Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method and device for video terminal, electronic equipment, and storage medium

A technology of video terminal and authentication equipment, applied in the field of network security, can solve the problems of high authentication cost and inability to identify video terminals, and achieve the effect of preventing security risks

Active Publication Date: 2022-03-01
HANGZHOU DPTECH TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the above-mentioned methods all require manual participation, the authentication cost is high, and it is impossible to identify the video terminal in the counterfeit monitoring system of the video terminal supporting the GB28181 protocol

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and device for video terminal, electronic equipment, and storage medium
  • Authentication method and device for video terminal, electronic equipment, and storage medium
  • Authentication method and device for video terminal, electronic equipment, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0048] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides a video terminal authentication method and device, electronic equipment, and a storage medium; the method is applied to authentication equipment, and the authentication equipment is connected to a monitoring system, and the video terminals included in the monitoring system all support the GB28181 protocol; The method may include: obtaining a SIP message sent by any video terminal, and reading the IP information and the SIP identification field in the SIP message; searching for the IP information and the SIP identification field in the authentication white list The target entry that matches the corresponding relationship; wherein, the entry of the authentication whitelist is used to record the correspondence between the IP information of the video terminal in the monitoring system and the corresponding SIP identification field; when the target entry is found , it is determined that any video terminal belongs to the monitoring system. This application can identify the external equipment when the external equipment imitates the video terminal supporting the GB28181 protocol in the monitoring system, and prevent it from accessing the monitoring system, avoiding the security risks brought by the external equipment to the monitoring system.

Description

technical field [0001] The present application relates to the field of network security, in particular to an authentication method and device for a video terminal, electronic equipment, and a storage medium. Background technique [0002] Due to differences in standards of video terminal equipment produced by various manufacturers, there is a problem of poor compatibility between video terminals produced by various manufacturers. For this reason, the Science and Technology Information Bureau of the Ministry of Public Security proposed the GB28181 protocol (that is, "Technical Requirements for Information Transmission, Exchange, and Control of Security and Prevention Video Surveillance Networking System"), which is used to unify and standardize the standards of video terminal equipment produced by various manufacturers, so that different The video terminal products produced by the manufacturers are interoperable. [0003] However, there are still a large number of video termi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L65/1104H04L9/40
CPCH04L63/10H04L63/101H04L65/1104
Inventor 陈克东仇俊杰
Owner HANGZHOU DPTECH TECH