An information interaction method and a cross-scene tracking method of a monitoring terminal

A monitoring terminal and information interaction technology, which is applied in the field of data interaction, can solve the problems of information delay and packet loss, and cannot guarantee that information will not be maliciously tampered with, so as to reduce the difficulty of sharing and reduce the effect of information delay and packet loss

Active Publication Date: 2019-06-07
SHENZHEN INFINOVA TECH LTD
View PDF6 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the embodiment of the present application provides an information interaction method for monitoring terminals, a cross-scene tracking method, a device, and a terminal device to solve the problem of informa

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An information interaction method and a cross-scene tracking method of a monitoring terminal
  • An information interaction method and a cross-scene tracking method of a monitoring terminal
  • An information interaction method and a cross-scene tracking method of a monitoring terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] The following describes a monitoring terminal information interaction method provided by Embodiment 1 of the present application. Please refer to the attached figure 1 The information interaction method of the monitoring terminal in Embodiment 1 of the present application includes:

[0037] Step S101. Obtain first data, and perform hash calculation on the first data to obtain a first hash value;

[0038] The network topology of the traditional monitoring equipment of the Internet of Things is a centralized network topology. There is no direct information exchange between monitoring equipment. The monitoring equipment must transfer information through the upper network center, which is prone to information delay and packet loss. Monitoring The access between terminals is extremely difficult, which hinders the sharing of interconnection and intercommunication information between monitoring terminals, reduces resource utilization, and because information needs to penetrate...

Embodiment 2

[0059] A cross-scene tracking method provided in Embodiment 2 of the present application is described below, please refer to the attached figure 2 The cross-scene tracking method in Embodiment 2 of the present application is based on the monitoring terminal information interaction method described in Embodiment 1, and the cross-scene tracking method includes:

[0060] Step S201, receiving a first tracking instruction, and collecting tracking data of a tracking target according to the first tracking instruction;

[0061] The Internet of Things network topology of traditional monitoring equipment is a centralized network topology, with large information delays, and it is difficult to quickly coordinate various monitoring equipment to track the same target across scenarios.

[0062] When each monitoring device uses the decentralized network topology of the blockchain network for information interaction, each monitoring device can quickly perform information interaction and colla...

Embodiment 3

[0075] Embodiment 3 of the present application provides an information exchange device for a monitoring terminal. For the convenience of description, only the parts related to the present application are shown, such as image 3 As shown, the information interaction device of the monitoring terminal includes,

[0076] The first hash module 301 is configured to acquire first data, and perform hash calculation on the first data to obtain a first hash value;

[0077] A data signature module 302, configured to integrate the first data and the first hash value into a first data packet, use a first private key to encrypt the first data packet, and encrypt the encrypted first data The package is broadcast to the blockchain.

[0078] Further, the device also includes:

[0079] A data verification module, configured to receive an encrypted second data packet broadcast to the block chain, and use a second public key to decrypt the encrypted second data packet to obtain a decrypted seco...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is applicable to the technical field of data interaction, and provides an information interaction method of a monitoring terminal, a cross-scene tracking method and device and terminal equipment, and the information interaction method of the monitoring terminal comprises the steps: obtaining first data, and carrying out Hash calculation on the first data to obtain a first Hash value;And integrating the first data and the first hash value into a first data packet, encrypting the first data packet by using a first private key, and broadcasting the encrypted first data packet to ablock chain. According to the method, the problems that information delay packet loss easily occurs and information cannot be maliciously tampered in the transmission process when an existing monitoring terminal performs information interaction can be solved.

Description

technical field [0001] The present application belongs to the technical field of data interaction, and in particular relates to an information interaction method of a monitoring terminal, a cross-scene tracking method, a device, and a terminal device. Background technique [0002] With the construction and development of Internet of Things projects such as smart cities, many monitoring terminals are distributed in cities, and these monitoring terminals can monitor various information in the city. [0003] At present, these monitoring terminals use a centralized network topology to build the Internet of Things. Different monitoring terminals need to be transferred through the upper-layer network center. With the increase in the number of monitoring terminals, the network topology becomes more and more complicated. Information sharing and transmission between networks often needs to penetrate several layers of networks, which is prone to information delay and packet loss, and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/06H04L29/08
Inventor 邓小铭
Owner SHENZHEN INFINOVA TECH LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products