IntelligentSecurityAPI(GeneralApplication)DeveloperGuideLegalInformation©2019HangzhouHikvisionDigitalTechnologyCo.,Ltd.Allrightsreserved.ThisDocument(hereinafterreferredtobe“theDocument”)isthepropertyofHangzhouHikvisionDigitalTechnologyCo.,Ltd.oritsaffiliates(hereinafterreferredtoas“Hikvision”),anditcannotbereproduced,changed,translated,ordistributed,partiallyorwholly,byanymeans,withoutthepriorwrittenpermissionofHikvision.Unlessotherwiseexpresslystatedherein,Hikvisiondoesnotmakeanywarranties,guaranteesorrepresentations,expressorimplied,regardingtotheDocument,anyinformationcontainedherein.LEGALDISCLAIMERTOTHEMAXIMUMEXTENTPERMITTEDBYAPPLICABLELAW,THEDOCUMENTISPROVIDED"ASIS"AND“WITHALLFAULTSANDERRORS”.HIKVISIONMAKESNOREPRESENTATIONSORWARRANTIES,EXPRESSORIMPLIED,INCLUDINGBUTNOTLIMITEDTO,WARRANTIESOFMERCHANTABILITY,FITNESSFORAPARTICULARPURPOSEORNON-INFRINGEMENT.INNOEVENTWILLHIKVISIONBELIABLEFORANYSPECIAL,CONSEQUENTIAL,INCIDENTAL,ORINDIRECTDAMAGES,INCLUDING,AMONGOTHERS,DAMAGESFORLOSSOFBUSINESSPROFITS,BUSINESSINTERRUPTIONORLOSSOFDATA,CORRUPTIONOFSYSTEMS,ORLOSSOFDOCUMENTATION,WHETHERBASEDONBREACHOFCONTRACT,TORT(INCLUDINGNEGLIGENCE),OROTHERWISE,INCONNECTIONWITHTHEUSEOFTHEDOCUMENT,EVENIFHIKVISIONHASBEENADVISEDOFTHEPOSSIBILITYOFSUCHDAMAGESORLOSS.IntelligentSecurityAPI(GeneralApplication)DeveloperGuideiContentsChapter1Overview....................................................................................................................11.1Introduction...........................................................................................................................11.2UpdateHistory.......................................................................................................................2Chapter2Protocol....................................................................................................................252.1OperationMethod...............................................................................................................252.2URLFormat..........................................................................................................................282.3MessageFormat..................................................................................................................292.4Others..................................................................................................................................31Chapter3Security....................................................................................................................323.1Authentication.....................................................................................................................323.2UserPermission...................................................................................................................333.3Encryption............................................................................................................................333.3.1EncryptStream...........................................................................................................353.3.2EncryptSensitiveInformation.....................................................................................373.4SecurityService.....................................................................................................................