CN108377365A - Video monitoring system based on video security access path - Google Patents
Video monitoring system based on video security access path Download PDFInfo
- Publication number
- CN108377365A CN108377365A CN201810130482.0A CN201810130482A CN108377365A CN 108377365 A CN108377365 A CN 108377365A CN 201810130482 A CN201810130482 A CN 201810130482A CN 108377365 A CN108377365 A CN 108377365A
- Authority
- CN
- China
- Prior art keywords
- port
- information
- video
- data input
- monitoring data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
- H04N7/181—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention discloses a kind of video monitoring system based on Video security access path, it is related to monitoring network field, including several for information access or the port of output, each port pass through opening/closed network and form communication path;Include a Service-Port, several monitoring data input ports and several other equipment ports in port;Wherein, critical point modules A is set between Service-Port and opening/closed network, critical point module B is set between opening/closed network and monitoring data input port;By forming the effective information transmission path between Service-Port and monitoring data input port to the processing of unidirectional comparison/verification/audit of information by critical point modules A to critical point module B.The present invention uses unidirectional comparison/verification/audit, realizes effective, Invalid path classification and the one-way transmission locking of network information transfer, realizes inexpensive, high security network protection.
Description
Technical field
The present invention relates to monitoring network fields, the more particularly to video monitoring system based on Video security access path.
Background technology
With popularizing for monitoring network, the equipment such as various kinds of equipment such as server, monitor are in communication with each other to form transmission network.
But wherein, still lack effective self-protection mechanism.Malicious parties are easy to shoot monitoring network from any appliance to obtain/destroy
Equipment/information in network is monitored, or even kidnaps branch equipment.
The system of defense that monitoring network is constructed on the basis of network-based soft, hard framework is being currently the mainstream development of technology
Direction is woven with comparable prior art basis in many high-end seminar, and such as application No. is the middle promulgateds by the State Council of 200680016779.X
Following system is disclosed in bright patent:
A kind of method and system for can configure security and surveillance system, configurable security and surveillance system may include at least one
A programmable sensor agent and/or at least one programmable content analysis agent.System administration manager by programmable by sensing
Device act on behalf of and/or programmable content analysis agent in the programming of configurable hardware device, configurable security and surveillance system can be with
A variety of processing features are provided.Device programming file can be used to program and can configure hardware device.Device programming file can be added
It is close, key can be asked so that different processing features is programmed into programmable sensor agent and/or programmable content point
Analysis agency.Text can be programmed by transmission of network and/or by machine readable media from receiving device from e-commerce provider
Part and/or key.
Above-mentioned technological achievement is published on the early stage of cybertimes, has established the basis of monitoring Safe Architecture For eNet, still, on
The setting that technical solution is related to all multi-parameters is stated, it is regarding of capturing to disclose in video surveillance network using hardware, software
The method and corresponding system of the encryption of frequency information, decryption, therefore, cost of implementation is higher.
Invention content
The object of the present invention is to provide a kind of video monitoring systems based on Video security access path, use unidirectional ratio
Right/verification/audit, realize network information transfer effective, Invalid path classification and one-way transmission locking, realize it is low at
Originally, the network protection of high security.
The present invention above-mentioned technical purpose technical scheme is that:
Based on the video monitoring system of Video security access path, including it is several for information access or the port of output, it is each described
Port forms communication path by opening/closed network;
Include a Service-Port, several monitoring data input ports and several other equipment ports in the port;
Wherein, critical point modules A is set between Service-Port and the opening/closed network, in the opening/closed network
Critical point module B is set between the monitoring data input port;By by the critical point modules A to B pairs of the critical point module
The processing of unidirectional comparison/verification/audit of information forms the effective information between Service-Port and monitoring data input port
Transmission path.
Above-mentioned technical proposal, by using by critical point modules A to critical point module B to unidirectional comparison/verification of information/examine
Core, framework play the information transmission path between Service-Port and monitoring data input port, and that realizes network information transfer has
Effect, the classification of Invalid path and one-way transmission locking, simplify network configuration, reduce network load, realize low cost,
The network protection of high security.
In some embodiments, the critical point modules A is defeated for being sent to the monitoring data from the Service-Port
In the information of inbound port or other equipment port, for matching unit storage inside purpose IP address list and destination
The infomational message of slogan list is without any processing and transparent transmission.
By using above-mentioned technical proposal, realizes and simplifying for complex network is combed, reduce the load of network.
In some embodiments, the critical point modules A from the Service-Port direction for being sent to the monitoring number
According in the information of input port or other equipment port direction, except with matching unit storage inside purpose IP address list and
Infomational message outside destination slogan list forwards after carrying out information flag.
By using above-mentioned technical proposal, to realize the locking of information, prevent third party from obtaining video monitoring information, to protect
The safety of card monitoring network.
In some embodiments, the critical point modules A is for from the monitoring data input port or other equipment end
Mouthful direction be sent to the Service-Port direction all information are without any processing and transparent transmission.
By using above-mentioned technical proposal, to form the list from Service-Port direction to monitoring data input port direction
It is locked to transmission, to realize the network protection of low cost, high security.
In some embodiments, the critical point module B, which marks described information, carries out information flag confirmation, institute after success
It states information and reaches the monitoring data input port, it is on the contrary then cut off the signal transmission.
By using above-mentioned technical proposal, to form the effective information between Service-Port and monitoring data input port
Transmission path realizes effective, Invalid path the classification of network information transfer.
In some embodiments, described information is encrypted labeled as information, and described information label is confirmed as information decryption.
Above-mentioned technical proposal is handled by using the cooperation of encryption and decryption between critical point modules A and critical point module B,
It realizes from Service-Port direction to monitoring data input port direction unidirectionally to comparison/verification/audit of information.
In some embodiments, the critical point module B is for from the Service-Port or other equipment port direction
It is sent in the information in monitoring data input port direction, all information for not carrying out information flag is directly abandoned not
It forwards.
By using above-mentioned technical proposal so that all signal sources other than non-server are all defined as nothing automatically
Effect/invalid information source to form closed circuit framework in monitoring system network, and intelligently marks off effective, invalid communication path, makes
Obtaining the port other than any non-server port can not effectively obtain video monitoring information, to ensure the safety of monitoring network
Property, it effectively avoids malicious parties from shooting monitoring network, realizes safe efficient, inexpensive monitoring Safe Architecture For eNet system.
In some embodiments, the critical point module B is described for being sent to from monitoring data input port direction
In the information in Service-Port direction, all non-information for being directed toward the Service-Port are directly dropped.
By using above-mentioned technical proposal, is further formed and protected in monitoring data input port, formed in front monitoring front-end
Information closed loop, any malicious parties all can not shoot this monitoring network from any port in addition to monitoring data input port and obtain
Take/effective information is destroyed, greatly improve the safety of this monitoring network.
In some embodiments, the critical point module B is described for being sent to from monitoring data input port direction
In the information in Service-Port direction, information type is that the information of non-video protocol type is directly dropped.
By using above-mentioned technical proposal, the information of all non-video protocol types is all determined at the module B of critical point
Justice is invalid/invalid information and directly abandons, and without sending out forwarding, reduces network load, simplifies network configuration, reduce into
This.
In some embodiments, the monitoring data input port includes several branch ports;In the critical point module B
Configured with IP address filtering module, port information comparing module and information format judgment module.
In above-mentioned technical proposal, by the module B of critical point configuration of IP address filtering module, port information comparing module and
Information format judgment module, to judge whether the information for being sent to Service-Port direction from monitoring data input port direction is directed toward
Service-Port judges to be sent in the information in Service-Port direction from monitoring data input port direction, destination IP
Whether location is the IP address of monitoring device access server or whether its port numbers is that monitoring device access server opens
Whether port or its information type are video protocols types.
Compared with prior art, the video monitoring system provided by the present invention based on Video security access path have with
Lower advantage:
1, it is marked by unidirectional path, framework plays the information transmission between Service-Port and monitoring data input port so that
All signal sources other than non-server are all defined as invalid/invalid information source automatically, in monitoring system network
Closed circuit framework is formed, and intelligently marks off effective, invalid communication path, in addition to Service-Port, monitoring data input port,
This monitoring network is shot from any third party under this framework, can be defined as communicating in vain so that any non-server port
Port in addition can not effectively obtain video monitoring information, to ensure the safety of monitoring network, effectively avoid malicious parties
Monitoring network is shot, realizes safe efficient, inexpensive monitoring Safe Architecture For eNet system.
