Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method for accessing SIP security video monitoring system

A video surveillance system and identity authentication technology, which is applied in the field of identity authentication for accessing SIP security video surveillance systems, can solve problems such as network security risks and security defects, achieve safe and efficient authentication, and ensure the effect of network access security

Active Publication Date: 2014-11-26
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF4 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The technical problem to be solved by the present invention is to provide an identity authentication method for accessing the SIP security video monitoring system to solve the inherent open characteristics of the IP network, and the security defects of the IP network and the SIP protocol itself. And the hidden dangers of network security brought by the application system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method for accessing SIP security video monitoring system
  • Identity authentication method for accessing SIP security video monitoring system
  • Identity authentication method for accessing SIP security video monitoring system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0106] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0107] like figure 1 As shown, three network elements (A, B, and C elements) in the network are set, and each element corresponds to a type of network entity in the network. The explanation is as follows:

[0108] A element --- SIP terminal (SIP camera IPC supporting SIP protocol, SIP network hard disk video recorder NVR, SIP user client client), that is, a camera supporting SIP signaling protocol, network hard disk video recorder and user client, because the SIP terminal Both run the core program required by the SIP session, that is, the SIP User Agent (SIP User Agent, SIP UA) program. Therefore, in this patent, the SIP terminal is equivalent to the SIP UA, and both the SIP terminal and the SIP UA are relative to t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an identity authentication method for accessing an SIP security video monitoring system. The method includes the following steps: SIP terminals carry out identity authentication at an SIP server so as to complete registration; two SIP terminals which need to carry out information interaction carry out unicast key and secure session negotiation with the SIP server respectively; the SIP server sends point-to-point link information to the SIP terminals which need to carry out information interaction and issues related keys; bidirectional identity authentication is carried out between the two SIP terminals through exchange of point-to-point authentication tokens; information interaction is carried out between the SIP terminals which pass the bidirectional identity authentication; and when the SIP terminals leave a current network, cancellation authentication needs to be carried out on the SIP server. The identity authentication method is capable of realizing safe and efficient multi-entity initial authentication between network entities and rapid re-authentication between SIP terminals, and ensuring dual-channel authentication of video signaling flows and media flows and the like so that accessing security is improved significantly and security of data transmission, storage and access is improved.

Description

technical field [0001] The invention relates to the field of video monitoring networking, in particular to an identity authentication method for accessing a SIP security video monitoring system. Background technique [0002] In recent years, with the rapid development of computer, network, image processing and transmission technology, video surveillance technology has also made great progress. From analog surveillance in the early 1980s to digital surveillance in the 1990s, and then to network video surveillance in recent years, from a technical point of view, the development of video surveillance systems has experienced the first generation of closed-circuit television surveillance systems dominated by analog equipment. , to the second generation based on "PC+multimedia card" digital video surveillance system, and then to the third generation completely based on IP network video surveillance system. [0003] Although China's video surveillance market has undergone earth-sh...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04N7/18
Inventor 吕世超卢翔潘磊周新运朱红松石志强江再伟
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products