CN113242216A - Credible network camera based on domestic commercial cryptographic algorithm - Google Patents

Credible network camera based on domestic commercial cryptographic algorithm Download PDF

Info

Publication number
CN113242216A
CN113242216A CN202110440217.4A CN202110440217A CN113242216A CN 113242216 A CN113242216 A CN 113242216A CN 202110440217 A CN202110440217 A CN 202110440217A CN 113242216 A CN113242216 A CN 113242216A
Authority
CN
China
Prior art keywords
module
cryptographic algorithm
terminal access
camera
internal terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110440217.4A
Other languages
Chinese (zh)
Inventor
尹晶
高俊杰
焦禹程
刘闯
方天明
颜恒贵
张珂
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changchun University of Science and Technology College of Optical and Electronical Information
Original Assignee
Changchun University of Science and Technology College of Optical and Electronical Information
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changchun University of Science and Technology College of Optical and Electronical Information filed Critical Changchun University of Science and Technology College of Optical and Electronical Information
Priority to CN202110440217.4A priority Critical patent/CN113242216A/en
Publication of CN113242216A publication Critical patent/CN113242216A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/168Implementing security features at a particular protocol layer above the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • H04L69/163In-band adaptation of TCP data exchange; In-band control procedures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Mathematical Analysis (AREA)
  • General Physics & Mathematics (AREA)
  • Algebra (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Studio Devices (AREA)

Abstract

The invention discloses a credible network camera based on a domestic commercial cryptographic algorithm, which is characterized in that: the system comprises a trusted cloud service storage module, a camera module, an internal terminal access module, an external terminal access module and a cloud domestic commercial cryptographic algorithm module, wherein the trusted cloud service storage module and the camera module realize data transmission through a TLS (transport layer protocol) transmission protocol, the camera module and the internal terminal access module realize data transmission through a GLHG-based key management system, and the internal terminal access module adopts a private key to authenticate a login camera to realize identity authentication.

Description

Credible network camera based on domestic commercial cryptographic algorithm
Technical Field
The invention relates to the technical field of security and protection monitoring safety, in particular to a credible network camera based on a domestic commercial cryptographic algorithm.
Background
The password is used as a core technology and a basic support for maintaining national network and information security, plays an important role in maintaining national network space security, information security, economic security and the like, and the equipment credibility technology is to solve the insecurity of computers and network structures and fundamentally improve the security, and measures must be comprehensively taken from the aspects of chips, hardware structures, operating systems and the like.
In the existing credible network camera based on the domestic commercial cryptographic algorithm, video data shows explosive mass growth, the requirements for rapid storage and retrieval of mass data are more and more important, meanwhile, the security in the transmission process becomes a key point, the execution efficiency of key management is low, and the safety factor is low.
Disclosure of Invention
The invention aims to solve the problems provided above and provides a trusted network camera based on a domestic commercial cryptographic algorithm.
In order to achieve the purpose, the invention provides the following technical scheme: the method is characterized in that: including credible cloud service storage module, camera module, internal terminal access module, external terminal access module and high in the clouds domestic commercial cryptographic algorithm module, credible cloud service storage module passes through TLS propagation agreement with the camera module and realizes data transmission, camera module and internal terminal access module realize data transmission through GLHG based key management system, internal terminal access module adopts the authentication of private key authentication login camera realization identity, credible cloud service storage module adopts high in the clouds domestic commercial cryptographic algorithm module to realize safety protection, credible web camera's based on domestic commercial cryptographic algorithm step as follows:
the method comprises the following steps: the video recording is realized through the camera module;
step two: video data recorded by the camera module is transmitted to the trusted cloud service storage module through a TLS (transport layer security) transmission protocol, and encryption is realized through the cloud domestic commercial cryptographic algorithm module;
step three: by constructing a GLHG-based key management system and introducing a new ELGamal-based proxy re-encryption technology, more efficient and accurate key updating is completed, so that the change of related support management authority caused by change and new increase of an internal terminal access module can be realized;
step four: the internal terminal access module authenticates the identity by adopting a private key to authenticate the login camera, and realizes that the internal terminal accesses and calls a camera module recorded video stored in the credible cloud service storage module;
step five: the external terminal access module can realize identity authentication through the cloud domestic commercial cryptographic algorithm module and call a camera module recorded video stored in the trusted cloud service storage module.
Preferably, the TLS transport protocol is a session-based encryption and authentication internet protocol, and is configured to provide a secure communication channel between two communication subjects, where the TLS transport protocol is composed of two layers, namely, a TLS recording protocol and a TLS handshake protocol, and the TLS transport protocol is established in a protocol above a transmission layer TCP protocol, and serves a camera module, so as to implement encryption of a video recorded by the camera module and then functional transmission by the TCP.
Preferably, the TLS propagation protocol implementation steps are as follows: the method comprises the following steps: carrying out data encryption transmission by using a key negotiated by the internal terminal access module and the trusted cloud service storage module; step two: and the internal terminal access module and the trusted cloud service storage module negotiate to determine a group of key strings for data transmission encryption.
Preferably, the internal terminal access module adopts a private key to authenticate the login camera to realize identity authentication, the private key authenticates the login camera by adopting an RSA algorithm, and bidirectional authentication enables an administrator to manage the camera module on any equipment with a secret key, and the specific private key authentication steps are as follows: step one, an internal terminal access module initiates a session to transmit a public key to a server to obtain a response, the server requests a character string, the internal terminal access module exchanges the secret key, the internal terminal access module sends a response, the server receives a ciphertext and the server obtains a plaintext, the server is ensured to avoid being attacked by a man-in-the-middle in the transmission process through bidirectional authentication, and meanwhile, the security threat brought by a weak password is avoided.
Preferably, the cloud domestic commercial cryptographic algorithm module adopts an asymmetric cryptographic algorithm to encrypt a sender by a public key, a receiver decrypts by the private key, the external terminal access module decrypts by inputting the private key, the public key is generally public, the private key does not have the transmission problem, and the overall safety factor is increased.
Preferably, the asymmetric cryptographic algorithm adopts an SM 9-based identification cryptographic algorithm, the SM9 identification cryptographic algorithm is divided into a rule portion, a digital signature algorithm, a key exchange protocol, a key encapsulation mechanism and a public key encryption algorithm, the digital signature algorithm is realized based on an elliptic curve pair, the security of the digital signature algorithm is based on the property of elliptic curve bidirectional mapping, and the SM9 is higher than that of the same kind of algorithms.
Compared with the prior art, the invention has the beneficial effects that: the invention relates to a credible network camera based on a domestic commercial cryptographic algorithm, which adopts a TLS transmission protocol to ensure the safety and the high efficiency of a food data transmission process, improves the execution efficiency of key management through a cloud domestic commercial cryptographic algorithm module, a private key authentication login camera and a GLHG-based key management system, and completes authority processing on each video resource with high efficiency and high safety.
Drawings
Fig. 1 is a schematic diagram of a trusted webcam based on a domestic commercial cryptographic algorithm according to the present invention.
Fig. 2 is a flowchart of the private key authentication of the trusted network camera based on the domestic commercial cryptographic algorithm according to the present invention.
Fig. 3 is a flow chart of the trusted webcam asymmetric cryptographic algorithm based on the domestic commercial cryptographic algorithm of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-3, the present invention provides a technical solution: the method is characterized in that: the cloud service system comprises a trusted cloud service storage module, a camera module, an internal terminal access module, an external terminal access module and a cloud domestic commercial cryptographic algorithm module, wherein the trusted cloud service storage module and the camera module realize data transmission through a TLS (transport layer protocol), the camera module and the internal terminal access module realize data transmission through a GLHG-based key management system, the internal terminal access module adopts a private key to authenticate a login camera to realize identity authentication, the trusted cloud service storage module adopts the cloud domestic commercial cryptographic algorithm module to realize safety protection, the TLS transmission protocol is a session-based encryption and authentication internet protocol and is used for providing a safety communication channel between two communication main bodies, the TLS transmission protocol consists of two layers of a TLS recording protocol and a TLS handshake protocol, and the TLS transmission protocol is established in a protocol above a TCP (transmission control protocol) of a transmission layer, the method is used for the camera module, the video recorded by the camera module is encrypted and then transmitted to a Transmission Control Protocol (TCP) for function transmission, and the TLS transmission protocol is realized by the following steps: the method comprises the following steps: carrying out data encryption transmission by using a key negotiated by the internal terminal access module and the trusted cloud service storage module; step two: the internal terminal access module negotiates with the trusted cloud service storage module to determine a group of secret key strings for data transmission encryption, the internal terminal access module adopts a private key to authenticate and log in the camera to realize identity authentication, the private key authenticates and logs in the camera by adopting an RSA algorithm, bidirectional authentication enables an administrator to manage the camera module on equipment with keys installed at will, and the specific private key authentication steps are as follows: step one, an internal terminal access module initiates a session to transmit a public key to a server to obtain a response, the server requests a character string, the internal terminal access module exchanges the secret key, the internal terminal access module sends a response, the server receives a ciphertext and the server obtains a plaintext, the two-way authentication is used for ensuring that the server is prevented from being attacked by a man-in-the-middle in the transmission process and simultaneously avoiding the security threat brought by a weak password, the cloud domestic commercial cryptographic algorithm module adopts an asymmetric cryptographic algorithm sender to encrypt by the public key and a receiver to decrypt by a private key, the external terminal access module realizes decryption by inputting the private key, the public key is generally public, the private key does not have the transmission problem and increases the whole security coefficient, the asymmetric cryptographic algorithm adopts a cryptographic algorithm based on SM9 identification, the SM9 cryptographic algorithm is divided into a general rule part, a digital signature algorithm, a key exchange protocol, The digital signature algorithm is realized based on an elliptic curve pair, the safety of the digital signature algorithm is based on the property of bidirectional mapping of the elliptic curve, and SM9 is higher than that of the like algorithm.
The working principle of the invention is as follows: the method comprises the following steps: the video recording is realized through the camera module;
step two: video data recorded by the camera module is transmitted to the trusted cloud service storage module through a TLS (transport layer security) transmission protocol, and encryption is realized through the cloud domestic commercial cryptographic algorithm module;
step three: by constructing a GLHG-based key management system and introducing a new ELGamal-based proxy re-encryption technology, more efficient and accurate key updating is completed, so that the change of related support management authority caused by change and new increase of an internal terminal access module can be realized;
step four: the internal terminal access module authenticates the identity by adopting a private key to authenticate the login camera, and realizes that the internal terminal accesses and calls a camera module recorded video stored in the credible cloud service storage module;
step five: the external terminal access module can realize identity authentication through the cloud domestic commercial cryptographic algorithm module and call a camera module recorded video stored in the trusted cloud service storage module.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.

