Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key negotiation method and system for video surveillance system and computer

A video monitoring system and key negotiation technology, which is applied in closed-circuit television systems, transmission systems, digital transmission systems, etc., can solve problems such as complex state machines and increased negotiation complexity, and achieve an easy-to-implement effect

Inactive Publication Date: 2018-05-15
XIAN UNIV OF POSTS & TELECOMM
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Increased complexity of negotiation
In addition, if both ends initiate the key agreement process at the same time, the state machine is more complicated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key negotiation method and system for video surveillance system and computer
  • Key negotiation method and system for video surveillance system and computer
  • Key negotiation method and system for video surveillance system and computer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0038] The invention negotiates the session key of the RTP / RTCP data in the process of negotiating the audio and video session by extending the RTSP signaling.

[0039] The application principle of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0040] like figure 1 As shown, the video surveillance system key agreement method provided by the embodiment of the present invention includes the following steps:

[0041] S101: The RTSP client sends a Setup command extended through key negotiation to the RTSP server;

[0042] S102: The RTSP server calculates the RTP sessi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of audio / video data processing and discloses a key negotiation method and system for a video surveillance system and a computer. An RTSP signal is expanded, when an RTSP session is established, a key employed by an RTP / RTCP message is negotiated, and the negotiated key is used for encrypting audio / video and control data in RTP / RTCP data transmission. According to the method, the system and the computer, the RTSP signal is expanded, when the RTSP session is established, a shared key required for encrypting and decrypting a follow-up RTP / RTCP messageis negotiated, and the key is used for encrypting and decrypting the data in whole RTP / RTCP data transmission. For an existing system, only newly increased expansion parameter processing needs to be carried out, and the shared key can be calculated based on public key information exchanged from signal interaction between an RTSP client and a server through utilization of a Diffie-Hellman algorithm. The existing system is influenced a little. The realization is easy. The negotiated key is used for encrypting the RTP / RTCP data in transmission.

Description

technical field [0001] The invention belongs to the technical field of audio and video data processing, and in particular relates to a key negotiation method and system for a video monitoring system, and a computer. Background technique [0002] The monitoring system usually establishes audio and video sessions through the RTSP protocol. After the session is established, the audio and video data starts to be transmitted through the RTP protocol. At the same time, RTCP periodically feeds back the service quality during the RTP transmission process, such as transmission rate and transmission delay. At present, the key negotiation method, device and system of the message are based on the RTCP protocol to perform key negotiation and encrypt the RTP data. The disadvantage is that when the RTCP starts to send data, the audio and video session has been established. Before the RTCP key negotiation is completed, some unencrypted data has arrived at the receiver. Through the arrived ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04N21/266H04N21/2347H04N21/6334H04N21/6377H04N21/6437H04N7/18H04L9/08H04L9/30
CPCH04L9/0841H04L9/3013H04N7/18H04N21/2347H04N21/26613H04N21/63345H04N21/6377H04N21/6437
Inventor 郭春霞
Owner XIAN UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products