CN113726782B - Computer network monitoring platform - Google Patents

Computer network monitoring platform Download PDF

Info

Publication number
CN113726782B
CN113726782B CN202111012513.0A CN202111012513A CN113726782B CN 113726782 B CN113726782 B CN 113726782B CN 202111012513 A CN202111012513 A CN 202111012513A CN 113726782 B CN113726782 B CN 113726782B
Authority
CN
China
Prior art keywords
module
image
video
camera
cloud server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111012513.0A
Other languages
Chinese (zh)
Other versions
CN113726782A (en
Inventor
陈建新
陈玲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Food and Pharmaceutical Science College
Original Assignee
Jiangsu Food and Pharmaceutical Science College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Food and Pharmaceutical Science College filed Critical Jiangsu Food and Pharmaceutical Science College
Priority to CN202111012513.0A priority Critical patent/CN113726782B/en
Publication of CN113726782A publication Critical patent/CN113726782A/en
Application granted granted Critical
Publication of CN113726782B publication Critical patent/CN113726782B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/10Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
    • H04N19/169Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the coding unit, i.e. the structural portion or semantic portion of the video signal being the object or the subject of the adaptive coding
    • H04N19/188Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the coding unit, i.e. the structural portion or semantic portion of the video signal being the object or the subject of the adaptive coding the unit being a video data packet, e.g. a network abstraction layer [NAL] unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/42Methods or arrangements for coding, decoding, compressing or decompressing digital video signals characterised by implementation details or hardware specially adapted for video compression or decompression, e.g. dedicated software implementation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/60Control of cameras or camera modules
    • H04N23/695Control of camera direction for changing a field of view, e.g. pan, tilt or based on tracking of objects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention discloses a computer network monitoring platform, which comprises a camera, a rotation module, a signal module, a monitoring end, a compression module, an encryption module, a server, a decryption module, a feedback module, a display end, a cloud server, a mirror image module, a control end and a rotation control module; the camera is used for monitoring and capturing images; the rotation module is used for controlling the angle adjustment of the camera; the signal module is used for sending out image signals and receiving rotation control signals; the monitoring end rotates the work of the module, signal module; the compression module is used for compressing the image signals in the signal module; and the encryption module is used for converting the image signal in the signal module from the common MP4 format to the encrypted VEP format. According to the computer network monitoring platform, the video stream is compressed and encrypted in the process of being transmitted to the watching end through the camera, so that operators and hackers cannot easily see the privacy of the client, and the privacy security of the client is guaranteed to a certain extent.

Description

Computer network monitoring platform
Technical Field
The invention relates to the technical field of network monitoring, in particular to a computer network monitoring platform.
Background
The network monitoring is monitoring equipment utilizing network technology, video streams of cameras are transmitted through a wired or wireless network and are backed up through a cloud server, and the network monitoring equipment is currently mainstream monitoring equipment, and has application in private home monitoring and public monitoring of enterprises or society.
Since these video streams are transmitted and backed up through the network, it is possible for operators and hackers to view the video content, so that the security of the privacy of the clients cannot be guaranteed, and we propose a computer network monitoring platform to solve the problem.
Disclosure of Invention
In order to overcome the defects in the prior art, the invention aims to provide a computer network monitoring platform which has the function of ensuring monitoring safety and privacy safety.
The invention adopts the following technical scheme for realizing the technical purpose: the computer network monitoring platform comprises a camera, a rotation module, a signal module, a monitoring end, a compression module, an encryption module, a server, a decryption module, a feedback module, a display end, a cloud server, a mirror image module, a control end and a rotation control module;
the camera is used for monitoring and capturing images;
the rotation module is used for controlling the angle adjustment of the camera;
the signal module is used for sending out image signals and receiving rotation control signals;
the monitoring end is used for controlling the work of the blending camera, the rotating module and the signal module;
the compression module is used for compressing the image signals in the signal module;
the encryption module is used for converting the image signals in the signal module from the common MP4 format to the encrypted VEP format and carrying out coding encryption on the signals sent by the rotation control module;
the server is used for controlling, allocating and transferring image signals and control signals between the monitoring end and the display end as well as between the cloud server;
the decryption module is used for converting the encrypted VEP file into a common MP4 file and transmitting the decrypted signal to the display end;
the feedback module is used for calling out the mirror image file when a person is found to perform violent decoding on the encrypted VEP file;
the display end is used for playing the real-time image captured by the camera and the historical image of the cloud server;
the cloud server is used for storing the historical images captured by the camera;
the mirror image module is used for randomly intercepting 2-5min video segments of each time period from a historical image in the cloud server, randomly composing the intercepted 576-1440 video segments into a 24h complete video according to time periods, continuously changing and recombining the video segments, and storing the video segments into the cloud server;
the control end is used for controlling the camera to move and the display end to play;
and the rotation control module is used for controlling the rotation module through the encryption command.
As optimization, the video segments used for the complete video in the mirroring module select the following acquisition modes according to the use environment:
(1) the method is used for public occasions: intercepting an image video segment from a normally recorded image video;
(2) the method is used for private occasions: the image video segment is cut out from the image video prepared in advance.
As optimization, the nodes for intercepting video segments do not have dynamic objects.
As an optimization, the violent decoding opens different encrypted VEP files, the played contents are different, but all the materials composing the video are obtained from pre-stored 576-1440 sections of video.
The invention has the following beneficial effects:
1. according to the computer network monitoring platform, compression encryption processing is carried out in the process of transmitting the video stream to the watching end through the camera, so that operators and hackers cannot easily see the privacy of clients, the crime cost is increased, and the privacy safety of the clients is guaranteed to a certain extent.
2. According to the computer network monitoring platform, the mirror image module is connected to the cloud server, when someone views the client monitoring video through illegal means, the synthesized mirror image file is played so as to confuse illegal viewers, the privacy safety of the client is further guaranteed, meanwhile, all the mirror image videos are formed by splicing 48H video segments in 576-1440 segments, the storage space of the cloud server is saved, and more monitoring files can be stored.
3. This computer network monitor platform utilizes encryption command to control camera mirror image rotation through rotating control module, looks over whether the camera presents image and angle and corresponds, prevents like this that there is the hacker to invade through the network, makes signal module convey the video of recording before, lets the customer unable real-time viewing the monitoring area image, has guaranteed customer monitoring area's security.
Drawings
FIG. 1 is a block diagram of the present invention.
Fig. 2 is a flow chart of the encryption of the present invention.
FIG. 3 is a flow chart of the mirror image file of the present invention.
Fig. 4 is a control flow chart of the camera according to the present invention.
Description of the embodiments
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Examples
Referring to fig. 1-2, a computer network monitoring platform includes a camera, a rotation module, a signal module, a monitoring end, a compression module, an encryption module, a server, a decryption module, a feedback module, a display end, a cloud server, a mirror module, a control end and a rotation control module;
the camera is used for monitoring and capturing images;
the signal module is used for sending out image signals and receiving rotation control signals;
the monitoring end is used for controlling the work of the blending camera, the rotating module and the signal module;
the compression module is used for compressing the image signals in the signal module;
the encryption module is used for converting the image signals in the signal module from the common MP4 format to the encrypted VEP format and carrying out coding encryption on the signals sent by the rotation control module;
the server is used for controlling, allocating and transferring image signals and control signals between the monitoring end and the display end as well as between the cloud server;
the decryption module is used for converting the encrypted VEP file into a common MP4 file and transmitting the decrypted signal to the display end;
the display end is used for playing the real-time image captured by the camera and the historical image of the cloud server.
A computer network monitoring platform operation method comprises the following steps:
s1, a camera transmits a shot image video to a signal module, compresses and encrypts an image video signal from a common MP4 file to generate a VEP file, and sends the VEP file to a server;
s2, transmitting the data to a display end after transferring and backing up by a server;
s3, before the image video signal enters the display end, decrypting the encrypted VEP file into a common MP4 file through a decryption module, and playing the common MP4 file through the display end;
s4, the display end plays the real-time video shot by the camera, and backs up the played video to the cloud server;
the video stream is compressed and encrypted in the process of being transmitted to the watching end by the camera, so that operators and hackers cannot easily see the privacy of the client, crime cost is increased, and the privacy security of the client is ensured to a certain extent.
Examples
Referring to fig. 1-3, a computer network monitoring platform includes a camera, a rotation module, a signal module, a monitoring end, a compression module, an encryption module, a server, a decryption module, a feedback module, a display end, a cloud server, a mirror module, a control end and a rotation control module;
the camera is used for monitoring and capturing images;
the signal module is used for sending out image signals and receiving rotation control signals;
the monitoring end is used for controlling the work of the blending camera, the rotating module and the signal module;
the compression module is used for compressing the image signals in the signal module;
the encryption module is used for converting the image signals in the signal module from the common MP4 format to the encrypted VEP format and carrying out coding encryption on the signals sent by the rotation control module;
the server is used for controlling, allocating and transferring image signals and control signals between the monitoring end and the display end as well as between the cloud server;
the decryption module is used for converting the encrypted VEP file into a common MP4 file and transmitting the decrypted signal to the display end;
the feedback module is used for calling out the mirror image file when a person is found to perform violent decoding on the encrypted VEP file;
the display end is used for playing the real-time image captured by the camera and the historical image of the cloud server;
the cloud server is used for storing the historical images captured by the camera;
the mirror image module is used for randomly intercepting 2-5min video segments of each time period from the historical images in the cloud server, randomly composing the intercepted 576-1440 video segments into a 24h complete video according to the time period, continuously changing and recombining the complete video, and storing the complete video into the cloud server.
A computer network monitoring platform operation method comprises the following steps:
s1, a camera transmits a shot image video to a signal module, compresses and encrypts an image video signal from a common MP4 file to generate a VEP file, and sends the VEP file to a server;
s2, transmitting the data to a display end after transferring and backing up by a server;
s3, before the image video signal enters the display end, decrypting the encrypted VEP file into a common MP4 file through a decryption module, and playing the common MP4 file through the display end;
s4, the display end plays the real-time video shot by the camera, and backs up the played video to the cloud server;
s5, randomly intercepting 2-5min image video segments of each time period from a historical image in the mirror image module cloud server, randomly composing the intercepted 576-1440 segments of video into a 24h complete video according to time periods, continuously changing and recombining the video, and storing the video into the cloud server;
and S6, when someone violently decodes the VEP file in the cloud server, the feedback module sends feedback, and the cloud server plays the video generated by the mirror image module.
The video segments used by the video in the mirror image module select the following acquisition modes according to the use environment:
(1) the method is used for public occasions: intercepting an image video segment from a normally recorded image video;
(2) the method is used for private occasions: the image video segment is cut out from the image video prepared in advance.
And S5, no dynamic object exists at the node for intercepting the video.
In S6, violent decoding opens different encrypted VEP files, the played contents are different, but all the materials composing the video are obtained from pre-stored 576-1440 sections of video.
By connecting the mirror image module to the cloud server, when someone views the client monitoring video through illegal means, the synthesized mirror image file is played to confuse illegal viewers, so that the privacy safety of the client is further ensured, and meanwhile, all the mirror image videos are spliced through 48H video segments which are formed by 576-1440 segments, so that the storage space of the cloud server is saved, and more monitoring files can be stored.
Examples
Referring to fig. 1-4, a computer network monitoring platform includes a camera, a rotation module, a signal module, a monitoring end, a compression module, an encryption module, a server, a decryption module, a feedback module, a display end, a cloud server, a mirror module, a control end and a rotation control module;
the camera is used for monitoring and capturing images;
the rotation module is used for controlling the angle adjustment of the camera;
the signal module is used for sending out image signals and receiving rotation control signals;
the monitoring end is used for controlling the work of the blending camera, the rotating module and the signal module;
the server is used for controlling, allocating and transferring image signals and control signals between the monitoring end and the display end as well as between the cloud server;
the display end is used for playing the real-time image captured by the camera and the historical image of the cloud server;
the cloud server is used for storing the historical images captured by the camera;
the control end is used for controlling the camera to move and the display end to play;
and the rotation control module is used for controlling the rotation module through the encryption command.
A computer network monitoring platform operation method comprises the following steps:
and the rotation control module is operated by the control end, the rotation control module encrypts the instruction and sends the instruction to the signal module, and finally the rotation module controls the camera to deflect according to the instruction.
The rotation control module utilizes the encryption instruction to control the rotation of the camera mirror image, and checks whether the image presented by the camera corresponds to the angle, so that hackers are prevented from invading through a network, the signal module transmits the video recorded before, clients cannot check the image of the monitoring area in real time, and the safety of the monitoring area of the clients is ensured.
Examples
Referring to fig. 1, a computer network monitoring platform includes a camera, a rotation module, a signal module, a monitoring end, a compression module, an encryption module, a server, a decryption module, a feedback module, a display end, a cloud server, a mirror image module, a control end and a rotation control module;
the camera is used for monitoring and capturing images;
the rotation module is used for controlling the angle adjustment of the camera;
the signal module is used for sending out image signals and receiving rotation control signals;
the monitoring end is used for controlling the work of the blending camera, the rotating module and the signal module;
the server is used for controlling, allocating and transferring image signals and control signals between the monitoring end and the display end as well as between the cloud server;
the display end is used for playing the real-time image captured by the camera and the historical image of the cloud server;
the cloud server is used for storing the historical images captured by the camera;
the control end is used for controlling the camera to move and the display end to play;
and the rotation control module is used for controlling the rotation module through the encryption command.
Examples
Referring to fig. 1-4, a computer network monitoring platform includes a camera, a rotation module, a signal module, a monitoring end, a compression module, an encryption module, a server, a decryption module, a feedback module, a display end, a cloud server, a mirror module, a control end and a rotation control module;
the camera is used for monitoring and capturing images;
the rotation module is used for controlling the angle adjustment of the camera;
the signal module is used for sending out image signals and receiving rotation control signals;
the monitoring end is used for controlling the work of the blending camera, the rotating module and the signal module;
the compression module is used for compressing the image signals in the signal module;
the encryption module is used for converting the image signals in the signal module from the common MP4 format to the encrypted VEP format and carrying out coding encryption on the signals sent by the rotation control module;
the server is used for controlling, allocating and transferring image signals and control signals between the monitoring end and the display end as well as between the cloud server;
the decryption module is used for converting the encrypted VEP file into a common MP4 file and transmitting the decrypted signal to the display end;
the feedback module is used for calling out the mirror image file when a person is found to perform violent decoding on the encrypted VEP file;
the display end is used for playing the real-time image captured by the camera and the historical image of the cloud server;
the cloud server is used for storing the historical images captured by the camera;
the mirror image module is used for randomly intercepting 2-5min video segments of each time period from a historical image in the cloud server, randomly composing the intercepted 576-1440 video segments into a 24h complete video according to time periods, continuously changing and recombining the video segments, and storing the video segments into the cloud server;
the control end is used for controlling the camera to move and the display end to play;
and the rotation control module is used for controlling the rotation module through the encryption command.
A computer network monitoring platform operation method comprises the following steps:
s1, a camera transmits a shot image video to a signal module, compresses and encrypts an image video signal from a common MP4 file to generate a VEP file, and sends the VEP file to a server;
s2, transmitting the data to a display end after transferring and backing up by a server;
s3, before the image video signal enters the display end, decrypting the encrypted VEP file into a common MP4 file through a decryption module, and playing the common MP4 file through the display end;
s4, the display end plays the real-time video shot by the camera, and backs up the played video to the cloud server;
s5, randomly intercepting 2-5min image video segments of each time period from a historical image in the mirror image module cloud server, randomly composing the intercepted 576-1440 segments of video into a 24h complete video according to time periods, continuously changing and recombining the video, and storing the video into the cloud server;
s6, when someone violently decodes the VEP file in the cloud server, the feedback module sends feedback, and the cloud server plays the video generated by the mirror image module;
and S7, operating the rotation control module through the control end, encrypting the instruction by the rotation control module, sending the encrypted instruction to the signal module, and finally controlling the camera to deflect by the rotation module according to the instruction.
The video segments used by the video in the mirror image module select the following acquisition modes according to the use environment:
(1) the method is used for public occasions: intercepting an image video segment from a normally recorded image video;
(2) the method is used for private occasions: the image video segment is cut out from the image video prepared in advance.
And S5, no dynamic object exists at the node for intercepting the video.
In S6, violent decoding opens different encrypted VEP files, the played contents are different, but all the materials composing the video are obtained from pre-stored 576-1440 sections of video.
In S6, violent decoding opens different encrypted VEP files, the played contents are different, but all the materials composing the video are obtained from pre-stored 576-1440 sections of video.
Although embodiments of the present invention have been shown and described, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations can be made therein without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (4)

1. A computer network monitoring platform, characterized in that: the system comprises a camera, a rotation module, a signal module, a monitoring end, a compression module, an encryption module, a server, a decryption module, a feedback module, a display end, a cloud server, a mirror image module, a control end and a rotation control module;
the camera is used for monitoring and capturing images;
the rotation module is used for controlling the angle adjustment of the camera;
the signal module is used for sending out image signals and receiving rotation control signals;
the monitoring end is used for controlling the work of the blending camera, the rotating module and the signal module;
the compression module is used for compressing the image signals in the signal module;
the encryption module is used for converting the image signals in the signal module from the common MP4 format to the encrypted VEP format and carrying out coding encryption on the signals sent by the rotation control module;
the server is used for controlling, allocating and transferring image signals and control signals between the monitoring end and the display end as well as between the cloud server;
the decryption module is used for converting the encrypted VEP file into a common MP4 file and transmitting the decrypted signal to the display end;
the feedback module is used for calling out the mirror image file when a person is found to perform violent decoding on the encrypted VEP file;
the display end is used for playing the real-time image captured by the camera and the historical image of the cloud server;
the cloud server is used for storing the historical images captured by the camera;
the mirror image module is used for randomly intercepting 2-5min video segments of each time period from a historical image in the cloud server, randomly composing the intercepted 576-1440 video segments into a 24h complete video according to time periods, continuously changing and recombining the video segments, and storing the video segments into the cloud server;
the control end is used for controlling the camera to move and the display end to play;
and the rotation control module is used for controlling the rotation module through the encryption command.
2. A computer network monitoring platform according to claim 1, wherein: the video segments used for the complete video in the mirror image module select the following acquisition modes according to the use environment:
(1) the method is used for public occasions: intercepting an image video segment from a normally recorded image video;
(2) the method is used for private occasions: the image video segment is cut out from the image video prepared in advance.
3. A computer network monitoring platform according to claim 2, wherein: no dynamic object exists at the node for intercepting the video segment.
4. A computer network monitoring platform according to claim 1, wherein: the violent decoding opens different encrypted VEP files, and the played contents are different, but the materials composing the video are all obtained from pre-stored 576-1440 sections of video.
CN202111012513.0A 2021-08-31 2021-08-31 Computer network monitoring platform Active CN113726782B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111012513.0A CN113726782B (en) 2021-08-31 2021-08-31 Computer network monitoring platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111012513.0A CN113726782B (en) 2021-08-31 2021-08-31 Computer network monitoring platform

Publications (2)

Publication Number Publication Date
CN113726782A CN113726782A (en) 2021-11-30
CN113726782B true CN113726782B (en) 2023-06-27

Family

ID=78679774

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111012513.0A Active CN113726782B (en) 2021-08-31 2021-08-31 Computer network monitoring platform

Country Status (1)

Country Link
CN (1) CN113726782B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101175201A (en) * 2007-06-14 2008-05-07 中山大学 Method for recognizing fake real-time video
CN101820531A (en) * 2010-03-16 2010-09-01 江苏瀚远科技股份有限公司 Video anti-counterfeiting monitoring device and monitoring method
CN105075243A (en) * 2013-02-02 2015-11-18 挪佛麦迪哥股份公司 Embedded system for video processing with hardware means
CN106412530A (en) * 2016-12-08 2017-02-15 山东省科学院情报研究所 IoT (Internet of Things) video monitoring system and method
KR101707663B1 (en) * 2016-08-24 2017-02-17 정재훈 Video image puzzle secure transmission system and a control method using a CCTV camera
CN106921827A (en) * 2015-12-25 2017-07-04 北京计算机技术及应用研究所 Secure network high-definition camera
CN107295304A (en) * 2017-06-23 2017-10-24 广州长视科技股份有限公司 A kind of method that depth network monitoring video rapidly views record

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101175201A (en) * 2007-06-14 2008-05-07 中山大学 Method for recognizing fake real-time video
CN101820531A (en) * 2010-03-16 2010-09-01 江苏瀚远科技股份有限公司 Video anti-counterfeiting monitoring device and monitoring method
CN105075243A (en) * 2013-02-02 2015-11-18 挪佛麦迪哥股份公司 Embedded system for video processing with hardware means
CN106921827A (en) * 2015-12-25 2017-07-04 北京计算机技术及应用研究所 Secure network high-definition camera
KR101707663B1 (en) * 2016-08-24 2017-02-17 정재훈 Video image puzzle secure transmission system and a control method using a CCTV camera
CN106412530A (en) * 2016-12-08 2017-02-15 山东省科学院情报研究所 IoT (Internet of Things) video monitoring system and method
CN107295304A (en) * 2017-06-23 2017-10-24 广州长视科技股份有限公司 A kind of method that depth network monitoring video rapidly views record

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
彭传圣 ; .港口设施保安视频监控相关问题与技术方案.水运科学研究.(第03期), *

Also Published As

Publication number Publication date
CN113726782A (en) 2021-11-30

Similar Documents

Publication Publication Date Title
US20220021930A1 (en) Reduced Hierarchy Key Management System and Method
JP4298499B2 (en) Apparatus and method for watermarking digital video
US20170323542A1 (en) Apparatus for security enhancement in closed circuit television using hardware security module and the method by using the same
CA2331419A1 (en) Apparatus and method for distribution of high quality image and audio programs to remote locations
US7428755B2 (en) Device that is used for secure diffusion controlled display private copying and management of and conditional access to MPEG-4-type audiovisual content rights
US20030099355A1 (en) Security system for digital cinema
US8374348B2 (en) Device for secure transmission recording and visualisation of audiovisual programmes
EP3691257B1 (en) Internet protocol camera security system allowing secure encryption information to be transmitted
JP6768951B2 (en) Network separator and video surveillance system equipped with this
CN109711117A (en) For distributing the equipment, system and method for digital content
US11636183B2 (en) Automated piracy detection
US7327936B2 (en) Secured device for the processing of high-quality audiovisual works
CN113726782B (en) Computer network monitoring platform
US11405684B1 (en) Distributed media player for digital cinema
KR101750676B1 (en) Cctv apparatus for communication with data encryption along with end-to-end path
KR20080040873A (en) Digital video recorder
Liu et al. Communication protection in IP-based video surveillance systems
CA2372810A1 (en) Method and apparatus for access control of pre-encrypted on-demand television services
JPH1093949A (en) Video distribution system and video access control method
CN113891171B (en) Portable audio/video acquisition, storage and forwarding system based on RTMP/RTSP protocol
KR101857708B1 (en) Network Separation Device and Video Surveillance System Employing the Same
CN116016994A (en) Method suitable for high-efficiency video encryption transmission of Internet
JP2005167602A (en) Video data transmitter
CN117135446A (en) Remote photographing and uploading management system based on hidden camera
GB2575021A (en) Security device for networked camera system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant