Network camera identity authentication method based on TPCM

A network camera and identity authentication technology, applied in user identity/authority verification, closed-circuit television systems, etc., can solve identity authentication and other issues

Active Publication Date: 2014-06-25
BEIJING UNIV OF TECH
View PDF2 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] In view of the problems mentioned above, in order to solve the identity authentication problem before the network camera transmits data, the present invention provides a network camera identity authentication method based on the trusted platform control module TPCM hereinafter referred to as TPCM

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network camera identity authentication method based on TPCM
  • Network camera identity authentication method based on TPCM
  • Network camera identity authentication method based on TPCM

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The accompanying drawings are attached below, and the present invention is further specifically described in conjunction with the accompanying drawings and specific implementation cases.

[0046] Such as figure 1 Shown is a system architecture diagram of a preferred embodiment of the present invention, the invention is a network camera identity authentication system, mainly including network camera platform system, trusted gateway platform system and authentication center system, network camera platform The identity authentication message is sent between the system and the trusted gateway platform system through the control channel, and the video data is transmitted through the data forwarding channel. The data channel between gateway platform systems. The network camera platform system sends the identity certificate of the network camera to the third-party authentication center system for identity verification, and the trusted gateway platform system sends the identit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network camera identity authentication method based on a TPCM. The method is characterized in that a network camera and a reliable gateway adopt a self-signing mode to generate a digital certificate which comprises a value of a platform configuration register and a measurement result of a memory code segment in operation. An authentication center verifies validity of the digital certificate and confirms identity of the verified party. Advantages are that a measurement value in the starting process of equipment is stored in the platform configuration register so that hardware of the network camera and the reliable gateway is ensured to be unchanged. Reliability of equipment identity is ensured from the aspect of software via measurement of the memory code segment. Besides, a signature secret key is generated by a TPCM chip and bound with the hardware platform state of the equipment so that the digital certificate is difficult to forge.

Description

technical field [0001] The invention relates to information security technology, in particular to provide an identity authentication method of a network camera by utilizing the security technology provided by trusted computing. Background technique [0002] At present, with the rapid development of information technology and network technology, the development of safe cities is constantly being promoted, and the application of network cameras in real life is becoming more and more extensive. It has also been widely used everywhere. Usually, places that need to install video surveillance systems have high security requirements. Once the surveillance system is attacked and destroyed by malicious users, the consequences will be immeasurable. Therefore, the security of the surveillance system itself needs to be guaranteed. [0003] However, in the current existing network camera monitoring system, there are still the following hidden dangers: on the one hand, the credibility of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04N7/18
Inventor 张松鸽白鑫王昱波张松亚胡俊公备赵勇
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products