and the first encrypted value of the concatenated file from the MySQL database 503 according to the concatenated file request instruction;
a second encrypted value generating module 703, configured to perform encryption calculation on the cascaded file to generate a second encrypted value;
a cryptographic value comparison module 704 for comparing whether the first cryptographic value is the same as the second cryptographic value;
a cascading file sending module 705, configured to send the cascading file to the upper level system 501 of the monitoring networking management scheduling of the video networking when the first encryption value is the same as the second encryption value.
Corresponding to the method in the first embodiment, preferably, the second cryptographic value generating module 703 further includes:
and the crc calculation submodule is used for performing cyclic redundancy check (crc) calculation on the target cascade file to generate a second encryption value.
Corresponding to the method of the first embodiment, preferably, the video networking monitoring, networking managing and scheduling subordinate system 502 may include the following modules:
a request failure message generation module, configured to determine that the cascaded file is tampered when the first encrypted value is different from the second encrypted value, and generate a request failure message;
a request failure message sending module, configured to send the request failure message to the video networking monitoring networking management scheduling upper-level system 501.
For the embodiment of the cascading file sending device, because the embodiment is basically similar to the embodiment of the cascading file sending method, the description is relatively simple, and relevant points can be referred to the partial description of the embodiment of the cascading file sending method.
Based on the same inventive concept, another embodiment of the present application provides a computer-readable storage medium, on which a computer program is stored, which when executed by a processor implements the steps in the method according to any of the above-mentioned embodiments of the present application.
Based on the same inventive concept, another embodiment of the present application provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and running on the processor, and when the processor executes the computer program, the electronic device implements the steps of the method according to any of the above embodiments of the present application.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
Embodiments of the present invention are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the embodiments of the invention.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
The method, the apparatus, the electronic device and the storage medium for sending the concatenated file provided by the present invention are described in detail above, and a specific example is applied in the text to explain the principle and the implementation of the present invention, and the description of the above embodiment is only used to help understanding the method and the core idea of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (10)

1. A method for sending a cascading file is characterized in that the method is applied to a video network which is in communication connection with an Ethernet, wherein the video network comprises a video network monitoring, networking, managing and scheduling upper-level system and a video network monitoring, networking, managing and scheduling lower-level system which are in communication connection, and the Ethernet comprises a MySQL database; the MySQL database is in communication connection with the video networking monitoring, networking, managing and scheduling lower-level system, and a cascading file is stored in the MySQL database and has an encrypted value; the method comprises the following steps:
the video networking monitoring and networking management scheduling lower-level system receives a cascading file request instruction sent by the video networking monitoring and networking management scheduling upper-level system;
the video networking monitoring networking management scheduling subordinate system reads the cascading files and the first encryption values of the cascading files from the MySQL database according to the cascading file request instruction;
the video networking monitoring networking management scheduling subordinate system performs encryption calculation on the cascade file to generate a second encryption value;
the video networking monitoring networking management scheduling subordinate system compares whether the first encryption value is the same as the second encryption value;
and if the first encryption value is the same as the second encryption value, the video networking monitoring and managing lower-level system sends the cascading file to the video networking monitoring and managing upper-level system.
2. The method according to claim 1, wherein the MySQL database comprises a cascading table in which a file name, an identification number, and an encrypted value of the cascading file are recorded.
3. The method according to claim 2, wherein the MySQL database has a plurality of cascading files stored therein;
the cascade file request instruction comprises an identification number of a target cascade file;
the step that the video networking monitoring networking management scheduling subordinate system reads the cascading file and the first encryption value of the cascading file from the MySQL database according to the cascading file request instruction comprises the following steps:
and the video networking monitoring, networking, managing and scheduling lower-level system reads the target cascading file corresponding to the identification number and the first encryption value of the target cascading file from the MySQL database according to the cascading file request instruction.
4. The method according to claim 1, wherein the step of the video networking monitoring and managing lower level system performing encryption calculation on the target cascade file to generate a second encryption value further comprises:
and the video networking monitoring, networking, managing and scheduling subordinate system performs cyclic redundancy check code crc calculation on the target cascade file to generate a second encryption value.
5. The method according to claim 1, characterized in that it comprises:
if the first encryption value is different from the second encryption value, the video networking monitoring, networking, managing and scheduling subordinate system determines that the cascade file is tampered, and generates a request failure message;
and the lower video networking monitoring and networking management scheduling system sends the request failure message to the upper video networking monitoring and networking management scheduling system.
6. A cascading file sending device is characterized in that the device is applied to a video network which is in communication connection with an Ethernet, wherein the video network comprises a video network monitoring, networking, managing and scheduling superior system and a video network monitoring, networking, managing and scheduling subordinate system which are in communication connection, and the Ethernet comprises a MySQL database; the MySQL database is in communication connection with the video networking monitoring, networking, managing and scheduling lower-level system, and a cascading file is stored in the MySQL database and has an encrypted value; the video networking monitoring, networking, managing and scheduling subordinate system comprises:
the request instruction receiving module is used for receiving a cascade file request instruction sent by the video networking monitoring, networking, managing and scheduling superior system;
the first encryption value reading module is used for reading the cascading file and the first encryption value of the cascading file from the MySQL database according to the cascading file request instruction;
the second encryption value generating module is used for carrying out encryption calculation on the cascade file to generate a second encryption value;
a cryptographic value comparison module for comparing whether the first cryptographic value is the same as the second cryptographic value;
and the cascading file sending module is used for sending the cascading file to the video networking monitoring networking management dispatching superior system when the first encryption value is the same as the second encryption value.
7. The apparatus of claim 6, wherein the second cryptographic value generating module further comprises:
and the crc calculation submodule is used for performing cyclic redundancy check (crc) calculation on the target cascade file to generate a second encryption value.
8. The apparatus of claim 6, wherein the video networking monitoring networking management scheduling subordinate system comprises:
a request failure message generation module, configured to determine that the cascaded file is tampered when the first encrypted value is different from the second encrypted value, and generate a request failure message;
and the request failure message sending module is used for sending the request failure message to the video networking monitoring networking management scheduling superior system.
9. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 5.
10. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor when executed implements the steps of the method according to any of claims 1-5.
CN201910818963.5A 2019-08-30 2019-08-30 Cascade file sending method and device, electronic equipment and storage medium Withdrawn CN110674512A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910818963.5A CN110674512A (en) 2019-08-30 2019-08-30 Cascade file sending method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910818963.5A CN110674512A (en) 2019-08-30 2019-08-30 Cascade file sending method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN110674512A true CN110674512A (en) 2020-01-10

Family

ID=69075866

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910818963.5A Withdrawn CN110674512A (en) 2019-08-30 2019-08-30 Cascade file sending method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110674512A (en)

Similar Documents

Publication Publication Date Title
CN109672856B (en) Resource synchronization method and device
CN111193788A (en) Audio and video stream load balancing method and device
CN110381030B (en) Method and device for processing synchronization request
CN110545405B (en) Video transmission method and system based on video network
CN109672857B (en) Information processing method and device for monitoring resources
CN108965226B (en) Data acquisition method and device based on video network
CN110809026B (en) File processing method and device, electronic equipment and storage medium
CN109246135B (en) Method and system for acquiring streaming media data
CN110661784B (en) User authentication method, device and storage medium
CN109743555B (en) Information processing method and system based on video network
CN109151061B (en) Data storage method and device
CN109151519B (en) Configuration distribution method and system based on video network
CN111125426A (en) Data storage and query method and device
CN112203149B (en) Video networking software updating method and device based on domestic password
CN110012063B (en) Data packet processing method and system
CN110535856B (en) User authentication method, device and storage medium
CN110022500B (en) Packet loss processing method and device
CN110557608B (en) Resource monitoring method, device and computer readable storage medium
CN110557370B (en) Method, system, electronic equipment and storage medium for pamir synchronization of terminal information
CN108965219B (en) Data processing method and device based on video network
CN110166840B (en) Service processing method, system and device
CN110266768B (en) Data transmission method and system
CN110620936B (en) Video network video backup method and device, electronic equipment and storage medium
CN109413460B (en) Method and system for displaying function menu of video network terminal
CN109688073B (en) Data processing method and system based on video network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20200110