+

CN114640867A - Video data processing method and device based on video stream authentication - Google Patents

Video data processing method and device based on video stream authentication Download PDF

Info

Publication number
CN114640867A
CN114640867A CN202210546274.5A CN202210546274A CN114640867A CN 114640867 A CN114640867 A CN 114640867A CN 202210546274 A CN202210546274 A CN 202210546274A CN 114640867 A CN114640867 A CN 114640867A
Authority
CN
China
Prior art keywords
video data
randomized
data
video
signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210546274.5A
Other languages
Chinese (zh)
Inventor
董文强
王帅
王亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Wise Security Technology Co Ltd
Original Assignee
Guangzhou Wise Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Wise Security Technology Co Ltd filed Critical Guangzhou Wise Security Technology Co Ltd
Priority to CN202210546274.5A priority Critical patent/CN114640867A/en
Publication of CN114640867A publication Critical patent/CN114640867A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • H04N21/2541Rights Management

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Databases & Information Systems (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The embodiment of the application discloses a video data processing method and device based on video stream authentication. According to the technical scheme provided by the embodiment of the application, video stream authentication information of target video data is made based on signature data; and then segmenting target video data according to a set number of video frames to obtain a plurality of video data segments, randomizing each video data segment by using a randomization algorithm based on a predefined original randomization seed to obtain a plurality of corresponding randomized data segments, packaging and encrypting each randomized data segment into a video data packet by using preset key information, and sending the video data packet and video stream authentication information to a receiving end. By adopting the technical means, the safety of video data transmission can be improved, the data is prevented from being cracked easily, meanwhile, the video data is prevented from being tampered, the safety of video data transmission is guaranteed, and further, the privacy of a user is prevented from being revealed, and unnecessary loss is avoided.

Description

Video data processing method and device based on video stream authentication
Technical Field
The embodiment of the application relates to the technical field of video processing, in particular to a video data processing method and device based on video stream authentication, an electronic device and a storage medium.
Background
At present, when video data transmission is performed in the fields of video monitoring and the like, corresponding key information is often used for encoding and encrypting the video data so as to realize the encrypted transmission of the video data. Because the video content may relate to the personal privacy information of the user, the video data is encoded and encrypted, so that the situation that the personal privacy of the user is revealed and unnecessary loss is caused to the user due to the fact that the video content is easily stolen can be avoided.
However, the method of encoding and encrypting video data only by using the key information is simple, once the key information is cracked, video content is leaked, user loss is caused, and the security of video transmission is low.
Disclosure of Invention
The embodiment of the application provides a video data processing method and device based on video stream authentication, an electronic device and a storage medium, which can improve the security of video data transmission, prevent video data from being easily stolen and solve the technical problem of how to improve the security of video data transmission.
In a first aspect, an embodiment of the present application provides a video data processing method based on video stream authentication, including:
under the condition that a sending end transmits target video data, carrying out digital signature on the target video data based on scalar dot-product double domains to obtain corresponding signature data, and making video stream authentication information of the target video data based on the signature data;
segmenting the target video data according to a set number of video frames to obtain a plurality of video data segments, randomizing each video data segment by using a randomization algorithm based on a predefined original randomization seed to obtain a plurality of corresponding randomized data segments, packaging and encrypting each randomized data segment into a video data packet by using preset key information, and sending the video data packet and the video stream authentication information to a receiving end;
the receiving end verifies the video data packet based on the video stream authentication information, after the verification is passed, the video data packet is decrypted by using preset key information to obtain a plurality of randomized data segments, the randomized data segments are de-randomized by using a de-randomization algorithm corresponding to the randomization algorithm to obtain a plurality of video data segments, and the video data segments are spliced into the target video data.
Further, the digitally signing the target video data based on the scalar dot-product double domain to obtain corresponding signature data includes:
carrying out SM2 algorithm digital signature on the target video data under the Fp domain by using a signature private key of a camera corresponding to the target video data to obtain a signature value I;
using the signature public key of the camera as a signature private key under the Fp ^2 domain to calculate the SM9 algorithm digital signature on the target video data to obtain a signature value II;
and saving the signature value I and the signature value II as the signature data.
Further, the making of the video stream authentication information of the target video data based on the signature data includes:
and writing the version information of the preset key information and the identification information of the camera, establishing the basic information of the video stream authentication information, and combining the signature data, the digital envelope of the preset key information and the check code to establish the video stream authentication information.
Further, the randomizing each of the video data segments based on the predefined original randomization seed using a randomization algorithm to obtain a plurality of corresponding randomized data segments, includes:
and taking the original randomized seed as an input sample, circularly inputting the input sample into a pre-constructed n-stage linear feedback shift register, randomizing data bits of the video data segment one by one based on the n-stage linear feedback shift register and the input sample, and iteratively adjusting the input sample.
Further, the randomizing the randomized data segment using a derandomization algorithm corresponding to the randomization algorithm comprises:
and performing derandomization processing on each data bit of the randomized data segment based on an n-order computational polynomial corresponding to the n-stage linear feedback shift register.
Further, the randomizing each of the video data segments using a randomizing algorithm based on a predefined original randomization seed, further comprises:
randomizing the corresponding video data segment using a predefined different original randomization seed, which original randomization seed is predefined for each of the video data segments.
Further, the sending end periodically inquires a pre-constructed randomized seed catalog, selects one randomized seed from the pre-constructed randomized seed catalog to update into the original randomized seed, and synchronizes the updated original randomized seed to the receiving end.
In a second aspect, an embodiment of the present application provides a video data processing apparatus based on video stream authentication, including:
the authentication module is configured to digitally sign the target video data based on scalar dot-product double domains under the condition that the target video data is transmitted by the transmitting end to obtain corresponding signature data, and video stream authentication information of the target video data is made based on the signature data;
the sending module is configured to segment the target video data according to a set number of video frames to obtain a plurality of video data segments, randomize each video data segment by using a randomization algorithm based on a predefined original randomization seed to obtain a plurality of corresponding randomized data segments, pack and encrypt each randomized data segment into a video data packet by using preset key information, and send the video data packet and the video stream authentication information to a receiving end;
and the receiving module is configured to verify the video data packet based on the video stream authentication information through the receiving terminal, decrypt the video data packet by using preset key information after the verification is passed, obtain a plurality of randomized data segments, perform derandomization on the randomized data segments by using a derandomization processing algorithm corresponding to the randomization processing algorithm, obtain a plurality of video data segments, and splice the video data segments into the target video data.
In a third aspect, an embodiment of the present application provides an electronic device, including:
a memory and one or more processors;
the memory for storing one or more programs;
when the one or more programs are executed by the one or more processors, the one or more processors are caused to implement the video data processing method based on video stream authentication according to the first aspect.
In a fourth aspect, embodiments of the present application provide a storage medium containing computer-executable instructions for performing the video data processing method based on video stream authentication according to the first aspect when executed by a computer processor.
According to the method and the device, under the condition that the sending end transmits the target video data, the target video data are digitally signed based on scalar dot-product double domains to obtain corresponding signature data, and video stream authentication information of the target video data is made based on the signature data; further segmenting target video data according to a set number of video frames to obtain a plurality of video data segments, randomizing each video data segment by using a randomization algorithm based on a predefined original randomization seed to obtain a plurality of corresponding randomized data segments, packaging and encrypting each randomized data segment into a video data packet by using preset key information, and sending the video data packet and video stream authentication information to a receiving end; and then, verifying the video data packet based on the video stream authentication information through a receiving end, decrypting the video data packet by using preset key information after the verification is passed to obtain a plurality of randomized data segments, performing derandomization on the randomized data segments by using a derandomization processing algorithm corresponding to the randomization processing algorithm to obtain a plurality of video data segments, and splicing the video data segments into target video data. By adopting the technical means, the encryption transmission is carried out by combining the signature verification of the video data with the data randomization processing, the security of the video data transmission can be improved, the data is prevented from being cracked easily, meanwhile, the video data is prevented from being tampered, the security of the video data transmission is guaranteed, and further, the unnecessary loss caused by the leakage of the privacy of a user is avoided.
Drawings
Fig. 1 is a flowchart of a video data processing method based on video stream authentication according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a video transmission system according to an embodiment of the present application;
fig. 3 is a flowchart of signature data generation at a transmitting end according to an embodiment of the present application;
fig. 4 is a flowchart illustrating a target video data recovery process at a receiving end according to a first embodiment of the present application;
fig. 5 is a schematic structural diagram of a video data processing apparatus based on video stream authentication according to a second embodiment of the present application;
fig. 6 is a schematic structural diagram of an electronic device according to a third embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, specific embodiments of the present application will be described in detail with reference to the accompanying drawings. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting of the application. It should be further noted that, for the convenience of description, only some but not all of the relevant portions of the present application are shown in the drawings. Before discussing exemplary embodiments in more detail, it should be noted that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart may describe the operations (or steps) as a sequential process, many of the operations can be performed in parallel, concurrently or simultaneously. In addition, the order of the operations may be re-arranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figure. The processes may correspond to methods, functions, procedures, subroutines, and the like.
The first embodiment is as follows:
fig. 1 is a flowchart of a video data processing method based on video stream authentication according to an embodiment of the present disclosure, where the video data processing method based on video stream authentication provided in this embodiment may be executed by a video transmission system, the video transmission system may be implemented by software and/or hardware, and the video transmission system may be formed by two or more physical entities or may be formed by one physical entity.
The following description will be made taking a video transmission system as an example of a main body that performs a video data processing method based on video stream authentication. Referring to fig. 1, the video data processing method based on video stream authentication specifically includes:
s110, under the condition that a sending end transmits target video data, digital signing is carried out on the target video data based on scalar dot-product double domains to obtain corresponding signature data, and video stream authentication information of the target video data is manufactured based on the signature data.
The video data processing method based on video stream authentication aims to carry out data signature verification and randomization processing on target video data to be transmitted through a sending end and then carry out encryption transmission, improves the security of video data transmission through combination of multiple protection mechanisms, and avoids the situation that user privacy is leaked to cause unnecessary loss.
Referring to fig. 2, a schematic structural diagram of a video transmission system according to an embodiment of the present application is provided. For a sending end 11 of video data to be transmitted, the video data to be transmitted is defined as target video data. And the target video data is subjected to data signature verification and randomization processing to obtain video stream authentication information and a video data packet containing multiple sections of randomized data segments. By transmitting the video stream authentication information and the video data packet containing the plurality of segments of randomized data segments to the receiving end 12, the receiving end 12 further performs video authentication, derandomization, and decryption processes on the video data packet, thereby restoring the original target video data and safely transmitting the video data.
Specifically, when a sending end needs to transmit a segment of target video data, the sending end first makes video stream authentication information, so that a subsequent receiving end can perform video authentication conveniently. The signature of the double asymmetric algorithm is realized on the basis of scalar point multiplication double-domain Fp/Fp ^2, and the signature value data is embedded into the video protocol frame authentication data area to make video stream authentication information, so that the security of video data transmission is improved, and the video is prevented from being tampered.
And writing version information of the preset key information and identification information of the camera, establishing basic information of the video stream authentication information, and establishing the video stream authentication information by combining the signature data, the digital envelope of the preset key information and the check code.
Referring to fig. 3, the process of digitally signing the target video data based on the scalar dot-product double domain to obtain corresponding signature data includes:
s1101, carrying out SM2 algorithm digital signature on the target video data under the Fp domain by using a signature private key of a camera corresponding to the target video data to obtain a signature value I;
s1102, calculating an SM9 algorithm digital signature on the target video data by using the signature public key of the camera as a signature private key under the Fp ^2 domain to obtain a signature value II;
and S1103, saving the signature value I and the signature value II as the signature data.
When signature data are generated, respectively performing global hash operation and local hash operation on target video data to obtain a hash value I and a hash value II, and performing SM2 algorithm digital signature under an Fp domain on the target video data by using a signature private key of a camera to obtain a signature value I; meanwhile, the signature public key of the camera is used as a signature private key under the Fp ^2 domain to sign the target video data, and the digital signature of the SM9 algorithm is calculated to obtain a signature value II. And further saving the signature value I and the signature value II as signature data of the target video data.
And then adding a digital envelope with preset key information and a check code in the signed data structure to finish the process of making the video stream authentication information. The preset key information is used for transmitting the subsequent encrypted target video data. When the digital envelope is added, the public key data provided by the receiving end is used for encrypting the preset key information to form the digital envelope. And one end of the receiving end reserves corresponding private key data for subsequent decryption of the digital envelope to obtain preset key information and decrypt the video data. Thus, the video stream authentication information is generated.
S120, the target video data are segmented according to a set number of video frames to obtain a plurality of video data segments, randomization processing is performed on each video data segment by using a randomization processing algorithm based on a predefined original randomization seed to obtain a plurality of corresponding randomized data segments, each randomized data segment is packaged and encrypted into a video data packet by using preset key information, and the video data packet and the video stream authentication information are sent to a receiving end.
Further, the transmitting end randomizes the target video data when transmitting the target video data. Once data leakage occurs in a data transmission link of target video data, data content is easily stolen, and the security of data transmission is affected. Therefore, when the transmitting end transmits the target video data, the transmitting end performs randomization processing on the target video data.
The method comprises the steps of dividing target video data into a plurality of video data segments according to the number of video frames of the target video data and the number of video frames of the target video data. The standard data amount of each video data segment is fixed. And for part of target video data which does not meet the standard data amount, independently serving as a video data segment, thereby completing the segmentation of the data.
It should be noted that, in the embodiment of the present application, by segmenting the video data segment, distributed processing of the data can be implemented, so that the data processing efficiency is prevented from being affected by too much single target video data, and meanwhile, randomization of the data is facilitated. And when the target video data is segmented, each video data segment contains mutual redundant common information, namely, mutually overlapped parts exist among all the video data segments, so that when a certain video data segment fails to be transmitted, the redundant common information of other video data segments can be used for restoring, and the problem that the target video data is incomplete when a single video data segment is lost is solved.
Further, based on each video data segment, the embodiment of the present application performs randomization processing on the video data segments one by one. Wherein, the video data segment is randomized by using a randomization algorithm. The randomization algorithm uses a random function, and the return value of the random function directly or indirectly affects the execution flow or execution result of the algorithm. That is, a certain step or steps of the algorithm are under the control of fortune, that is, a certain step or steps of the algorithm in the running process involve a random decision, or a decision thereof depends on a random event. According to the embodiment of the application, various randomization processing algorithms can be adaptively selected according to actual data transmission requirements, and specific randomization processing algorithms are not fixedly limited, which is not described herein.
In the following, an implementation of randomizing video data segments according to the embodiments of the present application is provided. Wherein the video data segments are randomized based on an original randomization seed defined for each of the video data segments. And inputting each original randomized seed into the n-stage linear feedback shift register by defining an n-stage linear feedback shift register so as to calculate the randomized value of each data bit on the video data segment.
Specifically, when video data segments are processed in a randomization mode, the original randomized seeds are used as input samples, the input samples are circularly input into n levels of linear feedback shift registers which are constructed in advance, data bits of the video data segments are randomized one by one on the basis of the n levels of linear feedback shift registers and the input samples, and the input samples are adjusted in an iteration mode.
Before this, it is necessary to pre-define the n-order computation polynomial corresponding to the n-stage linear feedback shift register and pre-define the original randomized seed. In randomizing a video data segment, an original randomizing seed is first input to an n-stage linear feedback shift register as an original input sample of the n-stage linear feedback shift register. In an n-stage linear feedback shift register, at least one specific bit of an original randomized seed is subjected to exclusive-or operation based on an n-order computational polynomial to generate an output bit. It should be noted that, the present application is not limited to the specific value of the original randomized seed and the specific form of the computation polynomial, and may be freely set by the user, and it is only necessary that the order of the computation polynomial is the same as the order of the linear feedback shift register. The highest order of the computational polynomial represents the minimum randomized length.
For example, for a 16-stage linear feedback shift register, the 16-order computational polynomial freely set by the user may be "X16 + X7+ X2+ 1". Of course, the 16 th order computational polynomial may be "X16 + X12+ X6+ X5+ X4", etc. The main purpose of setting the computational polynomial is: the number of bits in the original randomized seed that need to be xored can be determined by calculating the remaining individual exponents of the polynomial, except for the highest exponent. For example, if the computational polynomial is set to "X16 + X7+ X2+ 1", the original randomized seed is "0X 79E 5". After the original randomized seeds are input into each bit in the linear feedback shift register, the data of the 1 st bit, the 3 rd bit and the 8 th bit in the linear feedback shift register are selected, and then exclusive-or operation is carried out on the selected data to obtain an output bit. If the data of the 1 st bit, the 3 rd bit and the 8 th bit are 1, 1 and 1 respectively, after performing exclusive or operation on the three "1", the obtained output bit is "0".
Further, carrying out exclusive or operation on the output bit and a data bit in the video data segment to obtain a random data bit; meanwhile, the original input sample is shifted to the MSB by one bit in the n-stage linear feedback shift register, and the output bit is fed back to the MSB of the original input sample, thereby obtaining a new randomized seed. For example, when the output bit is 0, the bit 0 is exclusive-ored with the data bit to be randomized. If the data bit to be randomized is 1, the result of the exclusive-or operation is 1, i.e., the random data bit is 1. The original input sample is then shifted one bit in the linear feedback shift register to the most significant bit MSB and the output bit 1 is fed back to the least significant bit of the original input sample, resulting in a new randomized seed.
And then, replacing the original randomized seed with a new randomized seed, and repeatedly executing the randomized processing step on new data bits in the video data segment to obtain new random data bits. By analogy, video data are segmented one by one, and data bits on the video data segments are randomized one by one, so that the randomization of the target video data can be completed.
For example, if the video data is segmented into 8 segments, 8 randomization seeds need to be set. And repeating the data randomization processing steps for each video data segment until all data bits are processed, and finishing the data randomization processing. It should be noted that, according to the actual data processing requirement, the calculation polynomial, the number of segments of video data, and the randomization seed used in the randomization process may be adaptively set. Since the data is randomized in the transmission process, even the target video data is stolen, the number of video data segments set by the user, the computational polynomial used in the randomization process and the original randomized seed set by the user cannot be known. Therefore, the original target video data can not be obtained through randomization, so that the data transmission is safer and more reliable, and the situation that the important data content of a user is stolen after the data is stolen is avoided.
It should be noted that, for each video data segment, the same original randomization seed may be used to randomize each of the video data segments. Therefore, the setting of the original randomized seeds can be facilitated, the situation that the original randomized seeds configured correspondingly are too many due to too large splitting amount of the original target video data is avoided, and the data randomization processing efficiency is improved.
Optionally, the transmitting end may also randomize the corresponding video data segment using predefined different original randomization seeds, where the original randomization seeds are predefined for each of the video data segments. It can be understood that, for the case that the number of the video data segments is small, an independent original randomized seed can be adaptively configured for each video data segment, so that the case that the data is easily restored due to the leakage of a single randomized seed can be avoided, and the security of information transmission is improved.
After the randomization processing of the video data segments is completed, the sending end packs and encrypts each randomized data segment generated by the randomization processing into a video data packet by using preset key information. And then, sending the video stream authentication information generated before and the video data packet to a receiving end.
S130, the receiving end verifies the video data packet based on the video stream authentication information, after the verification is passed, the video data packet is decrypted by using preset key information to obtain a plurality of randomized data segments, the randomized data segments are de-randomized by using a de-randomization algorithm corresponding to the randomization algorithm to obtain a plurality of video data segments, and the video data segments are spliced into the target video data.
Referring to fig. 4, the receiving end first performs video verification after receiving the video data packet and the video stream authentication information. The method comprises the steps of reading version information of preset secret key information in a data body of video stream authentication information and identification information of a video source camera to obtain relevant basic information of a video stream source. And then the public key of the camera is used for verifying the signature value I of the SM2 algorithm, and the global identity authentication of the video stream is completed. If the video stream data is complete, the verification is passed, and the video data packet is decrypted; if the video stream data is not complete, the verification fails. Under the condition that the verification fails, the public key of the SM9 algorithm is calculated through the camera identification, the signature value II is verified, the local identity authentication of the video stream is completed, and then the video data packet is decrypted.
The method comprises the steps of performing global hash calculation and local hash calculation on an encrypted video data source, obtaining a hash value I and a hash value II again, performing global signature verification on the hash value I and a signature value I by using an SM2 algorithm public key, performing local signature verification on the hash value II and the signature value II by using a SM9 algorithm public key calculated by using a camera identifier, and completing a double-domain signature verification process.
Further, when the video data packet is decrypted, the digital envelope is decrypted by using the preset private key data, and the preset key information for decrypting the video data packet can be obtained after the decryption is successful. And then, the video data packet is decrypted by using the preset key information to obtain a plurality of randomized data segments. And further carrying out de-randomization processing on the randomized data segments, and restoring to obtain each video data segment.
And performing derandomization processing on each data bit of the randomized data segment based on an n-order computational polynomial corresponding to the n-stage linear feedback shift register. Before the de-randomization process is the inverse operation of the randomization process, the receiving end also needs to configure a corresponding n-level computation polynomial and an original randomization seed for the de-randomization process of the data. For the randomized data segment to be randomized, firstly, a plurality of specific bits of the original randomized seed are subjected to exclusive-or operation based on an n-order computational polynomial set by a user to generate an output bit. The output bit is then exclusive-ored with a corresponding bit in the randomized data segment, i.e., a corresponding data bit in the original data (i.e., the video data segment) is generated. The above operation is circularly performed on each bit in the randomized data segment, so that the original video data segment can be obtained by derandomization.
The original data content can be obtained by performing the derandomization operation on the randomized data segment after the randomization process. Therefore, even if the preset key information is stolen, the original data cannot be obtained through derandomization, and the safety of video data transmission is further improved.
Then, for each video data segment restored by the derandomization processing, each video data segment needs to be merged into the target video data. And splicing all the video data in segments by screening out redundant common information parts to obtain target video data. It can be understood that, since each video data segment packet includes the common information of the redundant portion, when splicing the target video data, the redundant common information needs to be filtered out, and then the target video data is spliced.
Optionally, in the case that the video data segment is missing, the missing video data segment is restored based on the common information contained in each of the currently obtained video data segments. Because the video data segments contain corresponding redundant common information, for the lost video data segments, the common information of the other video data segments can be restored, so that the integrity of data transmission is guaranteed. The frequency of data retransmission is reduced, and the data transmission efficiency is improved.
In one embodiment, the sending end periodically queries a pre-constructed randomized seed directory, selects one randomized seed from the pre-constructed randomized seed directory to update to the original randomized seed, and synchronizes the updated original randomized seed to the receiving end. It can be understood that by periodically updating the original randomized seed, the situation that the original randomized seed is easily cracked, which leads to the disclosure of the randomization processing algorithm, can be avoided. Therefore, the difficulty of stealing data is increased, and the safety of information transmission is improved.
In an embodiment, the sending end updates the preset key information every other set period for encrypted transmission of subsequent target video data. It will be appreciated that long term use of the same key information increases the chance that the key will be compromised. Therefore, the difficulty of key cracking is improved by periodically updating the key information, so that the difficulty of data stealing is increased, and the safety of information transmission is improved.
In the above, when the sending end transmits the target video data, the sending end digitally signs the target video data based on scalar dot-product double-domain to obtain corresponding signature data, and creates video stream authentication information of the target video data based on the signature data; further segmenting target video data according to a set number of video frames to obtain a plurality of video data segments, randomizing each video data segment by using a randomization algorithm based on a predefined original randomization seed to obtain a plurality of corresponding randomized data segments, packaging and encrypting each randomized data segment into a video data packet by using preset key information, and sending the video data packet and video stream authentication information to a receiving end; and then, verifying the video data packet based on the video stream authentication information through a receiving end, decrypting the video data packet by using preset key information after the verification is passed to obtain a plurality of randomized data segments, performing derandomization on the randomized data segments by using a derandomization processing algorithm corresponding to the randomization processing algorithm to obtain a plurality of video data segments, and splicing the video data segments into target video data. By adopting the technical means, the encryption transmission is carried out by combining the signature verification of the video data with the data randomization processing, the security of the video data transmission can be improved, the data is prevented from being cracked easily, meanwhile, the video data is prevented from being tampered, the security of the video data transmission is guaranteed, and further, the unnecessary loss caused by the leakage of the privacy of a user is avoided.
Example two:
based on the foregoing embodiment, fig. 5 is a schematic structural diagram of a video data processing apparatus based on video stream authentication according to a second embodiment of the present application. Referring to fig. 5, the video data processing apparatus based on video stream authentication provided in this embodiment specifically includes: an authentication module 21, a transmission module 22 and a reception module 23.
The authentication module 21 is configured to digitally sign target video data based on scalar dot-product double domains by a sending end under the condition of transmitting the target video data to obtain corresponding signature data, and make video stream authentication information of the target video data based on the signature data;
the sending module 22 is configured to segment the target video data according to a set number of video frames to obtain a plurality of video data segments, randomize each video data segment based on a predefined original randomized seed by using a randomization algorithm to obtain a plurality of corresponding randomized data segments, pack and encrypt each randomized data segment into a video data packet by using preset key information, and send the video data packet and the video stream authentication information to a receiving end;
the receiving module 23 is configured to verify the video data packet based on the video stream authentication information through the receiving end, decrypt the video data packet using preset key information after the verification is passed, obtain a plurality of randomized data segments, de-randomize the randomized data segments using a de-randomization algorithm corresponding to the randomization algorithm, obtain a plurality of video data segments, and splice the video data segments into the target video data.
Specifically, the authentication module 21 is configured to write version information of the preset key information and identification information of the camera, construct basic information of the video stream authentication information, and construct the video stream authentication information by combining the signature data, the digital envelope of the preset key information, and the check code.
Performing SM2 algorithm digital signature on the target video data under the Fp domain by using a signature private key of a camera corresponding to the target video data to obtain a signature value I; using the signature public key of the camera as a signature private key under the Fp ^2 domain to calculate the SM9 algorithm digital signature on the target video data to obtain a signature value II; and saving the signature value I and the signature value II as the signature data.
Specifically, the sending module 22 is configured to take the original randomized seed as an input sample, circularly input the input sample into a pre-constructed n-stage linear feedback shift register, randomize data bits of the video data segment one by one based on the n-stage linear feedback shift register and the input sample, and iteratively adjust the input sample.
Wherein the corresponding segments of video data are randomized using predefined different original randomization seeds, which are predefined for each of the segments of video data.
Specifically, the receiving module 23 is configured to de-randomize each data bit of the randomized data segment based on an n-th order computational polynomial corresponding to the n-stage linear feedback shift register.
In addition, the video data processing device based on video stream authentication also periodically inquires a pre-constructed randomized seed catalog through the sending end, selects one randomized seed from the randomized seeds to update to the original randomized seed, and synchronizes the updated original randomized seed to the receiving end.
In the above, when the sending end transmits the target video data, the sending end digitally signs the target video data based on scalar dot-product double-domain to obtain corresponding signature data, and creates video stream authentication information of the target video data based on the signature data; further segmenting target video data according to a set number of video frames to obtain a plurality of video data segments, randomizing each video data segment by using a randomization algorithm based on a predefined original randomization seed to obtain a plurality of corresponding randomized data segments, packaging and encrypting each randomized data segment into a video data packet by using preset key information, and sending the video data packet and video stream authentication information to a receiving end; and then, verifying the video data packet based on the video stream authentication information through a receiving end, decrypting the video data packet by using preset key information after the verification is passed to obtain a plurality of randomized data segments, performing derandomization on the randomized data segments by using a derandomization processing algorithm corresponding to the randomization processing algorithm to obtain a plurality of video data segments, and splicing the video data segments into target video data. By adopting the technical means, the encryption transmission is carried out by combining the signature verification of the video data with the data randomization processing, the security of the video data transmission can be improved, the data is prevented from being cracked easily, meanwhile, the video data is prevented from being tampered, the security of the video data transmission is guaranteed, and further, the unnecessary loss caused by the leakage of the privacy of a user is avoided.
The video data processing apparatus based on video stream authentication provided in the second embodiment of the present application can be used to execute the video data processing method based on video stream authentication provided in the first embodiment of the present application, and has corresponding functions and beneficial effects.
Example three:
an embodiment of the present application provides an electronic device, and with reference to fig. 6, the electronic device includes: a processor 31, a memory 32, a communication module 33, an input device 34, and an output device 35. The number of processors in the electronic device may be one or more, and the number of memories in the electronic device may be one or more. The processor, memory, communication module, input device, and output device of the electronic device may be connected by a bus or other means.
The memory 32 is a computer readable storage medium, and can be used for storing software programs, computer executable programs, and modules, such as program instructions/modules corresponding to the video data processing method based on video stream authentication according to any embodiment of the present application (for example, an authentication module, a sending module, and a receiving module in a video data processing apparatus based on video stream authentication). The memory can mainly comprise a program storage area and a data storage area, wherein the program storage area can store an operating system and an application program required by at least one function; the storage data area may store data created according to use of the device, and the like. Further, the memory may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some examples, the memory may further include memory remotely located from the processor, which may be connected to the device through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The communication module 33 is used for data transmission.
The processor 31 executes various functional applications and data processing of the device by running software programs, instructions and modules stored in the memory, that is, implements the video data processing method based on video stream authentication described above.
The input device 34 may be used to receive entered numeric or character information and to generate key signal inputs relating to user settings and function controls of the apparatus. The output device 35 may include a display device such as a display screen.
The electronic device provided above can be used to execute the video data processing method based on video stream authentication provided in the first embodiment above, and has corresponding functions and advantages.
Example four:
embodiments of the present application further provide a storage medium containing computer-executable instructions, which when executed by a computer processor, are configured to perform a video data processing method based on video stream authentication, where the video data processing method based on video stream authentication includes: under the condition that a sending end transmits target video data, carrying out digital signature on the target video data based on scalar dot-product double domains to obtain corresponding signature data, and making video stream authentication information of the target video data based on the signature data; segmenting the target video data according to a set number of video frames to obtain a plurality of video data segments, randomizing each video data segment by using a randomization algorithm based on a predefined original randomization seed to obtain a plurality of corresponding randomized data segments, packaging and encrypting each randomized data segment into a video data packet by using preset key information, and sending the video data packet and the video stream authentication information to a receiving end; the receiving end verifies the video data packet based on the video stream authentication information, after the verification is passed, the video data packet is decrypted by using preset key information to obtain a plurality of randomized data segments, the randomized data segments are de-randomized by using a de-randomization algorithm corresponding to the randomization algorithm to obtain a plurality of video data segments, and the video data segments are spliced into the target video data.
Storage medium-any of various types of memory devices or storage devices. The term "storage medium" is intended to include: mounting media such as CD-ROM, floppy disk, or tape devices; computer system memory or random access memory such as DRAM, DDR RAM, SRAM, EDO RAM, Lanbas (Rambus) RAM, etc.; non-volatile memory such as flash memory, magnetic media (e.g., hard disk or optical storage); registers or other similar types of memory elements, etc. The storage medium may also include other types of memory or combinations thereof. In addition, the storage medium may be located in a first computer system in which the program is executed, or may be located in a different second computer system connected to the first computer system through a network (such as the internet). The second computer system may provide program instructions to the first computer for execution. The term "storage medium" may include two or more storage media residing in different locations, e.g., in different computer systems connected by a network. The storage medium may store program instructions (e.g., embodied as a computer program) that are executable by one or more processors.
Of course, the storage medium provided in the embodiments of the present application contains computer-executable instructions, and the computer-executable instructions are not limited to the video data processing method based on video stream authentication described above, and may also perform related operations in the video data processing method based on video stream authentication provided in any embodiment of the present application.
The video data processing apparatus, the storage medium, and the electronic device based on video stream authentication provided in the foregoing embodiments may perform the video data processing method based on video stream authentication provided in any embodiment of the present application, and the technical details not described in detail in the foregoing embodiments may be referred to the video data processing method based on video stream authentication provided in any embodiment of the present application.
The foregoing is considered as illustrative of the preferred embodiments of the invention and the technical principles employed. The present application is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present application has been described in more detail with reference to the above embodiments, the present application is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present application, and the scope of the present application is determined by the scope of the claims.

Claims (10)

1. A video data processing method based on video stream authentication is characterized by comprising the following steps:
under the condition that a sending end transmits target video data, carrying out digital signature on the target video data based on scalar dot-product double domains to obtain corresponding signature data, and making video stream authentication information of the target video data based on the signature data;
segmenting the target video data according to a set number of video frames to obtain a plurality of video data segments, randomizing each video data segment by using a randomization algorithm based on a predefined original randomization seed to obtain a plurality of corresponding randomized data segments, packaging and encrypting each randomized data segment into a video data packet by using preset key information, and sending the video data packet and the video stream authentication information to a receiving end;
the receiving end verifies the video data packet based on the video stream authentication information, after the verification is passed, the video data packet is decrypted by using preset key information to obtain a plurality of randomized data segments, the randomized data segments are de-randomized by using a de-randomization algorithm corresponding to the randomization algorithm to obtain a plurality of video data segments, and the video data segments are spliced into the target video data.
2. The video data processing method based on video stream authentication according to claim 1, wherein said digitally signing the target video data based on scalar dot-product double domain to obtain corresponding signature data comprises:
carrying out SM2 algorithm digital signature on the target video data under the Fp domain by using a signature private key of a camera corresponding to the target video data to obtain a signature value I;
using the signature public key of the camera as a signature private key under the Fp ^2 domain to calculate the SM9 algorithm digital signature on the target video data to obtain a signature value II;
and saving the signature value I and the signature value II as the signature data.
3. The video data processing method according to claim 2, wherein said preparing video stream authentication information of the target video data based on the signature data comprises:
and writing the version information of the preset key information and the identification information of the camera, establishing the basic information of the video stream authentication information, and combining the signature data, the digital envelope of the preset key information and the check code to establish the video stream authentication information.
4. The video data processing method based on video stream authentication according to claim 1, wherein said randomizing each of said video data segments based on a predefined original randomization seed using a randomization algorithm, resulting in a corresponding plurality of randomized data segments, comprises:
and taking the original randomized seed as an input sample, circularly inputting the input sample into a pre-constructed n-stage linear feedback shift register, randomizing data bits of the video data segment one by one based on the n-stage linear feedback shift register and the input sample, and iteratively adjusting the input sample.
5. The video data processing method according to claim 4, wherein said de-randomizing said randomized data segment using a de-randomization algorithm corresponding to said randomization algorithm comprises:
and performing derandomization processing on each data bit of the randomized data segment based on an n-order computational polynomial corresponding to the n-stage linear feedback shift register.
6. The video data processing method based on video stream authentication according to claim 1, wherein said randomizing each of said video data segments based on a predefined original randomization seed using a randomization algorithm, further comprises:
randomizing the corresponding video data segment using a predefined different original randomization seed, which original randomization seed is predefined for each of the video data segments.
7. The video data processing method based on video stream authentication according to claim 1, further comprising:
the sending end periodically inquires a pre-constructed randomized seed catalog, selects one randomized seed from the seed catalog to update to the original randomized seed, and synchronizes the updated original randomized seed to the receiving end.
8. A video data processing apparatus based on video stream authentication, comprising:
the authentication module is configured to digitally sign the target video data based on scalar dot-product double domains under the condition that the target video data is transmitted by the transmitting end to obtain corresponding signature data, and video stream authentication information of the target video data is made based on the signature data;
the sending module is configured to segment the target video data according to a set number of video frames to obtain a plurality of video data segments, randomize each video data segment by using a randomization algorithm based on a predefined original randomization seed to obtain a plurality of corresponding randomized data segments, pack and encrypt each randomized data segment into a video data packet by using preset key information, and send the video data packet and the video stream authentication information to a receiving end;
and the receiving module is configured to verify the video data packet through the receiving end based on the video stream authentication information, decrypt the video data packet by using preset key information after the verification is passed to obtain a plurality of randomized data segments, derandomize the randomized data segments by using a derandomization processing algorithm corresponding to the randomization processing algorithm to obtain a plurality of video data segments, and splice the video data segments into the target video data.
9. An electronic device, comprising:
a memory and one or more processors;
the memory for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement the video data processing method based on video stream authentication according to any one of claims 1-7.
10. A storage medium containing computer-executable instructions for performing the video stream authentication-based video data processing method according to any one of claims 1 to 7 when executed by a computer processor.
CN202210546274.5A 2022-05-20 2022-05-20 Video data processing method and device based on video stream authentication Pending CN114640867A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210546274.5A CN114640867A (en) 2022-05-20 2022-05-20 Video data processing method and device based on video stream authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210546274.5A CN114640867A (en) 2022-05-20 2022-05-20 Video data processing method and device based on video stream authentication

Publications (1)

Publication Number Publication Date
CN114640867A true CN114640867A (en) 2022-06-17

Family

ID=81953053

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210546274.5A Pending CN114640867A (en) 2022-05-20 2022-05-20 Video data processing method and device based on video stream authentication

Country Status (1)

Country Link
CN (1) CN114640867A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114793184A (en) * 2022-06-22 2022-07-26 广州万协通信息技术有限公司 Security chip communication method and device based on third-party key management node
CN115086718A (en) * 2022-07-19 2022-09-20 广州万协通信息技术有限公司 Video stream encryption method and device
CN115277025A (en) * 2022-08-26 2022-11-01 广州万协通信息技术有限公司 Device authentication method for security chip, security chip device, and medium

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6851055B1 (en) * 2000-09-30 2005-02-01 Keen Personal Technologies, Inc. Digital video recorder for encrypting/decrypting video programs in segments to facilitate trick play features
CN1672421A (en) * 2002-07-31 2005-09-21 皇家飞利浦电子股份有限公司 Method and apparatus for performing multiple description motion compensation using hybrid predictive codes
CN101119319A (en) * 2007-09-19 2008-02-06 腾讯科技(深圳)有限公司 Method, transmitting/receiving device and system against lost packet in data transmission process
CN104063672A (en) * 2013-03-23 2014-09-24 北京万协通信息技术有限公司 Data security storage method
CN104410927A (en) * 2014-11-27 2015-03-11 江苏辰汉电子科技有限公司 Low-redundancy compensation method of video transmission packet loss in erasure channel
CN104836656A (en) * 2015-05-08 2015-08-12 厦门大学 Method for storing and transmitting video file
JP2015148919A (en) * 2014-02-06 2015-08-20 日本電気株式会社 Storage system
CN105103554A (en) * 2013-03-28 2015-11-25 华为技术有限公司 Method for protecting sequence of video frames against packet loss
CN106488243A (en) * 2016-11-03 2017-03-08 河海大学 A kind of many description screen content method for video coding
CN108933670A (en) * 2018-10-18 2018-12-04 北京云测信息技术有限公司 A digital signature method, device, mobile device and storage medium
CN110113551A (en) * 2019-06-19 2019-08-09 江苏医药职业学院 A kind of intellectual medical image audio-video recording system and method
CN111510745A (en) * 2020-03-27 2020-08-07 曹新 Internet video data encryption transmission method
CN111866547A (en) * 2020-07-30 2020-10-30 北京万协通信息技术有限公司 Novel video tamper-proofing method
CN112954405A (en) * 2021-01-27 2021-06-11 西安万像电子科技有限公司 Data packet recovery method, device and system
CN113254966A (en) * 2021-06-04 2021-08-13 王兆河 Dynamic encryption method and ciphertext structure of medical digital image information
CN113810778A (en) * 2021-10-21 2021-12-17 深圳Tcl新技术有限公司 Surveillance video processing method, device, storage medium and electronic device

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6851055B1 (en) * 2000-09-30 2005-02-01 Keen Personal Technologies, Inc. Digital video recorder for encrypting/decrypting video programs in segments to facilitate trick play features
CN1672421A (en) * 2002-07-31 2005-09-21 皇家飞利浦电子股份有限公司 Method and apparatus for performing multiple description motion compensation using hybrid predictive codes
CN101119319A (en) * 2007-09-19 2008-02-06 腾讯科技(深圳)有限公司 Method, transmitting/receiving device and system against lost packet in data transmission process
CN104063672A (en) * 2013-03-23 2014-09-24 北京万协通信息技术有限公司 Data security storage method
CN105103554A (en) * 2013-03-28 2015-11-25 华为技术有限公司 Method for protecting sequence of video frames against packet loss
JP2015148919A (en) * 2014-02-06 2015-08-20 日本電気株式会社 Storage system
CN104410927A (en) * 2014-11-27 2015-03-11 江苏辰汉电子科技有限公司 Low-redundancy compensation method of video transmission packet loss in erasure channel
CN104836656A (en) * 2015-05-08 2015-08-12 厦门大学 Method for storing and transmitting video file
CN106488243A (en) * 2016-11-03 2017-03-08 河海大学 A kind of many description screen content method for video coding
CN108933670A (en) * 2018-10-18 2018-12-04 北京云测信息技术有限公司 A digital signature method, device, mobile device and storage medium
CN110113551A (en) * 2019-06-19 2019-08-09 江苏医药职业学院 A kind of intellectual medical image audio-video recording system and method
CN111510745A (en) * 2020-03-27 2020-08-07 曹新 Internet video data encryption transmission method
CN111866547A (en) * 2020-07-30 2020-10-30 北京万协通信息技术有限公司 Novel video tamper-proofing method
CN112954405A (en) * 2021-01-27 2021-06-11 西安万像电子科技有限公司 Data packet recovery method, device and system
CN113254966A (en) * 2021-06-04 2021-08-13 王兆河 Dynamic encryption method and ciphertext structure of medical digital image information
CN113810778A (en) * 2021-10-21 2021-12-17 深圳Tcl新技术有限公司 Surveillance video processing method, device, storage medium and electronic device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114793184A (en) * 2022-06-22 2022-07-26 广州万协通信息技术有限公司 Security chip communication method and device based on third-party key management node
CN114793184B (en) * 2022-06-22 2022-11-08 广州万协通信息技术有限公司 Security chip communication method and device based on third-party key management node
CN115086718A (en) * 2022-07-19 2022-09-20 广州万协通信息技术有限公司 Video stream encryption method and device
CN115277025A (en) * 2022-08-26 2022-11-01 广州万协通信息技术有限公司 Device authentication method for security chip, security chip device, and medium
CN115277025B (en) * 2022-08-26 2023-01-06 广州万协通信息技术有限公司 Device authentication method for security chip, security chip apparatus, device, and medium

Similar Documents

Publication Publication Date Title
CN110519260B (en) Information processing method and information processing device
JP7454564B2 (en) Methods, user devices, management devices, storage media and computer program products for key management
US10880100B2 (en) Apparatus and method for certificate enrollment
US20170063853A1 (en) Data cipher and decipher based on device and data authentication
CN114640867A (en) Video data processing method and device based on video stream authentication
US20220407691A1 (en) Data protection and recovery systems and methods
US9917695B2 (en) Authenticated encryption method using working blocks
US20220216999A1 (en) Blockchain system for supporting change of plain text data included in transaction
JP2015104119A (en) Block encryption method and block decryption method including integrity verification
CN114553557B (en) Key calling method, device, computer equipment and storage medium
CN107707562B (en) A method and device for asymmetric dynamic token encryption and decryption algorithm
KR20220000537A (en) System and method for transmitting and receiving data based on vehicle network
CN114793184B (en) Security chip communication method and device based on third-party key management node
CN114650188A (en) Data secure transmission method and device based on proxy node
CN114710693A (en) Video stream distributed transmission method and device
US20240056295A1 (en) Verifiable remote resource management for cryptographic devices
WO2018054144A1 (en) Method, apparatus, device and system for dynamically generating symmetric key
US12328397B2 (en) Memory processing apparatus, memory verification apparatus, memory updating apparatus, memory protection system, method, and computer readable medium
CN119814441B (en) Data processing method, hardware security module, client, storage medium and computer program product
CN115426195B (en) Data transmission method, device, computer equipment and storage medium
CN120321038B (en) Authentication method, apparatus, computer device, readable storage medium, and program product
KR20150101896A (en) System and method for data sharing of intercloud enviroment
CN116599771B (en) Data hierarchical protection transmission method and device, storage medium and terminal
CN114900292B (en) Pre-computing system, pre-computing data processing method and device
CN116015620B (en) Satellite image data encryption and decryption method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20220617

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载