Unlock instant, AI-driven research and patent intelligence for your innovation.

Video and audio monitoring equipment and its security authentication method, video and audio display equipment

A technology for monitoring equipment and display equipment, applied in the field of data security, can solve problems such as being vulnerable to attacks, being controlled, monitoring systems not working properly, and lack of reliable security technical guarantees, and achieving the effect of preventing attacks and ensuring normal work.

Active Publication Date: 2020-05-05
北京信长城科技发展有限公司 +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The camera, client, and control center are connected through the Internet without reliable security technology guarantee. In the current Internet environment, it is easy to be attacked, controlled, etc., causing the monitoring system to not work normally.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Video and audio monitoring equipment and its security authentication method, video and audio display equipment
  • Video and audio monitoring equipment and its security authentication method, video and audio display equipment
  • Video and audio monitoring equipment and its security authentication method, video and audio display equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0050] figure 1 It is a flow chart of a security authentication method for video and audio monitoring equipment in an embodiment of the present invention; refer to figure 1 , the method includes:

[0051] S101: Obtain the corresponding first identification public key from the identification public key matrix according to the identification of the video and audio monitoring equipment;

[0052] It should be noted that the execution subject of the method in this embodiment is an audio-visual display device, which is a device capable of displaying audio-visual images, which may be a server with a video-audio display function, or a server with a video-audio display function. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses video / audio monitoring equipment, a security authentication method thereof and video / audio display equipment, and relates to the technical field of data security. The security authentication method comprises the following steps: acquiring a corresponding first identity public key from an identity public key matrix according to a video / audio monitoring equipment identity; performing asymmetric encryption on an instruction plaintext to be transmitted through the first identity public key to obtain an instruction cipher text; signing on the instruction cipher text by a first identity private key of local equipment; and transmitting the signed instruction cipher text to the video / audio monitoring equipment in order that the video / audio monitoring equipment performs security authentication according to the signed instruction cipher text. Through adoption of the video / audio monitoring equipment, the security authentication method thereof and the video / audio display equipment, attacks, control and the like in an Internet environment can be prevented, and a monitoring system can work normally.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a video and audio monitoring device, a security authentication method thereof, and a video and audio display device. Background technique [0002] In the past ten years, the security and audio-visual monitoring industries have developed rapidly, especially in recent years with the rapid development of the Internet, the security industry, audio-visual monitoring systems and products have become popular on the Internet. Today, audio-visual monitoring systems, Smart remote surveillance camera systems and products for individuals and households are ubiquitous, widely used, constantly innovating, and increasing in demand. [0003] In the existing security industry, various video and audio cameras, monitoring system control centers, and monitoring clients (PC and mobile APP) on various platforms build a closed loop through network connections (wired network and wireless network) ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/30H04N7/18
CPCH04L9/30H04L63/0442H04N7/18
Inventor 罗燕京
Owner 北京信长城科技发展有限公司