Video acquisition security processing system and method based on zero trust mechanism

A security processing and video collection technology, applied in the field of data security, can solve problems such as loopholes and video information security not being effectively protected, and achieve the effect of enhancing the ability to resist Trojan virus intrusion, easy promotion, and strong versatility

Inactive Publication Date: 2021-05-14
SHANDONG ZHONGFU INFORMATION IND +3
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Through the analysis of video surveillance security incidents in recent years, the security threats faced by the video surveillance system are summarized, which are mainly reflected in the loopholes in the video acquisition equipment itself and the security of video information has not been effectively protected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Video acquisition security processing system and method based on zero trust mechanism
  • Video acquisition security processing system and method based on zero trust mechanism
  • Video acquisition security processing system and method based on zero trust mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The specific embodiments of the present invention will be described below with reference to the accompanying drawings.

[0045] like figure 1 Shown is a video capture security processing system based on a zero trust mechanism, including:

[0046] 1. The trusted operation control unit of the monitoring front-end equipment is set in the network camera operating system to monitor the program process and key file data of the front-end equipment, provide a network access protection mechanism, and detect and block unauthorized programs from running on the monitoring front-end equipment. .

[0047] This unit is based on the principle of trusted computing, and is realized by the built-in trusted operation control software in the network camera operating system. The trusted operation control software is based on the national secret encryption algorithm (SM2 / SM3 / SM4 / SM9). The trusted operation control unit for monitoring front-end equipment specifically includes:

[0048] The ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a video acquisition security processing system and method based on a zero-trust mechanism, and the system comprises a monitoring front-end equipment trusted operation control unit which is disposed in a network camera operation system, and is used for monitoring the program process and key file data of front-end equipment, providing a network access protection mechanism, detecting and blocking the operation of the unauthorized program on the monitoring front-end equipment; the monitoring front-end equipment access authentication and signaling security protection unit is used for completing identity authentication between the front-end equipment and the security management platform through a preset security protocol and carrying out polling inspection on the front-end equipment; and the audio and video data security protection unit is used for controlling the network camera to collect the audio and the video, encoding the audio and the video through a preset encryption algorithm, encrypting and sending the audio and the video, and decrypting the audio and the video at the audio and video viewing end. According to the invention, the control security, the service signaling security and the audio and video data security of the front-end camera are effectively improved, so that the data security of each link of video acquisition is ensured.

Description

technical field [0001] The invention relates to the technical field of data security, and more particularly to a video capture security processing system and method based on a zero-trust mechanism. Background technique [0002] With the rapid development of Internet technology, video surveillance systems are accelerating the process of network development. Networked applications realize the networked sharing of a large number of video capture devices and application servers. While networked applications are convenient, security risks and threats introduced after networking are also increasing in video systems. Networked systems will be attacked by network in the future. It will be the norm. [0003] By analyzing the video surveillance security incidents in recent years, the security threats faced by the video surveillance system are summarized, which are mainly reflected in the loopholes in the video capture equipment itself and the security of the video information has not ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04N7/18
CPCH04L63/0876H04L63/0884H04L63/0428H04L63/10H04L63/1441H04L63/1425H04N7/18
Inventor 曾鸣刘鹏崔新安施鹏李文赵文莉
Owner SHANDONG ZHONGFU INFORMATION IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products