Video acquisition method for privacy protection and corresponding playing method thereof

A technology for video capture and privacy protection, applied in the blockchain field, can solve the problems of user privacy leakage, administrator password theft, server attack, etc., to achieve the effect of solving user privacy leakage and avoiding key leakage or loss.

Pending Publication Date: 2022-04-29
杭州宇链科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Surveillance videos such as home, office, and public security generally involve user privacy. If manufacturers do not take security measures for video access in place, administrator passwords are stolen, servers are attacked, and

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Video acquisition method for privacy protection and corresponding playing method thereof
  • Video acquisition method for privacy protection and corresponding playing method thereof

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0031] The following will be combined with the accompanying drawings in the embodiments of the present invention, the technical solution in the embodiments of the present invention will be described clearly and completely, obviously, the embodiments described are part of the embodiments of the present invention, and not all embodiments. Based on embodiments in the present invention, all other embodiments obtained by those of ordinary skill in the art without making creative work, are within the scope of protection of the present invention.

[0032] Reference Figure 1 , shown in a step flowchart of a privacy-protected video acquisition method for embodiments of the present invention, comprising the following steps:

[0033]S10, initial environment preparation, cloud storage vendors provide trusted execution environment, set the enclave in the trusted execution environment, and initialize the trusted execution environment, randomly generate a root symmetric key in the enclave;

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a privacy protection video acquisition method and a corresponding playing method thereof. The acquisition method comprises the following steps: preparing an initial environment, providing a trusted execution environment by a cloud storage manufacturer, setting an enclave in the trusted execution environment, initializing the trusted execution environment, and randomly generating a root symmetric key in the enclave; the trusted execution environment generates a certificate, wherein the certificate comprises a program which is currently operated in the trusted execution environment and a signature of the trusted execution environment; the video acquisition equipment is connected to a trusted execution environment provided by a cloud storage manufacturer through a network, and the signature of the trusted execution environment is verified to be correct; the video acquisition equipment generates a pair of asymmetric encryption public and private keys, stores the asymmetric encryption public and private keys in a safe area of the video acquisition equipment, and uploads the public keys to the flight ground as unique identity credentials; and the enclave receives the uploaded unique identity certificate of the video acquisition equipment, and generates a video acquisition symmetric key by using the root symmetric key and the unique identity certificate of the video acquisition equipment.

Description

technical field [0001] The invention belongs to the technical field of block chains, and in particular relates to a privacy-protected video collection method and a corresponding playback method thereof. Background technique [0002] The security monitoring camera with cloud storage function generally transmits the video data collected by the front-end equipment to the manufacturer's server through the network (local area network, Internet or wireless network) for storage. When users need to view the surveillance video, they can access the manufacturer's server on the terminal (PC or APP) to obtain real-time or historical surveillance video. [0003] In the existing solution, the user monitoring video is stored in the manufacturer's server, and the manufacturer has the ability to view the original video regardless of whether the video is encrypted and uploaded after collection (the video is not encrypted or the key for video encryption is in the hands of the manufacturer). S...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/32H04L9/40H04N7/18
CPCH04L9/0869H04L9/0877H04L9/3247H04L9/3263H04L63/02H04L63/0442H04L63/0876H04L63/10H04L63/123H04N7/18H04L2209/127H04L2209/72
Inventor 赵刚程希冀张森滕海明周丹丹罗骁陈柏臻
Owner 杭州宇链科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products