CN111182274A - Data transmission method for video acquisition system - Google Patents

Data transmission method for video acquisition system Download PDF

Info

Publication number
CN111182274A
CN111182274A CN202010069625.9A CN202010069625A CN111182274A CN 111182274 A CN111182274 A CN 111182274A CN 202010069625 A CN202010069625 A CN 202010069625A CN 111182274 A CN111182274 A CN 111182274A
Authority
CN
China
Prior art keywords
wireless network
internet
things
communicator
available wireless
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010069625.9A
Other languages
Chinese (zh)
Inventor
邵起明
郑明吉
原桂龙
杨超
谢占明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Singularity Xinyuan International Technology Development Beijing Co Ltd
Original Assignee
Singularity Xinyuan International Technology Development Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Singularity Xinyuan International Technology Development Beijing Co Ltd filed Critical Singularity Xinyuan International Technology Development Beijing Co Ltd
Priority to CN202010069625.9A priority Critical patent/CN111182274A/en
Publication of CN111182274A publication Critical patent/CN111182274A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC
    • H04W52/06TPC algorithms
    • H04W52/14Separate analysis of uplink or downlink
    • H04W52/146Uplink power control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC
    • H04W52/18TPC being performed according to specific parameters

Abstract

The application provides a data transmission method for a video acquisition system. And then, authenticating the available wireless network by using the internet of things communicator. And if the available wireless network authentication is passed, connecting the available wireless network through the wireless network communicator so as to upload the video data acquired by the camera device to a server through the available wireless network. The video acquisition system can be powered by the rechargeable battery, so that the video acquisition equipment can still be normally used in the working environment without the power supply equipment. Meanwhile, the wireless network to be connected can be authenticated between the connected wireless networks so as to ensure the transmission safety of the video data.

Description

Data transmission method for video acquisition system
Technical Field
The application relates to the technical field of communication, in particular to a data transmission method based on a video acquisition system.
Background
In some temporary constructions, for example, in working environments such as large maintenance sites of nuclear power plants, temporary video monitoring is usually required for personnel, equipment, environments and the like, so that hidden dangers and problems existing in the working environments can be found in time through video data. In the use process of the video acquisition system, the video acquisition system cannot be connected with a power supply for normal use due to the lack of power supply facilities and other factors around the video acquisition system. At this moment, the video data acquisition work cannot be realized, and the normal work can be seriously influenced.
Moreover, in some working environments with safety regulation requirements, such as nuclear power plants and the like, the transmission power range of the radio frequency signal of the terminal equipment is specified, and generally, the conventional wireless video acquisition system is difficult to meet the safety regulations, and the power of the transmitted radio frequency signal can seriously exceed the range of the safety regulation. If the terminal equipment is directly used, precise instruments in the nuclear power station are damaged due to interference of radio frequency signals, and even more serious results such as nuclear pollution and the like can be caused. However, if the video signal sending function of the video acquisition system is closed in order to meet the safety regulations when the nuclear power station enters the range, only the video data acquisition function is reserved, the video monitoring function is lost, and the normal work is influenced.
Disclosure of Invention
The application provides a data transmission method for a video acquisition system, which is used for ensuring the normal communication of the video acquisition system.
The application provides a data transmission method for a video acquisition system, which comprises the following steps:
the method comprises the steps that an available wireless network is identified by using an internet of things communicator inside a video acquisition system, the video acquisition system is powered by a rechargeable battery, and the video acquisition system comprises a main control module for controlling internal devices, a camera device for acquiring video data, a wireless network communicator arranged inside the main control module and used for wireless network data interaction and an internet of things communicator used for internet of things data interaction;
authenticating the available wireless network using the Internet of things communicator;
and if the available wireless network authentication is passed, connecting the available wireless network through the wireless network communicator so as to upload the video data acquired by the camera device to a server through the available wireless network.
Optionally, the identifying available wireless networks by using the internet of things communicator inside the video capture system includes:
receiving an Internet of things signal through the Internet of things communicator;
determining a target Internet of things signal from the Internet of things signals, wherein the target Internet of things signal is the Internet of things signal matched with the protocol of the Internet of things communicator;
and determining that the wireless network corresponding to the Internet of things signal is an available wireless network according to the target Internet of things signal. Optionally, the authenticating the available wireless network with the internet of things communicator includes:
encrypting a first verification plaintext through an encryption and decryption module in the internet of things communicator to obtain a first encrypted plaintext;
sending the first encrypted plaintext to a base station corresponding to the available wireless network through the internet of things communicator, so that the base station generates first feedback information with a first digital signature according to the first encrypted plaintext;
receiving the first feedback information sent by the base station through the internet of things communicator;
decrypting, by the encryption and decryption module, a first data signature in the first feedback information to authenticate the available wireless network.
Optionally, the authenticating the available wireless network with the internet of things communicator includes:
receiving a second encrypted plaintext sent by a base station corresponding to the available wireless network through the internet-of-things communicator, wherein the second encrypted plaintext is obtained by encrypting a second verification plaintext through the base station;
decrypting the second encrypted plaintext through an encryption and decryption module in the internet of things communicator to obtain a second verification plaintext;
converting the response data of the second verification plaintext through the hash function of the encryption and decryption module to obtain an abstract;
encrypting the abstract through the encryption and decryption module to obtain second feedback information with a second digital signature;
sending the second feedback information to the base station through the internet of things communicator, so that the base station authenticates the video acquisition system according to a second digital signature in the second feedback information, and generates an authentication result;
and receiving the authentication result sent by the base station through the Internet of things communicator.
Optionally, if the authentication of the available wireless network passes, connecting to the available wireless network through the wireless network communicator so that the video data collected by the camera device can be uploaded to a server through the available wireless network includes:
decrypting the first feedback information through the encryption and decryption module in the internet of things communicator to obtain a safe power range of the base station;
and the main control module controls the power of the radio frequency signal transmitted by the wireless network communicator to be within the safe power range according to the safe power range.
Optionally, the video acquisition system further comprises a working state detection module, and the working state detection module is electrically connected with the main control module;
the working state detection module sends a working state inquiry instruction to the main control module according to a preset period;
and if the working state detection module does not obtain the response of the main control module within a preset response time range, the working state detection module controls the main control module to start reset operation.
Optionally, the method further comprises:
and transmitting the video data acquired by the camera device to the server in real time through the wireless network communicator.
Optionally, the video capture system further comprises a data storage module, and the method further comprises:
storing the video data collected by the camera device by using the data storage module;
and the main control module transmits the video data in the data storage module to the server through the wireless network communicator according to a preset data transmission period.
According to the technology, the data transmission method for the video acquisition system is provided, and firstly, the available wireless network is identified by using the internet of things communicator in the video acquisition system. And then, authenticating the available wireless network by using the internet of things communicator. And if the available wireless network authentication is passed, connecting the available wireless network through the wireless network communicator so as to upload the video data acquired by the camera device to a server through the available wireless network. The video acquisition system can be powered by the rechargeable battery, so that the video acquisition equipment can still be normally used in the working environment without the power supply equipment. Meanwhile, the wireless network to be connected can be authenticated between the connected wireless networks so as to ensure the transmission safety of the video data.
Drawings
In order to more clearly explain the technical solution of the present application, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious to those skilled in the art that other drawings can be obtained according to the drawings without any creative effort.
Fig. 1 is a flowchart of a data transmission method based on a video capture system according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a video capture system according to an embodiment of the present disclosure;
fig. 3 is a schematic internal structural diagram of a video capture system according to an embodiment of the present disclosure;
fig. 4 is a flow chart of a method of identifying available wireless networks provided herein;
fig. 5 is a flowchart of a wireless network authentication method according to an embodiment of the present application;
fig. 6 is a flowchart of an authentication method of a video capture system according to an embodiment of the present disclosure;
fig. 7 is a flowchart of a method for setting a transmission power of a radio frequency signal according to an embodiment of the present application;
fig. 8 is a flowchart of a method for detecting a state of a main control module according to an embodiment of the present disclosure.
Detailed Description
The technical solutions in the embodiments of the present invention will be described clearly and completely with reference to the accompanying drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In some temporary constructions, for example, in working environments such as large maintenance sites of nuclear power plants, temporary video monitoring is usually required for personnel, equipment, environments and the like, so that hidden dangers and problems existing in the working environments can be found in time through video data. In the use process of the video acquisition system, the video acquisition system cannot be connected with a power supply for normal use due to the lack of power supply facilities and other factors around the video acquisition system. At this moment, the video data acquisition work cannot be realized, and the normal work can be seriously influenced.
Moreover, in some working environments with safety regulation requirements, such as nuclear power plants and the like, the transmission power range of the radio frequency signal of the terminal equipment is specified, and generally, the conventional wireless video acquisition system is difficult to meet the safety regulations, and the power of the transmitted radio frequency signal can seriously exceed the range of the safety regulation. If the terminal equipment is directly used, precise instruments in the nuclear power station are damaged due to interference of radio frequency signals, and even more serious results such as nuclear pollution and the like can be caused. However, if the video signal sending function of the video acquisition system is closed in order to meet the safety regulations when the nuclear power station enters the range, only the video data acquisition function is reserved, the video monitoring function is lost, and the normal work is influenced.
In order to solve the above problem, an embodiment of the present application provides a data transmission method based on a video capture system.
Fig. 1 is a flowchart of a data transmission method for a video capture system according to an embodiment of the present application, where the method includes:
s1, utilize the inside thing networking communicator of video acquisition system discerns available wireless network, video acquisition system passes through rechargeable battery power supply, video acquisition system including the host system who is used for controlling inside device, be used for gathering video data camera device, set up in inside the wireless network communicator that is used for the wireless network data interaction of host system and the thing networking communicator that is used for the thing networking data interaction.
Fig. 2 is a schematic structural diagram of a video capture system according to an embodiment of the present application, and fig. 3 is a schematic structural diagram of an interior of a video capture system according to an embodiment of the present application. It can be seen that the video capture system comprises at least: the network adapter 6 is internally provided with a main control module 1, a wireless network communicator 2, an Internet of things communicator 3 and a power controller 4, and the camera device 7 is arranged outside the network adapter 6. The wireless network communicator 2, the internet of things communicator 3, the power controller 4 and the camera device 7 are electrically connected with the main control module 1, and the wireless network communicator 2, the internet of things communicator 3 and the camera device 7 are electrically connected with the power controller 4. The wireless network communicator 2 and the internet of things communicator 3 are respectively provided with a first antenna 21 and a second antenna 31, the wireless network communicator 2 receives and transmits radio-frequency signals through the first antenna 21, and the internet of things communicator 3 receives and transmits the radio-frequency signals through the second antenna 31. Specifically, the main control module 1 is configured to control operations of the devices, and the power controller 4 is configured to be connected to a power supply device to supply power to the devices in the video capture system, where the power controller 4 may be electrically connected to the devices through a circuit board.
In the embodiment of the present application, since the video capture system needs to overcome the problem of lack of power supply equipment in the outside, the video capture system further needs to include the rechargeable battery 5, and the rechargeable battery 5 is charged with power and then releases the power to supply power to the video capture system. Preferably, the rechargeable battery 5 may be a rechargeable lithium battery. The specification of the rechargeable battery 5 may be selected according to practical situations, for example, in the case of a rechargeable lithium battery, if the power consumption of the image pickup device 7 is 10W, the total power consumption of the above devices is 6W, and the standby time of the video capture system is required to be 48 hours, the specification of the rechargeable battery 5 is 12VDC-65 AH.
Furthermore, in order to ensure the use safety of the rechargeable battery, a short-circuit protector, an overcurrent protector, an overcharge protector, an overdischarge protector, a temperature protector, an overvoltage protector and the like can be added into the video acquisition system.
Furthermore, for the convenience of placing the video acquisition system, the tripod can be equipped with for the video acquisition system, and simultaneously, for the convenience of carrying, the tripod can be designed to stretch out and draw back.
Further, in order to conveniently carry the video capture system, the video capture system may be equipped with a tool box for accommodating the camera device 7, the main body, the rechargeable battery 5, the tripod and the like. Protection grade IP16 is preferred for outdoor use.
Further, the network adapter 6 further includes: an EOC interface 10; the EOC interface 10 is electrically connected to the power controller 4 and the main control module 1, respectively. Based on the implementation mode, the EOC interface is additionally arranged on the video acquisition system, and the video acquisition system can be powered and provided with a wireless network through the communication with the EOC equipment. The working environment includes an EOC (Ethernet Over Cable, EOC power supply) device, so that the EOC device and the video acquisition system may be communicated through a twisted pair, specifically, one end of the twisted pair is communicated with the EOC device, and the other end of the twisted pair is connected to the EOC interface 10 through an interface on the video acquisition system, and is connected to the main control module 1 and the power supply controller 4 through the EOC interface 10.
Optionally, the network adapter 6 further includes: a POE interface 11; the POE interface 11 is electrically connected to the main control module 1 and the power controller 4, respectively. Based on the above implementation, adding POE interface 11 on the video acquisition system can supply Power and provide a wireless network for the video acquisition system through the communication with a POE (Power Over Ethernet, POE Power supply) switch. Wherein, there is the POE switch in the operational environment, consequently, can communicate through the net twine between this POE switch and the video acquisition system, specifically, the one end intercommunication POE switch of net twine, the other end passes through POE interface 11 on the video acquisition system and inserts host system 1 and electrical source controller 4.
Before transmitting video data, a video capture system first identifies available wireless networks around through an internet of things communicator, and specifically, as shown in fig. 4, is a flowchart of a method for identifying available wireless networks provided by the present application, where the method includes:
s101, receiving an Internet of things signal through the Internet of things communicator;
s102, determining a target Internet of things signal from the Internet of things signals, wherein the target Internet of things signal is the Internet of things signal matched with the protocol of the Internet of things communicator;
s103, determining that the wireless network corresponding to the Internet of things signal is an available wireless network according to the target Internet of things signal.
In the video capture system, the internet of things communicator 3 is equivalent to a communication signal transceiver, and the internet of things is generally a network environment based on a wireless network. Therefore, the internet of things communicator 3 can receive surrounding internet of things signals, and different internet of things communicators 3 have different protocols, so that only the internet of things signals matched with the protocols can be used by the internet of things communicator 3, such internet of things signals are target internet of things signals, and the corresponding wireless network signals can be further determined through the target internet of things signals, namely if the target internet of things signals can be received, it is shown that the wireless network signals also exist in the wireless network establishment basis of the target internet of things signals, namely the wireless network is an available wireless network.
The frequency of the internet of things communicator 3 is 2.4GHz, and the maximum value of the output power of the internet of things communicator 3 is 19.5 dBm. As can be seen from the above, before determining the radio frequency signal transmission power of the wireless network communicator 2, the available wireless network and the corresponding power limit of the available wireless network are determined by the radio frequency signal transmitted by the internet-of-things communicator 3. Therefore, in order to avoid the excessive power of the radio frequency signal transmitted by the internet of things communicator 3 and damage to surrounding precision instruments, the transmission power of the radio frequency signal of the internet of things communicator 3 needs to be controlled to ensure the safety of the video capture system.
And S2, authenticating the available wireless network by using the Internet of things communicator.
The internet of things communicator 3 may receive a plurality of internet of things signals at the same time, that is, correspond to a plurality of available wireless networks, and the wireless networks lack security due to the openness of the wireless networks, so in order to ensure the subsequent secure transmission of video data, the available wireless networks need to be authenticated to determine available wireless networks meeting the security requirements.
Specifically, as shown in fig. 5, a flowchart of a wireless network authentication method provided in the embodiment of the present application is shown, where the method includes:
s201, encrypting a first verification plaintext through an encryption and decryption module in the Internet of things communicator to obtain a first encrypted plaintext;
s202, the first encrypted plaintext is sent to a base station corresponding to the available wireless network through the Internet of things communicator, so that the base station generates first feedback information with a first digital signature according to the first encrypted plaintext;
s203, receiving the first feedback information sent by the base station through the Internet of things communicator;
s204, decrypting a first data signature in the first feedback information through the encryption and decryption module to authenticate the available wireless network.
Generally, as shown in fig. 3, an encryption/decryption module 8 is added to the network adapter 6 to authenticate the wireless network. The encryption/decryption module 8 may be a national crypto chip, that is, the encryption/decryption module may encrypt and decrypt transmission data through a national cryptographic algorithm identified by the national crypto authority, so as to authenticate the wireless network, and generally, the national cryptographic algorithm mainly includes SM1, SM2, SM3, and SM4, and may be selectively used according to actual situations.
Specifically, in the process of authenticating the wireless network through the internet-of-things communicator 3, first, the internet-of-things communicator 3 encrypts the first verification plaintext used for verifying the information through the encryption and decryption module 8, for example, a random number or the like is generated for the first verification plaintext by using a cryptographic algorithm. And then the first encrypted plaintext is sent to a base station corresponding to the available wireless network. After receiving the first encrypted plaintext, the base station needs to decrypt the first encrypted plaintext by using a private key to obtain a first verification plaintext, wherein a public key used by the encryption and decryption module 8 during encryption corresponds to the private key. Usually, the first verification plaintext is a wireless network parameter acquisition request of the video acquisition system, and the base station generates corresponding response data, such as a base station identifier, various parameters and requirements of an available wireless network, and the like, according to the first verification plaintext. At this time, the base station converts the response data again by using a hash algorithm or the like to generate a digest, and encrypts the digest again by using a private key to obtain a first digital signature. At this time, the first digital signature is added to the response data to obtain the first feedback information. Wherein the first digital signature is a certificate for authenticating that the first feedback information is from the base station. After receiving the first feedback information sent by the base station, the internet of things communicator 3 obtains the first digital signature from the first feedback information, and decrypts the first digital signature by using the public key to obtain the abstract. At this time, it can be determined whether the first feedback information is really sent by the base station through the summary, so as to authenticate that the base station to be connected is really the base station, thereby completing the authentication process.
Further, in order to verify that the first feedback information sent by the base station is not tampered with maliciously, the encryption and decryption module 8 may convert the response data in the first feedback information by using a hash function to obtain another digest, and at this time, by comparing the digest with the digest decrypted from the first digital signature, it is determined whether the first feedback information is tampered.
Through the steps, the video acquisition system can be ensured to be accurately connected into the available wireless network of the established base station without being maliciously interfered, and be connected into the available wireless network of the wrong base station, so that the transmission safety of subsequent video data is ensured.
On the other hand, for some available wireless networks with dedicated properties, it is also necessary to authenticate the security of the terminal device requesting to connect to the wireless network in order to ensure the security of other terminal devices connecting to the wireless network.
Specifically, as shown in fig. 6, a flowchart of a video capture system authentication method provided in an embodiment of the present application is shown, where the method includes:
s211, receiving a second encrypted plaintext sent by a base station corresponding to the available wireless network through the Internet of things communicator, wherein the second encrypted plaintext is obtained by encrypting a second verification plaintext through the base station;
s212, decrypting the second encrypted plaintext through an encryption and decryption module in the Internet of things communicator to obtain a second verification plaintext;
s213, converting the response data of the second verification plaintext through the hash function of the encryption and decryption module to obtain an abstract;
s214, encrypting the abstract through the encryption and decryption module to obtain second feedback information with a second digital signature;
s215, the second feedback information is sent to the base station through the Internet of things communicator, so that the base station authenticates the video acquisition system according to a second digital signature in the second feedback information, and an authentication result is generated;
s216, the authentication result sent by the base station is received through the Internet of things communicator.
The authentication process is the same as that of the wireless network, at this time, the video acquisition system is an authenticated object, and the base station corresponding to the wireless network can be used as the authentication object, at this time, the wireless network firstly encrypts the second verification plaintext and sends the second encryption plaintext to the video acquisition system, after receiving the second encryption plaintext, the video acquisition system needs to decrypt the second encryption plaintext through the encryption and decryption module 8 to obtain the second verification plaintext, and response data is generated according to the inquiry requirement contained in the second verification plaintext. The encryption and decryption module 8 converts the response data of the second verification plaintext through a hash function to obtain the digest. And the digest is encrypted by the encryption and decryption module 8 to obtain a second digital signature, and second feedback information is generated by using the response data and the second digital signature. And the second digital signature is used for authenticating the terminal equipment which sends the second feedback information as the video acquisition system.
At this time, the base station decrypts the second digital signature in the received second feedback information to obtain an encrypted digest text, and determines whether the sender of the second feedback information is the video acquisition system according to the digest. Similarly, in order to further prove that the second feedback information is not maliciously tampered in the transmission process, the base station may also convert the response data in the second feedback information by using a hash function to obtain an abstract, and determine whether the second feedback information is maliciously tampered by comparing the abstract with the abstract corresponding to the second digital signature.
Through the steps, the safety of the video acquisition system connected to the available wireless network of the base station can be ensured.
The process can effectively ensure the safety of subsequent video data transmission through double authentication.
And S3, if the authentication of the available wireless network is passed, connecting the available wireless network through the wireless network communicator, so that the video data collected by the camera device can be uploaded to a server through the available wireless network.
After the available wireless network is authenticated, the video data of the video capture system can be transmitted to the server through the available wireless network. Further, in order to comply with the safety rules of the working environment where the video capture system is located, the signal transmission power of the video capture system needs to be set.
Specifically, as shown in fig. 7, a flowchart of a method for setting a transmission power of a radio frequency signal provided in an embodiment of the present application is shown, where the method includes:
s301, decrypting the first feedback information through the encryption and decryption module in the Internet of things communicator to obtain a safe power range of the base station;
s302, the main control module controls the power of the radio frequency signal transmitted by the wireless network communicator to be within the safe power range according to the safe power range.
As can be seen from the above, the first feedback information fed back by the base station includes the safe power range of the base station, i.e. the power range of the radio frequency signal corresponding to the available wireless network of the base station. At this time, the main control module 1 needs to control the function of the radio frequency signal of the wireless network communicator 2 according to the safe power range. Typically, the frequency bands of wireless network communicator 2 are primarily 2.4GHz and 5 GHz. For example, if the safe power range allows, a frequency band of 5GHz can be set for communication, so that the transmission efficiency and quality can be effectively improved; if the safe power range is severe, the 2.4GHz frequency band can be set for communication, so as to ensure the use safety.
Further, in the working process of the main control module 1, a blocking situation may occur, that is, each device cannot be normally controlled to perform corresponding work, so that the video acquisition system cannot normally work. In order to find out such a situation in time and correct such a problem, a method as shown in fig. 8 may be adopted to provide a flowchart of a method for detecting a state of a master control module according to an embodiment of the present application, where the method includes:
s311, the working state detection module sends a working state inquiry instruction to the main control module according to a preset period;
and S312, if the working state detection module does not obtain the response of the main control module within a preset response time range, the working state detection module controls the main control module to start reset operation.
The network adapter 6 is additionally provided with a working state detection module 9, the working state detection module 9 has a function of sending a working state inquiry instruction at regular time, if the working state detection module 9 does not receive a response from the main control module 1 for a long time, it indicates that the main control module 1 is already in an abnormal working state, at this time, the working state detection module 9 needs to autonomously send a reset instruction to the main control module 1, so that the main control module starts reset operation in a restarting mode and the like.
After the video acquisition system is connected to the available wireless network, uploading of video data to the server can be started.
In one implementation, the video data collected by the camera device may be transmitted to the server in real time through the wireless network communicator 2.
In another implementation manner, a data storage module 12 is added to the network adapter 6, and the data storage module 12 may be used to store video data collected by the camera device 7. And then the main control module 1 transmits the video data in the data storage module 12 to the server through the wireless network communicator 2 according to a preset data transmission period. The method is suitable for the condition that the requirement on real-time monitoring is not high or the quality of the available wireless network is poor.
According to the technology, the data transmission method for the video acquisition system is provided, and firstly, the available wireless network is identified by using the internet of things communicator 3 in the video acquisition system. Then, the available wireless network is authenticated by the internet of things communicator 3. And if the available wireless network authentication is passed, connecting the available wireless network through the wireless network communicator 2 so that the video data collected by the camera device 7 can be uploaded to a server through the available wireless network. The video acquisition system can be powered by the rechargeable battery 5, so that the video acquisition equipment can still be normally used in the working environment without power supply equipment. Meanwhile, the wireless network to be connected can be authenticated between the connected wireless networks so as to ensure the transmission safety of the video data.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It will be understood that the present application is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (8)

1. A data transmission method for a video capture system, the method comprising:
the method comprises the steps that an available wireless network is identified by using an internet of things communicator inside a video acquisition system, the video acquisition system is powered by a rechargeable battery, and the video acquisition system comprises a main control module for controlling internal devices, a camera device for acquiring video data, a wireless network communicator arranged inside the main control module and used for wireless network data interaction and an internet of things communicator used for internet of things data interaction;
authenticating the available wireless network using the Internet of things communicator;
and if the available wireless network authentication is passed, connecting the available wireless network through the wireless network communicator so as to upload the video data acquired by the camera device to a server through the available wireless network.
2. The method of claim 1, wherein identifying available wireless networks using an internet of things communicator internal to the video capture system comprises:
receiving an Internet of things signal through the Internet of things communicator;
determining a target Internet of things signal from the Internet of things signals, wherein the target Internet of things signal is the Internet of things signal matched with the protocol of the Internet of things communicator;
and determining that the wireless network corresponding to the Internet of things signal is an available wireless network according to the target Internet of things signal.
3. The method of claim 1, wherein the authenticating the available wireless networks with the internet of things communicator comprises:
encrypting a first verification plaintext through an encryption and decryption module in the internet of things communicator to obtain a first encrypted plaintext;
sending the first encrypted plaintext to a base station corresponding to the available wireless network through the internet of things communicator, so that the base station generates first feedback information with a first digital signature according to the first encrypted plaintext;
receiving the first feedback information sent by the base station through the internet of things communicator;
decrypting, by the encryption and decryption module, a first data signature in the first feedback information to authenticate the available wireless network.
4. The method of claim 1, wherein the authenticating the available wireless networks with the internet of things communicator comprises:
receiving a second encrypted plaintext sent by a base station corresponding to the available wireless network through the internet-of-things communicator, wherein the second encrypted plaintext is obtained by encrypting a second verification plaintext through the base station;
decrypting the second encrypted plaintext through an encryption and decryption module in the internet of things communicator to obtain a second verification plaintext;
converting the response data of the second verification plaintext through the hash function of the encryption and decryption module to obtain an abstract;
encrypting the abstract through the encryption and decryption module to obtain second feedback information with a second digital signature;
sending the second feedback information to the base station through the internet of things communicator, so that the base station authenticates the video acquisition system according to a second digital signature in the second feedback information, and generates an authentication result;
and receiving the authentication result sent by the base station through the Internet of things communicator.
5. The method of claim 3, wherein the accessing the available wireless network through the wireless network communicator if the available wireless network is authenticated so that the video data collected by the camera device can be uploaded to a server through the available wireless network comprises:
decrypting the first feedback information through the encryption and decryption module in the internet of things communicator to obtain a safe power range of the base station;
and the main control module controls the power of the radio frequency signal transmitted by the wireless network communicator to be within the safe power range according to the safe power range.
6. The method according to claim 1, wherein the video capture system further comprises a working state detection module electrically connected to the master control module;
the working state detection module sends a working state inquiry instruction to the main control module according to a preset period;
and if the working state detection module does not obtain the response of the main control module within a preset response time range, the working state detection module controls the main control module to start reset operation.
7. The method of claim 1, further comprising:
and transmitting the video data acquired by the camera device to the server in real time through the wireless network communicator.
8. The method of claim 1, wherein the video capture system further comprises a data storage module, the method further comprising:
storing the video data collected by the camera device by using the data storage module;
and the main control module transmits the video data in the data storage module to the server through the wireless network communicator according to a preset data transmission period.
CN202010069625.9A 2020-01-21 2020-01-21 Data transmission method for video acquisition system Pending CN111182274A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010069625.9A CN111182274A (en) 2020-01-21 2020-01-21 Data transmission method for video acquisition system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010069625.9A CN111182274A (en) 2020-01-21 2020-01-21 Data transmission method for video acquisition system

Publications (1)

Publication Number Publication Date
CN111182274A true CN111182274A (en) 2020-05-19

Family

ID=70652860

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010069625.9A Pending CN111182274A (en) 2020-01-21 2020-01-21 Data transmission method for video acquisition system

Country Status (1)

Country Link
CN (1) CN111182274A (en)

Similar Documents

Publication Publication Date Title
US20060269066A1 (en) System and method for converting serial data into secure data packets configured for wireless transmission in a power system
CN110636052B (en) Power consumption data transmission system
CN109905869A (en) Data transmission method between a kind of charging equipment and smart machine
KR101431777B1 (en) Power distribution system secure access communication system and method
CN104319874A (en) On-line monitoring system and method for status of power transmission line of intelligent power grid
US9900296B2 (en) Securing communication within a network endpoint
CN110708164B (en) Control method and device for Internet of things equipment, storage medium and electronic device
CN106685775A (en) Self-inspection type invasion prevention method and system for intelligent household electrical appliance
CN112270020B (en) Terminal equipment safety encryption device based on safety chip
CN109151823B (en) eSIM card authentication method and system
CN112910100B (en) Credible power supply and receiving device and control method thereof
CN109152091B (en) Communication system for unmanned aerial vehicle cluster control
CN110635894B (en) Quantum key output method and system based on frame protocol format
CN112512064B (en) Wireless distribution network method, wireless gateway and equipment to be accessed
CN110278077B (en) Method, device, equipment and storage medium for acquiring data information of electric energy meter
CN211982008U (en) Video acquisition system
CN104410153B (en) IEC62351 intelligent substation process layer intelligent electronic device communication method and communication system
CN111182274A (en) Data transmission method for video acquisition system
CN114500064B (en) Communication security verification method and device, storage medium and electronic equipment
CN106411559A (en) Low voltage transformer area anti-electricity-stealing diagnosis system
CN110381505B (en) Method and device for accessing network hard disk video recorder
CN114258013B (en) Data encryption method, device and storage medium
CN112615740A (en) Transmission network communication safety system
CN113891313B (en) Communication access method for bulb tubular turbine and inspection monitoring equipment
CN113645623B (en) Remote fee control system, security authentication method and fee control device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination