CN111432186A - Monitoring system for video encryption - Google Patents
Monitoring system for video encryption Download PDFInfo
- Publication number
- CN111432186A CN111432186A CN202010393660.6A CN202010393660A CN111432186A CN 111432186 A CN111432186 A CN 111432186A CN 202010393660 A CN202010393660 A CN 202010393660A CN 111432186 A CN111432186 A CN 111432186A
- Authority
- CN
- China
- Prior art keywords
- video
- module
- encryption
- video encryption
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 39
- 238000004891 communication Methods 0.000 claims abstract description 19
- 230000005540 biological transmission Effects 0.000 abstract description 8
- 238000010586 diagram Methods 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
- H04N21/4405—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Closed-Circuit Television Systems (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The utility model provides a video encryption's monitored control system, including the internet protocol camera, first video encryption and decryption module, second video encryption and decryption module, cipher machine and video monitoring end, the internet protocol camera links to each other with first video encryption and decryption module, second video encryption and decryption module links to each other with the video monitoring end, the internet protocol camera, first video encryption module, second video encryption module, the cipher machine, the video monitoring end carries out the communication through the network, first video encryption and decryption module is including the first network communication module that connects gradually, first access control module, first cipher module. The second video encryption and decryption module comprises a second network communication module, a second access control module and a second password module which are connected in sequence. The invention avoids the security risks of illegal replacement of video equipment, safe authentication of video communication identity, interception and tampering of video data, and ensures the confidentiality and integrity of network video transmission, thereby greatly improving the security of the network video monitoring system.
Description
Technical Field
The invention relates to the field of video security, in particular to a monitoring system for video encryption.
Background
With the rapid development and popularization of computer technology, a fully digital network video monitoring system has gradually replaced the traditional analog monitoring system to become the mainstream of the video monitoring system. Video monitoring gradually develops from digitalization and simulation to networking, high-definition and intelligentization. Although the development prospect of network video monitoring is generally seen, in practical application, the security of a video monitoring system is not optimistic: the video monitoring equipment and the video monitoring system are frequently exposed to leaks, the video monitoring private network is lack of basic safety protection, the video data is abused and other safety problems seriously affect the safety of video monitoring services, wherein the video monitoring system faces the safety risk problems of replacement of a video source, tampering of the video data, safety transmission of the video data and the like, the video data is transmitted in the internet in a plaintext mode without any encryption, and hackers or illegal organizations can restore real video data through simple data packet grabbing tools to cause that the video data is illegally stolen and stolen.
Disclosure of Invention
The invention aims to provide a video encryption monitoring system, which comprises a network camera, a first video encryption and decryption module, a second video encryption and decryption module, a cipher machine and a video monitoring end, wherein the network camera is connected with the first video encryption and decryption module; the first video encryption and decryption module comprises a first network communication module, a first access control module and a first password module; the second video encryption and decryption module comprises a second network communication module, a second access control module and a second password module; the network camera is connected with the first video encryption and decryption module, and the second video encryption and decryption module is connected with the video monitoring end; the network camera, the first video encryption module, the second video encryption module, the cipher machine and the video monitoring terminal are communicated through a network; the first video encryption and decryption module comprises a first network communication module, a first access control module and a first password module which are connected in sequence; the second video encryption and decryption module comprises a second network communication module, a second access control module and a second password module which are connected in sequence.
The invention has the beneficial effects that:
(1) the network camera and the video monitoring end system and the structure of the original video monitoring system are not changed.
(2) The safety of the video monitoring system is ensured. The security risks that the video equipment is illegally replaced, the video communication identity is safely authenticated, and the video data is eavesdropped and tampered are avoided, so that the confidentiality and the integrity of network video transmission are ensured, and the security of a network video monitoring system is greatly improved.
Drawings
FIG. 1 is a schematic structural diagram of the present invention.
Fig. 2 is a schematic structural diagram of a first video encryption and decryption module.
Fig. 3 is a schematic structural diagram of a second video encryption/decryption module.
Fig. 4 is a transmission flow chart of encryption and decryption according to the present invention.
In the figure: 1-a web camera; 2-a first video encryption and decryption module; 3-a first network communication module; 4-a first admission control module; 5-a first cryptographic module; 6-a second video encryption and decryption module; 7-a second network communication module; 8-a second admission control module; 9-a second cryptographic module; 10-video monitoring terminal; 11-cipher machine.
Detailed Description
The invention will be described in further detail with reference to the following examples of the drawings in which:
referring to fig. 1, a monitoring system for video encryption comprises a network camera (1), a first video encryption and decryption module (2), a second video encryption and decryption module (6), a cipher machine (11) and a video monitoring terminal (10). The first video encryption and decryption module (2) comprises a first network communication module (3), a first access control module (4) and a first password module (5); the second video encryption and decryption module (6) comprises a second network communication module (7), a second access control module (8) and a second password module (9). The network camera (1) is connected with the first video encryption and decryption module (2), the second video encryption and decryption module (6) is connected with the video monitoring end (10), the network camera (1), the first video encryption module (2), the second video encryption module (6), the cipher machine (11) and the video monitoring end (10) are communicated through a network, and the first video encryption and decryption module (2) comprises a first network communication module (3), a first access control module (4) and a first cipher module (5) which are sequentially connected. The second video encryption and decryption module (6) comprises a second network communication module (7), a second access control module (8) and a second password module (9) which are connected in sequence.
The network camera (1) is used for realizing the acquisition, processing and network transmission of audio and video data in the video monitoring system.
The video monitoring terminal (10) is used for playing audio and video data in the video monitoring system.
The first video encryption and decryption module (2) is used for realizing access control, video data encryption and network transmission of network camera equipment.
The second video encryption and decryption module (6) is used for realizing access control, video data decryption and network transmission of the video monitoring terminal (10).
The cipher machine (11) is used for realizing identity authentication and generation and management of video encryption and decryption keys.
The embodiment of the invention realizes the access control, the identity authentication, the video data encryption and decryption and the safe transmission of the video data of the access equipment through the device.
In the embodiment of the present invention, except for the specific description of the model of each device, the model of other devices is not limited, as long as the device can perform the above functions.
Claims (1)
1. A video encryption monitoring system, comprising: the system comprises a network camera, a first video encryption and decryption module, a second video encryption and decryption module, a cipher machine and a video monitoring end; the first video encryption and decryption module comprises a first network communication module, a first access control module and a first password module; the second video encryption and decryption module comprises a second network communication module, a second access control module and a second password module; the network camera is connected with the first video encryption and decryption module, and the second video encryption and decryption module is connected with the video monitoring end; the network camera, the first video encryption module, the second video encryption module, the cipher machine and the video monitoring terminal are communicated through a network; the first video encryption and decryption module comprises a first network communication module, a first access control module and a first password module which are connected in sequence; the second video encryption and decryption module comprises a second network communication module, a second access control module and a second password module which are connected in sequence.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010393660.6A CN111432186A (en) | 2020-05-11 | 2020-05-11 | Monitoring system for video encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010393660.6A CN111432186A (en) | 2020-05-11 | 2020-05-11 | Monitoring system for video encryption |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111432186A true CN111432186A (en) | 2020-07-17 |
Family
ID=71555132
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010393660.6A Pending CN111432186A (en) | 2020-05-11 | 2020-05-11 | Monitoring system for video encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111432186A (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103051869A (en) * | 2012-11-15 | 2013-04-17 | 山东中孚信息产业股份有限公司 | System and method for encrypting camera video in real time |
CN211930752U (en) * | 2020-05-11 | 2020-11-13 | 中航长沙设计研究院有限公司 | Monitoring system for video encryption |
-
2020
- 2020-05-11 CN CN202010393660.6A patent/CN111432186A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103051869A (en) * | 2012-11-15 | 2013-04-17 | 山东中孚信息产业股份有限公司 | System and method for encrypting camera video in real time |
CN211930752U (en) * | 2020-05-11 | 2020-11-13 | 中航长沙设计研究院有限公司 | Monitoring system for video encryption |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Anzalchi et al. | A survey on security assessment of metering infrastructure in smart grid systems | |
Pant et al. | Three step data security model for cloud computing based on RSA and steganography | |
CN101989984A (en) | Electronic document safe sharing system and method thereof | |
CN113132388B (en) | Data security interaction method and system | |
CN102024123A (en) | Method and device for importing mirror image of virtual machine in cloud calculation | |
CN105610837A (en) | Method and system for identity authentication between master station and slave station in SCADA (Supervisory Control and Data Acquisition) system | |
Musa et al. | Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security | |
CN105471901A (en) | Industrial information security authentication system | |
CN113312608A (en) | Electric power metering terminal identity authentication method and system based on timestamp | |
CN107612680A (en) | A kind of national secret algorithm in mobile network's payment | |
Zhang et al. | A secure revocable fine-grained access control and data sharing scheme for SCADA in IIoT systems | |
CN211930752U (en) | Monitoring system for video encryption | |
CN101179470A (en) | Dual-protocol based VPN implementing method | |
CN111432186A (en) | Monitoring system for video encryption | |
CN101834852A (en) | Realization method of credible OpenSSH for protecting platform information | |
CN111010386B (en) | Privacy protection and data supervision control method based on shared account book | |
Kaushik et al. | A Review Paper on Data Encryption and Decryption | |
CN114173303A (en) | Train-ground session key generation method and system for CTCS-3 level train control system | |
CN109474429B (en) | Key configuration strategy method facing FC storage encryption gateway | |
Li et al. | Performance Test and Analysis of National Secret Algorithm SM2 in Power Data Protection | |
Zhang et al. | Application strategy of data encryption technology in computer network security | |
Liu et al. | Research on Secure Access Technology of Electric Power Wireless Private Network Based on Hybrid Encryption | |
CN104994096B (en) | A kind of dynamic load is in the collocation method of the security hardening mechanism module of intelligent substation communication manager | |
Wang et al. | Research on symmetric encryption and decryption of multi-user shared data for cloud storage environment | |
KR101210411B1 (en) | Transaction Protection System and Method using Connection of Certificate and OTP Generated by Keystream |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200717 |
|
RJ01 | Rejection of invention patent application after publication |