Video monitoring quantum encryption system

A quantum encryption system, video surveillance technology, applied in the direction of analog security/charging system, transmission system, digital transmission system, etc., can solve the problem of limited transmission range of Ethernet, reduce irrelevant interference factors, ensure integrity and fluency , the effect of ensuring the transmission speed

Pending Publication Date: 2021-11-02
施航
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The utility model adopts quantum encryption, which has a simple structure and cannot be deciphered, which improves the security of the camera image content. The encryption structure realizes the data transmission of the encryption module through the Ethernet during data transmission, but the transmission range of the Ethernet is limited. , so the use of the Internet will inevitably be used when transferring related encryption modules. Third-party interference can realize encryption module data interception or stealing through the Internet, a wide area network. Therefore, a self-destruct and leak-proof structure is required to ensure that the encryption module After the data is intercepted and stolen by a third party, it can be started in time to ensure the confidentiality of the data transmission of the encryption module

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Video monitoring quantum encryption system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] The data collection unit can collect and store the video data that needs to be transmitted, and the data copying unit can make multiple copies of the video data in the data collection unit that needs to be encrypted and transmitted.

[0041] Specifically, the video data to be transmitted is stored by the data acquisition unit, which can provide transmission source support for subsequent secondary and multiple transmissions. By duplicating the video data, cracking of the video data can be avoided. Moreover, after the data is cracked and reorganized, the fluency between data fragments is affected, thereby ensuring the integrity and fluency of the decrypted data, and providing conditions for reducing data distortion.

Embodiment 2

[0043] The data noise reduction processing unit uses a filter to process the video data, and the data compression unit can compress the video data processed by the data copying unit one by one.

[0044] In addition, the setting of the data noise reduction processing unit can perform corresponding preprocessing on the data before transmission. The filter can reduce the undue noise of the audio in the video, so as to obtain clear video data, which can reduce the memory size during the subsequent encrypted transmission. After compression processing, the memory size of data transmission is further reduced, so as to ensure the transmission speed of encrypted data.

Embodiment 3

[0046] There are two communication network channels connected between the quantum encryption unit and the judgment unit. When the quantum encryption unit performs encryption processing, the time of encrypting data, the quantity of encryption, and the data after encryption processing can be processed by the quantum encryption unit. Detect the encryption time and encrypted quantity transmitted by the quantum encryption unit as the basis, and check with the received encrypted processed data. If there is a discrepancy between the quantity or the encrypted time, it can be judged that there is a third party in the transmitted data. For interception or stealing, this information needs to be transmitted to the data receiving module through the public communication network channel 3 for secondary encrypted transmission. If both the quantity and the encrypted time are consistent, it means that there is no third-party interception in this encrypted transmission Or the phenomenon of steali...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A video monitoring quantum encryption system disclosed by the present invention comprises a data sending module and a data receiving module, the data sending module comprises a data collection unit, a data noise reduction processing unit, a data copying unit, a data compression unit and a data encryption unit, and the data encryption unit comprises a data protection unit and a quantum encryption unit. The data receiving module comprises a judgment unit, a data receiving unit, a data decryption unit and a data decompression unit. By arranging the data noise reduction processing unit and the data compression unit, the memory size in the data encryption transmission process can be reduced, the transmission speed of the encrypted data is further ensured, the data copying unit is further installed, batch encryption transmission of the data can be achieved, data cracking transmission is avoided. In addition, due to the arrangement of the data protection unit, the corresponding data are destroyed when the data are interfered and intercepted by a third party, and then data leakage is avoided.

Description

technical field [0001] The invention relates to the technical field of quantum encryption, in particular to a video monitoring quantum encryption system. Background technique [0002] In traditional encrypted communication channels, the information source is encrypted and then transmitted to the data receiver through the information sender. During this process, third parties such as eavesdroppers can obtain the encrypted information sent by the information sender by intercepting or stealing and copying. The processed data can be deciphered immediately to cause the leakage of encrypted information. In addition, there are keys in both the information sender and the information receiver, so there is a possibility of leakage in the source, process and terminal of information transmission, making the traditional Encrypted communication is less secure, and quantum encryption, as an emerging encryption method, provides provable security and detectability to external interference, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N7/16H04L9/08
CPCH04N7/16H04N7/166H04L9/0852
Inventor 施航
Owner 施航
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products