2, it is further formed and is protected in monitoring data input port, information closed loop, any malicious parties are formed in front monitoring front-end
This monitoring network all can not be shot from any port in addition to monitoring data input port and obtain/destroy effective information, greatly
The safety for improving this monitoring network.
Description of the drawings
Fig. 1 is the structural schematic diagram of the video monitoring system based on Video security access path of present disclosure;
Fig. 2 is the module map of critical point module B in the video monitoring system shown in FIG. 1 based on Video security access path.
In figure, 1, port;11, Service-Port;12, monitoring data input port;13, other equipment port;2, open/
Closed network;3, critical point modules A;4, critical point module B;41, IP address filtering module;42, port information comparing module;43, believe
Cease format judgment module.
Specific implementation mode
Below in conjunction with attached drawing, invention is further described in detail.
The present invention discloses a kind of video monitoring systems based on Video security access path, as shown in Figure 1, by several confessions
Opening/closed network 2 of the port 1 and each 1 mutual communication path of port of formation of information access or output, opening/closure
Network 2 is undertaken the construction of by operator or by the self-built LAN of user.
As shown in Figure 1, port 1 includes a Service-Port 11, monitoring data input port 12 and several other equipments
Port 13,11 access server of Service-Port are handled and are responded for the service request to monitoring device;Monitoring data
Input port 12 includes several branch ports, for accessing monitoring device, such as video camera or other image sensor apparatus;Other
Device port 13 is for accessing other network equipments.By taking public security bureau's security monitoring system as an example, monitoring data input port 12 connects
Enter the monitoring device inside public security bureau, and other equipment port 13 can then be regarded as the network equipment of affiliated institutions of public security bureau.
As shown in Figure 1, related mouth mold block A3 is accessed between Service-Port 11 and opening/closed network 2, and server
Port 11 is in 3 uplink of critical point modules A;Related mouth mold is accessed between opening/closed network 2 and monitoring data input port 12
Block B4, monitoring data input port 12 are in critical point module B4 downlinks, and all monitoring data input ports 12 be connected to it is same
Critical point module B4.
In this embodiment of the invention, the necessary functions configuration of critical point modules A 3 is as follows:
1, for being sent to the information of downlink monitoring data input port 12 or other equipment port 13 from upstream service device port 11
In, selection and transparent transmission without any processing for the IP address of certain purposes and the data of port numbers can be configured, that is, is directed to tool
There is the infomational message of purpose IP address list and the destination slogan list of matching unit storage inside without any processing and saturating
It passes.Therefore, 11 access server of Service-Port, monitoring data input port 12 access monitoring device, the net of access server
In network equipment, could accessing to monitoring device for accessing monitoring equipment is allowed by critical point modules A 3, in this way, for determining mesh
IP address and the data of port numbers be not necessarily to be verified, simplifying for complex network is combed with realizing, reduces network
Load.
2, for being sent to downlink monitoring data input port 12 or other equipment port from 11 direction of upstream service device port
In the information in 13 directions, except the information with above-mentioned purpose IP address and destination interface extra, forwarded after carrying out information flag,
I.e. except with matching unit storage inside purpose IP address list and destination slogan list in addition to infomational message, carry out letter
It is forwarded after breath label.Information flag herein refers to information encryption.
3 this functional configuration of corresponding critical point modules A, critical point module B4 configurations with the following functions:For from upstream service device
Port 11 or 13 direction of other equipment port are sent in the information in 12 direction of downlink monitoring data input port, if message is
Non-encrypted information is then directly abandoned without forwarding;It is sent to downlink monitoring data input terminal from 11 direction of upstream service device port
In the information in 12 directions of mouth, forwarded again after being decrypted if information is encryption data.
Under the conditions of this functional configuration, any people for wanting to shoot communication network Intranet by invasion, if it is desired to by interior
Net is come the front-end camera for accessing monitoring data input port 12 or other image sensor apparatus, the information right and wrong sent out by it
Encrypted or cipher mode and key are inconsistent with critical point module B4's, and abandon its message sent out by critical point module B4,
To prevent third party from obtaining video monitoring information, ensure the safety of monitoring network.
3, for being sent to 11 direction of Service-Port from monitoring data input port 12 or 13 direction of other equipment port
All information are without any processing and transparent transmission.The reason is that even if any front end for wanting to replace monitoring data input port 12
Video camera or other image sensor apparatus and the equipment for shooting communication network Intranet, as object network of its attack is set
The standby information returned is non-encrypted data, and abandons its message by critical point module B4.Under the conditions of this functional configuration, formed from
The one-way transmission in 11 direction of Service-Port to 12 direction of monitoring data input port locks, and realizes low cost, high security
Network protection.
Critical point module B4 also there are following necessary functions to match other than the above-mentioned 3 Article 2 functional configuration of critical point modules A of correspondence
It sets as follows:
1, for being sent in the information in 11 direction of upstream service device port from 12 direction of downlink monitoring data input port, if mesh
IP address be not monitoring device access server address or port numbers be not monitoring device access server open end
Slogan then directly abandons information without forwarding.
Under the above precondition, any front-end camera for wanting to replace monitoring data input port 12 or other images pass
Sensor equipment and the equipment for shooting communication network Intranet, the data message purpose IP address or port numbers sent out by it are not to allow
IP address or port numbers, and its message is abandoned by critical point module B4.
2, for being sent in the information in 11 direction of upstream service device port from 12 direction of downlink monitoring data input port,
Information type is that the information of non-video protocol type is directly dropped.
Under the above precondition, any front-end camera for wanting to replace monitoring data input port 12 or other images pass
Sensor equipment and the equipment for shooting communication network Intranet, because its information data type is not video protocols type, and by critical point mould
Block B4 abandons its message.
In order to realize the functional configuration, as shown in Fig. 2, configured with IP address filtering module 41, port in the module B4 of critical point
Information comparison module 42 and information format judgment module 43 pass through configuration of IP address filtering module 41, end in the module B4 of critical point
Mouth information comparison module 42 and information format judgment module 43, to judge to be sent to server from 12 direction of monitoring data input port
Whether the information in 11 direction of port is directed toward Service-Port 11, that is, judges to be sent to server from 12 direction of monitoring data input port
In the information in 11 direction of port, purpose IP address whether be monitoring device access server IP address or its port numbers
Whether be monitoring device access server open port or its information type whether be video protocols type.
Operation principle:
11 access server of Service-Port, monitoring data input port 12 access monitoring device.The network being allowed access to is set
It is standby, because the information that monitoring device access server returns is not encrypted and transparent transmission by critical point modules A 3, the recognizable prison received
The information that equipment access server returns is controlled, in the network equipment of access server, allows access monitoring to set by critical point modules A 3
Standby could access to monitoring device;
The network equipment not being allowed access to, because after the information that monitoring device access server returns is encrypted by critical point modules A 3
Forwarding, and the information that it is returned by the monitoring device access server that None- identified receives, therefore, which can not visit
Ask monitoring device;
Monitoring device access server is sent to the information of front-end camera or other image sensor apparatus, all can be by critical point mould
Forwarded after block A3 encryption, critical point module B4 is forwarded can be decrypted to the encryption information received again after, thus front-end camera or
Other image sensor apparatus can have correctly received the information that monitoring device access server sends over.
Therefore, in conclusion the video monitoring system based on Video security access path of present disclosure, by critical point mould
Block A3 to critical point module B4 carries out information unidirectional comparison/verification/audit(Encrypt)Processing, to form Service-Port
Effective information transmission path between 11 and monitoring data input port 12, except Service-Port 11, monitoring data input port
Outside 12, this monitoring network is shot from any third party under this framework, can be defined as communicating in vain so that any non-serving
Port other than device port 11, monitoring data input port 12 can not effectively obtain video monitoring information, to ensure to monitor
The safety of network effectively avoids malicious parties from shooting monitoring network, realizes safe efficient, inexpensive monitoring network roll-over protective structure
Construction system.
Claims (10)
1. based on the video monitoring system of Video security access path, including it is several for information access or the port of output(1), respectively
The port(1)Pass through opening/closed network(2)Form communication path;
The port(1)In include a Service-Port(11), several monitoring data input ports(12)And several other are set
Standby port(13);
It is characterized in that, in Service-Port(11)With the opening/closed network(2)Between be arranged critical point modules A(3),
Opening/the closed network(2)With the monitoring data input port(12)Between be arranged critical point module B(4);By by described
Critical point modules A(3)To the critical point module B(4)Service-Port is formed to the processing of unidirectional comparison/verification/audit of information
(11)With monitoring data input port(12)Between effective information transmission path.
2. the video monitoring system according to claim 1 based on Video security access path, it is characterised in that:The pass
Mouth modules A(3)For from the Service-Port(11)It is sent to the monitoring data input port(12)Or other equipment port
(13)Information in, for the information report of purpose IP address list and destination slogan list with matching unit storage inside
The without any processing and transparent transmission of text.
3. the video monitoring system according to claim 2 based on Video security access path, it is characterised in that:The pass
Mouth modules A(3)For from the Service-Port(11)Direction is sent to the monitoring data input port(12)Or other equipment
Port(13)In the information in direction, except with matching unit storage inside purpose IP address list and destination slogan list in addition to
Infomational message, carry out information flag after forward.
4. the video monitoring system according to claim 1 based on Video security access path, it is characterised in that:The pass
Mouth modules A(3)For from the monitoring data input port(12)Or other equipment port(13)Direction is sent to the server
Port(11)All information in direction are without any processing and transparent transmission.
5. the video monitoring system according to claim 3 based on Video security access path, it is characterised in that:The pass
Mouth mold block B(4)Described information is marked and carries out information flag confirmation, described information reaches the monitoring data input terminal after success
Mouthful(12), on the contrary then cut off the signal transmission.
6. the video monitoring system according to claim 5 based on Video security access path, it is characterised in that:The letter
Breath is encrypted labeled as information, and described information label is confirmed as information decryption.
7. the video monitoring system according to claim 2 based on Video security access path, it is characterised in that:The pass
Mouth mold block B(4)For from the Service-Port(11)Or other equipment port(13)Direction is sent to the monitoring data input
Port(12)In the information in direction, all information for not carrying out information flag are directly abandoned and are not forwarded.
8. the video monitoring system according to claim 1 based on Video security access path, it is characterised in that:The pass
Mouth mold block B(4)For from the monitoring data input port(12)Direction is sent to the Service-Port(11)The information in direction
In, all non-direction Service-Ports(11)Information be directly dropped.
9. the video monitoring system according to claim 8 based on Video security access path, it is characterised in that:The pass
Mouth mold block B(4)For from the monitoring data input port(12)Direction is sent to the Service-Port(11)The information in direction
In, information type is that the information of non-video protocol type is directly dropped.
