Unlock instant, AI-driven research and patent intelligence for your innovation.

Security control method and equipment

A security control and security technology, applied in the field of communication, can solve the problems of inability to obtain data, implementation difficulties, and inability to carry out confidentiality, and achieve the effects of ensuring security, improving utilization, and access layer security

Active Publication Date: 2014-06-25
XINHUASAN INFORMATION TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the data stream is transmitted in ciphertext on the network, even if an illegal user steals the encrypted data stream, it cannot be kept confidential, that is, the data in it cannot be obtained
[0012] However, this method needs to use a complex encryption algorithm, which requires relatively high resource requirements for the monitoring system. It needs to use a special hardware encryption card to meet the access requirements of large traffic and multiple users; that is, each device in the monitoring system is required to be equipped with an encryption card. , it is difficult to achieve
In addition, data encryption is not good for multicast data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security control method and equipment
  • Security control method and equipment
  • Security control method and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The present invention proposes a security control method, which is applied to a monitoring system including an access device (such as an access switch, a router, etc.), an encoding device (such as an EC) and a VM server, and the connection between the access device and the encoding device For direct connection, such as image 3 As shown, the method includes the following steps:

[0051] In step 301, the encoding device sends a registration request message to the access device, and the destination address of the registration request message is the VM server, and is used for registering on the VM server.

[0052] Step 302, the access device receives the registration request message from the encoding device, and sends the registration request message to the VM server.

[0053] In the present invention, before the coding device is not successfully registered, the access device needs to listen to the registration request message on the port directly connected to the coding ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security control method and equipment. The method comprises the following steps that: access equipment receives registration request information coming from encoding equipment and transmits the registration request information to a video management (VM) server; and when the access equipment does not receive registration success information fed back by the VM server, the access equipment determines that the encoding equipment is an invalid access client and forbids a receiving port to forward the information coming from the encoding equipment. The security control method and the equipment can ensure that only valid monitoring business data streams appear in an internal protocol (IP) network, and therefore the utilization ratio of the bandwidth of the network can be improved to the utmost extent.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a security control method and equipment. Background technique [0002] With the continuous development of network technology and IP technology, intelligent monitoring technology based on IP and network has developed rapidly, and IP monitoring has become the mainstream of current monitoring. However, the IP network is an open network, which poses a security threat to the monitoring system; that is, devices connected to the IP network can conduct business attacks on the monitoring system, thereby causing the monitoring system to be paralyzed; or monitor the data streams of other users in the monitoring system to steal their own Data profile that you do not have permission to access. For example, an illegal user simulates an EC (Encoder, encoder) to attack a monitoring system or simulates a data stream to interfere with normal monitoring. [0003] Such as figure 1 ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/70
Inventor 蒋益群周迪
Owner XINHUASAN INFORMATION TECH CO LTD