CN201336704Y - Remote video monitoring system - Google Patents

Remote video monitoring system Download PDF

Info

Publication number
CN201336704Y
CN201336704Y CNU200820235000XU CN200820235000U CN201336704Y CN 201336704 Y CN201336704 Y CN 201336704Y CN U200820235000X U CNU200820235000X U CN U200820235000XU CN 200820235000 U CN200820235000 U CN 200820235000U CN 201336704 Y CN201336704 Y CN 201336704Y
Authority
CN
China
Prior art keywords
video
key
authentication
mobile
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CNU200820235000XU
Other languages
Chinese (zh)
Inventor
安钻杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TCL Corp
Original Assignee
TCL Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TCL Corp filed Critical TCL Corp
Priority to CNU200820235000XU priority Critical patent/CN201336704Y/en
Application granted granted Critical
Publication of CN201336704Y publication Critical patent/CN201336704Y/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Abstract

The utility model discloses a remote video monitoring system, which comprises a video-playing device and a video-shooting device, wherein the video-shooting device comprises a video-shooting module which is used to shoot video; the video-playing device is connected with the video-shooting device through a communication network; the video-shooting device also comprises a video encryption module which is used to encrypt video; and the video-playing device comprises an authentication and decryption module which is used to decrypt the encrypted video. Because the remote video monitoring system can encrypt the identity authentication process and the video transmission process and all of keys are not transmitted on the network and can be randomly reset at any time, unauthorized users can be effectively prevented from obtaining video data, and thereby the safety of remote video monitoring is ensured.

Description

A kind of Active Eyes
Technical field
The utility model relates to a kind of supervisory control system, relates in particular to a kind of Active Eyes.
Background technology
Along with the network communications technology and Development of Multimedia Technology, the monitoring remote video function enters in the daily life more and more.People can obtain the video in important places such as own family anywhere or anytime by PC, mobile phone or other terminal equipment, monitor its state.But the personal audience venue particularly video of household internal belongs to individual privacy, and the user requires very high to its level security, otherwise would rather.
Present monitoring remote video safe practice great majority are to adopt " usemame/password " right identity identifying technology.The identity identifying method that " usemame/password " is right just carries out simple, static encryption to data, promptly use identical key and cryptographic algorithm that data are encrypted continuously, and this key is easy to be cracked by others or directly illegally utilized behind network interception by the hacker in transmission over networks.Jian Kong video data is not encrypted in transmission course simultaneously, and the user is in monitor procedure like this, and others also can illegally intercept and capture its video data, thereby causes the leakage of privacy of user.
The utility model content
The purpose of this utility model is to provide a kind of Active Eyes that can guarantee user monitoring video data safety.
The technical solution of the utility model is:
A kind of Active Eyes is provided, comprise the video playback apparatus that is used to produce the video absorption equipment of video and is used for displaying video, described video absorption equipment comprises the video production module that is used to carry out the video production, described video playback apparatus is taken in equipment with described video and is connected by communication network, wherein, described video is taken in equipment and is also comprised and be used for video-encryption module that video is encrypted, and described video playback apparatus comprises and is used for authentication deciphering module that the video after encrypting is decrypted.
Active Eyes described in the utility model, wherein, described video is taken in the dynamic video encrypting module that equipment also comprises the dynamic authentication encrypting module that is used for authenticated encryption and is used for video-encryption, and described dynamic authentication encrypting module is connected with described video-encryption module with described dynamic video encrypting module.
Active Eyes described in the utility model, wherein, described dynamic authentication encrypting module comprises:
Be used to the local dynamic authentication cipher key store and the mobile authentication cipher key store register that generate the authenticate key maker of authenticate key and be used for the authentication storage key,
Wherein, described local dynamic authentication cipher key store is connected with described authenticate key maker with mobile authentication cipher key store register.
Active Eyes described in the utility model, wherein, described dynamic video encrypting module comprises:
Be used to the local dynamic video cipher key store and the mobile video cipher key store register that generate the video key generator of video key and be used for the store video key,
Wherein, described local dynamic video cipher key store is connected with described video key generator with mobile video cipher key store register.
Active Eyes described in the utility model, wherein, described Active Eyes also comprises the mobile cryptographic key storehouse of described mobile authentication key of storage and mobile video key.
Active Eyes described in the utility model, wherein, described mobile cryptographic key storehouse is a USB flash disk.
The utility model is by adopting in Active Eyes authentication process and video transmission process two-stage encryption, all keys are not in transmission over networks, and key can carry out irregular resetting at any time, effectively avoid the disabled user to obtain video data, guaranteed the safety of monitoring remote video.
Description of drawings
Fig. 1 is the Active Eyes block diagram of the utility model embodiment;
Fig. 2 is a video playback apparatus structure chart in the Active Eyes of the utility model embodiment;
Fig. 3 is that video is taken in equipment structure chart in the Active Eyes of the utility model embodiment.
Embodiment
Below in conjunction with accompanying drawing, preferred embodiment of the present utility model is described in detail.
In the Active Eyes of the utility model embodiment, the equipment that video was gathered and handled in definition is that video is taken in equipment 200, and it can be IP video camera, network video server or home intelligent terminal etc.Definition is used for that the remote access video is taken in equipment and equipment that displaying video is used is called video playback apparatus 100, and it can be PC, mobile phone etc.As shown in Figure 1, video is taken in equipment 200 and is connected by communication network 300 with video playback apparatus 100, and communication network 300 can be a wired network, also can be other networks such as wireless network.Video is taken in equipment 200 and is comprised the video production module 201 that is used to carry out the video production.
Video in the utility model is taken in equipment 200 and is also comprised and be used for video-encryption module 202 that video is encrypted, described video playback apparatus 100 comprises and is used for authentication deciphering module 101 that video is decrypted, with reference to figure 2, Active Eyes of the present utility model also comprises the mobile cryptographic key storehouse 102 that is used to store mobile cryptographic key.
With reference to figure 3, described video is taken in equipment 200 and is comprised the dynamic video encrypting module 210 that is used to carry out the dynamic authentication encrypting module 220 of authenticated encryption and is used to carry out video-encryption, described dynamic authentication encrypting module 220 is connected with described video-encryption module 202 with described dynamic video encrypting module 210, and described video-encryption module 202 connects described video production module 201.
Described dynamic authentication encrypting module 220 comprises: be used to generate the authenticate key maker 221 of authenticate key, the local dynamic authentication cipher key store 223 that is used for the authentication storage key and mobile authentication cipher key store register 222, wherein local dynamic authentication cipher key store 223 is connected with described authenticate key maker 221 with mobile authentication cipher key store register 222.Described dynamic video encrypting module 210 comprises: be used to generate the video key generator 211 of video key, the local dynamic video cipher key store 213 that is used for the store video key and mobile video cipher key store register 212.Wherein, local dynamic video cipher key store 213 is connected with described video key generator 211 with mobile video cipher key store register 212.
Described mobile cryptographic key storehouse 102 is that the user carries out monitoring remote video necessary electron key, be used for the key of described mobile video cipher key store register 212 and mobile authentication cipher key store register 222 is copied in the described video playback apparatus 100, described mobile cryptographic key storehouse 102 can be storage cards such as USB flash disk or SD/MD.
Active Eyes of the present utility model, before carrying out video monitoring, the user need carry out authentication, obtains the authority of authenticating operation key generator 221 and video key generator 211.After the user obtains authority, start authenticate key maker 221 and 211 work of video key generator, generate 4 cipher key store, comprise local authentication key, mobile authentication key, local video key and mobile video key respectively.Wherein, the local authentication key is stored in the local dynamic authentication cipher key store 223, the mobile authentication key stores mobile authentication cipher key store register 222 into, and the local video key stores local dynamic video cipher key store 213 into, and the mobile video key stores in the mobile video cipher key store register 212.There is the user of authority can upgrade above-mentioned 4 cipher key store at any time, to guarantee video data safety.
When using Active Eyes of the present utility model to carry out video monitoring, the user inserts videos with mobile cryptographic key storehouse 102 and takes in the equipment 200, mobile authentication key and mobile video key is taken in mobile authentication cipher key store register 222 on the equipment 200 and the mobile video cipher key store register 212 from video respectively copy in the mobile cryptographic key storehouse 102.
When the user need carry out video monitoring, use video playback apparatus 100, according to the address of the video absorption equipment of knowing 200, as the IP address, accessing video is taken in equipment 200.Video is taken in equipment 200 and is sent to two numerals of video playback apparatus, is designated as X and Y.This two number is that the authenticate key maker and the video key generator of video absorption equipment 200 produced at random, and requires the user to import username and password.Take out X key the mobile authentication cipher key store of video playback apparatus 100 on copying mobile cryptographic key storehouse 102 to, and use this key, username and password by 101 pairs of user's inputs of described authentication deciphering module is encrypted, and sends to video absorption equipment 200.
Video is taken in equipment 200 according to the username and password ciphertext of receiving then, takes out X key in local dynamic authentication cipher key store 223, and X key of described video-encryption module 202 usefulness is decrypted the username and password ciphertext.The username and password that keeps on username and password after video is taken in equipment 200 and will decipher then and the machine contrasts, if validated user just can monitor video, otherwise refuses its visit.
When validated user is monitored video, at first, 201 pairs of videos of video production module are produced, video-encryption module 202 is taken out Y key from local dynamic video cipher key store 213, video-encryption module 202 is encrypted the video data of producing according to Y key, and the video data after will encrypting sends to legal video playback apparatus 100.
When validated user carries out video playback, the mobile video cipher key store of video playback apparatus 100 on copying mobile cryptographic key storehouse 102 to, take out Y key, authentication deciphering module 101 is decrypted the video data through encrypting that receives according to Y key, and the video flowing after the broadcast deciphering, thereby realization is to the normal monitoring of video flowing.
In above-mentioned video monitoring process, video playback apparatus 100 every the scheduled time from the mobile video cipher key store that copies mobile cryptographic key storehouse 102 to, retrieve Y key.In case find to read Y key failure, stop video monitoring immediately, effectively avoid the disabled user to enter.
In the Active Eyes of the present utility model, have only under the situation that obtains user name, password and up-to-date mobile cryptographic key storehouse at the same time, just can enter the video monitoring state.Owing to carry out video monitoring and all use different keys at every turn, and all keys do not transmit on network, and the video data of transmission also is through encrypting, and therefore, the disabled user is difficult to invasion and obtains the video data of transmission.Even the disabled user once cracks success, because key is constantly changed, it also can't enter next time.In addition, user name, password and mobile cryptographic key storehouse can be taken in equipment at video and change at any time, even it is lost or has divulged a secret, as long as in video absorption equipment, reset user name corresponding, password and mobile cryptographic key storehouse, just having lost efficacy in then original user name, password and mobile cryptographic key storehouse, effectively guarantees data security.
The utility model is by adopting in Active Eyes authentication process and video transmission process two-stage encryption, all keys are not in transmission over networks, and key can irregularly at any time be reset, effectively avoid the disabled user to obtain video data, guaranteed the safety of monitoring remote video.
Should be understood that, for those of ordinary skills, can be improved according to the above description or conversion, and all these improvement and conversion all should belong to the protection range of the utility model claims.

Claims (6)

1, a kind of Active Eyes, comprise the video playback apparatus that is used to produce the video absorption equipment of video and is used for displaying video, described video absorption equipment comprises the video production module that is used to carry out the video production, described video playback apparatus is taken in equipment with described video and is connected by communication network, it is characterized in that: described video is taken in equipment and is also comprised and be used for video-encryption module that video is encrypted, and described video playback apparatus comprises and is used for authentication deciphering module that the video after encrypting is decrypted.
2, Active Eyes as claimed in claim 1, it is characterized in that, described video is taken in the dynamic video encrypting module that equipment also comprises the dynamic authentication encrypting module that is used for authenticated encryption and is used for video-encryption, and described dynamic authentication encrypting module is connected with described video-encryption module with described dynamic video encrypting module.
3, Active Eyes as claimed in claim 2 is characterized in that, described dynamic authentication encrypting module comprises:
Be used to the local dynamic authentication cipher key store and the mobile authentication cipher key store register that generate the authenticate key maker of authenticate key and be used for the authentication storage key,
Wherein, described local dynamic authentication cipher key store is connected with described authenticate key maker with mobile authentication cipher key store register.
4, Active Eyes as claimed in claim 3 is characterized in that, described dynamic video encrypting module comprises:
Be used to the local dynamic video cipher key store and the mobile video cipher key store register that generate the video key generator of video key and be used for the store video key,
Wherein, described local dynamic video cipher key store is connected with described video key generator with mobile video cipher key store register.
5, Active Eyes as claimed in claim 4 is characterized in that, described Active Eyes also comprises the mobile cryptographic key storehouse of described mobile authentication key of storage and mobile video key.
6, Active Eyes as claimed in claim 5 is characterized in that, described mobile cryptographic key storehouse is a USB flash disk.
CNU200820235000XU 2008-12-08 2008-12-08 Remote video monitoring system Expired - Lifetime CN201336704Y (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNU200820235000XU CN201336704Y (en) 2008-12-08 2008-12-08 Remote video monitoring system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNU200820235000XU CN201336704Y (en) 2008-12-08 2008-12-08 Remote video monitoring system

Publications (1)

Publication Number Publication Date
CN201336704Y true CN201336704Y (en) 2009-10-28

Family

ID=41288369

Family Applications (1)

Application Number Title Priority Date Filing Date
CNU200820235000XU Expired - Lifetime CN201336704Y (en) 2008-12-08 2008-12-08 Remote video monitoring system

Country Status (1)

Country Link
CN (1) CN201336704Y (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101827261A (en) * 2010-04-30 2010-09-08 梁纳星 High-definition monitoring system
CN102934006A (en) * 2010-04-01 2013-02-13 奥林巴斯株式会社 Endoscope device, and connecting unit for endoscope device
CN103152556A (en) * 2013-03-15 2013-06-12 云南大学 Surveillance video encryption method for protecting privacy
CN107426628A (en) * 2017-07-11 2017-12-01 国创科视科技股份有限公司 A kind of video data protection system and processing method
CN107959573A (en) * 2017-12-12 2018-04-24 华东交通大学 A kind of guard method of the IP Camera based on digital signature
CN109819217A (en) * 2019-02-14 2019-05-28 上海图丽信息技术有限公司 A kind of monitoring is mobile to have access to system
CN110213547A (en) * 2019-06-27 2019-09-06 芜湖乐知智能科技有限公司 A kind of novel remote video monitoring system

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102934006A (en) * 2010-04-01 2013-02-13 奥林巴斯株式会社 Endoscope device, and connecting unit for endoscope device
CN101827261A (en) * 2010-04-30 2010-09-08 梁纳星 High-definition monitoring system
CN103152556A (en) * 2013-03-15 2013-06-12 云南大学 Surveillance video encryption method for protecting privacy
CN107426628A (en) * 2017-07-11 2017-12-01 国创科视科技股份有限公司 A kind of video data protection system and processing method
CN107959573A (en) * 2017-12-12 2018-04-24 华东交通大学 A kind of guard method of the IP Camera based on digital signature
CN109819217A (en) * 2019-02-14 2019-05-28 上海图丽信息技术有限公司 A kind of monitoring is mobile to have access to system
CN110213547A (en) * 2019-06-27 2019-09-06 芜湖乐知智能科技有限公司 A kind of novel remote video monitoring system

Similar Documents

Publication Publication Date Title
CN103763319B (en) Method for safely sharing mobile cloud storage light-level data
CN201336704Y (en) Remote video monitoring system
CN103685323B (en) A kind of Smart Home safe network implementation method based on intelligent cloud television gateway
CN103812854B (en) Identity authentication system, device and method and identity authentication requesting device
CN101908113B (en) Authentication method and authentication system
US20120254622A1 (en) Secure Access to Electronic Devices
CN103248479A (en) Cloud storage safety system, data protection method and data sharing method
CN101853533B (en) Password setting method and device used for building gate control system
CN104113839A (en) Mobile data safety protection system and method based on SDN
CN106452770A (en) Data encryption method and apparatus, data decryption method and apparatus, and system
CN101448130A (en) Method, system and device for protecting data encryption in monitoring system
US20150304321A1 (en) An image management system and an image management method based on fingerprint authentication
CN101877702A (en) Method and system for activating and authenticating an internet protocol television client
CN101895881B (en) Method for realizing GBA secret key and pluggable equipment of terminal
CN105471901A (en) Industrial information security authentication system
CN108848107A (en) A kind of method of secure transmission web information
CN101888626B (en) Method and terminal equipment for realizing GBA key
CN101626484A (en) Method for protecting control word in condition access system, front end and terminal
JP2005244534A (en) Device and method for cipher communication
CN113794702A (en) Communication high-level encryption method in intelligent household system
CN110691225B (en) High-security encryption method for playing of AP direct connection/local area network camera
CN112422279A (en) Intelligent terminal key management method and hierarchical management system
CN112311553A (en) Equipment authentication method based on challenge response
CN108270917B (en) Encrypted smart phone
WO2020093212A1 (en) Video data transmission system and method, and device

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CX01 Expiry of patent term

Granted publication date: 20091028

CX01 Expiry of patent term