CN106789999B - Method and device for tracking video source - Google Patents
Method and device for tracking video source Download PDFInfo
- Publication number
- CN106789999B CN106789999B CN201611141809.1A CN201611141809A CN106789999B CN 106789999 B CN106789999 B CN 106789999B CN 201611141809 A CN201611141809 A CN 201611141809A CN 106789999 B CN106789999 B CN 106789999B
- Authority
- CN
- China
- Prior art keywords
- video source
- equipment
- video
- monitoring
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/146—Tracing the source of attacks
Abstract
The application provides a method and a device for tracking a video source, which are applied to access equipment, wherein the access equipment is used for accessing monitoring equipment into a network, and the method comprises the following steps: adding an equipment identifier corresponding to the monitoring equipment in a registration message sent by the monitoring equipment, forwarding the registration message added with the equipment identifier to a video management server, and issuing an equipment identifier corresponding to a video source to be forwarded or decoded to network equipment by the video management server; and the network equipment judges whether to forward or decode the video source according to the received equipment identifier in the video source and the equipment identifier corresponding to the video source to be forwarded or decoded, which is issued by the video management server. The method and the device for judging the legality and the authenticity of the video source judge the legality and the authenticity of the video source according to the equipment identification, and reduce the damage of an illegal video source to a network.
Description
Technical Field
The present application relates to the field of video surveillance, and in particular, to a method and an apparatus for tracking a video source.
Background
At present, authentication or end-to-end encryption and decryption methods are mostly adopted for a data source of a monitoring camera to solve the problem of data source security, but the performance overhead is very high, and the method cannot be widely popularized with low cost.
On the other hand, once there are many attacks or spam messages in an IP (Internet Protocol, Protocol for interconnection between networks) bearer network (e.g. video surveillance system), it is difficult to trace and locate the source of these attacks or spam messages only by using the IP or MAC (media access Control) address of these attacks or spam messages, because the source IP address changes during network transmission (such as NAT technology), and when the network transmission crosses over a two-layer network, the source MAC address is also modified. The sources of the attack or spam messages cannot be positioned, and the attack or spam messages cannot be cleaned, so that more and more attack and spam messages in the IP bearer network are generated.
Currently, for attack or spam messages, network administrators rely on source IP addresses for tracing. If the source IP Address is replaced on the NAT (Network Address Translation) device, the administrator of the NAT device is required to cooperate with the NAT device to check the mapping relationship corresponding to the IP Address, find the IP Address before the IP Address is transformed, and then search again until the originator of the attack or spam message is found. The source IP address tracing mode is poor in universality and high in cost, and if an attack or garbage message passes through a plurality of NAT devices, managers of all the NAT devices need to be coordinated to search, so that time and labor are wasted.
Disclosure of Invention
In view of this, the present application provides a method and an apparatus for tracking a video source, so as to solve the problem in the prior art that the source IP address tracing attack and the source of the spam packet have poor universality.
Specifically, the method is realized through the following technical scheme:
according to a first aspect of the present application, there is provided a method for tracking a video source, which is applied to an access device for accessing a monitoring device to a network, the method including:
adding an equipment identifier corresponding to the monitoring equipment in a registration message sent by the monitoring equipment, forwarding the registration message added with the equipment identifier to a video management server, and issuing an equipment identifier corresponding to a video source to be forwarded or decoded to network equipment by the video management server;
and the network equipment judges whether to forward or decode the video source according to the received equipment identifier in the video source and the equipment identifier corresponding to the video source to be forwarded or decoded, which is issued by the video management server.
Optionally, when the network device is a streaming media server, after receiving a video source, the streaming media server determines whether a device identifier in the video source is consistent with a device identifier corresponding to the video source to be forwarded, and if so, the streaming media server forwards the video source; otherwise, the streaming media server discards the video source.
Optionally, when the network device is a client, after receiving a video source, the client determines whether a device identifier in the video source is consistent with a device identifier corresponding to the video source to be decoded, and if so, the client decodes the video source; otherwise, the client discards the video source.
Optionally, the method further comprises:
and receiving an ARP request sent by the monitoring equipment to obtain the MAC address of the monitoring equipment, wherein the equipment identifier is the MAC address of the monitoring equipment.
Optionally, the registration message carries the MAC address of the monitoring device, and the video management server correspondingly stores the MAC address of the monitoring device and the device identifier corresponding to the monitoring device, and issues the MAC address and the device identifier of the monitoring device to which the video source to be forwarded or decoded belongs to the network device.
According to a second aspect of the present application, there is provided an apparatus for tracking a video source, which is applied to an access device for accessing a monitoring device to a network, the apparatus including:
the first processing module is used for adding an equipment identifier corresponding to the monitoring equipment in a registration message sent by the monitoring equipment, forwarding the registration message added with the equipment identifier to a video management server, and issuing the equipment identifier corresponding to a video source to be forwarded or decoded to network equipment by the video management server;
and the second processing module is used for adding the equipment identifier corresponding to the monitoring equipment in the video source sent by the monitoring equipment, forwarding the video source added with the equipment identifier to the network equipment, and judging whether to forward or decode the video source by the network equipment according to the equipment identifier in the received video source and the equipment identifier corresponding to the video source to be forwarded or decoded, which is issued by the video management server.
Optionally, when the network device is a streaming media server, after receiving a video source, the streaming media server determines whether a device identifier in the video source is consistent with a device identifier corresponding to the video source to be forwarded, and if so, the streaming media server forwards the video source; otherwise, the streaming media server discards the video source.
Optionally, when the network device is a client, after receiving a video source, the client determines whether a device identifier in the video source is consistent with a device identifier corresponding to the video source to be decoded, and if so, the client decodes the video source; otherwise, the client discards the video source.
Optionally, the apparatus further comprises:
and the learning module is used for receiving the ARP request sent by the monitoring equipment and obtaining the MAC address of the monitoring equipment, wherein the equipment identification is the MAC address of the monitoring equipment.
Optionally, the registration message carries the MAC address of the monitoring device, and the video management server correspondingly stores the MAC address of the monitoring device and the device identifier corresponding to the monitoring device, and issues the MAC address and the device identifier of the monitoring device to which the video source to be forwarded or decoded belongs to the network device.
The beneficial effect of this application: through in the access equipment who inserts supervisory equipment, put into the equipment sign that this supervisory equipment corresponds to the video source that supervisory equipment sent for the video source reaches IP carrier net or rear end (for example network equipment such as streaming media server or customer end), all can track according to this equipment sign and trace to the source, thereby judge the legitimacy and the authenticity of this video source, directly clear up the processing to attacking or rubbish suspect video source, can furthest reduce the injury that causes the network.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application.
Fig. 1 is a schematic diagram of a networking for tracking a video source according to an embodiment of the present disclosure
FIG. 2 is a flowchart of a method for tracking a video source according to an embodiment of the present application;
FIG. 3 is a schematic diagram illustrating a flow of a networking signal for tracking a video source according to an embodiment of the present application;
fig. 4 is a schematic diagram of adding a device identifier according to an embodiment of the present application;
FIG. 5 is a schematic diagram illustrating a flow of a networking signal for tracking a video source according to an embodiment of the present application;
FIG. 6 is a schematic structural diagram of an apparatus for tracking a video source according to an embodiment of the present disclosure;
fig. 7 is a schematic structural diagram of another apparatus for tracking a video source according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims. In addition, the features in the embodiments and the examples described below may be combined with each other without conflict.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present application. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
Referring to fig. 1, the networking of the method and apparatus for tracking a video source provided by this embodiment includes a monitoring device, an access device, a video management server, a streaming media server, and a client. The access device is used for accessing the monitoring device to a network.
Alternatively, the monitoring device is a Camera such as an IPC (Internet Protocol Camera).
The access device may be an NVR (Network Video Recorder) or an access switch. When the access device is an NVR, the NVR is a device that includes multiple ethernet interfaces and can replace an access switch.
Referring to fig. 2, the method for tracking a video source provided in this embodiment is applied to an access device, and the method may include:
s101: and adding an equipment identifier corresponding to the monitoring equipment in the registration message sent by the monitoring equipment, forwarding the registration message added with the equipment identifier to a video management server, and issuing the equipment identifier corresponding to the video source to be forwarded or decoded to the network equipment by the video management server.
In this embodiment, the registration message carries the MAC address of the monitoring device, and the video management server correspondingly stores the MAC address of the monitoring device and the device identifier corresponding to the monitoring device, and issues the MAC address and the device identifier of the monitoring device to which the video source to be forwarded or decoded belongs to the network device.
Specifically, referring to fig. 3, when the monitoring device registers with the video management server, the registration packet carrying the MAC address of the monitoring device itself is forwarded to the video management server through the access device.
The registration message may be transmitted based on GB/T-28181 or ONVIF (Open Network video interface Forum).
Before forwarding the registration message to the video management server, the access device adds a device identifier corresponding to the monitoring device that sent the registration message to the registration message.
The protocol type of the registration message transmission can be selected according to the requirement.
In this embodiment, the registration packet is transmitted through a TCP (Transmission Control Protocol) Protocol or a UDP (User Datagram Protocol), that is, the registration packet is a TCP packet or a UDP packet.
After receiving the registration message sent by the monitoring device, the access device adds the device identifier corresponding to the monitoring device to the option field of the TCP or UDP message, so as to prevent the device identifier in the registration message from being tampered during transmission.
Because the source IP address and the destination IP address of the TCP packet and the UDP packet may be changed during transmission, the source port number and the destination port number may also be changed. In addition, in the definition of the header field of the TCP/UDP protocol packet, except the "option" field, other fields have related definitions and uses, and cannot be changed at will, so the "option" field of the TCP packet or the UDP packet is selected in this embodiment, and the device identifier is inserted into the "option" field to uniquely mark the registration packet, so that the device identifier in the registration packet can be prevented from being tampered in the transmission process, and the universality is strong.
The device identifier may be an MAC address of the monitoring device itself or a specific identifier, and the specific identifier may be a device ID (identification, identity number), a unique character string encoded by an administrator in a unified manner, and the like.
As shown in fig. 4, in order to add the corresponding device identifier to the TCP packet in the registration packet, the device identifier corresponding to the monitoring device is added to the "option" field of the TCP packet.
In this embodiment, the device identifier is an MAC address of the monitoring device itself, and the access device needs to acquire the MAC address corresponding to the monitoring device connected to the physical interface of the access device before adding the MAC address corresponding to the monitoring device to the registration packet.
Optionally, the access device receives an Address Resolution Protocol (ARP) request sent by the monitoring device, and obtains an MAC Address of the monitoring device.
After the monitoring equipment is powered on and started, an ARP request carrying a gateway or a destination IP address of the monitoring equipment is sent, and after the ARP request reaches the access equipment, the access equipment learns the MAC address of the monitoring equipment on a physical interface receiving the ARP request.
In addition, the interactive transmission mode between the Network device and the video Management server in the IP bearer Network may be set as required, for example, the Network device and the video Management server may communicate based on an SNMP (Simple Network Management Protocol) Protocol.
S102: and the network equipment judges whether to forward or decode the video source according to the received equipment identifier in the video source and the equipment identifier corresponding to the video source to be forwarded or decoded, which is issued by the video management server.
The video source is transmitted through a TCP protocol or a UDP protocol, that is, the data type of the video source in this embodiment is a TCP message or a UDP message.
In this embodiment, a physical interface of the access device performs additional processing on a received video source (the video source is transmitted in a protocol manner such as a TCP or UDP packet). For example, referring to fig. 4 again, the MAC address corresponding to the monitoring device connected under the physical interface is added to the "option" field of the TCP packet.
In step S102, when the network device is a streaming media server, after receiving a video source, the streaming media server determines whether a device identifier in the video source is consistent with a device identifier corresponding to the video source to be forwarded, and if so, the streaming media server forwards the video source; otherwise, the streaming media server discards the video source.
When the network equipment is a client, after the client receives a video source, judging whether an equipment identifier in the video source is consistent with an equipment identifier corresponding to the video source to be decoded, if so, decoding the video source by the client; otherwise, the client discards the video source.
In one embodiment, the device identification is the MAC address of the monitoring device itself. Referring to fig. 4, a client requests a live stream (i.e., a video source) of a certain IPC from a video management server, the video management server informs the client of a MAC address corresponding to the IPC of the live stream to be requested, and the video management server also informs a streaming media server of a MAC address in the live stream to be forwarded (i.e., a MAC address corresponding to the IPC of the live stream to be requested).
Referring to fig. 5, when receiving a live stream sent by IPC, the streaming media server needs to check the MAC address of the "option" field of the TCP or UDP packet in the live stream, and if the MAC address is consistent with the MAC address corresponding to the to-be-requested live stream IPC notified by the video management server, the streaming media server duplicates and distributes the live stream to the client; if the live stream is inconsistent with the live stream, the streaming media server discards (for example, deletes) the live stream, that is, the live stream is not forwarded to the client, so that the security is ensured, and the impact of the illegal suspicious live stream on the IP bearer network is prevented.
After receiving the live stream, the client also needs to check the MAC address of the option field of the TCP or UDP message in the live stream, if the MAC address is consistent with the MAC address corresponding to the live stream to be forwarded and informed by the video management server, the client trusts the live stream and decodes the received live stream; if the live stream is inconsistent with the live stream, the client discards (for example, deletes) the received live stream, so as to ensure the security.
For the illegal and suspicious live streams, the streaming media server and the client can discard the illegal and suspicious live streams after checking the specific identification (for example, the MAC address of the 'option' field of the TCP or UDP message) in the TCP or UDP message, so that the live streams can be prevented from being tampered in the transmission process, and the impact of the illegal and suspicious live streams on the IP bearer network is reduced.
If the network equipment in the IP bearing network receives the suspicious video source, the network equipment can directly check the MAC address in the option field of the TCP or UDP message in the suspicious video source, and then the monitoring equipment which sends the suspicious video source can be obtained, so that the dangerous case can be easily eliminated and processed, meanwhile, the monitoring equipment to which the video source in the IP bearing network belongs can be uniquely confirmed without an information protocol, the tracing is more convenient, and the cost is lower.
In other embodiments, the device identifier is a specific identifier (not the MAC address of the monitoring device itself), and when the monitoring device is registered on the video management server, the access device adds the device identifier corresponding to the monitoring device in a registration message sent by the monitoring device, and the registration message sent by the monitoring device directly carries the MAC address of the monitoring device itself, and the video management server stores the device identifiers and the MAC addresses of the monitoring devices in a one-to-one correspondence manner, and informs the device identifier and the corresponding MAC address of the monitoring device of the network device in the IP bearer network, so that after receiving a video source, the network device can find the corresponding MAC according to the received device identifier of the video source, thereby finding the monitoring device sending the video source, tracing the video source, and preventing the video data from being tampered.
As shown in fig. 6, a block diagram of an apparatus for tracking a video source according to the present application, corresponding to the above method for tracking a video source, can be understood or explained with reference to the embodiments of the method for tracking a video source.
Referring to fig. 6, the apparatus for tracking a video source provided in this embodiment is applied to an access device, and the apparatus may include a first processing module 101 and a second processing module 102.
The first processing module 101 adds an equipment identifier corresponding to the monitoring equipment in a registration message sent by the monitoring equipment, forwards the registration message with the added equipment identifier to a video management server, and sends an equipment identifier corresponding to a video source to be forwarded or decoded to the network equipment by the video management server;
the second processing module 102 adds the device identifier corresponding to the monitoring device to the video source sent by the monitoring device, and forwards the video source with the device identifier added to the network device, and the network device determines whether to forward or decode the video source according to the device identifier in the received video source and the device identifier corresponding to the video source to be forwarded or decoded, which is sent by the video management server.
Further, when the network device is a streaming media server, after receiving a video source, the streaming media server determines whether a device identifier in the video source is consistent with a device identifier corresponding to the video source to be forwarded, and if so, the streaming media server forwards the video source; otherwise, the streaming media server discards the video source.
Further, when the network device is a client, after receiving a video source, the client judges whether a device identifier in the video source is consistent with a device identifier corresponding to the video source to be decoded, and if so, the client decodes the video source; otherwise, the client discards the video source.
Further, referring to fig. 7, the apparatus may further include a learning module 103.
The learning module 103 is configured to receive an ARP request sent by the monitoring device, and obtain an MAC address of the monitoring device, where the device identifier is the MAC address of the monitoring device.
Further, the registration message carries the MAC address of the monitoring device, and the video management server correspondingly stores the MAC address of the monitoring device and the device identifier corresponding to the monitoring device, and issues the MAC address and the device identifier of the monitoring device to which the video source to be forwarded or decoded belongs to the network device.
To sum up, the method and the device for tracking the video source of the application place the video source sent by the monitoring device into the device identifier corresponding to the monitoring device through the access device accessed to the monitoring device, so that the video source can be tracked and traced according to the device identifier after reaching the IP bearer network or the rear end (such as network devices like a streaming media server or a client), thereby judging the legality and the authenticity of the video source, directly cleaning and processing the video source which is attacked or suspected of rubbish, and reducing the damage to the network to the maximum extent. In addition, the method and the device for tracking the video source do not introduce extra time delay and extra performance overhead to the video source transmitted in real time.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.
Claims (10)
1. A method for tracking a video source, applied to an access device for accessing a monitoring device to a network, is characterized in that the method comprises:
adding a device identifier corresponding to the monitoring device in a registration message sent by the monitoring device, forwarding the registration message with the added device identifier to a video management server, and sending a device identifier corresponding to a video source to be forwarded or decoded to network equipment by the video management server, wherein the registration message is a Transmission Control Protocol (TCP) message or a User Datagram Protocol (UDP) message, and the device identifier is added to an option field of the TCP message or the UDP message;
and the network equipment judges whether to forward or decode the video source according to the received equipment identifier in the video source and the equipment identifier corresponding to the video source to be forwarded or decoded, which is issued by the video management server.
2. The method according to claim 1, wherein when the network device is a streaming media server, the streaming media server determines whether a device identifier in the video source is consistent with a device identifier corresponding to the video source to be forwarded after receiving the video source, and if so, the streaming media server forwards the video source; otherwise, the streaming media server discards the video source.
3. The method according to claim 1 or 2, wherein when the network device is a client, the client determines whether a device identifier in the video source is consistent with a device identifier corresponding to the video source to be decoded after receiving the video source, and if so, the client decodes the video source; otherwise, the client discards the video source.
4. The method of tracking a video source of claim 1, further comprising:
and receiving an ARP request sent by the monitoring equipment to obtain the MAC address of the monitoring equipment, wherein the equipment identifier is the MAC address of the monitoring equipment.
5. The method according to claim 1, wherein the registration message carries the MAC address of the monitoring device, and the video management server correspondingly stores the MAC address of the monitoring device and the device identifier corresponding to the monitoring device, and issues the MAC address and the device identifier of the monitoring device to which the video source to be forwarded or decoded belongs to the network device.
6. An apparatus for tracking a video source, applied to an access device, the access device being used for accessing a monitoring device to a network, the apparatus comprising:
the first processing module is used for adding an equipment identifier corresponding to the monitoring equipment in a registration message sent by the monitoring equipment, forwarding the registration message with the added equipment identifier to a video management server, and sending an equipment identifier corresponding to a video source to be forwarded or decoded to network equipment by the video management server, wherein the registration message is a Transmission Control Protocol (TCP) message or a User Datagram Protocol (UDP) message, and the equipment identifier is added to an option field of the TCP message or the UDP message;
and the second processing module is used for adding the equipment identifier corresponding to the monitoring equipment in the video source sent by the monitoring equipment, forwarding the video source added with the equipment identifier to the network equipment, and judging whether to forward or decode the video source by the network equipment according to the equipment identifier in the received video source and the equipment identifier corresponding to the video source to be forwarded or decoded, which is issued by the video management server.
7. The apparatus for tracking video source according to claim 6, wherein when the network device is a streaming media server, after receiving a video source, the streaming media server determines whether a device identifier in the video source is consistent with a device identifier corresponding to the video source to be forwarded, and if so, the streaming media server forwards the video source; otherwise, the streaming media server discards the video source.
8. The apparatus according to claim 6 or 7, wherein when the network device is a client, the client determines whether a device identifier in the video source is consistent with a device identifier corresponding to the video source to be decoded after receiving the video source, and if so, the client decodes the video source; otherwise, the client discards the video source.
9. The apparatus for tracking video source of claim 6, wherein said apparatus further comprises:
and the learning module is used for receiving the ARP request sent by the monitoring equipment and obtaining the MAC address of the monitoring equipment, wherein the equipment identifier is the MAC address of the monitoring equipment.
10. The apparatus according to claim 6, wherein the registration message carries the MAC address of the monitoring device, and the video management server correspondingly stores the MAC address of the monitoring device and the device identifier corresponding to the monitoring device, and issues the MAC address and the device identifier of the monitoring device to which the video source to be forwarded or decoded belongs to the network device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611141809.1A CN106789999B (en) | 2016-12-12 | 2016-12-12 | Method and device for tracking video source |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611141809.1A CN106789999B (en) | 2016-12-12 | 2016-12-12 | Method and device for tracking video source |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106789999A CN106789999A (en) | 2017-05-31 |
CN106789999B true CN106789999B (en) | 2020-07-28 |
Family
ID=58880401
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611141809.1A Active CN106789999B (en) | 2016-12-12 | 2016-12-12 | Method and device for tracking video source |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106789999B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110868641B (en) * | 2018-08-28 | 2021-12-07 | 中国电信股份有限公司 | Method and system for detecting validity of live broadcast source |
CN112449111A (en) * | 2020-11-13 | 2021-03-05 | 珠海大横琴科技发展有限公司 | Monitoring equipment processing method and device |
CN113422775B (en) * | 2021-06-23 | 2022-12-02 | 重庆紫光华山智安科技有限公司 | Data processing method and device, electronic equipment and computer readable storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102333094A (en) * | 2011-10-12 | 2012-01-25 | 杭州华三通信技术有限公司 | Safety control method and equipment |
CN103997623A (en) * | 2014-05-06 | 2014-08-20 | 四川长虹电器股份有限公司 | Video monitoring method based on P2P technology |
CN104144319A (en) * | 2013-05-10 | 2014-11-12 | 中国电信股份有限公司 | Method for opening up operation level video monitoring service and server |
CN104754279A (en) * | 2013-12-30 | 2015-07-01 | 阿里巴巴集团控股有限公司 | Method and system for realizing video call |
WO2015185944A1 (en) * | 2014-06-05 | 2015-12-10 | Friend Mts Ltd. | Securing and/or tracing video media-content |
CN105939348A (en) * | 2016-05-16 | 2016-09-14 | 杭州迪普科技有限公司 | MAC address authentication method and apparatus |
-
2016
- 2016-12-12 CN CN201611141809.1A patent/CN106789999B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102333094A (en) * | 2011-10-12 | 2012-01-25 | 杭州华三通信技术有限公司 | Safety control method and equipment |
CN104144319A (en) * | 2013-05-10 | 2014-11-12 | 中国电信股份有限公司 | Method for opening up operation level video monitoring service and server |
CN104754279A (en) * | 2013-12-30 | 2015-07-01 | 阿里巴巴集团控股有限公司 | Method and system for realizing video call |
CN103997623A (en) * | 2014-05-06 | 2014-08-20 | 四川长虹电器股份有限公司 | Video monitoring method based on P2P technology |
WO2015185944A1 (en) * | 2014-06-05 | 2015-12-10 | Friend Mts Ltd. | Securing and/or tracing video media-content |
CN105939348A (en) * | 2016-05-16 | 2016-09-14 | 杭州迪普科技有限公司 | MAC address authentication method and apparatus |
Also Published As
Publication number | Publication date |
---|---|
CN106789999A (en) | 2017-05-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10958623B2 (en) | Identity and metadata based firewalls in identity enabled networks | |
US8555056B2 (en) | Method and system for including security information with a packet | |
US8107396B1 (en) | Host tracking in a layer 2 IP ethernet network | |
US7647623B2 (en) | Application layer ingress filtering | |
US8576845B2 (en) | Method and apparatus for avoiding unwanted data packets | |
Wu et al. | A source address validation architecture (sava) testbed and deployment experience | |
CN101252592A (en) | Method and system for tracing network source of IP network | |
EP1825652A1 (en) | Method and system for including network security information in a frame | |
JP2006501757A (en) | Isolating hosts connected to the access network | |
RU2006143768A (en) | AROMATIC RESTRICTION OF THE NETWORK VIOLENT | |
TW200840279A (en) | Method and system for tunneling MACSec packets through non-MACSec nodes | |
CN106789999B (en) | Method and device for tracking video source | |
US8072978B2 (en) | Method for facilitating application server functionality and access node comprising same | |
Supriyanto et al. | Survey of internet protocol version 6 link local communication security vulnerability and mitigation methods | |
CA2835052A1 (en) | Anonymous signalling | |
WO2015174100A1 (en) | Packet transfer device, packet transfer system, and packet transfer method | |
CN102685117B (en) | A kind of multicast safety management method and device | |
WO2014206152A1 (en) | Network safety monitoring method and system | |
CN102752266B (en) | Access control method and equipment thereof | |
CN112291072B (en) | Secure video communication method, device, equipment and medium based on management plane protocol | |
Salim et al. | Preventing ARP spoofing attacks through gratuitous decision packet | |
Khoussainov et al. | LAN security: problems and solutions for Ethernet networks | |
CN109376507B (en) | Data security management method and system | |
Li et al. | SDN-Ti: a general solution based on SDN to attacker traceback and identification in IPv6 networks | |
Ovadia et al. | {Cross-Router} Covert Channels |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |