TWI437876B - Backup method of remote monitoring system - Google Patents
Backup method of remote monitoring system Download PDFInfo
- Publication number
- TWI437876B TWI437876B TW100101827A TW100101827A TWI437876B TW I437876 B TWI437876 B TW I437876B TW 100101827 A TW100101827 A TW 100101827A TW 100101827 A TW100101827 A TW 100101827A TW I437876 B TWI437876 B TW I437876B
- Authority
- TW
- Taiwan
- Prior art keywords
- monitoring system
- remote monitoring
- encrypted
- data packet
- central control
- Prior art date
Links
Landscapes
- Telephonic Communication Services (AREA)
- Closed-Circuit Television Systems (AREA)
Description
本發明係有關於一種備份方法,且特別是有關於一種遠端監控系統備份方法。The present invention relates to a backup method, and in particular to a remote monitoring system backup method.
近年來由於工商發達、社會進步,相對提供之產品亦主要針對便利、確實、經濟實惠為主旨,因此,當前開發之產品亦比以往更加進步,而得以貢獻社會。In recent years, due to the development of industrial and commercial development and social progress, the products provided are mainly aimed at convenience, reliability, and economic benefits. Therefore, the products currently being developed are more advanced than before and can contribute to society.
許多偏遠地區的鐵路平交道,基於安全而配置了網路影像紀錄器(NVR)或數位影像紀錄器(DVR)。然而在成本考量上,一般不會在偏遠地區的鐵路平交道配置人員監看影像,因此,不需要安裝顯示器(monitor)與鍵盤……等周邊設備,以供即時影像監控及設定,而是由中央的中控中心端(CMS)來對偏遠地區的鐵路平交道所設置的NVR或DVR進行監視。Many railway crossings in remote areas are equipped with a Network Image Recorder (NVR) or Digital Image Recorder (DVR) based on security. However, in terms of cost considerations, it is generally not necessary to deploy personnel to monitor images in railway level crossings in remote areas. Therefore, it is not necessary to install peripherals such as monitors and keyboards, etc., for real-time image monitoring and setting, but by The central central control center (CMS) monitors the NVR or DVR set up in the railway crossings in remote areas.
一般而言,設置於偏遠地區的NVR或DVR與中控中心端的網路連線頻寬都不高,造成即時監控的影像品質受限,甚至沒有即時影像回傳。當事故發生時,若中控中心端要透過低頻寬的網路連線來取得偏遠地區之NVR或DVR的影像,往往曠日廢時而無法在第一時間取得所需影像,並且無法確保所取得之影像的安全性。In general, the bandwidth of the network connection between the NVR or DVR installed in a remote area and the center of the central control center is not high, resulting in limited image quality for real-time monitoring, and even no instant image return. When an accident occurs, if the central control center wants to obtain images of NVRs or DVRs in remote areas through low-frequency wide network connections, it is often impossible to obtain the required images in the first time and cannot ensure the location. The security of the acquired image.
由此可見,上述現有的方式,顯然仍存在不便與缺陷,而有待加以進一步改進。為了解決上述問題,相關領域莫不費盡心思來謀求解決之道,但長久以來一直未見適用的方式被發展完成。因此,如何改善取得偏遠地區之NVR或DVR影像耗時甚劇的問題以及如何確保所取得之影像的安全性,實屬當前重要研發課題之一,亦成為當前相關領域亟需改進的目標。It can be seen that the above existing methods obviously still have inconveniences and defects, and need to be further improved. In order to solve the above problems, the relevant fields have not exhausted their efforts to seek solutions, but the methods that have not been applied for a long time have been developed. Therefore, how to improve the time-consuming problems of obtaining NVR or DVR images in remote areas and how to ensure the security of the images obtained is one of the current important research and development topics, and it has become an urgent need for improvement in related fields.
本發明內容之一目的是在提供一種遠端監控系統備份方法,藉以改善取得偏遠地區之NVR或DVR影像耗時甚劇的問題,並確保所取得之影像的安全性。It is an object of the present invention to provide a remote monitoring system backup method for improving the time-consuming problem of obtaining NVR or DVR images in remote areas and ensuring the security of the acquired images.
為達上述目的,本發明內容之一技術樣態係關於一種遠端監控系統備份方法,其係透過中控中心端、遠端分支端與遠端監控系統,將儲存於遠端監控系統的影像資訊安全地備份至儲存裝置中,前述方法包含以下步驟:利用中控中心端根據對稱金鑰將資料封包與安全認證憑證進行加密後,透過第一網路將經加密的資料封包與安全認證憑證傳送至遠端監控系統;利用遠端監控系統接收經加密的資料封包並根據對稱金鑰將加密的資料封包進行解密。In order to achieve the above object, a technical aspect of the present invention relates to a remote monitoring system backup method, which is to store an image stored in a remote monitoring system through a central control center, a remote branch end, and a remote monitoring system. The information is safely backed up to the storage device. The foregoing method includes the following steps: using the central control center to encrypt the data packet and the security authentication certificate according to the symmetric key, and encrypting the encrypted data packet and the security authentication certificate through the first network. The data is transmitted to the remote monitoring system; the remote monitoring system receives the encrypted data packet and decrypts the encrypted data packet according to the symmetric key.
