Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, system and device for improving monitoring data security

A monitoring data and security technology, applied in transmission systems, closed-circuit television systems, electrical components, etc., can solve the problems of low security or authenticity of monitoring information

Active Publication Date: 2015-09-02
VIMICRO CORP +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to at least solve one of the above-mentioned technical defects, especially solve the technical defects of existing monitoring information with low security or authenticity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and device for improving monitoring data security
  • Method, system and device for improving monitoring data security
  • Method, system and device for improving monitoring data security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0084] In this embodiment, the encoding end encrypts the unit load of the original data unit, and sets an encryption flag in the unit header of the encrypted data unit to indicate that the unit load of the encrypted data unit at the decoding end is encrypted, and the encoding end generates The security parameter set is sent to the decoding end to indicate the algorithm used for encryption. In order to have a clearer and comprehensive understanding of the present invention, the following briefly introduces the process of compression and encoding of the collected monitoring data by the encoding end.

[0085] The monitoring data encoded by the encoding terminal in the monitoring system, such as audio and video content and generated alarm information, needs to be transmitted back to the monitoring center through the network, such as the decoding terminal in the present invention. Usually, the encoding end compresses and encodes the collected monitoring data to generate compression la...

Embodiment 2

[0124] Compared with the first embodiment, this embodiment not only needs to encrypt the unit load of the original data unit RDU, but also needs to authenticate the unit load of the original data unit RDU to generate the corresponding authentication data before encryption. The authentication data is encrypted. After decrypting to obtain the unit load of the original data unit RDU and the authentication data, the decoding end also authenticates the obtained unit load of the original data unit RDU, generates the corresponding comparative authentication data of the decoding end, and judges the generated Compare whether the authentication data is consistent with the received authentication data. If they are inconsistent, it is considered that the unit load of the original data unit RDU has been tampered with and an alarm signal is sent to the user.

[0125] Such as Image 6 Shown is a flow chart of a method for improving the security of monitoring data according to the second embodime...

Embodiment 3

[0167] This embodiment is different from the second embodiment in that the encoding end encrypts the authentication data loaded by the original data unit RDU unit and the unit load of the original data unit RDU together to generate the unit load of the encrypted data unit. If the authentication key information needs to be transmitted, the encoding end encrypts the authentication key information, the authentication data loaded by the original data unit RDU unit and the unit load of the original data unit RDU together to generate the unit load of the encrypted data unit. The decoding end decrypts the unit load of the encrypted data unit EDU according to the encryption algorithm obtained by analyzing the security parameter set, and obtains the unit load and authentication data of the corresponding original data unit RDU, or obtains the unit load and authentication data of the corresponding original data unit RDU And authentication key information. Such as Picture 11 Shown is a sc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for improving the safety of monitoring data, which comprises the following steps that: an encoding terminal acquires the monitoring data; the encoding terminal encodes, divides and packages the monitoring data into corresponding raw data units; the encoding terminal encrypts the unit loads of the raw data units to generate the unit loads of the corresponding encrypted data units; the encoding terminal packages the encrypted data units and sends the encrypted data units to a decoding terminal, and sets an encryption mark in the unit heading of the encrypted data unit for indicating that the unit loads of the encrypted data units are encrypted as well as the algorithm for encryption. By carrying out encryption and authentication processing on the raw data units by the encoding terminal, the method can ensure the safety, reliability and integrity of the data, and has the advantages of high universality and simple implementation.

Description

Technical field [0001] The present invention relates to the field of monitoring technology, in particular to a method, system and device for improving the security of monitoring data. Background technique [0002] With the continuous development of electronic information technology and the popularization of the Internet, audio and video surveillance and other high-tech technologies have been applied in every field of the national economy. Modern shopping malls and banks are inseparable from modern management and security methods. Urban security monitoring, traffic management, forest fire monitoring, etc. are also inseparable from audio and video surveillance technology. In the above-mentioned surveillance applications, the security of many surveillance information (including audio and video data) is very important. For example, the video information of the bank's internal surveillance will not only reveal the internal security of the bank, but also may reveal the user's password ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04N7/18
Inventor 邱嵩卢京辉杨晓东金兆玮邓中翰陈朝武李晓峰袁丽蓉
Owner VIMICRO CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More