CN113726782B - Computer network monitoring platform - Google Patents
Computer network monitoring platform Download PDFInfo
- Publication number
- CN113726782B CN113726782B CN202111012513.0A CN202111012513A CN113726782B CN 113726782 B CN113726782 B CN 113726782B CN 202111012513 A CN202111012513 A CN 202111012513A CN 113726782 B CN113726782 B CN 113726782B
- Authority
- CN
- China
- Prior art keywords
- module
- image
- video
- camera
- cloud server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/10—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
- H04N19/169—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the coding unit, i.e. the structural portion or semantic portion of the video signal being the object or the subject of the adaptive coding
- H04N19/188—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the coding unit, i.e. the structural portion or semantic portion of the video signal being the object or the subject of the adaptive coding the unit being a video data packet, e.g. a network abstraction layer [NAL] unit
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/42—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals characterised by implementation details or hardware specially adapted for video compression or decompression, e.g. dedicated software implementation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N23/00—Cameras or camera modules comprising electronic image sensors; Control thereof
- H04N23/60—Control of cameras or camera modules
- H04N23/695—Control of camera direction for changing a field of view, e.g. pan, tilt or based on tracking of objects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Abstract
The invention discloses a computer network monitoring platform, which comprises a camera, a rotation module, a signal module, a monitoring end, a compression module, an encryption module, a server, a decryption module, a feedback module, a display end, a cloud server, a mirror image module, a control end and a rotation control module; the camera is used for monitoring and capturing images; the rotation module is used for controlling the angle adjustment of the camera; the signal module is used for sending out image signals and receiving rotation control signals; the monitoring end rotates the work of the module, signal module; the compression module is used for compressing the image signals in the signal module; and the encryption module is used for converting the image signal in the signal module from the common MP4 format to the encrypted VEP format. According to the computer network monitoring platform, the video stream is compressed and encrypted in the process of being transmitted to the watching end through the camera, so that operators and hackers cannot easily see the privacy of the client, and the privacy security of the client is guaranteed to a certain extent.
Description
Technical Field
The invention relates to the technical field of network monitoring, in particular to a computer network monitoring platform.
Background
The network monitoring is monitoring equipment utilizing network technology, video streams of cameras are transmitted through a wired or wireless network and are backed up through a cloud server, and the network monitoring equipment is currently mainstream monitoring equipment, and has application in private home monitoring and public monitoring of enterprises or society.
Since these video streams are transmitted and backed up through the network, it is possible for operators and hackers to view the video content, so that the security of the privacy of the clients cannot be guaranteed, and we propose a computer network monitoring platform to solve the problem.
Disclosure of Invention
In order to overcome the defects in the prior art, the invention aims to provide a computer network monitoring platform which has the function of ensuring monitoring safety and privacy safety.
The invention adopts the following technical scheme for realizing the technical purpose: the computer network monitoring platform comprises a camera, a rotation module, a signal module, a monitoring end, a compression module, an encryption module, a server, a decryption module, a feedback module, a display end, a cloud server, a mirror image module, a control end and a rotation control module;
the camera is used for monitoring and capturing images;
the rotation module is used for controlling the angle adjustment of the camera;
the signal module is used for sending out image signals and receiving rotation control signals;
the monitoring end is used for controlling the work of the blending camera, the rotating module and the signal module;
the compression module is used for compressing the image signals in the signal module;
the encryption module is used for converting the image signals in the signal module from the common MP4 format to the encrypted VEP format and carrying out coding encryption on the signals sent by the rotation control module;
the server is used for controlling, allocating and transferring image signals and control signals between the monitoring end and the display end as well as between the cloud server;
the decryption module is used for converting the encrypted VEP file into a common MP4 file and transmitting the decrypted signal to the display end;
the feedback module is used for calling out the mirror image file when a person is found to perform violent decoding on the encrypted VEP file;
the display end is used for playing the real-time image captured by the camera and the historical image of the cloud server;
the cloud server is used for storing the historical images captured by the camera;
the mirror image module is used for randomly intercepting 2-5min video segments of each time period from a historical image in the cloud server, randomly composing the intercepted 576-1440 video segments into a 24h complete video according to time periods, continuously changing and recombining the video segments, and storing the video segments into the cloud server;
the control end is used for controlling the camera to move and the display end to play;
and the rotation control module is used for controlling the rotation module through the encryption command.
As optimization, the video segments used for the complete video in the mirroring module select the following acquisition modes according to the use environment:
(1) the method is used for public occasions: intercepting an image video segment from a normally recorded image video;
(2) the method is used for private occasions: the image video segment is cut out from the image video prepared in advance.
As optimization, the nodes for intercepting video segments do not have dynamic objects.
As an optimization, the violent decoding opens different encrypted VEP files, the played contents are different, but all the materials composing the video are obtained from pre-stored 576-1440 sections of video.
The invention has the following beneficial effects:
1. according to the computer network monitoring platform, compression encryption processing is carried out in the process of transmitting the video stream to the watching end through the camera, so that operators and hackers cannot easily see the privacy of clients, the crime cost is increased, and the privacy safety of the clients is guaranteed to a certain extent.
2. According to the computer network monitoring platform, the mirror image module is connected to the cloud server, when someone views the client monitoring video through illegal means, the synthesized mirror image file is played so as to confuse illegal viewers, the privacy safety of the client is further guaranteed, meanwhile, all the mirror image videos are formed by splicing 48H video segments in 576-1440 segments, the storage space of the cloud server is saved, and more monitoring files can be stored.
3. This computer network monitor platform utilizes encryption command to control camera mirror image rotation through rotating control module, looks over whether the camera presents image and angle and corresponds, prevents like this that there is the hacker to invade through the network, makes signal module convey the video of recording before, lets the customer unable real-time viewing the monitoring area image, has guaranteed customer monitoring area's security.
Drawings
FIG. 1 is a block diagram of the present invention.
Fig. 2 is a flow chart of the encryption of the present invention.
FIG. 3 is a flow chart of the mirror image file of the present invention.
Fig. 4 is a control flow chart of the camera according to the present invention.
Description of the embodiments
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Examples
Referring to fig. 1-2, a computer network monitoring platform includes a camera, a rotation module, a signal module, a monitoring end, a compression module, an encryption module, a server, a decryption module, a feedback module, a display end, a cloud server, a mirror module, a control end and a rotation control module;
the camera is used for monitoring and capturing images;
the signal module is used for sending out image signals and receiving rotation control signals;
the monitoring end is used for controlling the work of the blending camera, the rotating module and the signal module;
the compression module is used for compressing the image signals in the signal module;
the encryption module is used for converting the image signals in the signal module from the common MP4 format to the encrypted VEP format and carrying out coding encryption on the signals sent by the rotation control module;
the server is used for controlling, allocating and transferring image signals and control signals between the monitoring end and the display end as well as between the cloud server;
the decryption module is used for converting the encrypted VEP file into a common MP4 file and transmitting the decrypted signal to the display end;
the display end is used for playing the real-time image captured by the camera and the historical image of the cloud server.
A computer network monitoring platform operation method comprises the following steps:
s1, a camera transmits a shot image video to a signal module, compresses and encrypts an image video signal from a common MP4 file to generate a VEP file, and sends the VEP file to a server;
s2, transmitting the data to a display end after transferring and backing up by a server;
s3, before the image video signal enters the display end, decrypting the encrypted VEP file into a common MP4 file through a decryption module, and playing the common MP4 file through the display end;
s4, the display end plays the real-time video shot by the camera, and backs up the played video to the cloud server;
the video stream is compressed and encrypted in the process of being transmitted to the watching end by the camera, so that operators and hackers cannot easily see the privacy of the client, crime cost is increased, and the privacy security of the client is ensured to a certain extent.
Examples
Referring to fig. 1-3, a computer network monitoring platform includes a camera, a rotation module, a signal module, a monitoring end, a compression module, an encryption module, a server, a decryption module, a feedback module, a display end, a cloud server, a mirror module, a control end and a rotation control module;
the camera is used for monitoring and capturing images;
the signal module is used for sending out image signals and receiving rotation control signals;
the monitoring end is used for controlling the work of the blending camera, the rotating module and the signal module;
the compression module is used for compressing the image signals in the signal module;
the encryption module is used for converting the image signals in the signal module from the common MP4 format to the encrypted VEP format and carrying out coding encryption on the signals sent by the rotation control module;
the server is used for controlling, allocating and transferring image signals and control signals between the monitoring end and the display end as well as between the cloud server;
the decryption module is used for converting the encrypted VEP file into a common MP4 file and transmitting the decrypted signal to the display end;
the feedback module is used for calling out the mirror image file when a person is found to perform violent decoding on the encrypted VEP file;
the display end is used for playing the real-time image captured by the camera and the historical image of the cloud server;
the cloud server is used for storing the historical images captured by the camera;
the mirror image module is used for randomly intercepting 2-5min video segments of each time period from the historical images in the cloud server, randomly composing the intercepted 576-1440 video segments into a 24h complete video according to the time period, continuously changing and recombining the complete video, and storing the complete video into the cloud server.
A computer network monitoring platform operation method comprises the following steps:
s1, a camera transmits a shot image video to a signal module, compresses and encrypts an image video signal from a common MP4 file to generate a VEP file, and sends the VEP file to a server;
s2, transmitting the data to a display end after transferring and backing up by a server;
s3, before the image video signal enters the display end, decrypting the encrypted VEP file into a common MP4 file through a decryption module, and playing the common MP4 file through the display end;
s4, the display end plays the real-time video shot by the camera, and backs up the played video to the cloud server;
s5, randomly intercepting 2-5min image video segments of each time period from a historical image in the mirror image module cloud server, randomly composing the intercepted 576-1440 segments of video into a 24h complete video according to time periods, continuously changing and recombining the video, and storing the video into the cloud server;
and S6, when someone violently decodes the VEP file in the cloud server, the feedback module sends feedback, and the cloud server plays the video generated by the mirror image module.
The video segments used by the video in the mirror image module select the following acquisition modes according to the use environment:
(1) the method is used for public occasions: intercepting an image video segment from a normally recorded image video;
(2) the method is used for private occasions: the image video segment is cut out from the image video prepared in advance.
And S5, no dynamic object exists at the node for intercepting the video.
In S6, violent decoding opens different encrypted VEP files, the played contents are different, but all the materials composing the video are obtained from pre-stored 576-1440 sections of video.
By connecting the mirror image module to the cloud server, when someone views the client monitoring video through illegal means, the synthesized mirror image file is played to confuse illegal viewers, so that the privacy safety of the client is further ensured, and meanwhile, all the mirror image videos are spliced through 48H video segments which are formed by 576-1440 segments, so that the storage space of the cloud server is saved, and more monitoring files can be stored.
Examples
Referring to fig. 1-4, a computer network monitoring platform includes a camera, a rotation module, a signal module, a monitoring end, a compression module, an encryption module, a server, a decryption module, a feedback module, a display end, a cloud server, a mirror module, a control end and a rotation control module;
the camera is used for monitoring and capturing images;
the rotation module is used for controlling the angle adjustment of the camera;
the signal module is used for sending out image signals and receiving rotation control signals;
the monitoring end is used for controlling the work of the blending camera, the rotating module and the signal module;
the server is used for controlling, allocating and transferring image signals and control signals between the monitoring end and the display end as well as between the cloud server;
the display end is used for playing the real-time image captured by the camera and the historical image of the cloud server;
the cloud server is used for storing the historical images captured by the camera;
the control end is used for controlling the camera to move and the display end to play;
and the rotation control module is used for controlling the rotation module through the encryption command.
A computer network monitoring platform operation method comprises the following steps:
and the rotation control module is operated by the control end, the rotation control module encrypts the instruction and sends the instruction to the signal module, and finally the rotation module controls the camera to deflect according to the instruction.
The rotation control module utilizes the encryption instruction to control the rotation of the camera mirror image, and checks whether the image presented by the camera corresponds to the angle, so that hackers are prevented from invading through a network, the signal module transmits the video recorded before, clients cannot check the image of the monitoring area in real time, and the safety of the monitoring area of the clients is ensured.
Examples
Referring to fig. 1, a computer network monitoring platform includes a camera, a rotation module, a signal module, a monitoring end, a compression module, an encryption module, a server, a decryption module, a feedback module, a display end, a cloud server, a mirror image module, a control end and a rotation control module;
the camera is used for monitoring and capturing images;
the rotation module is used for controlling the angle adjustment of the camera;
the signal module is used for sending out image signals and receiving rotation control signals;
the monitoring end is used for controlling the work of the blending camera, the rotating module and the signal module;
the server is used for controlling, allocating and transferring image signals and control signals between the monitoring end and the display end as well as between the cloud server;
the display end is used for playing the real-time image captured by the camera and the historical image of the cloud server;
the cloud server is used for storing the historical images captured by the camera;
the control end is used for controlling the camera to move and the display end to play;
and the rotation control module is used for controlling the rotation module through the encryption command.
Examples
Referring to fig. 1-4, a computer network monitoring platform includes a camera, a rotation module, a signal module, a monitoring end, a compression module, an encryption module, a server, a decryption module, a feedback module, a display end, a cloud server, a mirror module, a control end and a rotation control module;
the camera is used for monitoring and capturing images;
the rotation module is used for controlling the angle adjustment of the camera;
the signal module is used for sending out image signals and receiving rotation control signals;
the monitoring end is used for controlling the work of the blending camera, the rotating module and the signal module;
the compression module is used for compressing the image signals in the signal module;
the encryption module is used for converting the image signals in the signal module from the common MP4 format to the encrypted VEP format and carrying out coding encryption on the signals sent by the rotation control module;
the server is used for controlling, allocating and transferring image signals and control signals between the monitoring end and the display end as well as between the cloud server;
the decryption module is used for converting the encrypted VEP file into a common MP4 file and transmitting the decrypted signal to the display end;
the feedback module is used for calling out the mirror image file when a person is found to perform violent decoding on the encrypted VEP file;
the display end is used for playing the real-time image captured by the camera and the historical image of the cloud server;
the cloud server is used for storing the historical images captured by the camera;
the mirror image module is used for randomly intercepting 2-5min video segments of each time period from a historical image in the cloud server, randomly composing the intercepted 576-1440 video segments into a 24h complete video according to time periods, continuously changing and recombining the video segments, and storing the video segments into the cloud server;
the control end is used for controlling the camera to move and the display end to play;
and the rotation control module is used for controlling the rotation module through the encryption command.
A computer network monitoring platform operation method comprises the following steps:
s1, a camera transmits a shot image video to a signal module, compresses and encrypts an image video signal from a common MP4 file to generate a VEP file, and sends the VEP file to a server;
s2, transmitting the data to a display end after transferring and backing up by a server;
s3, before the image video signal enters the display end, decrypting the encrypted VEP file into a common MP4 file through a decryption module, and playing the common MP4 file through the display end;
s4, the display end plays the real-time video shot by the camera, and backs up the played video to the cloud server;
s5, randomly intercepting 2-5min image video segments of each time period from a historical image in the mirror image module cloud server, randomly composing the intercepted 576-1440 segments of video into a 24h complete video according to time periods, continuously changing and recombining the video, and storing the video into the cloud server;
s6, when someone violently decodes the VEP file in the cloud server, the feedback module sends feedback, and the cloud server plays the video generated by the mirror image module;
and S7, operating the rotation control module through the control end, encrypting the instruction by the rotation control module, sending the encrypted instruction to the signal module, and finally controlling the camera to deflect by the rotation module according to the instruction.
The video segments used by the video in the mirror image module select the following acquisition modes according to the use environment:
(1) the method is used for public occasions: intercepting an image video segment from a normally recorded image video;
(2) the method is used for private occasions: the image video segment is cut out from the image video prepared in advance.
And S5, no dynamic object exists at the node for intercepting the video.
In S6, violent decoding opens different encrypted VEP files, the played contents are different, but all the materials composing the video are obtained from pre-stored 576-1440 sections of video.
In S6, violent decoding opens different encrypted VEP files, the played contents are different, but all the materials composing the video are obtained from pre-stored 576-1440 sections of video.
Although embodiments of the present invention have been shown and described, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations can be made therein without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (4)
1. A computer network monitoring platform, characterized in that: the system comprises a camera, a rotation module, a signal module, a monitoring end, a compression module, an encryption module, a server, a decryption module, a feedback module, a display end, a cloud server, a mirror image module, a control end and a rotation control module;
the camera is used for monitoring and capturing images;
the rotation module is used for controlling the angle adjustment of the camera;
the signal module is used for sending out image signals and receiving rotation control signals;
the monitoring end is used for controlling the work of the blending camera, the rotating module and the signal module;
the compression module is used for compressing the image signals in the signal module;
the encryption module is used for converting the image signals in the signal module from the common MP4 format to the encrypted VEP format and carrying out coding encryption on the signals sent by the rotation control module;
the server is used for controlling, allocating and transferring image signals and control signals between the monitoring end and the display end as well as between the cloud server;
the decryption module is used for converting the encrypted VEP file into a common MP4 file and transmitting the decrypted signal to the display end;
the feedback module is used for calling out the mirror image file when a person is found to perform violent decoding on the encrypted VEP file;
the display end is used for playing the real-time image captured by the camera and the historical image of the cloud server;
the cloud server is used for storing the historical images captured by the camera;
the mirror image module is used for randomly intercepting 2-5min video segments of each time period from a historical image in the cloud server, randomly composing the intercepted 576-1440 video segments into a 24h complete video according to time periods, continuously changing and recombining the video segments, and storing the video segments into the cloud server;
the control end is used for controlling the camera to move and the display end to play;
and the rotation control module is used for controlling the rotation module through the encryption command.
2. A computer network monitoring platform according to claim 1, wherein: the video segments used for the complete video in the mirror image module select the following acquisition modes according to the use environment:
(1) the method is used for public occasions: intercepting an image video segment from a normally recorded image video;
(2) the method is used for private occasions: the image video segment is cut out from the image video prepared in advance.
3. A computer network monitoring platform according to claim 2, wherein: no dynamic object exists at the node for intercepting the video segment.
4. A computer network monitoring platform according to claim 1, wherein: the violent decoding opens different encrypted VEP files, and the played contents are different, but the materials composing the video are all obtained from pre-stored 576-1440 sections of video.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111012513.0A CN113726782B (en) | 2021-08-31 | 2021-08-31 | Computer network monitoring platform |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111012513.0A CN113726782B (en) | 2021-08-31 | 2021-08-31 | Computer network monitoring platform |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113726782A CN113726782A (en) | 2021-11-30 |
CN113726782B true CN113726782B (en) | 2023-06-27 |
Family
ID=78679774
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111012513.0A Active CN113726782B (en) | 2021-08-31 | 2021-08-31 | Computer network monitoring platform |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113726782B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101175201A (en) * | 2007-06-14 | 2008-05-07 | 中山大学 | Method for recognizing fake real-time video |
CN101820531A (en) * | 2010-03-16 | 2010-09-01 | 江苏瀚远科技股份有限公司 | Video anti-counterfeiting monitoring device and monitoring method |
CN105075243A (en) * | 2013-02-02 | 2015-11-18 | 挪佛麦迪哥股份公司 | Embedded system for video processing with hardware means |
CN106412530A (en) * | 2016-12-08 | 2017-02-15 | 山东省科学院情报研究所 | IoT (Internet of Things) video monitoring system and method |
KR101707663B1 (en) * | 2016-08-24 | 2017-02-17 | 정재훈 | Video image puzzle secure transmission system and a control method using a CCTV camera |
CN106921827A (en) * | 2015-12-25 | 2017-07-04 | 北京计算机技术及应用研究所 | Secure network high-definition camera |
CN107295304A (en) * | 2017-06-23 | 2017-10-24 | 广州长视科技股份有限公司 | A kind of method that depth network monitoring video rapidly views record |
-
2021
- 2021-08-31 CN CN202111012513.0A patent/CN113726782B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101175201A (en) * | 2007-06-14 | 2008-05-07 | 中山大学 | Method for recognizing fake real-time video |
CN101820531A (en) * | 2010-03-16 | 2010-09-01 | 江苏瀚远科技股份有限公司 | Video anti-counterfeiting monitoring device and monitoring method |
CN105075243A (en) * | 2013-02-02 | 2015-11-18 | 挪佛麦迪哥股份公司 | Embedded system for video processing with hardware means |
CN106921827A (en) * | 2015-12-25 | 2017-07-04 | 北京计算机技术及应用研究所 | Secure network high-definition camera |
KR101707663B1 (en) * | 2016-08-24 | 2017-02-17 | 정재훈 | Video image puzzle secure transmission system and a control method using a CCTV camera |
CN106412530A (en) * | 2016-12-08 | 2017-02-15 | 山东省科学院情报研究所 | IoT (Internet of Things) video monitoring system and method |
CN107295304A (en) * | 2017-06-23 | 2017-10-24 | 广州长视科技股份有限公司 | A kind of method that depth network monitoring video rapidly views record |
Non-Patent Citations (1)
Title |
---|
彭传圣 ; .港口设施保安视频监控相关问题与技术方案.水运科学研究.(第03期), * |
Also Published As
Publication number | Publication date |
---|---|
CN113726782A (en) | 2021-11-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220021930A1 (en) | Reduced Hierarchy Key Management System and Method | |
JP4298499B2 (en) | Apparatus and method for watermarking digital video | |
US20170323542A1 (en) | Apparatus for security enhancement in closed circuit television using hardware security module and the method by using the same | |
CA2331419A1 (en) | Apparatus and method for distribution of high quality image and audio programs to remote locations | |
US7428755B2 (en) | Device that is used for secure diffusion controlled display private copying and management of and conditional access to MPEG-4-type audiovisual content rights | |
US20030099355A1 (en) | Security system for digital cinema | |
US8374348B2 (en) | Device for secure transmission recording and visualisation of audiovisual programmes | |
EP3691257B1 (en) | Internet protocol camera security system allowing secure encryption information to be transmitted | |
JP6768951B2 (en) | Network separator and video surveillance system equipped with this | |
CN109711117A (en) | For distributing the equipment, system and method for digital content | |
US11636183B2 (en) | Automated piracy detection | |
US7327936B2 (en) | Secured device for the processing of high-quality audiovisual works | |
CN113726782B (en) | Computer network monitoring platform | |
US11405684B1 (en) | Distributed media player for digital cinema | |
KR101750676B1 (en) | Cctv apparatus for communication with data encryption along with end-to-end path | |
KR20080040873A (en) | Digital video recorder | |
Liu et al. | Communication protection in IP-based video surveillance systems | |
CA2372810A1 (en) | Method and apparatus for access control of pre-encrypted on-demand television services | |
JPH1093949A (en) | Video distribution system and video access control method | |
CN113891171B (en) | Portable audio/video acquisition, storage and forwarding system based on RTMP/RTSP protocol | |
KR101857708B1 (en) | Network Separation Device and Video Surveillance System Employing the Same | |
CN116016994A (en) | Method suitable for high-efficiency video encryption transmission of Internet | |
JP2005167602A (en) | Video data transmitter | |
CN117135446A (en) | Remote photographing and uploading management system based on hidden camera | |
GB2575021A (en) | Security device for networked camera system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |