CPK-based video monitoring method and system, camera, server and client

A video surveillance and camera technology, applied in the field of CPK-based video surveillance, can solve the problems of video data exposure, unsafe environment, etc.

Active Publication Date: 2018-12-07
JIN SHANG BO CHUANG BEIJING SCI & TECH CO LTD
View PDF9 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the embodiments of the present invention is to provide a CPK-based video monitoring method, system, camera, server, and client, using CPK identification technology to realize the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • CPK-based video monitoring method and system, camera, server and client
  • CPK-based video monitoring method and system, camera, server and client
  • CPK-based video monitoring method and system, camera, server and client

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] figure 1 It is a schematic flowchart of a CPK-based video surveillance method provided by an embodiment of the present invention. Such as figure 1 As shown, the method is applied to a camera, and the method includes:

[0043] Step 101, receiving the camera startup message sent by the server, and verifying the authenticity of the camera startup message, the camera startup message including the authenticity certificate of the server, the authenticity certificate of the camera and the authenticity certificate of the startup instruction ;

[0044] Step 102, when verifying that the camera start message is true, obtain video data; and

[0045] Step 103, generate video transmission data according to the private key of the camera, the random key of the camera and the video data, and send the video transmission data to the server, the video transmission data includes the authenticity of the camera certificate, the authenticity certificate of each positive second key frame in...

Embodiment 2

[0056] figure 2 It is a schematic flowchart of another CPK-based video monitoring method provided by an embodiment of the present invention. Such as figure 2 As shown, the method is applied to the server, and the method includes the following steps:

[0057] Step 201: Generate a camera startup message according to the server's private key and startup instructions, and send the camera startup message to the corresponding camera, where the camera startup message includes the authenticity certificate of the server, the authenticity of the camera Proof of authenticity and proof of authenticity of the activation instruction;

[0058] Step 202, receiving the video transmission data sent by the camera, and verifying the authenticity of the video transmission data and the integrity of the video data in the video transmission data, the video transmission data including the authenticity certificate of the camera , the authenticity certificate of each positive second key frame in th...

Embodiment 3

[0085] Figure 4 It is a schematic flowchart of another CPK-based video monitoring method provided by an embodiment of the present invention. Such as Figure 4 As shown, the method is applied to the client, and the method includes the following steps:

[0086] Step 401, obtaining the name of a key frame of a positive second in the video data to be retrieved and the camera corresponding to the video data to be retrieved;

[0087] Step 402, generate a call message according to the private key of the client, the identification of the camera, and the name of a key frame of a certain positive second in the video data to be called, and send the call message to the server, The calling message includes the authenticity certificate of the client, the authenticity certificate of the camera, and the name of a certain positive-second key frame in the video data to be called;

[0088] Step 403: Receive the call data sent by the server in response to the call message, and verify the auth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiments of the invention provide a CPK-based video monitoring method and system, a camera, a server and a client, which belong to the field of video monitoring technology and solve the problemthat the video data is completely exposed to an insecure environment. The method comprises: receiving a camera startup message sent by the server, and verifying the authenticity of the camera startupmessage, the camera startup message comprising a authenticity proof of the server, a authenticity proof of the camera and an authenticity proof of a startup instruction; when the camera startup message is verified to be true, acquiring video data; generating video transmission data according to a private key and a random key of the camera and the video data, and sending the video transmission data to the server, the video transmission data comprising the authenticity proof of the camera, an authenticity proof of a key frame at each positive second in the video data, a frame integrity code ofthe key frame, an integrity code of the video data, and the encrypted video data. The method and the system are applicable to a process of processing video monitoring data.

Description

technical field [0001] The invention relates to the technical field of video monitoring, in particular to a CPK-based video monitoring method, system, camera, server and client. Background technique [0002] The development process of video surveillance system is from the first generation of analog video surveillance system, to the second generation of digital video surveillance system based on "PC+multimedia card", and then to the third generation of completely IP-based network video surveillance system (IP VideoSurveillance, IPVS). The current mainstream system is IPVS. [0003] It can be seen from the composition of IPVS that the front-end acquisition system and the back-end processing system are connected through the IP network. Among them, the back-end system is arranged in the central computer room, and the system protection is relatively complete, so it is relatively safe. The cameras in the front-end acquisition system generally have physical protection methods suc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04N7/18H04L9/32H04L29/06
CPCH04L9/3247H04L63/0428H04L63/123H04N7/181
Inventor 南相浩张华
Owner JIN SHANG BO CHUANG BEIJING SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products