CN113242216A - Credible network camera based on domestic commercial cryptographic algorithm - Google Patents
Credible network camera based on domestic commercial cryptographic algorithm Download PDFInfo
- Publication number
- CN113242216A CN113242216A CN202110440217.4A CN202110440217A CN113242216A CN 113242216 A CN113242216 A CN 113242216A CN 202110440217 A CN202110440217 A CN 202110440217A CN 113242216 A CN113242216 A CN 113242216A
- Authority
- CN
- China
- Prior art keywords
- module
- cryptographic algorithm
- terminal access
- camera
- internal terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3249—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/168—Implementing security features at a particular protocol layer above the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
- H04L69/163—In-band adaptation of TCP data exchange; In-band control procedures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Mathematical Analysis (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Studio Devices (AREA)
Abstract
The invention discloses a credible network camera based on a domestic commercial cryptographic algorithm, which is characterized in that: the system comprises a trusted cloud service storage module, a camera module, an internal terminal access module, an external terminal access module and a cloud domestic commercial cryptographic algorithm module, wherein the trusted cloud service storage module and the camera module realize data transmission through a TLS (transport layer protocol) transmission protocol, the camera module and the internal terminal access module realize data transmission through a GLHG-based key management system, and the internal terminal access module adopts a private key to authenticate a login camera to realize identity authentication.
Description
Technical Field
The invention relates to the technical field of security and protection monitoring safety, in particular to a credible network camera based on a domestic commercial cryptographic algorithm.
Background
The password is used as a core technology and a basic support for maintaining national network and information security, plays an important role in maintaining national network space security, information security, economic security and the like, and the equipment credibility technology is to solve the insecurity of computers and network structures and fundamentally improve the security, and measures must be comprehensively taken from the aspects of chips, hardware structures, operating systems and the like.
In the existing credible network camera based on the domestic commercial cryptographic algorithm, video data shows explosive mass growth, the requirements for rapid storage and retrieval of mass data are more and more important, meanwhile, the security in the transmission process becomes a key point, the execution efficiency of key management is low, and the safety factor is low.
Disclosure of Invention
The invention aims to solve the problems provided above and provides a trusted network camera based on a domestic commercial cryptographic algorithm.
In order to achieve the purpose, the invention provides the following technical scheme: the method is characterized in that: including credible cloud service storage module, camera module, internal terminal access module, external terminal access module and high in the clouds domestic commercial cryptographic algorithm module, credible cloud service storage module passes through TLS propagation agreement with the camera module and realizes data transmission, camera module and internal terminal access module realize data transmission through GLHG based key management system, internal terminal access module adopts the authentication of private key authentication login camera realization identity, credible cloud service storage module adopts high in the clouds domestic commercial cryptographic algorithm module to realize safety protection, credible web camera's based on domestic commercial cryptographic algorithm step as follows:
the method comprises the following steps: the video recording is realized through the camera module;
step two: video data recorded by the camera module is transmitted to the trusted cloud service storage module through a TLS (transport layer security) transmission protocol, and encryption is realized through the cloud domestic commercial cryptographic algorithm module;
step three: by constructing a GLHG-based key management system and introducing a new ELGamal-based proxy re-encryption technology, more efficient and accurate key updating is completed, so that the change of related support management authority caused by change and new increase of an internal terminal access module can be realized;
step four: the internal terminal access module authenticates the identity by adopting a private key to authenticate the login camera, and realizes that the internal terminal accesses and calls a camera module recorded video stored in the credible cloud service storage module;
step five: the external terminal access module can realize identity authentication through the cloud domestic commercial cryptographic algorithm module and call a camera module recorded video stored in the trusted cloud service storage module.
Preferably, the TLS transport protocol is a session-based encryption and authentication internet protocol, and is configured to provide a secure communication channel between two communication subjects, where the TLS transport protocol is composed of two layers, namely, a TLS recording protocol and a TLS handshake protocol, and the TLS transport protocol is established in a protocol above a transmission layer TCP protocol, and serves a camera module, so as to implement encryption of a video recorded by the camera module and then functional transmission by the TCP.
Preferably, the TLS propagation protocol implementation steps are as follows: the method comprises the following steps: carrying out data encryption transmission by using a key negotiated by the internal terminal access module and the trusted cloud service storage module; step two: and the internal terminal access module and the trusted cloud service storage module negotiate to determine a group of key strings for data transmission encryption.
Preferably, the internal terminal access module adopts a private key to authenticate the login camera to realize identity authentication, the private key authenticates the login camera by adopting an RSA algorithm, and bidirectional authentication enables an administrator to manage the camera module on any equipment with a secret key, and the specific private key authentication steps are as follows: step one, an internal terminal access module initiates a session to transmit a public key to a server to obtain a response, the server requests a character string, the internal terminal access module exchanges the secret key, the internal terminal access module sends a response, the server receives a ciphertext and the server obtains a plaintext, the server is ensured to avoid being attacked by a man-in-the-middle in the transmission process through bidirectional authentication, and meanwhile, the security threat brought by a weak password is avoided.
Preferably, the cloud domestic commercial cryptographic algorithm module adopts an asymmetric cryptographic algorithm to encrypt a sender by a public key, a receiver decrypts by the private key, the external terminal access module decrypts by inputting the private key, the public key is generally public, the private key does not have the transmission problem, and the overall safety factor is increased.
Preferably, the asymmetric cryptographic algorithm adopts an SM 9-based identification cryptographic algorithm, the SM9 identification cryptographic algorithm is divided into a rule portion, a digital signature algorithm, a key exchange protocol, a key encapsulation mechanism and a public key encryption algorithm, the digital signature algorithm is realized based on an elliptic curve pair, the security of the digital signature algorithm is based on the property of elliptic curve bidirectional mapping, and the SM9 is higher than that of the same kind of algorithms.
Compared with the prior art, the invention has the beneficial effects that: the invention relates to a credible network camera based on a domestic commercial cryptographic algorithm, which adopts a TLS transmission protocol to ensure the safety and the high efficiency of a food data transmission process, improves the execution efficiency of key management through a cloud domestic commercial cryptographic algorithm module, a private key authentication login camera and a GLHG-based key management system, and completes authority processing on each video resource with high efficiency and high safety.
Drawings
Fig. 1 is a schematic diagram of a trusted webcam based on a domestic commercial cryptographic algorithm according to the present invention.
Fig. 2 is a flowchart of the private key authentication of the trusted network camera based on the domestic commercial cryptographic algorithm according to the present invention.
Fig. 3 is a flow chart of the trusted webcam asymmetric cryptographic algorithm based on the domestic commercial cryptographic algorithm of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-3, the present invention provides a technical solution: the method is characterized in that: the cloud service system comprises a trusted cloud service storage module, a camera module, an internal terminal access module, an external terminal access module and a cloud domestic commercial cryptographic algorithm module, wherein the trusted cloud service storage module and the camera module realize data transmission through a TLS (transport layer protocol), the camera module and the internal terminal access module realize data transmission through a GLHG-based key management system, the internal terminal access module adopts a private key to authenticate a login camera to realize identity authentication, the trusted cloud service storage module adopts the cloud domestic commercial cryptographic algorithm module to realize safety protection, the TLS transmission protocol is a session-based encryption and authentication internet protocol and is used for providing a safety communication channel between two communication main bodies, the TLS transmission protocol consists of two layers of a TLS recording protocol and a TLS handshake protocol, and the TLS transmission protocol is established in a protocol above a TCP (transmission control protocol) of a transmission layer, the method is used for the camera module, the video recorded by the camera module is encrypted and then transmitted to a Transmission Control Protocol (TCP) for function transmission, and the TLS transmission protocol is realized by the following steps: the method comprises the following steps: carrying out data encryption transmission by using a key negotiated by the internal terminal access module and the trusted cloud service storage module; step two: the internal terminal access module negotiates with the trusted cloud service storage module to determine a group of secret key strings for data transmission encryption, the internal terminal access module adopts a private key to authenticate and log in the camera to realize identity authentication, the private key authenticates and logs in the camera by adopting an RSA algorithm, bidirectional authentication enables an administrator to manage the camera module on equipment with keys installed at will, and the specific private key authentication steps are as follows: step one, an internal terminal access module initiates a session to transmit a public key to a server to obtain a response, the server requests a character string, the internal terminal access module exchanges the secret key, the internal terminal access module sends a response, the server receives a ciphertext and the server obtains a plaintext, the two-way authentication is used for ensuring that the server is prevented from being attacked by a man-in-the-middle in the transmission process and simultaneously avoiding the security threat brought by a weak password, the cloud domestic commercial cryptographic algorithm module adopts an asymmetric cryptographic algorithm sender to encrypt by the public key and a receiver to decrypt by a private key, the external terminal access module realizes decryption by inputting the private key, the public key is generally public, the private key does not have the transmission problem and increases the whole security coefficient, the asymmetric cryptographic algorithm adopts a cryptographic algorithm based on SM9 identification, the SM9 cryptographic algorithm is divided into a general rule part, a digital signature algorithm, a key exchange protocol, The digital signature algorithm is realized based on an elliptic curve pair, the safety of the digital signature algorithm is based on the property of bidirectional mapping of the elliptic curve, and SM9 is higher than that of the like algorithm.
The working principle of the invention is as follows: the method comprises the following steps: the video recording is realized through the camera module;
step two: video data recorded by the camera module is transmitted to the trusted cloud service storage module through a TLS (transport layer security) transmission protocol, and encryption is realized through the cloud domestic commercial cryptographic algorithm module;
step three: by constructing a GLHG-based key management system and introducing a new ELGamal-based proxy re-encryption technology, more efficient and accurate key updating is completed, so that the change of related support management authority caused by change and new increase of an internal terminal access module can be realized;
step four: the internal terminal access module authenticates the identity by adopting a private key to authenticate the login camera, and realizes that the internal terminal accesses and calls a camera module recorded video stored in the credible cloud service storage module;
step five: the external terminal access module can realize identity authentication through the cloud domestic commercial cryptographic algorithm module and call a camera module recorded video stored in the trusted cloud service storage module.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
Claims (6)
1. A credible network camera based on domestic commercial cryptographic algorithm is characterized in that: including credible cloud service storage module, camera module, internal terminal access module, external terminal access module and high in the clouds domestic commercial cryptographic algorithm module, credible cloud service storage module passes through TLS propagation agreement with the camera module and realizes data transmission, camera module and internal terminal access module realize data transmission through GLHG based key management system, internal terminal access module adopts the authentication of private key authentication login camera realization identity, credible cloud service storage module adopts high in the clouds domestic commercial cryptographic algorithm module to realize safety protection, credible web camera's based on domestic commercial cryptographic algorithm step as follows:
the method comprises the following steps: the video recording is realized through the camera module;
step two: video data recorded by the camera module is transmitted to the trusted cloud service storage module through a TLS (transport layer security) transmission protocol, and encryption is realized through the cloud domestic commercial cryptographic algorithm module;
step three: by constructing a GLHG-based key management system and introducing a new ELGamal-based proxy re-encryption technology, more efficient and accurate key updating is completed, so that the change of related support management authority caused by change and new increase of an internal terminal access module can be realized;
step four: the internal terminal access module authenticates the identity by adopting a private key to authenticate the login camera, and realizes that the internal terminal accesses and calls a camera module recorded video stored in the credible cloud service storage module;
step five: the external terminal access module can realize identity authentication through the cloud domestic commercial cryptographic algorithm module and call a camera module recorded video stored in the trusted cloud service storage module.
2. The trusted webcam based on the domestic commercial cryptographic algorithm of claim 1, wherein: the TLS transmission protocol is a session-based encryption and authentication Interenet protocol and is used for providing a secure communication channel between two communication main bodies, the TLS transmission protocol consists of two layers, namely a TLS recording protocol and a TLS handshake protocol, the TLS transmission protocol is established on a protocol above a transmission layer TCP protocol and serves a camera module, and the function transmission of encrypting a video recorded by the camera module and then transmitting the video to the TCP is realized.
3. The trusted webcam based on the domestic commercial cryptographic algorithm of claim 2, wherein: the TLS transmission protocol is realized by the following steps: the method comprises the following steps: carrying out data encryption transmission by using a key negotiated by the internal terminal access module and the trusted cloud service storage module; step two: and the internal terminal access module and the trusted cloud service storage module negotiate to determine a group of key strings for data transmission encryption.
4. The trusted webcam based on the domestic commercial cryptographic algorithm of claim 1, wherein: the internal terminal access module adopts a private key to authenticate the login camera to realize identity authentication, the private key authenticates the login camera by adopting an RSA algorithm, bidirectional authentication enables an administrator to manage the camera module on equipment with keys installed at will, and the specific private key authentication steps are as follows: step one, an internal terminal access module initiates a session to transmit a public key to a server to obtain a response, the server requests a character string, the internal terminal access module exchanges the secret key, the internal terminal access module sends a response, the server receives a ciphertext, and the server obtains a plaintext.
5. The trusted webcam based on the domestic commercial cryptographic algorithm of claim 1, wherein: the cloud domestic commercial cryptographic algorithm module adopts an asymmetric cryptographic algorithm to encrypt by a public key, a receiver decrypts by a private key, and the external terminal access module decrypts by inputting the private key.
6. The trusted webcam based on the domestic commercial cryptographic algorithm of claim 5, wherein: the asymmetric cryptographic algorithm adopts an SM 9-based identification cryptographic algorithm, the SM9 identification cryptographic algorithm is divided into a rule part, a digital signature algorithm, a key exchange protocol, a key encapsulation mechanism and a public key encryption algorithm, and the digital signature algorithm is realized based on an elliptic curve pair.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110440217.4A CN113242216A (en) | 2021-04-23 | 2021-04-23 | Credible network camera based on domestic commercial cryptographic algorithm |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110440217.4A CN113242216A (en) | 2021-04-23 | 2021-04-23 | Credible network camera based on domestic commercial cryptographic algorithm |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113242216A true CN113242216A (en) | 2021-08-10 |
Family
ID=77128963
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110440217.4A Pending CN113242216A (en) | 2021-04-23 | 2021-04-23 | Credible network camera based on domestic commercial cryptographic algorithm |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113242216A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113726807A (en) * | 2021-09-03 | 2021-11-30 | 烟台艾睿光电科技有限公司 | Network camera access method, equipment, system and storage medium |
CN116015688A (en) * | 2023-01-07 | 2023-04-25 | 浙江乾行信息技术股份有限公司 | Target data iteration method for commercial password feature collector |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050055727A1 (en) * | 1997-12-04 | 2005-03-10 | Pentax U.S.A., Inc. | Integrated internet/intranet camera |
CN103490895A (en) * | 2013-09-12 | 2014-01-01 | 北京斯庄格科技有限公司 | Industrial control identity authentication method and device with state cryptographic algorithms |
US20150279198A1 (en) * | 2014-03-28 | 2015-10-01 | Oplink Communications, Inc. | Security system access detection |
US20160094340A1 (en) * | 2014-09-26 | 2016-03-31 | Intel Corporation | Instructions and logic to provide simd sm4 cryptographic block cipher functionality |
CN107947937A (en) * | 2017-11-19 | 2018-04-20 | 天津光电安辰信息技术股份有限公司 | A kind of safe audio-video encryption system and terminal authentication implementation method |
CN207573453U (en) * | 2017-06-14 | 2018-07-03 | 成都三零凯天通信实业有限公司 | A kind of trustable network video camera based on domestic commercial cipher algorithm |
CN108282456A (en) * | 2017-12-08 | 2018-07-13 | 济南中维世纪科技有限公司 | The method that web camera mandate accesses |
CN108965824A (en) * | 2018-08-13 | 2018-12-07 | 晋商博创(北京)科技有限公司 | Video monitoring method, system, camera, server and client based on CPK |
CN109583162A (en) * | 2018-11-30 | 2019-04-05 | 上海芯钛信息科技有限公司 | A kind of personal identification method and system based on national secret algorithm |
-
2021
- 2021-04-23 CN CN202110440217.4A patent/CN113242216A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050055727A1 (en) * | 1997-12-04 | 2005-03-10 | Pentax U.S.A., Inc. | Integrated internet/intranet camera |
CN103490895A (en) * | 2013-09-12 | 2014-01-01 | 北京斯庄格科技有限公司 | Industrial control identity authentication method and device with state cryptographic algorithms |
US20150279198A1 (en) * | 2014-03-28 | 2015-10-01 | Oplink Communications, Inc. | Security system access detection |
US20160094340A1 (en) * | 2014-09-26 | 2016-03-31 | Intel Corporation | Instructions and logic to provide simd sm4 cryptographic block cipher functionality |
CN207573453U (en) * | 2017-06-14 | 2018-07-03 | 成都三零凯天通信实业有限公司 | A kind of trustable network video camera based on domestic commercial cipher algorithm |
CN107947937A (en) * | 2017-11-19 | 2018-04-20 | 天津光电安辰信息技术股份有限公司 | A kind of safe audio-video encryption system and terminal authentication implementation method |
CN108282456A (en) * | 2017-12-08 | 2018-07-13 | 济南中维世纪科技有限公司 | The method that web camera mandate accesses |
CN108965824A (en) * | 2018-08-13 | 2018-12-07 | 晋商博创(北京)科技有限公司 | Video monitoring method, system, camera, server and client based on CPK |
CN109583162A (en) * | 2018-11-30 | 2019-04-05 | 上海芯钛信息科技有限公司 | A kind of personal identification method and system based on national secret algorithm |
Non-Patent Citations (1)
Title |
---|
曹晓雯等: "可信云存储环境下基于银行摄像头安全的密钥管理方法与系统研究", 《无线互联科技》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113726807A (en) * | 2021-09-03 | 2021-11-30 | 烟台艾睿光电科技有限公司 | Network camera access method, equipment, system and storage medium |
CN113726807B (en) * | 2021-09-03 | 2023-07-14 | 烟台艾睿光电科技有限公司 | Network camera access method, device, system and storage medium |
CN116015688A (en) * | 2023-01-07 | 2023-04-25 | 浙江乾行信息技术股份有限公司 | Target data iteration method for commercial password feature collector |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11792169B2 (en) | Cloud storage using encryption gateway with certificate authority identification | |
Khashan et al. | Efficient hybrid centralized and blockchain-based authentication architecture for heterogeneous IoT systems | |
US20030196084A1 (en) | System and method for secure wireless communications using PKI | |
EP1251670A2 (en) | Negotiating secure connections through a proxy server | |
US20100031337A1 (en) | Methods and systems for distributed security processing | |
US20220345298A1 (en) | Systems and methods for providing signatureless, confidential and authentication of data during handshake for classical and quantum computing environments | |
CA3066728A1 (en) | Cloud storage using encryption gateway with certificate authority identification | |
CN113242216A (en) | Credible network camera based on domestic commercial cryptographic algorithm | |
CN211352206U (en) | IPSec VPN cryptographic machine based on quantum key distribution | |
CN106230840A (en) | A kind of command identifying method of high security | |
Li et al. | Itls/idtls: Lightweight end-to-end security protocol for iot through minimal latency | |
Deng et al. | A Framework of Blockchain-Based Security for WBANs | |
Mohamed et al. | Extending hybrid approach to secure Trivial File Transfer Protocol in M2M communication: a comparative analysis | |
CN113037470A (en) | Quantum encryption data transmission system based on cloud and cluster servers | |
Zhang et al. | Secure Door on Cloud: A Secure Data Transmission Scheme to Protect Kafka's Data | |
Jain | “Sec-KeyD” an efficient key distribution protocol for critical infrastructures | |
KENZHEBAYEVA et al. | SIMPLIFIED AND SECURE AUTHENTICATION SCHEME FOR THE INTERNET OF THINGS | |
Faisal et al. | Graphene: a secure cloud communication architecture | |
Belej et al. | The features of security of transfer and storage data for the Internet of Things in Cloud Database | |
US12010102B1 (en) | Hybrid cryptography virtual private networks | |
CN115514530B (en) | Cloud-edge collaboration-based power system information interaction method and device | |
WO2023103099A1 (en) | Control method and system for message storage processing and security authentication, and medium | |
CN102780812A (en) | Method and system for achieving safe input by using mobile terminal | |
Zhiyong et al. | Security Analysis of Cryptographic Mechanisms in the System | |
EP3051770A1 (en) | User opt-in computer implemented method for monitoring network traffic data, network traffic controller and computer programs |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20210810 |
|
WD01 | Invention patent application deemed withdrawn after publication |