CN211930752U - Monitoring system for video encryption - Google Patents
Monitoring system for video encryption Download PDFInfo
- Publication number
- CN211930752U CN211930752U CN202020767813.4U CN202020767813U CN211930752U CN 211930752 U CN211930752 U CN 211930752U CN 202020767813 U CN202020767813 U CN 202020767813U CN 211930752 U CN211930752 U CN 211930752U
- Authority
- CN
- China
- Prior art keywords
- video
- module
- encryption
- video encryption
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Closed-Circuit Television Systems (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The utility model provides a video encryption's monitored control system, including the internet protocol camera, first video encryption and decryption module, second video encryption and decryption module, cipher machine and video monitoring end, the internet protocol camera links to each other with first video encryption and decryption module, second video encryption and decryption module links to each other with the video monitoring end, the internet protocol camera, first video encryption module, second video encryption module, the cipher machine, the video monitoring end carries out the communication through the network, first video encryption and decryption module is including the first network communication module that connects gradually, first access control module, first cipher module. The second video encryption and decryption module comprises a second network communication module, a second access control module and a second password module which are connected in sequence. The utility model discloses avoided video equipment by illegal replacement, video communication identity safety certificate, video data eavesdrop, by the security risk of falsifying, ensured network video transmission's confidentiality, integrality to improve network video monitored control system's security greatly.
Description
Technical Field
The utility model relates to a video security field relates to a monitored control system that video was encrypted.
Background
With the rapid development and popularization of computer technology, a fully digital network video monitoring system has gradually replaced the traditional analog monitoring system to become the mainstream of the video monitoring system. Video monitoring gradually develops from digitalization and simulation to networking, high-definition and intelligentization. Although the development prospect of network video monitoring is generally seen, in practical application, the security of a video monitoring system is not optimistic: the video monitoring equipment and the video monitoring system are frequently exposed to leaks, the video monitoring private network is lack of basic safety protection, the video data is abused and other safety problems seriously affect the safety of video monitoring services, wherein the video monitoring system faces the safety risk problems of replacement of a video source, tampering of the video data, safety transmission of the video data and the like, the video data is transmitted in the internet in a plaintext mode without any encryption, and hackers or illegal organizations can restore real video data through simple data packet grabbing tools to cause that the video data is illegally stolen and stolen.
SUMMERY OF THE UTILITY MODEL
The utility model aims to provide a monitoring system for video encryption,
a monitoring system for video encryption comprises a network camera, a first video encryption and decryption module, a second video encryption and decryption module, a cipher machine and a video monitoring end; the first video encryption and decryption module comprises a first network communication module, a first access control module and a first password module; the second video encryption and decryption module comprises a second network communication module, a second access control module and a second password module; the network camera is connected with the first video encryption and decryption module, and the second video encryption and decryption module is connected with the video monitoring end; the network camera, the first video encryption module, the second video encryption module, the cipher machine and the video monitoring terminal are communicated through a network; the first video encryption and decryption module comprises a first network communication module, a first access control module and a first password module which are connected in sequence; the second video encryption and decryption module comprises a second network communication module, a second access control module and a second password module which are connected in sequence. The video monitoring end is connected with a computer.
The utility model has the advantages that:
(1) the network camera and the video monitoring end system and the structure of the original video monitoring system are not changed.
(2) The safety of the video monitoring system is ensured. The security risks that the video equipment is illegally replaced, the video communication identity is safely authenticated, and the video data is eavesdropped and tampered are avoided, so that the confidentiality and the integrity of network video transmission are ensured, and the security of a network video monitoring system is greatly improved.
Drawings
Fig. 1 is a schematic structural diagram of the present invention.
Fig. 2 is a schematic structural diagram of a first video encryption and decryption module.
Fig. 3 is a schematic structural diagram of a second video encryption/decryption module.
Fig. 4 is a transmission flow chart of encryption and decryption according to the present invention.
In the figure: 1-a web camera; 2-a first video encryption and decryption module; 3-a first network communication module; 4-a first admission control module; 5-a first cryptographic module; 6-a second video encryption and decryption module; 7-a second network communication module; 8-a second admission control module; 9-a second cryptographic module; 10-video monitoring terminal; 11-cipher machine.
Detailed Description
The invention will be described in further detail with reference to the following embodiments in which:
referring to fig. 1, a monitoring system for video encryption comprises a network camera (1), a first video encryption and decryption module (2), a second video encryption and decryption module (6), a cipher machine (11) and a video monitoring terminal (10). The first video encryption and decryption module (2) comprises a first network communication module (3), a first access control module (4) and a first password module (5); the second video encryption and decryption module (6) comprises a second network communication module (7), a second access control module (8) and a second password module (9). The network camera (1) is connected with the first video encryption and decryption module (2), the second video encryption and decryption module (6) is connected with the video monitoring end (10), the network camera (1), the first video encryption module (2), the second video encryption module (6), the cipher machine (11) and the video monitoring end (10) are communicated through a network, and the first video encryption and decryption module (2) comprises a first network communication module (3), a first access control module (4) and a first cipher module (5) which are sequentially connected. The second video encryption and decryption module (6) comprises a second network communication module (7), a second access control module (8) and a second password module (9) which are connected in sequence. The video monitoring end is connected with a computer.
The network camera (1) is used for realizing the acquisition, processing and network transmission of audio and video data in the video monitoring system.
The video monitoring terminal (10) is used for playing audio and video data in the video monitoring system.
The first video encryption and decryption module (2) is used for realizing access control, video data encryption and network transmission of network camera equipment.
The second video encryption and decryption module (6) is used for realizing access control, video data decryption and network transmission of the video monitoring terminal (10).
The cipher machine (11) is used for realizing identity authentication and generation and management of video encryption and decryption keys.
The embodiment of the utility model provides a realized access control, authentication, video data encryption, decryption and the safe transmission of video data to access equipment through above-mentioned device.
The embodiment of the utility model provides a except that doing special explanation to the model of each device, the restriction is not done to the model of other devices, as long as can accomplish the device of above-mentioned function all can.
Claims (1)
1. A video encryption monitoring system, comprising: the system comprises a network camera, a first video encryption and decryption module, a second video encryption and decryption module, a cipher machine and a video monitoring end; the first video encryption and decryption module comprises a first network communication module, a first access control module and a first password module which are connected in sequence; the second video encryption and decryption module comprises a second network communication module, a second access control module and a second password module which are connected in sequence; the network camera is connected with the first video encryption and decryption module, and the second video encryption and decryption module is connected with the video monitoring end; the network camera, the first video encryption module, the second video encryption module, the cipher machine and the video monitoring terminal are communicated through a network; the video monitoring end is connected with a computer.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202020767813.4U CN211930752U (en) | 2020-05-11 | 2020-05-11 | Monitoring system for video encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202020767813.4U CN211930752U (en) | 2020-05-11 | 2020-05-11 | Monitoring system for video encryption |
Publications (1)
Publication Number | Publication Date |
---|---|
CN211930752U true CN211930752U (en) | 2020-11-13 |
Family
ID=73327874
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202020767813.4U Active CN211930752U (en) | 2020-05-11 | 2020-05-11 | Monitoring system for video encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN211930752U (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111432186A (en) * | 2020-05-11 | 2020-07-17 | 中航长沙设计研究院有限公司 | Monitoring system for video encryption |
-
2020
- 2020-05-11 CN CN202020767813.4U patent/CN211930752U/en active Active
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111432186A (en) * | 2020-05-11 | 2020-07-17 | 中航长沙设计研究院有限公司 | Monitoring system for video encryption |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103441839B (en) | Application method and system of a kind of quantum cryptography in IP secure communications | |
CN101989984A (en) | Electronic document safe sharing system and method thereof | |
Pant et al. | Three step data security model for cloud computing based on RSA and steganography | |
CN102024123B (en) | Method and device for importing mirror image of virtual machine in cloud calculation | |
CN107896223A (en) | A kind of data processing method and system, data collecting system and data receiving system | |
CN114036539A (en) | Safety auditable Internet of things data sharing system and method based on block chain | |
Musa et al. | Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security | |
CN112383391A (en) | Data security protection method based on data attribute authorization, storage medium and terminal | |
CN113783683B (en) | Cloud platform privacy protection verifiable data aggregation method based on sensor network | |
CN107612680A (en) | A kind of national secret algorithm in mobile network's payment | |
CN113312608A (en) | Electric power metering terminal identity authentication method and system based on timestamp | |
Zhang et al. | A secure revocable fine-grained access control and data sharing scheme for SCADA in IIoT systems | |
CN102882850A (en) | Cryptographic device and method thereof for isolating data by employing non-network way | |
CN109150906A (en) | A kind of real-time data communication safety method | |
CN211930752U (en) | Monitoring system for video encryption | |
CN101179470A (en) | Dual-protocol based VPN implementing method | |
CN109040120A (en) | A kind of SV message encryption and decryption method based on IEC61850 standard | |
CN111432186A (en) | Monitoring system for video encryption | |
CN111010386B (en) | Privacy protection and data supervision control method based on shared account book | |
Pushpa | Enhancing Data Security by Adapting Network Security and Cryptographic Paradigms | |
CN104994096B (en) | A kind of dynamic load is in the collocation method of the security hardening mechanism module of intelligent substation communication manager | |
Liu et al. | Research on Secure Access Technology of Electric Power Wireless Private Network Based on Hybrid Encryption | |
CN113747431B (en) | Data encryption system and data encryption method of mobile equipment | |
Li et al. | Performance Test and Analysis of National Secret Algorithm SM2 in Power Data Protection | |
KR101210411B1 (en) | Transaction Protection System and Method using Connection of Certificate and OTP Generated by Keystream |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GR01 | Patent grant | ||
GR01 | Patent grant |