Video safety monitoring method and system

A security monitoring and video technology, applied in the field of communication, can solve the problems of long running time period, large computing resources and time consumption, complex verification process, etc., to achieve the effect of improving efficiency and real-time performance, shortening delay time, and reducing data volume

Inactive Publication Date: 2018-11-09
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for DRM technology, it has not been widely used in domestic IPTV at present, and the cost is too high
[0004] For MD5 security detection technology: Since a single security key cannot guarantee the security of encryption, there is a risk of tampering with the security key during transmission or other processes, and if the key is not secure, it is likely to affect the security of the video code stream
[0005] For two-level key strong security transmission technology: Since this technology requires two-level signature and verification for all transmitted video streams, it takes a lot of computing resources and time, the verification process is complicated, and the running time period is too long, especially for real-time The live broadcast service with extremely high requirements cannot meet the requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Video safety monitoring method and system
  • Video safety monitoring method and system
  • Video safety monitoring method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to enable those skilled in the art to better understand the technical solution of the present invention, the video security monitoring method and system provided by the present invention will be described in detail below in conjunction with the accompanying drawings.

[0048] see figure 1 , the video security monitoring method that the embodiment of the present invention provides, it comprises:

[0049] Step S1, obtaining key frame data of the video source code stream;

[0050] Step S2, encrypting the key frame data of the video source code stream to generate first encrypted information;

[0051] Step S3, obtaining the key frame data of the video end code stream;

[0052] Step S4, encrypting the key frame data of the video end code stream to generate second encrypted information;

[0053] Step S5, respectively decrypting the first encrypted information and the second encrypted information, and comparing the key frame data of the decrypted video source code s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a video safety monitoring method and system, and the method includes the steps: acquiring key frame data of a video source code stream; encrypting the key frame data of the video source code stream to generate first encrypted information; acquiring key frame data of a video end code the stream; encrypting the key frame data of a video end code stream to generate second encrypted information; decrypting the first encrypted information and the second encrypted information, comparing the key frame data of the video source code stream and the frame data of the video end codestream after decryption, and obtaining a comparison result; and judging whether the content of the code stream is abnormal or not according to the comparison result. In the technical scheme of the invention, the method and system reduce the data size of the encrypted contents, shorten the code stream monitoring delay time, and improve the code stream monitoring efficiency and real-time performances. Meanwhile, the method and system can improve the code stream monitoring correct rate.

Description

technical field [0001] The present invention relates to the technical field of communication, in particular to a video security monitoring method and system. Background technique [0002] With the continuous development of Internet technology and the improvement of network bandwidth capabilities, video services have shown explosive growth, and video viewing users have reached a considerable scale, so the security of video transmission has become an urgent problem to be solved, especially IPTV (Internet Protocol Television, live video service), requires both real-time performance and security, making monitoring more difficult. During the video transmission process, the code stream content is easily tampered with or replaced, which may cause illegal content to be played on the terminal, posing a security risk. [0003] Among related technologies, there are mainly DRM (Digital Rights Management, digital rights management), MD5 (Message Digest 5, message digest algorithm fifth ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/045
Inventor 杨双仕徐雷郭志斌马书惠
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products