10. the video monitoring system according to claim 9 based on Video security access path, it is characterised in that:It is described
Monitoring data input port(12)Including several branch ports;The critical point module B(4)It is interior to be configured with IP address filtering module
(41), port information comparing module(42)And information format judgment module(43).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810130482.0A CN108377365B (en) | 2018-02-08 | 2018-02-08 | Video monitoring system based on video safety access path |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810130482.0A CN108377365B (en) | 2018-02-08 | 2018-02-08 | Video monitoring system based on video safety access path |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108377365A true CN108377365A (en) | 2018-08-07 |
CN108377365B CN108377365B (en) | 2020-03-24 |
Family
ID=63017428
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810130482.0A Active CN108377365B (en) | 2018-02-08 | 2018-02-08 | Video monitoring system based on video safety access path |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108377365B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2081323A1 (en) * | 2007-06-13 | 2009-07-22 | Huawei Technologies Co., Ltd. | Method, apparatus and system for controlling multicast bearing resource |
CN101945086A (en) * | 2009-11-30 | 2011-01-12 | 广州市聚晖电子科技有限公司 | Security system access business platform for video type security gateway and information transmission method |
CN103200396A (en) * | 2013-04-09 | 2013-07-10 | 广东粤铁瀚阳科技有限公司 | Real-time video stream display method and system based on information display platform |
CN104954764A (en) * | 2015-07-21 | 2015-09-30 | 上海远哲电子技术有限公司 | Video monitoring system based on video resource safety gateway |
CN106027358A (en) * | 2016-07-12 | 2016-10-12 | 上海厚泽信息技术有限公司 | Network security management and control system for accessing social video networks to video private network |
CN107395588A (en) * | 2017-07-18 | 2017-11-24 | 浙江远望通信技术有限公司 | Video monitoring accesses safe blocking-up method and system |
-
2018
- 2018-02-08 CN CN201810130482.0A patent/CN108377365B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2081323A1 (en) * | 2007-06-13 | 2009-07-22 | Huawei Technologies Co., Ltd. | Method, apparatus and system for controlling multicast bearing resource |
CN101945086A (en) * | 2009-11-30 | 2011-01-12 | 广州市聚晖电子科技有限公司 | Security system access business platform for video type security gateway and information transmission method |
CN103200396A (en) * | 2013-04-09 | 2013-07-10 | 广东粤铁瀚阳科技有限公司 | Real-time video stream display method and system based on information display platform |
CN104954764A (en) * | 2015-07-21 | 2015-09-30 | 上海远哲电子技术有限公司 | Video monitoring system based on video resource safety gateway |
CN106027358A (en) * | 2016-07-12 | 2016-10-12 | 上海厚泽信息技术有限公司 | Network security management and control system for accessing social video networks to video private network |
CN107395588A (en) * | 2017-07-18 | 2017-11-24 | 浙江远望通信技术有限公司 | Video monitoring accesses safe blocking-up method and system |
Also Published As
Publication number | Publication date |
---|---|
CN108377365B (en) | 2020-03-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP3688830B2 (en) | Packet transfer method and packet processing apparatus | |
US9584495B2 (en) | Method and system for establishing secure communications using composite key cryptography | |
US11363454B2 (en) | Providing low risk exceptional access with verification of device possession | |
US6061454A (en) | System, method, and computer program for communicating a key recovery block to enable third party monitoring without modification to the intended receiver | |
CN1640090B (en) | An apparatus and method for secure, automated response to distributed denial of service attacks | |
CN100568800C (en) | The system and method that is used for safety remote access | |
CN106060003A (en) | Network boundary unidirectional isolated transmission device | |
CA2149067A1 (en) | User-identification and verification of data integrity in a wireless communication system | |
JP2009506617A (en) | System and method for processing secure transmission information | |
CN108810023A (en) | Safe encryption method, key sharing method and safety encryption isolation gateway | |
CN106209883A (en) | Based on link selection and the multi-chain circuit transmission method and system of broken restructuring | |
CN107172041A (en) | One kind exempts from registration gate inhibition and smart lock registration, unlocking method, device, system | |
CN111447414A (en) | Video monitoring system and method convenient to dispatch and monitor | |
US20080095367A1 (en) | Methods and apparatus for confidentiality protection for fibre channel common transport | |
Puvvadi et al. | Cost-effective security support in real-time video surveillance | |
CN110266725A (en) | Cryptosecurity isolation module and mobile office security system | |
US20110145572A1 (en) | Apparatus and method for protecting packet-switched networks from unauthorized traffic | |
Kent | Encryption-based protection for interactive user/computer communication | |
JP2003530739A (en) | Network system | |
CN107517206A (en) | A kind of method, apparatus of secure communication, computer-readable recording medium and storage control | |
CN108377365A (en) | Video monitoring system based on video security access path | |
US20230156037A1 (en) | Methods and system for providing security to critical systems connected to a computer network | |
Kent | Protocol design considerations for network security | |
CN210839642U (en) | Device for safely receiving and sending terminal data of Internet of things | |
RU2163745C2 (en) | Protective system for virtual channel of corporate network using authentication router and built around shared communication network channels and switching facilities |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |