CN112911342B - Data acquisition method, device and equipment and storage medium - Google Patents

Data acquisition method, device and equipment and storage medium Download PDF

Info

Publication number
CN112911342B
CN112911342B CN201911137421.8A CN201911137421A CN112911342B CN 112911342 B CN112911342 B CN 112911342B CN 201911137421 A CN201911137421 A CN 201911137421A CN 112911342 B CN112911342 B CN 112911342B
Authority
CN
China
Prior art keywords
data
encryption parameter
data recording
recording device
acquisition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911137421.8A
Other languages
Chinese (zh)
Other versions
CN112911342A (en
Inventor
刘丹玥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Hikvision Digital Technology Co Ltd
Original Assignee
Hangzhou Hikvision Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Hikvision Digital Technology Co Ltd filed Critical Hangzhou Hikvision Digital Technology Co Ltd
Priority to CN201911137421.8A priority Critical patent/CN112911342B/en
Publication of CN112911342A publication Critical patent/CN112911342A/en
Application granted granted Critical
Publication of CN112911342B publication Critical patent/CN112911342B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
    • H04N21/4405Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving video stream decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection

Abstract

The invention provides a data acquisition method, a data acquisition device, data acquisition equipment and a data acquisition storage medium, and data security is improved. The method is applied to an acquisition station and comprises the following steps: when detecting that a first data recording device is accessed, detecting whether a first encryption parameter exists in the first data recording device; if not, acquiring data from the first data recording equipment, and sending the target encryption parameter set by the acquisition station to the first data recording equipment, so that the first data recording equipment encrypts the recorded data according to the target encryption parameter to obtain encrypted data; if yes, acquiring encrypted data from the first data recording device when the first encryption parameter in the first data recording device is matched with the target encryption parameter.

Description

Data acquisition method, device and equipment and storage medium
Technical Field
The present invention relates to the field of security technologies, and in particular, to a data acquisition method, apparatus, device, and storage medium.
Background
After the data recording device records the data on site, the data recording device needs to access the acquisition station and upload the recorded data to the acquisition station. Taking a law enforcement recorder as an example, the law enforcement recorder integrates functions of digital camera shooting, digital photographing and a talkback transmitter, can digitally record the field situation in the law enforcement process, and is accessed to a collection station and uploads the recorded data to the collection station when the recording is finished.
Currently, data recorded in a data recording device is plaintext. After the data recording device is connected to the acquisition station, the data may be stolen no matter when the data is displayed on the acquisition station or when the data is uploaded to the acquisition station. Once the plaintext data is stolen by a third party, problems of data theft, privacy disclosure and the like are caused, and therefore, the data security is low.
Disclosure of Invention
In view of this, the present invention provides a data acquisition method, apparatus and device, and a storage medium, so as to improve data security.
The invention provides a data acquisition method applied to an acquisition station, which comprises the following steps:
when detecting that a first data recording device is accessed, detecting whether a first encryption parameter exists in the first data recording device;
if not, acquiring recorded data from the first data recording equipment, and sending a target encryption parameter set by the acquisition station to the first data recording equipment so that the first data recording equipment encrypts the recorded data according to the target encryption parameter to obtain encrypted data;
if yes, acquiring encrypted data from the first data recording device when the first encryption parameter in the first data recording device is matched with the target encryption parameter.
According to an embodiment of the present invention, issuing the target encryption parameter set by the acquisition station to the first data recording device includes:
encrypting the target encryption parameter according to a preset encryption algorithm;
and sending the encrypted target encryption parameter to the first data recording device, wherein the first data recording device decrypts the encrypted target encryption parameter according to a preset decryption algorithm, and the preset encryption algorithm corresponds to the preset decryption algorithm.
According to an embodiment of the invention, before detecting the access of the first data recording device, the method further comprises:
under the condition that the target encryption parameter is not set in the acquisition station, when the access of a second data recording device is detected, the encryption parameter exists in the second data recording device, and the encryption parameter existing in the second data recording device is set as the target encryption parameter of the acquisition station.
According to an embodiment of the present invention, before detecting the access of the first data recording device, the method further comprises:
receiving an encryption parameter setting instruction for setting a target encryption parameter for the acquisition station under the condition that the acquisition station does not set the target encryption parameter; the encryption parameter setting instruction carries encryption parameters;
and setting the encryption parameters carried by the encryption parameter setting instruction as target encryption parameters of the acquisition station according to the encryption parameter setting instruction.
According to an embodiment of the present invention, after acquiring the encrypted data from the first data recording device, the method further includes:
and transmitting the target encryption parameter and the encrypted data to a player so that the player decrypts the encrypted data according to the target encryption parameter and plays the decrypted data.
The second aspect of the present invention provides a data acquisition apparatus for use in an acquisition station, the apparatus comprising:
the device comprises a detection module, a first encryption module and a second encryption module, wherein the detection module is used for detecting whether a first data recording device is accessed or not;
the encryption parameter issuing module is used for acquiring recorded data from the first data recording equipment and issuing the target encryption parameter set by the acquisition station to the first data recording equipment if the acquisition station does not acquire the recorded data, so that the first data recording equipment encrypts the recorded data according to the target encryption parameter to obtain encrypted data;
and the data acquisition module is used for acquiring encrypted data from the first data recording device if the first encryption parameter in the first data recording device is matched with the target encryption parameter.
According to an embodiment of the present invention, when the encryption parameter issuing module issues the target encryption parameter set by the acquisition station to the first data recording device, the encryption parameter issuing module is specifically configured to:
encrypting the target encryption parameter according to a preset encryption algorithm;
and sending the encrypted target encryption parameter to the first data recording device, wherein the first data recording device decrypts the encrypted target encryption parameter according to a preset decryption algorithm, and the preset encryption algorithm corresponds to the preset decryption algorithm.
According to an embodiment of the invention, the apparatus further comprises:
the first encryption parameter setting module is used for setting the encryption parameter of the second data recording device as the target encryption parameter of the acquisition station when the second data recording device is detected to be accessed under the condition that the target encryption parameter is not set in the acquisition station.
According to an embodiment of the invention, the apparatus further comprises:
the instruction receiving module is used for receiving an encryption parameter setting instruction for setting a target encryption parameter for the acquisition station under the condition that the acquisition station does not set the target encryption parameter; the encryption parameter setting instruction carries encryption parameters;
and the second encryption parameter setting module is used for setting the encryption parameters carried by the encryption parameter setting instruction as the target encryption parameters of the acquisition station according to the encryption parameter setting instruction.
According to an embodiment of the invention, the apparatus further comprises:
and the data playing module is used for transmitting the target encryption parameter and the encrypted data to a player so that the player decrypts the encrypted data according to the target encryption parameter and plays the decrypted data.
A third aspect of the invention provides an electronic device comprising a processor and a memory; the memory stores a program that can be called by the processor; wherein, when the processor executes the program, the data acquisition method according to the foregoing embodiment is implemented.
A fourth aspect of the present invention provides a machine-readable storage medium, on which a program is stored, which when executed by a processor, implements the data acquisition method as described in the foregoing embodiments.
The embodiment of the invention has the following beneficial effects:
in the embodiment of the invention, when the first encryption parameter does not exist in the first data recording device accessed to the acquisition station, the acquisition station sends the set target encryption parameter to the first data recording device, so that the first data recording device encrypts the recorded data according to the target encryption parameter, thus, the data in the first data recording device is a ciphertext, the data security is higher no matter the data is displayed or transmitted, the matching of the encryption parameters in the acquisition station and the first data recording device can be ensured, and the wrong setting of the encryption parameter is avoided; when the first encryption parameter exists in the first data recording device, if the first encryption parameter in the first data recording device is matched with the target encryption parameter, the encrypted data is collected from the first data recording device, and the situation that the collection station collects the data in the data recording device which is accessed by mistake is avoided.
Drawings
FIG. 1 is a schematic flow chart diagram of a data acquisition method according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of an application scenario according to an embodiment of the present invention;
FIG. 3 is a block diagram of a data acquisition device according to an embodiment of the present invention;
fig. 4 is a block diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. The following description refers to the accompanying drawings in which the same numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this specification and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It will be understood that, although the terms first, second, third, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one type of device from another. For example, a first device may also be referred to as a second device, and similarly, a second device may also be referred to as a first device, without departing from the scope of the present invention. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
The following describes the data acquisition method in detail, but the invention is not limited thereto.
The present invention provides a data acquisition method for use in an acquisition station, and in one embodiment, with reference to fig. 1, the method comprises the steps of:
s100: when detecting that a first data recording device is accessed, detecting whether a first encryption parameter exists in the first data recording device:
s200: if not, acquiring data from the first data recording equipment, and sending the target encryption parameter set by the acquisition station to the first data recording equipment, so that the first data recording equipment encrypts the recorded data according to the target encryption parameter to obtain encrypted data;
s300: if yes, acquiring encrypted data from the first data recording device when the first encryption parameter in the first data recording device is matched with the target encryption parameter.
The execution main body of the data acquisition method provided by the embodiment of the invention is an acquisition station. The acquisition station can be a computer device, an embedded device and the like, and the specific type is not limited. The acquisition station may support access to at least one data recording device and may be in data communication with the accessed data recording device. For example, the data recording device may access the acquisition station through a USB (Universal Serial Bus) interface, and perform communication according to a corresponding communication protocol. Of course, this is by way of example only and not by way of limitation.
The data recording device is a device for recording data, optionally a handheld device having a data recording function. For example, the data recording device may be a law enforcement recorder, and when law enforcement is performed, the law enforcement recorder may be held by a police officer to record data of law enforcement site conditions, and after data recording is completed, the law enforcement recorder may be accessed to a collection station, such as a law enforcement data collection station, and upload the recorded data to the collection station.
In step S100, when it is detected that a first data recording device accesses, it is detected whether a first encryption parameter exists in the first data recording device.
The acquisition station has at least one data acquisition interface for accessing the data recording device, and the first data recording device can be accessed to the acquisition station through any data acquisition interface. The acquisition station may detect access to the first data recording device by:
the acquisition station can monitor the data acquisition interfaces, and when any one data acquisition interface is monitored to generate an equipment access event, the access of first data recording equipment is determined; subsequently, the data acquisition interface can be communicated with the accessed first data recording equipment;
or when receiving an access signal triggered by the first data recording device, the access signal is used for notifying the acquisition station that the first data recording device is accessed, and determining that the first data recording device is accessed.
The above-mentioned manner for detecting the access of the first data recording device is only an example, and the specific manner is not limited.
When detecting that the first data recording device is accessed to the acquisition station, the acquisition station detects whether a first encryption parameter exists in the first data recording device, and the detection mode may include the following steps:
the acquisition station can read a state parameter from a state interface of the first data recording device, wherein the state parameter is used for indicating whether the first data recording device is set with a first encryption parameter or not, and if the state parameter indicates that the first encryption parameter is set, the acquisition station determines that the first data recording device has the first encryption parameter; if the state parameter indication is not set, determining that the first encryption parameter does not exist in the first data recording equipment;
or the acquisition station may send a read instruction to the first data recording device, so that the first data recording device reads the local first encryption parameter according to the read instruction, and returns the first encryption parameter to the acquisition station when the first encryption parameter is read; if the acquisition station receives the first encryption parameter from the first data recording device, determining that the first encryption parameter exists in the first data recording device; if not, it is determined that the first encryption parameter does not exist in the first data recording device.
Optionally, if the first data recording device does not read the first encryption parameter, it may select to send a notification message about the unread first encryption parameter to the collection station, and when the collection station receives the notification message, it is determined that the first encryption parameter does not exist in the first data recording device; or the acquisition station may choose not to send the notification message, and when the acquisition station does not receive the first encryption parameter within the set time duration, it is determined that the first encryption parameter does not exist in the first data recording device.
Other ways of detecting whether the first encryption parameter exists in the first data recording device are also applicable, and the specific way is not limited.
Optionally, when detecting that the first data recording device accesses, the acquisition station may first check whether there is a need to encrypt the data, and if so, then detect whether there is a first encryption parameter in the first data recording device, and if not, directly acquire the recorded data from the first data recording device.
In step S200, if not, acquiring data from the first data recording device, and sending the target encryption parameter set by the acquisition station to the first data recording device, so that the first data recording device encrypts the recorded data according to the target encryption parameter to obtain encrypted data.
The first data recording device does not have the first encryption parameter, which indicates that the first data recording device has not received the encryption parameter sent by any acquisition station or has received but been deleted, and has not started the encryption function, and if the first data recording device has recorded data before, the data are not encrypted.
In this case, the recorded data is collected from the first data recording device, and the target encryption parameter set by the collection station is transmitted to the first data recording device. And after receiving the target encryption parameter, the first data recording device can encrypt the recorded data according to the target encryption parameter to obtain the encrypted data.
The recorded data collected from the first data recording device is unencrypted data, and the data can be played.
Optionally, the acquisition station may carry the target encryption parameter in the encryption command and send the encryption command to the first data recording device. And after receiving the encryption command, the first data recording equipment acquires a target encryption parameter from the encryption command and stores the target encryption parameter in the local, and simultaneously starts the encryption function, so that the first data recording equipment can encrypt the data recorded after the encryption function is started according to the target encryption parameter. In other words, when the first data recording device records data subsequently, the recorded data is encrypted according to the target encryption parameter.
The data recorded by the first data recording device may include video, audio, pictures, etc., and the specific data type is not limited. When encrypting, the first data recording device may encrypt all types of data recorded by the device, or encrypt only one or more types of data.
The target encryption parameter is an encryption parameter preset in the acquisition station, and the encryption parameter setting mode in the acquisition station is not limited, and may be set manually or through a connected external device, for example.
The target encryption parameters may include: encryption level, encryption key, etc. Of course, the target encryption parameter may also include other parameters required for data encryption, such as indication information of an encryption manner, and the like, and is not limited thereto.
In step S300, if yes, acquiring encrypted data from the first data recording device when the first encryption parameter in the first data recording device matches the target encryption parameter.
The first data recording device has the first encryption parameter, which indicates that the acquisition station has issued the encryption parameter to the first data recording device before. However, the first encryption parameter may be transmitted to the first data recording device by the present acquisition station, or may be transmitted to the first data recording device by another acquisition station.
The acquisition station needs to acquire the first encryption parameter in the first data recording device, and may acquire the first encryption parameter from the first data recording device when detecting whether the first encryption parameter exists in the first data recording device or when determining that the first encryption parameter exists in the first data recording device.
If the first encryption parameter in the first data recording device is matched with the target encryption parameter, the acquisition station can decrypt the data encrypted by the first data recording device, and therefore the encrypted data is acquired from the first data recording device under the condition.
After the encrypted data are obtained, the acquisition station can decrypt the encrypted data according to the target encryption parameters; or, the acquisition station can decrypt the encrypted data according to the decryption parameter corresponding to the target encryption parameter. The specific method can depend on the encryption and decryption algorithm used.
For example, in a symmetric encryption algorithm, the data may be encrypted and decrypted with the same key, so that, in the case of using the symmetric encryption algorithm, the first data recording device encrypts the recorded data with the target encryption parameter, and the acquisition station may decrypt the encrypted data with the target encryption parameter.
Symmetric encryption algorithms have, for example: DES (Data Encryption Standard, which is a block algorithm using key Encryption), 3DES (triple Data Encryption algorithm, which is equivalent to applying a triple DES Encryption algorithm to each Data block), AES (Advanced Encryption Standard in cryptography, which is a symmetric Encryption algorithm), and the like, and specific algorithms are not limited.
If the first encryption parameter in the first data recording device is not matched with the target encryption parameter, it indicates that the encryption parameter in the first data recording device is issued by other acquisition stations, and at this time, the encrypted data is not selected to be acquired from the first data recording device, because even if the encrypted data is acquired, the acquired encrypted data cannot be decrypted according to the target encryption parameter in the acquisition station. The acquisition station can prompt the first data recording device of the information of access error. Therefore, the data in the first data recording device which is accessed by mistake can be prevented from being acquired by the acquisition station.
For example, referring to FIG. 2, data recording devices B2-B4 access acquisition station A2 and data recording device B1 access acquisition station A1. The data recording device B2 has previously accessed the acquisition station a1, and when the data recording device B2 accesses the acquisition station a1, the acquisition station a1 issues the encryption parameters set in the acquisition station a1 to the data recording device B2, so that the data recording device B2 already has the encryption parameters. Currently, data recording device B2 is accessed to acquisition station a2, which may be a false access, and acquisition station a2 detects that there are encryption parameters in data recording device B2, but the encryption parameters in data recording device B2 are not the same as the encryption parameters already set in acquisition station a2, and at this time, acquisition station a2 does not obtain encrypted data from data recording device B2.
Optionally, when the first data recording device accesses the acquisition station through any data acquisition interface, after the acquisition station issues the target encryption parameter set by the acquisition station to the first data recording device, or it is determined that the first encryption parameter in the first data recording device is the same as the target encryption parameter, the acquisition station switches the current mode for the data acquisition interface to the usb disk mode, so that the data in the first data recording device can be displayed in the acquisition station in a file form, but the data cannot be opened for viewing because the data is encrypted.
In the embodiment of the invention, when the first encryption parameter does not exist in the first data recording device accessed to the acquisition station, the acquisition station sends the set target encryption parameter to the first data recording device, so that the first data recording device encrypts the recorded data according to the target encryption parameter, thus, the data in the first data recording device is a ciphertext, the data security is higher no matter the data is displayed or transmitted, the matching of the encryption parameters in the acquisition station and the first data recording device can be ensured, and the wrong setting of the encryption parameter is avoided; when the first encryption parameter exists in the first data recording device, if the encryption parameter in the first data recording device is matched with the target encryption parameter, the encrypted data is collected from the first data recording device, and the situation that the collection station collects the data in the data recording device which is accessed by mistake is avoided.
In one embodiment, the above method flow may be executed by the data acquisition device 100, and as shown in fig. 3, the monitoring alarm processing device 100 may include 3 modules: the device comprises a detection module 101, an encryption parameter issuing module 102 and a data acquisition module 103. The detection module 101 is configured to perform the step S100, the encryption parameter issuing module 102 is configured to perform the step S200, and the data acquisition module 103 is configured to perform the step S300.
In one embodiment, in step S200, issuing the target encryption parameter set by the acquisition station to the first data recording device includes:
s201: encrypting the target encryption parameter according to a preset encryption algorithm;
s202: and sending the encrypted target encryption parameter to the first data recording device, wherein the first data recording device decrypts the encrypted target encryption parameter according to a preset decryption algorithm, and the preset encryption algorithm corresponds to the preset decryption algorithm.
The acquisition station encrypts the target encryption parameters and then sends the encrypted target encryption parameters to the first data recording equipment. Therefore, even if the encrypted target encryption parameter is intercepted by a third party in the transmission process, the third party only needs a messy code, and the security of the encryption parameter in the transmission process is ensured.
If the encrypted target encryption parameter and the recording data encrypted according to the target encryption parameter in the first data recording device are intercepted by the third party, the third party needs to decode at least one of the encrypted target encryption parameter and the encrypted data to obtain the plaintext recording data, so that the difficulty degree of stealing the data by the third party is increased, and the data security is further ensured.
A preset encryption algorithm for encrypting the target encryption parameter may be set in the present acquisition station in advance, and a preset decryption algorithm for decrypting the encrypted target encryption parameter may be set in the first data recording device. The preset encryption algorithm and the preset decryption algorithm are not particularly limited, and the target encryption parameter encrypted by the preset encryption algorithm can be decrypted according to the preset decryption algorithm as long as the preset decryption algorithm corresponds to the preset encryption algorithm.
And after receiving the encrypted target encryption parameter, the first data recording device acquires a preset decryption algorithm to decrypt the encrypted target encryption parameter to obtain a decrypted target encryption parameter, and stores the decrypted target encryption parameter so as to encrypt the recorded data according to the target encryption parameter when recording data subsequently.
In one embodiment, before detecting access to the first data recording device, the method further comprises the steps of:
t100: under the condition that the target encryption parameter is not set in the acquisition station, when the access of a second data recording device is detected, the encryption parameter exists in the second data recording device, and the encryption parameter existing in the second data recording device is set as the target encryption parameter of the acquisition station.
The encryption parameters in the second data recording device may be from the acquisition station. That is, the second data recording device has previously accessed the acquisition station, and the acquisition station issues the set encryption parameters to the acquisition station
A second data recording device.
It is understood that the second data recording device may be the same data recording device as the first data recording device, or may be a different data recording device. Since the acquisition station can be accessed to a plurality of data recording devices, any data recording device accessed to the acquisition station before is selected as the second data recording device.
Optionally, under the condition that the target encryption parameter is not set in the acquisition station, the acquisition station may identify the accessed second data recording device to determine whether the second data recording device is a device provided with the encryption parameter from the acquisition station; or, the acquisition station may determine whether the second data recording device is a device provided with the encryption parameters from the acquisition station according to an externally input instruction, and if so, acquire the encryption parameters from the second data recording device.
Step T100 is an optional way to set the target encryption parameter of the present acquisition station, and is not limited.
In one embodiment, before detecting access to the first data recording device, the method further comprises the steps of:
t200: under the condition that the target encryption parameter is not set in the acquisition station, receiving an encryption parameter setting instruction for setting the target encryption parameter for the acquisition station; the encryption parameter setting instruction carries encryption parameters;
t300: and setting the encryption parameters carried by the encryption parameter setting instruction as target encryption parameters of the acquisition station according to the encryption parameter setting instruction.
Under the condition that the target encryption parameters are not set in the acquisition station, an encryption parameter setting instruction input by the user from the outside can be received, the encryption parameter setting instruction is used for setting the target encryption parameters for the acquisition station, and the encryption parameters carried by the encryption parameter setting instruction are set as the target encryption parameters of the acquisition station according to the encryption parameter setting instruction.
Steps T200 and T300 are an alternative way to set the target encryption parameters of the present acquisition station, and are not intended to be limiting.
After the setting is completed, the acquisition station can set the modification permission of the encryption parameters, and specifically, the modification permission can be as follows: and forbidding to modify the target encryption parameters set in the acquisition station. Therefore, the situation that the encryption parameters are subsequently modified by mistake to cause inconsistency between the acquisition station and the data recording equipment due to the fact that the encryption parameters are modified by mistake is avoided.
Optionally, after the target encryption parameter is set, the acquisition station may acquire the encrypted data from the second data recording device, and decrypt the encrypted data according to the set target encryption parameter.
Optionally, steps S100 to S300 are implemented by data acquisition software installed in the acquisition station, where the data acquisition software may be installed for the first time or reinstalled on the acquisition station; the steps T100, T200 and T300 are implemented by encryption parameter setting software installed in the present acquisition station, and the encryption parameter setting software may be run in the case where the target encryption parameter is not set in the present acquisition station.
Wherein, the step T100 may be implemented when the data acquisition software is not first installed on the present acquisition station, and the steps T200 and T300 may be implemented when the data acquisition software is first installed on the present acquisition station. The detecting whether the data acquisition software is installed in the acquisition station for the first time may include:
and detecting whether the data acquisition software is firstly installed in the acquisition station according to the externally input installation frequency indication. For example, if the number of times of installation indicates 1 time, it is determined as the first installation, and if the number of times of installation indicates 2 times or more, it is determined as the non-first installation, i.e., reinstallation.
Or, the information for indicating the installation times of the data acquisition software set in the acquisition station may be identified, and if the information indicates that the installation times of the data acquisition software is 1 time, the data acquisition software is installed for the first time, otherwise, the data acquisition software is reinstalled for the non-first time.
Of course, the above-described approaches are merely examples and are not intended to be limiting.
After the data acquisition software is installed in the acquisition station for the first time, a series of initialization information such as equipment administrator passwords, target encryption parameters and the like can be set, and the initialization information can be stored in a specified database as a backup file.
Once the data collection software is reinstalled at the collection site, the collection site may retrieve the backup files from the designated database for restoration. However, there is a possibility that the backup file is lost or damaged, and the restoration cannot be performed or an abnormality occurs in the restoration. When the target encryption parameters cannot be normally reduced, even if the data acquisition software is reloaded on the acquisition station, the acquisition station is not provided with the target encryption parameters.
Therefore, when the data acquisition software is not installed in the acquisition station for the first time, whether the acquisition station is provided with the target encryption parameter or not needs to be checked, if so, the encryption parameter in the backup file is normally restored, and the target encryption parameter does not need to be set repeatedly; if not, the recovery of the encryption parameters in the backup file is abnormal, and at this time, the target encryption parameters need to be reset. Optionally, before resetting the target encryption parameter, it may be determined whether the acquisition station has a need to encrypt the data, and if so, the target encryption parameter is reset again.
In other words, when the data acquisition software is not installed in the acquisition station for the first time, step T100 may be executed to access the second data recording device that has been accessed before, where the encryption parameters of the second data recording device are consistent with the encryption parameters of the acquisition station, the encryption parameters may be obtained from the second data recording device, and the encryption parameters in the second data recording device are set as the target encryption parameters of the acquisition station. Therefore, the problem that the operator forgets the encryption parameters can be avoided.
Optionally, if the second data recording device does not have the encryption parameter, data may be directly acquired from the second data recording device, or data may not be acquired.
When the data acquisition software is installed in the acquisition station for the first time, in order to avoid repeated setting of encryption parameters, the encryption parameter setting instruction is received only under the condition that the target encryption parameter is not set in the acquisition station, and the encryption parameter carried by the encryption parameter setting instruction is set as the target encryption parameter of the acquisition station.
Furthermore, when the data acquisition software is installed in the acquisition station for the first time, the requirement information for indicating whether the acquisition station has the encryption requirement on the data can be acquired, if so, whether the acquisition station is provided with the target encryption parameter or not is detected, the requirement information is recorded, and if not, the requirement information can be recorded, and the step of setting the target encryption parameter is skipped.
Correspondingly, when the data acquisition software is reloaded in the acquisition station, if a second data recording device is accessed to the acquisition station, the recorded demand information can be detected firstly, if the acquisition station has the demand for encrypting the data, whether the acquisition station is provided with encryption parameters or not is continuously detected, a subsequent series of operations are executed, and if not, the data can be directly acquired from the second data recording device.
In one embodiment, after the encrypted data is collected from the first data recording device, the method further comprises:
step S400: and transmitting the target encryption parameter and the encrypted data to a player so that the player decrypts the encrypted data according to the target encryption parameter and plays the decrypted data.
The player may be a player built in the acquisition station, or may also be a player of a third-party platform, and data is described as an example in the following.
Under the condition that the player is a player arranged in the acquisition station, the target encryption parameter and the encrypted data can be transmitted to the built-in player, so that the player decrypts the encrypted video according to the target encryption parameter to obtain a decrypted video, and the decrypted video is played in the player.
Optionally, when the collection station calls a built-in player to play the video, the authority authentication function may be started, that is, an operator inputs a user name and a password, and when the user name and the password are authenticated, the video is played on a playing interface of the player, so as to improve the security of playing the video.
Under the condition that the player is a player of a third-party platform, the acquisition station can send the target encryption parameters and the encrypted data to the player of the third-party platform, and the player decrypts the encrypted video according to the target encryption parameters to obtain a decrypted video and plays the decrypted video. The third-party platform is preferably a reliable platform, and the video playing safety is guaranteed.
Because the data collected by the collecting station from each data recording device can comprise encrypted data and unencrypted data, before playing, whether the data is encrypted or not can be checked, and if the data is not encrypted, the data is sent to the player to be directly played; and if the encrypted data is encrypted, transmitting the target encryption parameter and the encrypted data to a player so that the player decrypts the encrypted data according to the target encryption parameter and plays the decrypted data.
The present invention also provides a data acquisition device applied to an acquisition station, and referring to fig. 3, the data acquisition device 100 includes:
the system comprises a detection module 101, a first encryption module and a second encryption module, wherein the detection module is used for detecting whether a first data recording device is accessed or not;
an encryption parameter issuing module 102, configured to collect the recorded data from the first data recording device if the recorded data is not encrypted, and issue the target encryption parameter set by the collection station to the first data recording device, so that the first data recording device encrypts the recorded data according to the target encryption parameter to obtain encrypted data;
and a data acquisition module 103, configured to acquire encrypted data from the first data recording device if the first encryption parameter in the first data recording device matches the target encryption parameter.
In an embodiment, when the encryption parameter issuing module issues the target encryption parameter that has been set by the acquisition station to the first data recording device, the encryption parameter issuing module is specifically configured to:
encrypting the target encryption parameter according to a preset encryption algorithm;
and sending the encrypted target encryption parameter to the first data recording device, wherein the first data recording device decrypts the encrypted target encryption parameter according to a preset decryption algorithm, and the preset encryption algorithm corresponds to the preset decryption algorithm.
In one embodiment, the apparatus further comprises:
and the first encryption parameter setting module is used for setting the encryption parameter existing in the second data recording equipment as the target encryption parameter of the acquisition station under the condition that the acquisition station does not set the target encryption parameter when the second data recording equipment is detected to be accessed and the second data recording equipment has the encryption parameter.
In one embodiment, the apparatus further comprises:
the instruction receiving module is used for receiving an encryption parameter setting instruction for setting a target encryption parameter for the acquisition station under the condition that the acquisition station does not set the target encryption parameter; the encryption parameter setting instruction carries encryption parameters;
and the second encryption parameter setting module is used for setting the encryption parameters carried by the encryption parameter setting instruction as the target encryption parameters of the acquisition station according to the encryption parameter setting instruction.
In one embodiment, the apparatus further comprises:
and the data playing module is used for transmitting the target encryption parameter and the encrypted data to a player so that the player can decrypt the encrypted data according to the target encryption parameter and play the decrypted data.
The specific details of the implementation process of the functions and actions of each unit in the above device are the implementation processes of the corresponding steps in the above method, and are not described herein again.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and the parts displayed as units may or may not be physical units.
The invention also provides an electronic device, which comprises a processor and a memory; the memory stores a program that can be called by the processor; wherein the processor, when executing the program, implements the data acquisition method as described in the foregoing embodiments.
The embodiment of the data acquisition device can be applied to electronic equipment. Taking a software implementation as an example, as a logical device, the device is formed by reading, by a processor of the electronic device where the device is located, a corresponding computer program instruction in the nonvolatile memory into the memory for operation. From a hardware aspect, as shown in fig. 4, fig. 4 is a hardware structure diagram of an electronic device where the data acquisition apparatus 100 is located according to an exemplary embodiment of the present invention, and except for the processor 510, the memory 530, the interface 520, and the nonvolatile memory 540 shown in fig. 4, the electronic device where the apparatus 100 is located in the embodiment may also include other hardware generally according to the actual function of the electronic device, which is not described again.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (12)

1. A data acquisition method, applied to an acquisition station, the method comprising:
when detecting that a first data recording device is accessed, detecting whether a first encryption parameter exists in the first data recording device;
if not, acquiring recorded unencrypted data from the first data recording equipment, and sending a target encryption parameter set by the acquisition station to the first data recording equipment as a first encryption parameter, so that the first data recording equipment encrypts the recorded data according to the target encryption parameter to obtain encrypted data;
if yes, acquiring encrypted data from the first data recording device when the first encryption parameter in the first data recording device is matched with the target encryption parameter.
2. The data acquisition method of claim 1, wherein the step of sending the target encryption parameter set by the acquisition station to the first data recording device comprises:
encrypting the target encryption parameter according to a preset encryption algorithm;
and sending the encrypted target encryption parameter to the first data recording device, wherein the first data recording device decrypts the encrypted target encryption parameter according to a preset decryption algorithm, and the preset encryption algorithm corresponds to the preset decryption algorithm.
3. The data collection method of claim 1, wherein prior to detecting access to the first data recording device, the method further comprises:
under the condition that the target encryption parameter is not set in the acquisition station, when the access of a second data recording device is detected, the encryption parameter exists in the second data recording device, and the encryption parameter existing in the second data recording device is set as the target encryption parameter of the acquisition station.
4. The data collection method of claim 1, wherein prior to detecting access to the first data recording device, the method further comprises:
under the condition that the target encryption parameter is not set in the acquisition station, receiving an encryption parameter setting instruction for setting the target encryption parameter for the acquisition station; the encryption parameter setting instruction carries encryption parameters;
and setting the encryption parameters carried by the encryption parameter setting instruction as target encryption parameters of the acquisition station according to the encryption parameter setting instruction.
5. The data collection method of claim 1, wherein after collecting the encrypted data from the first data recording device, the method further comprises:
and transmitting the target encryption parameter and the encrypted data to a player so that the player decrypts the encrypted data according to the target encryption parameter and plays the decrypted data.
6. A data acquisition device, characterized in that, applied to an acquisition station, the device comprises:
the device comprises a detection module, a first encryption module and a second encryption module, wherein the detection module is used for detecting whether a first data recording device is accessed or not;
an encryption parameter issuing module, configured to, if not, acquire recorded unencrypted data from the first data recording device, and issue a target encryption parameter set by the acquisition station to the first data recording device as a first encryption parameter, so that the first data recording device encrypts the recorded data according to the target encryption parameter to obtain encrypted data;
and the data acquisition module is used for acquiring encrypted data from the first data recording device if the first encryption parameter in the first data recording device is matched with the target encryption parameter.
7. The data acquisition device according to claim 6, wherein the encryption parameter issuing module, when issuing the target encryption parameter set by the acquisition station to the first data recording apparatus, is specifically configured to:
encrypting the target encryption parameter according to a preset encryption algorithm;
and sending the encrypted target encryption parameter to the first data recording device, wherein the first data recording device decrypts the encrypted target encryption parameter according to a preset decryption algorithm, and the preset encryption algorithm corresponds to the preset decryption algorithm.
8. The data acquisition device of claim 6, further comprising:
the first encryption parameter setting module is used for setting the encryption parameter of the second data recording device as the target encryption parameter of the acquisition station when the second data recording device is detected to be accessed under the condition that the target encryption parameter is not set in the acquisition station.
9. The data acquisition device as in claim 6, the device further comprising:
the instruction receiving module is used for receiving an encryption parameter setting instruction for setting a target encryption parameter for the acquisition station under the condition that the acquisition station does not set the target encryption parameter; the encryption parameter setting instruction carries encryption parameters;
and the second encryption parameter setting module is used for setting the encryption parameters carried by the encryption parameter setting instruction as the target encryption parameters of the acquisition station according to the encryption parameter setting instruction.
10. The data acquisition device of claim 6, further comprising:
and the data playing module is used for transmitting the target encryption parameter and the encrypted data to a player so that the player decrypts the encrypted data according to the target encryption parameter and plays the decrypted data.
11. An electronic device comprising a processor and a memory; the memory stores a program that can be called by the processor; wherein the processor, when executing the program, implements a data acquisition method as claimed in any one of claims 1-5.
12. A machine-readable storage medium, on which a program is stored which, when executed by a processor, carries out a data acquisition method as claimed in any one of claims 1 to 5.
CN201911137421.8A 2019-11-19 2019-11-19 Data acquisition method, device and equipment and storage medium Active CN112911342B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911137421.8A CN112911342B (en) 2019-11-19 2019-11-19 Data acquisition method, device and equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911137421.8A CN112911342B (en) 2019-11-19 2019-11-19 Data acquisition method, device and equipment and storage medium

Publications (2)

Publication Number Publication Date
CN112911342A CN112911342A (en) 2021-06-04
CN112911342B true CN112911342B (en) 2022-09-30

Family

ID=76103867

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911137421.8A Active CN112911342B (en) 2019-11-19 2019-11-19 Data acquisition method, device and equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112911342B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107959688A (en) * 2017-12-14 2018-04-24 恒宝股份有限公司 The safety certifying method and its Verification System that a kind of terminal and picture pick-up device are mutually authenticated
CN108449563A (en) * 2018-02-01 2018-08-24 晨星半导体股份有限公司 To the method and system of audio and video encryption and decryption
CN109241760A (en) * 2018-09-28 2019-01-18 北京北信源信息安全技术有限公司 Data ciphering method, decryption method, encryption device and decryption device
CN109274917A (en) * 2018-11-30 2019-01-25 苏州东巍网络科技有限公司 A kind of data privacy system and method for data sharing cloud platform of reducing weight
CN110337010A (en) * 2019-05-22 2019-10-15 深圳警圣技术股份有限公司 Video/audio processing method, law-enforcing recorder, management server and enforcement system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107959688A (en) * 2017-12-14 2018-04-24 恒宝股份有限公司 The safety certifying method and its Verification System that a kind of terminal and picture pick-up device are mutually authenticated
CN108449563A (en) * 2018-02-01 2018-08-24 晨星半导体股份有限公司 To the method and system of audio and video encryption and decryption
CN109241760A (en) * 2018-09-28 2019-01-18 北京北信源信息安全技术有限公司 Data ciphering method, decryption method, encryption device and decryption device
CN109274917A (en) * 2018-11-30 2019-01-25 苏州东巍网络科技有限公司 A kind of data privacy system and method for data sharing cloud platform of reducing weight
CN110337010A (en) * 2019-05-22 2019-10-15 深圳警圣技术股份有限公司 Video/audio processing method, law-enforcing recorder, management server and enforcement system

Also Published As

Publication number Publication date
CN112911342A (en) 2021-06-04

Similar Documents

Publication Publication Date Title
US10229547B2 (en) In-vehicle gateway device, storage control method, and computer program product
KR101419972B1 (en) Method for restricting access to media data generated by a camera
US8938625B2 (en) Systems and methods for securing cryptographic data using timestamps
EP2850554B1 (en) Security mode for mobile communications devices
US20130004142A1 (en) Systems and methods for device authentication including timestamp validation
KR20180001998A (en) Protecting data in a storage device
CN109308421B (en) Information tamper-proofing method and device, server and computer storage medium
US7266203B2 (en) Information recording/reproducing system being able to limit an access and a method thereof
CA2538850A1 (en) Record carrier, system, method and program for conditional access to data stored on the record carrier
US10754979B2 (en) Information management terminal device
US11503019B2 (en) Multiuser measurement system and method for operating a multiuser measurement system
CN115225673A (en) Vehicle monitoring method, apparatus and storage medium
US20210112054A1 (en) Edge data center security system that autonomously disables physical communication ports on detection of potential security threat
US20070206792A1 (en) Library apparatus and library apparatus control method
CN112911342B (en) Data acquisition method, device and equipment and storage medium
US20220376911A1 (en) Detection and Remediation of Unauthorized Relocation of Storage Media
CN110633585B (en) Hard disk locking and unlocking method, device, equipment and readable storage medium
EP3420486B1 (en) System and method for forensic access control
US20220376908A1 (en) Secure Disk Erasure
US10181044B2 (en) System and method for monitoring encrypted data and preventing massive decryption thereof
CN114598461B (en) Online unlocking method of terminal equipment, terminal equipment and readable storage medium
JP2018057044A5 (en) Vehicle information collection system, data security device, vehicle information collection method, and computer program
WO2022248499A1 (en) Secure disk erasure
WO2022248515A1 (en) Detection and remediation of unauthorized relocation of storage media
CN116244745A (en) Management method, system and device of measurement and control device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant