CN114584793B - Video network transmission safety verification method and system with environment data - Google Patents

Video network transmission safety verification method and system with environment data Download PDF

Info

Publication number
CN114584793B
CN114584793B CN202210182848.5A CN202210182848A CN114584793B CN 114584793 B CN114584793 B CN 114584793B CN 202210182848 A CN202210182848 A CN 202210182848A CN 114584793 B CN114584793 B CN 114584793B
Authority
CN
China
Prior art keywords
acquisition information
video
information
server
environment data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210182848.5A
Other languages
Chinese (zh)
Other versions
CN114584793A (en
Inventor
吴文逍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Boviss Technology Co ltd
Original Assignee
Beijing Boviss Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Boviss Technology Co ltd filed Critical Beijing Boviss Technology Co ltd
Priority to CN202210182848.5A priority Critical patent/CN114584793B/en
Publication of CN114584793A publication Critical patent/CN114584793A/en
Application granted granted Critical
Publication of CN114584793B publication Critical patent/CN114584793B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/21Server components or server architectures
    • H04N21/218Source of audio or video content, e.g. local disk arrays
    • H04N21/21805Source of audio or video content, e.g. local disk arrays enabling multiple viewpoints, e.g. using a plurality of cameras
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/239Interfacing the upstream path of the transmission network, e.g. prioritizing client content requests
    • H04N21/2393Interfacing the upstream path of the transmission network, e.g. prioritizing client content requests involving handling client requests
    • H04N21/2396Interfacing the upstream path of the transmission network, e.g. prioritizing client content requests involving handling client requests characterized by admission policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25808Management of client data
    • H04N21/25816Management of client data involving client authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Graphics (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Studio Devices (AREA)

Abstract

The application relates to a video network transmission safety verification method and system with environmental data. The verification method of the server comprises the following steps: generating a sending sequence number according to a sending time sequence of the broadcast; receiving actual acquisition information returned by the video terminal; judging whether the actual collected information is credible according to the actual collected information; if the actual acquisition information is credible, determining target acquisition information according to the actual acquisition information; judging whether the target acquisition information is credible according to a preset distribution rule, a sending sequence number and the target acquisition information; and if the target acquisition information is not credible, outputting prompt information. The video terminal transmission method comprises the following steps: acquiring a sending sequence number; calling an environment data transmission combination according to the sending sequence number; and according to the environment data transmission combination, corresponding environment data are superposed to the video data acquired by the video terminal, and actual acquisition information is generated and output. The method and the device have the effect of reducing the probability of data leakage.

Description

Video network transmission safety verification method and system with environment data
Technical Field
The present application relates to the field of network security technologies, and in particular, to a method and a system for verifying security of video network transmission with environmental data.
Background
The camera can help a manager to realize remote monitoring of the target environment in a visual mode, so that the manager can know the environmental data of the target environment more intuitively. Environmental data such as temperature, humidity, light intensity, etc. At present, in order to overlay the environmental data onto the video image, an environmental data acquisition sensor is used to acquire the environmental data, and the acquired environmental data is transmitted to a character overlay device. The camera also transmits video pictures to the character superimposer. The character superimposer is used for superimposing the environmental data into the video picture.
Aiming at the related technologies, the inventor finds that the superposition effect is realized by adopting the camera, the environment acquisition sensor and the character adder, and the equipment such as the camera, the environment acquisition sensor, the character adder and the like is easy to be illegally invaded, and the illegal invasion comprises the condition of data leakage caused by illegal hardware replacement or illegal software program invasion. In the data transmission process, if any one of the devices such as the camera, the environment acquisition sensor, the character superimposer and the like is illegally invaded, the probability of data leakage is increased.
Disclosure of Invention
The application provides a video network transmission safety verification method and system with environmental data, which have the characteristic of reducing the probability of data leakage.
The application aims to provide a video network transmission safety verification method with environment data.
The above object of the present application is achieved by the following technical solutions:
a video network transmission security verification method with environment data is provided, the video network comprises a server and a plurality of video terminals connected with the server, and the server, in the process of receiving the data of the video terminals:
generating a sending sequence number according to a sending time sequence of the broadcast;
receiving actual acquisition information returned by the video terminal;
judging whether the actual acquisition information is credible according to the actual acquisition information;
if the actual acquisition information is credible, determining target acquisition information according to the actual acquisition information;
judging whether the target acquisition information is credible or not according to a preset distribution rule, a sending sequence number and the target acquisition information, wherein the preset distribution rule comprises environment data transmission combinations in one-to-one correspondence with the sending sequence number;
and if the target acquisition information is not credible, outputting prompt information.
By adopting the technical scheme, when the video terminal works, the server randomly outputs the sending serial number, and the video terminal receives the sending serial number; and then the server determines the sequence of receiving the actual acquisition information returned by the video terminal according to the sending sequence number received by the video terminal, and performs first safety check after receiving the actual acquisition information returned by the video terminal. If the actual collected information passes the first safety check, setting the actual collected information as target collected information and continuing to perform the second safety check; otherwise, the server outputs prompt information to prompt the manager that the video terminal outputting the actual acquisition information is illegally invaded. And if the target acquisition information does not pass the safety verification, the server outputs prompt information to prompt a manager that the video terminal corresponding to the target acquisition information is illegally invaded. The accuracy of the safety verification of data transmission is effectively improved through the two times of safety verification, so that the probability of data leakage is reduced.
The present application may be further configured in a preferred example to: and the server determines the sequence of receiving the actual acquisition information returned by the video terminal according to the sending sequence number received by the video terminal.
By adopting the technical scheme, the server only carries out safety verification on one video terminal at any moment, thereby reducing the calculation complexity of the server.
The present application may be further configured in a preferred example to: judging whether the actual acquisition information is credibly included according to the actual acquisition information;
judging whether the actual acquisition information contains environmental data or not;
if yes, the actual collected information is credible;
if not, the actual collected information is not credible, and prompt information is output.
By adopting the technical scheme, the environmental data is obtained by the video terminal monitoring the target environment, and if the actually acquired information does not contain the environmental data, the video terminal outputting the actually acquired information only comprises the camera and does not contain the environmental data acquisition device, so that the video terminal has a security hole illegally replaced by the common camera.
The present application may be further configured in a preferred example to: the method for determining the target acquisition information according to the actual acquisition information comprises the following steps:
if the actual acquisition information is credible, the actual acquisition information is target acquisition information;
if the actual collected information is not credible, the actual collected information is illegal collected information;
and outputting prompt information according to the illegal acquisition information.
By adopting the technical scheme, the actual acquired information which passes the first safety check is set as the target acquired information, so that the target acquired information is convenient to carry out the second safety check; and setting the actual acquisition information which does not pass the first security verification as illegal acquisition information and outputting prompt information to prompt a manager that the video terminal corresponding to the illegal acquisition information is illegally invaded.
The present application may be further configured in a preferred example to: the step of judging whether the target acquisition information is credible according to the preset distribution rule, the sending sequence number and the target acquisition information comprises the following steps:
determining an environment data transmission combination according to the sending sequence number;
judging whether the environment data transmission combination corresponds to the target acquisition information or not;
and if not, judging that the target acquisition information is not credible.
By adopting the technical scheme, the server calls the corresponding environmental data transmission combination in the distribution rule according to the sending sequence number received by the video terminal, then compares the target acquisition information with the environmental data transmission combination, if the target acquisition information does not correspond to the environmental data transmission combination, for example, the environmental data transmission combination comprises an environmental picture, an environmental temperature, an environmental rainfall and an environmental wind direction, the target acquisition information comprises an environmental picture, an environmental temperature and an environmental wind direction, and because the actual acquisition information lacks the environmental rainfall, the target acquisition information is considered not to correspond to the environmental data transmission combination. And when the target acquisition information does not correspond to the environmental data transmission combination, judging that the target acquisition information is not credible and outputting prompt information so as to prompt a manager that the video terminal corresponding to the target acquisition information is illegally invaded.
The present application may be further configured in a preferred example to: the video network comprises a server and a plurality of video terminals connected with the server, the video terminals are provided with a camera and an environmental data collector, and the video terminals are arranged in a single transmission process:
acquiring a sending sequence number output by a server;
calling an environment data transmission combination according to the sending sequence number;
according to the environment data transmission combination, corresponding environment data are superposed to video data acquired by a video terminal to generate actual acquisition information;
and outputting actual acquisition information.
By adopting the technical scheme, the video terminal determines the actual acquisition information returned to the server according to the received sending sequence number. Therefore, when the video terminal is illegally invaded, the illegally invaded video terminal cannot acquire the corresponding relation between the sending sequence number and the actual acquisition information, so that the actual acquisition information output by the illegally invaded video terminal does not correspond to the environmental data transmission combination stored in the server, and the aim of judging whether the actual acquisition information corresponds to the environmental data transmission combination through the server is fulfilled to achieve safety check.
The present application may be further configured in a preferred example to: the environment data transmission combination includes a video data and a plurality of environment data.
By adopting the technical scheme, a plurality of combination modes are provided between the video data and the plurality of environment data, namely a plurality of groups of environment data transmission combinations are provided. Each combination mode corresponds to one sending sequence number, so that the video terminal selects the combination mode corresponding to the sending sequence number according to the sending sequence number received each time, and superimposes corresponding environment data to the video data according to the combination mode to output actual acquisition information, and therefore the server can compare the actual acquisition information output by the video terminal with the environment data transmission combination conveniently, and the purpose of safety verification is achieved.
The second purpose of the application is to provide a video network transmission safety verification system with environmental data.
The second application object of the present application is achieved by the following technical scheme:
a video network transmission security verification system with environmental data, comprising a server, the server comprising:
the sending module is used for generating a sending sequence number according to the sending time sequence of the broadcast;
the receiving module is used for receiving actual acquisition information returned by the video terminal;
the first judgment module is used for judging whether the actual acquisition information is credible according to the actual acquisition information;
the second judging module is used for judging whether the target acquisition information is credible or not according to a preset distribution rule, a sending sequence number and the target acquisition information when the actual acquisition information is credible, wherein the preset distribution rule comprises environment data transmission combinations in one-to-one correspondence with the sending sequence number;
and the output module is used for outputting prompt information when the actual acquisition information and the target acquisition information are not credible.
The present application may be further configured in a preferred example to: still include a plurality of video terminals who is connected with the server, video terminal includes: the device comprises a camera, an environmental data collector, a character superimposer and a controller, wherein the character superimposer is respectively connected with the camera, the environmental data collector and the controller;
the camera is used for collecting environmental pictures and generating video data;
the environment data acquisition unit is used for measuring environment information and generating environment data;
the character superimposer is used for superimposing the environmental data to the video data and generating actual acquisition information;
the controller is used for receiving, storing and outputting the actual acquisition information.
The present application may be further configured in a preferred example to: the environment data collector comprises a plurality of types of environment detection sensors.
By adopting the technical scheme, each type of environment detection sensor correspondingly outputs one environment data, so that hardware support is provided for the video terminal to output actual acquisition information containing a plurality of environment data.
In summary, the present application includes at least one of the following beneficial technical effects:
when the system works, the server outputs the sending sequence number firstly, then the server determines the sequence of the video terminal returning the actual acquisition information according to the sending sequence number, and receives the actual acquisition information according to the sequence of the video terminal returning the actual acquisition information and carries out the first safety check. And then setting the actual acquired information passing the first safety check as target acquired information and carrying out second safety check. Through the two-time safety verification, the accuracy of the safety verification of the video terminal is effectively improved, and therefore the probability of data leakage is reduced.
Drawings
FIG. 1 is a schematic diagram of an exemplary operating environment for embodiments of the present application.
Fig. 2 is a flowchart of a method for verifying security of transmission of a video network with environmental data according to an embodiment of the present application.
Fig. 3 is a block diagram of a server system according to an embodiment of the present application.
Fig. 4 is a block diagram of a video terminal system according to an embodiment of the present application.
Description of reference numerals: 100. a video terminal; 110. a camera; 120. an environmental data collector; 130. a character superimposer; 140. a controller; 200. a server; 210. a sending module; 220. a receiving module; 230. a first judgment module; 240. a second judgment module; 250. an output module; 300. a display.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
FIG. 1 illustrates an exemplary operating environment in which embodiments of the present application can be implemented. Referring to fig. 1, the operation environment includes a video terminal 100, a server 200, and a display 300. The video terminal 100, the server 200 and the display 300 are all provided with a wireless communication module, and the video terminal 100 and the server 200 are connected through the wireless communication module. The wireless communication module can be a WIFI module, a Bluetooth module or a mobile communication module. The server 200 and the display 300 may be connected by a wireless communication module or may be connected by a cable.
The video terminal 100 includes a camera, an environment data collector 120, a character superimposer 130, and a controller 140. The character superimposer 130 is connected to the camera, the environmental data collector 120, and the controller 140, respectively.
The camera is used for collecting environmental pictures and outputting video data, namely the video data are video pictures of a monitored environment.
The environment data collector 120 includes various types of environment detection sensors. The environmental data collector 120 includes an environmental detection sensor capable of monitoring and controlling the environment, such as a soil temperature sensor, an air temperature and humidity sensor, an evaporation sensor, a rainfall sensor, an illumination sensor, a wind speed and direction sensor, and the like. The environment acquisition sensor is used for outputting environment data according to a monitored environment, and the environment data comprises environment soil temperature, environment air temperature and humidity, environment evaporation degree, environment rainfall, environment illumination intensity, environment wind power intensity, environment wind direction and other environment data.
The character superimposer 130 is configured to receive the video data and the environment data and superimpose the environment data onto the video data to obtain the actual acquisition information.
The controller 140 may be an FPGA chip or a DSP chip, the controller 140 is configured to control the camera 110 to output environment data, control the plurality of environment detection sensors to output environment data, and receive, store, and output actual acquisition information, and the controller 140 further stores an environment data transmission combination and a distribution rule. The controller 140 is connected to the server 200, and the server 200 may obtain the actual acquisition information through the controller 140.
It should be noted that the controller 140 has a control program for supporting the video terminal 100 to operate independently, so that the controller 140 can independently control the video terminal 100 to operate normally in a case of being detached from the server 200, the control command priority of the server 200 is higher than that of the control command of the controller 140, and the controller 140 preferentially executes the control command of the server 200 when the server 200 outputs the control command.
After receiving the actual acquisition information, the server 200 performs security check on the actual acquisition information to determine whether the actual acquisition information output by the video terminal 100 is trusted, and when the actual acquisition information is trusted, the server 200 transmits the actual acquisition information subjected to the security check to the display 300, so that a manager can visually see information of the monitoring environment. The display 300 may be a shadow map display 300 or a liquid crystal display 300, and the specific type is not limited herein.
Fig. 2 is a flowchart illustrating a video network transmission security verification method with environmental data according to an embodiment of the present application. Referring to fig. 2:
step S01: and generating a sending sequence number according to the sending time sequence of the broadcast.
Before operation, a communication link between the server 200 and the video terminal 100 needs to be established first. The establishment process of the communication link is as follows: the server 200 randomly transmits the time sequence to the video terminal 100 in a broadcast manner, and when the video terminal 100 receives the transmission sequence number, it indicates that the establishment of the communication link is completed. Since the broadcast format has a temporal characteristic, the time sequence sent by the server 200 has a temporal sequence, and the server 200 marks the temporal sequence to determine the sequence of receiving the actual acquisition information returned by the video terminal 100.
For example, if the server 200 sequentially transmits the sequence a, the sequence b, and the sequence c in the broadcast format, the sequence a, the sequence b, and the sequence c are the first transmission number, the second transmission number, and the third transmission number, respectively. Namely: the server 200 first receives and receives the actual acquisition information output by the video terminal 100 in the time sequence a, then receives and receives the actual acquisition information output by the video terminal 100 in the time sequence b, and finally receives and receives the actual acquisition information output by the video terminal 100 in the time sequence c. Note that the video terminal 100 that receives the a-sequence, the video terminal 100 that receives the b-sequence, and the video terminal 100 that receives the c-sequence are not the same video terminal 100, but three video terminals 100 that are independent of each other. Meanwhile, after the server 200 completes the security check of the actual acquisition information output by the video terminal 100 receiving the sequence a, the server 200 performs the security check of the actual acquisition information output by the video terminal 100 receiving the sequence b, thereby reducing the computational complexity of the server 200.
Step S02: the transmission sequence number output by the server 200 is acquired.
After the server 200 randomly outputs the transmission serial number, the plurality of video terminals 100 also randomly receive one transmission serial number output by the server 200, so that each data transmission between the server 200 and each video terminal 100 has randomness, thereby increasing the probability of exposing the video terminal 100 which is illegally invaded.
Since the number of video terminals 100 varies depending on the environment, the transmission number is determined according to the number of video terminals 100 in the actual environment. Meanwhile, the set sending sequence number should satisfy that one sending sequence number corresponds to one video terminal 100, so as to reduce the probability of calculation disorder of the server 200 caused by the video terminal 100 without the sending sequence number.
Step S03: and calling an environment data transmission combination according to the sending sequence number.
Before the environmental data transmission combination is called, the environmental data transmission combination needs to be established and pre-stored. The method for establishing the environment data transmission combination comprises the following steps: first, the controller 140 formulates a combination mode of each set of environmental data transmission combination according to the types of the camera 110 and the environmental detection sensor, and then outputs the combined environmental data transmission combination as a dispatch rule according to a preset sorting rule. The sorting rule may sort the sums of the video data and the environmental data included in the environmental data transmission combination, or may also serve as a sort according to the chronological order of the combination, and a specific sorting manner is not limited herein. Therefore, the dispatching rules are obtained by the multiple groups of environment data transmission combinations according to the preset sequencing, the first environment data transmission combination in the dispatching rules correspondingly sends the first number, the second environment data transmission combination in the sequencing correspondingly sends the second number, and so on, the Nth environment data transmission combination in the sequencing correspondingly sends the N number. N is any number other than the divisor value zero.
After determining the combination mode of each set of transmission combination of the environmental data and establishing the completed dispatch rule, the controller 140 stores the dispatch rule, and the controller 140 transmits the dispatch rule to the server 200. Thereby facilitating data transmission between the video terminal 100 and the server 200 according to the distribution rule.
Step S04: according to the transmission combination of the environment data, the corresponding environment data is superimposed to the video data acquired by the video terminal 100, and the actual acquisition information is generated.
After the environmental data transmission combination is called, the controller 140 obtains the combination mode of the video data and the environmental data in the environmental data transmission combination according to the environmental data transmission combination. Therefore, the controller 140 can control the camera to output the video data and control the corresponding environment detection sensor to output the environment data according to a combination manner of the video data and the environment data in the environment data transmission combination, and the character superimposer 130 receives the video data and the environment data output by the corresponding environment detection sensor and superimposes the received environment data onto the video data to generate the actual acquisition information.
And S05, receiving the actual acquisition information returned by the video terminal 100.
The controller 140 generates actual acquisition information according to a combination manner of the video data and the environmental data in the environmental data transmission combination, and outputs the actual acquisition information to the server 200. Since the actual acquisition information includes video data and environmental data, and the server 200 stores the same environmental data transmission combination, the server 200 can implement security check work after comparing the acquired actual acquisition information with the environmental data transmission combination.
Step S06: and judging whether the actual acquisition information is credible or not according to the actual acquisition information.
Judging whether the collected information is credible; and judging whether the actual collected information contains environmental data. The environmental data is obtained by the video terminal 100 according to the monitored environment, and if the actually acquired information does not contain the environmental data, it is indicated that the video terminal 100 outputting the actually acquired information has a security hole illegally replaced by a common camera, and the common camera does not have a superposition function.
When the first security check result of the server 200 on the actual acquisition information is not trusted, the server 200 sets the actual acquisition information as illegal acquisition information, and outputs prompt information according to the illegal acquisition information so as to prompt a manager that the video terminal 100 outputting the actual acquisition information has a security hole illegally replaced by a common camera. The prompt information is a signal for prompting the manager that the video terminal 100 is illegally intruded, so the prompt information may include a signal capable of prompting the manager in time, such as a special color flashing prompt, a voice prompt, a buzzer prompt, and the like. For example, when the server 200 outputs the prompt message, a red light on the server 200 blinks, and when the manager sees the red light blinking, it indicates that the video terminal 100 being verified at this time is hacked. The voice prompt and the buzzer prompt can be similar to the process of flashing prompt with special color, and are not described herein.
Step S07: and if the actual acquisition information is credible, determining target acquisition information according to the actual acquisition information.
Since the technology of the video network is rapidly developed, the actually collected information outputted from the video terminal 100, which is difficult to avoid being illegally intruded, also includes the environmental data. Therefore, in order to further improve the video network transmission security, it is necessary to perform security verification again on the actual capture information output by the video terminal 100. Specifically, the actual collected information that is trusted as a result of the first security verification is set as target collected information, and the server 200 inputs the target collected information into the process of the second security verification.
Step S08: and judging whether the target acquisition information is credible or not according to a preset distribution rule, the sending sequence number and the target acquisition information, wherein the preset distribution rule comprises environment data transmission combinations which are in one-to-one correspondence with the sending sequence number.
The method for judging whether the target acquisition information is credible by the server 200 comprises the following steps:
first, the server 200 determines an environment data transmission combination according to the transmission sequence number. Since each sending sequence number has a corresponding environment data transmission combination, the server 200 can determine the combination mode of the video data and the environment data in the actual acquisition information to be output by the video terminal 100 through the sending sequence number received by the video terminal 100. For example, a video network includes an X video terminal, a Y video terminal, a Z video terminal, and an H server, and the X video terminal, the Y video terminal, and the Z video terminal all include: the system comprises B0 video data, B1 environment data, B2 environment data, B3 environment data, B4 environment data and B5 environment data, wherein the B0 video data, the B1 environment data and the B2 environment data are combined into an X environment data transmission combination, the B0 video data, the B1 environment data, the B3 environment data and the B4 environment data are combined into a Y environment data transmission combination, the B0 video data, the B2 environment data, the B3 environment data and the B5 environment data are combined into a Z environment data transmission combination, if the dispatching rule is X-Y-Z, the sending sequence numbers respectively received by the X video terminal, the Y video terminal and the Z video terminal are a sending second number, a sending third number and a sending first number, and the sequence of security verification performed by the H server is the Z video terminal, the X video terminal and the Y video terminal.
Therefore, the server 200 can determine the combination of the video data and the environmental data in the actual capture information output by the video terminal 100 according to the transmission sequence number received by the video terminal 100.
And then, judging whether the environment data transmission combination corresponds to the target acquisition information. After determining the combination mode of the video data and the environmental data in the environmental data transmission combination according to the dispatch rule, the server 200 compares the combination mode of the video data and the environmental data contained in the target acquisition information. For example, the environment data transmission combination includes an environment picture, an environment temperature, an environment rainfall and an environment wind direction, and the target collection information includes an environment picture, an environment temperature and an environment wind direction, and the target collection information is considered not to correspond to the environment data transmission combination due to the fact that the actual collection information lacks the environment rainfall. The reason is that the video terminal 100 that has been illegally intruded does not obtain the distribution rule in the server 200, and therefore, a situation in which the transmission combination of the environmental data in the server 200 does not correspond to the target collection information will occur.
Step S09: and if the target acquisition information is not credible, outputting prompt information.
According to the above process of determining the target acquisition information, when the target acquisition information is not trusted, the video terminal 100 has a security hole of illegal intrusion. Therefore, in order to prevent a lawless person from attacking a corresponding video network through the illegally-invaded video terminal 100 or illegally stealing specific information of the monitoring environment, the server 200 outputs prompt information to prompt a manager to timely close a communication link between the server 200 and the video terminal 100. The process of outputting the prompt information by the server 200 may be similar to the prompt information output by the server 200 when the actual acquisition information output by the video terminal 100 is determined to be unreliable, and the specific output process is not described herein again.
When the security verification result of the target collection information is credible, the server 200 outputs the target collection information to the display 300, so that the manager can conveniently check the specific information of the environment.
The above is a description of an embodiment of a method for verifying security of video network transmission with environmental data, and the solution described in the present application is further described below by an embodiment of a system.
The application provides a video network transmission safety verification system with environmental data. The system includes a server 200 and a plurality of video terminals 100, each of the plurality of video terminals 100 being connected to the server 200.
Referring to fig. 3, among others, a server 200 includes: a sending module 210, configured to generate a sending sequence number according to a sending timing sequence of a broadcast; a receiving module 220, configured to receive actual acquisition information returned by the video terminal 100; the first judging module 230 is configured to judge whether the actually acquired information is trusted according to the actually acquired information; the second judging module 240 is configured to, when the actual acquired information is trusted, judge whether the target acquired information is trusted according to a preset distribution rule, the sending sequence number, and the target acquired information, where the preset distribution rule includes an environment data transmission combination corresponding to the sending sequence number one to one; and the output module 250 is used for outputting prompt information when the actual acquisition information and the target acquisition information are not credible.
Referring to fig. 4, the video terminal 100 includes: the device comprises a camera 110, an environmental data collector 120, a character superimposer 130 and a controller 140, wherein the character superimposer 130 is respectively connected with the camera 110, the environmental data collector 120 and the controller 140. Specifically, the camera 110 is configured to collect an environmental picture and generate video data; the environmental data collector 120 is used for measuring environmental information and generating environmental data; the character superimposer 130 is used for superimposing the environmental data to the video data and generating actual acquisition information; 140 for receiving and outputting actual acquisition information; the controller 140 controls the camera 110 to output environment data, and is also used to control the plurality of environment detection sensors to output environment data, respectively, and to receive, store, and output actual acquisition information.
The foregoing description is only exemplary of the preferred embodiments of the invention and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the disclosure herein is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the disclosure. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (4)

1. A video network transmission safety verification method with environment data is characterized in that: the video network comprises a server (200) and a plurality of video terminals (100) connected with the server (200);
the server (200) is configured to:
generating a sending sequence number according to a sending time sequence of the broadcast;
the video terminal (100) is configured to:
acquiring a sending sequence number output by a server (200);
calling an environment data transmission combination according to the sending sequence number;
according to the environment data transmission combination, corresponding environment data are superposed to video data collected by a video terminal (100) to generate actual collection information;
outputting actual acquisition information;
the server (200) is further configured to:
receiving the actual acquisition information;
judging whether the actual acquisition information contains environmental data or not, and if so, determining that the actual acquisition information is credible;
if the actual acquisition information is credible, marking the actual acquisition information as target acquisition information;
determining an environment data transmission combination according to the sending sequence number;
judging whether the environment data transmission combination corresponds to the target acquisition information or not;
if not, judging that the target acquisition information is not credible, and outputting prompt information.
2. The method for security verification of transmission over a video network with environmental data according to claim 1, wherein: and the server (200) determines the sequence of receiving the actual acquisition information returned by the video terminal (100) according to the sending sequence number received by the video terminal (100).
3. The method for security verification of transmission over a video network with environmental data according to claim 1, wherein: the environment data transmission combination comprises video data and a plurality of environment data.
4. The utility model provides a video network transmission safety check-up system with environmental data which characterized in that: comprising a video terminal (100) and a server (200), the video terminal (100) and the server (200) being adapted to implement the method according to any of claims 1-3;
the video terminal (100) comprises: the device comprises a camera (110), an environmental data collector (120), a character superimposer (130) and a controller (140), wherein the character superimposer (130) is respectively connected with the camera (110), the environmental data collector (120) and the controller (140);
the camera (110) is used for collecting environmental pictures and generating video data;
the environment data collector (120) is used for measuring environment information and generating environment data;
the character superimposer (130) is used for superimposing the environment data into the video data and generating actual acquisition information;
the controller (140) is used for receiving, storing and outputting the actual acquisition information;
the server (200) comprises:
a sending module (210) for generating a sending sequence number according to a sending timing sequence of the broadcast;
a receiving module (220) for receiving the actual acquisition information;
the first judging module (230) is used for judging whether the actually acquired information contains environment data or not, and if so, the actually acquired information is credible;
the second judgment module (240) is used for marking the actual acquisition information as target acquisition information when the actual acquisition information is credible; determining an environment data transmission combination according to the sending sequence number; judging whether the environment data transmission combination corresponds to the target acquisition information or not;
and the output module (250) is used for judging that the target acquisition information is not credible and outputting prompt information when the environment data transmission combination does not correspond to the target acquisition information.
CN202210182848.5A 2022-02-25 2022-02-25 Video network transmission safety verification method and system with environment data Active CN114584793B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210182848.5A CN114584793B (en) 2022-02-25 2022-02-25 Video network transmission safety verification method and system with environment data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210182848.5A CN114584793B (en) 2022-02-25 2022-02-25 Video network transmission safety verification method and system with environment data

Publications (2)

Publication Number Publication Date
CN114584793A CN114584793A (en) 2022-06-03
CN114584793B true CN114584793B (en) 2023-01-20

Family

ID=81777637

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210182848.5A Active CN114584793B (en) 2022-02-25 2022-02-25 Video network transmission safety verification method and system with environment data

Country Status (1)

Country Link
CN (1) CN114584793B (en)

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH09298738A (en) * 1996-04-26 1997-11-18 Sony Corp Supervisory system
CN201298902Y (en) * 2008-11-04 2009-08-26 北京中科嘉和科技发展有限公司 Video terminal with environmental monitoring data
JP5156666B2 (en) * 2009-02-19 2013-03-06 日本放送協会 Content presentation system and content presentation program
CN102932632A (en) * 2012-11-08 2013-02-13 天津市亚安科技股份有限公司 Multifunctional video supervisory system
CN104243852B (en) * 2013-06-21 2019-02-22 北京通创华科技发展有限公司 Traffic monitoring and environment information acquisition system
KR20170099157A (en) * 2016-02-23 2017-08-31 삼성전자주식회사 Providing temperature information and electronic device supporting the same
CN109739137B (en) * 2019-01-11 2021-06-08 内蒙古金原农牧科技有限公司 Intelligent terminal system for water conservancy Internet of things sensing and controlling platform
CN213072924U (en) * 2020-09-27 2021-04-27 南京蓉水水电自动化技术研究所有限责任公司 Novel monitoring data superposition video monitoring and measuring system
CN113163170B (en) * 2021-04-21 2022-07-26 中国矿业大学 System and method for superposing rail temperature, beam temperature state temperature and video of high-speed railway

Also Published As

Publication number Publication date
CN114584793A (en) 2022-06-03

Similar Documents

Publication Publication Date Title
US11041732B2 (en) Facilitating rider pick-up for a transport service
CN104867265B (en) Camera device, fire detection alarm system and method
CN109698934B (en) Region monitoring method and device
KR20110060342A (en) Cctv camera device and server of safety management center using location based service, intelligent security system using the same and method thereof
CN110213712A (en) A kind of positioning transfer approach, device, terminal and storage medium
CN114584793B (en) Video network transmission safety verification method and system with environment data
CN107590935A (en) Digital camera intrusion detection and defence system
CN114584848B (en) Video network transmission security vulnerability detection method and system based on environmental data
CN101175201A (en) Method for recognizing fake real-time video
KR20130008199A (en) System and method for disaster information communication
CN212463305U (en) Edge calculation device and edge calculation system
KR20190127101A (en) Security service system and method based on cloud
CN111102987B (en) Rescue vehicle tracking method, device, server and medium
CN112486573B (en) Data processing method, data processing equipment and storage medium of monitoring system
CN111696227B (en) Unlocking method and device
WO2022041212A1 (en) Fire source location indication method, and related device and apparatus
CN113709738A (en) MDM anti-addiction system and anti-addiction method based on electronic fence
CN114463873A (en) Patrol system for community
CN113489939A (en) Intelligent monitoring method and system for power transmission line construction site
CN210377737U (en) Video-based anti-theft alarm system
CN113581129A (en) Vehicle anti-theft method, system, device and computer readable storage medium
CN106652472A (en) Black list vehicle recognition speech alarming method and system
CN106697116A (en) Motorcycle anti-theft cloud service system
CN113973162A (en) Edge calculation device and edge calculation method and system
CN111248572A (en) Detection method based on intelligent safety helmet and intelligent safety helmet

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant