CN114584848B - Video network transmission security vulnerability detection method and system based on environmental data - Google Patents

Video network transmission security vulnerability detection method and system based on environmental data Download PDF

Info

Publication number
CN114584848B
CN114584848B CN202210181777.7A CN202210181777A CN114584848B CN 114584848 B CN114584848 B CN 114584848B CN 202210181777 A CN202210181777 A CN 202210181777A CN 114584848 B CN114584848 B CN 114584848B
Authority
CN
China
Prior art keywords
data
transmission
server
combination
monitoring terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210181777.7A
Other languages
Chinese (zh)
Other versions
CN114584848A (en
Inventor
范志臣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Boviss Technology Co ltd
Original Assignee
Beijing Boviss Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Boviss Technology Co ltd filed Critical Beijing Boviss Technology Co ltd
Priority to CN202210181777.7A priority Critical patent/CN114584848B/en
Publication of CN114584848A publication Critical patent/CN114584848A/en
Application granted granted Critical
Publication of CN114584848B publication Critical patent/CN114584848B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/63Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
    • H04N21/647Control signaling between network components and server or clients; Network processes for video distribution between server and clients, e.g. controlling the quality of the video stream, by dropping packets, protecting content from unauthorised alteration within the network, monitoring of network load, bridging between two different networks, e.g. between IP and wireless
    • H04N21/64715Protecting content from unauthorized alteration within the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/21Server components or server architectures
    • H04N21/218Source of audio or video content, e.g. local disk arrays
    • H04N21/21805Source of audio or video content, e.g. local disk arrays enabling multiple viewpoints, e.g. using a plurality of cameras
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Closed-Circuit Television Systems (AREA)

Abstract

The application relates to a video network transmission security vulnerability detection method and system based on environmental data. The server receives data from any one monitoring terminal: acquiring a checking instruction; outputting a transmission serial number according to the check instruction, wherein one transmission serial number corresponds to one monitoring terminal; receiving an actual data combination returned by the monitoring terminal; calling a transmission list according to the transmission sequence number, wherein the transmission list comprises a plurality of groups of target data combinations; judging whether the actual data combination is credible according to the transmission list and the actual data combination; if the information is not credible, outputting early warning information. The monitoring terminal is in the data transmission process: acquiring a transmission sequence number output by a server; calling a transmission list according to the transmission sequence number; and establishing and outputting an actual data combination according to the transmission list, wherein the actual data combination corresponds to the target data combination. The method and the device have the effect of guaranteeing the safety of the data transmitted by the video network.

Description

Video network transmission security vulnerability detection method and system based on environmental data
Technical Field
The present application relates to the field of network security technologies, and in particular, to a method and a system for detecting a security vulnerability of video network transmission based on environmental data.
Background
The monitoring camera is used for collecting monitoring environment pictures, so that a visual monitoring environment is provided for managers, and data support is provided for the managers to prejudge the probability of safety accidents occurring in the monitoring environment or trace the source of the sudden abnormal events.
With the continuous popularization and development of network technology, the environment pictures acquired by the monitoring camera cannot meet the requirements of managers, and therefore relevant technicians are prompted to combine and link the monitoring camera and various environment monitoring terminals. Therefore, the manager can obtain not only the environment picture, but also various environment data superposed on the environment picture, such as environment temperature, environment rainfall, environment oxygen concentration, environment wind direction and the like.
However, in the process of linkage of the monitoring camera and various environment monitoring terminals, due to the lack of safety monitoring equipment and the dispersion between the monitoring camera and the various environment monitoring terminals, the threat hidden in the video network cannot be found in time in the data transmission process, so that the safety of the video network transmission data cannot be guaranteed.
Disclosure of Invention
The application provides a video network transmission security vulnerability detection method and system based on environmental data, and the method and system have the characteristic of guaranteeing the security of video network transmission data.
The application aims to provide a video network transmission security vulnerability detection method based on environmental data.
The above object of the present application is achieved by the following technical solutions:
the video network transmission security vulnerability detection method based on the environmental data comprises a server and a plurality of monitoring terminals connected with the server, wherein each monitoring terminal comprises a monitoring camera and a plurality of environment detection sensors, and the server receives data of any one monitoring terminal:
acquiring a checking instruction;
outputting a transmission serial number according to a check instruction, wherein one transmission serial number corresponds to one monitoring terminal;
receiving an actual data combination returned by the monitoring terminal;
calling a transmission list according to the transmission sequence number, wherein the transmission list comprises a plurality of groups of target data combinations;
judging whether the actual data combination is credible according to the transmission list and the actual data combination;
if the information is not credible, outputting early warning information.
By adopting the technical scheme, the server can obtain the verification instruction on behalf of the server when the server is powered on, the server outputs the transmission sequence number according to the verification instruction, and then the sequence of the monitoring terminals is verified according to the transmission sequence number received by the monitoring terminals. When each monitoring terminal is verified by the server, firstly, a transmission list corresponding to the monitoring terminal is called according to the monitoring terminal; and then, checking the actual data combinations sequentially output by the monitoring terminal according to the arrangement sequence of the target data combinations in the transmission list. If the actual data combination is different from the corresponding target data combination in the transmission list, the verification result of the monitoring terminal is considered to be unreliable, that is, the video network has a security hole, the monitoring terminal needs to be overhauled, and data leakage during data transmission is avoided, so that the purpose of guaranteeing the security of the video network transmission data is achieved.
The present application may be further configured in a preferred example to: the verification instruction is an instruction which is output by the power supply equipment when the server is powered on and is used for driving the server to perform safety verification on the monitoring terminal.
The present application may be further configured in a preferred example to: and the server determines the sequence of checking the monitoring terminals according to the transmission sequence numbers received by the monitoring terminals.
By adopting the technical scheme, the server only verifies one monitoring terminal at each moment, so that the verification complexity of the server is reduced.
The present application may be further configured in a preferred example to: the video network includes server and a plurality of monitor terminal who is connected with the server, monitor terminal disposes surveillance camera head and a plurality of environmental detection sensor, monitor terminal is at the transmission data in-process:
acquiring a transmission sequence number output by a server;
calling a transmission list according to the transmission sequence number;
establishing an actual data combination according to a transmission list, wherein the actual data combination corresponds to the target data combination;
and outputting the actual data combination.
By adopting the technical scheme, during verification, the monitoring terminal receives the transmission serial number output by the server, calls the transmission list stored in the monitoring terminal according to the transmission serial number, sequentially establishes the actual data combination according to the sequence of the target data combination in the transmission list, obtains the actual data combination corresponding to the target data combination, and sequentially transmits the actual data combination to the server. The server stores a transmission list which is the same as the monitoring terminal, so that during verification, the server compares an actual data combination with a target data combination in the transmission list stored in the server, and if the actual data combination is different from the corresponding target data combination in the transmission list, two situations exist at the moment, namely, the monitoring terminal is illegally replaced, so that the situations are different; and the other is that the software of the monitoring terminal is illegally invaded, so that the monitoring terminal is different. Whether the monitoring terminal is illegally replaced or software of the monitoring terminal is illegally invaded, the video network has security loopholes, so that the monitoring terminal which is being checked needs to be overhauled to ensure the security of data transmission of the video network.
The present application may be further configured in a preferred example to: the transmission list includes:
acquiring the quantity of video data and the quantity of environmental data of a monitoring terminal;
determining a target data combination according to the number of the video data and the number of the environment data;
