Video encryption system

An encryption system and video technology, applied in transmission systems, digital transmission systems, key distribution, and can solve problems such as lack of security guarantees

Active Publication Date: 2019-01-15
北京京航计算通讯研究所
View PDF4 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, its security has become a short board or even a blind spot for industry product manufacturers due to technical limitations (the encryption bottleneck of real-time video big data) and insufficient preparation, resulting in the lack of security of the current video surveillance system itself

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Video encryption system
  • Video encryption system
  • Video encryption system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0152] Included in this embodiment:

[0153] (1) Key negotiation

[0154] When the storage server and the hardened camera establish a video connection, key negotiation is performed every 24 hours, and the video key encryption key is replaced after the negotiation is successful. The key agreement is based on the public key cryptographic algorithm and is carried out under the support of the CA server.

[0155] (2) Encrypted transmission

[0156] After the key negotiation is successful, the hardened camera uses the locally generated video encryption key to encrypt the video data. The video encryption key VEK is encrypted by the interactive video key encryption key VKEK and then transmitted along with the code stream. The video encryption key VEK is updated every 1 hour. When transmitted in a video surveillance network, video data appears in encrypted form.

[0157] (3) Ciphertext storage

[0158] After the encrypted video data arrives at the storage server, the storage serve...

Embodiment 2

[0165] In this embodiment, an encryption method using the asymmetric cryptographic algorithm, symmetric cryptographic algorithm and hash cryptographic algorithm in the military public common cryptographic algorithm is provided, and the algorithm is implemented by secure cryptographic components or cryptographic products that meet the military public common cryptographic standards. The algorithm includes:

[0166] (1) Asymmetric cryptographic algorithms are used for identity authentication, digital signature, key agreement, etc.;

[0167] (2) Symmetric cryptographic algorithm is used for encryption protection of video data;

[0168] (3) The hash cryptographic algorithm is used to verify the integrity of the signature information.

[0169] In this video encryption method, its key management includes:

[0170] (1) Video key encryption key VKEK: The key length is 16 bytes, which is generated in real time by the platform's public encryption equipment, replaced every 24 hours, and...

Embodiment 3

[0176] This embodiment mainly includes two parts: the secure video acquisition and access of the front-end module and the service center management of the back-end module.

[0177] First, use the video acquisition equipment of the front-end module, including high-definition security network cameras, to collect and encrypt the video data, and then transmit it to the back-end module management center through the video private network. Then through the back-end module management equipment such as the main video management server, streaming media server, storage server, security decoder, CA authentication server, and security workstation in the management center, the video data can be safely browsed by the client module, centralized storage, and watched on the TV wall. and other specific applications.

[0178] The key nodes of secure transmission of video data are reflected in:

[0179] (1) Realize the video encryption of the front-end module to protect the important and sensitiv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field related to data encryption and video security, A video encryption system includes two-way authentication module, When the key negotiation module, the videodecryption module, the security decoder and the security monitoring workstation are connected with the storage server, the storage server transmits the video key encryption key and the correspondingversion number of the related reinforced camera to the security decoder through the signaling mode, and the security monitoring workstation executes the key negotiation process once in the forwardingprocess. Device authentication, through the verification of the validity of the public key certificate in the built-in cryptographic module, can verify the validity of the device. When the device is out of control, the device can be revoked in time in the CA server, and the device can be blocked from re-entering the network. Through the encryption scheme of the whole encryption process, the videoinformation is always in a safe state and under strict supervision in all application links, and the possibility of illegal stealing, forgery or alteration of video images is avoided.

Description

technical field [0001] The invention belongs to the technical field of data encryption and video security, and in particular relates to a video encryption system. Background technique [0002] At present, the development of network video surveillance technology focuses on the realization of system functions, mainly including the collection, storage and network transmission of video images. However, its security has become a short board or even a blind spot for industry product manufacturers due to technical limitations (the encryption bottleneck of real-time video big data) and insufficient preparation, resulting in the lack of security guarantees of the current video surveillance system itself. Contents of the invention [0003] (1) Technical problems to be solved [0004] The technical problem to be solved by the present invention is: how to propose an encryption scheme for video data "end module to end module" whole-process encryption, so that video information is alwa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N21/4408H04L29/06H04L9/08
CPCH04L9/0838H04L63/083H04L63/0869H04N21/4408
Inventor 袁鹏张卫刘军双世勇欧阳文尹严研邓子超马旭东张巧霞魏文宇孙同飞
Owner 北京京航计算通讯研究所
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products