Video data security encryption transmission method and system
A technology for secure encryption of video data, applied in the field of video data secure encryption transmission methods and systems, can solve problems such as hidden safety hazards, inconvenient operation, and illegal access to sensitive data, and achieve reduced workload, high security, and high safety factor Effect
Inactive Publication Date: 2017-05-10
CHONGQING XUNMEI ELECTRONICS
10 Cites 9 Cited by
AI-Extracted Technical Summary
Problems solved by technology
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreMethod used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreAbstract
The invention provides a video data security encryption transmission method. The video data security encryption transmission method is characterized by comprising the following steps: S1, a streaming media server randomly generates a first password, and encrypts a key frame of video data by using the first password to obtain a first encrypted key frame; and S2, the streaming media server encrypts the first password by using a hardware encryption lock to obtain a first password encrypted file, encrypts the first encrypted key frame by using the hardware encryption lock to obtain a second encrypted key frame, encrypts the key frame of the video data by using the second encrypted key frame, the first password encrypted file and the first password to obtain the video data of algorithm type information of an encryption algorithm of the first encrypted key frame. The video data security encryption transmission method provided by the invention has the beneficial effects that the first password is randomly generated and is periodically updated to ensure the security. By means of the hardware encryption of the random password, and the software encryption and the hardware encryption of the video data, the security is higher.
Application Domain
Technology Topic
Image
Examples
- Experimental program(2)
Example Embodiment
Example Embodiment
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more Similar technology patents
Method, device and system used for digesting security policy conflicts
InactiveCN105471830AImprove securityUser identity/authority verificationData switching networksSecurity policyRule sets
Owner:CHINA TELECOM CORP LTD
Automatic charging system for electric automobile
InactiveCN104795868AImprove user experienceImprove securityBatteries circuit arrangementsCharging stationsImage alignmentCharge controller
Owner:WUHAN INSTITUTE OF TECHNOLOGY
Vehicle tracker with user notifications and associated methods
InactiveUS6888495B2Improve securityRegistering/indicating working of vehiclesRoad vehicles traffic controlTelecommunications equipmentEngineering
Owner:OMEGA PATENTS
Applications and integrated firewall design in an adaptive private network (APN)
ActiveUS20180041470A1Low costImprove securityData switching networksPacket processingTraffic analysis
Owner:TALARI NETWORKS
Lancet and needle insertion device
InactiveUS20060058827A1Improve securityImprove convenienceSensorsBlood sampling devicesNeedle insertion
Owner:ARKRAY INC
Classification and recommendation of technical efficacy words
- Improve security
- Good experience
Apparatus, method, and medium for self-organizing multi-hop wireless access networks
InactiveUS20050152305A1Rapidly deployableImprove securityNetwork topologiesData switching by path configurationMutual authenticationAccess network
Owner:FUJITSU LTD
System and Method for Cryptographic Identification of Interchangeable Parts
InactiveUS20090327715A1Improve securityPart can be usedUser identity/authority verificationEndoscopesEngineeringElectrical and Electronics engineering
Owner:ETHICON ENDO SURGERY INC
Method and system for powerline networking
InactiveUS20060018328A1Improve securityEasy to changeBroadband local area networksBroadcast transmission systemsComputer network
Owner:COMCAST CABLE COMM LLC
System and method for managing payment in transactions with a pcd
InactiveUS20130246259A1Improve securityFinancePoint-of-sale network systemsComputer securityInternet privacy
Owner:QUALCOMM INC