CN110493193A - Data transmission method and device - Google Patents
Data transmission method and device Download PDFInfo
- Publication number
- CN110493193A CN110493193A CN201910646281.0A CN201910646281A CN110493193A CN 110493193 A CN110493193 A CN 110493193A CN 201910646281 A CN201910646281 A CN 201910646281A CN 110493193 A CN110493193 A CN 110493193A
- Authority
- CN
- China
- Prior art keywords
- unmanned plane
- video data
- key
- video
- associated terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The embodiment of the invention discloses data transmission methods and device.One specific embodiment of this method includes: to request depending on networking Core server in response to receiving the encryption key distribution of unmanned plane transmission, generates the video data encryption key of unmanned plane and the video data decruption key of unmanned plane;The video data encryption key of unmanned plane is sent to the unmanned plane depending on networking Core server and the video data decruption key of unmanned plane is sent to the associated terminal of unmanned plane;Requested depending on networking Core server in response to receiving the video acquisition that the associated terminal of the unmanned plane is sent, verify the key in the video acquisition request whether be unmanned plane video data decruption key;Depending on networking Core server in response to being proved to be successful, the enciphered video data of unmanned plane is sent to the associated terminal of unmanned plane.Promote the safety of the video data by view networking transport unmanned plane acquisition.
Description
Technical field
The present invention relates to view networking arenas, and in particular to data transmission method and device.
Background technique
The real-time network networked to can be realized HD video real-time Transmission is regarded, pushing numerous Internet applications to high definition view
Frequencyization, high definition are face-to-face.It is suitable for transmission unmanned plane collected video data during taking photo by plane depending on networking.Unmanned plane is navigating
The video data acquired during clapping frequently involves the data such as in the need for confidentiality of some geographic area captured images.Cause
This, the safety by the video data of view networking transport unmanned plane acquisition is most important.
Summary of the invention
In view of the above problems, it proposes the embodiment of the present invention and overcomes the above problem or at least partly in order to provide one kind
A kind of data transmission method, the device to solve the above problems.
To solve the above-mentioned problems, the embodiment of the invention provides a kind of data transmission methods, comprising:
It is requested depending on networking Core server in response to receiving the encryption key distribution of unmanned plane transmission, generates the unmanned plane
The video data decruption key of video data encryption key and the unmanned plane, view networking Core server and it is described nobody
The video counts that machine is used to acquire the unmanned plane by view networking transport data, the video data encryption key of the unmanned plane
According to being encrypted to obtain the enciphered video data of the unmanned plane;
The video data encryption key of the unmanned plane is sent to the unmanned plane depending on networking Core server and is incited somebody to action
The video data decruption key of the unmanned plane is sent to the associated terminal of the unmanned plane, the view networking Core server with
The associated terminal of the unmanned plane passes through view networking transport data;
It is requested depending on networking Core server in response to receiving the video acquisition that the associated terminal of the unmanned plane is sent, verifying
Key in video acquisition request whether be the unmanned plane video data decruption key;
Depending on networking Core server in response to being proved to be successful, the enciphered video data of the unmanned plane is sent to the nothing
Man-machine associated terminal, to utilize the video data decruption key of the unmanned plane to institute on the associated terminal of the unmanned plane
The enciphered video data for stating unmanned plane is decrypted.
The embodiment of the invention also provides a kind of data transmission device, data transmission device includes:
Key generating unit is configured as: the encryption key distribution in response to receiving unmanned plane transmission is requested, and the nothing is generated
The video data decruption key of man-machine video data encryption key and the unmanned plane, the view networking Core server and institute
State what unmanned plane was used to acquire the unmanned plane by view networking transport data, the video data encryption key of the unmanned plane
Video data is encrypted to obtain the enciphered video data of the unmanned plane;
Key transmission unit, is configured as: the video data encryption key of the unmanned plane is sent to the unmanned plane
And the video data decruption key of the unmanned plane is sent to the associated terminal of the unmanned plane, the view networking core clothes
The associated terminal of business device and the unmanned plane passes through view networking transport data;
Key authentication unit, is configured as: the video acquisition that the associated terminal in response to receiving the unmanned plane is sent is asked
Ask, verify the key in video acquisition request whether be the unmanned plane video data decruption key;
Enciphered video data transmission unit, is configured as: in response to being proved to be successful, by the encrypted video number of the unmanned plane
According to the associated terminal for being sent to the unmanned plane, to utilize the video counts of the unmanned plane on the associated terminal of the unmanned plane
It is decrypted according to enciphered video data of the decruption key to the unmanned plane.
The embodiment of the present invention includes following advantages:
Promoted by view networking transport unmanned plane acquisition video data safety, prevent by view networking transport nobody
The video data that unmanned plane acquires during the video data of machine acquisition is divulged a secret.
Detailed description of the invention
Fig. 1 is a kind of networking schematic diagram of view networking of the invention;
Fig. 2 is a kind of hardware structural diagram of node server of the invention;
Fig. 3 is a kind of hardware structural diagram of access switch of the invention;
Fig. 4 is the hardware structural diagram that a kind of Ethernet association of the invention turns gateway;
Fig. 5 is a kind of flow chart of data transmission method provided in an embodiment of the present invention;
Fig. 6 is a kind of structural schematic diagram of data transmission device provided in an embodiment of the present invention.
Specific embodiment
In order to make the foregoing objectives, features and advantages of the present invention clearer and more comprehensible, with reference to the accompanying drawing and specific real
Applying mode, the present invention is described in further detail.
It is the important milestone of network Development depending on networking, is a real-time network, can be realized HD video real-time Transmission,
Push numerous Internet applications to HD video, high definition is face-to-face.
Real-time high-definition video switching technology is used depending on networking, it can be such as high in a network platform by required service
Clear video conference, Intellectualized monitoring analysis, emergency command, digital broadcast television, delay TV, the Web-based instruction, shows video monitoring
Field live streaming, VOD program request, TV Mail, individual character records (PVR), Intranet (manages) channel by oneself, intelligent video Broadcast Control, information publication
All be incorporated into a system platform etc. services such as tens of kinds of videos, voice, picture, text, communication, data, by TV or
Computer realizes that high-definition quality video plays.
Embodiment in order to enable those skilled in the art to better understand the present invention is introduced to depending on networking below:
Depending on networking, applied portion of techniques is as described below:
Network technology (Network Technology)
Traditional ethernet (Ethernet) is improved depending on the network technology innovation networked, with potential huge on network
First video flow.It is exchanged different from simple network packet packet switch (Packet Switching) or lattice network
(Circuit Switching) meets Streaming demand using Packet Switching depending on networking technology.Depending on skill of networking
Art has flexible, the simple and low price of packet switch, is provided simultaneously with the quality and safety assurance of circuit switching, realizes the whole network friendship
Change the seamless connection of formula virtual circuit and data format.
Switching technology (Switching Technology)
Two advantages of asynchronous and packet switch that Ethernet is used depending on networking eliminate Ethernet under the premise of complete compatible and lack
It falls into, has the end-to-end seamless connection of the whole network, direct user terminal, directly carrying IP data packet.User data is in network-wide basis
It is not required to any format conversion.It is the more advanced form of Ethernet depending on networking, is a real-time exchange platform, can be realized at present mutually
The whole network large-scale high-definition realtime video transmission that networking cannot achieve pushes numerous network video applications to high Qinghua, unitizes.
Server technology (Server Technology)
It is different from traditional server, its Streaming Media depending on the server technology in networking and unified video platform
Transmission be built upon it is connection-oriented on the basis of, data-handling capacity is unrelated with flow, communication time, single network layer energy
Enough transmitted comprising signaling and data.For voice and video business, handled depending on networking and unified video platform Streaming Media
Complexity many simpler than data processing, efficiency substantially increase hundred times or more than traditional server.
Reservoir technology (Storage Technology)
The ultrahigh speed reservoir technology of unified video platform in order to adapt to the media content of vast capacity and super-flow and
Using state-of-the-art real time operating system, the programme information in server instruction is mapped to specific hard drive space, media
Content is no longer pass through server, and moment is directly delivered to user terminal, and user waits typical time less than 0.2 second.It optimizes
Sector distribution greatly reduces the mechanical movement of hard disc magnetic head tracking, and resource consumption only accounts for the 20% of the internet ad eundem IP, but
The concurrent flow greater than 3 times of traditional disk array is generated, overall efficiency promotes 10 times or more.
Network security technology (Network Security Technology)
Depending on the structural design networked by servicing independent licence system, equipment and the modes such as user data is completely isolated every time
The network security problem that puzzlement internet has thoroughly been eradicated from structure, does not need antivirus applet, firewall generally, has prevented black
The attack of visitor and virus, structural carefree secure network is provided for user.
It services innovative technology (Service Innovation Technology)
Business and transmission are fused together by unified video platform, whether single user, private user or a net
The sum total of network is all only primary automatic connection.User terminal, set-top box or PC are attached directly to unified video platform, obtain rich
The multimedia video service of rich colorful various forms.Unified video platform is traditional to substitute with table schema using " menu type "
Complicated applications programming, considerably less code, which can be used, can be realized complicated application, realize the new business innovation of " endless ".
Networking depending on networking is as described below:
It is a kind of central controlled network structure depending on networking, which can be Tree Network, Star network, ring network etc. class
Type, but centralized control node is needed to control whole network in network on this basis.
As shown in Figure 1, being divided into access net and Metropolitan Area Network (MAN) two parts depending on networking.
The equipment of access mesh portions can be mainly divided into 3 classes: node server, access switch, terminal (including various machines
Top box, encoding board, memory etc.).Node server is connected with access switch, and access switch can be with multiple terminal phases
Even, and it can connect Ethernet.
Wherein, node server is the node that centralized control functions are played in access net, can control access switch and terminal.
Node server can directly be connected with access switch, can also directly be connected with terminal.
Similar, the equipment of metropolitan area mesh portions can also be divided into 3 classes: metropolitan area server, node switch, node serve
Device.Metropolitan area server is connected with node switch, and node switch can be connected with multiple node servers.
Wherein, node server is the node server for accessing mesh portions, i.e. node server had both belonged to access wet end
Point, and belong to metropolitan area mesh portions.
Metropolitan area server is the node that centralized control functions are played in Metropolitan Area Network (MAN), can control node switch and node serve
Device.Metropolitan area server can be directly connected to node switch, can also be directly connected to node server.
It can be seen that be entirely a kind of central controlled network structure of layering depending on networking network, and node server and metropolitan area
The network controlled under server can be the various structures such as tree-shaped, star-like, cyclic annular.
Visually claim, access mesh portions can form unified video platform (part in virtual coil), and multiple unified videos are flat
Platform can form view networking;Each unified video platform can be interconnected by metropolitan area and wide area depending on networking.
Classify depending on networked devices
1.1 embodiment of the present invention can be mainly divided into 3 classes: server depending on the equipment in networking, interchanger (including ether
Net association turns gateway), terminal (including various set-top boxes, encoding board, memory etc.).Metropolitan Area Network (MAN) can be divided on the whole depending on networking
(or national net, World Wide Web etc.) and access net.
1.2 equipment for wherein accessing mesh portions can be mainly divided into 3 classes: node server, access switch (including ether
Net association turns gateway), terminal (including various set-top boxes, encoding board, memory etc.).
The specific hardware structure of each access network equipment are as follows:
Node server:
As shown in Fig. 2, mainly including Network Interface Module 201, switching engine module 202, CPU module 203, disk array
Module 204;
Wherein, Network Interface Module 201, the Bao Jun that CPU module 203, disk array module 204 are come in enter switching engine
Module 202;Switching engine module 202 look into the operation of address table 205 to the packet come in, to obtain the navigation information of packet;
And the packet is stored according to the navigation information of packet the queue of corresponding pack buffer 206;If the queue of pack buffer 206 is close
It is full, then it abandons;All pack buffer queues of 202 poll of switching engine module, are forwarded: 1) end if meeting the following conditions
It is less than that mouth sends caching;2) the queue package counting facility is greater than zero.Disk array module 204 mainly realizes the control to hard disk, packet
Include the operation such as initialization, read-write to hard disk;CPU module 203 be mainly responsible for access switch, terminal (not shown) it
Between protocol processes, to address table 205 (including descending protocol packet address table, uplink protocol package address table, data packet addressed table)
Configuration, and, the configuration to disk array module 204.
Access switch:
As shown in figure 3, mainly including Network Interface Module (downstream network interface module 301, uplink network interface module
302), switching engine module 303 and CPU module 304;
Wherein, the packet (upstream data) that downstream network interface module 301 is come in enters packet detection module 305;Packet detection mould
Whether mesh way address (DA), source address (SA), type of data packet and the packet length of the detection packet of block 305 meet the requirements, if met,
It then distributes corresponding flow identifier (stream-id), and enters switching engine module 303, otherwise abandon;Uplink network interface mould
The packet (downlink data) that block 302 is come in enters switching engine module 303;The data packet that CPU module 304 is come in enters switching engine
Module 303;Switching engine module 303 look into the operation of address table 306 to the packet come in, to obtain the navigation information of packet;
If the packet into switching engine module 303 is that downstream network interface is gone toward uplink network interface, in conjunction with flow identifier
(stream-id) packet is stored in the queue of corresponding pack buffer 307;If the queue of the pack buffer 307 is close full,
It abandons;If the packet into switching engine module 303 is not that downstream network interface is gone toward uplink network interface, according to packet
Navigation information is stored in the data packet queue of corresponding pack buffer 307;If the queue of the pack buffer 307 is close full,
Then abandon.
All pack buffer queues of 303 poll of switching engine module, may include two kinds of situations:
If the queue is that downstream network interface is gone toward uplink network interface, meets the following conditions and be forwarded: 1)
It is less than that the port sends caching;2) the queue package counting facility is greater than zero;3) token that rate control module generates is obtained;
If the queue is not that downstream network interface is gone toward uplink network interface, meets the following conditions and is forwarded:
1) it is less than to send caching for the port;2) the queue package counting facility is greater than zero.
Rate control module 308 is configured by CPU module 304, to all downlink networks in programmable interval
Interface generates token toward the pack buffer queue that uplink network interface is gone, to control the code rate of forwarded upstream.
CPU module 304 is mainly responsible for the protocol processes between node server, the configuration to address table 306, and,
Configuration to rate control module 308.
Ethernet association turns gateway:
As shown in figure 4, mainly including Network Interface Module (downstream network interface module 401, uplink network interface module
402), switching engine module 403, CPU module 404, packet detection module 405, rate control module 408, address table 406, Bao Huan
Storage 407 and MAC adding module 409, MAC removing module 410.
Wherein, the data packet that downstream network interface module 401 is come in enters packet detection module 405;Packet detection module 405 is examined
Ethernet mac DA, ethernet mac SA, Ethernet length or frame type, the view networking mesh way address of measured data packet
DA, whether meet the requirements depending on networking source address SA, depending on networking data Packet type and packet length, corresponding stream is distributed if meeting
Identifier (stream-id);Then, MAC DA, MAC SA, length or frame type are subtracted by MAC removing module 410
(2byte), and enter corresponding receive and cache, otherwise abandon;
Downstream network interface module 401 detects the transmission caching of the port, according to the view of packet networking mesh if there is Bao Ze
Address D A knows the ethernet mac DA of corresponding terminal, adds the ethernet mac DA of terminal, Ethernet assists the MAC for turning gateway
SA, Ethernet length or frametype, and send.
The function that Ethernet association turns other modules in gateway is similar with access switch.
Terminal:
It mainly include Network Interface Module, Service Processing Module and CPU module;For example, set-top box mainly connects including network
Mouth mold block, video/audio encoding and decoding engine modules, CPU module;Encoding board mainly includes Network Interface Module, video encoding engine
Module, CPU module;Memory mainly includes Network Interface Module, CPU module and disk array module.
The equipment of 1.3 metropolitan area mesh portions can be mainly divided into 2 classes: node server, node switch, metropolitan area server.
Wherein, node switch mainly includes Network Interface Module, switching engine module and CPU module;Metropolitan area server mainly includes
Network Interface Module, switching engine module and CPU module are constituted.
2, networking data package definition is regarded
2.1 access network data package definitions
Access net data packet mainly include following sections: destination address (DA), source address (SA), reserve bytes,
payload(PDU)、CRC。
As shown in the table, the data packet for accessing net mainly includes following sections:
DA | SA | Reserved | Payload | CRC |
Wherein:
Destination address (DA) is made of 8 bytes (byte), and first character section indicates type (such as the various associations of data packet
Discuss packet, multicast packet, unicast packet etc.), be up to 256 kinds of possibility, the second byte to the 6th byte is metropolitan area net address,
Seven, the 8th bytes are access net address;
Source address (SA) is also to be made of 8 bytes (byte), is defined identical as destination address (DA);
Reserve bytes are made of 2 bytes;
The part payload has different length according to the type of different datagrams, is if it is various protocol packages
64 bytes are 32+1024=1056 bytes if it is single group unicast packets words, are not restricted to above 2 kinds certainly;
CRC is made of 4 bytes, and calculation method follows the Ethernet CRC algorithm of standard.
2.2 Metropolitan Area Network (MAN) packet definitions
The topology of Metropolitan Area Network (MAN) is pattern, may there is 2 kinds, connection even of more than two kinds, i.e. node switching between two equipment
It can all can exceed that 2 kinds between machine and node server, node switch and node switch, node switch and node server
Connection.But the metropolitan area net address of metropolitan area network equipment is uniquely, to close to accurately describe the connection between metropolitan area network equipment
System, introduces parameter in embodiments of the present invention: label, uniquely to describe a metropolitan area network equipment.
(Multi-Protocol Label Switch, multiprotocol label are handed over by the definition of label and MPLS in this specification
Change) label definition it is similar, it is assumed that between equipment A and equipment B there are two connection, then data packet from equipment A to equipment B just
There are 2 labels, data packet also there are 2 labels from equipment B to equipment A.Label is divided into label, outgoing label, it is assumed that data packet enters
The label (entering label) of equipment A is 0x0000, and the label (outgoing label) when this data packet leaves equipment A may reform into
0x0001.The networking process of Metropolitan Area Network (MAN) is to enter network process under centralized control, also means that address distribution, the label of Metropolitan Area Network (MAN)
Distribution be all to be dominated by metropolitan area server, node switch, node server be all passively execute, this point with
The label distribution of MPLS is different, and the distribution of the label of MPLS is the result that interchanger, server are negotiated mutually.
As shown in the table, the data packet of Metropolitan Area Network (MAN) mainly includes following sections:
DA | SA | Reserved | Label | Payload | CRC |
That is destination address (DA), source address (SA), reserve bytes (Reserved), label, payload (PDU), CRC.Its
In, the format of label, which can refer to, such as gives a definition: label is 32bit, wherein high 16bit retains, only with low 16bit, its position
Set is between the reserve bytes and payload of data packet.
With reference to Fig. 5, a kind of flow chart of data transmission method provided in an embodiment of the present invention is shown, can specifically include
Following steps:
Step 501, it is requested depending on networking Core server in response to receiving the encryption key distribution of unmanned plane transmission, generates nobody
The video data encryption key of machine and the video data decruption key of unmanned plane.
In the present invention, pass through view networking transport data depending on networking Core server and each unmanned plane.Each
Unmanned plane can by depending on networking will during taking photo by plane collected video data send to view networking Core server into
Row storage.Unmanned plane collected video data during taking photo by plane includes unmanned plane captured image during taking photo by plane.
In the present invention, before a unmanned plane starts to take photo by plane, which can be networked by view to view networking core
Central server sends encryption key distribution request, includes the mark of the unmanned plane in encryption key distribution request.Exist depending on networking Core server
After the encryption key distribution request for receiving unmanned plane transmission, sent depending on networking Core server in response to receiving the unmanned plane
Encryption key distribution request, generate the video data encryption key of the unmanned plane and the video data decruption key of the unmanned plane.
For example, can be adopted after receiving the encryption key distribution request that a unmanned plane is sent depending on networking Core server
Public key is generated with rivest, shamir, adelman and private key, the public key of generation can be used as the video data encryption key of the unmanned plane,
The private key of generation can be used as the video data decruption key of the unmanned plane.
In the present invention, the video data encryption key of a unmanned plane can be used for the unmanned plane during taking photo by plane
The video data of acquisition is encrypted, and the enciphered video data of the unmanned plane is obtained.The video data decruption key of the unmanned plane
It can be used for that the enciphered video data of the unmanned plane is decrypted, obtain the unmanned plane collected video during taking photo by plane
Data.
In some embodiments, it in the video data encryption key for generating a unmanned plane and is somebody's turn to do depending on networking Core server
When the video data decruption key of unmanned plane, the video data encryption key of the unmanned plane of generation and the video counts of the unmanned plane
It is identical according to decruption key.The video data encryption key of the unmanned plane and the video data decruption key of the unmanned plane are using symmetrical
Encryption Algorithm generates.In other words, it is encrypted and decrypted using the video data of the same key pair unmanned plane.
Step 502, the video data encryption key of unmanned plane is sent to unmanned plane depending on networking Core server and incited somebody to action
The video data decruption key of unmanned plane is sent to the associated terminal of unmanned plane.
In the present invention, pass through view networking transport data depending on the associated terminal of networking Core server and unmanned plane.
In the present invention, depending on networking Core server in the video data encryption key for generating a unmanned plane and this nobody
It is by view networking that the video data encryption of the unmanned plane is close depending on networking Core server after the video data decruption key of machine
Key is sent to the unmanned plane, meanwhile, it is networked by view by the video data decruption key of the unmanned plane depending on networking Core server
It is sent to the associated terminal of the unmanned plane.
In the present invention, when the quantity of the associated terminal of a unmanned plane is multiple, view networks Core server can be with
The video data encryption key of the unmanned plane is sent to the unmanned plane, meanwhile, it can be by generation depending on networking Core server
The video data decruption key of the unmanned plane is respectively sent to each of multiple associated terminals of unmanned plane associated terminal.
In some embodiments, the associated terminal of unmanned plane is view networked terminals.For example, one of a unmanned plane is associated with
Terminal is a set-top box.Depending on networking Core server in the video data encryption key and the unmanned plane for generating the unmanned plane
After video data decruption key, the video data encryption key of the unmanned plane is sent out by view networking depending on networking Core server
It send to the unmanned plane, meanwhile, the video data decruption key of the unmanned plane is sent by view networking depending on networking Core server
To the set-top box.
Step 503, it is asked depending on networking Core server in response to receiving the video acquisition that the associated terminal of unmanned plane is sent
Ask, verifying video acquisition request in key whether be unmanned plane video data decruption key.
In the present invention, when the associated terminal of a unmanned plane needs to obtain the video data of the unmanned plane, this nobody
The associated terminal of machine can send video acquisition request to view networking Core server.It include key in video acquisition request.
In the present invention, depending on networking Core server in the associated terminal transmission by receiving a unmanned plane depending on networking
Video acquisition request after, view networking Core server verify the unmanned plane associated terminal send video acquisition request in
Key whether be the unmanned plane generated in step 501 video data decruption key.
Step 504, the enciphered video data of unmanned plane is sent to nothing in response to being proved to be successful depending on networking Core server
Man-machine associated terminal.
In the present invention, when the video acquisition for determining that the associated terminal an of unmanned plane is sent depending on networking Core server is asked
When key in asking is the video data decruption key of the unmanned plane generated in step 501, then it is proved to be successful.Depending on core of networking
The enciphered video data of the unmanned plane can be sent to the associated terminal of the unmanned plane in response to being proved to be successful by central server.
When the enciphered video data of the unmanned plane is by taking photo by plane to the unmanned plane using the video data encryption key of the unmanned plane
Collected video data, which is encrypted, to be obtained.The unmanned plane of the unmanned plane is received in the associated terminal of the unmanned plane
After enciphered video data, the associated terminal of the unmanned plane can pass through the video of the unmanned plane received in step 502
The enciphered video data of the unmanned plane received is decrypted in data decryption key, obtains adopting when the unmanned plane is taken photo by plane
The video data collected.
It should be noted that for simple description, therefore, it is stated as a series of action groups for embodiment of the method
It closes, but those skilled in the art should understand that, embodiment of that present invention are not limited by the describe sequence of actions, because according to
According to the embodiment of the present invention, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art also should
Know, the embodiments described in the specification are all preferred embodiments, and the related movement not necessarily present invention is implemented
Necessary to example.
With reference to Fig. 6, a kind of structural schematic diagram of data transmission device provided in an embodiment of the present invention is shown.Data transmission
Device is installed on view networking Core server, and data transmission device includes: Key generating unit 601, key transmission unit
602, key authentication unit 603, enciphered video data transmission unit 604.
Key generating unit 601 is configured as: the encryption key distribution in response to receiving unmanned plane transmission is requested, described in generation
The video data encryption key of unmanned plane and the video data decruption key of the unmanned plane, view networking Core server with
The unmanned plane is used to acquire the unmanned plane by view networking transport data, the video data encryption key of the unmanned plane
Video data encrypted to obtain the enciphered video data of the unmanned plane;
Key transmission unit 602 is configured as: by the video data encryption key of the unmanned plane be sent to it is described nobody
Machine and the associated terminal that the video data decruption key of the unmanned plane is sent to the unmanned plane, the view networking core
The associated terminal of server and the unmanned plane passes through view networking transport data;
Key authentication unit 603 is configured as: the video acquisition that the associated terminal in response to receiving the unmanned plane is sent
Request, verify the key in video acquisition request whether be the unmanned plane video data decruption key;
Enciphered video data transmission unit 604 is configured as: in response to being proved to be successful, by the encrypted video of the unmanned plane
Data are sent to the associated terminal of the unmanned plane, to utilize the video of the unmanned plane on the associated terminal of the unmanned plane
The enciphered video data of the unmanned plane is decrypted in data decryption key.
In some embodiments, the video data decruption key of the video data encryption key of unmanned plane and the unmanned plane
Identical, the video data encryption key of the unmanned plane and the video data decruption key of the unmanned plane are calculated using symmetric cryptography
Method generates.
In some embodiments, the associated terminal of unmanned plane is view networked terminals.
For device embodiment, since it is basically similar to the method embodiment, related so being described relatively simple
Place illustrates referring to the part of embodiment of the method.
Network Core server the present invention also provides a kind of view, this depending on networking Core server can configured with one or
Multiple processors;Memory may include above-mentioned to execute for storing one or more programs, in one or more programs
The instruction of operation described in embodiment.When one or more programs are executed by one or more processors so that one or
Multiple processors execute the instruction of operation described in above-described embodiment.
The present invention also provides a kind of computer-readable medium, which can be view networking kernel service
Included by device;It is also possible to individualism, is regarded in networking Core server without supplying.Above-mentioned computer-readable medium is held
It is loaded with one or more program, when one or more program is executed by view networking Core server, so that view networking core
Central server executes operation described in above-described embodiment.
All the embodiments in this specification are described in a progressive manner, the highlights of each of the examples are with
The difference of other embodiments, the same or similar parts between the embodiments can be referred to each other.
It should be understood by those skilled in the art that, the embodiment of the embodiment of the present invention can provide as method, apparatus or calculate
Machine program product.Therefore, the embodiment of the present invention can be used complete hardware embodiment, complete software embodiment or combine software and
The form of the embodiment of hardware aspect.Moreover, the embodiment of the present invention can be used one or more wherein include computer can
With in the computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) of program code
The form of the computer program product of implementation.
The embodiment of the present invention be referring to according to the method for the embodiment of the present invention, terminal device (system) and computer program
The flowchart and/or the block diagram of product describes.It should be understood that flowchart and/or the block diagram can be realized by computer program instructions
In each flow and/or block and flowchart and/or the block diagram in process and/or box combination.It can provide these
Computer program instructions are set to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing terminals
Standby processor is to generate a machine, so that being held by the processor of computer or other programmable data processing terminal devices
Capable instruction generates for realizing in one or more flows of the flowchart and/or one or more blocks of the block diagram
The device of specified function.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing terminal devices
In computer-readable memory operate in a specific manner, so that instruction stored in the computer readable memory generates packet
The manufacture of command device is included, which realizes in one side of one or more flows of the flowchart and/or block diagram
The function of being specified in frame or multiple boxes.
These computer program instructions can also be loaded into computer or other programmable data processing terminal devices, so that
Series of operation steps are executed on computer or other programmable terminal equipments to generate computer implemented processing, thus
The instruction executed on computer or other programmable terminal equipments is provided for realizing in one or more flows of the flowchart
And/or in one or more blocks of the block diagram specify function the step of.
Although the preferred embodiment of the embodiment of the present invention has been described, once a person skilled in the art knows bases
This creative concept, then additional changes and modifications can be made to these embodiments.So the following claims are intended to be interpreted as
Including preferred embodiment and fall into all change and modification of range of embodiment of the invention.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by
One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation
Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning
Covering non-exclusive inclusion, so that process, method, article or terminal device including a series of elements not only wrap
Those elements are included, but also including other elements that are not explicitly listed, or further includes for this process, method, article
Or the element that terminal device is intrinsic.In the absence of more restrictions, being wanted by what sentence "including a ..." limited
Element, it is not excluded that there is also other identical elements in process, method, article or the terminal device for including the element.
A kind of method provided by the present invention, a kind of system are described in detail above, it is used herein specifically
Principle and implementation of the present invention are described for a example, the present invention that the above embodiments are only used to help understand
Method and its core concept;At the same time, for those skilled in the art is being embodied according to the thought of the present invention
There will be changes in mode and application range, in conclusion the contents of this specification are not to be construed as limiting the invention.
Claims (8)
1. a kind of data transmission method, which is characterized in that the described method includes:
It is requested depending on networking Core server in response to receiving the encryption key distribution of unmanned plane transmission, generates the video of the unmanned plane
The video data decruption key of data encryption key and the unmanned plane, the view networking Core server and the unmanned plane are logical
Cross view networking transport data, the video data that the video data encryption key of the unmanned plane is used to acquire the unmanned plane into
Row encryption is to obtain the enciphered video data of the unmanned plane;
The video data encryption key of the unmanned plane is sent to the unmanned plane depending on networking Core server and will be described
The video data decruption key of unmanned plane is sent to the associated terminal of the unmanned plane, the view networking Core server with it is described
The associated terminal of unmanned plane passes through view networking transport data;
It is requested depending on networking Core server in response to receiving the video acquisition that the associated terminal of the unmanned plane is sent, described in verifying
Video acquisition request in key whether be the unmanned plane video data decruption key;
Depending on networking Core server in response to being proved to be successful, the enciphered video data of the unmanned plane is sent to the unmanned plane
Associated terminal, on the associated terminal of the unmanned plane utilize the unmanned plane video data decruption key to the nothing
Man-machine enciphered video data is decrypted.
2. the method according to claim 1, wherein video data encryption key and the nothing of the unmanned plane
Man-machine video data decruption key is identical, the video data encryption key of the unmanned plane and the video data of the unmanned plane
Decruption key is generated using symmetric encipherment algorithm.
3. method described in one of -2 according to claim 1, which is characterized in that the associated terminal of the unmanned plane is that view networking is whole
End.
4. a kind of data transmission device, it is installed on view networking Core server, which is characterized in that described device includes:
Key generating unit is configured as: the encryption key distribution in response to receiving unmanned plane transmission is requested, and the unmanned plane is generated
Video data encryption key and the unmanned plane video data decruption key, view networking Core server and the nothing
The man-machine video for being used to acquire the unmanned plane by view networking transport data, the video data encryption key of the unmanned plane
Data are encrypted to obtain the enciphered video data of the unmanned plane;
Key transmission unit, is configured as: by the video data encryption key of the unmanned plane be sent to the unmanned plane and
The video data decruption key of the unmanned plane is sent to the associated terminal of the unmanned plane, the view networking Core server
Pass through view networking transport data with the associated terminal of the unmanned plane;
Key authentication unit, is configured as: the video acquisition that the associated terminal in response to receiving the unmanned plane is sent is requested, and is tested
Demonstrate,prove the key in video acquisition request whether be the unmanned plane video data decruption key;
Enciphered video data transmission unit, is configured as: in response to being proved to be successful, the enciphered video data of the unmanned plane being sent out
It send to the associated terminal of the unmanned plane, to utilize the video data solution of the unmanned plane on the associated terminal of the unmanned plane
The enciphered video data of unmanned plane described in close key pair is decrypted.
5. device according to claim 4, which is characterized in that the video data encryption key of the unmanned plane and the nothing
Man-machine video data decruption key is identical, the video data encryption key of the unmanned plane and the video data of the unmanned plane
Decruption key is generated using symmetric encipherment algorithm.
6. the device according to one of claim 4-5, which is characterized in that the associated terminal of the unmanned plane is that view networking is whole
End.
The Core server 7. a kind of view is networked characterized by comprising
One or more processors;
Memory, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processors
Realize such as method as claimed in any one of claims 1-3.
8. a kind of computer-readable medium, is stored thereon with computer program, which is characterized in that when the program is executed by processor
Realize such as method as claimed in any one of claims 1-3.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910646281.0A CN110493193A (en) | 2019-07-17 | 2019-07-17 | Data transmission method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910646281.0A CN110493193A (en) | 2019-07-17 | 2019-07-17 | Data transmission method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110493193A true CN110493193A (en) | 2019-11-22 |
Family
ID=68547306
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910646281.0A Withdrawn CN110493193A (en) | 2019-07-17 | 2019-07-17 | Data transmission method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110493193A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111953656A (en) * | 2020-07-09 | 2020-11-17 | 视联动力信息技术股份有限公司 | Monitoring video encryption transmission method, device, equipment and medium |
CN112954388A (en) * | 2021-02-02 | 2021-06-11 | 视联动力信息技术股份有限公司 | Data file acquisition method and device, terminal equipment and storage medium |
-
2019
- 2019-07-17 CN CN201910646281.0A patent/CN110493193A/en not_active Withdrawn
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111953656A (en) * | 2020-07-09 | 2020-11-17 | 视联动力信息技术股份有限公司 | Monitoring video encryption transmission method, device, equipment and medium |
CN111953656B (en) * | 2020-07-09 | 2024-03-19 | 视联动力信息技术股份有限公司 | Method, device, equipment and medium for monitoring video encryption transmission |
CN112954388A (en) * | 2021-02-02 | 2021-06-11 | 视联动力信息技术股份有限公司 | Data file acquisition method and device, terminal equipment and storage medium |
CN112954388B (en) * | 2021-02-02 | 2024-04-09 | 视联动力信息技术股份有限公司 | Data file acquisition method and device, terminal equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108023910B (en) | A kind of terminal monitoring method and system based on view networking | |
CN110233984A (en) | A kind of monitoring system and method based on view networking | |
CN108965224A (en) | A kind of method and apparatus of video on demand | |
CN107888401B (en) | A kind of method and system of real time monitoring view networked terminals cpu busy percentage | |
CN109120897A (en) | A kind of view networking monitoring videogram sharing method and device | |
CN109462594A (en) | A kind of data processing method and system based on view networking | |
CN109769123A (en) | A kind of processing method and system regarding networking data | |
CN108307212B (en) | A kind of file order method and device | |
CN110475125A (en) | Video transcoding method and device | |
CN110062195A (en) | A kind of video conference cut-in method and system | |
CN109862014A (en) | A kind of processing method and processing device regarding networking data | |
CN109766753A (en) | A kind of finger print information acquisition methods and device | |
CN109068148A (en) | A kind of method and apparatus of video processing | |
CN109284265A (en) | A kind of date storage method and system | |
CN110121075A (en) | A kind of direct seeding operation method and apparatus | |
CN109151519A (en) | A kind of configuration distribution method and system based on view networking | |
CN110493193A (en) | Data transmission method and device | |
CN108965941A (en) | A kind of data capture method and view networking management system | |
CN110351080A (en) | A kind of key exchange method and device | |
CN110149497A (en) | A kind of view networked data transmission method, apparatus, system and readable storage medium storing program for executing | |
CN110022500A (en) | A kind of loss treating method and device | |
CN109768964A (en) | Audio-video display methods and device | |
CN109922297A (en) | Call method and device | |
CN109698859A (en) | A kind of date storage method and device based on view networking | |
CN108965366A (en) | A kind of querying method and device of version information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20191122 |
|
WW01 | Invention patent application withdrawn after publication |