CN109462594A - A kind of data processing method and system based on view networking - Google Patents
A kind of data processing method and system based on view networking Download PDFInfo
- Publication number
- CN109462594A CN109462594A CN201811436642.0A CN201811436642A CN109462594A CN 109462594 A CN109462594 A CN 109462594A CN 201811436642 A CN201811436642 A CN 201811436642A CN 109462594 A CN109462594 A CN 109462594A
- Authority
- CN
- China
- Prior art keywords
- view
- networked terminals
- depending
- networking data
- public key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/141—Setup of application sessions
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The embodiment of the invention provides a kind of data processing methods and system based on view networking.So first depending on networked terminals and depending between networked server and depending on networked server and first depending on transmitted between networked terminals be to first view networking data carry out asymmetric encryption after second view networking data, even if second is stolen in transmission process by criminal depending on networking data, since criminal does not know the first view networked terminals used matched Target Public Key of target private key when encryption first regards networking data, therefore also the first view networking data can not be decrypted depending on networking data according to second, only second depending on networked terminals when receiving the second view networking data, the available Target Public Key to match with target private key, the second view networked terminals are decrypted using Target Public Key, obtain the first view networking data.To improve safety of the view networking data in transmission process.
Description
Technical field
The present invention relates to view networking technology fields, more particularly to a kind of data processing method based on depending on networking and are
System.
Background technique
With the rapid development of technology, the network activity of people is more frequent, and more and more users need on network
Data are transmitted, at the same time, the requirement of safety of the people to data in transmission process is also higher and higher.
Therefore, how to improve safety of the data in transmission process is a technical problem urgently to be resolved.
Summary of the invention
In order to solve the above-mentioned technical problem, the embodiment of the present application show it is a kind of based on view networking data processing method and
System.
In a first aspect, the embodiment of the present application shows a kind of data processing method based on view networking, the method application
In the data processing system based on view networking, the system comprises the first view networked terminals, view networked server and the second views
Networked terminals, it is described based on view networking protocol communication connection between the first view networked terminals and the view networked server
Depending on being communicated to connect between networked server and the second view networked terminals based on view networking protocol, which comprises
It is described when described first needs to send the first view networking data to the second view networked terminals depending on networked terminals
First view networked terminals obtain target private key, are encrypted using the target private key to the first view networking data, obtain second
The second view networking data is sent depending on networking data, and to the view networked server;
The view networked server receives the second view networking data, and to described in the second view networked terminals transmission
Second view networking data;
The second view networked terminals receive the second view networking data, obtain the mesh to match with the target private key
Public key is marked, the second view networked terminals are decrypted using the Target Public Key, obtain the first view networking data.
It is described to obtain the Target Public Key to match with the target private key in an optional implementation, comprising:
Described second obtains the terminal iidentification of the first view networked terminals depending on networked terminals;
The second view networked terminals are in corresponding relationship between the terminal iidentification and public key of terminal, search and described the
The corresponding public key of terminal iidentification of one view networked terminals, and as the Target Public Key.
In an optional implementation, the method also includes:
Described first generates the Target Public Key and the target private key by key generation facility depending on networked terminals, storage
The target private key sends the Target Public Key to the view networked server;
The view networked server receives the Target Public Key, and Xiang Suoshu second regards networked terminals and sends the target public affairs
Key;
The second view networked terminals receive the Target Public Key, obtain the terminal iidentification of the first view networked terminals,
And the terminal iidentification of the Target Public Key and the first view networked terminals is formed into corresponding table item, and be stored in the terminal of terminal
In corresponding relationship between mark and public key.
In an optional implementation, the method also includes:
It is described when described second needs to send third view networking data to the first view networked terminals depending on networked terminals
Second view networked terminals obtain the Target Public Key, are encrypted, are obtained to third view networking data using the Target Public Key
4th view networking data, and the 4th view networking data is sent to the view networked server;
The view networked server receives the 4th view networking data, and to described in the first view networked terminals transmission
4th view networking data;
The first view networked terminals receive the 4th view networking data, obtain the institute to match with the Target Public Key
Target private key is stated, the 4th view networked terminals are decrypted using the target private key, obtain the third view networking data.
Second aspect, the embodiment of the present application show a kind of data processing system based on view networking, the system comprises
First view networked terminals, view networked server and the second view networked terminals, the first view networked terminals and the view are networked
It is described depending on networked server and described second between networked terminals depending on being based on based on view networking protocol communication connection between server
It is communicated to connect depending on networking protocol;
It is described when described first needs to send the first view networking data to the second view networked terminals depending on networked terminals
First is used to obtain target private key depending on networked terminals, is encrypted, is obtained to the first view networking data using the target private key
Second view networking data, and the second view networking data is sent to the view networked server;
It is described to be sent depending on networked server for receiving the second view networking data, and to the second view networked terminals
The second view networking data;
Described second matches for receiving the second view networking data, acquisition with the target private key depending on networked terminals
Target Public Key, using the Target Public Key to it is described second view networked terminals decrypt, obtain it is described first view networking data.
In an optional implementation, described second is also used to obtain the first view networked terminals depending on networked terminals
Terminal iidentification;In corresponding relationship between the terminal iidentification and public key of terminal, search and the first view networked terminals
The corresponding public key of terminal iidentification, and as the Target Public Key.
In an optional implementation, described first is also used to generate institute by key generation facility depending on networked terminals
Target Public Key and the target private key are stated, the target private key is stored, sends the Target Public Key to the view networked server;
Described to be also used to receive the Target Public Key depending on networked server, Xiang Suoshu second regards networked terminals and sends the mesh
Mark public key;
Described second is also used to receive the Target Public Key depending on networked terminals, obtains the terminal of the first view networked terminals
Mark, and the terminal iidentification of the Target Public Key and the first view networked terminals is formed into corresponding table item, and be stored in terminal
Terminal iidentification and public key between corresponding relationship in.
In an optional implementation, when described second depending on networked terminals be also used to need to it is described first view networking
When terminal sends third view networking data, the second view networked terminals obtain the Target Public Key, use the Target Public Key
To third view networking data encryption, the 4th view networking data is obtained, and send the described 4th to the view networked server
Depending on networking data;
It is described to be also used to receive the 4th view networking data depending on networked server, and sent out to the first view networked terminals
Send the 4th view networking data;
Described first is also used to receive the 4th view networking data depending on networked terminals, obtains and the Target Public Key phase
The target private key matched decrypts the 4th view networked terminals using the target private key, obtains the third view networking
Data.
The third aspect, the embodiment of the present application show a kind of electronic equipment, including memory, processor and are stored in storage
On device and the computer program that can run on a processor, the processor are realized as described in relation to the first aspect when executing described program
Based on view networking data processing method the step of.
Fourth aspect, the embodiment of the present application show a kind of computer readable storage medium, the computer-readable storage
Computer program is stored on medium, when the computer program is executed by processor realize as described in relation to the first aspect based on view
The step of data processing method of networking.
The embodiment of the present invention includes following advantages:
In this application, when first needs to send the first view networking data to the second view networked terminals depending on networked terminals,
First view networked terminals obtain target private key, are encrypted using target private key to the first view networking data, obtain the second view networking number
According to, and the second view networking data is sent to view networked server;The second view networking data is received depending on networked server, and to second
The second view networking data is sent depending on networked terminals;
It networks so between the first view networked terminals and view networked server and in view networked server and the first view
What is transmitted between terminal is the second view networking data carried out after asymmetric encryption to the first view networking data, even if the second view connection
Network data is stolen in transmission process by criminal, since criminal does not know that the first view networked terminals are regarded in encryption first
Used target private key matched Target Public Key when networking data, therefore also can not be decrypted depending on networking data according to second
One view networking data, only second depending on networked terminals when receiving the second view networking data, it is available with target private key phase
Matched Target Public Key decrypts the second view networked terminals using Target Public Key, obtains the first view networking data.To improve
Depending on safety of the networking data in transmission process.
Detailed description of the invention
Fig. 1 is a kind of networking schematic diagram of view networking of the invention;
Fig. 2 is a kind of hardware structural diagram of node server of the invention;
Fig. 3 is a kind of hardware structural diagram of access switch of the invention;
Fig. 4 is the hardware structural diagram that a kind of Ethernet association of the invention turns gateway;
Fig. 5 is a kind of structural block diagram of data processing system based on view networking of the invention;
Fig. 6 is a kind of step flow chart of data processing method based on view networking of the invention.
Specific embodiment
In order to make the foregoing objectives, features and advantages of the present invention clearer and more comprehensible, with reference to the accompanying drawing and specific real
Applying mode, the present invention is described in further detail.
It is the important milestone of network Development depending on networking, is a real-time network, can be realized HD video real-time Transmission,
Push numerous Internet applications to HD video, high definition is face-to-face.
Real-time high-definition video switching technology is used depending on networking, it can be such as high in a network platform by required service
Clear video conference, Intellectualized monitoring analysis, emergency command, digital broadcast television, delay TV, the Web-based instruction, shows video monitoring
Field live streaming, VOD program request, TV Mail, individual character records (PVR), Intranet (manages) channel by oneself, intelligent video Broadcast Control, information publication
All be incorporated into a system platform etc. services such as tens of kinds of videos, voice, picture, text, communication, data, by TV or
Computer realizes that high-definition quality video plays.
Embodiment in order to enable those skilled in the art to better understand the present invention is introduced to depending on networking below:
Depending on networking, applied portion of techniques is as described below:
Network technology (Network Technology)
Traditional ethernet (Ethernet) is improved depending on the network technology innovation networked, with potential huge on network
Video flow.(Circuit is exchanged different from simple network packet packet switch (Packet Switching) or lattice network
Switching), Streaming demand is met using Packet Switching depending on networking technology.Has grouping depending on networking technology
Flexible, the simple and low price of exchange, is provided simultaneously with the quality and safety assurance of circuit switching, it is virtually electric to realize the whole network switch type
The seamless connection of road and data format.
Switching technology (Switching Technology)
Two advantages of asynchronous and packet switch that Ethernet is used depending on networking eliminate Ethernet under the premise of complete compatible and lack
It falls into, has the end-to-end seamless connection of the whole network, direct user terminal, directly carrying IP data packet.User data is in network-wide basis
It is not required to any format conversion.It is the more advanced form of Ethernet depending on networking, is a real-time exchange platform, can be realized at present mutually
The whole network large-scale high-definition realtime video transmission that networking cannot achieve pushes numerous network video applications to high Qinghua, unitizes.
Server technology (Server Technology)
It is different from traditional server, its Streaming Media depending on the server technology in networking and unified video platform
Transmission be built upon it is connection-oriented on the basis of, data-handling capacity is unrelated with flow, communication time, single network layer energy
Enough transmitted comprising signaling and data.For voice and video business, handled depending on networking and unified video platform Streaming Media
Complexity many simpler than data processing, efficiency substantially increase hundred times or more than traditional server.
Reservoir technology (Storage Technology)
The ultrahigh speed reservoir technology of unified video platform in order to adapt to the media content of vast capacity and super-flow and
Using state-of-the-art real time operating system, the programme information in server instruction is mapped to specific hard drive space, media
Content is no longer pass through server, and moment is directly delivered to user terminal, and user waits typical time less than 0.2 second.It optimizes
Sector distribution greatly reduces the mechanical movement of hard disc magnetic head tracking, and resource consumption only accounts for the 20% of the internet ad eundem IP, but
The concurrent flow greater than 3 times of traditional disk array is generated, overall efficiency promotes 10 times or more.
Network security technology (Network Security Technology)
Depending on the structural design networked by servicing independent licence system, equipment and the modes such as user data is completely isolated every time
The network security problem that puzzlement internet has thoroughly been eradicated from structure, does not need antivirus applet, firewall generally, has prevented black
The attack of visitor and virus, structural carefree secure network is provided for user.
It services innovative technology (Service Innovation Technology)
Business and transmission are fused together by unified video platform, whether single user, private user or a net
The sum total of network is all only primary automatic connection.User terminal, set-top box or PC are attached directly to unified video platform, obtain rich
The multimedia video service of rich colorful various forms.Unified video platform is traditional to substitute with table schema using " menu type "
Complicated applications programming, considerably less code, which can be used, can be realized complicated application, realize the new business innovation of " endless ".
Networking depending on networking is as described below:
It is a kind of central controlled network structure depending on networking, which can be Tree Network, Star network, ring network etc. class
Type, but centralized control node is needed to control whole network in network on this basis.
As shown in Figure 1, being divided into access net and Metropolitan Area Network (MAN) two parts depending on networking.
The equipment of access mesh portions can be mainly divided into 3 classes: node server, access switch, terminal (including various machines
Top box, encoding board, memory etc.).Node server is connected with access switch, and access switch can be with multiple terminal phases
Even, and it can connect Ethernet.
Wherein, node server is the node that centralized control functions are played in access net, can control access switch and terminal.
Node server can directly be connected with access switch, can also directly be connected with terminal.
Similar, the equipment of metropolitan area mesh portions can also be divided into 3 classes: metropolitan area server, node switch, node serve
Device.Metropolitan area server is connected with node switch, and node switch can be connected with multiple node servers.
Wherein, node server is the node server for accessing mesh portions, i.e. node server had both belonged to access wet end
Point, and belong to metropolitan area mesh portions.
Metropolitan area server is the node that centralized control functions are played in Metropolitan Area Network (MAN), can control node switch and node serve
Device.Metropolitan area server can be directly connected to node switch, can also be directly connected to node server.
It can be seen that be entirely a kind of central controlled network structure of layering depending on networking network, and node server and metropolitan area
The network controlled under server can be the various structures such as tree-shaped, star-like, cyclic annular.
Visually claim, access mesh portions can form unified video platform (part in virtual coil), and multiple unified videos are flat
Platform can form view networking;Each unified video platform can be interconnected by metropolitan area and wide area depending on networking.
Classify depending on networked devices
1.1 embodiment of the present invention can be mainly divided into 3 classes: server depending on the equipment in networking, interchanger (including ether
Net gateway), terminal (including various set-top boxes, encoding board, memory etc.).Depending on networking can be divided on the whole Metropolitan Area Network (MAN) (or
National net, World Wide Web etc.) and access net.
1.2 equipment for wherein accessing mesh portions can be mainly divided into 3 classes: node server, access switch (including ether
Net gateway), terminal (including various set-top boxes, encoding board, memory etc.).
The specific hardware structure of each access network equipment are as follows:
Node server:
As shown in Fig. 2, mainly including Network Interface Module 201, switching engine module 202, CPU module 203, disk array
Module 204;
Wherein, Network Interface Module 201, the Bao Jun that CPU module 203, disk array module 204 are come in enter switching engine
Module 202;Switching engine module 202 look into the operation of address table 205 to the packet come in, to obtain the navigation information of packet;
And the packet is stored according to the navigation information of packet the queue of corresponding pack buffer 206;If the queue of pack buffer 206 is close
It is full, then it abandons;All pack buffer queues of 202 poll of switching engine mould, are forwarded: 1) port if meeting the following conditions
It is less than to send caching;2) the queue package counting facility is greater than zero.Disk array module 204 mainly realizes the control to hard disk, including
The operation such as initialization, read-write to hard disk;CPU module 203 is mainly responsible between access switch, terminal (not shown)
Protocol processes, to address table 205 (including descending protocol packet address table, uplink protocol package address table, data packet addressed table)
Configuration, and, the configuration to disk array module 204.
Access switch:
As shown in figure 3, mainly including Network Interface Module (downstream network interface module 301, uplink network interface module
302), switching engine module 303 and CPU module 304;
Wherein, the packet (upstream data) that downstream network interface module 301 is come in enters packet detection module 305;Packet detection mould
Whether mesh way address (DA), source address (SA), type of data packet and the packet length of the detection packet of block 305 meet the requirements, if met,
It then distributes corresponding flow identifier (stream-id), and enters switching engine module 303, otherwise abandon;Uplink network interface mould
The packet (downlink data) that block 302 is come in enters switching engine module 303;The data packet that CPU module 204 is come in enters switching engine
Module 303;Switching engine module 303 look into the operation of address table 306 to the packet come in, to obtain the navigation information of packet;
If the packet into switching engine module 303 is that downstream network interface is gone toward uplink network interface, in conjunction with flow identifier
(stream-id) packet is stored in the queue of corresponding pack buffer 307;If the queue of the pack buffer 307 is close full,
It abandons;If the packet into switching engine module 303 is not that downstream network interface is gone toward uplink network interface, according to packet
Navigation information is stored in the data packet queue of corresponding pack buffer 307;If the queue of the pack buffer 307 is close full,
Then abandon.
All pack buffer queues of 303 poll of switching engine module, are divided to two kinds of situations in embodiments of the present invention:
If the queue is that downstream network interface is gone toward uplink network interface, meets the following conditions and be forwarded: 1)
It is less than that the port sends caching;2) the queue package counting facility is greater than zero;3) token that rate control module generates is obtained;
If the queue is not that downstream network interface is gone toward uplink network interface, meets the following conditions and is forwarded:
1) it is less than to send caching for the port;2) the queue package counting facility is greater than zero.
Rate control module 208 is configured by CPU module 204, to all downlink networks in programmable interval
Interface generates token toward the pack buffer queue that uplink network interface is gone, to control the code rate of forwarded upstream.
CPU module 304 is mainly responsible for the protocol processes between node server, the configuration to address table 306, and,
Configuration to rate control module 308.
Ethernet association turns gateway:
As shown in figure 4, mainly including Network Interface Module (downstream network interface module 401, uplink network interface module
402), switching engine module 403, CPU module 404, packet detection module 405, rate control module 408, address table 406, Bao Huan
Storage 407 and MAC adding module 409, MAC removing module 410.
Wherein, the data packet that downstream network interface module 401 is come in enters packet detection module 405;Packet detection module 405 is examined
Ethernet mac DA, ethernet mac SA, Ethernet length or frame type, the view networking mesh way address of measured data packet
DA, whether meet the requirements depending on networking source address SA, depending on networking data Packet type and packet length, corresponding stream is distributed if meeting
Identifier (stream-id);Then, MAC DA, MAC SA, length or frame type are subtracted by MAC removing module 410
(2byte), and enter corresponding receive and cache, otherwise abandon;
Downstream network interface module 401 detects the transmission caching of the port, according to the view of packet networking mesh if there is Bao Ze
Address D A knows the ethernet mac DA of corresponding terminal, adds the ethernet mac DA of terminal, Ethernet assists the MAC for turning gateway
SA, Ethernet length or frame type, and send.
The function that Ethernet association turns other modules in gateway is similar with access switch.
Terminal:
It mainly include Network Interface Module, Service Processing Module and CPU module;For example, set-top box mainly connects including network
Mouth mold block, video/audio encoding and decoding engine modules, CPU module;Encoding board mainly includes Network Interface Module, video encoding engine
Module, CPU module;Memory mainly includes Network Interface Module, CPU module and disk array module.
The equipment of 1.3 metropolitan area mesh portions can be mainly divided into 2 classes: node server, node switch, metropolitan area server.
Wherein, node switch mainly includes Network Interface Module, switching engine module and CPU module;Metropolitan area server mainly includes
Network Interface Module, switching engine module and CPU module are constituted.
2, networking data package definition is regarded
2.1 access network data package definitions
Access net data packet mainly include following sections: destination address (DA), source address (SA), reserve bytes,
payload(PDU)、CRC。
As shown in the table, the data packet for accessing net mainly includes following sections:
DA | SA | Reserved | Payload | CRC |
Wherein:
Destination address (DA) is made of 8 bytes (byte), and first character section indicates type (such as the various associations of data packet
Discuss packet, multicast packet, unicast packet etc.), be up to 256 kinds of possibility, the second byte to the 6th byte is metropolitan area net address,
Seven, the 8th bytes are access net address;
Source address (SA) is also to be made of 8 bytes (byte), is defined identical as destination address (DA);
Reserve bytes are made of 2 bytes;
The part payload has different length according to the type of different datagrams, is if it is various protocol packages
64 bytes are 32+1024=1056 bytes if it is single group unicast packets words, are not restricted to above 2 kinds certainly;
CRC is made of 4 bytes, and calculation method follows the Ethernet CRC algorithm of standard.
2.2 Metropolitan Area Network (MAN) packet definitions
The topology of Metropolitan Area Network (MAN) is pattern, may there is 2 kinds, connection even of more than two kinds, i.e. node switching between two equipment
It can all can exceed that 2 kinds between machine and node server, node switch and node switch, node switch and node server
Connection.But the metropolitan area net address of metropolitan area network equipment is uniquely, to close to accurately describe the connection between metropolitan area network equipment
System, introduces parameter in embodiments of the present invention: label, uniquely to describe a metropolitan area network equipment.
(Multi-Protocol Label Switch, multiprotocol label are handed over by the definition of label and MPLS in this specification
Change) label definition it is similar, it is assumed that between equipment A and equipment B there are two connection, then data packet from equipment A to equipment B just
There are 2 labels, data packet also there are 2 labels from equipment B to equipment A.Label is divided into label, outgoing label, it is assumed that data packet enters
The label (entering label) of equipment A is 0x0000, and the label (outgoing label) when this data packet leaves equipment A may reform into
0x0001.The networking process of Metropolitan Area Network (MAN) is to enter network process under centralized control, also means that address distribution, the label of Metropolitan Area Network (MAN)
Distribution be all to be dominated by metropolitan area server, node switch, node server be all passively execute, this point with
The label distribution of MPLS is different, and the distribution of the label of MPLS is the result that interchanger, server are negotiated mutually.
As shown in the table, the data packet of Metropolitan Area Network (MAN) mainly includes following sections:
DA | SA | Reserved | Label | Payload | CRC |
That is destination address (DA), source address (SA), reserve bytes (Reserved), label, payload (PDU), CRC.Its
In, the format of label, which can refer to, such as gives a definition: label is 32bit, wherein high 16bit retains, only with low 16bit, its position
Set is between the reserve bytes and payload of data packet.
Based on the above-mentioned characteristic of view networking, one of the core concepts of the embodiments of the present invention is proposed, it then follows regard the association of networking
View, first depending on networked terminals and depending between networked server and depending on networked server and first depending on being passed between networked terminals
Defeated is the second view networking data carried out after asymmetric encryption to the first view networking data, even if second is passing depending on networking data
It is stolen during defeated by criminal, since criminal does not know the first view networked terminals when encryption first regards networking data
The used matched Target Public Key of target private key, therefore also the first view networking number can not be decrypted depending on networking data according to second
According to, only second depending on networked terminals when receiving the second view networking data, the available target to match with target private key
Public key decrypts the second view networked terminals using Target Public Key, obtains the first view networking data.To improve view networking data
Safety in transmission process.
Referring to Fig. 5, a kind of structural block diagram of data processing system based on view networking of the invention, the system packet are shown
Include the first view networked terminals 01, view networked server 02 and the second view networked terminals 03;First view networked terminals 01 and view join
Based on view networking protocol communication connection between network server 02, depending on networked server 02 and second depending on being based between networked terminals 03
It is communicated to connect depending on networking protocol.
Referring to Fig. 6, a kind of step flow chart of data processing method based on view networking of the invention, this method are shown
It can be applied in system shown in fig. 5, this method may include steps of:
In step s101, when first needs to send the first view networking data to the second view networked terminals depending on networked terminals
When, the first view networked terminals obtain target private key, are encrypted using target private key to the first view networking data, obtain the networking of the second view
Data, and the second view networking data is sent to view networked server;
Wherein, first Target Public Key and target private key can be generated by key generation facility in advance depending on networked terminals, and
Target private key is stored, such as target private key is locally stored depending on networked terminals first, then via regarding networked server to second
Target Public Key is sent depending on networked terminals, so that second receives and stores Target Public Key depending on networked terminals.
In this way, in this step, the first view networked terminals can directly acquire stored mesh when obtaining target private key
Mark private key.
In step s 102, the second view networking data is received depending on networked server, and sends the to the second view networked terminals
Two view networking datas;
Wherein, in this application, the first view networked terminals often join the second view when transmission second regards networking data
Network data is encapsulated as regarding networking data packet, then sends view networking data packet, secondly, addition can also add in view networking data packet
The terminal iidentification of the second view networked terminals after close, and the destination address as the second view networking data.Therefore, depending on the Internet services
What device received is view networking data packet, and the terminal mark of the second view networked terminals then can be extracted from depending on networking data packet
Know, view networking data packet is sent to the second view networked terminals further according to the terminal iidentification of the second view networked terminals, to realize to the
Two view networked terminals send the second view networking data.
In step s 103, the second view networked terminals receive the second view networking data, what acquisition matched with target private key
Target Public Key decrypts the second view networked terminals using Target Public Key, obtains the first view networking data.
When obtaining the Target Public Key to match with target private key, the available first view networking of the second view networked terminals is eventually
The terminal iidentification at end;Wherein, in this application, the first view networked terminals are when transmission second regards networking data, often by the
Two are encapsulated as view networking data packet depending on networking data, then send view networking data packet, secondly, can also be in view networking data packet
The terminal iidentification of encrypted first view networked terminals, and the source address as the second view networking data are added,
Wherein, encrypted first depending on networked terminals terminal iidentification be the first view networked terminals according in advance with the second view
The Encryption Algorithm negotiated between networked terminals is encrypted to first depending on the terminal iidentifications of networked terminals,
Therefore, second depending on networked terminals receive be view networking data packet, then can from view networking data Bao Zhongti
The second view networking data is taken out, the terminal mark of encrypted first view networked terminals can also be extracted from depending on networking data packet
Know, then according in advance with second depending on the Encryption Algorithm negotiated between networked terminals corresponding decipherment algorithm to encrypted first
Depending on the terminal iidentification of networked terminals, the terminal iidentification of the first view networked terminals is obtained, later in the terminal iidentification of terminal and public key
Between corresponding relationship in, search and regard the corresponding public key of the terminal iidentification of networked terminals with first, and as with target private key
The Target Public Key to match.
Wherein, first Target Public Key and target private key can be generated by key generation facility in advance depending on networked terminals, and
Target private key is stored, then sends Target Public Key to view networked server;Target Public Key is received depending on networked server, to the second view
Networked terminals send Target Public Key;Second view networked terminals receive Target Public Key, obtain the terminal iidentification of the first view networked terminals,
Wherein, in this application, Target Public Key is often encapsulated as view networking number when sending Target Public Key by the first view networked terminals
According to packet, view networking data packet is then sent, secondly, can also add the terminal mark of the first view networked terminals in view networking data packet
Know, and the source address as Target Public Key.Therefore, second receive depending on networked terminals is view networking data packet, then can be with
Target Public Key is extracted from depending on networking data packet, the terminal of the first view networked terminals can also be extracted from view networking data packet
Mark, and the terminal iidentification of the first view networked terminals and Target Public Key are formed into corresponding table item, and be stored in the terminal mark of terminal
Know in the corresponding relationship between public key.
In this application, when first needs to send the first view networking data to the second view networked terminals depending on networked terminals,
First view networked terminals obtain target private key, are encrypted using target private key to the first view networking data, obtain the second view networking number
According to, and the second view networking data is sent to view networked server;The second view networking data is received depending on networked server, and to second
The second view networking data is sent depending on networked terminals;
It networks so between the first view networked terminals and view networked server and in view networked server and the first view
What is transmitted between terminal is the second view networking data carried out after asymmetric encryption to the first view networking data, even if the second view connection
Network data is stolen in transmission process by criminal, since criminal does not know that the first view networked terminals are regarded in encryption first
Used target private key matched Target Public Key when networking data, therefore also can not be decrypted depending on networking data according to second
One view networking data, only second depending on networked terminals when receiving the second view networking data, it is available with target private key phase
Matched Target Public Key decrypts the second view networked terminals using Target Public Key, obtains the first view networking data.To improve
Depending on safety of the networking data in transmission process.
Further, when second needs to send third view networking data to the first view networked terminals depending on networked terminals, the
Two view networked terminals obtain Target Public Key, are encrypted using Target Public Key to third view networking data, obtain the 4th view networking data,
And the 4th view networking data is sent to view networked server;The 4th view networking data is received depending on networked server, and is regarded to first
Networked terminals send the 4th view networking data;First view networked terminals receive the 4th view networking data, obtain and Target Public Key phase
Matched target private key decrypts the 4th view networked terminals using target private key, obtains third view networking data.
It should be noted that for simple description, therefore, it is stated as a series of action groups for embodiment of the method
It closes, but those skilled in the art should understand that, embodiment of that present invention are not limited by the describe sequence of actions, because according to
According to the embodiment of the present invention, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art also should
Know, the embodiments described in the specification are all preferred embodiments, and the related movement not necessarily present invention is implemented
Necessary to example.
The embodiment of the present application also shows a kind of data processing system based on view networking, and the system comprises the first view connection
Network termination, view networked server and second view networked terminals, it is described first view networked terminals and the view networked server it
Between based on view networking protocol communication connection, the view networked server and it is described second view networked terminals between based on view networking assist
View communication connection;
It is described when described first needs to send the first view networking data to the second view networked terminals depending on networked terminals
First is used to obtain target private key depending on networked terminals, is encrypted, is obtained to the first view networking data using the target private key
Second view networking data, and the second view networking data is sent to the view networked server;
It is described to be sent depending on networked server for receiving the second view networking data, and to the second view networked terminals
The second view networking data;
Described second matches for receiving the second view networking data, acquisition with the target private key depending on networked terminals
Target Public Key, using the Target Public Key to it is described second view networked terminals decrypt, obtain it is described first view networking data.
In an optional implementation, described second is also used to obtain the first view networked terminals depending on networked terminals
Terminal iidentification;In corresponding relationship between the terminal iidentification and public key of terminal, search and the first view networked terminals
The corresponding public key of terminal iidentification, and as the Target Public Key.
In an optional implementation, described first is also used to generate institute by key generation facility depending on networked terminals
Target Public Key and the target private key are stated, the target private key is stored, sends the Target Public Key to the view networked server;
Described to be also used to receive the Target Public Key depending on networked server, Xiang Suoshu second regards networked terminals and sends the mesh
Mark public key;
Described second is also used to receive the Target Public Key depending on networked terminals, obtains the terminal of the first view networked terminals
Mark, and the terminal iidentification of the Target Public Key and the first view networked terminals is formed into corresponding table item, and be stored in terminal
Terminal iidentification and public key between corresponding relationship in.
In an optional implementation, when described second depending on networked terminals be also used to need to it is described first view networking
When terminal sends third view networking data, the second view networked terminals obtain the Target Public Key, use the Target Public Key
To third view networking data encryption, the 4th view networking data is obtained, and send the described 4th to the view networked server
Depending on networking data;
It is described to be also used to receive the 4th view networking data depending on networked server, and sent out to the first view networked terminals
Send the 4th view networking data;
Described first is also used to receive the 4th view networking data depending on networked terminals, obtains and the Target Public Key phase
The target private key matched decrypts the 4th view networked terminals using the target private key, obtains the third view networking
Data.
In this application, when first needs to send the first view networking data to the second view networked terminals depending on networked terminals,
First view networked terminals obtain target private key, are encrypted using target private key to the first view networking data, obtain the second view networking number
According to, and the second view networking data is sent to view networked server;The second view networking data is received depending on networked server, and to second
The second view networking data is sent depending on networked terminals;
It networks so between the first view networked terminals and view networked server and in view networked server and the first view
What is transmitted between terminal is the second view networking data carried out after asymmetric encryption to the first view networking data, even if the second view connection
Network data is stolen in transmission process by criminal, since criminal does not know that the first view networked terminals are regarded in encryption first
Used target private key matched Target Public Key when networking data, therefore also can not be decrypted depending on networking data according to second
One view networking data, only second depending on networked terminals when receiving the second view networking data, it is available with target private key phase
Matched Target Public Key decrypts the second view networked terminals using Target Public Key, obtains the first view networking data.To improve
Depending on safety of the networking data in transmission process.
For system embodiments, since it is basically similar to the method embodiment, related so being described relatively simple
Place illustrates referring to the part of embodiment of the method.
The embodiment of the present application also shows a kind of electronic equipment, including memory, processor and storage are on a memory simultaneously
The computer program that can be run on a processor, the processor are realized as shown in FIG. 6 based on view connection when executing described program
The step of data processing method of net.
The embodiment of the present application also shows a kind of computer readable storage medium, deposits on the computer readable storage medium
Computer program is contained, the computer program is realized when being executed by processor at the data as shown in FIG. 6 based on view networking
The step of reason method.
All the embodiments in this specification are described in a progressive manner, the highlights of each of the examples are with
The difference of other embodiments, the same or similar parts between the embodiments can be referred to each other.
It should be understood by those skilled in the art that, the embodiment of the embodiment of the present invention can provide as method, system or calculate
Machine program product.Therefore, the embodiment of the present invention can be used complete hardware embodiment, complete software embodiment or combine software and
The form of the embodiment of hardware aspect.Moreover, the embodiment of the present invention can be used one or more wherein include computer can
With in the computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) of program code
The form of the computer program product of implementation.
The embodiment of the present invention be referring to according to the method for the embodiment of the present invention, terminal device (system) and computer program
The flowchart and/or the block diagram of product describes.It should be understood that flowchart and/or the block diagram can be realized by computer program instructions
In each flow and/or block and flowchart and/or the block diagram in process and/or box combination.It can provide these
Computer program instructions are set to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing terminals
Standby processor is to generate a machine, so that being held by the processor of computer or other programmable data processing terminal devices
Capable instruction generates for realizing in one or more flows of the flowchart and/or one or more blocks of the block diagram
The system of specified function.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing terminal devices
In computer-readable memory operate in a specific manner, so that instruction stored in the computer readable memory generates packet
The manufacture of instruction system is included, which realizes in one side of one or more flows of the flowchart and/or block diagram
The function of being specified in frame or multiple boxes.
These computer program instructions can also be loaded into computer or other programmable data processing terminal devices, so that
Series of operation steps are executed on computer or other programmable terminal equipments to generate computer implemented processing, thus
The instruction executed on computer or other programmable terminal equipments is provided for realizing in one or more flows of the flowchart
And/or in one or more blocks of the block diagram specify function the step of.
Although the preferred embodiment of the embodiment of the present invention has been described, once a person skilled in the art knows bases
This creative concept, then additional changes and modifications can be made to these embodiments.So the following claims are intended to be interpreted as
Including preferred embodiment and fall into all change and modification of range of embodiment of the invention.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by
One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation
Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning
Covering non-exclusive inclusion, so that process, method, article or terminal device including a series of elements not only wrap
Those elements are included, but also including other elements that are not explicitly listed, or further includes for this process, method, article
Or the element that terminal device is intrinsic.In the absence of more restrictions, being wanted by what sentence "including a ..." limited
Element, it is not excluded that there is also other identical elements in process, method, article or the terminal device for including the element.
Above to a kind of data processing method and system based on view networking provided by the present invention, detailed Jie has been carried out
It continues, used herein a specific example illustrates the principle and implementation of the invention, and the explanation of above embodiments is only
It is to be used to help understand method and its core concept of the invention;At the same time, for those skilled in the art, according to this hair
Bright thought, there will be changes in the specific implementation manner and application range, in conclusion the content of the present specification should not manage
Solution is limitation of the present invention.
Claims (10)
1. a kind of data processing method based on view networking, which is characterized in that the method is applied to the data based on view networking
Processing system, the system comprises the first view networked terminals, view networked server and the second view networked terminals, first views
Based on view networking protocol communication connection, the view networked server and described the between networked terminals and the view networked server
Based on view networking protocol communication connection between two view networked terminals, which comprises
When described first needs to send the first view networking data to the second view networked terminals depending on networked terminals, described first
Target private key is obtained depending on networked terminals, the first view networking data is encrypted using the target private key, obtains the second view connection
Network data, and the second view networking data is sent to the view networked server;
The view networked server receives the second view networking data, and sends described second to the second view networked terminals
Depending on networking data;
The second view networked terminals receive the second view networking data, and it is public to obtain the target to match with the target private key
Key decrypts the second view networked terminals using the Target Public Key, obtains the first view networking data.
2. the method according to claim 1, wherein the acquisition and the target that the target private key matches are public
Key, comprising:
Described second obtains the terminal iidentification of the first view networked terminals depending on networked terminals;
The second view networked terminals are searched and first view in the corresponding relationship between the terminal iidentification and public key of terminal
The corresponding public key of the terminal iidentification of networked terminals, and as the Target Public Key.
3. according to the method described in claim 2, it is characterized in that, the method also includes:
Described first generates the Target Public Key and the target private key by key generation facility depending on networked terminals, described in storage
Target private key sends the Target Public Key to the view networked server;
The view networked server receives the Target Public Key, and Xiang Suoshu second regards networked terminals and sends the Target Public Key;
The second view networked terminals receive the Target Public Key, obtain the terminal iidentification of the first view networked terminals, and will
The terminal iidentification of the Target Public Key and the first view networked terminals forms corresponding table item, and is stored in the terminal iidentification of terminal
In corresponding relationship between public key.
4. the method according to claim 1, wherein the method also includes:
When described second needs to send third view networking data to the first view networked terminals depending on networked terminals, described second
The Target Public Key is obtained depending on networked terminals, third view networking data is encrypted using the Target Public Key, obtains the 4th
The 4th view networking data is sent depending on networking data, and to the view networked server;
The view networked server receives the 4th view networking data, and sends the described 4th to the first view networked terminals
Depending on networking data;
The first view networked terminals receive the 4th view networking data, obtain the mesh to match with the Target Public Key
Private key is marked, the 4th view networked terminals are decrypted using the target private key, obtain the third view networking data.
5. a kind of data processing system based on view networking, which is characterized in that the system comprises the first view networked terminals, view connection
Network server and the second view networked terminals, based on view networking between the first view networked terminals and the view networked server
Protocol communication connection, based on view networking protocol communication connection between the view networked server and the second view networked terminals;
When described first needs to send the first view networking data to the second view networked terminals depending on networked terminals, described first
Depending on networked terminals for obtaining target private key, the first view networking data is encrypted using the target private key, obtains second
The second view networking data is sent depending on networking data, and to the view networked server;
It is described to be regarded described in networked terminals transmission depending on networked server for receiving the second view networking data, and to described second
Second view networking data;
Described second regards networking data for receiving described second depending on networked terminals, obtains the mesh to match with the target private key
Public key is marked, the second view networked terminals are decrypted using the Target Public Key, obtain the first view networking data.
6. system according to claim 5, which is characterized in that described second is also used to obtain described first depending on networked terminals
Depending on the terminal iidentification of networked terminals;In corresponding relationship between the terminal iidentification and public key of terminal, search and first view
The corresponding public key of the terminal iidentification of networked terminals, and as the Target Public Key.
7. system according to claim 6, which is characterized in that
Described first is also used to generate the Target Public Key and the target private key by key generation facility depending on networked terminals, deposits
The target private key is stored up, sends the Target Public Key to the view networked server;
Described to be also used to receive the Target Public Key depending on networked server, Xiang Suoshu second regards networked terminals and sends the target public affairs
Key;
Described second is also used to receive the Target Public Key depending on networked terminals, obtains the terminal mark of the first view networked terminals
Know, and the terminal iidentification of the Target Public Key and the first view networked terminals is formed into corresponding table item, and be stored in terminal
In corresponding relationship between terminal iidentification and public key.
8. system according to claim 5, which is characterized in that
When described second is also used to need to send third view networking data to the first view networked terminals depending on networked terminals, institute
It states the second view networked terminals and obtains the Target Public Key, third view networking data is encrypted using the Target Public Key, is obtained
The 4th view networking data is sent to the 4th view networking data, and to the view networked server;
It is described to be also used to receive the 4th view networking data depending on networked server, and institute is sent to the first view networked terminals
State the 4th view networking data;
Described first is also used to receive the 4th view networking data depending on networked terminals, what acquisition matched with the Target Public Key
The target private key decrypts the 4th view networked terminals using the target private key, obtains the third view networking data.
9. a kind of electronic equipment including memory, processor and stores the calculating that can be run on a memory and on a processor
Machine program, which is characterized in that the processor realizes base according to any one of claims 1 to 4 when executing described program
In the step of regarding the data processing method of networking.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium
Program is realized according to any one of claims 1 to 4 when the computer program is executed by processor based on view networking
The step of data processing method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811436642.0A CN109462594A (en) | 2018-11-28 | 2018-11-28 | A kind of data processing method and system based on view networking |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811436642.0A CN109462594A (en) | 2018-11-28 | 2018-11-28 | A kind of data processing method and system based on view networking |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109462594A true CN109462594A (en) | 2019-03-12 |
Family
ID=65611849
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811436642.0A Pending CN109462594A (en) | 2018-11-28 | 2018-11-28 | A kind of data processing method and system based on view networking |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109462594A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110557680A (en) * | 2019-07-30 | 2019-12-10 | 视联动力信息技术股份有限公司 | Audio and video data frame transmission method and system |
CN111614979A (en) * | 2020-04-08 | 2020-09-01 | 视联动力信息技术股份有限公司 | Method and device for managing video networking resources |
CN112333210A (en) * | 2021-01-04 | 2021-02-05 | 视联动力信息技术股份有限公司 | Method and equipment for realizing data communication function of video network |
CN112954388A (en) * | 2021-02-02 | 2021-06-11 | 视联动力信息技术股份有限公司 | Data file acquisition method and device, terminal equipment and storage medium |
WO2024174596A1 (en) * | 2023-02-23 | 2024-08-29 | 腾讯科技(深圳)有限公司 | Data encryption method and related apparatus |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103179557A (en) * | 2011-12-26 | 2013-06-26 | 宇龙计算机通信科技(深圳)有限公司 | Real-time encryption and decryption method and system for communication data and mobile terminal |
CN104954378A (en) * | 2015-06-19 | 2015-09-30 | 收付宝科技有限公司 | Asymmetric message encryption method and system |
CN105407072A (en) * | 2014-09-05 | 2016-03-16 | 北京握奇智能科技有限公司 | Method and system for achieving safety of Internet of Things, and interconnection equipment |
CN106790255A (en) * | 2017-01-24 | 2017-05-31 | 北京元心科技有限公司 | End to end security communication means and system |
CN107026727A (en) * | 2016-02-02 | 2017-08-08 | 阿里巴巴集团控股有限公司 | A kind of methods, devices and systems for setting up communication between devices |
CN107483505A (en) * | 2017-09-29 | 2017-12-15 | 武汉斗鱼网络科技有限公司 | The method and system that a kind of privacy of user in Video chat is protected |
CN107483426A (en) * | 2017-08-08 | 2017-12-15 | 深圳市鼎晟开元科技有限公司 | Security device safe communication method, server and storage medium |
-
2018
- 2018-11-28 CN CN201811436642.0A patent/CN109462594A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103179557A (en) * | 2011-12-26 | 2013-06-26 | 宇龙计算机通信科技(深圳)有限公司 | Real-time encryption and decryption method and system for communication data and mobile terminal |
CN105407072A (en) * | 2014-09-05 | 2016-03-16 | 北京握奇智能科技有限公司 | Method and system for achieving safety of Internet of Things, and interconnection equipment |
CN104954378A (en) * | 2015-06-19 | 2015-09-30 | 收付宝科技有限公司 | Asymmetric message encryption method and system |
CN107026727A (en) * | 2016-02-02 | 2017-08-08 | 阿里巴巴集团控股有限公司 | A kind of methods, devices and systems for setting up communication between devices |
CN106790255A (en) * | 2017-01-24 | 2017-05-31 | 北京元心科技有限公司 | End to end security communication means and system |
CN107483426A (en) * | 2017-08-08 | 2017-12-15 | 深圳市鼎晟开元科技有限公司 | Security device safe communication method, server and storage medium |
CN107483505A (en) * | 2017-09-29 | 2017-12-15 | 武汉斗鱼网络科技有限公司 | The method and system that a kind of privacy of user in Video chat is protected |
Non-Patent Citations (3)
Title |
---|
王心: ""一种基于Web Services的网上支付系统的设计"", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
赵丹阳著: "《数字环境下科技文献信息 开发利用与服务模式研究》", 30 December 2015, 辽宁大学出版社 * |
陈明编著: "《计算机导论》", 30 August 2014, 武汉大学出版社 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110557680A (en) * | 2019-07-30 | 2019-12-10 | 视联动力信息技术股份有限公司 | Audio and video data frame transmission method and system |
CN110557680B (en) * | 2019-07-30 | 2020-11-27 | 视联动力信息技术股份有限公司 | Audio and video data frame transmission method and system |
CN111614979A (en) * | 2020-04-08 | 2020-09-01 | 视联动力信息技术股份有限公司 | Method and device for managing video networking resources |
CN111614979B (en) * | 2020-04-08 | 2024-03-08 | 视联动力信息技术股份有限公司 | Management method and device for video networking resources |
CN112333210A (en) * | 2021-01-04 | 2021-02-05 | 视联动力信息技术股份有限公司 | Method and equipment for realizing data communication function of video network |
CN112333210B (en) * | 2021-01-04 | 2022-03-29 | 视联动力信息技术股份有限公司 | Method and equipment for realizing data communication function of video network |
CN112954388A (en) * | 2021-02-02 | 2021-06-11 | 视联动力信息技术股份有限公司 | Data file acquisition method and device, terminal equipment and storage medium |
CN112954388B (en) * | 2021-02-02 | 2024-04-09 | 视联动力信息技术股份有限公司 | Data file acquisition method and device, terminal equipment and storage medium |
WO2024174596A1 (en) * | 2023-02-23 | 2024-08-29 | 腾讯科技(深圳)有限公司 | Data encryption method and related apparatus |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108023910B (en) | A kind of terminal monitoring method and system based on view networking | |
CN108418778A (en) | A kind of internet and method, apparatus and interactive system regarding connected network communication | |
CN108173803B (en) | A kind of networked by view accesses the method and view connection cat server-side of internet | |
CN108965224A (en) | A kind of method and apparatus of video on demand | |
CN109462594A (en) | A kind of data processing method and system based on view networking | |
CN108965040A (en) | A kind of business monitoring method and device of view networking | |
CN107888401B (en) | A kind of method and system of real time monitoring view networked terminals cpu busy percentage | |
CN108632238A (en) | A kind of method and apparatus of permission control | |
CN109769123A (en) | A kind of processing method and system regarding networking data | |
CN108307212B (en) | A kind of file order method and device | |
CN109889779A (en) | A kind for the treatment of method and apparatus of packet out-ordering | |
CN110493513A (en) | A kind of camera control method and a kind of view networked system | |
CN110062195A (en) | A kind of video conference cut-in method and system | |
CN109068148A (en) | A kind of method and apparatus of video processing | |
CN109284265A (en) | A kind of date storage method and system | |
CN110048903A (en) | A kind of association turns gateway status monitoring method and device | |
CN109729184A (en) | A kind of method and apparatus of view networking service processing | |
CN109491783A (en) | A kind of acquisition methods and system of memory usage | |
CN109743265A (en) | A kind of method and apparatus obtaining certificate information | |
CN109151519A (en) | A kind of configuration distribution method and system based on view networking | |
CN110493193A (en) | Data transmission method and device | |
CN110351080A (en) | A kind of key exchange method and device | |
CN110149497A (en) | A kind of view networked data transmission method, apparatus, system and readable storage medium storing program for executing | |
CN110022500A (en) | A kind of loss treating method and device | |
CN109768964A (en) | Audio-video display methods and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190312 |