Supercharge Your Innovation With Domain-Expert AI Agents!

A method for implementing safe remote video monitoring

A technology of remote monitoring and remote video, applied in the field of communication, can solve the problems such as the difficulty of hackers to capture the monitoring password and the difficulty of cracking the monitoring password, so as to improve the process of call control and media control, enhance security, and improve interoperability and scalability. Effect

Active Publication Date: 2011-06-15
XIAN DATANG TELECOM
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the user operates the remote video surveillance at random, and the remote surveillance password is transmitted through cipher text, it is difficult for hackers to capture the surveillance password, and it is also very difficult to crack the surveillance password

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for implementing safe remote video monitoring
  • A method for implementing safe remote video monitoring
  • A method for implementing safe remote video monitoring

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] This embodiment specifies the remote monitoring communication process based on the ITU-T H.323 multimedia communication protocol, which adds security authentication in the call control process, such as Figure 4 shown.

[0060] Step 401: the user of the remote monitoring terminal calls the local monitoring terminal, and the user interface module of the remote monitoring terminal pops up a password input window, requiring the user to input the monitoring password;

[0061] Step 402: the H.323 module of the remote monitoring terminal encrypts the monitoring password;

[0062] Steps 403-404: the H.323 module of the remote monitoring terminal sends an access permission request (ARQ) to the gatekeeper as the calling terminal, and after receiving the confirmation response (ACF) from the gatekeeper, proceed to step 405;

[0063] Step 405: Fill in the remote monitoring password of the encrypted text in the nonStandardData extension field of the Setup message, and send the Setu...

Embodiment 2

[0071] The present embodiment specifies based on the ITU-T H.323 multimedia communication protocol, after the H.225 call control process and the H.245 media control process are completed, before entering the audio and video media data transmission, the remote monitoring communication flow of security authentication is added, Such as Figure 5 shown.

[0072] Step 501: the remote monitoring terminal user calls the local monitoring terminal;

[0073] Steps 502-503: The H.323 module of the remote monitoring terminal sends an access permission request (ARQ) to the gatekeeper (GK1) as the calling terminal, and after receiving the confirmation response (ACF) from the gatekeeper (GK1), continue to step 504;

[0074] Step 504: the remote monitoring terminal sends the H.225 Setup message to the local monitoring terminal;

[0075] Step 505: After receiving the Setup message, the local monitoring terminal sends a CallProceeding message to the remote monitoring terminal;

[0076] Steps...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses one method to realize safe remote visual frequency, which comprises the following steps: using information flow transmission and validation remote monitor codes; remote monitoring decoding and coding process; audio media data coding process composed two types of send and validation remote monitor in the process; the coding and decoding process comprises the following steps: remote monitor end gets local monitor end public key; remote monitor end uses the key plus coding formula to convert code characters into dark data; remote monitor tend sends dark message codes to local monitor end; local monitor end receives dark message and uses private key to convert monitor codes into message monitor key.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a method for realizing safe remote video monitoring based on an IP network by using the H.323 multimedia communication protocol. Background technique [0002] With the rapid development of Internet network, various applications based on IP network emerge in an endless stream, and remote video monitoring is one of the applications with great development prospects. On the one hand, video compression technology has made great progress. On the other hand, fiber-to-the-building, fiber-to-the-home and ADSL and other network access methods enable different users such as enterprises and families to enjoy broadband IP networks conveniently. IP network-based remote video monitoring systems for home security and industrial control have begun to become a research hotspot. [0003] The H.323 protocol system provides multimedia communication standards for existing packet networks. It sp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/00
Inventor 马敏
Owner XIAN DATANG TELECOM
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More