CN103297736A - System and method for data storage and network transmission of video monitoring - Google Patents

System and method for data storage and network transmission of video monitoring Download PDF

Info

Publication number
CN103297736A
CN103297736A CN2013102334873A CN201310233487A CN103297736A CN 103297736 A CN103297736 A CN 103297736A CN 2013102334873 A CN2013102334873 A CN 2013102334873A CN 201310233487 A CN201310233487 A CN 201310233487A CN 103297736 A CN103297736 A CN 103297736A
Authority
CN
China
Prior art keywords
video monitoring
data
encryption device
interface
deciphering key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013102334873A
Other languages
Chinese (zh)
Inventor
王飞
理学伟
肖中飞
李燕芳
万海山
朱启超
王亮
李文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANDONG ZHONGFU INFORMATION INDUSTRY Co Ltd
SHENZHEN SOUTH HANBANG DIGITAL TECHNOLOGY Co Ltd
Original Assignee
SHANDONG ZHONGFU INFORMATION INDUSTRY Co Ltd
SHENZHEN SOUTH HANBANG DIGITAL TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANDONG ZHONGFU INFORMATION INDUSTRY Co Ltd, SHENZHEN SOUTH HANBANG DIGITAL TECHNOLOGY Co Ltd filed Critical SHANDONG ZHONGFU INFORMATION INDUSTRY Co Ltd
Priority to CN2013102334873A priority Critical patent/CN103297736A/en
Publication of CN103297736A publication Critical patent/CN103297736A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Closed-Circuit Television Systems (AREA)

Abstract

The invention discloses a system for data storage and network transmission of video monitoring. The system is high in encryption speed, high in safety and stable in reliability and comprises a storage device, an encryption device and a first decryption key. The storage device is connected with a video monitoring device through a first interface, the encryption device is connected with the video monitoring device through a second interface, and the first decryption key is connected with the video monitoring device through a third interface. A method for the data storage and the network transmission of the video monitoring and adopting the system is further provided.

Description

A kind of data storage and network system for transmitting and method of video monitoring
Technical field
The present invention relates to the technical field of video monitoring, relate more specifically to a kind of data storage and network system for transmitting of video monitoring, and the method that data are stored and network transmits that adopts the video monitoring of this system.
Background technology
Present video monitoring system all is to carry out data storage and network transmission with form expressly, can't realize carrying out data storage and network transmission with the form of ciphertext, authorities such as the login of video monitoring system also all are the software cryptography management, all have certain safety issue.
Summary of the invention
Technology of the present invention is dealt with problems and is: overcome the deficiencies in the prior art, provide that a kind of enciphering rate is fast, data storage and the network system for transmitting of high safety, reliable and stable video monitoring.
Technical solution of the present invention is: data storage and the network system for transmitting of this video monitoring, it comprises memory device, encryption device, the first deciphering KEY, memory device is connected with video monitoring equipment by first interface, encryption device is connected with video monitoring equipment by second interface, and the first deciphering KEY is connected with video monitoring equipment by the 3rd interface.
A kind of method that data are stored and network transmits that adopts the video monitoring of this system also is provided, and this method may further comprise the steps:
(1) system boot;
(2) judge whether encryption device exists and normal, if change step (3), otherwise the prompting encryption device does not exist or is unusual and change step (5);
(3) judge whether the encryption enabled function, if change step (4), otherwise change step (5);
(4) by the encryption device encrypted audio;
(5) the local storage of audio, video data;
(6) system starts end.
By encryption device, the deciphering KEY that uses hardware and the encipher-decipher method that adopts these hardware devices, make that enciphering rate is fast, high safety, reliable and stable.
Description of drawings
Fig. 1 shows according to the data storage of video monitoring of the present invention and the structural representation of network system for transmitting;
Fig. 2 shows the flow chart of method according to an embodiment of the invention;
Fig. 3 show first decryption step among Fig. 2 each step by step;
Fig. 4 shows the flow chart of method according to another embodiment of the invention;
Fig. 5 show second decryption step among Fig. 4 each step by step.
Embodiment
As shown in Figure 1, data storage and the network system for transmitting of this video monitoring, it comprises memory device, encryption device (being encryption equipment), the first deciphering KEY, memory device is connected with video monitoring equipment by first interface, encryption device is connected with video monitoring equipment by second interface, and the first deciphering KEY is connected with video monitoring equipment by the 3rd interface.
Preferably, video monitoring equipment is DVR (Digital Video Recorder, digital video recorder), NVR (Network Video Recorder, network hard disk video recorder), HYBRID DVR (Hybird DVR, the hybrid digital video cassette recorder) or IPC (IP CAMERA, web camera).
Preferably, first interface is SATA (Serial Advanced Technology Attachment, Serial Advanced Technology Attachment) interface, IDE (Integrated Drive Electronics, ide) interface, SD (Secure Digital, secure data storage) clamping mouth, TF (Trans-flash Card, claim Micro SD Card again, superfine little flash memory cards) clamping mouth or USB (Universal Serial Bus, USB) interface.
Preferably, second interface is SATA (Serial Advanced Technology Attachment, Serial Advanced Technology Attachment) interface, TF (Trans-flash Card, claim Micro SD Card again, superfine little flash memory cards) clamping mouth or SD (Secure Digital, secure data storage) clamping mouth.
Preferably, the 3rd interface is USB interface.
As shown in Figure 2, also provide a kind of method that data are stored and network transmits that adopts the video monitoring of this system, this method may further comprise the steps:
(1) system boot;
(2) judge whether encryption device exists and normal, if change step (3), otherwise the prompting encryption device does not exist or is unusual and change step (5);
(3) judge whether the encryption enabled function, if change step (4), otherwise change step (5);
(4) by the encryption device encrypted audio;
(5) the local storage of audio, video data;
(6) system starts end.
Preferably, as shown in Figure 3, also comprise first decryption step between step (4) and (5), first decryption step comprises step by step following:
(5.1) whether the inquiry first deciphering KEY matches, if change step (5.2), otherwise changes step (5.3);
(5.2) judge whether and to match again, if change step (5.3), otherwise change step (5.6);
(5.3) each self-generating pairing bag and exchange;
(5.4) whether the number of first of the pairing of the encryption device deciphering KEY has reached 32, changes step (5.5) if not, is then to return error code and change step (5.6);
(5.5) KEY of recording of encrypted devices allocation numbering;
(5.6) finish.
By encryption device, the deciphering KEY that uses hardware and the encipher-decipher method that adopts these hardware devices, make that enciphering rate is fast, high safety, reliable and stable.
As shown in Figure 1, this system also comprises terminal equipment, the second deciphering KEY, and terminal equipment is connected with video monitoring equipment by network, and the second deciphering KEY is connected with terminal equipment by the 4th interface.
Preferably, video monitoring equipment is DVR (Digital Video Recorder, digital video recorder), NVR (Network Video Recorder, network hard disk video recorder), HYBRID DVR (Hybird DVR, the hybrid digital video cassette recorder) or IPC (IP CAMERA, web camera).
Preferably, first interface is SATA (Serial Advanced Technology Attachment, Serial Advanced Technology Attachment) interface, IDE (Integrated Drive Electronics, ide) interface, SD (Secure Digital, secure data storage) clamping mouth, TF (Trans-flash Card, claim Micro SD Card again, superfine little flash memory cards) clamping mouth or USB (Universal Serial Bus, USB) interface.
Preferably, second interface is SATA (Serial Advanced Technology Attachment, Serial Advanced Technology Attachment) interface, TF (Trans-flash Card, claim Micro SD Card again, superfine little flash memory cards) clamping mouth or SD (Secure Digital, secure data storage) clamping mouth.
Preferably, the 3rd, the 4th interface is USB interface.
As shown in Figure 4, also provide a kind of method that data are stored and network transmits that adopts the video monitoring of this system, this method may further comprise the steps:
(1) system boot;
(2) judge whether encryption device exists and normal, if change step (3), otherwise the prompting encryption device does not exist or is unusual and change step (5);
(3) judge whether the encryption enabled function, if change step (4), otherwise change step (5);
(4) by the encryption device encrypted audio;
(5) the local storage of audio, video data and network transmission;
(6) finish.
Preferably, as shown in Figure 5, also comprise first decryption step between step (4) and (5), first decryption step comprises step by step following:
(5.1) to the second deciphering KEY inquiry that says the word;
(5.2) second deciphering KEY generate the authentication bag and send to main frame;
(5.3) terminal equipment receives the data that the second deciphering KEY sends, and passes to encryption equipment;
(5.4) information of the deciphering KEY of the local storage of encryption device inquiry judges whether the KEY numbering of the second deciphering KEY exists, if change step (5.5), otherwise returns error code and changes step (5.13);
(5.5) the authentication bag that transmits of encryption device analysing terminal equipment,
And the authentication information that generates oneself sends to terminal equipment;
(5.6) authentication of terminal equipment passback encryption device encryption is wrapped to the second deciphering KEY;
(5.7) second deciphering KEY analyze the authentication bag of encryption device;
(5.8) second deciphering KEY judge that whether the content of two authentication bags conforms to, if change step (5.9), otherwise returns error code and changes step (5.13);
(5.9) second deciphering KEY generate the authentication bag again, and issue encryption device by terminal equipment;
(5.10) the authentication bag of encryption device analytical procedure (5.9) judges whether authentication is passed through, if change step (5.11), otherwise returns error code and changes step (5.13);
(5.11) second deciphering KEY authentications are passed through;
(5.12) second deciphering are by the KEY data decryption, and commentaries on classics step (5.14);
(5.13) second deciphering KEY authentification failures;
The deciphering of (5.14) second data decryptions finishes.
The above; it only is preferred embodiment of the present invention; be not that the present invention is done any pro forma restriction, any simple modification, equivalent variations and modification that every foundation technical spirit of the present invention is done above embodiment all still belong to the protection range of technical solution of the present invention.

Claims (10)

1. the data of a video monitoring are stored and the network system for transmitting, it is characterized in that: it comprises memory device, encryption device, the first deciphering KEY, memory device is connected with video monitoring equipment by first interface, encryption device is connected with video monitoring equipment by second interface, and the first deciphering KEY is connected with video monitoring equipment by the 3rd interface.
2. the data of video monitoring according to claim 1 are stored and the network system for transmitting, it is characterized in that: this system also comprises terminal equipment, the second deciphering KEY, terminal equipment is connected with video monitoring equipment by network, and the second deciphering KEY is connected with terminal equipment by the 4th interface.
3. the data of video monitoring according to claim 1 and 2 are stored and the network system for transmitting, and it is characterized in that: video monitoring equipment is digital video recorder DVR, network hard disk video recorder NVR, hybrid digital video cassette recorder HYBRID DVR or web camera IPC.
4. the data of video monitoring according to claim 3 are stored and the network system for transmitting, and it is characterized in that: first interface is Serial Advanced Technology Attachment SATA interface, ide ide interface, secure data storage SD clamping mouth, superfine little flash memory cards TF clamping mouth or general-purpose serial bus USB interface.
5. the data of video monitoring according to claim 3 are stored and the network system for transmitting, and it is characterized in that: second interface is SATA interface, TF clamping mouth or SD clamping mouth.
6. the data of video monitoring according to claim 3 are stored and the network system for transmitting, and it is characterized in that: third and fourth interface is USB interface.
7. the method transmitted of the storage of the data of a video monitoring that adopts the described system of claim 1 and network, it is characterized in that: this method may further comprise the steps:
(1) system boot;
(2) judge whether encryption device exists and normal, if change step (3), otherwise the prompting encryption device does not exist or is unusual and change step (5);
(3) judge whether the encryption enabled function, if change step (4), otherwise change step (5);
(4) by the encryption device encrypted audio;
(5) the local storage of audio, video data;
(6) system starts end.
8. the method transmitted of the data of video monitoring according to claim 7 storages and network, it is characterized in that: also comprise first decryption step between step (4) and (5), first decryption step comprises step by step following:
(5.1) whether the inquiry first deciphering KEY matches, if change step (5.2), otherwise changes step (5.3);
(5.2) judge whether and to match again, if change step (5.3), otherwise change step (5.6);
(5.3) each self-generating pairing bag and exchange;
(5.4) whether the number of first of the pairing of the encryption device deciphering KEY has reached 32, changes step (5.5) if not, is then to return error code and change step (5.6);
(5.5) KEY of recording of encrypted devices allocation numbering;
(5.6) finish.
9. the method transmitted of the storage of the data of a video monitoring that adopts the described system of claim 2 and network, it is characterized in that: this method may further comprise the steps:
(1) system boot;
(2) judge whether encryption device exists and normal, if change step (3), otherwise the prompting encryption device does not exist or is unusual and change step (5);
(3) judge whether the encryption enabled function, if change step (4), otherwise change step (5);
(4) by the encryption device encrypted audio;
(5) the local storage of audio, video data and network transmission;
(6) system starts end.
10. the method transmitted of the data of video monitoring according to claim 7 storages and network, it is characterized in that: also comprise second decryption step between step (4) and (5), second decryption step comprises step by step following:
(5.1) to the second deciphering KEY inquiry that says the word;
(5.2) second deciphering KEY generate the authentication bag and send to main frame;
(5.3) terminal equipment receives the data that the second deciphering KEY sends, and passes to encryption equipment;
(5.4) information of the deciphering KEY of the local storage of encryption device inquiry is judged
Whether the KEY numbering of the second deciphering KEY exists, if change step (5.5), otherwise returns error code and changes step (5.13);
(5.5) the authentication bag that transmits of encryption device analysing terminal equipment,
And the authentication information that generates oneself sends to terminal equipment;
(5.6) authentication of terminal equipment passback encryption device encryption is wrapped to the second deciphering KEY;
(5.7) second deciphering KEY analyze the authentication bag of encryption device;
(5.8) second deciphering KEY judge that whether the content of two authentication bags conforms to, if change step (5.9), otherwise returns error code and changes step (5.13);
(5.9) second deciphering KEY generate the authentication bag again, and issue encryption device by terminal equipment;
(5.10) the authentication bag of encryption device analytical procedure (5.9) judges whether authentication is passed through, if change step (5.11), otherwise returns error code and changes step (5.13);
(5.11) second deciphering KEY authentications are passed through;
(5.12) second deciphering are by the KEY data decryption, and commentaries on classics step (5.14);
(5.13) second deciphering KEY authentification failures;
The deciphering of (5.14) second data decryptions finishes.
CN2013102334873A 2013-06-13 2013-06-13 System and method for data storage and network transmission of video monitoring Pending CN103297736A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013102334873A CN103297736A (en) 2013-06-13 2013-06-13 System and method for data storage and network transmission of video monitoring

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013102334873A CN103297736A (en) 2013-06-13 2013-06-13 System and method for data storage and network transmission of video monitoring

Publications (1)

Publication Number Publication Date
CN103297736A true CN103297736A (en) 2013-09-11

Family

ID=49097975

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013102334873A Pending CN103297736A (en) 2013-06-13 2013-06-13 System and method for data storage and network transmission of video monitoring

Country Status (1)

Country Link
CN (1) CN103297736A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104735322A (en) * 2015-03-25 2015-06-24 江苏物联网研究发展中心 Safety web camera with hardware encryption function
CN111901568A (en) * 2020-08-10 2020-11-06 范丽红 Data encryption system based on Internet of things monitoring terminal

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1492629A (en) * 2003-08-27 2004-04-28 武汉理工大学 Embedded intellgient high speed signal collection monitoring system
CN1558609A (en) * 2004-01-12 2004-12-29 浙江科华科技发展有限公司 IP-DSL network monitoring system
CN1750652A (en) * 2005-10-31 2006-03-22 北京中星微电子有限公司 Network photographic device with enciphering function and its enciphering method
CN101196855A (en) * 2007-12-29 2008-06-11 北京华大恒泰科技有限责任公司 Mobile encrypted memory device and cipher text storage area data encrypting and deciphering processing method
CN101448130A (en) * 2008-12-19 2009-06-03 北京中星微电子有限公司 Method, system and device for protecting data encryption in monitoring system
CN101459559A (en) * 2008-12-26 2009-06-17 中兴通讯股份有限公司 Method and system for storing and managing monitored user configuration information
CN101527823A (en) * 2009-04-10 2009-09-09 南京大学 Network video monitoring system based on FPGA chaotic encryption
CN201435788Y (en) * 2009-04-23 2010-03-31 公安部第一研究所 Digital video coder having real-time encryption function
CN101902576A (en) * 2010-08-02 2010-12-01 华南师范大学 Video-encryption camera and encryption method thereof
CN102013973A (en) * 2009-09-08 2011-04-13 同方股份有限公司 Encryption and decryption commutator
CN201860384U (en) * 2010-08-02 2011-06-08 华南师范大学 Video encryption camera
CN202488213U (en) * 2012-01-04 2012-10-10 华北电力科学研究院有限责任公司 Condition monitoring agency device and system for electric transmission line
CN102930229A (en) * 2011-01-18 2013-02-13 苏州国芯科技有限公司 Office system for improving data security
CN203340212U (en) * 2013-06-13 2013-12-11 深圳南方汉邦数字技术有限公司 Data storage and network transmission system for video monitoring

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1492629A (en) * 2003-08-27 2004-04-28 武汉理工大学 Embedded intellgient high speed signal collection monitoring system
CN1558609A (en) * 2004-01-12 2004-12-29 浙江科华科技发展有限公司 IP-DSL network monitoring system
CN1750652A (en) * 2005-10-31 2006-03-22 北京中星微电子有限公司 Network photographic device with enciphering function and its enciphering method
CN101196855A (en) * 2007-12-29 2008-06-11 北京华大恒泰科技有限责任公司 Mobile encrypted memory device and cipher text storage area data encrypting and deciphering processing method
CN101448130A (en) * 2008-12-19 2009-06-03 北京中星微电子有限公司 Method, system and device for protecting data encryption in monitoring system
CN101459559A (en) * 2008-12-26 2009-06-17 中兴通讯股份有限公司 Method and system for storing and managing monitored user configuration information
CN101527823A (en) * 2009-04-10 2009-09-09 南京大学 Network video monitoring system based on FPGA chaotic encryption
CN201435788Y (en) * 2009-04-23 2010-03-31 公安部第一研究所 Digital video coder having real-time encryption function
CN102013973A (en) * 2009-09-08 2011-04-13 同方股份有限公司 Encryption and decryption commutator
CN101902576A (en) * 2010-08-02 2010-12-01 华南师范大学 Video-encryption camera and encryption method thereof
CN201860384U (en) * 2010-08-02 2011-06-08 华南师范大学 Video encryption camera
CN102930229A (en) * 2011-01-18 2013-02-13 苏州国芯科技有限公司 Office system for improving data security
CN202488213U (en) * 2012-01-04 2012-10-10 华北电力科学研究院有限责任公司 Condition monitoring agency device and system for electric transmission line
CN203340212U (en) * 2013-06-13 2013-12-11 深圳南方汉邦数字技术有限公司 Data storage and network transmission system for video monitoring

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104735322A (en) * 2015-03-25 2015-06-24 江苏物联网研究发展中心 Safety web camera with hardware encryption function
CN111901568A (en) * 2020-08-10 2020-11-06 范丽红 Data encryption system based on Internet of things monitoring terminal

Similar Documents

Publication Publication Date Title
CN109150835B (en) Cloud data access method, device, equipment and computer readable storage medium
CN109903433B (en) Access control system and access control method based on face recognition
CN110473318B (en) Unlocking method, equipment for realizing unlocking and computer readable medium
CN109218825B (en) Video encryption system
CN103701757B (en) Identity authentication method and system for service access
CN109151508B (en) Video encryption method
CN103685323A (en) Method for realizing intelligent home security networking based on intelligent cloud television gateway
JP2012186635A (en) Vehicle network system
US11159329B2 (en) Collaborative operating system
KR101105205B1 (en) An apparatus and a method of processing data for guaranteeing data integrity and confidentiality in real time, and black box system using thereof
CN101621794A (en) Method for realizing safe authentication of wireless application service system
CN106817346B (en) Data transmission method and device and electronic equipment
WO2014142857A1 (en) Wireless communication of a user identifier and encrypted time-sensitive data
CN109922047B (en) Image transmission system and method
CN103780609A (en) Cloud data processing method and device and cloud data security gateway
CN103475477A (en) Safe authorized access method
CN102752306B (en) Digital media management method and system based on mark
CN109714360A (en) A kind of intelligent gateway and gateway communication processing method
KR20120103272A (en) Method for authentication of communication connecting, gateway apparatus thereof, and communication system thereof
CN108170461B (en) Differential upgrade package generation method, differential upgrade method and device
JP2016184917A (en) Monitoring system and reproduction device
CN109086588B (en) Authentication method and authentication equipment
US9756044B2 (en) Establishment of communication connection between mobile device and secure element
CN103297736A (en) System and method for data storage and network transmission of video monitoring
CN113434474A (en) Flow auditing method, equipment and storage medium based on federal learning

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20130911

RJ01 Rejection of invention patent application after publication