Claims (6)

1. A credible network camera based on domestic commercial cryptographic algorithm is characterized in that: including credible cloud service storage module, camera module, internal terminal access module, external terminal access module and high in the clouds domestic commercial cryptographic algorithm module, credible cloud service storage module passes through TLS propagation agreement with the camera module and realizes data transmission, camera module and internal terminal access module realize data transmission through GLHG based key management system, internal terminal access module adopts the authentication of private key authentication login camera realization identity, credible cloud service storage module adopts high in the clouds domestic commercial cryptographic algorithm module to realize safety protection, credible web camera's based on domestic commercial cryptographic algorithm step as follows:
the method comprises the following steps: the video recording is realized through the camera module;
step two: video data recorded by the camera module is transmitted to the trusted cloud service storage module through a TLS (transport layer security) transmission protocol, and encryption is realized through the cloud domestic commercial cryptographic algorithm module;
step three: by constructing a GLHG-based key management system and introducing a new ELGamal-based proxy re-encryption technology, more efficient and accurate key updating is completed, so that the change of related support management authority caused by change and new increase of an internal terminal access module can be realized;
step four: the internal terminal access module authenticates the identity by adopting a private key to authenticate the login camera, and realizes that the internal terminal accesses and calls a camera module recorded video stored in the credible cloud service storage module;
step five: the external terminal access module can realize identity authentication through the cloud domestic commercial cryptographic algorithm module and call a camera module recorded video stored in the trusted cloud service storage module.
2. The trusted webcam based on the domestic commercial cryptographic algorithm of claim 1, wherein: the TLS transmission protocol is a session-based encryption and authentication Interenet protocol and is used for providing a secure communication channel between two communication main bodies, the TLS transmission protocol consists of two layers, namely a TLS recording protocol and a TLS handshake protocol, the TLS transmission protocol is established on a protocol above a transmission layer TCP protocol and serves a camera module, and the function transmission of encrypting a video recorded by the camera module and then transmitting the video to the TCP is realized.
3. The trusted webcam based on the domestic commercial cryptographic algorithm of claim 2, wherein: the TLS transmission protocol is realized by the following steps: the method comprises the following steps: carrying out data encryption transmission by using a key negotiated by the internal terminal access module and the trusted cloud service storage module; step two: and the internal terminal access module and the trusted cloud service storage module negotiate to determine a group of key strings for data transmission encryption.
4. The trusted webcam based on the domestic commercial cryptographic algorithm of claim 1, wherein: the internal terminal access module adopts a private key to authenticate the login camera to realize identity authentication, the private key authenticates the login camera by adopting an RSA algorithm, bidirectional authentication enables an administrator to manage the camera module on equipment with keys installed at will, and the specific private key authentication steps are as follows: step one, an internal terminal access module initiates a session to transmit a public key to a server to obtain a response, the server requests a character string, the internal terminal access module exchanges the secret key, the internal terminal access module sends a response, the server receives a ciphertext, and the server obtains a plaintext.
5. The trusted webcam based on the domestic commercial cryptographic algorithm of claim 1, wherein: the cloud domestic commercial cryptographic algorithm module adopts an asymmetric cryptographic algorithm to encrypt by a public key, a receiver decrypts by a private key, and the external terminal access module decrypts by inputting the private key.
6. The trusted webcam based on the domestic commercial cryptographic algorithm of claim 5, wherein: the asymmetric cryptographic algorithm adopts an SM 9-based identification cryptographic algorithm, the SM9 identification cryptographic algorithm is divided into a rule part, a digital signature algorithm, a key exchange protocol, a key encapsulation mechanism and a public key encryption algorithm, and the digital signature algorithm is realized based on an elliptic curve pair.
CN202110440217.4A 2021-04-23 2021-04-23 Credible network camera based on domestic commercial cryptographic algorithm Pending CN113242216A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110440217.4A CN113242216A (en) 2021-04-23 2021-04-23 Credible network camera based on domestic commercial cryptographic algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110440217.4A CN113242216A (en) 2021-04-23 2021-04-23 Credible network camera based on domestic commercial cryptographic algorithm

Publications (1)

Publication Number Publication Date
CN113242216A true CN113242216A (en) 2021-08-10

Family

ID=77128963

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110440217.4A Pending CN113242216A (en) 2021-04-23 2021-04-23 Credible network camera based on domestic commercial cryptographic algorithm

Country Status (1)

Country Link
CN (1) CN113242216A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113726807A (en) * 2021-09-03 2021-11-30 烟台艾睿光电科技有限公司 Network camera access method, equipment, system and storage medium
CN116015688A (en) * 2023-01-07 2023-04-25 浙江乾行信息技术股份有限公司 Target data iteration method for commercial password feature collector

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050055727A1 (en) * 1997-12-04 2005-03-10 Pentax U.S.A., Inc. Integrated internet/intranet camera
CN103490895A (en) * 2013-09-12 2014-01-01 北京斯庄格科技有限公司 Industrial control identity authentication method and device with state cryptographic algorithms
US20150279198A1 (en) * 2014-03-28 2015-10-01 Oplink Communications, Inc. Security system access detection
US20160094340A1 (en) * 2014-09-26 2016-03-31 Intel Corporation Instructions and logic to provide simd sm4 cryptographic block cipher functionality
CN107947937A (en) * 2017-11-19 2018-04-20 天津光电安辰信息技术股份有限公司 A kind of safe audio-video encryption system and terminal authentication implementation method
CN207573453U (en) * 2017-06-14 2018-07-03 成都三零凯天通信实业有限公司 A kind of trustable network video camera based on domestic commercial cipher algorithm
CN108282456A (en) * 2017-12-08 2018-07-13 济南中维世纪科技有限公司 The method that web camera mandate accesses
CN108965824A (en) * 2018-08-13 2018-12-07 晋商博创(北京)科技有限公司 Video monitoring method, system, camera, server and client based on CPK
CN109583162A (en) * 2018-11-30 2019-04-05 上海芯钛信息科技有限公司 A kind of personal identification method and system based on national secret algorithm

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050055727A1 (en) * 1997-12-04 2005-03-10 Pentax U.S.A., Inc. Integrated internet/intranet camera
CN103490895A (en) * 2013-09-12 2014-01-01 北京斯庄格科技有限公司 Industrial control identity authentication method and device with state cryptographic algorithms
US20150279198A1 (en) * 2014-03-28 2015-10-01 Oplink Communications, Inc. Security system access detection
US20160094340A1 (en) * 2014-09-26 2016-03-31 Intel Corporation Instructions and logic to provide simd sm4 cryptographic block cipher functionality
CN207573453U (en) * 2017-06-14 2018-07-03 成都三零凯天通信实业有限公司 A kind of trustable network video camera based on domestic commercial cipher algorithm
CN107947937A (en) * 2017-11-19 2018-04-20 天津光电安辰信息技术股份有限公司 A kind of safe audio-video encryption system and terminal authentication implementation method
CN108282456A (en) * 2017-12-08 2018-07-13 济南中维世纪科技有限公司 The method that web camera mandate accesses
CN108965824A (en) * 2018-08-13 2018-12-07 晋商博创(北京)科技有限公司 Video monitoring method, system, camera, server and client based on CPK
CN109583162A (en) * 2018-11-30 2019-04-05 上海芯钛信息科技有限公司 A kind of personal identification method and system based on national secret algorithm

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
曹晓雯等: "可信云存储环境下基于银行摄像头安全的密钥管理方法与系统研究", 《无线互联科技》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113726807A (en) * 2021-09-03 2021-11-30 烟台艾睿光电科技有限公司 Network camera access method, equipment, system and storage medium
CN113726807B (en) * 2021-09-03 2023-07-14 烟台艾睿光电科技有限公司 Network camera access method, device, system and storage medium
CN116015688A (en) * 2023-01-07 2023-04-25 浙江乾行信息技术股份有限公司 Target data iteration method for commercial password feature collector

Similar Documents

Publication Publication Date Title
US11792169B2 (en) Cloud storage using encryption gateway with certificate authority identification
Khashan et al. Efficient hybrid centralized and blockchain-based authentication architecture for heterogeneous IoT systems
US20030196084A1 (en) System and method for secure wireless communications using PKI
EP1251670A2 (en) Negotiating secure connections through a proxy server
US20100031337A1 (en) Methods and systems for distributed security processing
US20220345298A1 (en) Systems and methods for providing signatureless, confidential and authentication of data during handshake for classical and quantum computing environments
CA3066728A1 (en) Cloud storage using encryption gateway with certificate authority identification
CN113242216A (en) Credible network camera based on domestic commercial cryptographic algorithm
CN211352206U (en) IPSec VPN cryptographic machine based on quantum key distribution
CN106230840A (en) A kind of command identifying method of high security
Li et al. Itls/idtls: Lightweight end-to-end security protocol for iot through minimal latency
Deng et al. A Framework of Blockchain-Based Security for WBANs
Mohamed et al. Extending hybrid approach to secure Trivial File Transfer Protocol in M2M communication: a comparative analysis
CN113037470A (en) Quantum encryption data transmission system based on cloud and cluster servers
Zhang et al. Secure Door on Cloud: A Secure Data Transmission Scheme to Protect Kafka's Data
Jain “Sec-KeyD” an efficient key distribution protocol for critical infrastructures
KENZHEBAYEVA et al. SIMPLIFIED AND SECURE AUTHENTICATION SCHEME FOR THE INTERNET OF THINGS
Faisal et al. Graphene: a secure cloud communication architecture
Belej et al. The features of security of transfer and storage data for the Internet of Things in Cloud Database
US12010102B1 (en) Hybrid cryptography virtual private networks
CN115514530B (en) Cloud-edge collaboration-based power system information interaction method and device
WO2023103099A1 (en) Control method and system for message storage processing and security authentication, and medium
CN102780812A (en) Method and system for achieving safe input by using mobile terminal
Zhiyong et al. Security Analysis of Cryptographic Mechanisms in the System
EP3051770A1 (en) User opt-in computer implemented method for monitoring network traffic data, network traffic controller and computer programs

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20210810

WD01 Invention patent application deemed withdrawn after publication