此外,利用遠端監控系統檢查經解密的資料封包是否為前述資料封包;若是,利用遠端監控系統儲存經加密的安全認證憑證;利用中控中心端根據對稱金鑰將資料封包、安全認證憑證與起迄時間資料進行加密並透過第二網路傳送至遠端分支端;利用遠端分支端儲存經加密的資料封包、經加密的安全認證憑證與經加密的起迄時間資料至儲存裝置。In addition, the remote monitoring system is used to check whether the decrypted data packet is the foregoing data packet; if yes, the remote monitoring system is used to store the encrypted security authentication certificate; and the central control center uses the symmetric key to encapsulate the data and the security authentication certificate. And the start time data is encrypted and transmitted to the remote branch through the second network; the remote branch is used to store the encrypted data packet, the encrypted security authentication certificate and the encrypted start and end time data to the storage device.
然後,連接儲存裝置至遠端監控系統;以及利用遠端監控系統檢查儲存裝置中的經加密的資料封包與經加密的安全認證憑證是否符合遠端監控系統中的經加密資料封包與經加密安全認證憑證;若是,利用遠端監控系統根據起迄時間資料將遠端監控系統中的影像資料透過對稱金鑰進行加密並儲存至儲存裝置中。And then connecting the storage device to the remote monitoring system; and using the remote monitoring system to check whether the encrypted data packet in the storage device and the encrypted security authentication certificate conform to the encrypted data packet and the encrypted security in the remote monitoring system The authentication certificate; if yes, the remote monitoring system encrypts the image data in the remote monitoring system according to the start and end time data through the symmetric key and stores it in the storage device.
根據本發明一實施例,對稱金鑰係利用包含以下步驟的方法所產生:利用中控中心端與遠端監控系統共同產生一組主要金鑰,並分別存放至中控中心端與遠端監控系統內;中控中心端與遠端監控系統進行認證;以及利用中控中心端與遠端監控系統根據主要金鑰以共同產生前述組對稱金鑰。According to an embodiment of the invention, the symmetric key is generated by using a method comprising the following steps: using the central control center and the remote monitoring system to jointly generate a set of main keys, and respectively storing them to the central control center and remote monitoring Within the system; the central control center and the remote monitoring system perform authentication; and the central control center and the remote monitoring system jointly generate the aforementioned group symmetric key according to the primary key.
根據本發明另一實施例,利用遠端監控系統根據起迄時間資料將遠端監控系統中的影像資料透過對稱金鑰間進行加密並儲存至儲存裝置中的步驟後,更包含以下步驟:利用遠端分支端透過第二網路將經加密的影像資料傳送至中控中心端;以及利用中控中心端根據對稱金鑰將經加密的影像資料進行解密,以安全取得影像資料。According to another embodiment of the present invention, after the step of encrypting and storing the image data in the remote monitoring system through the symmetric key according to the start and end time data to the storage device, the remote monitoring system further includes the following steps: The remote branch transmits the encrypted image data to the central control center through the second network; and uses the central control center to decrypt the encrypted image data according to the symmetric key to securely obtain the image data.
根據本發明再一實施例,對稱金鑰具有時效,若對稱金鑰超過時效,則遠端監控系統無法將遠端監控系統中的影像資料儲存至儲存裝置中。According to still another embodiment of the present invention, the symmetric key is time-sensitive. If the symmetric key exceeds the time limit, the remote monitoring system cannot store the image data in the remote monitoring system into the storage device.
根據本發明又一實施例,利用遠端監控系統將遠端監控系統中的影像資料儲存至儲存裝置中的步驟,更包含:利用遠端監控系統根據影像資料產生第一雜湊數並儲存至儲存裝置中。According to still another embodiment of the present invention, the step of storing the image data in the remote monitoring system into the storage device by using the remote monitoring system further includes: generating, by the remote monitoring system, the first hash number according to the image data and storing the same to the storage device. In the device.
根據本發明另再一實施例,利用中控中心端根據對稱金鑰將經加密的影像資料進行解密的步驟,更包含:利用中控中心端根據經解密的影像資料產生第二雜湊數,並判斷第一雜湊數是否等於第二雜湊數;若是,產生影像資料有效信號;以及若否,產生影像資料無效信號。According to still another embodiment of the present invention, the step of decrypting the encrypted image data according to the symmetric key by using the central control center further comprises: generating, by the central control center, the second hash number according to the decrypted image data, and Determining whether the first hash number is equal to the second hash number; if so, generating an image data valid signal; and if not, generating an image data invalid signal.
根據本發明另又一實施例,資料封包包含固定字串以及嚴格遞增的對話數字。In accordance with yet another embodiment of the present invention, the data packet contains a fixed string and a strictly increasing number of dialogs.
根據本發明再另一實施例,當遠端監控系統檢查儲存裝置中之經加密資料封包中的固定字串不符合遠端監控系統中之經加密資料封包中的固定字串時,產生警示信號。According to still another embodiment of the present invention, when the remote monitoring system checks that the fixed string in the encrypted data packet in the storage device does not conform to the fixed string in the encrypted data packet in the remote monitoring system, an alert signal is generated. .
根據本發明再又一實施例,當遠端監控系統檢查儲存裝置中之經加密資料封包中的嚴格遞增的對話數字不符合遠端監控系統中之嚴格遞增的對話數字時,產生警示信號。In accordance with still another embodiment of the present invention, an alert signal is generated when the remote monitoring system checks that the strictly increasing number of conversations in the encrypted data packet in the storage device does not conform to the strictly increasing number of conversations in the remote monitoring system.
根據本發明又另一實施例,當遠端監控系統檢查儲存裝置中經加密的安全認證憑證不符合遠端監控系統中經加密的安全認證憑證時,產生警示信號。According to still another embodiment of the present invention, when the remote monitoring system checks that the encrypted security authentication credential in the storage device does not conform to the encrypted security authentication credential in the remote monitoring system, an alert signal is generated.
因此,根據本發明之技術內容,本發明實施例藉由提供一種遠端監控系統備份方法,藉以改善取得偏遠地區之NVR或DVR影像耗時甚劇的問題。此外,透過中控中心端、遠端分支端與遠端監控系統三方所設定的通訊協定,若第三者欲從中進行任何竄改的動作或員工無意間損壞了所需影像……等,均可由本發明實施例之遠端監控系統備份方法察覺,從而確保所取得之影像的安全性。Therefore, according to the technical content of the present invention, an embodiment of the present invention provides a method for backing up a remote monitoring system, thereby improving the problem of obtaining an NVR or DVR image in a remote area. In addition, through the communication protocol set by the central control center, the remote branch and the remote monitoring system, if the third party wants to perform any tampering action or the employee inadvertently damages the required image, etc., The remote monitoring system backup method of the embodiment of the present invention detects the security of the acquired image.
為了使本揭示內容之敘述更加詳盡與完備,可參照所附之圖式及以下所述各種實施例,圖式中相同之號碼代表相同或相似之元件。但所提供之實施例並非用以限制本發明所涵蓋的範圍,而結構運作之描述非用以限制其執行之順序,任何由元件重新組合之結構,所產生具有均等功效的裝置,皆為本發明所涵蓋的範圍。其中圖式僅以說明為目的,並未依照原尺寸作圖。另一方面,眾所週知的元件與步驟並未描述於實施例中,以避免對本發明造成不必要的限制。In order to make the description of the present disclosure more complete and complete, reference is made to the accompanying drawings and the accompanying drawings. However, the embodiments provided are not intended to limit the scope of the invention, and the description of the operation of the structure is not intended to limit the order of its execution, and any device that is recombined by the components produces equal devices. The scope covered by the invention. The drawings are for illustrative purposes only and are not drawn to the original dimensions. On the other hand, well-known elements and steps are not described in the embodiments to avoid unnecessarily limiting the invention.
第1圖係依照本發明一實施例繪示一種中控中心端、遠端分支端與遠端監控系統的三方通訊示意圖。FIG. 1 is a schematic diagram of three-way communication between a central control center, a remote branch end, and a remote monitoring system according to an embodiment of the invention.
如第1圖所示,本發明實施例之遠端監控系統備份方法係透過中控中心端110、遠端分支端130與遠端監控系統120,將儲存於遠端監控系統120的影像資訊安全地備份至儲存裝置中。As shown in FIG. 1 , the remote monitoring system backup method of the embodiment of the present invention secures the image information stored in the remote monitoring system 120 through the central control center 110, the remote branch 130, and the remote monitoring system 120. Back up to the storage device.
在本實施例中,中控中心端110可設置於企業的總公司,遠端分支端130可設置於企業的分公司,遠端監控系統120可為包含網路影像紀錄器(NVR)或數位影像紀錄器(DVR)的系統。In this embodiment, the central control center 110 can be set at the enterprise's head office, the remote branch 130 can be set at the enterprise branch, and the remote monitoring system 120 can include a network image recorder (NVR) or a digital device. Video Recorder (DVR) system.
於操作上,本發明實施例提出由中控中心端110、遠端分支端130與遠端監控系統120三方所設定的通訊協定。首先,在中控中心端110規劃好要擷取哪一段時間中由遠端監控系統120所擷取的影像,隨後由中控中心端110產生一段安全認證密碼及設定。Operationally, the embodiment of the present invention proposes a communication protocol set by the central control center 110, the remote branch end 130, and the remote monitoring system 120. First, at the central control center 110, the image captured by the remote monitoring system 120 is planned to be captured, and then the central control center 110 generates a secure authentication password and setting.
接著,中控中心端110透過第二網路傳給遠端分支端130的員工,員工將安全認證憑證及設定複製到儲存裝置(例如:隨身碟)上,並將儲存裝置攜至遠端監控系統120直接插入NVR端的USB埠,即可把影像帶回然後由遠端分支端130傳給中控中心端110。Then, the central control center 110 transmits the security authentication credentials and settings to the storage device (for example, a flash drive) through the second network to the employee of the remote branch 130, and carries the storage device to the remote monitoring. The system 120 is directly inserted into the USB port of the NVR, and the image can be brought back and then transmitted to the central control center 110 by the remote branch 130.
第2圖係依照本發明又一實施例繪示一種對稱金鑰的產生方法流程圖。FIG. 2 is a flow chart showing a method for generating a symmetric key according to another embodiment of the present invention.
請一併參照第1圖與第2圖,首先,利用中控中心端110與遠端監控系統120共同產生一組主要金鑰(master key),並分別存放至中控中心端110與遠端監控系統120內(步驟201)。Referring to FIG. 1 and FIG. 2 together, first, a central key is used to generate a set of master keys together with the remote monitoring system 120, and are respectively stored to the central control center 110 and the remote end. Within monitoring system 120 (step 201).
在步驟201中,主要金鑰是一組隨機數字(random number),可以用人工輸入、條碼掃瞄或是以迪菲海爾曼密鑰交換法(Diffie-Hellman key exchange algorithm)來產生,而且主要金鑰只會產生一次。In step 201, the primary key is a set of random numbers, which can be generated by manual input, barcode scanning, or by Diffie-Hellman key exchange algorithm, and mainly The key will only be generated once.
其次,中控中心端110與遠端監控系統120進行認證(步驟202),隨後,利用中控中心端110與遠端監控系統120根據主要金鑰以共同產生一組對稱金鑰(步驟203)。Next, the central control center 110 and the remote monitoring system 120 perform authentication (step 202), and then use the central control center 110 and the remote monitoring system 120 to jointly generate a set of symmetric keys according to the primary key (step 203). .
在步驟201中,對稱金鑰的產生方法如GPG session key generation algorithm或是SSL的session key generation algorithm等已知的algorithm。In step 201, the symmetric key is generated by a known algorithm such as a GPG session key generation algorithm or an SSL session key generation algorithm.
在此需說明的是,對稱金鑰是於中控中心端110、遠端分支端130與遠端監控系統120三方的通訊協定中,作為資料安全加密與解密的機制,如此一來,可確保資料安全的於三方通訊中進行傳輸。It should be noted that the symmetric key is used in the communication protocol between the central control center 110, the remote branch end 130 and the remote monitoring system 120 as a mechanism for data security encryption and decryption, thereby ensuring Data security is transmitted in three-way communication.
另外,即便資料在傳輸的過程中出現人為或非人為的錯誤,亦可被上述機制偵測出來,進一步確保資料的安全性。In addition, even if there is a human or non-human error in the transmission of the data, it can be detected by the above mechanism to further ensure the security of the data.
第3圖係依照本發明一實施例繪示一種遠端監控系統備份方法的流程圖。FIG. 3 is a flow chart showing a method for backing up a remote monitoring system according to an embodiment of the invention.
請同時參照第1圖與第3圖,首先,利用中控中心端110根據對稱金鑰(session key)將資料封包與安全認證憑證(random number security token)進行加密後,透過第一網路將經加密的資料封包與安全認證憑證傳送至遠端監控系統120(步驟301)。Please refer to FIG. 1 and FIG. 3 at the same time. First, the central control center 110 encrypts the data packet and the random number security token according to the session key, and then transmits the first network through the first network. The encrypted data packet and the secure authentication credentials are transmitted to the remote monitoring system 120 (step 301).
在步驟301中,當中控中心端110發現偏遠地區的平交道發生事故時,中控中心端110會啟動安全遠端監視系統備份機制。首先,利用中控中心端110根據對稱金鑰將資料封包與安全認證憑證進行加密,其中資料封包包含固定字串(例如:AVerMedia)與嚴格遞增的對話數字(例如:session number)。然後,透過第一網路(例如:低頻寬網路,低頻寬網路可為網際網路與遠距離無線網路)將經加密的資料封包與安全認證憑證傳送至遠端監控系統120。In step 301, when the central control center 110 finds an accident in a level crossing in a remote area, the central control center 110 initiates a backup mechanism of the secure remote monitoring system. First, the central control center 110 encrypts the data packet and the security authentication certificate according to the symmetric key, wherein the data packet includes a fixed string (for example: AVerMedia) and a strictly increasing number of conversations (for example, a session number). The encrypted data packets and security authentication credentials are then transmitted to the remote monitoring system 120 over the first network (eg, a low frequency wide network, the low frequency wide network can be an internet and a remote wireless network).
其次,利用遠端監控系統120接收經加密的資料封包並根據對稱金鑰將加密的資料封包進行解密(步驟302)。Second, the remote monitoring system 120 is utilized to receive the encrypted data packet and decrypt the encrypted data packet based on the symmetric key (step 302).
在步驟302中,當遠端監控系統120接收到中控中心端110傳過來的經加密的資料封包後,遠端監控系統120透過同樣的對稱性加密方法,把經加密的資料封包用對稱金鑰解開。In step 302, after the remote monitoring system 120 receives the encrypted data packet transmitted from the central control center 110, the remote monitoring system 120 uses the same symmetric encryption method to encapsulate the encrypted data with symmetric gold. The key is unlocked.
接著,利用遠端監控系統120檢查經解密的資料封包是否為前述資料封包(步驟303)。若是,利用遠端監控系統120儲存經加密的安全認證憑證(步驟304)。Next, the remote monitoring system 120 is utilized to check whether the decrypted data packet is the aforementioned data packet (step 303). If so, the remote security monitoring system 120 is utilized to store the encrypted secure authentication credentials (step 304).
詳細而言,遠端監控系統120會檢查固定字串是否相同,以及嚴格遞增的對話數字是否比已知的嚴格遞增的對話數字大,若檢查結果皆為是,才利用遠端監控系統120儲存經加密的安全認證憑證。若檢查結果的其中一者為否,則產生警示信號(步驟311)。In detail, the remote monitoring system 120 checks whether the fixed strings are the same, and whether the strictly increasing number of conversations is greater than the known strictly increasing number of conversations. If the result of the check is yes, the remote monitoring system 120 is used for storage. Encrypted security certificate. If one of the check results is no, a warning signal is generated (step 311).
在此需說明的是,若嚴格遞增的對話數字等於或小於已知的嚴格遞增的對話數字,則此資料封包可能為惡意的重現(playback)封包,此時就要將重現封包拋棄。It should be noted that if the strictly increasing number of conversations is equal to or less than the known strictly increasing number of conversations, the data packet may be a malicious playback packet, and the recurring packet is discarded at this time.
所謂重現封包與駭客在網路上側錄使用者密碼,並利用所側錄到的使用者密碼來登入使用者之帳號的概念相似。The concept of re-creating packets and hackers to record user passwords on the Internet and using the user passwords recorded on the side to log in to the user's account is similar.
當第三者為了竊取遠端監控系統120中的影像資料時,就算第三者側錄到前述資料封包,然中控中心端110啟動之安全遠端監視系統備份機制已完成循環一次,假設這次循環所產生的嚴格遞增的對話數字為2,第三者側錄到前述資料封包的嚴格遞增的對話數字亦為2。When the third party steals the image data in the remote monitoring system 120, even if the third party records the data packet, the backup mechanism of the secure remote monitoring system initiated by the central control center 110 has completed the loop once, assuming this time. The strictly increasing number of conversations generated by the loop is 2, and the strictly increasing number of conversations recorded by the third party to the aforementioned data packet is also 2.
因此,當第三者使用側錄到的嚴格遞增的對話數字2再與遠端監控系統120溝通時,遠端監控系統120就會檢查出嚴格遞增的對話數字2等於遠端監控系統120中的嚴格遞增的對話數字2,此時遠端監控系統120會判定此為重現封包而將其拋棄。如此一來,即可確保資料傳輸的安全性。前述第三者係指意圖非法竊取、竄改或毀壞遠端監控系統120中之影像資料者。Therefore, when the third party communicates with the remote monitoring system 120 using the strictly increasing dialog number 2 recorded on the side, the remote monitoring system 120 checks that the strictly increasing dialog number 2 is equal to that in the remote monitoring system 120. The strictly increasing number of conversations 2, at which point the remote monitoring system 120 will determine that this is a recurring packet and discard it. In this way, the security of data transmission can be ensured. The aforementioned third party refers to a person who intends to illegally steal, tamper with or destroy the image data in the remote monitoring system 120.
隨後,利用中控中心端110根據對稱金鑰將資料封包、安全認證憑證與起迄時間資料進行加密,並透過第二網路傳送至遠端分支端130(步驟305)。Then, the central control center 110 encrypts the data packet, the security authentication credential and the start and end time data according to the symmetric key, and transmits the data to the remote branch end 130 through the second network (step 305).
在步驟305中,中控中心端110根據相同於遠端監控系統120內的對稱金鑰將同一資料封包、同一安全認證憑證與起迄時間資料進行加密,隨後,透過第二網路(例如:高頻寬網路,高頻寬網路可為虛擬私人網路(Virtual Private Network,VPN)與ADSL/光纖連線)傳送至遠端分支端130。In step 305, the central control center 110 encrypts the same data packet, the same security authentication credential and the start and end time data according to the symmetric key in the remote monitoring system 120, and then passes through the second network (for example: The high frequency wide network, the high frequency wide network can be transmitted to the remote branch end 130 for the virtual private network (VPN) and the ADSL/fiber connection.
所謂起迄時間資料是用以記錄所需取得之影像資料期間,例如中控中心端110發現偏遠地區的平交道發生事故的時間為某日15點30分,則起迄時間資料所記錄需取得影像資料的期間可為某日的15點整至16點整。The so-called time-of-day data is used to record the required image data. For example, when the central control center 110 finds an accident in a remote area, the time of the accident is 15:30 on a certain day. The period of the image data can be from 15:00 to 16:00 on a certain day.
然後,利用遠端分支端130儲存經加密的資料封包、經加密的安全認證憑證與經加密的起迄時間資料至儲存裝置(步驟306),接著,連接儲存裝置至遠端監控系統120(步驟307)。Then, the remote branch 130 stores the encrypted data packet, the encrypted security authentication credential and the encrypted start and end time data to the storage device (step 306), and then connects the storage device to the remote monitoring system 120 (step 307).
在步驟306與307中,遠端分支端130的員工會將經加密的資料封包、經加密的安全認證憑證與經加密的起迄時間資料儲存至儲存裝置(例如:隨身碟)內,接著,員工將儲存裝置攜至平交道發生事故處並連接儲存裝置至遠端監控系統120。In steps 306 and 307, the employee of the remote branch 130 stores the encrypted data packet, the encrypted security authentication credential and the encrypted start and end time data in a storage device (eg, a flash drive), and then, The employee brings the storage device to the accident intersection and connects the storage device to the remote monitoring system 120.
利用遠端監控系統120檢查儲存裝置中之經加密的資料封包與安全認證憑證,並判斷是否符合遠端監控系統120中的經加密資料封包與安全認證憑證(步驟308)。若是,利用遠端監控系統120根據起迄時間資料將遠端監控系統120中的影像資料透過對稱金鑰進行加密並儲存至儲存裝置中(步驟309)。The remote monitoring system 120 is used to check the encrypted data packet and the security authentication credential in the storage device, and determine whether the encrypted data packet and the security authentication credential in the remote monitoring system 120 are met (step 308). If so, the remote monitoring system 120 uses the start and end time data to encrypt the image data in the remote monitoring system 120 through the symmetric key and store it in the storage device (step 309).
如前所述,資料封包包含固定字串與嚴格遞增的對話數字,因此在步驟308中,遠端監控系統120檢查儲存裝置中之經加密的資料封包之固定字串與嚴格遞增對話數字,若與遠端監控系統120中之經加密的資料封包之固定字串與嚴格遞增的對話數字相符合,且經加密的安全認證憑證亦相符合的話,執行步驟309。As previously mentioned, the data packet contains a fixed string and a strictly increasing number of conversations, so in step 308, the remote monitoring system 120 checks the fixed string of encrypted data packets in the storage device and strictly increments the conversation number, if Step 309 is performed if the fixed string of the encrypted data packet in the remote monitoring system 120 matches the strictly increasing dialog number and the encrypted secure authentication certificate also matches.
此外,遠端監控系統120檢查儲存裝置中之經加密資料封包中的固定字串,若與遠端監控系統120中之經加密資料封包中的固定字串不相符時,產生警示信號(步驟311)。In addition, the remote monitoring system 120 checks the fixed string in the encrypted data packet in the storage device, and generates a warning signal if the fixed string in the encrypted data packet in the remote monitoring system 120 does not match (step 311). ).
在另一實施例中,遠端監控系統120檢查儲存裝置中之經加密資料封包中的嚴格遞增的對話數字,若與遠端監控系統120中之嚴格遞增的對話數字不相符時,產生警示信號(步驟311)。In another embodiment, the remote monitoring system 120 checks for strictly increasing dialog digits in the encrypted data packet in the storage device, and generates an alert signal if it does not match the strictly increasing dialog number in the remote monitoring system 120. (Step 311).
在又一實施例中,當遠端監控系統120檢查儲存裝置中之經加密的安全認證憑證不符合遠端監控系統中之經加密的安全認證憑證時,產生警示信號(步驟311)。In yet another embodiment, the alert signal is generated when the remote monitoring system 120 checks that the encrypted secure authentication credentials in the storage device do not comply with the encrypted secure authentication credentials in the remote monitoring system (step 311).
在步驟309中,舉例而言,若起迄時間資料所記錄需取得影像資料的期間為某日15點整至16點整,則遠端監控系統120會透過對稱金鑰將遠端監控系統120中某日15點整至16點整的影像資料進行加密,並儲存至儲存裝置中。In step 309, for example, if the period of time required to obtain the image data recorded by the time-of-day data is from 15:00 to 6:00, the remote monitoring system 120 transmits the remote monitoring system 120 through the symmetric key. The image data from 15:00 to 16:00 on a certain day is encrypted and stored in the storage device.
在此需說明的是,對稱金鑰具有一時效,若對稱金鑰超過時效,則遠端監控系統120無法將遠端監控系統120中的影像資料儲存至儲存裝置中。It should be noted that the symmetric key has an aging time. If the symmetric key exceeds the aging time, the remote monitoring system 120 cannot store the image data in the remote monitoring system 120 into the storage device.
舉例而言,若對稱金鑰所設定的時效為6小時,則自執行完步驟306後的6小時內沒有接續執行步驟307的話,對稱金鑰就會失效,而遠端監控系統120將無法把遠端監控系統120中的影像資料儲存至儲存裝置中。For example, if the aging time set by the symmetric key is 6 hours, if the step 307 is not executed within 6 hours after the execution of step 306, the symmetric key will be invalid, and the remote monitoring system 120 will not be able to The image data in the remote monitoring system 120 is stored in the storage device.
在遠端監控系統120將其中的影像資料儲存至儲存裝置後,利用遠端分支端130透過第二網路將經加密的影像資料傳送至中控中心端110(步驟312)。接著,利用中控中心端根據對稱金鑰將經加密的影像資料進行解密,以安全取得影像資料(步驟313)。After the remote monitoring system 120 stores the image data therein to the storage device, the remote branch terminal 130 transmits the encrypted image data to the central control center 110 through the second network (step 312). Then, the encrypted image data is decrypted according to the symmetric key by the central control center to securely acquire the image data (step 313).
詳細而言,為確保安全取得影像資料,如步驟309所示,在利用遠端監控系統120將遠端監控系統120中的影像資料儲存至儲存裝置中後,遠端監控系統120會根據影像資料進行計算以產生第一雜湊數(hash signature)並儲存至儲存裝置中。In detail, to ensure that the image data is securely obtained, as shown in step 309, after the remote monitoring system 120 is used to store the image data in the remote monitoring system 120 into the storage device, the remote monitoring system 120 may use the image data according to the image data. A calculation is performed to generate a first hash signature and stored in a storage device.
接著,在步驟313中,利用中控中心端110根據對稱金鑰將經加密的影像資料進行解密,並由中控中心端110根據經解密的影像資料產生第二雜湊數。隨後,由中控中心端110判斷該第一雜湊數是否等於該第二雜湊數:若是,則產生影像資料有效信號,代表安全取得了影像資料;若否,則產生影像資料無效信號,代表影像資料可能被竄改過。Next, in step 313, the central control center 110 decrypts the encrypted image data according to the symmetric key, and the central control center 110 generates a second hash number based on the decrypted image data. Then, the central control center 110 determines whether the first number of hashes is equal to the second number of hashes: if yes, an image data valid signal is generated, which means that the image data is securely obtained; if not, an image data invalid signal is generated, representing the image. The information may have been tampered with.
如上所述之遠端監控系統備份方法皆可由軟體、硬體與/或軔體來執行。舉例來說,若以執行速度及精確性為首要考量,則基本上可選用硬體與/或軔體為主;若以設計彈性為首要考量,則基本上可選用軟體為主;或者,可同時採用軟體、硬體及軔體協同作業。The remote monitoring system backup method as described above can be performed by software, hardware and/or carcass. For example, if the execution speed and accuracy are the primary considerations, the hardware and/or the carcass may be mainly used; if the design flexibility is the primary consideration, the software may be mainly used; or At the same time, the software, hardware and carcass work together.
應瞭解到,以上所舉的這些例子並沒有所謂孰優孰劣之分,亦並非用以限制本發明,熟習此項技藝者當視當時需要彈性設計之。It should be understood that the above examples are not intended to limit the present invention, and are not intended to limit the present invention. Those skilled in the art will need to design elastically at that time.
再者,所屬技術領域中具有通常知識者當可明白,遠端監控系統備份方法中之各步驟依其執行之功能予以命名,僅係為了讓本案之技術更加明顯易懂,並非用以限定該等步驟。將各步驟予以整合成同一步驟或分拆成多個步驟,或者將任一步驟更換到另一步驟中執行,皆仍屬於本揭示內容之實施方式。Furthermore, those skilled in the art can understand that the steps in the remote monitoring system backup method are named according to the functions they perform, only to make the technology of the present invention more obvious and understandable, and not to limit the Wait for steps. It is still an embodiment of the present disclosure to integrate the steps into the same step or to split into multiple steps, or to replace any of the steps into another step.
由上述本發明實施方式可知,應用本發明具有下列優點。本發明實施例藉由提供一種遠端監控系統備份方法,藉以改善取得偏遠地區之NVR或DVR影像耗時甚劇的問題。It will be apparent from the above-described embodiments of the present invention that the application of the present invention has the following advantages. The embodiment of the present invention improves the time-consuming problem of obtaining an NVR or DVR image in a remote area by providing a remote monitoring system backup method.
此外,透過中控中心端110、遠端分支端130與遠端監控系統120三方所設定的通訊協定,若第三者欲從中進行任何竄改的動作或員工無意間損壞了所需影像……等,均可由本發明實施例之遠端監控系統備份方法察覺,從而確保所取得影像的安全性。In addition, through the communication protocol set by the central control center 110, the remote branch end 130 and the remote monitoring system 120, if the third party wants to perform any tampering action or the employee inadvertently damages the required image, etc. The remote monitoring system backup method of the embodiment of the present invention can be detected to ensure the security of the acquired image.
雖然本發明已以實施方式揭露如上,然其並非用以限定本發明,任何熟習此技藝者,在不脫離本發明之精神和範圍內,當可作各種之更動與潤飾,因此本發明之保護範圍當視後附之申請專利範圍所界定者為準。Although the present invention has been disclosed in the above embodiments, it is not intended to limit the present invention, and the present invention can be modified and modified without departing from the spirit and scope of the present invention. The scope is subject to the definition of the scope of the patent application attached.
110...中控中心端110. . . Central control center
120...遠端監控系統120. . . Remote monitoring system
130...遠端分支端130. . . Remote branch
201~203...步驟201~203. . . step
301~313...步驟301~313. . . step
為讓本發明之上述和其他目的、特徵、優點與實施例能更明顯易懂,所附圖式之說明如下:The above and other objects, features, advantages and embodiments of the present invention will become more apparent and understood.
第1圖係繪示依照本發明一實施例的一種中控中心端、遠端分支端與遠端監控系統的三方通訊示意圖。FIG. 1 is a schematic diagram of three-way communication between a central control center end, a remote branch end, and a remote monitoring system according to an embodiment of the invention.
第2圖係繪示依照本發明再一實施例的一種對稱金鑰的產生方法流程圖。2 is a flow chart showing a method for generating a symmetric key according to still another embodiment of the present invention.
第3圖係繪示依照本發明另一實施例的一種遠端監控系統備份方法的流程圖。FIG. 3 is a flow chart showing a method for backing up a remote monitoring system according to another embodiment of the present invention.
301~313...步驟301~313. . . step
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW100101827A TWI437876B (en) | 2011-01-18 | 2011-01-18 | Backup method of remote monitoring system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW100101827A TWI437876B (en) | 2011-01-18 | 2011-01-18 | Backup method of remote monitoring system |
Publications (2)
Publication Number | Publication Date |
---|---|
TW201233151A TW201233151A (en) | 2012-08-01 |
TWI437876B true TWI437876B (en) | 2014-05-11 |
Family
ID=47069819
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW100101827A TWI437876B (en) | 2011-01-18 | 2011-01-18 | Backup method of remote monitoring system |
Country Status (1)
Country | Link |
---|---|
TW (1) | TWI437876B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9609069B2 (en) * | 2014-12-15 | 2017-03-28 | Lenovo Enterprise Solutions (Singapore) Pte. Ltd. | Administering a remote session between a target computing device and a remote computing device |
-
2011
- 2011-01-18 TW TW100101827A patent/TWI437876B/en not_active IP Right Cessation
Also Published As
Publication number | Publication date |
---|---|
TW201233151A (en) | 2012-08-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106104562B (en) | System and method for securely storing and recovering confidential data | |
CN103595721B (en) | Network disk file secure sharing method, sharing means and shared system | |
US9852300B2 (en) | Secure audit logging | |
US10567708B2 (en) | Surveillance server, method of processing data of surveillance server, and surveillance system | |
CN108494811B (en) | Data transmission security authentication method and device | |
CN105553668B (en) | The time is authorized to verify the method and system of user's certificate of authority by verification | |
US9961048B2 (en) | System and associated software for providing advanced data protections in a defense-in-depth system by integrating multi-factor authentication with cryptographic offloading | |
CN106790037B (en) | User mode encrypted instant messaging method and system | |
CN102932143B (en) | Certification in digital interrogation device, encrypting and decrypting and tamper resistant method | |
JP2008533882A (en) | How to backup and restore encryption keys | |
US9215070B2 (en) | Method for the cryptographic protection of an application | |
US10311215B2 (en) | Secure recording and rendering of encrypted multimedia content | |
CN112685786A (en) | Financial data encryption and decryption method, system, equipment and storage medium | |
CN116244750A (en) | Secret-related information maintenance method, device, equipment and storage medium | |
JP2009290508A (en) | Electronized information distribution system, client device, server device and electronized information distribution method | |
CN109040109B (en) | Data transaction method and system based on key management mechanism | |
TWI437876B (en) | Backup method of remote monitoring system | |
CN111355581A (en) | Block chain access control method, equipment and storage medium | |
CN113342896B (en) | Scientific research data safety protection system based on cloud fusion and working method thereof | |
WO2018121394A1 (en) | Mobile terminal, alarm information acquisition and sending method and device | |
CN111343421B (en) | Video sharing method and system based on white-box encryption | |
CN106303575B (en) | Video encryption system based on domestic commercial cipher module and implementation method | |
CN109104393A (en) | A kind of identity authentication method, device and system | |
TWI794126B (en) | A supervision system and method on end-to-end encrypted messaging | |
US20240121083A1 (en) | Secure restoration of private key |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MM4A | Annulment or lapse of patent due to non-payment of fees |