and combining the preset arrangement rule and the target data to obtain a transmission list.
The present application may be further configured in a preferred example to: the method for establishing the actual data combination according to the transmission list comprises the following steps:
obtaining the arrangement sequence of each target data combination according to the transmission list;
and sequentially establishing corresponding actual data combinations according to the arrangement sequence of each target data combination.
The present application may be further configured in a preferred example to: the method for judging whether the actual data combination is credible according to the transmission list and the actual data combination comprises the following steps:
acquiring the arrangement sequence of target data combinations in a transmission list;
calling a corresponding target data combination in the transmission list according to the actual data combination;
and comparing the video data and the environment data in the actual data combination with the video data and the environment data in the corresponding target data combination to obtain a verification result.
The second purpose of the application is to provide a video network transmission security vulnerability detection system based on environmental data.
The second application purpose of the present application is achieved by the following technical scheme:
video network transmission security vulnerability detection system based on environmental data, including the server, the server includes:
the acquisition module is used for acquiring a check instruction;
the sending module is used for outputting transmission serial numbers according to the checking instruction, and one transmission serial number corresponds to one monitoring terminal;
the receiving module is used for receiving the actual data combination returned by the monitoring terminal;
the transfer module is used for transferring a transfer list according to the transfer sequence number, wherein the transfer list comprises a plurality of groups of target data combinations;
the judging module is used for judging whether the actual data combination is credible according to the transmission list and the actual data combination;
and the output module is used for outputting the early warning information when the actual data combination is not credible.
The present application may be further configured in a preferred example to: still include monitor terminal, monitor terminal includes: the character superimposer is respectively connected with the monitoring camera, the environment detection sensor and the controller;
the monitoring camera is used for collecting environmental pictures and generating video data;
the environment detection sensor is used for monitoring environment information and generating environment data;
the controller is used for controlling the monitoring camera to output video data to the character superimposer and also used for controlling the environment detection sensor to output environment data to the character superimposer;
the character superimposer is used for receiving the video data and the environment data, combining the video data and the environment data and outputting an actual data combination;
the controller is in turn used to store the transmission list and the actual data combination.
In summary, the present application includes at least one of the following beneficial technical effects:
during verification, the server outputs the transmission serial number, the monitoring terminal receives the transmission serial number output by the server, the transmission list stored in the monitoring terminal is called according to the transmission serial number, actual data combinations are sequentially established according to the sequence of the target data combinations in the transmission list, actual data combinations corresponding to the target data combinations are obtained, and the actual data combinations are sequentially output to the server. Since the server stores the same transmission list as that in the monitoring terminal, when the server receives the actual data combination, the actual data combination is compared with the target data combination in the transmission list stored in the server. And when the actual data combination is different from the corresponding target data combination in the transmission list, the verification result of the monitoring terminal is deemed to be incredible, namely the video network has a security vulnerability and the monitoring terminal needs to be overhauled.
Drawings
FIG. 1 is a schematic diagram of an exemplary operating environment for embodiments of the present application.
Fig. 2 is a flowchart of a method for detecting a security vulnerability in video network transmission based on environmental data according to an embodiment of the present application.
Fig. 3 is a block diagram of a server system according to an embodiment of the present application.
Fig. 4 is a block diagram of a monitoring terminal system according to an embodiment of the present application.
Description of reference numerals: 100. monitoring a terminal; 110. a surveillance camera; 120. an environment detection sensor; 130. a character superimposer; 140. a controller; 200. a server; 210. an acquisition module; 220. a sending module; 230. a receiving module; 240. a calling module; 250. a judgment module; 260. an output module; 300. and a display.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
FIG. 1 illustrates a schematic diagram of an exemplary operating environment in which embodiments of the present application can be implemented. The monitoring terminal 100, the server 200, and the display 300 are included in the operation environment. The monitoring terminal 100 and the server 200 may communicate through a wireless communication network, and the server 200 and the display 300 may communicate through a wireless communication network, or may communicate through a wired network.
The monitoring terminal 100 includes a monitoring camera 110, and a plurality of environment detection sensors 120, a character superimposer 130, and a controller 140 integrated within a housing of the monitoring camera 110. The character superimposer 130 is connected to the monitoring camera 110, the environment detection sensor 120, and the controller 140, respectively.
The monitoring camera 110 is configured to collect an environmental picture and generate video data, where the video data is a video picture of a monitored environment. The environment detection sensor 120 is used for monitoring environment information and generating environment data, and the environment detection sensor 120 is a sensor for measuring environment data, such as a soil temperature sensor, an air temperature and humidity sensor, an evaporation sensor, a rainfall sensor, an illumination sensor, a wind speed and direction sensor, and the like. Therefore, the environmental data such as the environmental soil temperature, the environmental air temperature and humidity, the environmental evaporation degree, the environmental rainfall, the environmental illumination intensity, the environmental wind power intensity, the environmental wind direction and the like monitor the specific information of the environment. Character superimposer 130 is configured to receive video data and environmental data and superimpose the environmental data onto the video data to obtain a data combination.
The controller 140 may be an FPGA chip or a DSP chip, and the controller 140 is configured to control the monitoring camera 110 to output video data to the character superimposer 130, and is further configured to control the environment sensor to output environment data to the character superimposer 130, so that the character superimposer 130 superimposes the received environment data to the video data.
Stored within server 200 are instructions for executing programs, which may employ an instruction set of architectures such as x86, arm, RISC, MIPS, SSE, and the like. How the instructions control the operation of the server 200 is well known in the art and will not be described in detail herein. The storage unit in the server 200 includes, for example, a ROM (read only memory), a RAM (random access memory), a nonvolatile memory such as a hard disk, and the like.
The server 200 verifies the data combination output by the monitoring terminal 100, and when the data combination passes the verification, the server 200 outputs the monitoring data to the display 300, so that the manager can visually see the information of the monitoring environment. The display 300 may be a shadow map display 300 or a liquid crystal display 300, and the specific type is not limited herein.
It should be noted that the operating environment shown in fig. 1 is only illustrative and is not intended to limit the application or uses of the embodiments of the present invention. For example, the operating environment may include a plurality of monitoring terminals 100, a plurality of servers 200, and a plurality of displays 300.
Fig. 2 shows a flowchart of a method for detecting a security vulnerability of a video network transmission based on environmental data according to an embodiment of the present application. Referring to FIG. 2:
step S01: and acquiring a checking instruction.
Before the monitoring terminal 100 outputs the data combination to the server 200, in order to test whether the video transmission network between the monitoring terminal 100 and the server 200 is safe, the data combination output by the monitoring terminal 100 needs to be verified. The principle of the verification is as follows: after the data combination output by the monitoring terminal 100 is transmitted to the server 200, if the server 200 detects that the data in the data combination is partially lost or completely lost, it indicates that the video network has a security vulnerability, and the transmission of the data combination needs to be stopped to prevent data leakage.
The verification instruction is an instruction output by the power supply device when the server 200 is powered on, for establishing a communication link between the server 200 and the monitoring terminal 100. In practical applications, when the server 200 is powered on, it is considered that the server 200 has acquired the verification instruction.
Step S02: and outputting transmission serial numbers according to the checking instruction, wherein one transmission serial number corresponds to one monitoring terminal 100.
The transmission sequence number is an instruction output by the server 200 for determining the order of checking the monitoring terminals 100. When the server 200 acquires the number of the monitoring terminals 100 included in the video network, the server 200 inputs the number of the monitoring terminals 100 into the server 200, so that the server 200 can output the transmission serial numbers corresponding to the number of the monitoring terminals 100 after power-on. For example, the server a is connected with the monitoring terminal B1, the monitoring terminal B2, and the monitoring terminal B3, the server a receives the check instruction and then outputs the first transmission number, the second transmission number, and the third transmission number, and the monitoring terminal B1, the monitoring terminal B2, and the monitoring terminal B3 correspond to a unique transmission serial number respectively, and the transmission serial numbers corresponding to each time are random. The random receiving of the transmission sequence number by the monitoring terminal 100 is a well-known technical means, and is not described herein.
Step S03: the transmission sequence number output by the server 200 is acquired.
After the server 200 outputs the transmission serial number, the controllers 140 in the plurality of monitoring terminals 100 connected to the server 200 randomly receive the transmission serial number. The transmission sequence number received by the monitoring terminal 100 is used to determine the sequence of the data combination output by the monitoring terminal 100, so as to avoid that a plurality of monitoring terminals 100 output the data combination to the server 200 at the same time, which causes calculation disorder of the server 200 and further causes the accuracy of the verification result to be reduced.
Therefore, if the server 200 receives the data combinations output by multiple monitoring terminals 100 at the same time, it indicates that one monitoring terminal 100 in the data combinations output at the same time has broken the transmission rule, that is, it indicates that there is a security breach, or if the sequence of the data combinations output by multiple monitoring terminals 100 is not changed, it indicates that there is a security breach in the video network.
Step S04: and calling a transmission list according to the transmission sequence number.
Before the transmission list is called, the transmission list needs to be established. The method for establishing the transmission list comprises the following steps:
1. the number of the monitoring cameras 110 and the number of the environment detection sensors 120 included in each of the monitoring terminals 100 are acquired, thereby determining the number of the video data and the number of the environment data generated by the monitoring terminals 100. Since each monitoring terminal 100 needs to configure one monitoring camera 110, that is, only one monitoring picture is needed, the number of the monitoring cameras 110 is often one, and therefore, in this embodiment, the video data is set to be one, and in other embodiments, there may be a plurality of video data. Since the environment detection sensors 120 are various in kind and the environment data output from each kind of environment detection sensor 120 is different from each other, a plurality of environment data exist in one monitoring terminal 100.
2. And obtaining the target data combination according to the quantity of the video data and the quantity of the environmental data. Since one video data and a plurality of environment data are stored in the monitoring terminal 100, a plurality of combinations of the video data and the environment data will exist, and each combination of the video data and the environment data is a target data combination. For example, if a monitoring terminal B4 has video data a, environmental data B1, and environmental data B2, the combination that can be obtained includes: video data a and environmental data b1; video data a, environment data b2; video data a, environment data b1, and environment data b2. The monitor terminal B4 has three sets of target data combinations.
3. And generating a transmission list by the target data combination according to a preset arrangement rule.
Specifically, the method for establishing the arrangement rule comprises the following steps: firstly, a target data combination is obtained, wherein the target data combination comprises video data and a plurality of environment data. Then, the sum of the video data and the environment data of each target data is determined according to the video data and the plurality of environment data. Then, the arrangement order is determined according to the sum of the video data and the environment data of each target data, namely, the arrangement with larger sum value is arranged in front, and the arrangement with smaller sum value is arranged in back. Finally, if there are a plurality of target data combinations having the same total sum of video data and environment data, the plurality of target data combinations having the same total sum of video data and environment data are arranged in an order of combination time, that is, the target data combinations having the same total sum of video data and environment data are arranged before the target data combinations having the same total sum of video data and environment data and the target data combinations having the same total sum of video data and environment data have the same combination time as the target data combinations having the same combination time. That is, the sum of the video data and the environment data of each target data is first set as the arrangement order, and the combination time is then set as the arrangement order.
And after the arrangement rule is determined, arranging the target data combinations according to the arrangement rule to obtain a transmission list. The above-mentioned determination of the arrangement rule by twice arranging the order has the advantages that: when there are many target data combinations in the monitoring terminal 100, in order to improve the verification efficiency of the server 200 and ensure the verification accuracy, the target data combination with the same sum of video data and environmental data and the highest ratio may be selected as the transmission list. For example, the target data combination in which the sum of the video data and the environmental data is a value of 4 in the monitoring terminal B5 accounts for the largest number of all the target data combinations. The target data combination with the sum of the video data and the environmental data being 4 comprises a target data combination W, a target data combination X, a target data combination Y and a target data combination Z, and meanwhile, if the synthesis time of the target data combination W > the synthesis time of the target data combination X > the synthesis time of the target data combination Y > the synthesis time of the target data combination Z, the transmission list is obtained as follows: target data combination W, target data combination X, target data combination Y, and target data combination Z.
After the controller 140 calculates the transmission list, the transmission list is stored to facilitate subsequent calling, meanwhile, the controller 140 also transmits the transmission list to the server 200, and the server 200 acquires and stores the transmission list output by the controller 140, thereby facilitating taking of the server 200 during verification.
And S05, establishing an actual data combination according to the transmission list, wherein the actual data combination corresponds to the target data combination.
After the controller 140 retrieves the transmission list, since the target data combinations in the transmission list have the arrangement order, in the process of establishing the actual data combinations, the controller 140 sequentially establishes the actual data combinations according to the arrangement order of the target data combinations. The principle of establishing the actual data combination is as follows: the controller 140 controls the monitoring camera 110 to output video data and controls the corresponding environment detection sensor 120 to output environment data according to the video data and the environment data included in the target data combination, and the character superimposer 130 obtains the video data and the environment data and combines the video data and the environment data to obtain an actual data combination corresponding to the target data combination.
Step S06: and outputting the actual data combination.
Since the target data combinations in the transmission list have the arrangement order, the actual data combinations corresponding to the target data combinations also have the transmission order, and the controller 140 sequentially transmits the actual data combinations to the server 200 according to the transmission order of the actual data combinations. For example, the transmission list is arranged in the order of the target data combination W1, the target data combination X1, the target data combination Y1, and the target data combination Z1, and the target data combination W1, the target data combination X1, the target data combination Y1, and the target data combination Z1 correspond to the actual data combination W2, the actual data combination X2, the actual data combination Y2, and the actual data combination Z2, respectively, so that the controller 140 transmits the actual data combinations to the server 200 in the order of the actual data combination W2, the actual data combination X2, the actual data combination Y2, and the actual data combination Z2.
Step S07: and calling a transmission list according to the transmission sequence number, wherein the transmission list comprises a plurality of groups of target data combinations.
After the server 200 outputs the transmission serial number, the actual data combination output by the monitoring terminal 100 is sequentially received according to the transmission serial number, and the transmission list corresponding to the monitoring terminal 100 and stored in the server 200 is retrieved after the actual data combination is received.
It should be noted that the source of the transmission list stored in the server 200 is generated by the monitoring terminal 100, and therefore the transmission list stored in the server 200 is the same as the transmission list stored in the monitoring terminal 100. Since the server 200 is connected to the plurality of monitoring terminals 100, the server 200 stores therein a transmission list corresponding to each monitoring terminal 100. The server 200 calls a transmission list corresponding to the monitoring terminal 100 every time one monitoring terminal 100 is verified.
Step S08: and judging whether the actual data combination is credible or not according to the target data combination and the actual data combination.
After receiving the actual data combinations and retrieving the transmission list, the server 200 checks the actual data combinations sequentially output by the monitoring terminal 100 one by one according to the arrangement sequence of the target data combinations in the transmission list. The process of the server 200 verifying all the actual data combinations output by any one of the monitoring terminals 100 is as follows:
firstly, calling a first arranged target data combination in a transmission list, and acquiring the video data and the environmental data contained in the target data combination according to the first arranged target data combination; then, the video data and the environment data contained in the received first actual data combination are compared with the video data and the environment data contained in the target data combination, if the video data and the environment data contained in the received first actual data combination are completely the same as the video data and the environment data contained in the first arranged target data combination, the second actual data combination received by the server 200 is compared with the second arranged target data combination in the transmission list, and so on, until the monitoring terminal 100 outputs all the actual data combinations.
The principle of comparing the video data and the environmental data contained in the actual data combination with the video data and the environmental data contained in the corresponding target data combination is as follows: and judging whether the video data in the actual data combination is the same as the video data in the corresponding target data combination, and simultaneously judging whether the environment data in the actual data combination is completely the same as the environment data in the corresponding target data combination. For example, the first actual data combination output by the monitoring terminal B6 includes an environment picture, an environment temperature, an environment humidity, and an environment illumination intensity, and the first target data combination arranged in the server A3 transmission list includes an environment picture, an environment temperature, an environment humidity, and an environment illumination intensity, so that it is considered that the first actual data combination output by the monitoring terminal B6 is completely the same as the first target data combination arranged in the server A3 transmission list.
When all the actual data combinations output by the monitoring terminal 100 are verified, if the number of the actual data combinations output by the monitoring terminal 100 is different from the number of the target data combinations in the transmission list, it indicates that data is lost or illegal data is added in the process of transmitting the actual data combinations, so that the number of the actual data combinations output by the monitoring terminal 100 is different from the number of the target data combinations in the transmission list stored in the server 200, that is, it indicates that a security vulnerability exists in the video network.
Step S09: if the information is not credible, outputting early warning information.
The early warning information is used for carrying out early warning prompt on the video network when the video network has security holes, and comprises voice early warning, special color flicker early warning, buzzing sound early warning and the like which can early warn managers in time.
When the server 200 verifies that the actual data combination output by the monitoring terminal 100 is not credible, the server 200 outputs early warning information to prompt a manager that a security vulnerability exists in the video network. For example, when the server 200 outputs the warning information, the microphone on the server 200 sends a voice, "you have a security breach in a video network where data transmission is to be performed, please check the device and reconnect the device," when the manager hears the voice warning, it indicates that the monitoring terminal 100 being verified has the security breach, at this time, the monitoring terminal 100 needs to be physically isolated or software isolated, so as to prevent an illegal person from stealing data through the monitoring terminal 100. The special color flash warning and the buzzer warning can be similar to the voice warning process, and are not described herein.
If the server 200 verifies that the actual data combination output by the monitoring terminal 100 is credible, the server 200 outputs the monitoring data to the display 300, so that the manager can visually see the information of the monitoring environment. The monitoring data is all environmental information obtained by the monitoring environment of the monitoring terminal 100, that is, when the video network is safe, a stable communication link is established between the server 200 and the monitoring terminal 100, the monitoring terminal 100 transmits all data contained in the monitoring environment to the server 200, and the server 200 transmits all data of the monitoring environment to the display 300 for display, so that a manager can visually see all information of the monitoring environment.
The above is an introduction about an embodiment of a method for detecting a security vulnerability in video network transmission based on environmental data, and the scheme of the present application is further explained by the embodiment of the system.
The application provides a video network transmission security vulnerability detection system based on environmental data. The system includes a server 200 and a monitoring terminal 100.
Referring to fig. 3, among others, a server 200 includes: the obtaining module 210 is configured to obtain the verification instruction. The sending module 220 is configured to output a transmission sequence number according to the check instruction, where one of the transmission sequence numbers corresponds to one of the monitoring terminals 100. A receiving module 230, configured to receive an actual data combination returned by the monitoring terminal 100. And the retrieving module 240 is configured to retrieve a transmission list according to the transmission sequence number, where the transmission list includes multiple sets of target data combinations. A determining module 250, configured to determine whether the actual data combination is trusted according to the transmission list and the actual data combination. And the output module 260 is used for outputting the early warning information when the actual data combination is not credible.
Referring to fig. 4, the monitoring terminal 100 includes: the monitoring camera 110, the environment detection sensor 120, the character superimposer 130 and the controller 140, wherein the character superimposer 130 is respectively connected with the monitoring camera 110, the environment detection sensor 120 and the controller 140.
The monitoring camera 110 is used for collecting an environmental picture and generating video data. The environmental detection sensor 120 is used to monitor environmental information and generate environmental data. The controller 140 is configured to control the monitoring camera 110 to output video data to the character superimposer 130, and is further configured to control the environment detection sensor 120 to output environment data to the character superimposer 130. Character superimposer 130 is operative to receive the video data and the environmental data and combine the video data and the environmental data to output an actual data combination. The controller 140 is again used to store the transmission list and the actual data combination.
The foregoing description is only exemplary of the preferred embodiments of the invention and is provided for the purpose of illustrating the general principles of the technology. It will be appreciated by those skilled in the art that the scope of the disclosure herein is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the disclosure. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (4)

1. A video network transmission security hole detection method based on environmental data is characterized in that: the video network comprises a server (200) and a plurality of monitoring terminals (100) connected with the server (200), wherein each monitoring terminal (100) comprises a monitoring camera (110) and a plurality of environment detection sensors (120):
the server (200) is configured to:
acquiring a checking instruction;
outputting a transmission serial number according to the check instruction, wherein one transmission serial number corresponds to one monitoring terminal (100);
the monitoring terminal (100) is configured to:
acquiring a transmission sequence number output by a server (200);
retrieving a transmission list according to the transmission sequence number, the transmission list being established in the monitoring terminal (100), the establishing of the transmission list comprising: acquiring a plurality of video data and a plurality of environment data, combining the plurality of video data and the plurality of environment data to obtain a plurality of groups of target data combinations, calculating the sum of the video data and the environment data contained in the target data combinations, and arranging the plurality of target data combinations according to the sum in a descending order; judging whether the sum of video data and environmental data contained in a plurality of target data combinations is equal, if so, arranging the plurality of target data combinations with the sum of the video data and the environmental data equal according to the time sequence of the combination to obtain a transmission list with the arrangement sequence of the plurality of target data combinations; after the monitoring terminal (100) establishes the transmission list, uploading the transmission list to the server (200);
establishing an actual data combination according to a transmission list, wherein the actual data combination corresponds to the target data combination;
outputting an actual data combination;
the server (200) is further configured to:
receiving the actual data combination;
a transmission list corresponding to each monitoring terminal (100) one by one is stored in the server (200);
when the server (200) receives the actual data combination, calling a transmission list corresponding to the monitoring terminal 100 which uploads the actual data combination;
calling a corresponding target data combination in a transmission list according to the actual data combination;
comparing the video data and the environmental data in the actual data combination with the video data and the environmental data in the corresponding target data combination;
and if the video data and the environmental data contained in the actual data combination are different from the video data and the environmental data contained in the target data combination and/or the number of the actual data combinations output by the monitoring terminal (100) is different from the number of the target data combinations in the transmission list, outputting early warning information.
2. The method for detecting the security vulnerability of the video network transmission based on the environmental data according to claim 1, wherein: the verification instruction is an instruction which is output by the power supply equipment when the server (200) is powered on and is used for driving the server (200) to carry out safety verification on the monitoring terminal (100).
3. The method for detecting the security vulnerability of video network transmission based on environmental data of claim 1, wherein: and the server (200) determines the sequence of checking the monitoring terminals (100) according to the transmission sequence numbers received by the monitoring terminals (100).
4. The utility model provides a video network transmission security vulnerability detection system based on environmental data which characterized in that: comprising a monitoring terminal (100) and a server (200), the monitoring terminal (100) and the server (200) being adapted to implement the method according to any of claims 1-3;
the monitoring terminal (100) includes: the character superimposing device comprises a monitoring camera (110), an environment detection sensor (120), a character superimposer (130) and a controller (140), wherein the character superimposer (130) is respectively connected with the monitoring camera (110), the environment detection sensor (120) and the controller (140);
the monitoring camera (110) is used for collecting environmental pictures and generating video data;
the environment detection sensor (120) is used for monitoring environment information and generating environment data;
the controller (140) is used for controlling the monitoring camera (110) to output video data to the character superimposer (130), and is also used for controlling the environment detection sensor (120) to output environment data to the character superimposer (130);
the character superimposer (130) is used for receiving the video data and the environment data, and combining the video data and the environment data to output an actual data combination;
the controller (140) is further configured to store a transmission list and an actual data combination;
the server (200) comprises:
an acquisition module (210) for acquiring a check instruction;
the sending module (220) is used for outputting transmission serial numbers according to the checking instruction, and one transmission serial number corresponds to one monitoring terminal (100);
a receiving module (230) for receiving the actual data combination;
the calling module (240) is used for calling a transmission list corresponding to the monitoring terminal (100) according to the transmission sequence number, acquiring the arrangement sequence of the target data in the transmission list, and calling a corresponding target data combination in the transmission list according to the actual data combination;
the judging module (250) is used for comparing the video data and the environmental data in the actual data combination with the video data and the environmental data in the corresponding target data combination;
and the output module (260) is used for outputting early warning information when the video data and the environmental data contained in the actual data combination are different from the video data and the environmental data contained in the target data combination and/or the number of the actual data combinations output by the monitoring terminal (100) is different from the number of the target data combinations in the transmission list.
CN202210181777.7A 2022-02-25 2022-02-25 Video network transmission security vulnerability detection method and system based on environmental data Active CN114584848B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210181777.7A CN114584848B (en) 2022-02-25 2022-02-25 Video network transmission security vulnerability detection method and system based on environmental data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210181777.7A CN114584848B (en) 2022-02-25 2022-02-25 Video network transmission security vulnerability detection method and system based on environmental data

Publications (2)

Publication Number Publication Date
CN114584848A CN114584848A (en) 2022-06-03
CN114584848B true CN114584848B (en) 2023-01-24

Family

ID=81775225

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210181777.7A Active CN114584848B (en) 2022-02-25 2022-02-25 Video network transmission security vulnerability detection method and system based on environmental data

Country Status (1)

Country Link
CN (1) CN114584848B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115329347B (en) * 2022-10-17 2023-01-10 中国汽车技术研究中心有限公司 Prediction method, device and storage medium based on car networking vulnerability data

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH09298738A (en) * 1996-04-26 1997-11-18 Sony Corp Supervisory system
JP2006239197A (en) * 2005-03-04 2006-09-14 Mitsubishi Electric System & Service Co Ltd Mobile communication terminal machine
CN103782607B (en) * 2011-09-07 2018-02-16 皇家飞利浦有限公司 Support the apparatus and method for of the operation of the display to view data
CN102932632A (en) * 2012-11-08 2013-02-13 天津市亚安科技股份有限公司 Multifunctional video supervisory system
KR20170099157A (en) * 2016-02-23 2017-08-31 삼성전자주식회사 Providing temperature information and electronic device supporting the same
DE102017216974A1 (en) * 2017-09-25 2019-05-16 Bundesdruckerei Gmbh Datacule structure and method for tamper-proof storage of data
CN110008757B (en) * 2019-04-09 2020-11-03 江南大学 Data protection method and system in updating of terminal firmware of Internet of things
CN112398797B (en) * 2019-08-19 2023-05-02 贵州白山云科技股份有限公司 Data transmission method, receiving device, transmitting device, medium, equipment and system
CN113163170B (en) * 2021-04-21 2022-07-26 中国矿业大学 System and method for superposing rail temperature, beam temperature state temperature and video of high-speed railway
CN113556518B (en) * 2021-09-23 2021-12-17 成都派沃特科技股份有限公司 Video data scheduling method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN114584848A (en) 2022-06-03

Similar Documents

Publication Publication Date Title
CN114584848B (en) Video network transmission security vulnerability detection method and system based on environmental data
KR20220057213A (en) System for detecting abnormal behavior based on artificial intelligence
KR20150018975A (en) Photographing and monitoring system based on GPS for emergency scene using IP CCTV and Photographing and monitoring method for emergency scene therefor
CN110956722A (en) Method, equipment and storage medium for alarming abnormity of intelligent lock
CN112288975A (en) Event early warning method and device
CN107407670B (en) Lucidity tests verification process and equipment
CN117218787A (en) Fire alarm method, device, electronic equipment and storage medium
US20040075555A1 (en) System and method for authenticating live feed from surveillance system
KR101876624B1 (en) Automatic tesing method for normal condition of a display device screen and system of the same
US10452060B2 (en) System and method for monitoring multi-projection theater
CN115766401A (en) Industrial alarm information analysis method and device, electronic equipment and computer medium
CN112910657B (en) Cloud security token early warning system
CN114584793B (en) Video network transmission safety verification method and system with environment data
CN108881860B (en) Artificial intelligent terminal defense system and method
CN106534489A (en) Information sending method, device and system
KR101929977B1 (en) Control equipment abnormality detection control and notification system
CN112650557A (en) Command execution method and device
CN113489939A (en) Intelligent monitoring method and system for power transmission line construction site
KR101529612B1 (en) Wireless Security Systems and Methods
CN103079166A (en) Intelligent family security system
KR102235981B1 (en) Fire detection system and method
CN116455074B (en) Data processing method and device applied to power grid dispatching and electronic equipment
CN111556131B (en) Help seeking information processing method, device and system
CN117332412A (en) Detection method and device for data security system and electronic equipment
CN113806202A (en) Vulnerability mining method and device and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant