CN114938465B - Encrypted data transmission method and device based on characteristic sequence - Google Patents

Encrypted data transmission method and device based on characteristic sequence Download PDF

Info

Publication number
CN114938465B
CN114938465B CN202210875052.8A CN202210875052A CN114938465B CN 114938465 B CN114938465 B CN 114938465B CN 202210875052 A CN202210875052 A CN 202210875052A CN 114938465 B CN114938465 B CN 114938465B
Authority
CN
China
Prior art keywords
face
feature sequence
face feature
white list
video stream
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210875052.8A
Other languages
Chinese (zh)
Other versions
CN114938465A (en
Inventor
王立峰
邱达
刘家明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Wise Security Technology Co Ltd
Original Assignee
Guangzhou Wise Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Wise Security Technology Co Ltd filed Critical Guangzhou Wise Security Technology Co Ltd
Priority to CN202210875052.8A priority Critical patent/CN114938465B/en
Publication of CN114938465A publication Critical patent/CN114938465A/en
Application granted granted Critical
Publication of CN114938465B publication Critical patent/CN114938465B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving video stream encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/168Feature extraction; Face representation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • H04N21/26613Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing keys in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
    • H04N21/4408Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Abstract

The embodiment of the invention discloses an encrypted data transmission method and device based on a feature sequence. Therefore, even if a short message verification code or an account password is leaked in the process of logging in the platform by a user, other terminals cannot acquire the encrypted monitoring video stream corresponding to the verification code, and the technical problem of low safety in the mode of acquiring the monitoring video through the short message verification code or the account password in the prior art is solved.

Description

Encrypted data transmission method and device based on characteristic sequence
Technical Field
The embodiment of the application relates to the field of video streaming, in particular to a method and a device for transmitting encrypted data based on a feature sequence.
Background
At present, in order to monitor the conditions at home, many users choose to install a camera at home, the camera uploads a shot monitoring video to a server for storage, and then the users can review or watch the monitoring video in real time by accessing the server through user terminals such as mobile phones. However, currently, when a user acquires a surveillance video from a server, the user generally logs in a related platform through a short message verification code or an account password, and acquires the surveillance video through the platform, but when the account password or the short message verification code of the user is leaked, the data of the surveillance video is easily stolen by other people, so that the privacy of the user cannot be guaranteed.
In summary, in the prior art, a technical problem of low security exists in a manner of acquiring a monitoring video through a short message verification code or an account password.
Disclosure of Invention
The embodiment of the invention provides a feature sequence-based encrypted data transmission method and device, which can improve the security in the process of acquiring a monitoring video and solve the technical problem of lower security in the prior art of acquiring the monitoring video through a short message verification code or an account password.
In a first aspect, an embodiment of the present invention provides an encrypted data transmission method based on a feature sequence, including:
carrying out face detection on a monitoring video stream, and capturing a first face image corresponding to a detected face in the monitoring video stream;
encrypting the monitoring video stream to obtain an encrypted monitoring video stream;
acquiring a pre-stored first face feature sequence white list, and determining whether a corresponding target face image exists in the first face feature sequence white list or not according to the first face image; the first face feature sequence white list comprises face images stored in advance and face feature sequences corresponding to the face images;
if yes, acquiring a target human face characteristic sequence from the first human face characteristic sequence white list, and storing the target human face characteristic sequence as a verification code of the encrypted monitoring video stream;
responding to a video acquisition request sent by a user terminal, wherein the video acquisition request comprises a second face feature sequence white list;
traversing the second face feature sequence white list based on the verification code, and if the verification code is located in the second face feature sequence white list, sending the encrypted monitoring video stream corresponding to the verification code to the user terminal.
Preferably, the face feature sequence of the first face feature sequence white list is obtained by the following method:
carrying out feature recognition on the face images in the first face feature sequence white list to obtain face feature data;
and obtaining a face feature sequence of the first face feature sequence white list based on the face feature data.
Preferably, the obtaining the face feature sequence in the first face feature sequence white list based on the face feature data includes:
and performing binary conversion on the face feature data by using an SHA256 algorithm to obtain a face feature sequence in the first face feature sequence white list.
Preferably, the number of the target face images is one;
correspondingly, the obtaining of the target face feature sequence from the first face feature sequence white list includes:
and acquiring a face feature sequence corresponding to the target face image from the first face feature sequence white list as a target face feature sequence.
Preferably, the number of the target face images is more than one;
correspondingly, the obtaining of the target face feature sequence from the first face feature sequence white list includes:
determining the frequency of occurrence of each face in the surveillance video stream;
and taking the face image corresponding to the face with the highest frequency as a second face image, and acquiring a face feature sequence corresponding to the second face image from the first face feature sequence white list as the target face feature sequence.
Preferably, the second face feature sequence white list at least includes a face feature sequence corresponding to a user to which the user terminal belongs.
Preferably, before responding to the video acquisition request sent by the user terminal, the method further includes:
receiving a user face image of a current user uploaded by the user terminal;
judging whether the face image of the user exists in a corresponding face image in the first face feature sequence white list or not;
and if so, allowing to respond to the video acquisition request sent by the user terminal.
In a second aspect, an embodiment of the present invention provides an encrypted data transmission apparatus based on a feature sequence, including:
the system comprises a face detection module, a face detection module and a face recognition module, wherein the face detection module is used for carrying out face detection on a monitoring video stream and capturing a first face image corresponding to a detected face in the monitoring video stream;
the video stream encryption module is used for encrypting the monitoring video stream to obtain an encrypted monitoring video stream;
the first verification module is used for acquiring a pre-stored first face feature sequence white list and determining whether a corresponding target face image exists in the first face feature sequence white list or not according to the first face image; the first face feature sequence white list comprises face images which are stored in advance and face feature sequences corresponding to the face images;
a verification code obtaining module, configured to obtain a target human face feature sequence from the first human face feature sequence white list if a corresponding human face image exists in the first human face feature sequence white list, and store the target human face feature sequence as a verification code of the encrypted surveillance video stream;
the request response module is used for responding to a video acquisition request sent by a user terminal, wherein the video acquisition request comprises a second face feature sequence white list;
and the video stream sending module is used for traversing the second face feature sequence white list based on the verification code, and sending the encrypted monitoring video stream corresponding to the verification code to the user terminal if the verification code is positioned in the second face feature sequence white list.
In a third aspect, an embodiment of the present invention provides an encrypted data transmission device, where the encrypted data transmission device includes a processor and a memory;
the memory is used for storing a computer program and transmitting the computer program to the processor;
the processor is configured to execute a method of encrypted data transmission based on a signature sequence according to the instructions of the computer program.
In a fourth aspect, embodiments of the present invention provide a storage medium storing computer-executable instructions for performing a method of feature sequence based encrypted data transmission as described in the first aspect when executed by a computer processor.
In the foregoing, an embodiment of the present invention provides a feature sequence-based encrypted data transmission method, where a first face feature sequence white list is set, and when a face corresponding to a face image in the first face feature sequence white list exists in a surveillance video stream, a target face feature sequence is obtained from the first face feature sequence white list and stored as a verification code of an encrypted surveillance video stream, and when a video obtaining request is sent by a subsequent user terminal, a second face feature sequence white list needs to be uploaded, and if the target face feature sequence is in the second face feature sequence white list, the corresponding encrypted surveillance video stream is sent to the user terminal. Therefore, even if a short message verification code or an account password is leaked in the process of logging in a platform by a user, other terminals cannot acquire the encrypted monitoring video stream corresponding to the verification code, the security in the process of acquiring the encrypted monitoring video stream is improved, the privacy of the user is also protected, and the technical problem of low security existing in the mode of acquiring the monitoring video through the short message verification code or the account password in the prior art is solved.
Drawings
Fig. 1 is a schematic flowchart of an encrypted data transmission method based on a feature sequence according to an embodiment of the present invention.
Fig. 2 is a schematic diagram of uploading a monitoring video stream by a camera according to an embodiment of the present invention.
Fig. 3 is a schematic diagram of a user terminal acquiring an encrypted monitoring video according to an embodiment of the present invention.
Fig. 4 is a flowchart illustrating another encrypted data transmission method based on a signature sequence according to an embodiment of the present invention.
Fig. 5 is a schematic structural diagram of an encrypted data transmission apparatus based on a feature sequence according to an embodiment of the present invention.
Fig. 6 is a schematic structural diagram of an encrypted data transmission device according to an embodiment of the present invention.
Detailed Description
The following description and the annexed drawings set forth in detail certain illustrative embodiments of the application so as to enable those skilled in the art to practice them. The examples merely typify possible variations. Individual components and functions are optional unless explicitly required, and the sequence of operations may vary. Portions and features of some embodiments may be included in or substituted for those of others. The scope of the embodiments of the present application includes the full ambit of the claims, as well as all available equivalents of the claims. Embodiments may be referred to herein, individually or collectively, by the term "invention" merely for convenience and without intending to voluntarily limit the scope of this application to any single invention or inventive concept if more than one is in fact disclosed. Herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed. The embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. For the structures, products and the like disclosed by the embodiments, the description is relatively simple because the structures, the products and the like correspond to the parts disclosed by the embodiments, and the relevant parts can be just described by referring to the method part.
As shown in fig. 1, fig. 1 is a flowchart of an encrypted data transmission method based on a feature sequence according to an embodiment of the present invention. The encrypted data transmission method based on the characteristic sequence provided by the embodiment of the invention can be executed by encrypted data transmission equipment, the encrypted data transmission equipment can be realized in a software and/or hardware mode, and the encrypted data transmission equipment can be composed of two or more physical entities or one physical entity. For example, the encrypted data transmission device may be a device having a data processing function, such as a server or an upper computer. The method comprises the following steps:
step 101, performing face detection on the monitoring video stream, and capturing a first face image corresponding to the detected face in the monitoring video stream.
In this embodiment, as shown in fig. 2, the camera is installed in the living environment of the user, the camera is remotely connected to the encrypted data transmission device in the cloud, and after the camera captures the surveillance video stream of the living environment, the surveillance video stream is uploaded to the encrypted data transmission device. Then, the encrypted data transmission device performs face detection on the surveillance video stream, thereby recognizing a face appearing in the surveillance video stream. In this embodiment, a face may be recognized from the surveillance video stream by using an existing face detection algorithm, for example, a face feature point-based recognition algorithm or a neural network-based face recognition algorithm, and the specific process may refer to the prior art and is not described in detail in this embodiment. After the faces are identified, the encrypted data transmission device intercepts a first face image corresponding to each identified face from the monitoring video stream. It can be understood that for each face identified, only one corresponding first face image is intercepted.
Step 102, the monitoring video stream is encrypted to obtain an encrypted monitoring video stream.
After the face appearing in the surveillance video stream is identified, the encrypted data transmission device further encrypts the surveillance video stream to obtain an encrypted surveillance video stream.
103, acquiring a pre-stored first face feature sequence white list, and determining whether a corresponding target face image exists in the first face feature sequence white list or not according to the first face image; the first face feature sequence white list comprises face images which are stored in advance and face feature sequences corresponding to the face images.
And then, the encrypted data transmission equipment acquires a first face feature sequence white list stored in advance by the user from a database of the encrypted data transmission equipment, wherein the first face feature sequence white list comprises face images stored in advance by the user and face feature sequences corresponding to the face images. The face feature sequence may be a sequence including face feature information in a face image. And after the encrypted data transmission equipment acquires the first face characteristic sequence white list, searching whether a target face image corresponding to the first face image exists in the first face characteristic sequence white list. The target face image refers to a face image having the same face as the first face image. For example, the encrypted data transmission device may compare the similarity between the first face image and the face image in the first face feature sequence white list, and if the similarity is greater than a preset similarity threshold, it may be determined that the faces in the first face image and the face image are the same face, that is, the face image is a target face image corresponding to the first face image.
In one embodiment, the face feature sequences in the first face feature sequence white list are obtained by the following method:
and step 1031, carrying out feature recognition on the face images in the first face feature sequence white list to obtain face feature data.
Firstly, a face feature recognition algorithm is adopted to perform feature recognition on a face image, and face feature data are obtained from the face image.
And 1032, obtaining a face feature sequence in the first face feature sequence white list based on the face feature data.
And then, converting the face characteristic data to obtain a face characteristic sequence. For example, the face feature data is subjected to binary conversion, and the face feature data is converted into binary data, octal data, hexadecimal data, or the like, so that a face feature sequence is obtained. In one embodiment, the SHA256 algorithm may be used to perform a binary conversion on the face feature data to obtain a face feature sequence in the first face feature sequence white list.
And 104, if the target face characteristic sequence exists, acquiring the target face characteristic sequence from the first face characteristic sequence white list, and storing the target face characteristic sequence as a verification code of the encrypted monitoring video stream.
And if the first face feature sequence white list has a target face image corresponding to the first face image, the encrypted data transmission equipment acquires a target face feature sequence from the face feature sequence of the first face feature sequence white list, and stores the target face feature sequence as a verification code of the encrypted monitoring video stream. Therefore, a user can upload in advance a face image of an object to be privacy-protected and a corresponding face feature sequence, such as a face image of each person in a family member and a corresponding face feature sequence, in a first face feature sequence white list, and when a face of any one family person appears in a monitored video stream, the encrypted data transmission device sets a corresponding verification code for the monitored video stream. In an embodiment, the encrypted data transmission device may use a face feature sequence corresponding to the target face image as a verification code, or may arbitrarily select one face feature sequence from face feature sequences in a first face feature sequence white list as the target face feature sequence.
And step 105, responding to a video acquisition request sent by the user terminal, wherein the video acquisition request comprises a second face feature sequence white list.
Subsequently, when the user needs to acquire the monitoring video stream, a video acquisition request can be sent to the encrypted data transmission device through the user terminal. It should be further noted that, in the video acquisition request, a second face feature sequence white list stored in the user terminal is further included, the second face feature sequence white list is preset by the user and stored in the user terminal, when the user terminal receives an operation instruction sent by the user when sending the video acquisition request to the encrypted data transmission device, the second face feature sequence white list is acquired and is attached to the video acquisition request, and then the video acquisition request is sent to the encrypted data transmission device. In one embodiment, in order to reduce the amount of data required to be transmitted by the video acquisition request, the video acquisition request may only include the facial feature sequences in the second facial feature sequence white list, and the facial images are not required to be included.
And 106, traversing the white list of the second face feature sequence based on the verification code, and if the verification code is located in the white list of the second face feature sequence, sending the encrypted monitoring video stream corresponding to the verification code to the user terminal.
And when the encrypted data transmission equipment receives a video acquisition request sent by the user terminal, traversing a second face feature sequence white list in the video acquisition request, and judging whether the verification code is in the second face feature sequence white list. And if the verification code is in the second face feature sequence white list, sending the encrypted monitoring video stream corresponding to the verification code to the user terminal, so that the user terminal decrypts the encrypted monitoring video stream after receiving the encrypted monitoring video stream to obtain the monitoring video stream. It can be understood that, in this embodiment, the user terminal stores a decryption algorithm corresponding to the encryption algorithm of the surveillance video stream, and the user terminal decrypts the encrypted surveillance video stream using the decryption algorithm to obtain the surveillance video stream. And if the verification code is not in the second face feature sequence white list, not sending the encrypted monitoring video stream to the user terminal. That is, a second face feature sequence white list set by the user needs to be stored on the user terminal, and the verification code also needs to be present in the second face feature sequence white list, so as to prove that the user who sets the second face feature sequence white list on the user terminal is associated with the person to which the face image corresponding to the verification code belongs, and the encrypted monitoring video stream can be transmitted to the user terminal. And if the user terminal does not have the second face feature sequence white list or the second face feature sequence white list does not comprise the face feature sequence corresponding to the verification code, the encrypted monitoring video stream is not sent to the user terminal. Therefore, even if the short message verification code or the account password on the user terminal is leaked, the encrypted monitoring video stream corresponding to the verification code cannot be acquired due to the fact that the second face feature sequence white list is not arranged on other user terminals or the face feature sequence corresponding to the verification code is not arranged in the second face feature sequence white list, safety of the user in the process of acquiring the encrypted monitoring video stream is greatly improved, and privacy of the user is protected.
Illustratively, when a user a wants to protect privacy of itself, a user B, and a user C, a face image and a face feature sequence of itself, a face image and a face feature sequence of the user B, and a face image and a face feature sequence of the user C are uploaded in a first face feature sequence white list of the server. And simultaneously setting a second face feature sequence white list at the user terminal of the user, the user terminal of the user B and the user terminal of the user C, wherein the second face feature sequence white list is the same as the first face feature sequence white list. When the server detects the face of a user A, a user B or a user C in a monitoring video stream shot by a camera, a first face image is intercepted, and after the fact that the first face image has a corresponding target face image in a first face feature sequence white list is determined, a face feature sequence is selected from the first face feature sequence white list to serve as an authentication code of the encrypted monitoring video stream. When a user a, a user B, or a user C obtains the encrypted surveillance video stream, a video obtaining request is sent to the server through the user terminal, and after receiving the video obtaining request, the server determines that the verification code is located in the second face feature sequence white list of the video obtaining request, that is, the encrypted surveillance video stream data can be sent to the corresponding user terminal, where the specific process is shown in fig. 3. It can be understood that when the face of the user a, the face of the user B, or the face of the user C does not appear in the surveillance video stream, since the privacy of the user a, the user B, or the user C is not involved, it is not necessary to set the authentication code to the encrypted surveillance video stream.
In the foregoing, an embodiment of the present invention provides a feature sequence-based encrypted data transmission method, where a first face feature sequence white list is set, and when a face corresponding to a face image in the first face feature sequence white list exists in a surveillance video stream, a target face feature sequence is obtained from the first face feature sequence white list and stored as a verification code of an encrypted surveillance video stream, and when a video obtaining request is sent by a subsequent user terminal, a second face feature sequence white list needs to be uploaded, and if the target face feature sequence is in the second face feature sequence white list, the corresponding encrypted surveillance video stream is sent to the user terminal. Therefore, even if the short message verification code or the account password is leaked in the process of logging in the platform by the user, other terminals cannot acquire the encrypted monitoring video stream corresponding to the verification code, and the privacy of the user is protected while the security in the process of acquiring the encrypted monitoring video stream is improved.
As shown in fig. 4, fig. 4 is a flowchart of another feature sequence-based encrypted data transmission method according to an embodiment of the present invention, where the feature sequence-based encrypted data transmission method is an embodiment of the feature sequence-based encrypted data transmission method, and includes the following steps:
step 201, performing face detection on the monitoring video stream, and capturing a first face image corresponding to the detected face in the monitoring video stream.
Step 202, the monitoring video stream is encrypted to obtain an encrypted monitoring video stream.
Step 203, acquiring a pre-stored first face feature sequence white list, and determining whether a corresponding target face image exists in the first face feature sequence white list according to the first face image; the first face feature sequence white list comprises face images which are stored in advance and face feature sequences corresponding to the face images.
And 204, if the encrypted monitoring video stream exists, acquiring a target face characteristic sequence from the first face characteristic sequence white list, and storing the target face characteristic sequence as a verification code of the encrypted monitoring video stream.
It should be noted that, in this embodiment, there are two cases in the number of target face images, one is that the number of target face images is only one, and the other is that the number of target face images is multiple. There are different ways to determine the target face feature sequence in this embodiment for different situations.
In one embodiment, the number of target face images is one.
Correspondingly, the obtaining of the target face feature sequence from the first face feature sequence white list includes:
and acquiring a face feature sequence corresponding to the target face image from the first face feature sequence white list as a target face feature sequence.
In this embodiment, when the number of the target face images is one, that is, only one first face image acquired in the surveillance video stream has a corresponding target face image, the face feature sequence corresponding to the target face image is used as the target face feature sequence, and the target face feature sequence is used as the verification code of the encrypted surveillance video stream and is stored. Therefore, when the target face feature sequence exists in a second face feature sequence white list of a subsequent user terminal, the corresponding encrypted monitoring video stream can be obtained. That is, only the user who knows the face feature sequence of the target face image can acquire the corresponding encrypted monitoring video stream data, and the user who can know the face feature sequence of the target face image can generally know the face feature sequence of the target face image by the user who has a certain contact with the user to which the target face image belongs, so that the privacy of the user can be further protected.
In another embodiment, when the number of target face images is more than one.
Correspondingly, the step of obtaining a face feature sequence corresponding to the face from the first face feature sequence white list as a target face feature sequence comprises the following steps:
the frequency of each face in the surveillance video stream is determined.
It should be noted that, in another embodiment, when a white list of a first face feature sequence of a first face image of multiple faces captured in a surveillance video stream has multiple corresponding target face images, the frequency of occurrence of each face is determined in the surveillance video stream first.
And taking the target face image corresponding to the face with the highest frequency as a second face image, and acquiring a face feature sequence corresponding to the second face image from the first face feature sequence white list as a target face feature sequence.
And then, taking the target face image corresponding to the face with the highest occurrence frequency as a second face image, and acquiring a face feature sequence corresponding to the second face image from the first face feature sequence white list as a target face feature sequence. Because the frequency of the face corresponding to the second face image appearing in the surveillance video stream is the highest, which means that most of the video content in the surveillance video stream is related to the user to which the second face image belongs, the face feature sequence corresponding to the second face image is used as the target face feature sequence, and the target face feature sequence is used as the verification code of the encrypted surveillance video stream data.
And step 205, receiving the user face image of the current user uploaded by the user terminal.
In this embodiment, before receiving a video acquisition request sent by a user terminal, the identity of a user using the user terminal needs to be verified. Specifically, a user face image of a current user uploaded by a user terminal is received, and the user face image can be obtained by shooting through a camera arranged on the user terminal.
And step 206, judging whether the face image of the user has a corresponding face image in the first face feature sequence white list.
After receiving the face image of the user, the encrypted data transmission device further searches whether a face image with the similarity exceeding a similarity threshold exists in a first face feature sequence white list, wherein the face image is a face image corresponding to the face image of the user.
And step 207, if yes, allowing to respond to the video acquisition request sent by the user terminal.
And if the face image with the similarity exceeding the similarity threshold exists in the first face feature sequence white list, responding to the video acquisition request sent by the user terminal, otherwise, not allowing the video acquisition request sent by the corresponding user terminal. Therefore, the user to which each face image belongs in the first face feature sequence white list can obtain the encrypted monitoring video stream through the user terminal, and even if the user terminal of the user is lost, other people cannot obtain the encrypted monitoring video stream, so that the safety in the process of obtaining the encrypted monitoring video stream is further improved, and the privacy of the user is protected.
And step 208, responding to a video acquisition request sent by the user terminal, wherein the video acquisition request comprises a second face feature sequence white list.
And step 209, traversing the white list of the second face feature sequence based on the verification code, and if the verification code is located in the white list of the second face feature sequence, sending the encrypted monitoring video stream corresponding to the verification code to the user terminal.
In one embodiment, the second face feature sequence white list at least includes a face feature sequence corresponding to a user to which the user terminal belongs.
In this embodiment, the second face feature sequence white list at least includes a face feature sequence and a face image corresponding to the user to which the user terminal belongs, so that when the encrypted surveillance video stream data takes the face feature sequence corresponding to the face appearing in the surveillance video stream as the verification code, the user to which the user terminal belongs can obtain the encrypted surveillance video stream that is shot by the user. In an embodiment, a user who sets the first face feature sequence white list may be used as an administrator, and the administrator may further send a face feature sequence specified in the first face feature sequence white list and a corresponding face image to a specified user terminal through the user terminal, so that other user terminals can add the specified face feature sequence and the corresponding face image to the second face feature sequence white list, and thus, encrypted monitoring video streams of other specified users can be obtained. For example, the administrator a user sets the face images and the face feature sequences of the user a, the user B and the user C in the first face feature sequence white list, and then sends the face image and the face feature sequence of the user B to the user terminal of the user C, so that the user C can also obtain the encrypted monitoring video stream in which the user B is shot through the user terminal, and different permissions are allocated to different user terminals.
In the embodiment of the present invention, when the number of the target face images is one, the face feature sequence corresponding to the target face image is used as the verification code of the encrypted surveillance video stream, and when the number of the target face images is multiple, the target face image corresponding to the face with the highest frequency of occurrence in the surveillance video stream is obtained, and the face feature sequence corresponding to the image is used as the verification code of the encrypted surveillance video stream, so that the corresponding encrypted surveillance video stream can be obtained only when the target face feature sequence exists in the white list of the second face feature sequence of the user terminal, which improves the security in the process of obtaining the encrypted surveillance video stream and protects the privacy of the user. In addition, before responding to a video acquisition request sent by a user terminal, the embodiment of the invention also judges whether the face image of the user terminal has a corresponding face image in the first face feature sequence white list, if so, the embodiment of the invention allows responding to the video acquisition request sent by the user terminal, so that the user corresponding to each face image in the first face feature sequence white list can acquire the encrypted monitoring video stream through the user terminal, even if the user terminal of the user is lost, other people cannot acquire the encrypted monitoring video stream, the safety of the encrypted monitoring video stream in the acquisition process is further improved, and the privacy of the user is protected.
As shown in fig. 5, fig. 5 is a characteristic sequence-based encrypted data transmission apparatus according to an embodiment of the present invention, including:
the face detection module 301 is configured to perform face detection on a surveillance video stream, and capture a first face image corresponding to a detected face in the surveillance video stream;
a video stream encryption module 302, configured to encrypt the monitoring video stream to obtain an encrypted monitoring video stream;
the first verification module 303 is configured to obtain a pre-stored first face feature sequence white list, and determine whether a corresponding target face image exists in the first face feature sequence white list according to the first face image; the first face feature sequence white list comprises face images which are stored in advance and face feature sequences corresponding to the face images;
a verification code obtaining module 304, configured to obtain a target human face feature sequence from the first human face feature sequence white list if a corresponding human face image exists in the first human face feature sequence white list, and store the target human face feature sequence as a verification code of the encrypted surveillance video stream;
a request response module 305, configured to respond to a video acquisition request sent by a user terminal, where the video acquisition request includes a second face feature sequence white list;
a video stream sending module 306, configured to traverse the second face feature sequence white list based on the verification code, and send the encrypted monitoring video stream corresponding to the verification code to the user terminal if the verification code is located in the second face feature sequence white list.
On the basis of the embodiment, the system further comprises a sequence acquisition module, which is used for carrying out feature recognition on the face images in the first face feature sequence white list to obtain face feature data; and obtaining a face feature sequence of a first face feature sequence white list based on the face feature data.
On the basis of the above embodiment, the system further includes a sequence acquisition module specifically configured to perform binary conversion on the face feature data by using an SHA256 algorithm to obtain a face feature sequence in a first face feature sequence white list.
On the basis of the above embodiment, the number of the target face images is one;
correspondingly, the identifying code obtaining module 304 is specifically configured to obtain, from the first face feature sequence white list, a face feature sequence corresponding to the target face image as a target face feature sequence.
On the basis of the embodiment, the number of the target face images is more than one;
correspondingly, the identifying code obtaining module 304 is specifically configured to determine the frequency of each face in the monitoring video stream; and taking the face image corresponding to the face with the highest frequency as a second face image, and acquiring a face feature sequence corresponding to the second face image from the first face feature sequence white list as the target face feature sequence.
On the basis of the above embodiment, the second face feature sequence white list at least includes a face feature sequence corresponding to the user to which the user terminal belongs.
On the basis of the above embodiment, the video processing device further includes a user authentication module, configured to receive a user face image of a current user uploaded by the user terminal before responding to the video acquisition request sent by the user terminal; judging whether the face image of the user exists in a corresponding face image in the first face feature sequence white list or not; and if so, allowing to respond to the video acquisition request sent by the user terminal.
The present embodiment also provides an encrypted data transmission apparatus, as shown in fig. 6, an encrypted data transmission apparatus 40, which includes a processor 400 and a memory 401;
the memory 401 is configured to store a computer program 402 and to transmit the computer program 402 to the processor;
the processor 400 is configured to execute the steps of one of the above-described embodiments of the method for encrypted data transmission based on a signature sequence according to the instructions in the computer program 402.
Illustratively, the computer program 402 may be partitioned into one or more modules/units, which are stored in the memory 401 and executed by the processor 400 to accomplish the present application. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution of the computer program 402 in the encrypted data transmission apparatus 40.
The encrypted data transmission device 40 may be a computing device such as a desktop computer, a notebook, a palm computer, and a cloud server. The encrypted data transmission device 40 may include, but is not limited to, a processor 400, a memory 401. It will be understood by those skilled in the art that fig. 6 is merely an example of the encrypted data transmission apparatus 40, and does not constitute a limitation of the encrypted data transmission apparatus 40, and may include more or less components than those shown, or combine some components, or different components, for example, the encrypted data transmission apparatus 40 may further include an input-output device, a network access device, a bus, etc.
The Processor 400 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The storage 401 may be an internal storage unit of the encrypted data transmission device 40, such as a hard disk or a memory of the encrypted data transmission device 40. The memory 401 may also be an external storage device of the encrypted data transmission device 40, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the encrypted data transmission device 40. Further, the memory 401 may also include both an internal storage unit of the encrypted data transmission device 40 and an external storage device. The memory 401 is used to store the computer program and other programs and data required by the encrypted data transmission apparatus 40. The memory 401 may also be used to temporarily store data that has been output or is to be output.
It can be clearly understood by those skilled in the art that, for convenience and simplicity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one type of logical functional division, and other divisions may be realized in practice, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one position, or may be distributed on multiple network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention, which is substantially or partly contributed by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing computer programs, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
Embodiments of the present invention also provide a storage medium containing computer-executable instructions, which when executed by a computer processor, are configured to perform a method for encrypted data transmission based on a signature sequence, the method comprising the steps of:
carrying out face detection on a monitoring video stream, and intercepting a first face image corresponding to a detected face from the monitoring video stream;
encrypting the monitoring video stream to obtain an encrypted monitoring video stream;
acquiring a pre-stored first face feature sequence white list, and determining whether a corresponding target face image exists in the first face feature sequence white list or not according to the first face image; the first face feature sequence white list comprises face images stored in advance and face feature sequences corresponding to the face images;
if yes, acquiring a target face feature sequence from the first face feature sequence white list, and storing the target face feature sequence as a verification code of the encrypted monitoring video stream;
responding to a video acquisition request sent by a user terminal, wherein the video acquisition request comprises a second face feature sequence white list;
traversing the second face feature sequence white list based on the verification code, and if the verification code is located in the second face feature sequence white list, sending the encrypted monitoring video stream corresponding to the verification code to the user terminal.
It should be noted that the foregoing is only a preferred embodiment of the present invention and the technical principles applied. Those skilled in the art will appreciate that the embodiments of the present invention are not limited to the specific embodiments described herein, and that various obvious changes, rearrangements and substitutions can be made by those skilled in the art without departing from the scope of the embodiments of the invention. Therefore, although the embodiments of the present invention have been described in more detail through the above embodiments, the embodiments of the present invention are not limited to the above embodiments, and many other equivalent embodiments may be included without departing from the concept of the embodiments of the present invention, and the scope of the embodiments of the present invention is determined by the scope of the appended claims.

Claims (10)

1. An encrypted data transmission method based on a characteristic sequence is characterized by comprising the following steps:
carrying out face detection on a monitoring video stream, and capturing a first face image corresponding to a detected face in the monitoring video stream;
encrypting the monitoring video stream to obtain an encrypted monitoring video stream;
acquiring a pre-stored first face feature sequence white list, and determining whether a corresponding target face image exists in the first face feature sequence white list according to the first face image; the first face feature sequence white list comprises face images stored in advance and face feature sequences corresponding to the face images;
if yes, acquiring a target face feature sequence from the first face feature sequence white list, and storing the target face feature sequence as a verification code of the encrypted monitoring video stream;
responding to a video acquisition request sent by a user terminal, wherein the video acquisition request comprises a second face feature sequence white list;
traversing the second face feature sequence white list based on the verification code, and if the verification code is located in the second face feature sequence white list, sending the encrypted monitoring video stream corresponding to the verification code to the user terminal.
2. The method for transmitting the encrypted data based on the feature sequence according to claim 1, wherein the face feature sequence in the first face feature sequence white list is obtained by the following method:
carrying out feature recognition on the face images in the first face feature sequence white list to obtain face feature data;
and obtaining a face feature sequence in the first face feature sequence white list based on the face feature data.
3. The method for encrypted data transmission based on a feature sequence according to claim 2, wherein the obtaining of the face feature sequence in the first face feature sequence white list based on the face feature data includes:
and performing binary conversion on the face feature data by using an SHA256 algorithm to obtain a face feature sequence in the first face feature sequence white list.
4. The feature sequence-based encrypted data transmission method according to claim 1, wherein the number of the target face images is one;
correspondingly, the obtaining of the target face feature sequence from the first face feature sequence white list includes:
and acquiring a face feature sequence corresponding to the target face image from the first face feature sequence white list as a target face feature sequence.
5. The encrypted data transmission method based on the feature sequence according to claim 1, wherein the number of the target face images is more than one;
correspondingly, the obtaining of the target face feature sequence from the first face feature sequence white list includes:
determining the frequency of occurrence of each face in the surveillance video stream;
and taking the face image corresponding to the face with the highest frequency as a second face image, and acquiring a face feature sequence corresponding to the second face image from the first face feature sequence white list as the target face feature sequence.
6. The method according to any one of claims 4 to 5, wherein the second face feature sequence white list at least includes a face feature sequence corresponding to a user to which the user terminal belongs.
7. The method for encrypted data transmission based on signature sequence of claim 1, wherein before responding to the video acquisition request sent by the user terminal, the method further comprises:
receiving a user face image of a current user uploaded by the user terminal;
judging whether the face image of the user exists in a corresponding face image in the first face feature sequence white list or not;
and if so, allowing to respond to the video acquisition request sent by the user terminal.
8. An encrypted data transmission apparatus based on a signature sequence, comprising:
the system comprises a face detection module, a face detection module and a face recognition module, wherein the face detection module is used for carrying out face detection on a monitoring video stream and capturing a first face image corresponding to a detected face in the monitoring video stream;
the video stream encryption module is used for encrypting the monitoring video stream to obtain an encrypted monitoring video stream;
the first verification module is used for acquiring a pre-stored first face feature sequence white list and determining whether a corresponding target face image exists in the first face feature sequence white list or not according to the first face image; the first face feature sequence white list comprises face images stored in advance and face feature sequences corresponding to the face images;
a verification code obtaining module, configured to obtain a target face feature sequence from the first face feature sequence white list if a corresponding face image exists in the first face feature sequence white list, and store the target face feature sequence as a verification code of the encrypted surveillance video stream;
the request response module is used for responding to a video acquisition request sent by a user terminal, wherein the video acquisition request comprises a second face feature sequence white list;
and the video stream sending module is used for traversing the second face feature sequence white list based on the verification code, and sending the encrypted monitoring video stream corresponding to the verification code to the user terminal if the verification code is positioned in the second face feature sequence white list.
9. An encrypted data transmission apparatus characterized by comprising a processor and a memory;
the memory is used for storing a computer program and transmitting the computer program to the processor;
the processor is configured to execute a method of encrypted data transmission based on a sequence of features according to any one of claims 1 to 7 in accordance with instructions in the computer program.
10. A storage medium storing computer-executable instructions for performing a method of feature sequence based encrypted data transmission according to any one of claims 1 to 7 when executed by a computer processor.
CN202210875052.8A 2022-07-25 2022-07-25 Encrypted data transmission method and device based on characteristic sequence Active CN114938465B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210875052.8A CN114938465B (en) 2022-07-25 2022-07-25 Encrypted data transmission method and device based on characteristic sequence

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210875052.8A CN114938465B (en) 2022-07-25 2022-07-25 Encrypted data transmission method and device based on characteristic sequence

Publications (2)

Publication Number Publication Date
CN114938465A CN114938465A (en) 2022-08-23
CN114938465B true CN114938465B (en) 2022-10-18

Family

ID=82868773

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210875052.8A Active CN114938465B (en) 2022-07-25 2022-07-25 Encrypted data transmission method and device based on characteristic sequence

Country Status (1)

Country Link
CN (1) CN114938465B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115134080B (en) * 2022-08-25 2022-12-20 广州万协通信息技术有限公司 Data transmission method and device based on security encryption chip

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101167361A (en) * 2005-04-25 2008-04-23 松下电器产业株式会社 Monitoring camera system, imaging device, and video display device
JP2012186674A (en) * 2011-03-07 2012-09-27 Hitachi Kokusai Electric Inc Monitoring camera system
CN106559654A (en) * 2016-11-18 2017-04-05 广州炫智电子科技有限公司 A kind of recognition of face monitoring collection system and its control method
CN107169367A (en) * 2017-04-07 2017-09-15 北京安云世纪科技有限公司 A kind of storage method, device and mobile terminal for shooting file
CN108289202A (en) * 2018-01-29 2018-07-17 北京大椽科技有限公司 A kind of intelligent network monitoring method and system
CN108668097A (en) * 2018-05-22 2018-10-16 苏州市启献智能科技有限公司 It is a kind of to realize that the long-range child of home intercommunication checks system and method
CN108989764A (en) * 2018-08-22 2018-12-11 河南省颍河电子科技有限公司 A kind of scenic spot tourist film generation system
CN110166734A (en) * 2018-02-12 2019-08-23 北京快乐智慧科技有限责任公司 A kind of Intelligence In Baogang Kindergarten monitoring method and system
CN110446105A (en) * 2019-09-20 2019-11-12 网易(杭州)网络有限公司 Video-encryption, decryption method and device
CN110505455A (en) * 2019-08-30 2019-11-26 北京青岳科技有限公司 A kind of the monitor video access method and system of secret protection
CN112422499A (en) * 2020-09-14 2021-02-26 深圳英飞拓科技股份有限公司 Method and system for identifying black and white lists of human face based on 5G transmission
CN113079161A (en) * 2021-04-01 2021-07-06 武汉飓飚信息技术有限公司 Method and system for sharing monitoring camera
CN113821780A (en) * 2021-09-26 2021-12-21 深圳市商汤科技有限公司 Video analysis method and device, electronic equipment and storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004032459A (en) * 2002-06-27 2004-01-29 Hitachi Ltd Monitoring system, and controller and monitoring terminal used both therefor
WO2019245680A1 (en) * 2018-06-19 2019-12-26 Pelco, Inc. Automatic video privacy

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101167361A (en) * 2005-04-25 2008-04-23 松下电器产业株式会社 Monitoring camera system, imaging device, and video display device
JP2012186674A (en) * 2011-03-07 2012-09-27 Hitachi Kokusai Electric Inc Monitoring camera system
CN106559654A (en) * 2016-11-18 2017-04-05 广州炫智电子科技有限公司 A kind of recognition of face monitoring collection system and its control method
CN107169367A (en) * 2017-04-07 2017-09-15 北京安云世纪科技有限公司 A kind of storage method, device and mobile terminal for shooting file
CN108289202A (en) * 2018-01-29 2018-07-17 北京大椽科技有限公司 A kind of intelligent network monitoring method and system
CN110166734A (en) * 2018-02-12 2019-08-23 北京快乐智慧科技有限责任公司 A kind of Intelligence In Baogang Kindergarten monitoring method and system
CN108668097A (en) * 2018-05-22 2018-10-16 苏州市启献智能科技有限公司 It is a kind of to realize that the long-range child of home intercommunication checks system and method
CN108989764A (en) * 2018-08-22 2018-12-11 河南省颍河电子科技有限公司 A kind of scenic spot tourist film generation system
CN110505455A (en) * 2019-08-30 2019-11-26 北京青岳科技有限公司 A kind of the monitor video access method and system of secret protection
CN110446105A (en) * 2019-09-20 2019-11-12 网易(杭州)网络有限公司 Video-encryption, decryption method and device
CN112422499A (en) * 2020-09-14 2021-02-26 深圳英飞拓科技股份有限公司 Method and system for identifying black and white lists of human face based on 5G transmission
CN113079161A (en) * 2021-04-01 2021-07-06 武汉飓飚信息技术有限公司 Method and system for sharing monitoring camera
CN113821780A (en) * 2021-09-26 2021-12-21 深圳市商汤科技有限公司 Video analysis method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN114938465A (en) 2022-08-23

Similar Documents

Publication Publication Date Title
EP3037998B1 (en) Method and system for providing secure and standalone-operable biometric authentication
US20140150049A1 (en) Method and apparatus for controlling management of mobile device using security event
US20140354401A1 (en) Resource Management Based on Biometric Data
US20150304321A1 (en) An image management system and an image management method based on fingerprint authentication
CN105281907B (en) Encrypted data processing method and device
CN108322507B (en) Method and system for executing security operation by using security device
CN114938465B (en) Encrypted data transmission method and device based on characteristic sequence
CN108337235B (en) Method and system for executing security operation by using security device
CN111294482B (en) Image processing method and system
CN114596639B (en) Biological feature recognition method and device, electronic equipment and storage medium
CN105208045A (en) Identity authentication method, equipment and system
CN111581661A (en) Terminal management method and device based on biological feature recognition and computer equipment
US20210344676A1 (en) Method and system for securing communications between a lead device and a secondary device
CN108989331B (en) Use authentication method of data storage device, device and storage medium thereof
CN105812338B (en) Data access control method and network management equipment
CN110619228B (en) File decryption method, file encryption method, file management system and storage medium
Han et al. The privacy protection framework for biometric information in network based CCTV environment
CN115134080B (en) Data transmission method and device based on security encryption chip
CN111126214A (en) Living body detection method and apparatus, computer device, and computer-readable storage medium
CN112204572A (en) Data protection method, device and system for image recognition
CN110149210A (en) A kind of data transmission method and device
US20190114413A1 (en) Server, camera and method
CN115426189A (en) Information security protection method and system based on big data
KR101750292B1 (en) Portable finger vein reader and biometric authentication method thereof
KR20140137084A (en) System and method for providing video by closed-circuit television

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant