CN116016994A - Method suitable for high-efficiency video encryption transmission of Internet - Google Patents

Method suitable for high-efficiency video encryption transmission of Internet Download PDF

Info

Publication number
CN116016994A
CN116016994A CN202211623244.6A CN202211623244A CN116016994A CN 116016994 A CN116016994 A CN 116016994A CN 202211623244 A CN202211623244 A CN 202211623244A CN 116016994 A CN116016994 A CN 116016994A
Authority
CN
China
Prior art keywords
key
encryption
monitoring equipment
symmetric
video data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202211623244.6A
Other languages
Chinese (zh)
Inventor
程银兵
瞿洪桂
邱飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Sinonet Science and Technology Co Ltd
Original Assignee
Beijing Sinonet Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Sinonet Science and Technology Co Ltd filed Critical Beijing Sinonet Science and Technology Co Ltd
Priority to CN202211623244.6A priority Critical patent/CN116016994A/en
Publication of CN116016994A publication Critical patent/CN116016994A/en
Withdrawn legal-status Critical Current

Links

Images

Landscapes

  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The invention discloses a method suitable for the high-efficiency video encryption transmission of the Internet, which comprises the steps that when an APP or a background program of an application accesses monitoring equipment on the Internet, an access request is sent; after receiving the access request, the monitoring equipment generates a key pair by utilizing an asymmetric encryption algorithm; after receiving the key pair, the APP or a background program of the application generates a symmetric key Q by using a symmetric encryption algorithm, and encrypts the symmetric key Q by using the key pair to generate an encryption key Q1; after receiving the encryption key Q1, the monitoring equipment decrypts the encryption key Q1 by utilizing the key pair to obtain a symmetric key Q; the monitoring equipment encrypts the video data by using the symmetric key Q, and transmits the encrypted video data to an APP or a background program of an application; and after receiving the encrypted video data, the APP or the applied background program decrypts the encrypted video data to restore the whole video data. The advantages are that: the method can effectively solve the problem of information security of video data in the internet network transmission process, and is safer and higher in encryption efficiency.

Description

Method suitable for high-efficiency video encryption transmission of Internet
Technical Field
The invention relates to the technical field of video encryption transmission, in particular to a method suitable for high-efficiency video encryption transmission of the Internet.
Background
In recent years, the civil monitoring market is in a rapid growth trend. The civil monitoring is suitable for viewing left-behind children, old people, kindergarten and other public social resources, and the like, so that personnel working outside can pay attention to the safety of children and old people at any time and any place to provide good service. However, civil monitoring is transmitted on the internet, and if an illegal person performs data capture on the internet, the security threat of disclosure can be caused to the restoration of the video data. Although the standard of GB35114 is released at present as an effective supplement to the video security aspect, the requirements of GB35114 are extremely high, special equipment and the like are needed, the cost is high, the implementation is relatively complex, and the method is not suitable for the civil monitoring market. There is therefore no universal solution for civil monitoring. Basically, each product manufacturer uses its own private protocol mode, but still uses transmission of unencrypted video streams, and there is a risk of disclosure of video on the internet.
Some proprietary protocols used by civilian monitoring manufacturers encrypt the video stream. One is to use a static fixed key, all devices of the manufacturer encrypt the data with the fixed key, but once the key encryption is broken, all video data of all monitoring devices transmitted by the manufacturer on the internet can be broken by the same key. The other is that each monitoring device dynamically generates a secret key and transmits the secret key to an application end; although the keys of each device are different, all video monitoring devices cannot be cracked by using the same key, the situation that the device is required to transmit the dynamically generated key to the application side is also unsafe, the dynamically generated key is directly grabbed out by grabbing a packet, and the method is easier to crack in theory than a static fixed key.
Considering the above two situations, there is still a relatively high security risk in the transmission of an unencrypted bare video stream over the internet or in the transmission of a simple encrypted video stream, so it is very necessary to provide a method suitable for efficient video encrypted transmission over the internet from the viewpoint of security of video information transmitted over the internet.
Disclosure of Invention
The invention aims to provide a method suitable for efficient video encryption transmission of the Internet, so as to solve the problems in the prior art.
In order to achieve the above purpose, the technical scheme adopted by the invention is as follows:
a method suitable for the high-efficiency video encryption transmission of the Internet comprises the following steps,
s1, when an APP or a background program of an application accesses monitoring equipment on the Internet, sending an access request;
s2, after the monitoring equipment receives the access request, generating a key pair by using an asymmetric encryption algorithm; after receiving the key pair, the APP or a background program of the application generates a symmetric key Q by using a symmetric encryption algorithm, and encrypts the symmetric key Q by using the key pair to generate an encryption key Q1; after receiving the encryption key Q1, the monitoring equipment decrypts the encryption key Q1 by utilizing the key pair to obtain a symmetric key Q;
s3, the monitoring equipment encrypts the first 128 bytes of every 4096 bytes of video data by using the symmetric key Q, and transmits the encrypted video data to an APP or a background program of an application;
s4, after receiving the encrypted video data, the APP or the applied background program decrypts the encrypted video data, so that the whole video data is restored, and the whole video data is stored and/or displayed.
Preferably, step S2 specifically includes,
s21, after receiving an access request, the monitoring equipment generates a key pair through an asymmetric encryption algorithm, wherein the key pair comprises a public key M and a private key N; the private key N monitoring equipment stores the private key N, and the plaintext of the public key M is sent to an APP or a background program of an application;
s22, after receiving a public key M sent by a plaintext, an APP or a background program of an application generates a symmetric key Q through a symmetric encryption algorithm, encrypts the symmetric key Q by using the public key M to generate an encryption key Q1, and sends the encryption key Q1 to monitoring equipment;
s23, the monitoring equipment decrypts the encryption key Q1 by using the private key N stored by the monitoring equipment to obtain a symmetric key Q.
Preferably, in step S3, data of less than 4096 bytes is still encrypted with the symmetric key Q for the first 128 bytes.
The beneficial effects of the invention are as follows: 1. compared with the existing internet video bare data transmission, the method can effectively solve the problem of information security of video data in the internet network transmission process. 2. Compared with the existing internet video data encryption mode, the method is safer and higher in encryption efficiency.
Drawings
FIG. 1 is a schematic flow chart of the method of the present invention.
FIG. 2 is a schematic flow diagram of a certificate exchange of an encryption process of the method of the present invention;
FIG. 3 is a schematic diagram of the method of the present invention encrypting streaming media data;
fig. 4 is a schematic view of an application scenario of the method of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the detailed description is presented by way of example only and is not intended to limit the invention.
Example 1
In this embodiment, a method suitable for efficient video encryption transmission of internet is provided, and the method combines the characteristics of two encryption algorithms, namely symmetric encryption and asymmetric encryption, and an application scene to form a method which dynamically generates a key and cannot be cracked even if the key is wrapped. The key is encrypted by a two-layer encryption mode.
Symmetric encryption algorithm: symmetric encryption adopts a symmetric cipher coding technology, and is characterized in that data encryption and decryption use the same key encryption, namely a key can also be used as a decryption key, and the method is called a symmetric encryption algorithm.
Asymmetric encryption algorithm: two key public keys (publ i key) and private keys (pr i vatekey) are required. The public key and the private key are a pair, and if the data is encrypted by the public key, the data can be decrypted only by the corresponding private key; if the data is encrypted with a private key, then decryption is only possible with the corresponding public key. Because two different keys are used for encryption and decryption, this algorithm is called an asymmetric encryption algorithm.
As shown in fig. 1, the method of the present invention specifically comprises the steps of,
s1, when an APP or a background program of an application accesses monitoring equipment on the Internet, sending an access request;
s2, after the monitoring equipment receives the access request, generating a key pair by using an asymmetric encryption algorithm; after receiving the key pair, the APP or a background program of the application generates a symmetric key Q by using a symmetric encryption algorithm, and encrypts the symmetric key Q by using the key pair to generate an encryption key Q1; after receiving the encryption key Q1, the monitoring equipment decrypts the encryption key Q1 by utilizing the key pair to obtain a symmetric key Q;
as shown in fig. 2, step S2 specifically includes the following,
s21, after receiving an access request, the monitoring equipment generates a key pair through an asymmetric encryption algorithm, wherein the key pair comprises a public key M (pub l ickey) and a private key N (pr i vatekey); the private key N monitoring equipment stores the private key N, and the plaintext of the public key M is sent to an APP or a background program of an application;
s22, after receiving a public key M sent by a plaintext, an APP or a background program of an application generates a symmetric key Q through a symmetric encryption algorithm, encrypts the symmetric key Q by using the public key M to generate an encryption key Q1, and sends the encryption key Q1 to monitoring equipment;
s23, the monitoring equipment decrypts the encryption key Q1 by using the private key N stored by the monitoring equipment to obtain a symmetric key Q.
S3, the monitoring equipment encrypts the first 128 bytes of every 4096 bytes of video data by using the symmetric key Q, the data with less than 4096 bytes still encrypts the first 128 bytes by using the symmetric key Q, and the encrypted video data is transmitted to an APP or a background program of an application;
s4, after receiving the encrypted video data, the APP or the applied background program decrypts the encrypted video data, so that the whole video data is restored, and the whole video data is stored and/or displayed.
In this embodiment, the streaming media data is too large in data size, and the full data encryption may cause insufficient board-side CPU resources. Therefore, as shown in fig. 3, the encryption key is AES obtained in the above procedure by using the skip encryption method provided by the present invention, and the encryption method is performed by encrypting the first 128 bytes of every 4096 bytes, including audio and video stream (including intercom) and snap shot pictures.
Example two
In this embodiment, as shown in fig. 2, a specific usage scenario of the method of the present invention is shown in fig. 4, and a deployment environment needs to be built when the method is specifically used, which specifically includes:
1. front-end camera: camera devices in the individual user's home (indoor, outdoor, head shaking, infrared, rifle bolt, hemisphere, dome camera, resolution from millions to 4 million, depending on the scene and modality of use).
2. Public network cloud storage: storing alarm video, pictures, regular video and the like, and directly pushing the message to a user mobile phone APP through a cloud platform.
3. Cell phone APP: the general functions of the mobile phone client of the user are simple and convenient, and the mobile phone client of the user can realize real-time, review, control and information display).
4. P2P: the P2P is a technology of local area network penetration, after penetration, the mobile phone APP and the equipment camera can directly watch real-time video and intercom service through the network, the penetrating P2P provides forwarding service, and bandwidth and resources of the P2P server can be greatly saved through penetration.
After the deployment environment is normally built, during normal use, the front-end camera encrypts videos or pictures for alarming and sends the videos or pictures to the cloud storage server cluster for storage, meanwhile, a message is sent to the mobile phone APP of the user, the user can check the videos and the pictures after confidential data are encrypted through the mobile phone APP, the user mobile phone APP can also check real-time video and voice intercom (P2P is used for opening the network of the user mobile phone and the front-end camera), the mobile phone APP is not limited by regions, and the mobile phone APP is a real-time thousand-in-line and in-the-air one in the front of the eyes at a distance.
By adopting the technical scheme disclosed by the invention, the following beneficial effects are obtained:
compared with the existing internet video bare data transmission, the method can effectively solve the problem of information security of video data in the internet network transmission process. Compared with the existing internet video data encryption mode, the method is safer and higher in encryption efficiency.
The foregoing is merely a preferred embodiment of the present invention and it should be noted that modifications and adaptations to those skilled in the art may be made without departing from the principles of the present invention, which is also intended to be covered by the present invention.

Claims (3)

1. A method suitable for the high-efficiency video encryption transmission of the Internet is characterized by comprising the following steps: comprises the following steps of the method,
s1, when an APP or a background program of an application accesses monitoring equipment on the Internet, sending an access request;
s2, after the monitoring equipment receives the access request, generating a key pair by using an asymmetric encryption algorithm; after receiving the key pair, the APP or a background program of the application generates a symmetric key Q by using a symmetric encryption algorithm, and encrypts the symmetric key Q by using the key pair to generate an encryption key Q1; after receiving the encryption key Q1, the monitoring equipment decrypts the encryption key Q1 by utilizing the key pair to obtain a symmetric key Q;
s3, the monitoring equipment encrypts the first 128 bytes of every 4096 bytes of video data by using the symmetric key Q, and transmits the encrypted video data to an APP or a background program of an application;
s4, after receiving the encrypted video data, the APP or the applied background program decrypts the encrypted video data, so that the whole video data is restored, and the whole video data is stored and/or displayed.
2. The method for efficient video encrypted transmission over the internet according to claim 1, wherein: step S2 specifically includes the following,
s21, after receiving an access request, the monitoring equipment generates a key pair through an asymmetric encryption algorithm, wherein the key pair comprises a public key M and a private key N; the private key N monitoring equipment stores the private key N, and the plaintext of the public key M is sent to an APP or a background program of an application;
s22, after receiving a public key M sent by a plaintext, an APP or a background program of an application generates a symmetric key Q through a symmetric encryption algorithm, encrypts the symmetric key Q by using the public key M to generate an encryption key Q1, and sends the encryption key Q1 to monitoring equipment;
s23, the monitoring equipment decrypts the encryption key Q1 by using the private key N stored by the monitoring equipment to obtain a symmetric key Q.
3. The method for efficient video encrypted transmission over the internet according to claim 1, wherein: in step S3, data of less than 4096 bytes is still encrypted with the symmetric key Q for the first 128 bytes.
CN202211623244.6A 2022-12-16 2022-12-16 Method suitable for high-efficiency video encryption transmission of Internet Withdrawn CN116016994A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211623244.6A CN116016994A (en) 2022-12-16 2022-12-16 Method suitable for high-efficiency video encryption transmission of Internet

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211623244.6A CN116016994A (en) 2022-12-16 2022-12-16 Method suitable for high-efficiency video encryption transmission of Internet

Publications (1)

Publication Number Publication Date
CN116016994A true CN116016994A (en) 2023-04-25

Family

ID=86024032

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211623244.6A Withdrawn CN116016994A (en) 2022-12-16 2022-12-16 Method suitable for high-efficiency video encryption transmission of Internet

Country Status (1)

Country Link
CN (1) CN116016994A (en)

Similar Documents

Publication Publication Date Title
CN107277456B (en) Safe video monitoring system based on Android equipment
CN101163228B (en) Video data encrypted system and method for network video monitoring
CN107343179B (en) A kind of encryption of video information and video terminal safety certifying method
CN110602703B (en) Bluetooth communication data encryption method, terminal and system for BLE
US8290871B1 (en) Systems and methods for a secure recording environment
CN101448130B (en) Method, system and device for protecting data encryption in monitoring system
CN101079696B (en) A stream media encryption system and method for industrial monitoring system
CN107483505B (en) Method and system for protecting user privacy in video chat
CN101094394A (en) Method for guaranteeing safe transmission of video data, and video monitoring system
US7853800B2 (en) Systems and methods for a secure recording environment
CN104519013B (en) Ensure the method, apparatus and system of media stream safety
CN110427762B (en) Encryption and decryption method for realizing video security transmission of power monitoring system
CN102724563A (en) Monitoring front end and terminal, monitoring system as well as audio/video signal encryption and decryption methods
CN105847238A (en) Safe data transmission method based on Real-Time Messaging Protocol (RTMP) connections
CN112104454B (en) Data secure transmission method and system
TW201417546A (en) Instant messaging method and system
CN101420587A (en) Network video collecting device, network video monitoring system and method
CN101707767A (en) Data transmission method and devices
WO2011127804A1 (en) Method, apparatus and system for data encryption transmission in m2m
CN201336704Y (en) Remote video monitoring system
CN105681253B (en) Data encryption and transmission method, equipment, gateway in centralized network
CN109474426B (en) Quantum security communication system and communication method for multimedia data stream
CN108848084B (en) A kind of safety monitoring network communication method based on safety
KR100789354B1 (en) Method and apparatus for mataining data security on network camera, home gateway and home automation
CN116016994A (en) Method suitable for high-efficiency video encryption transmission of Internet

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20230425

WW01 Invention patent application withdrawn after publication