[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN109462594A - A kind of data processing method and system based on view networking - Google Patents

A kind of data processing method and system based on view networking Download PDF

Info

Publication number
CN109462594A
CN109462594A CN201811436642.0A CN201811436642A CN109462594A CN 109462594 A CN109462594 A CN 109462594A CN 201811436642 A CN201811436642 A CN 201811436642A CN 109462594 A CN109462594 A CN 109462594A
Authority
CN
China
Prior art keywords
view
networked terminals
depending
networking data
public key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811436642.0A
Other languages
Chinese (zh)
Inventor
王垚
陈婷
牛永会
白万顺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Visionvera Information Technology Co Ltd
Original Assignee
Visionvera Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Visionvera Information Technology Co Ltd filed Critical Visionvera Information Technology Co Ltd
Priority to CN201811436642.0A priority Critical patent/CN109462594A/en
Publication of CN109462594A publication Critical patent/CN109462594A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The embodiment of the invention provides a kind of data processing methods and system based on view networking.So first depending on networked terminals and depending between networked server and depending on networked server and first depending on transmitted between networked terminals be to first view networking data carry out asymmetric encryption after second view networking data, even if second is stolen in transmission process by criminal depending on networking data, since criminal does not know the first view networked terminals used matched Target Public Key of target private key when encryption first regards networking data, therefore also the first view networking data can not be decrypted depending on networking data according to second, only second depending on networked terminals when receiving the second view networking data, the available Target Public Key to match with target private key, the second view networked terminals are decrypted using Target Public Key, obtain the first view networking data.To improve safety of the view networking data in transmission process.

Description

A kind of data processing method and system based on view networking
Technical field
The present invention relates to view networking technology fields, more particularly to a kind of data processing method based on depending on networking and are System.
Background technique
With the rapid development of technology, the network activity of people is more frequent, and more and more users need on network Data are transmitted, at the same time, the requirement of safety of the people to data in transmission process is also higher and higher.
Therefore, how to improve safety of the data in transmission process is a technical problem urgently to be resolved.
Summary of the invention
In order to solve the above-mentioned technical problem, the embodiment of the present application show it is a kind of based on view networking data processing method and System.
In a first aspect, the embodiment of the present application shows a kind of data processing method based on view networking, the method application In the data processing system based on view networking, the system comprises the first view networked terminals, view networked server and the second views Networked terminals, it is described based on view networking protocol communication connection between the first view networked terminals and the view networked server Depending on being communicated to connect between networked server and the second view networked terminals based on view networking protocol, which comprises
It is described when described first needs to send the first view networking data to the second view networked terminals depending on networked terminals First view networked terminals obtain target private key, are encrypted using the target private key to the first view networking data, obtain second The second view networking data is sent depending on networking data, and to the view networked server;
The view networked server receives the second view networking data, and to described in the second view networked terminals transmission Second view networking data;
The second view networked terminals receive the second view networking data, obtain the mesh to match with the target private key Public key is marked, the second view networked terminals are decrypted using the Target Public Key, obtain the first view networking data.
It is described to obtain the Target Public Key to match with the target private key in an optional implementation, comprising:
Described second obtains the terminal iidentification of the first view networked terminals depending on networked terminals;
The second view networked terminals are in corresponding relationship between the terminal iidentification and public key of terminal, search and described the The corresponding public key of terminal iidentification of one view networked terminals, and as the Target Public Key.
In an optional implementation, the method also includes:
Described first generates the Target Public Key and the target private key by key generation facility depending on networked terminals, storage The target private key sends the Target Public Key to the view networked server;
The view networked server receives the Target Public Key, and Xiang Suoshu second regards networked terminals and sends the target public affairs Key;
The second view networked terminals receive the Target Public Key, obtain the terminal iidentification of the first view networked terminals, And the terminal iidentification of the Target Public Key and the first view networked terminals is formed into corresponding table item, and be stored in the terminal of terminal In corresponding relationship between mark and public key.
In an optional implementation, the method also includes:
It is described when described second needs to send third view networking data to the first view networked terminals depending on networked terminals Second view networked terminals obtain the Target Public Key, are encrypted, are obtained to third view networking data using the Target Public Key 4th view networking data, and the 4th view networking data is sent to the view networked server;
The view networked server receives the 4th view networking data, and to described in the first view networked terminals transmission 4th view networking data;
The first view networked terminals receive the 4th view networking data, obtain the institute to match with the Target Public Key Target private key is stated, the 4th view networked terminals are decrypted using the target private key, obtain the third view networking data.
Second aspect, the embodiment of the present application show a kind of data processing system based on view networking, the system comprises First view networked terminals, view networked server and the second view networked terminals, the first view networked terminals and the view are networked It is described depending on networked server and described second between networked terminals depending on being based on based on view networking protocol communication connection between server It is communicated to connect depending on networking protocol;
It is described when described first needs to send the first view networking data to the second view networked terminals depending on networked terminals First is used to obtain target private key depending on networked terminals, is encrypted, is obtained to the first view networking data using the target private key Second view networking data, and the second view networking data is sent to the view networked server;
It is described to be sent depending on networked server for receiving the second view networking data, and to the second view networked terminals The second view networking data;
Described second matches for receiving the second view networking data, acquisition with the target private key depending on networked terminals Target Public Key, using the Target Public Key to it is described second view networked terminals decrypt, obtain it is described first view networking data.
In an optional implementation, described second is also used to obtain the first view networked terminals depending on networked terminals Terminal iidentification;In corresponding relationship between the terminal iidentification and public key of terminal, search and the first view networked terminals The corresponding public key of terminal iidentification, and as the Target Public Key.
In an optional implementation, described first is also used to generate institute by key generation facility depending on networked terminals Target Public Key and the target private key are stated, the target private key is stored, sends the Target Public Key to the view networked server;
Described to be also used to receive the Target Public Key depending on networked server, Xiang Suoshu second regards networked terminals and sends the mesh Mark public key;
Described second is also used to receive the Target Public Key depending on networked terminals, obtains the terminal of the first view networked terminals Mark, and the terminal iidentification of the Target Public Key and the first view networked terminals is formed into corresponding table item, and be stored in terminal Terminal iidentification and public key between corresponding relationship in.
In an optional implementation, when described second depending on networked terminals be also used to need to it is described first view networking When terminal sends third view networking data, the second view networked terminals obtain the Target Public Key, use the Target Public Key To third view networking data encryption, the 4th view networking data is obtained, and send the described 4th to the view networked server Depending on networking data;
It is described to be also used to receive the 4th view networking data depending on networked server, and sent out to the first view networked terminals Send the 4th view networking data;
Described first is also used to receive the 4th view networking data depending on networked terminals, obtains and the Target Public Key phase The target private key matched decrypts the 4th view networked terminals using the target private key, obtains the third view networking Data.
The third aspect, the embodiment of the present application show a kind of electronic equipment, including memory, processor and are stored in storage On device and the computer program that can run on a processor, the processor are realized as described in relation to the first aspect when executing described program Based on view networking data processing method the step of.
Fourth aspect, the embodiment of the present application show a kind of computer readable storage medium, the computer-readable storage Computer program is stored on medium, when the computer program is executed by processor realize as described in relation to the first aspect based on view The step of data processing method of networking.
The embodiment of the present invention includes following advantages:
In this application, when first needs to send the first view networking data to the second view networked terminals depending on networked terminals, First view networked terminals obtain target private key, are encrypted using target private key to the first view networking data, obtain the second view networking number According to, and the second view networking data is sent to view networked server;The second view networking data is received depending on networked server, and to second The second view networking data is sent depending on networked terminals;
It networks so between the first view networked terminals and view networked server and in view networked server and the first view What is transmitted between terminal is the second view networking data carried out after asymmetric encryption to the first view networking data, even if the second view connection Network data is stolen in transmission process by criminal, since criminal does not know that the first view networked terminals are regarded in encryption first Used target private key matched Target Public Key when networking data, therefore also can not be decrypted depending on networking data according to second One view networking data, only second depending on networked terminals when receiving the second view networking data, it is available with target private key phase Matched Target Public Key decrypts the second view networked terminals using Target Public Key, obtains the first view networking data.To improve Depending on safety of the networking data in transmission process.
Detailed description of the invention
Fig. 1 is a kind of networking schematic diagram of view networking of the invention;
Fig. 2 is a kind of hardware structural diagram of node server of the invention;
Fig. 3 is a kind of hardware structural diagram of access switch of the invention;
Fig. 4 is the hardware structural diagram that a kind of Ethernet association of the invention turns gateway;
Fig. 5 is a kind of structural block diagram of data processing system based on view networking of the invention;
Fig. 6 is a kind of step flow chart of data processing method based on view networking of the invention.
Specific embodiment
In order to make the foregoing objectives, features and advantages of the present invention clearer and more comprehensible, with reference to the accompanying drawing and specific real Applying mode, the present invention is described in further detail.
It is the important milestone of network Development depending on networking, is a real-time network, can be realized HD video real-time Transmission, Push numerous Internet applications to HD video, high definition is face-to-face.
Real-time high-definition video switching technology is used depending on networking, it can be such as high in a network platform by required service Clear video conference, Intellectualized monitoring analysis, emergency command, digital broadcast television, delay TV, the Web-based instruction, shows video monitoring Field live streaming, VOD program request, TV Mail, individual character records (PVR), Intranet (manages) channel by oneself, intelligent video Broadcast Control, information publication All be incorporated into a system platform etc. services such as tens of kinds of videos, voice, picture, text, communication, data, by TV or Computer realizes that high-definition quality video plays.
Embodiment in order to enable those skilled in the art to better understand the present invention is introduced to depending on networking below:
Depending on networking, applied portion of techniques is as described below:
Network technology (Network Technology)
Traditional ethernet (Ethernet) is improved depending on the network technology innovation networked, with potential huge on network Video flow.(Circuit is exchanged different from simple network packet packet switch (Packet Switching) or lattice network Switching), Streaming demand is met using Packet Switching depending on networking technology.Has grouping depending on networking technology Flexible, the simple and low price of exchange, is provided simultaneously with the quality and safety assurance of circuit switching, it is virtually electric to realize the whole network switch type The seamless connection of road and data format.
Switching technology (Switching Technology)
Two advantages of asynchronous and packet switch that Ethernet is used depending on networking eliminate Ethernet under the premise of complete compatible and lack It falls into, has the end-to-end seamless connection of the whole network, direct user terminal, directly carrying IP data packet.User data is in network-wide basis It is not required to any format conversion.It is the more advanced form of Ethernet depending on networking, is a real-time exchange platform, can be realized at present mutually The whole network large-scale high-definition realtime video transmission that networking cannot achieve pushes numerous network video applications to high Qinghua, unitizes.
Server technology (Server Technology)
It is different from traditional server, its Streaming Media depending on the server technology in networking and unified video platform Transmission be built upon it is connection-oriented on the basis of, data-handling capacity is unrelated with flow, communication time, single network layer energy Enough transmitted comprising signaling and data.For voice and video business, handled depending on networking and unified video platform Streaming Media Complexity many simpler than data processing, efficiency substantially increase hundred times or more than traditional server.
Reservoir technology (Storage Technology)
The ultrahigh speed reservoir technology of unified video platform in order to adapt to the media content of vast capacity and super-flow and Using state-of-the-art real time operating system, the programme information in server instruction is mapped to specific hard drive space, media Content is no longer pass through server, and moment is directly delivered to user terminal, and user waits typical time less than 0.2 second.It optimizes Sector distribution greatly reduces the mechanical movement of hard disc magnetic head tracking, and resource consumption only accounts for the 20% of the internet ad eundem IP, but The concurrent flow greater than 3 times of traditional disk array is generated, overall efficiency promotes 10 times or more.
Network security technology (Network Security Technology)
Depending on the structural design networked by servicing independent licence system, equipment and the modes such as user data is completely isolated every time The network security problem that puzzlement internet has thoroughly been eradicated from structure, does not need antivirus applet, firewall generally, has prevented black The attack of visitor and virus, structural carefree secure network is provided for user.
It services innovative technology (Service Innovation Technology)
Business and transmission are fused together by unified video platform, whether single user, private user or a net The sum total of network is all only primary automatic connection.User terminal, set-top box or PC are attached directly to unified video platform, obtain rich The multimedia video service of rich colorful various forms.Unified video platform is traditional to substitute with table schema using " menu type " Complicated applications programming, considerably less code, which can be used, can be realized complicated application, realize the new business innovation of " endless ".
Networking depending on networking is as described below:
It is a kind of central controlled network structure depending on networking, which can be Tree Network, Star network, ring network etc. class Type, but centralized control node is needed to control whole network in network on this basis.
As shown in Figure 1, being divided into access net and Metropolitan Area Network (MAN) two parts depending on networking.
The equipment of access mesh portions can be mainly divided into 3 classes: node server, access switch, terminal (including various machines Top box, encoding board, memory etc.).Node server is connected with access switch, and access switch can be with multiple terminal phases Even, and it can connect Ethernet.
Wherein, node server is the node that centralized control functions are played in access net, can control access switch and terminal. Node server can directly be connected with access switch, can also directly be connected with terminal.
Similar, the equipment of metropolitan area mesh portions can also be divided into 3 classes: metropolitan area server, node switch, node serve Device.Metropolitan area server is connected with node switch, and node switch can be connected with multiple node servers.
Wherein, node server is the node server for accessing mesh portions, i.e. node server had both belonged to access wet end Point, and belong to metropolitan area mesh portions.
Metropolitan area server is the node that centralized control functions are played in Metropolitan Area Network (MAN), can control node switch and node serve Device.Metropolitan area server can be directly connected to node switch, can also be directly connected to node server.
It can be seen that be entirely a kind of central controlled network structure of layering depending on networking network, and node server and metropolitan area The network controlled under server can be the various structures such as tree-shaped, star-like, cyclic annular.
Visually claim, access mesh portions can form unified video platform (part in virtual coil), and multiple unified videos are flat Platform can form view networking;Each unified video platform can be interconnected by metropolitan area and wide area depending on networking.
Classify depending on networked devices
1.1 embodiment of the present invention can be mainly divided into 3 classes: server depending on the equipment in networking, interchanger (including ether Net gateway), terminal (including various set-top boxes, encoding board, memory etc.).Depending on networking can be divided on the whole Metropolitan Area Network (MAN) (or National net, World Wide Web etc.) and access net.
1.2 equipment for wherein accessing mesh portions can be mainly divided into 3 classes: node server, access switch (including ether Net gateway), terminal (including various set-top boxes, encoding board, memory etc.).
The specific hardware structure of each access network equipment are as follows:
Node server:
As shown in Fig. 2, mainly including Network Interface Module 201, switching engine module 202, CPU module 203, disk array Module 204;
Wherein, Network Interface Module 201, the Bao Jun that CPU module 203, disk array module 204 are come in enter switching engine Module 202;Switching engine module 202 look into the operation of address table 205 to the packet come in, to obtain the navigation information of packet; And the packet is stored according to the navigation information of packet the queue of corresponding pack buffer 206;If the queue of pack buffer 206 is close It is full, then it abandons;All pack buffer queues of 202 poll of switching engine mould, are forwarded: 1) port if meeting the following conditions It is less than to send caching;2) the queue package counting facility is greater than zero.Disk array module 204 mainly realizes the control to hard disk, including The operation such as initialization, read-write to hard disk;CPU module 203 is mainly responsible between access switch, terminal (not shown) Protocol processes, to address table 205 (including descending protocol packet address table, uplink protocol package address table, data packet addressed table) Configuration, and, the configuration to disk array module 204.
Access switch:
As shown in figure 3, mainly including Network Interface Module (downstream network interface module 301, uplink network interface module 302), switching engine module 303 and CPU module 304;
Wherein, the packet (upstream data) that downstream network interface module 301 is come in enters packet detection module 305;Packet detection mould Whether mesh way address (DA), source address (SA), type of data packet and the packet length of the detection packet of block 305 meet the requirements, if met, It then distributes corresponding flow identifier (stream-id), and enters switching engine module 303, otherwise abandon;Uplink network interface mould The packet (downlink data) that block 302 is come in enters switching engine module 303;The data packet that CPU module 204 is come in enters switching engine Module 303;Switching engine module 303 look into the operation of address table 306 to the packet come in, to obtain the navigation information of packet; If the packet into switching engine module 303 is that downstream network interface is gone toward uplink network interface, in conjunction with flow identifier (stream-id) packet is stored in the queue of corresponding pack buffer 307;If the queue of the pack buffer 307 is close full, It abandons;If the packet into switching engine module 303 is not that downstream network interface is gone toward uplink network interface, according to packet Navigation information is stored in the data packet queue of corresponding pack buffer 307;If the queue of the pack buffer 307 is close full, Then abandon.
All pack buffer queues of 303 poll of switching engine module, are divided to two kinds of situations in embodiments of the present invention:
If the queue is that downstream network interface is gone toward uplink network interface, meets the following conditions and be forwarded: 1) It is less than that the port sends caching;2) the queue package counting facility is greater than zero;3) token that rate control module generates is obtained;
If the queue is not that downstream network interface is gone toward uplink network interface, meets the following conditions and is forwarded: 1) it is less than to send caching for the port;2) the queue package counting facility is greater than zero.
Rate control module 208 is configured by CPU module 204, to all downlink networks in programmable interval Interface generates token toward the pack buffer queue that uplink network interface is gone, to control the code rate of forwarded upstream.
CPU module 304 is mainly responsible for the protocol processes between node server, the configuration to address table 306, and, Configuration to rate control module 308.
Ethernet association turns gateway:
As shown in figure 4, mainly including Network Interface Module (downstream network interface module 401, uplink network interface module 402), switching engine module 403, CPU module 404, packet detection module 405, rate control module 408, address table 406, Bao Huan Storage 407 and MAC adding module 409, MAC removing module 410.
Wherein, the data packet that downstream network interface module 401 is come in enters packet detection module 405;Packet detection module 405 is examined Ethernet mac DA, ethernet mac SA, Ethernet length or frame type, the view networking mesh way address of measured data packet DA, whether meet the requirements depending on networking source address SA, depending on networking data Packet type and packet length, corresponding stream is distributed if meeting Identifier (stream-id);Then, MAC DA, MAC SA, length or frame type are subtracted by MAC removing module 410 (2byte), and enter corresponding receive and cache, otherwise abandon;
Downstream network interface module 401 detects the transmission caching of the port, according to the view of packet networking mesh if there is Bao Ze Address D A knows the ethernet mac DA of corresponding terminal, adds the ethernet mac DA of terminal, Ethernet assists the MAC for turning gateway SA, Ethernet length or frame type, and send.
The function that Ethernet association turns other modules in gateway is similar with access switch.
Terminal:
It mainly include Network Interface Module, Service Processing Module and CPU module;For example, set-top box mainly connects including network Mouth mold block, video/audio encoding and decoding engine modules, CPU module;Encoding board mainly includes Network Interface Module, video encoding engine Module, CPU module;Memory mainly includes Network Interface Module, CPU module and disk array module.
The equipment of 1.3 metropolitan area mesh portions can be mainly divided into 2 classes: node server, node switch, metropolitan area server. Wherein, node switch mainly includes Network Interface Module, switching engine module and CPU module;Metropolitan area server mainly includes Network Interface Module, switching engine module and CPU module are constituted.
2, networking data package definition is regarded
2.1 access network data package definitions
Access net data packet mainly include following sections: destination address (DA), source address (SA), reserve bytes, payload(PDU)、CRC。
As shown in the table, the data packet for accessing net mainly includes following sections:
DA SA Reserved Payload CRC
Wherein:
Destination address (DA) is made of 8 bytes (byte), and first character section indicates type (such as the various associations of data packet Discuss packet, multicast packet, unicast packet etc.), be up to 256 kinds of possibility, the second byte to the 6th byte is metropolitan area net address, Seven, the 8th bytes are access net address;
Source address (SA) is also to be made of 8 bytes (byte), is defined identical as destination address (DA);
Reserve bytes are made of 2 bytes;
The part payload has different length according to the type of different datagrams, is if it is various protocol packages 64 bytes are 32+1024=1056 bytes if it is single group unicast packets words, are not restricted to above 2 kinds certainly;
CRC is made of 4 bytes, and calculation method follows the Ethernet CRC algorithm of standard.
2.2 Metropolitan Area Network (MAN) packet definitions
The topology of Metropolitan Area Network (MAN) is pattern, may there is 2 kinds, connection even of more than two kinds, i.e. node switching between two equipment It can all can exceed that 2 kinds between machine and node server, node switch and node switch, node switch and node server Connection.But the metropolitan area net address of metropolitan area network equipment is uniquely, to close to accurately describe the connection between metropolitan area network equipment System, introduces parameter in embodiments of the present invention: label, uniquely to describe a metropolitan area network equipment.
(Multi-Protocol Label Switch, multiprotocol label are handed over by the definition of label and MPLS in this specification Change) label definition it is similar, it is assumed that between equipment A and equipment B there are two connection, then data packet from equipment A to equipment B just There are 2 labels, data packet also there are 2 labels from equipment B to equipment A.Label is divided into label, outgoing label, it is assumed that data packet enters The label (entering label) of equipment A is 0x0000, and the label (outgoing label) when this data packet leaves equipment A may reform into 0x0001.The networking process of Metropolitan Area Network (MAN) is to enter network process under centralized control, also means that address distribution, the label of Metropolitan Area Network (MAN) Distribution be all to be dominated by metropolitan area server, node switch, node server be all passively execute, this point with The label distribution of MPLS is different, and the distribution of the label of MPLS is the result that interchanger, server are negotiated mutually.
As shown in the table, the data packet of Metropolitan Area Network (MAN) mainly includes following sections:
DA SA Reserved Label Payload CRC
That is destination address (DA), source address (SA), reserve bytes (Reserved), label, payload (PDU), CRC.Its In, the format of label, which can refer to, such as gives a definition: label is 32bit, wherein high 16bit retains, only with low 16bit, its position Set is between the reserve bytes and payload of data packet.
Based on the above-mentioned characteristic of view networking, one of the core concepts of the embodiments of the present invention is proposed, it then follows regard the association of networking View, first depending on networked terminals and depending between networked server and depending on networked server and first depending on being passed between networked terminals Defeated is the second view networking data carried out after asymmetric encryption to the first view networking data, even if second is passing depending on networking data It is stolen during defeated by criminal, since criminal does not know the first view networked terminals when encryption first regards networking data The used matched Target Public Key of target private key, therefore also the first view networking number can not be decrypted depending on networking data according to second According to, only second depending on networked terminals when receiving the second view networking data, the available target to match with target private key Public key decrypts the second view networked terminals using Target Public Key, obtains the first view networking data.To improve view networking data Safety in transmission process.
Referring to Fig. 5, a kind of structural block diagram of data processing system based on view networking of the invention, the system packet are shown Include the first view networked terminals 01, view networked server 02 and the second view networked terminals 03;First view networked terminals 01 and view join Based on view networking protocol communication connection between network server 02, depending on networked server 02 and second depending on being based between networked terminals 03 It is communicated to connect depending on networking protocol.
Referring to Fig. 6, a kind of step flow chart of data processing method based on view networking of the invention, this method are shown It can be applied in system shown in fig. 5, this method may include steps of:
In step s101, when first needs to send the first view networking data to the second view networked terminals depending on networked terminals When, the first view networked terminals obtain target private key, are encrypted using target private key to the first view networking data, obtain the networking of the second view Data, and the second view networking data is sent to view networked server;
Wherein, first Target Public Key and target private key can be generated by key generation facility in advance depending on networked terminals, and Target private key is stored, such as target private key is locally stored depending on networked terminals first, then via regarding networked server to second Target Public Key is sent depending on networked terminals, so that second receives and stores Target Public Key depending on networked terminals.
In this way, in this step, the first view networked terminals can directly acquire stored mesh when obtaining target private key Mark private key.
In step s 102, the second view networking data is received depending on networked server, and sends the to the second view networked terminals Two view networking datas;
Wherein, in this application, the first view networked terminals often join the second view when transmission second regards networking data Network data is encapsulated as regarding networking data packet, then sends view networking data packet, secondly, addition can also add in view networking data packet The terminal iidentification of the second view networked terminals after close, and the destination address as the second view networking data.Therefore, depending on the Internet services What device received is view networking data packet, and the terminal mark of the second view networked terminals then can be extracted from depending on networking data packet Know, view networking data packet is sent to the second view networked terminals further according to the terminal iidentification of the second view networked terminals, to realize to the Two view networked terminals send the second view networking data.
In step s 103, the second view networked terminals receive the second view networking data, what acquisition matched with target private key Target Public Key decrypts the second view networked terminals using Target Public Key, obtains the first view networking data.
When obtaining the Target Public Key to match with target private key, the available first view networking of the second view networked terminals is eventually The terminal iidentification at end;Wherein, in this application, the first view networked terminals are when transmission second regards networking data, often by the Two are encapsulated as view networking data packet depending on networking data, then send view networking data packet, secondly, can also be in view networking data packet The terminal iidentification of encrypted first view networked terminals, and the source address as the second view networking data are added,
Wherein, encrypted first depending on networked terminals terminal iidentification be the first view networked terminals according in advance with the second view The Encryption Algorithm negotiated between networked terminals is encrypted to first depending on the terminal iidentifications of networked terminals,
Therefore, second depending on networked terminals receive be view networking data packet, then can from view networking data Bao Zhongti The second view networking data is taken out, the terminal mark of encrypted first view networked terminals can also be extracted from depending on networking data packet Know, then according in advance with second depending on the Encryption Algorithm negotiated between networked terminals corresponding decipherment algorithm to encrypted first Depending on the terminal iidentification of networked terminals, the terminal iidentification of the first view networked terminals is obtained, later in the terminal iidentification of terminal and public key Between corresponding relationship in, search and regard the corresponding public key of the terminal iidentification of networked terminals with first, and as with target private key The Target Public Key to match.
Wherein, first Target Public Key and target private key can be generated by key generation facility in advance depending on networked terminals, and Target private key is stored, then sends Target Public Key to view networked server;Target Public Key is received depending on networked server, to the second view Networked terminals send Target Public Key;Second view networked terminals receive Target Public Key, obtain the terminal iidentification of the first view networked terminals, Wherein, in this application, Target Public Key is often encapsulated as view networking number when sending Target Public Key by the first view networked terminals According to packet, view networking data packet is then sent, secondly, can also add the terminal mark of the first view networked terminals in view networking data packet Know, and the source address as Target Public Key.Therefore, second receive depending on networked terminals is view networking data packet, then can be with Target Public Key is extracted from depending on networking data packet, the terminal of the first view networked terminals can also be extracted from view networking data packet Mark, and the terminal iidentification of the first view networked terminals and Target Public Key are formed into corresponding table item, and be stored in the terminal mark of terminal Know in the corresponding relationship between public key.
In this application, when first needs to send the first view networking data to the second view networked terminals depending on networked terminals, First view networked terminals obtain target private key, are encrypted using target private key to the first view networking data, obtain the second view networking number According to, and the second view networking data is sent to view networked server;The second view networking data is received depending on networked server, and to second The second view networking data is sent depending on networked terminals;
It networks so between the first view networked terminals and view networked server and in view networked server and the first view What is transmitted between terminal is the second view networking data carried out after asymmetric encryption to the first view networking data, even if the second view connection Network data is stolen in transmission process by criminal, since criminal does not know that the first view networked terminals are regarded in encryption first Used target private key matched Target Public Key when networking data, therefore also can not be decrypted depending on networking data according to second One view networking data, only second depending on networked terminals when receiving the second view networking data, it is available with target private key phase Matched Target Public Key decrypts the second view networked terminals using Target Public Key, obtains the first view networking data.To improve Depending on safety of the networking data in transmission process.
Further, when second needs to send third view networking data to the first view networked terminals depending on networked terminals, the Two view networked terminals obtain Target Public Key, are encrypted using Target Public Key to third view networking data, obtain the 4th view networking data, And the 4th view networking data is sent to view networked server;The 4th view networking data is received depending on networked server, and is regarded to first Networked terminals send the 4th view networking data;First view networked terminals receive the 4th view networking data, obtain and Target Public Key phase Matched target private key decrypts the 4th view networked terminals using target private key, obtains third view networking data.
It should be noted that for simple description, therefore, it is stated as a series of action groups for embodiment of the method It closes, but those skilled in the art should understand that, embodiment of that present invention are not limited by the describe sequence of actions, because according to According to the embodiment of the present invention, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art also should Know, the embodiments described in the specification are all preferred embodiments, and the related movement not necessarily present invention is implemented Necessary to example.
The embodiment of the present application also shows a kind of data processing system based on view networking, and the system comprises the first view connection Network termination, view networked server and second view networked terminals, it is described first view networked terminals and the view networked server it Between based on view networking protocol communication connection, the view networked server and it is described second view networked terminals between based on view networking assist View communication connection;
It is described when described first needs to send the first view networking data to the second view networked terminals depending on networked terminals First is used to obtain target private key depending on networked terminals, is encrypted, is obtained to the first view networking data using the target private key Second view networking data, and the second view networking data is sent to the view networked server;
It is described to be sent depending on networked server for receiving the second view networking data, and to the second view networked terminals The second view networking data;
Described second matches for receiving the second view networking data, acquisition with the target private key depending on networked terminals Target Public Key, using the Target Public Key to it is described second view networked terminals decrypt, obtain it is described first view networking data.
In an optional implementation, described second is also used to obtain the first view networked terminals depending on networked terminals Terminal iidentification;In corresponding relationship between the terminal iidentification and public key of terminal, search and the first view networked terminals The corresponding public key of terminal iidentification, and as the Target Public Key.
In an optional implementation, described first is also used to generate institute by key generation facility depending on networked terminals Target Public Key and the target private key are stated, the target private key is stored, sends the Target Public Key to the view networked server;
Described to be also used to receive the Target Public Key depending on networked server, Xiang Suoshu second regards networked terminals and sends the mesh Mark public key;
Described second is also used to receive the Target Public Key depending on networked terminals, obtains the terminal of the first view networked terminals Mark, and the terminal iidentification of the Target Public Key and the first view networked terminals is formed into corresponding table item, and be stored in terminal Terminal iidentification and public key between corresponding relationship in.
In an optional implementation, when described second depending on networked terminals be also used to need to it is described first view networking When terminal sends third view networking data, the second view networked terminals obtain the Target Public Key, use the Target Public Key To third view networking data encryption, the 4th view networking data is obtained, and send the described 4th to the view networked server Depending on networking data;
It is described to be also used to receive the 4th view networking data depending on networked server, and sent out to the first view networked terminals Send the 4th view networking data;
Described first is also used to receive the 4th view networking data depending on networked terminals, obtains and the Target Public Key phase The target private key matched decrypts the 4th view networked terminals using the target private key, obtains the third view networking Data.
In this application, when first needs to send the first view networking data to the second view networked terminals depending on networked terminals, First view networked terminals obtain target private key, are encrypted using target private key to the first view networking data, obtain the second view networking number According to, and the second view networking data is sent to view networked server;The second view networking data is received depending on networked server, and to second The second view networking data is sent depending on networked terminals;
It networks so between the first view networked terminals and view networked server and in view networked server and the first view What is transmitted between terminal is the second view networking data carried out after asymmetric encryption to the first view networking data, even if the second view connection Network data is stolen in transmission process by criminal, since criminal does not know that the first view networked terminals are regarded in encryption first Used target private key matched Target Public Key when networking data, therefore also can not be decrypted depending on networking data according to second One view networking data, only second depending on networked terminals when receiving the second view networking data, it is available with target private key phase Matched Target Public Key decrypts the second view networked terminals using Target Public Key, obtains the first view networking data.To improve Depending on safety of the networking data in transmission process.
For system embodiments, since it is basically similar to the method embodiment, related so being described relatively simple Place illustrates referring to the part of embodiment of the method.
The embodiment of the present application also shows a kind of electronic equipment, including memory, processor and storage are on a memory simultaneously The computer program that can be run on a processor, the processor are realized as shown in FIG. 6 based on view connection when executing described program The step of data processing method of net.
The embodiment of the present application also shows a kind of computer readable storage medium, deposits on the computer readable storage medium Computer program is contained, the computer program is realized when being executed by processor at the data as shown in FIG. 6 based on view networking The step of reason method.
All the embodiments in this specification are described in a progressive manner, the highlights of each of the examples are with The difference of other embodiments, the same or similar parts between the embodiments can be referred to each other.
It should be understood by those skilled in the art that, the embodiment of the embodiment of the present invention can provide as method, system or calculate Machine program product.Therefore, the embodiment of the present invention can be used complete hardware embodiment, complete software embodiment or combine software and The form of the embodiment of hardware aspect.Moreover, the embodiment of the present invention can be used one or more wherein include computer can With in the computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) of program code The form of the computer program product of implementation.
The embodiment of the present invention be referring to according to the method for the embodiment of the present invention, terminal device (system) and computer program The flowchart and/or the block diagram of product describes.It should be understood that flowchart and/or the block diagram can be realized by computer program instructions In each flow and/or block and flowchart and/or the block diagram in process and/or box combination.It can provide these Computer program instructions are set to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing terminals Standby processor is to generate a machine, so that being held by the processor of computer or other programmable data processing terminal devices Capable instruction generates for realizing in one or more flows of the flowchart and/or one or more blocks of the block diagram The system of specified function.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing terminal devices In computer-readable memory operate in a specific manner, so that instruction stored in the computer readable memory generates packet The manufacture of instruction system is included, which realizes in one side of one or more flows of the flowchart and/or block diagram The function of being specified in frame or multiple boxes.
These computer program instructions can also be loaded into computer or other programmable data processing terminal devices, so that Series of operation steps are executed on computer or other programmable terminal equipments to generate computer implemented processing, thus The instruction executed on computer or other programmable terminal equipments is provided for realizing in one or more flows of the flowchart And/or in one or more blocks of the block diagram specify function the step of.
Although the preferred embodiment of the embodiment of the present invention has been described, once a person skilled in the art knows bases This creative concept, then additional changes and modifications can be made to these embodiments.So the following claims are intended to be interpreted as Including preferred embodiment and fall into all change and modification of range of embodiment of the invention.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning Covering non-exclusive inclusion, so that process, method, article or terminal device including a series of elements not only wrap Those elements are included, but also including other elements that are not explicitly listed, or further includes for this process, method, article Or the element that terminal device is intrinsic.In the absence of more restrictions, being wanted by what sentence "including a ..." limited Element, it is not excluded that there is also other identical elements in process, method, article or the terminal device for including the element.
Above to a kind of data processing method and system based on view networking provided by the present invention, detailed Jie has been carried out It continues, used herein a specific example illustrates the principle and implementation of the invention, and the explanation of above embodiments is only It is to be used to help understand method and its core concept of the invention;At the same time, for those skilled in the art, according to this hair Bright thought, there will be changes in the specific implementation manner and application range, in conclusion the content of the present specification should not manage Solution is limitation of the present invention.

Claims (10)

1. a kind of data processing method based on view networking, which is characterized in that the method is applied to the data based on view networking Processing system, the system comprises the first view networked terminals, view networked server and the second view networked terminals, first views Based on view networking protocol communication connection, the view networked server and described the between networked terminals and the view networked server Based on view networking protocol communication connection between two view networked terminals, which comprises
When described first needs to send the first view networking data to the second view networked terminals depending on networked terminals, described first Target private key is obtained depending on networked terminals, the first view networking data is encrypted using the target private key, obtains the second view connection Network data, and the second view networking data is sent to the view networked server;
The view networked server receives the second view networking data, and sends described second to the second view networked terminals Depending on networking data;
The second view networked terminals receive the second view networking data, and it is public to obtain the target to match with the target private key Key decrypts the second view networked terminals using the Target Public Key, obtains the first view networking data.
2. the method according to claim 1, wherein the acquisition and the target that the target private key matches are public Key, comprising:
Described second obtains the terminal iidentification of the first view networked terminals depending on networked terminals;
The second view networked terminals are searched and first view in the corresponding relationship between the terminal iidentification and public key of terminal The corresponding public key of the terminal iidentification of networked terminals, and as the Target Public Key.
3. according to the method described in claim 2, it is characterized in that, the method also includes:
Described first generates the Target Public Key and the target private key by key generation facility depending on networked terminals, described in storage Target private key sends the Target Public Key to the view networked server;
The view networked server receives the Target Public Key, and Xiang Suoshu second regards networked terminals and sends the Target Public Key;
The second view networked terminals receive the Target Public Key, obtain the terminal iidentification of the first view networked terminals, and will The terminal iidentification of the Target Public Key and the first view networked terminals forms corresponding table item, and is stored in the terminal iidentification of terminal In corresponding relationship between public key.
4. the method according to claim 1, wherein the method also includes:
When described second needs to send third view networking data to the first view networked terminals depending on networked terminals, described second The Target Public Key is obtained depending on networked terminals, third view networking data is encrypted using the Target Public Key, obtains the 4th The 4th view networking data is sent depending on networking data, and to the view networked server;
The view networked server receives the 4th view networking data, and sends the described 4th to the first view networked terminals Depending on networking data;
The first view networked terminals receive the 4th view networking data, obtain the mesh to match with the Target Public Key Private key is marked, the 4th view networked terminals are decrypted using the target private key, obtain the third view networking data.
5. a kind of data processing system based on view networking, which is characterized in that the system comprises the first view networked terminals, view connection Network server and the second view networked terminals, based on view networking between the first view networked terminals and the view networked server Protocol communication connection, based on view networking protocol communication connection between the view networked server and the second view networked terminals;
When described first needs to send the first view networking data to the second view networked terminals depending on networked terminals, described first Depending on networked terminals for obtaining target private key, the first view networking data is encrypted using the target private key, obtains second The second view networking data is sent depending on networking data, and to the view networked server;
It is described to be regarded described in networked terminals transmission depending on networked server for receiving the second view networking data, and to described second Second view networking data;
Described second regards networking data for receiving described second depending on networked terminals, obtains the mesh to match with the target private key Public key is marked, the second view networked terminals are decrypted using the Target Public Key, obtain the first view networking data.
6. system according to claim 5, which is characterized in that described second is also used to obtain described first depending on networked terminals Depending on the terminal iidentification of networked terminals;In corresponding relationship between the terminal iidentification and public key of terminal, search and first view The corresponding public key of the terminal iidentification of networked terminals, and as the Target Public Key.
7. system according to claim 6, which is characterized in that
Described first is also used to generate the Target Public Key and the target private key by key generation facility depending on networked terminals, deposits The target private key is stored up, sends the Target Public Key to the view networked server;
Described to be also used to receive the Target Public Key depending on networked server, Xiang Suoshu second regards networked terminals and sends the target public affairs Key;
Described second is also used to receive the Target Public Key depending on networked terminals, obtains the terminal mark of the first view networked terminals Know, and the terminal iidentification of the Target Public Key and the first view networked terminals is formed into corresponding table item, and be stored in terminal In corresponding relationship between terminal iidentification and public key.
8. system according to claim 5, which is characterized in that
When described second is also used to need to send third view networking data to the first view networked terminals depending on networked terminals, institute It states the second view networked terminals and obtains the Target Public Key, third view networking data is encrypted using the Target Public Key, is obtained The 4th view networking data is sent to the 4th view networking data, and to the view networked server;
It is described to be also used to receive the 4th view networking data depending on networked server, and institute is sent to the first view networked terminals State the 4th view networking data;
Described first is also used to receive the 4th view networking data depending on networked terminals, what acquisition matched with the Target Public Key The target private key decrypts the 4th view networked terminals using the target private key, obtains the third view networking data.
9. a kind of electronic equipment including memory, processor and stores the calculating that can be run on a memory and on a processor Machine program, which is characterized in that the processor realizes base according to any one of claims 1 to 4 when executing described program In the step of regarding the data processing method of networking.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program is realized according to any one of claims 1 to 4 when the computer program is executed by processor based on view networking The step of data processing method.
CN201811436642.0A 2018-11-28 2018-11-28 A kind of data processing method and system based on view networking Pending CN109462594A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811436642.0A CN109462594A (en) 2018-11-28 2018-11-28 A kind of data processing method and system based on view networking

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811436642.0A CN109462594A (en) 2018-11-28 2018-11-28 A kind of data processing method and system based on view networking

Publications (1)

Publication Number Publication Date
CN109462594A true CN109462594A (en) 2019-03-12

Family

ID=65611849

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811436642.0A Pending CN109462594A (en) 2018-11-28 2018-11-28 A kind of data processing method and system based on view networking

Country Status (1)

Country Link
CN (1) CN109462594A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110557680A (en) * 2019-07-30 2019-12-10 视联动力信息技术股份有限公司 Audio and video data frame transmission method and system
CN111614979A (en) * 2020-04-08 2020-09-01 视联动力信息技术股份有限公司 Method and device for managing video networking resources
CN112333210A (en) * 2021-01-04 2021-02-05 视联动力信息技术股份有限公司 Method and equipment for realizing data communication function of video network
CN112954388A (en) * 2021-02-02 2021-06-11 视联动力信息技术股份有限公司 Data file acquisition method and device, terminal equipment and storage medium
WO2024174596A1 (en) * 2023-02-23 2024-08-29 腾讯科技(深圳)有限公司 Data encryption method and related apparatus

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103179557A (en) * 2011-12-26 2013-06-26 宇龙计算机通信科技(深圳)有限公司 Real-time encryption and decryption method and system for communication data and mobile terminal
CN104954378A (en) * 2015-06-19 2015-09-30 收付宝科技有限公司 Asymmetric message encryption method and system
CN105407072A (en) * 2014-09-05 2016-03-16 北京握奇智能科技有限公司 Method and system for achieving safety of Internet of Things, and interconnection equipment
CN106790255A (en) * 2017-01-24 2017-05-31 北京元心科技有限公司 End to end security communication means and system
CN107026727A (en) * 2016-02-02 2017-08-08 阿里巴巴集团控股有限公司 A kind of methods, devices and systems for setting up communication between devices
CN107483505A (en) * 2017-09-29 2017-12-15 武汉斗鱼网络科技有限公司 The method and system that a kind of privacy of user in Video chat is protected
CN107483426A (en) * 2017-08-08 2017-12-15 深圳市鼎晟开元科技有限公司 Security device safe communication method, server and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103179557A (en) * 2011-12-26 2013-06-26 宇龙计算机通信科技(深圳)有限公司 Real-time encryption and decryption method and system for communication data and mobile terminal
CN105407072A (en) * 2014-09-05 2016-03-16 北京握奇智能科技有限公司 Method and system for achieving safety of Internet of Things, and interconnection equipment
CN104954378A (en) * 2015-06-19 2015-09-30 收付宝科技有限公司 Asymmetric message encryption method and system
CN107026727A (en) * 2016-02-02 2017-08-08 阿里巴巴集团控股有限公司 A kind of methods, devices and systems for setting up communication between devices
CN106790255A (en) * 2017-01-24 2017-05-31 北京元心科技有限公司 End to end security communication means and system
CN107483426A (en) * 2017-08-08 2017-12-15 深圳市鼎晟开元科技有限公司 Security device safe communication method, server and storage medium
CN107483505A (en) * 2017-09-29 2017-12-15 武汉斗鱼网络科技有限公司 The method and system that a kind of privacy of user in Video chat is protected

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
王心: ""一种基于Web Services的网上支付系统的设计"", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
赵丹阳著: "《数字环境下科技文献信息 开发利用与服务模式研究》", 30 December 2015, 辽宁大学出版社 *
陈明编著: "《计算机导论》", 30 August 2014, 武汉大学出版社 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110557680A (en) * 2019-07-30 2019-12-10 视联动力信息技术股份有限公司 Audio and video data frame transmission method and system
CN110557680B (en) * 2019-07-30 2020-11-27 视联动力信息技术股份有限公司 Audio and video data frame transmission method and system
CN111614979A (en) * 2020-04-08 2020-09-01 视联动力信息技术股份有限公司 Method and device for managing video networking resources
CN111614979B (en) * 2020-04-08 2024-03-08 视联动力信息技术股份有限公司 Management method and device for video networking resources
CN112333210A (en) * 2021-01-04 2021-02-05 视联动力信息技术股份有限公司 Method and equipment for realizing data communication function of video network
CN112333210B (en) * 2021-01-04 2022-03-29 视联动力信息技术股份有限公司 Method and equipment for realizing data communication function of video network
CN112954388A (en) * 2021-02-02 2021-06-11 视联动力信息技术股份有限公司 Data file acquisition method and device, terminal equipment and storage medium
CN112954388B (en) * 2021-02-02 2024-04-09 视联动力信息技术股份有限公司 Data file acquisition method and device, terminal equipment and storage medium
WO2024174596A1 (en) * 2023-02-23 2024-08-29 腾讯科技(深圳)有限公司 Data encryption method and related apparatus

Similar Documents

Publication Publication Date Title
CN108023910B (en) A kind of terminal monitoring method and system based on view networking
CN108418778A (en) A kind of internet and method, apparatus and interactive system regarding connected network communication
CN108173803B (en) A kind of networked by view accesses the method and view connection cat server-side of internet
CN108965224A (en) A kind of method and apparatus of video on demand
CN109462594A (en) A kind of data processing method and system based on view networking
CN108965040A (en) A kind of business monitoring method and device of view networking
CN107888401B (en) A kind of method and system of real time monitoring view networked terminals cpu busy percentage
CN108632238A (en) A kind of method and apparatus of permission control
CN109769123A (en) A kind of processing method and system regarding networking data
CN108307212B (en) A kind of file order method and device
CN109889779A (en) A kind for the treatment of method and apparatus of packet out-ordering
CN110493513A (en) A kind of camera control method and a kind of view networked system
CN110062195A (en) A kind of video conference cut-in method and system
CN109068148A (en) A kind of method and apparatus of video processing
CN109284265A (en) A kind of date storage method and system
CN110048903A (en) A kind of association turns gateway status monitoring method and device
CN109729184A (en) A kind of method and apparatus of view networking service processing
CN109491783A (en) A kind of acquisition methods and system of memory usage
CN109743265A (en) A kind of method and apparatus obtaining certificate information
CN109151519A (en) A kind of configuration distribution method and system based on view networking
CN110493193A (en) Data transmission method and device
CN110351080A (en) A kind of key exchange method and device
CN110149497A (en) A kind of view networked data transmission method, apparatus, system and readable storage medium storing program for executing
CN110022500A (en) A kind of loss treating method and device
CN109768964A (en) Audio-video display methods and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190312