CN104539910B - A kind of Data Access Security method and system - Google Patents

A kind of Data Access Security method and system Download PDF

Info

Publication number
CN104539910B
CN104539910B CN201510024080.9A CN201510024080A CN104539910B CN 104539910 B CN104539910 B CN 104539910B CN 201510024080 A CN201510024080 A CN 201510024080A CN 104539910 B CN104539910 B CN 104539910B
Authority
CN
China
Prior art keywords
monitoring device
encryption algorithm
terminal server
server client
image information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510024080.9A
Other languages
Chinese (zh)
Other versions
CN104539910A (en
Inventor
周军
吴子江
邓文华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mobile Intelligent Technology (shanghai) Ltd By Share Ltd
Original Assignee
Mobile Intelligent Technology (shanghai) Ltd By Share Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mobile Intelligent Technology (shanghai) Ltd By Share Ltd filed Critical Mobile Intelligent Technology (shanghai) Ltd By Share Ltd
Priority to CN201510024080.9A priority Critical patent/CN104539910B/en
Publication of CN104539910A publication Critical patent/CN104539910A/en
Application granted granted Critical
Publication of CN104539910B publication Critical patent/CN104539910B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Closed-Circuit Television Systems (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The present invention provides a kind of Data Access Security method, system and its monitoring device, and for the above method the following steps are included: when the event of triggering monitoring device shooting occurs, the monitoring device shoots the Moving Objects in monitoring area;The monitoring device is sent to Terminal Server Client according to trigger event priority, the Encryption Algorithm of acquisition respective intensities, the Encryption Algorithm for the respective intensities that encrypts, while will acquire to the image information of shooting;The monitoring device binds encrypted image information and environment operating parameter, and after the encrypted image information after binding carried out secondary encryption using preset secondary Encryption Algorithm, it is sent to Terminal Server Client and carries out dissection process according to default dissection process strategy by the Terminal Server Client, wherein, the Terminal Server Client prestores preset secondary Encryption Algorithm, realizes the secure storage access of monitoring image.

Description

A kind of Data Access Security method and system
Technical field
The invention belongs to field of communication security more particularly to a kind of Data Access Security methods, system and its monitoring device.
Background technique
As the improvement of people's living standards, the consciousness for household safe is gradually reinforced, occur various monitoring thus Equipment, but due to the particularity of products application scene, how to guarantee that monitoring device itself not will lead to safety issue, and The point for needing gradually to consider.
Many security devices are provided with the function that alarm is captured at present, but the picture for capturing how to save with It consults, none good method.
Summary of the invention
The present invention provides a kind of Data Access Security method, system and its monitoring device, to solve the above problems.
The present invention provides a kind of Data Access Security method, the above method the following steps are included:
When triggering the event generation of monitoring device shooting, the monitoring device claps the Moving Objects in monitoring area It takes the photograph;
The monitoring device believes the image of shooting according to trigger event priority, the Encryption Algorithm of acquisition respective intensities The Encryption Algorithm for ceasing the respective intensities for being encrypted, while being will acquire is sent to Terminal Server Client;
The monitoring device binds encrypted image information and environment operating parameter, and by the encryption after binding After image information carries out secondary encryption using preset secondary Encryption Algorithm, it is sent to Terminal Server Client and by the remote client End carries out dissection process according to default dissection process strategy, wherein the Terminal Server Client prestores preset secondary Encryption Algorithm.
The present invention also provides a kind of Data Access Security systems, including monitoring device, Terminal Server Client;Wherein, the prison Control equipment is connected with the Terminal Server Client;
The monitoring device, when for occurring in the event for triggering monitoring device shooting, to the movement pair in monitoring area As being shot;Be also used to according to trigger event priority, obtain the Encryption Algorithm of respective intensities, to the image information of shooting into Row encryption, while the Encryption Algorithm for the respective intensities that will acquire is sent to Terminal Server Client;It is also used to believe encrypted image Breath is bound with environment operating parameter, and the encrypted image information after binding is carried out two using preset secondary Encryption Algorithm After secondary encryption, it is sent to Terminal Server Client;
The Terminal Server Client is also used to for prestoring preset secondary Encryption Algorithm according to default dissection process strategy Carry out dissection process.
The present invention also provides a kind of monitoring devices, including shooting module, primary encryption module, secondary encrypting module;Wherein, The shooting module is connected by the primary encryption module with the secondary encrypting module;
The shooting module, when the event for triggering monitoring device shooting occurs, to the Moving Objects in monitoring area Shoot and the image information of shooting is sent to the primary encryption module;
The primary encryption module, for the Encryption Algorithm according to trigger event priority, acquisition respective intensities, to shooting Image information carry out encrypt and encrypted image information is sent to the secondary encrypting module;
The secondary encrypting module for binding encrypted image information and environment operating parameter, and will be tied up After encrypted image information after fixed carries out secondary encryption using preset secondary Encryption Algorithm, it is sent to Terminal Server Client.
Pass through following scheme: when the event of triggering monitoring device shooting occurs, the monitoring device is in monitoring area Moving Objects are shot;The monitoring device is according to trigger event priority, the Encryption Algorithm of acquisition respective intensities, to shooting The image information Encryption Algorithm of respective intensities that is encrypted, while will acquire be sent to Terminal Server Client;The monitoring is set It is standby to bind encrypted image information and environment operating parameter, and by the encrypted image information after binding using preset After secondary Encryption Algorithm carries out secondary encryption, it is sent to Terminal Server Client and by the Terminal Server Client according to default dissection process Strategy carries out dissection process, wherein the Terminal Server Client prestores preset secondary Encryption Algorithm;Realize the peace of monitoring image Full storage access.
Pass through following scheme: if the event for triggering monitoring device shooting simultaneously is two or more, according to triggering The Encryption Algorithm of Event Priority selection high priority respective intensities is encrypted;Further ensure the peace of encrypted image information Quan Xing.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present invention, constitutes part of this application, this hair Bright illustrative embodiments and their description are used to explain the present invention, and are not constituted improper limitations of the present invention.In the accompanying drawings:
Fig. 1 show Data Access Security method process flow diagram;
Fig. 2 show monitoring device structure chart;
Fig. 3 show Data Access Security system construction drawing.
Specific embodiment
Hereinafter, the present invention will be described in detail with reference to the accompanying drawings and in combination with Examples.It should be noted that not conflicting In the case of, the features in the embodiments and the embodiments of the present application can be combined with each other.
Fig. 1 show Data Access Security method process flow diagram, comprising the following steps:
Step 101: when the event of triggering monitoring device shooting occurs, the monitoring device is to the movement pair in monitoring area As being shot;
The event of triggering monitoring device shooting includes: that the timer timing in monitoring device reaches, in monitoring device The sound value that detects of voice detector be greater than preset value (such as: 50 decibels), monitoring device and detect fortune in monitoring area Dynamic object (such as: people).
Step 102: the monitoring device is according to trigger event priority, the Encryption Algorithm of acquisition respective intensities, to shooting The image information Encryption Algorithm of respective intensities that is encrypted, while will acquire be sent to Terminal Server Client;
The monitoring device storage trigger event, trigger event priority, Encryption Algorithm intensity and the Encryption Algorithm table of comparisons, It is as shown in the table:
Trigger event, trigger event priority, Encryption Algorithm intensity and the Encryption Algorithm table of comparisons
Trigger event Priority Encryption Algorithm intensity Encryption Algorithm
Timer timing in monitoring device reaches It is low It is small Encryption Algorithm A
The sound that voice detector in monitoring device detects In In Encryption Algorithm B
Value is greater than preset value
Monitoring device detects Moving Objects in monitoring area It is high Greatly Encryption Algorithm C
Table 1
If the event for triggering monitoring device shooting simultaneously is two or more, selected according to trigger event priority The Encryption Algorithm of high priority respective intensities is encrypted.
Such as: the arrival of timer timing and monitoring device in monitoring device detect movement pair in monitoring area As then according to table 1 it is found that monitoring device detects that the priority of Moving Objects is higher than the timing in monitoring device in monitoring area The priority that device timing reaches then selects monitoring device to detect that the priority of Moving Objects is corresponding in monitoring area and adds Close intensity algorithm, that is, algorithm C.
Step 103: the monitoring device binds encrypted image information and environment operating parameter, and will binding After encrypted image information afterwards carries out secondary encryption using preset secondary Encryption Algorithm, it is sent to Terminal Server Client;
The environment operating parameter includes: OS Type parameter, operating system version number parameter, video card model ginseng Number, OFFICE software version number parameter.
Step 104: the Terminal Server Client parses the encrypted image information of secondary encryption, obtain environment operating parameter and with Home environment operating parameter is compared, if unanimously, the Terminal Server Client carries out secondary parsing to encrypted image information, obtains Take corresponding image information.
The Terminal Server Client prestores preset secondary Encryption Algorithm.
The Terminal Server Client storage trigger event, trigger event priority, Encryption Algorithm intensity and Encryption Algorithm control Table.
Fig. 2 show monitoring device structure chart, including shooting module, primary encryption module, secondary encrypting module;Wherein, The shooting module is connected by the primary encryption module with the secondary encrypting module;
The shooting module, when the event for triggering monitoring device shooting occurs, to the Moving Objects in monitoring area Shoot and the image information of shooting is sent to the primary encryption module;
The primary encryption module, for the Encryption Algorithm according to trigger event priority, acquisition respective intensities, to shooting Image information carry out encrypt and encrypted image information is sent to the secondary encrypting module;
The secondary encrypting module for binding encrypted image information and environment operating parameter, and will be tied up After encrypted image information after fixed carries out secondary encryption using preset secondary Encryption Algorithm, it is sent to Terminal Server Client.
Fig. 3 show Data Access Security system construction drawing, including monitoring device, Terminal Server Client;Wherein, the monitoring Equipment is connected with the Terminal Server Client;
The monitoring device, when for occurring in the event for triggering monitoring device shooting, to the movement pair in monitoring area As being shot;Be also used to according to trigger event priority, obtain the Encryption Algorithm of respective intensities, to the image information of shooting into Row encryption, while the Encryption Algorithm for the respective intensities that will acquire is sent to Terminal Server Client;It is also used to believe encrypted image Breath is bound with environment operating parameter, and the encrypted image information after binding is carried out two using preset secondary Encryption Algorithm After secondary encryption, it is sent to Terminal Server Client;
The Terminal Server Client is also used to for prestoring preset secondary Encryption Algorithm according to default dissection process strategy Carry out dissection process.
The Terminal Server Client, is also used to parse the encrypted image information of secondary encryption, obtain environment operating parameter and with Home environment operating parameter is compared, if unanimously, carrying out secondary parsing to encrypted image information, obtains corresponding image letter Breath.
Pass through following scheme: when the event of triggering monitoring device shooting occurs, the monitoring device is in monitoring area Moving Objects are shot;The monitoring device is according to trigger event priority, the Encryption Algorithm of acquisition respective intensities, to shooting The image information Encryption Algorithm of respective intensities that is encrypted, while will acquire be sent to Terminal Server Client;The monitoring is set It is standby to bind encrypted image information and environment operating parameter, and by the encrypted image information after binding using preset After secondary Encryption Algorithm carries out secondary encryption, it is sent to Terminal Server Client and by the Terminal Server Client according to default dissection process Strategy carries out dissection process, wherein the Terminal Server Client prestores preset secondary Encryption Algorithm;Realize the peace of monitoring image Full storage access.
Pass through following scheme: if the event for triggering monitoring device shooting simultaneously is two or more, according to triggering The Encryption Algorithm of Event Priority selection high priority respective intensities is encrypted;Further ensure the peace of encrypted image information Quan Xing.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.

Claims (7)

1. a kind of Data Access Security method, which comprises the following steps:
When triggering the event generation of monitoring device shooting, the monitoring device shoots the Moving Objects in monitoring area;
The monitoring device according to trigger event priority, obtain the Encryption Algorithm of respective intensities, to the image information of shooting into Row encryption, while the Encryption Algorithm for the respective intensities that will acquire is sent to Terminal Server Client;
The monitoring device binds encrypted image information and environment operating parameter, and by the encrypted image after binding After information carries out secondary encryption using preset secondary Encryption Algorithm, be sent to Terminal Server Client and by the Terminal Server Client by Dissection process is carried out according to default dissection process strategy, wherein the Terminal Server Client prestores preset secondary Encryption Algorithm, for institute State the encrypted image information that Terminal Server Client parses secondary encryption, obtain environment operating parameter and with home environment operating parameter into Row compares, if unanimously, the Terminal Server Client carries out secondary parsing to encrypted image information, obtains corresponding image information.
2. the method according to claim 1, wherein the event of triggering monitoring device shooting includes: monitoring device In timer timing reach, the sound value that the voice detector in monitoring device detects is greater than preset value, monitoring is set It is standby to detect Moving Objects in monitoring area.
3. according to the method described in claim 2, it is characterized in that, if trigger simultaneously monitoring device shooting event be two or Two or more is then encrypted according to the Encryption Algorithm of trigger event priority selection high priority respective intensities.
4. the method according to claim 1, wherein monitoring device storage trigger event, trigger event are excellent First grade, Encryption Algorithm intensity and the Encryption Algorithm table of comparisons.
5. the method according to claim 1, wherein the environment operating parameter includes: OS Type ginseng Number, operating system version number parameter, video card model parameter, OFFICE software version number parameter.
6. the method according to claim 1, wherein the Terminal Server Client stores trigger event, trigger event Priority, Encryption Algorithm intensity and the Encryption Algorithm table of comparisons.
7. a kind of Data Access Security system, which is characterized in that including monitoring device, Terminal Server Client;Wherein, the monitoring is set It is standby to be connected with the Terminal Server Client;
The monitoring device, for trigger monitoring device shooting event occur when, to the Moving Objects in monitoring area into Row shooting;It is also used to add the image information of shooting according to the Encryption Algorithm of trigger event priority, acquisition respective intensities It is close, while the Encryption Algorithm for the respective intensities that will acquire is sent to Terminal Server Client;Be also used to by encrypted image information with Environment operating parameter is bound, and the encrypted image information after binding is carried out secondary add using preset secondary Encryption Algorithm After close, it is sent to Terminal Server Client;
The Terminal Server Client is also used to carry out according to default dissection process strategy for prestoring preset secondary Encryption Algorithm Dissection process;
The Terminal Server Client, is also used to parse the encrypted image information of secondary encryption, obtain environment operating parameter and with local Environment operating parameter is compared, if unanimously, carrying out secondary parsing to encrypted image information, obtaining corresponding image information.
CN201510024080.9A 2015-01-16 2015-01-16 A kind of Data Access Security method and system Active CN104539910B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510024080.9A CN104539910B (en) 2015-01-16 2015-01-16 A kind of Data Access Security method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510024080.9A CN104539910B (en) 2015-01-16 2015-01-16 A kind of Data Access Security method and system

Publications (2)

Publication Number Publication Date
CN104539910A CN104539910A (en) 2015-04-22
CN104539910B true CN104539910B (en) 2019-06-04

Family

ID=52855369

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510024080.9A Active CN104539910B (en) 2015-01-16 2015-01-16 A kind of Data Access Security method and system

Country Status (1)

Country Link
CN (1) CN104539910B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106534139A (en) * 2016-11-22 2017-03-22 努比亚技术有限公司 Photo secrecy method and mobile terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101221446A (en) * 2006-09-29 2008-07-16 洛克威尔自动控制技术股份有限公司 Alarm/event encryption in an industrial environment
CN101917598A (en) * 2010-07-21 2010-12-15 深圳市共济科技有限公司 Monitoring system for displaying real scene and implementation method thereof
CN102147884A (en) * 2011-03-11 2011-08-10 朱清明 Anti-counterfeiting and authenticity-verifying method and system for article
CN102325251A (en) * 2011-10-19 2012-01-18 杭州华三通信技术有限公司 Video monitoring and playback service realization methods and equipment

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1980380B (en) * 2005-12-05 2011-04-27 厦门雅迅网络股份有限公司 Vehicle networked video advertisement agent authorization electronic processing method and system
CN102624699B (en) * 2012-01-19 2015-07-08 歌尔声学股份有限公司 Method and system for protecting data
CN102595099B (en) * 2012-02-14 2014-12-10 北京交通大学 Cognitive-technology-based video data synthesis method
JP5891061B2 (en) * 2012-02-15 2016-03-22 株式会社日立製作所 Video monitoring apparatus, monitoring system, and monitoring system construction method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101221446A (en) * 2006-09-29 2008-07-16 洛克威尔自动控制技术股份有限公司 Alarm/event encryption in an industrial environment
CN101917598A (en) * 2010-07-21 2010-12-15 深圳市共济科技有限公司 Monitoring system for displaying real scene and implementation method thereof
CN102147884A (en) * 2011-03-11 2011-08-10 朱清明 Anti-counterfeiting and authenticity-verifying method and system for article
CN102325251A (en) * 2011-10-19 2012-01-18 杭州华三通信技术有限公司 Video monitoring and playback service realization methods and equipment

Also Published As

Publication number Publication date
CN104539910A (en) 2015-04-22

Similar Documents

Publication Publication Date Title
Do et al. Cyber-physical systems information gathering: A smart home case study
KR101722664B1 (en) Multi-viewpoint System, Wearable Camera, CCTV, Control Server And Method For Active Situation Recognition
CN108920937A (en) Screen projection system, screen projection method and screen projection device
CN104579627B (en) A kind of data ciphering method and system
CN104282049B (en) Attendance checking through facial recognition terminal and attendance process Verification System and authentication method
CN107277456A (en) A kind of video security monitoring system based on Android device
WO2010048243A3 (en) Cellular phone data streaming for surveillance and personal security
CN103678979A (en) Method and device for intelligently hiding privacy data
EP3337088A1 (en) Data encryption method, decryption method, apparatus, and system
KR101997031B1 (en) Enforcement module integrated camera
CN104519068A (en) Moving target protection method based on operating system fingerprint jumping
CN106060065A (en) Communication system and method for use in restricted network environment
JP2019527524A (en) Network separation device and video surveillance system including the same
Rondon et al. HDMI-walk: Attacking HDMI distribution networks via consumer electronic control protocol
CN104539910B (en) A kind of Data Access Security method and system
WO2015015016A1 (en) Method implemented by computer for capturing evidentiary audiovisual and/or multimedia information and computer program
CN115248940A (en) Video evidence storing method, verification method and device based on block chain
CN108471413A (en) Edge network safety permission system of defense and its method
CN104579665B (en) Method for authenticating and device
CN105916187B (en) Intelligent appliance equipment, terminal and intelligent appliance equipment distribution network systems
CN106302539A (en) A kind of embedded type WEB safety certifying method
CN110225308B (en) Privacy protection method for home video security system
CN104091158B (en) A kind of Verification System of attack protection palmprint authentication method and its application
Lagesse et al. Detecting spies in IoT systems using cyber-physical correlation
CN110113620A (en) Video resource based on private network environment plays and acquisition method and system in real time

Legal Events

Date Code Title Description
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 200241 A2110 room 555, No. 555 Dongchuan Road, Minhang District, Shanghai.

Applicant after: Mobile Intelligent Technology (Shanghai) Limited by Share Ltd

Address before: 200241 A2110 room 555, No. 555 Dongchuan Road, Minhang District, Shanghai.

Applicant before: Eques Technology Co., Ltd.

GR01 Patent grant
GR01 Patent grant