Method, system and device for improving monitoring data security
A monitoring data and security technology, applied in transmission systems, closed-circuit television systems, electrical components, etc., can solve the problems of low security or authenticity of monitoring information
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0084] In this embodiment, the encoding end encrypts the unit load of the original data unit, and sets an encryption flag in the unit header of the encrypted data unit to indicate that the unit load of the encrypted data unit at the decoding end is encrypted, and the encoding end generates The security parameter set is sent to the decoding end to indicate the algorithm used for encryption. In order to have a clearer and comprehensive understanding of the present invention, the following briefly introduces the process of compression and encoding of the collected monitoring data by the encoding end.
[0085] The monitoring data encoded by the encoding terminal in the monitoring system, such as audio and video content and generated alarm information, needs to be transmitted back to the monitoring center through the network, such as the decoding terminal in the present invention. Usually, the encoding end compresses and encodes the collected monitoring data to generate compression la...
Embodiment 2
[0124] Compared with the first embodiment, this embodiment not only needs to encrypt the unit load of the original data unit RDU, but also needs to authenticate the unit load of the original data unit RDU to generate the corresponding authentication data before encryption. The authentication data is encrypted. After decrypting to obtain the unit load of the original data unit RDU and the authentication data, the decoding end also authenticates the obtained unit load of the original data unit RDU, generates the corresponding comparative authentication data of the decoding end, and judges the generated Compare whether the authentication data is consistent with the received authentication data. If they are inconsistent, it is considered that the unit load of the original data unit RDU has been tampered with and an alarm signal is sent to the user.
[0125] Such as Image 6 Shown is a flow chart of a method for improving the security of monitoring data according to the second embodime...
Embodiment 3
[0167] This embodiment is different from the second embodiment in that the encoding end encrypts the authentication data loaded by the original data unit RDU unit and the unit load of the original data unit RDU together to generate the unit load of the encrypted data unit. If the authentication key information needs to be transmitted, the encoding end encrypts the authentication key information, the authentication data loaded by the original data unit RDU unit and the unit load of the original data unit RDU together to generate the unit load of the encrypted data unit. The decoding end decrypts the unit load of the encrypted data unit EDU according to the encryption algorithm obtained by analyzing the security parameter set, and obtains the unit load and authentication data of the corresponding original data unit RDU, or obtains the unit load and authentication data of the corresponding original data unit RDU And authentication key information. Such as Picture 11 Shown is a sc...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
