CN113949848B - Data transmission method, device, equipment and medium - Google Patents
Data transmission method, device, equipment and medium Download PDFInfo
- Publication number
- CN113949848B CN113949848B CN202111210952.2A CN202111210952A CN113949848B CN 113949848 B CN113949848 B CN 113949848B CN 202111210952 A CN202111210952 A CN 202111210952A CN 113949848 B CN113949848 B CN 113949848B
- Authority
- CN
- China
- Prior art keywords
- data transmission
- server
- equipment
- public key
- network card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
- H04N7/181—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/02—Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Telephonic Communication Services (AREA)
- Alarm Systems (AREA)
Abstract
According to the data transmission method, the device, the equipment and the medium, the data transmission equipment comprises the first network card and the second network card, the monitoring image shot by the screened target monitoring equipment is acquired through the first network card according to the screening instruction input by the user, and then the monitoring image is sent to the server located in the public network through the second network card, so that the operation difficulty of the user when using the data transmission equipment is simplified.
Description
Technical Field
The present invention relates to the field of computers, and in particular, to a data transmission method, apparatus, device, and medium.
Background
Currently, security monitoring systems are widely applied to scenes such as roads, hospitals, public security and the like, so that the security monitoring systems become one of the most important means for maintaining social stability. The video stream, alarm and other data required by the security system are derived from the monitoring resources, so the coverage of the monitoring resources is particularly important for any security system.
However, there are a large number of monitoring resources located in the local area network, and very complex configuration is required to be used by the security system located in the public network.
Disclosure of Invention
In order to overcome at least one of the disadvantages in the prior art, embodiments of the present application provide a data transmission method, apparatus, device, and medium, including:
in a first aspect, this embodiment provides a data transmission method, applied to a data transmission device, where the data transmission device includes a first network card and a second network card, and is communicatively connected to a candidate monitoring device located in a local area network through the first network card, and is communicatively connected to a server located in a public network through the second network card, and the method includes:
receiving a screening instruction input by a user;
determining target monitoring equipment from the candidate monitoring equipment according to the screening instruction;
acquiring a monitoring image of the target monitoring device through the first network card;
and sending the monitoring image to the server through the second network card.
In a second aspect, this embodiment provides a data transmission device, which is applied to a data transmission device, where the data transmission device includes a first network card and a second network card, and is communicatively connected to a candidate monitoring device located in a local area network through the first network card, and is communicatively connected to a server located in a public network through the second network card, and the data transmission device includes:
the screening module is used for receiving a screening instruction input by a user;
the screening module is further used for determining target monitoring equipment from the candidate monitoring equipment according to the screening instruction;
the image module is used for acquiring a monitoring image of the target monitoring device through the first network card;
and the sending module is used for sending the monitoring image to the server through the second network card.
In a third aspect, the present embodiment provides a data transmission apparatus, including a processor and a memory, where the memory stores a computer program, and the computer program, when executed by the processor, implements the data transmission method.
In a fourth aspect, the present embodiment provides a computer-readable storage medium storing a computer program which, when executed by a processor, implements the data transmission method.
Compared with the prior art, the application has the following beneficial effects:
in the data transmission method, the device, the equipment and the medium provided by the embodiment of the application, the data transmission equipment comprises the first network card and the second network card, according to the screening instruction input by the user, the monitoring image shot by the screened target monitoring equipment is acquired through the first network card, and then is sent to the server positioned in the public network through the second network card, so that the operation difficulty of the user when using the data transmission equipment is simplified.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments will be briefly described below, it being understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered limiting the scope, and that other related drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic view of a scenario provided in an embodiment of the present application;
fig. 2 is a schematic structural diagram of a data transmission device according to an embodiment of the present application;
fig. 3 is a flow chart of a data transmission method according to an embodiment of the present application;
FIG. 4 is a schematic diagram of data flow according to an embodiment of the present disclosure;
FIG. 5 is a second embodiment of a data flow diagram according to the present disclosure;
fig. 6 is a schematic structural diagram of a data transmission device according to an embodiment of the present application.
Icon: 120-memory; 130-a processor; 140-a communication unit; 201-a screening module; 202-an image module; 203-a transmitting module.
Detailed Description
For the purposes of making the objects, technical solutions and advantages of the embodiments of the present application more clear, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments. The components of the embodiments of the present application, which are generally described and illustrated in the figures herein, may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present application, as provided in the accompanying drawings, is not intended to limit the scope of the application, as claimed, but is merely representative of selected embodiments of the application. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, are intended to be within the scope of the present application.
It should be noted that: like reference numerals and letters denote like items in the following figures, and thus once an item is defined in one figure, no further definition or explanation thereof is necessary in the following figures.
In the description of the present application, it should be noted that the terms "first," "second," "third," and the like are used merely to distinguish between descriptions and are not to be construed as indicating or implying relative importance. Furthermore, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
It should be understood that the operations of the flow diagrams may be implemented out of order and that steps without logical context may be performed in reverse order or concurrently. Moreover, one or more other operations may be added to the flow diagrams and one or more operations may be removed from the flow diagrams as directed by those skilled in the art.
Research finds that a great number of monitoring resources in a local area network exist at present, and extremely complex configuration is needed to be used by a security system in a public network.
For example, monitoring resources of areas such as cells and plants are always connected to security systems such as public security networks for privacy protection, equipment ownership and the like; the part of the monitoring resource data is huge, and has great application value; especially in case of emergency (fire, robbery, etc.), how to use this part of the monitoring resources quickly and effectively becomes a huge problem.
The related technology of accessing the monitoring resources into the security system in the public network, however, quite complex configuration and even line transformation are required, so that popularization and use are difficult.
In view of this, the present embodiment provides a data transmission method applied to a data transmission apparatus. In the method, as shown in fig. 1, the data transmission device includes a first network card and a second network card, according to a screening instruction input by a user, a monitoring image shot by a screened target monitoring device is acquired through the first network card, and then is sent to a server located in a public network through the second network card, so that the operation difficulty of the user when using the data transmission device is simplified.
The server may be, but is not limited to, a Web server, an FTP (File Transfer Protocol ) server, a data processing server, a security server, etc. Further, the server may be a single server or a group of servers. The server farm may be centralized or distributed (e.g., the servers may be distributed systems). In some embodiments, the server may be local or remote to the user terminal. In some embodiments, the server may be implemented on a cloud platform; by way of example only, the Cloud platform may include a private Cloud, public Cloud, hybrid Cloud, community Cloud (Community Cloud), distributed Cloud, cross-Cloud (Inter-Cloud), multi-Cloud (Multi-Cloud), or the like, or any combination thereof. In some embodiments, the server may be implemented on an electronic device having one or more components.
As shown in fig. 2, the data transmission apparatus includes a memory 120, a processor 130, and a communication unit 140. The memory 120, the processor 130, and the communication unit 140 are electrically connected directly or indirectly to each other to realize data transmission or interaction.
The Memory 120 may be, but is not limited to, a random access Memory (Random Access Memory, RAM), a Read Only Memory (ROM), a programmable Read Only Memory (Programmable Read-Only Memory, PROM), an erasable Read Only Memory (Erasable Programmable Read-Only Memory, EPROM), an electrically erasable Read Only Memory (Electric Erasable Programmable Read-Only Memory, EEPROM), etc. The memory 120 is used for storing a program, and the processor 130 executes the program after receiving an execution instruction.
The communication unit 140 includes a first network card and a second network card, and is configured to establish a communication connection with a server and a monitoring device through a network, and is configured to send and receive data through the network. The network may include a wired network, a wireless network, a fiber optic network, a telecommunications network, an intranet, the internet, a local area network (Local Area Network, LAN), a wide area network (Wide Area Network, WAN), a wireless local area network (Wireless Local Area Networks, WLAN), a metropolitan area network (Metropolitan Area Network, MAN), a wide area network (Wide Area Network, WAN), a public switched telephone network (Public Switched Telephone Network, PSTN), a bluetooth network, a ZigBee network, a near field communication (Near Field Communication, NFC) network, or the like, or any combination thereof. In some embodiments, the network may include one or more network access points. For example, the network may include wired or wireless network access points, such as base stations and/or network switching nodes, through which one or more components of the service request processing system may connect to the network to exchange data and/or information.
The processor 130 may be an integrated circuit chip with signal processing capabilities and may include one or more processing cores (e.g., a single-core processor or a multi-core processor). By way of example only, the processors may include a central processing unit (Central Processing Unit, CPU), an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), a special instruction set Processor (Application Specific Instruction-set Processor, ASIP), a graphics processing unit (Graphics Processing Unit, GPU), a physical processing unit (Physics Processing Unit, PPU), a digital signal Processor (Digital Signal Processor, DSP), a field programmable gate array (Field Programmable Gate Array, FPGA), a programmable logic device (Programmable Logic Device, PLD), a controller, a microcontroller unit, a reduced instruction set computer (Reduced Instruction Set Computing, RISC), a microprocessor, or the like, or any combination thereof.
The operating system in the data transmission device may be, but is not limited to, android (Android) system, IOS (iPhone operating system) system, windows phone system, windows system, linux, and the like.
For example, a raspberry group may be selected as the data transmission device, and a centros system may be installed on the raspberry group, and the data transmission method provided in this embodiment may be performed. It should be understood that the raspberry group is an ARM-based microcomputer motherboard, and cannot send the monitoring picture in the local area network to the server in the public network through the data transmission method of the embodiment, and the raspberry group is further configured with an FPGA chip for providing powerful audio and video coding capability to reduce the delay in the process of transmitting the monitoring picture. On the basis, the raspberry group is also provided with an HDMI interface for displaying a monitoring picture of the monitoring equipment.
Based on the above description, an embodiment of the method for providing data transmission will be described in detail with reference to fig. 3. As shown in fig. 3, the method includes:
s101, receiving a screening instruction input by a user.
S102, determining target monitoring equipment from candidate monitoring equipment according to the screening instruction.
In view of privacy and other factors, the candidate monitoring devices in the local area network are not all connected to the public network, but in the related scheme, a corresponding technology is not provided for screening the candidate monitoring devices in the local area network, and all the candidate monitoring devices in the local area network are connected to the public network.
In an alternative embodiment, the data transmission device has a built-in web page, and the user can access the web page through an access interface provided by the data transmission device. The web page is displayed with a plurality of device identifiers which respectively correspond to different candidate monitoring devices.
Then, the data processing device receives a screening instruction input by a user through the web page, and determines the target monitoring device.
S103, acquiring a monitoring image of the target monitoring device through the first network card.
S104, the monitoring image is sent to the server through the second network card.
It should be appreciated that the related solution typically provides only a single network card, which means that it is necessary to communicate with both the target monitoring device in the local area network and the server located in the public network through the one network card, which requires a complex configuration (e.g. port mapping) of the network when the user is in use. And when the knowledge of the related network is not enough, the use experience of the user can be seriously reduced.
Therefore, in this embodiment, the data transmission device is provided with the first network card and the second network card, so that the data transmission device can communicate with the target monitoring device in the local area network through the first network card, and the network address of the second network card is configured, so that the data transmission device can communicate with the server through the second network card, and the target monitoring device can be connected to the public network by simply configuring the network address, so that the complexity of the user in use is simplified.
Illustratively, as shown in fig. 4, the data transmission device receives a pull request sent by the server, and forwards the pull request to the corresponding target monitoring device. The target monitoring device transmits an RTSP stream to the data transmission device in response to the pull stream request. Whereas a device video stream in a lan needs to be converted into an RTSP video stream supporting public network pull stream (e.g., into an RTP stream supporting GB 28181) to enable a server located in the public network to pull streams. Therefore, the data transmission device converts the RTSP stream sent by the target monitoring device and sends the converted RTSP stream to the server.
In order to reduce the delay of server streaming, the data transmission device is configured with the encoding and decoding (for example, FPGA) of the video stream, so as to increase the encoding and decoding speed, thereby playing a role in reducing the video delay in the process of reissuing the code stream.
The inventor further researches and discovers that the security authentication and the security transmission capability are not provided in the related technology of forwarding the monitoring image in the local area network to the public network, and the problems that the security and the privacy of related data cannot be guaranteed and the like exist.
In view of this, the data processing apparatus acquires authorization information, wherein the authorization information includes an authorization code entered by a user, the authorization code being provided by the server; then, the authorization information is sent to a server; the receiving server sends the first public key according to the authorization code.
Based on the first public key, the data transmission equipment acquires preconfigured login information; then, encrypting the login information through a first public key to obtain encrypted login information; and finally, sending the encrypted login information to a server, wherein the encrypted login information is used for indicating the server to verify the identity of the data transmission equipment.
The data transmission equipment generates a paired second public key and a second private key; acquiring a preconfigured user name and a user password; then, the second public key, the user name and the user password are used as login information.
It should be understood that the server verifies the identity of the data transmission device by the user name and the user password in the login information, and encrypts the signaling sent to the data transmission device by the second public key, thereby avoiding sending the message to the data transmission device in a plaintext manner.
For example, as shown in fig. 5, since the server needs to verify the data transmission device through the authorization code before subsequent communication can be performed, the data transmission device obtains the authorization code from the outside, for example, the user logs in the server using the personal terminal, and applies for obtaining the authorization code. The data transmission device provides a corresponding configuration interface and receives the authorization code input by the user.
In addition, in order for the server to uniquely bind the authorization code with the data transmission device, the data transmission device collects its own serial number, and then constructs authorization information according to the manner of table 1, and transmits it to the server.
TABLE 1
Authorization code (8-bit pure digital) | Sequence number |
xxxxxxxx | xxxxxxxxxxxx |
The server acquires the authorization code in the authorization information and verifies the authorization code, and after the verification is successful, the server generates a first matched public key and a first private key, constructs response information according to the mode of the table 2 and sends the response information to the data transmission equipment.
TABLE 2
Authorization code (8-bit pure digital) | Platform public key |
xxxxxxxx | xxxxxxxxxxxx |
With continued reference to fig. 5, the data transmission device generates a paired second private key and second public key, obtains a user name and a user password, encrypts the user name, the user password and the public key through the first public key, and sends the obtained encrypted login information to the server. Wherein the login information is structured as follows:
“{cmd:login:{user:xxxxx,password:xxxx,pubilckey:xxx}}”
where "cmd: login" represents message type login information, "user: xxxxx" represents a user name, "password: xxxx" represents a user secret, "pubilkey: xxx" represents a second public key.
The server decrypts the encrypted login information through the first private key, verifies the user name and the user password in the encrypted login information, and sends a notification message of successful login to the data transmission equipment after the user name and the user password are successfully verified, wherein the notification message of successful login is encrypted through the second public key.
In addition, when the monitoring image relates to the private information, in order to avoid data, the data transmission device can encrypt the monitoring image through the first public key to obtain an encrypted image; and then, the encrypted image is sent to the server through the second network card.
In order to facilitate a user at a service end to remotely view and remotely control a real-time image of the target monitoring device, the problem that a part of old target monitoring devices do not support a cradle head function is considered. Therefore, in order to enable the user at the server end to know the functions supported by each target monitoring device, the output transmission device collects the function information of the target monitoring device and sends the function information to the server.
For example, the function information of the monitoring device may be expressed as:
with continued reference to fig. 4, based on the function information supported by each target monitoring device sent by the data transmission device, the server may send a corresponding command to the data transmission device to control the corresponding target monitoring device. The signaling thus comprises a first control command for controlling the target monitoring device, wherein the first control command meets a first control protocol agreed upon by the data transmission device.
In view of this, the data processing apparatus receives a first control instruction; and then, generating a second control instruction according to the first control instruction, wherein the second control instruction meets a second control protocol agreed by the target monitoring equipment.
And finally, sending a second control instruction to the target monitoring equipment, wherein the second control instruction is used for indicating the target monitoring equipment to execute corresponding operation.
For example, a control instruction for controlling the pan/tilt adjustment function of the target monitoring apparatus may be expressed as:
in consideration of each target monitoring device in the local area network, in order to provide the best monitoring visual angle and picture effect, the pitch angle, the focal length, the horizontal angle and the like are correspondingly adjusted at the beginning of erection according to the actual erection position, and when a user at one end of the server carries out remote control on the target monitoring device, the best shooting effect can be broken.
In view of this, the data transmission device acquires the current device state of the target monitoring device after receiving the first control instruction, where the device state is related to the imaging effect of the target monitoring device.
And then, after the data transmission equipment sends a second control instruction corresponding to the first control instruction to the target monitoring equipment, if the new first control instruction is not received within the preset control duration, the target monitoring equipment is controlled to be restored to the equipment state. Thus, the target monitoring device can restore the optimal monitoring effect.
It should be noted that, a third control instruction is agreed between the data transmission device and the server, so as to adjust the device state of the target monitoring device permanently. When the data transmission equipment receives the third control instruction, the third control instruction is directly converted into a corresponding fourth control instruction, and the corresponding fourth control instruction is sent to the target monitoring equipment to control the target monitoring equipment to adjust the current equipment state, and the current equipment state adjusted by the target monitoring equipment is not recorded.
The research finds that most of target monitoring devices in the local area network are old monitoring devices and do not have an AI function, so that the detection of abnormal events is difficult to realize.
In view of this, the data transmission apparatus recognizes the monitoring image photographed by the target monitoring apparatus; judging whether an abnormal event is recorded in the monitoring image; and if the identification result of the monitoring image indicates that the target monitoring equipment shoots an abnormal event, sending alarm information of the abnormal event to the server.
For example, the data transmission device may be configured with a fire identification model based on neural network principles; and inputting the monitoring image into the fire disaster identification model, and sending alarm information of fire disaster to the service if the output result shows that the fire disaster occurs. Of course, the abnormal event is not limited to fire, but may include high altitude falling, theft, abnormal person wandering, and the like.
For example, the structure of the alarm information may be expressed as:
in addition, when the operation of the target monitoring equipment is abnormal, the alarm information of the abnormal operation of the equipment can be sent to the server, so that a user at one end of the server can repair the equipment in time.
In some scenarios, it is sometimes necessary to view the historical images captured by the target monitoring device, so the data transmission device caches the historical images for a preset period of time. The data transmission equipment receives a playback request sent by a server; acquiring a playback period according to the playback request; then, a playback image corresponding to the playback period is read from the locally cached history image and sent to the server. For example, the data transmission device may convert the playback image into an RTSP bitstream, and transmit the RTSP bitstream to the server.
The message structure of the playback request may be:
{cmd:replayurl,data:{id:xxxxx,name:xxx}}
based on the same inventive concept of the data transmission method, the embodiment also provides a data transmission device applied to the data transmission device, wherein the data transmission device comprises a first network card and a second network card, and is in communication connection with the candidate monitoring device in the local area network through the first network card, and is in communication connection with the server in the public network through the second network card. The data transmission means comprise at least one functional module which may be stored in the memory 120 in the form of software. As shown in fig. 6, functionally divided, the data transmission apparatus may include:
the filtering module 201 is configured to receive a filtering instruction input by a user.
The screening module 201 is further configured to determine a target monitoring device from the candidate monitoring devices according to the screening instruction.
Wherein, the filtering module 201 is configured to implement steps S101-S102 in fig. 2, and for a detailed description of the filtering module 201, reference may be made to the detailed description of steps S101-S102.
The image module 202 is configured to obtain a monitoring image of the target monitoring device through the first network card.
Wherein the image module 202 is used to implement step S103 in fig. 2, and the detailed description of the image module 202 may refer to the detailed description of step S103.
And the sending module 203 is configured to send the monitoring image to the server through the second network card.
The sending module 203 is configured to implement step S104 in fig. 2, and a detailed description of the sending module 203 may refer to a detailed description of step S104.
It should be noted that the data transmission device may further include other functional modules for implementing other steps or sub-steps of the data transmission method. Of course, the filtering module 201, the image module 202, and the sending module 203 may be used to implement other steps or sub-steps of the data transmission method. Those skilled in the art may make appropriate adjustments according to different module division criteria, and the embodiment is not particularly limited.
The embodiment also provides a data transmission device, which comprises a processor and a memory, wherein the memory stores a computer program, and the data transmission method is realized when the computer program is executed by the processor.
The present embodiment also provides a computer-readable storage medium storing a computer program, which when executed by a processor, implements the data transmission method.
In summary, in the data transmission method, device, equipment and medium provided in the embodiments of the present application, the data transmission device includes a first network card and a second network card, according to a screening instruction input by a user, a monitoring image captured by a screened target monitoring device is obtained through the first network card, and then is sent to a server located in a public network through the second network card, so that the operation difficulty when the user uses the data transmission device is simplified.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners as well. The apparatus embodiments described above are merely illustrative, for example, flow diagrams and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, the functional modules in the embodiments of the present application may be integrated together to form a single part, or each module may exist alone, or two or more modules may be integrated to form a single part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely various embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily think about changes or substitutions within the technical scope of the present application, and the changes and substitutions are intended to be covered in the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
Claims (8)
1. The data transmission method is characterized by being applied to data transmission equipment, wherein the data transmission equipment comprises a first network card and a second network card, and is in communication connection with candidate monitoring equipment in a local area network through the first network card, and is in communication connection with a server in a public network through the second network card, and the method comprises the following steps:
receiving a screening instruction input by a user;
determining target monitoring equipment from the candidate monitoring equipment according to the screening instruction;
acquiring a monitoring image of the target monitoring device through the first network card;
the monitoring image is sent to the server through the second network card;
acquiring authorization information, wherein the authorization information comprises an authorization code input by a user, and the authorization code is provided by the server;
transmitting the authorization information to the server so that the server obtains the authorization code in the authorization information and verifies the authorization code; after verification is successful, the server generates a paired first public key and a first private key, and sends the first public key to data transmission equipment;
receiving a first public key sent by the server according to the authorization code;
generating a paired second public key and a second private key;
acquiring a preconfigured user name and a user password;
taking the user name, the user password and the second public key as login information, wherein the second public key is used for indicating the server to encrypt signaling sent to the data transmission equipment through the second public key;
encrypting the login information through the first public key to obtain encrypted login information;
and sending the encrypted login information to the server, wherein the encrypted login information is used for indicating the server to decrypt the encrypted login information through the first private key, verifying a user name and a user password in the encrypted login information, and sending a notification message of successful login to the data transmission equipment after the verification is successful, wherein the notification message of successful login is encrypted by using the second public key.
2. The data transmission method according to claim 1, wherein the sending the monitoring image to the server through the second network card includes:
encrypting the monitoring image through the first public key to obtain an encrypted image;
and sending the encrypted image to the server through the second network card.
3. The data transmission method of claim 1, wherein the signaling includes a first control instruction for controlling the target monitoring device, the first control instruction satisfying a first control protocol agreed by the data transmission device, the method further comprising:
receiving the first control instruction;
generating a second control instruction according to the first control instruction, wherein the second control instruction meets a second control protocol agreed by the target monitoring equipment;
and sending the second control instruction to the target monitoring equipment, wherein the second control instruction is used for indicating the target monitoring equipment to execute corresponding operation.
4. The data transmission method according to claim 3, wherein before the second control instruction is sent to the target monitoring apparatus, the method further comprises:
acquiring the current equipment state of the target monitoring equipment, wherein the equipment state is related to the imaging effect of the target monitoring equipment;
after the second control instruction is sent to the target monitoring device, the method further includes:
and if a new first control instruction is not received within the preset control duration, controlling the target monitoring equipment to restore to the equipment state.
5. The data transmission method according to claim 1, characterized in that the method further comprises:
identifying the monitoring image;
and if the identification result of the monitoring image indicates that the target monitoring equipment shoots an abnormal event, sending alarm information of the abnormal event to the server.
6. The utility model provides a data transmission device, its characterized in that is applied to data transmission equipment, data transmission equipment includes first network card and second network card, and pass through first network card and the candidate supervisory equipment communication connection who is located in the LAN, pass through second network card and the server communication connection who is located the public network, data transmission device includes:
the screening module is used for receiving a screening instruction input by a user;
the screening module is further used for determining target monitoring equipment from the candidate monitoring equipment according to the screening instruction;
the image module is used for acquiring a monitoring image of the target monitoring device through the first network card;
the sending module is used for sending the monitoring image to the server through the second network card;
the sending module is further configured to obtain authorization information, where the authorization information includes an authorization code input by a user, and the authorization code is provided by the server;
transmitting the authorization information to the server so that the server obtains the authorization code in the authorization information and verifies the authorization code; after verification is successful, the server generates a paired first public key and a first private key, and sends the first public key to data transmission equipment;
receiving a first public key sent by the server according to the authorization code;
generating a paired second public key and a second private key;
acquiring a preconfigured user name and a user password;
taking the user name, the user password and the second public key as login information, wherein the second public key is used for indicating the server to encrypt signaling sent to the data transmission equipment through the second public key;
encrypting the login information through the first public key to obtain encrypted login information;
and sending the encrypted login information to the server, wherein the encrypted login information is used for indicating the server to decrypt the encrypted login information through the first private key, verifying a user name and a user password in the encrypted login information, and sending a notification message of successful login to the data transmission equipment after the verification is successful, wherein the notification message of successful login is encrypted by using the second public key.
7. A data transmission device comprising a processor and a memory, characterized in that the memory stores a computer program which, when executed by the processor, implements the data transmission method of any of claims 1-5.
8. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which, when executed by a processor, implements the data transmission method of any one of claims 1-5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111210952.2A CN113949848B (en) | 2021-10-18 | 2021-10-18 | Data transmission method, device, equipment and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111210952.2A CN113949848B (en) | 2021-10-18 | 2021-10-18 | Data transmission method, device, equipment and medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113949848A CN113949848A (en) | 2022-01-18 |
CN113949848B true CN113949848B (en) | 2023-06-27 |
Family
ID=79331217
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111210952.2A Active CN113949848B (en) | 2021-10-18 | 2021-10-18 | Data transmission method, device, equipment and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113949848B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115834939B (en) * | 2023-02-21 | 2023-05-12 | 北京匠数科技有限公司 | Electronic screen information monitoring equipment and method and electronic screen content security pre-examination system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102007000963A1 (en) * | 2007-10-11 | 2009-04-23 | Rüterbories, Karin | Input/output interface for producing secured connection for data exchange between servers, has partition elements assigned to data paths and activated and deactivated, respectively, in alarm-free normal operation |
CN103139778A (en) * | 2013-03-25 | 2013-06-05 | 北京奇虎科技有限公司 | Wireless local area network access system and method |
CN104734951A (en) * | 2013-12-20 | 2015-06-24 | Abb技术有限公司 | Network interface for transmitting protection data of a power network |
CN109901525A (en) * | 2017-12-07 | 2019-06-18 | 刘健 | The soil monitoring system of network-control |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2003251896A1 (en) * | 2003-07-15 | 2005-03-07 | Joseph Caldarola | Method and system for delivering media data |
CN101237353B (en) * | 2007-09-07 | 2011-10-05 | 北京飞天诚信科技有限公司 | A method and system for monitoring mobile storage device based on USBKEY |
CN101753583A (en) * | 2010-01-18 | 2010-06-23 | 友达光电股份有限公司 | Method for data transmission by using network multi-channel |
CN103299581A (en) * | 2011-01-12 | 2013-09-11 | 适应性频谱和信号校正股份有限公司 | Systems and methods for jointly optimizing WAN and LAN network communications |
CN103118149B (en) * | 2013-03-04 | 2016-06-29 | 华为技术有限公司 | Communication control method between same tenant's server and the network equipment |
JP5866549B1 (en) * | 2014-11-20 | 2016-02-17 | パナソニックIpマネジメント株式会社 | Monitoring system and monitoring method in monitoring system |
CN106162634B (en) * | 2015-03-24 | 2019-04-26 | 华为技术有限公司 | Data interactive method and gateway between a kind of gateway |
CN106027492A (en) * | 2016-04-29 | 2016-10-12 | 努比亚技术有限公司 | Data transmission terminal and method |
CN106534799A (en) * | 2016-12-08 | 2017-03-22 | 北京小米移动软件有限公司 | Monitoring method and control equipment |
US11075880B2 (en) * | 2017-04-27 | 2021-07-27 | Huawei Technologies Co., Ltd. | Data service implementation method and apparatus, and terminal |
CN109982065B (en) * | 2017-12-27 | 2020-10-20 | 浙江宇视科技有限公司 | Method, device and storage medium for equipment fault recovery in video monitoring network |
CN110224917B (en) * | 2018-03-02 | 2021-10-08 | 杭州海康威视数字技术股份有限公司 | Data transmission method, device and system and server |
CN108307202B (en) * | 2018-03-07 | 2019-12-13 | 广州图普网络科技有限公司 | Real-time video transcoding sending method and device and user terminal |
CN111294375B (en) * | 2018-12-07 | 2022-11-25 | 浙江宇视科技有限公司 | Monitoring equipment connection method and device |
CN113132973B (en) * | 2019-12-31 | 2022-05-24 | 佛山市云米电器科技有限公司 | Equipment network distribution method and system and computer readable storage medium |
-
2021
- 2021-10-18 CN CN202111210952.2A patent/CN113949848B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102007000963A1 (en) * | 2007-10-11 | 2009-04-23 | Rüterbories, Karin | Input/output interface for producing secured connection for data exchange between servers, has partition elements assigned to data paths and activated and deactivated, respectively, in alarm-free normal operation |
CN103139778A (en) * | 2013-03-25 | 2013-06-05 | 北京奇虎科技有限公司 | Wireless local area network access system and method |
CN104734951A (en) * | 2013-12-20 | 2015-06-24 | Abb技术有限公司 | Network interface for transmitting protection data of a power network |
CN109901525A (en) * | 2017-12-07 | 2019-06-18 | 刘健 | The soil monitoring system of network-control |
Also Published As
Publication number | Publication date |
---|---|
CN113949848A (en) | 2022-01-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20180248694A1 (en) | Assisted device provisioning in a network | |
US11188636B2 (en) | System for controlling access to an account | |
US9674879B2 (en) | Provisioning of electronic devices | |
US8923817B2 (en) | Mobility device security | |
WO2015180261A1 (en) | Smart home access method, control centre device and wearable terminal | |
JP2017535122A (en) | Sensor code verification processing method, apparatus, network platform device, and Internet gateway of things | |
US11611874B2 (en) | Thincloud mesh access point (AP) and internet of things (IoT) device onboarding | |
US11652640B2 (en) | Systems and methods for out-of-band authenticity verification of mobile applications | |
KR100651717B1 (en) | Method and home network system for authentication between remote terminal and home network using smart card | |
CN113949848B (en) | Data transmission method, device, equipment and medium | |
JP6408627B2 (en) | Remote device control system and remote device control method | |
WO2022166775A1 (en) | Elevator accessory authentication method and system, and server and storage medium | |
US20190207937A1 (en) | Method and system for securing communications between a lead device and a secondary device | |
KR101875921B1 (en) | Interworking method between integrated control system video security system | |
CN112422479B (en) | Equipment binding method, device and system | |
JP6068379B2 (en) | Control terminal, home gateway, communication method and program | |
CN106953873A (en) | A kind of safety management system of encryption device encryption information | |
KR20170082882A (en) | Network video recorder and method for blocking video data using the same | |
US20150207836A1 (en) | System and method for multiplex streaming of mobile devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |