IntelligentSecurityAPI(GeneralApplication)DeveloperGuideIntelligentSecurityAPI(GeneralApplication)DeveloperGuideiLegalInformation©2019HangzhouHikvisionDigitalTechnologyCo.,Ltd.Allrightsreserved.ThisDocument(hereinafterreferredtobe“theDocument”)isthepropertyofHangzhouHikvisionDigitalTechnologyCo.,Ltd.oritsaffiliates(hereinafterreferredtoas“Hikvision”),anditcannotbereproduced,changed,translated,ordistributed,partiallyorwholly,byanymeans,withoutthepriorwrittenpermissionofHikvision.Unlessotherwiseexpresslystatedherein,Hikvisiondoesnotmakeanywarranties,guaranteesorrepresentations,expressorimplied,regardingtotheDocument,anyinformationcontainedherein.LEGALDISCLAIMERTOTHEMAXIMUMEXTENTPERMITTEDBYAPPLICABLELAW,THEDOCUMENTISPROVIDED"ASIS"AND“WITHALLFAULTSANDERRORS”.HIKVISIONMAKESNOREPRESENTATIONSORWARRANTIES,EXPRESSORIMPLIED,INCLUDINGBUTNOTLIMITEDTO,WARRANTIESOFMERCHANTABILITY,FITNESSFORAPARTICULARPURPOSEORNON-INFRINGEMENT.INNOEVENTWILLHIKVISIONBELIABLEFORANYSPECIAL,CONSEQUENTIAL,INCIDENTAL,ORINDIRECTDAMAGES,INCLUDING,AMONGOTHERS,DAMAGESFORLOSSOFBUSINESSPROFITS,BUSINESSINTERRUPTIONORLOSSOFDATA,CORRUPTIONOFSYSTEMS,ORLOSSOFDOCUMENTATION,WHETHERBASEDONBREACHOFCONTRACT,TORT(INCLUDINGNEGLIGENCE),OROTHERWISE,INCONNECTIONWITHTHEUSEOFTHEDOCUMENT,EVENIFHIKVISIONHASBEENADVISEDOFTHEPOSSIBILITYOFSUCHDAMAGESORLOSS.IntelligentSecurityAPI(GeneralApplication)DeveloperGuideiiContentsChapter1Overview...............................................................................................................................11.1Introduction..............................................................................................................................11.2UpdateHistory...........................................................................................................................2Chapter2Protocol..............................................................................................................................252.1OperationMethod..................................................................................................................252.2URLFormat..............................................................................................................................282.3MessageFormat......................................................................................................................292.4Others......................................................................................................................................31Chapter3Security...............................................................................................................................323.1Authentication.........................................................................................................................323.2UserPermission.......................................................................................................................333.3Encryption...............................................................................................................................333.3.1EncryptStream...............................................................................................................353.3.2EncryptSensitiveInformation.........................................................................................373...