Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security camera media data encryption technology

A media data and data encryption technology, which is applied in image communication and key distribution, can solve the problems of inability to play back and watch the player software, improve the usability and practicability of multiple scenes, prevent leakage and diffusion, and meet the effect of timely encryption

Pending Publication Date: 2022-08-05
深圳市爱为物联科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to provide a security camera media data encryption technology, which is suitable for security camera equipment with a video recording function, can solve the security problem of the camera media data, and can encrypt the video data in real time, even if the video file itself leaks, there is no user Participate by yourself, and can't play back and watch through the player software, so as to completely prevent the leakage and spread of user privacy data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security camera media data encryption technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The embodiments of the present application will be described in detail below with reference to the accompanying drawings and examples, so as to fully understand and implement the implementation process of how to apply technical means to solve technical problems and achieve technical effects in the present application.

[0031] like figure 1 As shown, the security camera media data encryption technology provided by this embodiment includes the following steps:

[0032] S1: Power on the security camera, then read the user's account information from the configuration file, and then find the video or live broadcast data inside the security camera; if the video data or live broadcast fails to be opened, the next step will not be entered, and the video data will be recorded. or the re-opening of the live broadcast;

[0033] Among them, the security camera ensures the normal operation of audio and video functions when it is powered on, so as to ensure the successful encryptio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of security and protection monitoring, in particular to a security and protection camera media data encryption technology which comprises the following steps: electrifying a camera, reading account information of a user from a configuration file, and confirming that video data or live broadcast is started; the method comprises the following steps: generating an AEC encryption key KEY1 by using user account information as a key seed, encrypting the first 100 bytes of an audio and video frame by using a key Key1, writing encrypted audio and video data into a video file or sending out in a live broadcast manner, adding the first six bytes of the encrypted data with the account information of a user, generating a KEYNEW of a subsequent encryption key, updating a key buffer area, and sending the encrypted audio and video data to a video recording server; and continuously updating and encrypting the data through continuously repeated steps, and finally ending video recording or live broadcasting and clearing data in a secret key buffer area after encryption is completed. The method is suitable for security and protection camera equipment with a video recording function, video recording data can be encrypted in real time, user data leakage can be safely and effectively prevented, and therefore leakage and diffusion of user privacy data can be thoroughly eradicated.

Description

technical field [0001] The invention relates to a media data encryption technology, in particular to a security camera media data encryption technology, and belongs to the technical field of security monitoring. Background technique [0002] As an important imaging tool, the camera has been widely used in civil and military fields such as mobile terminals, automobiles, drones, robots, smart homes, video security, AR, etc.; cameras generally include lenses, photosensitive chips It is encapsulated and fixed by the encapsulation structure and set corresponding to the lens, so as to receive the light from the object side from the lens to generate the image signal; [0003] Among them, the security camera is one of many cameras. The security camera refers to the camera used in security protection. Its main features are high sensitivity, strong light resistance, small distortion, small size, long life, shock resistance, and remote control. monitoring; thus being widely used; [...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04N5/913H04L9/08
CPCH04N5/913H04L9/0861
Inventor 张维符莎汪骞
Owner 深圳市爱为物联科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products