CN1972278A - A method for implementing safe remote video monitoring - Google Patents

A method for implementing safe remote video monitoring Download PDF

Info

Publication number
CN1972278A
CN1972278A CN 200510096388 CN200510096388A CN1972278A CN 1972278 A CN1972278 A CN 1972278A CN 200510096388 CN200510096388 CN 200510096388 CN 200510096388 A CN200510096388 A CN 200510096388A CN 1972278 A CN1972278 A CN 1972278A
Authority
CN
China
Prior art keywords
monitoring
password
remote
local monitor
remote monitoring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200510096388
Other languages
Chinese (zh)
Other versions
CN1972278B (en
Inventor
马敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Datang Telecom Co Ltd
Original Assignee
Xian Datang Telecom Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Datang Telecom Co Ltd filed Critical Xian Datang Telecom Co Ltd
Priority to CN2005100963880A priority Critical patent/CN1972278B/en
Publication of CN1972278A publication Critical patent/CN1972278A/en
Application granted granted Critical
Publication of CN1972278B publication Critical patent/CN1972278B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

This invention discloses one method to realize safe remote visual frequency, which comprises the following steps: using information flow transmission and validation remote monitor codes; remote monitoring decoding and coding process; audio media data coding process composed two types of send and validation remote monitor in the process; the coding and decoding process comprises the following steps: remote monitor end gets local monitor end public key; remote monitor end uses the key plus coding formula to convert code characters into dark data; remote monitor tend sends dark message codes to local monitor end; local monitor end receives dark message and uses private key to convert monitor codes into message monitor key.

Description

A kind of method that realizes safe monitoring remote video
Technical field
The present invention relates to communication technical field, be specifically related to adopt multimedia communication protocol H.323 to realize the method for monitoring remote video of the safety of IP based network.
Background technology
Along with developing rapidly of Intemet network, the various application of IP based network emerge in an endless stream, and monitoring remote video is one of wherein very promising application.Video compression technology has had very big development on the one hand, Fiber-To-The-Building on the other hand, Fiber to the home and multiple network access way such as ADSL, make different users such as enterprise, family can both enjoy broadband IP network easily, the Active Eyes that is used for the IP based network of household safe, Industry Control etc. has begun to become the focus of research.
H.323 protocol architecture provides the standard of multimedia communication for existing packet network, and it has stipulated to carry out based on Packet Based Network system logic assembly, message definition and the communication process of 2 points/multiple spot real-time media communication.H.323 be widely used in the IP broadband services such as IP phone, video conference.
The long distance control system of IP based network adopts fairly simple calling control at present, as self-defining call setup order, and consider fewerly for the safety certification in the call control procedure, the system that has has increased user management, at the remote monitoring end server is set, deposit registered user's user name, password and out of Memory, have only validated user just can call out the local monitor end.But this safety approach is the general authentification of user at calling terminal, and the safety certification process that does not have called end to participate in.Fail safe when the authentification of user of calling terminal can only guarantee that the calling terminal user logins, and subscriber management server has been left username and password concentratedly, be easy to become the object of assault, in case user security information is stolen, the fail safe of whole system is just destroyed.If in follow-up call control procedure, increase the safety certification that the local monitor end participates in, just can strengthen the monitoring remote video service security.Because the user operates monitoring remote video and carries out at random, and the remote monitoring password is to transmit by dark text, so the hacker captures relatively difficulty of monitoring password, and to the very difficulty that cracks also of monitoring password.
Summary of the invention
The present invention is directed to the deficiency and the defective that exist in the existing remote video controlling method based on IP network, provide a kind of employing H.323 multi-media protocol realize the method for the monitoring remote video of safety on the IP network, make the Active Eyes of IP based network have perfect calling control and medium control procedure, and in call control procedure or enter and increased security authentication process when medium transmit, have only after safety certification passes through, just can carry out the transmission of audio-video frequency media stream, and audio-video frequency media stream transmits in the mode of encrypting.
A kind of method that realizes safe monitoring remote video may further comprise the steps:
A: the process of utilizing message flow transmission and authenticating remote monitoring password;
B: the encrypting and decrypting process of remote monitoring password;
C: the encrypting and decrypting process of audio-video frequency media data.
Wherein, step a further is included in transmission in the call control procedure, authenticating remote monitoring pin mode and transmission after calling out control and medium control procedure, authenticating remote is monitored pin mode.
Described transmission in call control procedure, authenticating remote monitoring pin mode specifically comprise:
A11: the remote monitoring end is called out the local monitor end, and monitoring password dark text is sent to the local monitor end as the expansion item in the message H.225;
A12: the local monitor termination is received H.225 message, from an expansion taking-up monitoring password dark text, the deciphering back compares with the monitoring password of local monitor end storage, if comparative result unanimity, password authentification is passed through, then enter H.245 medium control interaction flow, if interaction success H.245, then the local monitor end begins to transmit to the remote monitoring end audio-video frequency media data at monitored scene; If comparative result is inconsistent, the password authentification failure finishes communication.
Described transmission after calling out control and medium control procedure, authenticating remote monitoring pin mode specifically comprise:
A21: the remote monitoring end is called out the local monitor end, access success and medium control interaction success H.245, and then the local monitor end requires remote monitoring end input monitoring password;
A22: the remote monitoring end adopts DTMF (Double Tone MulitiFrequency, dual-tone multifrequency) mode to transmit monitoring password dark text with each single character mode;
A23: the local monitor termination is taken into custody control password monocase dark text and deciphering, is preserved, when the reception monitoring password timer expiry of receiving monitoring password end mark or setting, the monitoring password of the monitoring password that then will receive and the storage of local monitor end compares, if comparative result unanimity, password authentification is passed through, and then the local monitor end begins to transmit to the remote monitoring end audio-video frequency media data at monitored scene; If comparative result is inconsistent, the password authentification failure finishes communication.
Wherein, step b specifically comprises:
B1: the remote monitoring end obtains the PKI of local monitor end;
B2: the remote monitoring end adopts public key encryption algorithm, uses described public key encryption remote monitoring password, and sends to the local monitor end;
B3: after the local monitor termination is received monitoring password dark text, uses the private key corresponding that the monitoring password of dark text is converted to plaintext and monitor password with described PKI.
Wherein, step c specifically comprises:
C1: the local monitor end is created a secret keys at random, and the local monitor end uses this secret keys, adopts symmetric key algorithm to encrypt the audio-video frequency media data;
C2: the local monitor end obtains the PKI of remote monitoring end, and uses described PKI, adopts public key encryption algorithm to encrypt described secret keys;
C3: the local monitor end is issued the remote monitoring end together with dark text secret keys and dark text audio-video frequency media data;
C4: the remote monitoring end uses the private key corresponding with described PKI that the dark text secret keys is converted to expressly, utilizes this secret keys that dark text audio-video frequency media data are converted to clear data again.
Compared with prior art, the present invention has the following advantages:
The present invention adopts fairly simple and practical method, on the basis of agreement H.323, increased system's safety certification that the local monitor end participates in call control procedure, strengthened the monitoring remote video service security, only overcome and increased subscriber management server at calling terminal, fail safe is easy to be damaged, shortcomings such as maintenance cost height.
In addition, because the present invention adopts the H.323 multi-media protocol of standard, this system not only has perfect calling control and medium control procedure, and has interoperability and extensibility preferably, and can be according to user's its fail safe of increase in demand and additional function etc.
Description of drawings
Fig. 1 is a system configuration schematic diagram described in the invention;
Fig. 2 is that the present invention transmits in call control procedure, the process schematic diagram of authenticating remote monitoring password;
Fig. 3 is that the present invention transmits after calling out control and medium control procedure, the process schematic diagram of authenticating remote monitoring password;
Fig. 4 is the message flow schematic diagram that carries out the remote monitoring safety certification in call control procedure described in the invention;
Fig. 5 described in the invention is calling out the message flow schematic diagram that control and medium control procedure are carried out the remote monitoring safety certification after finishing;
Fig. 6 is the encryption and decryption process schematic diagram of remote monitoring password described in the invention;
Fig. 7 is the encryption and decryption process schematic diagram of audio-video frequency media data described in the invention.
Specific embodiment
Below we will be in conjunction with the accompanying drawings, optimum implementation of the present invention is described in detail.At first it is to be noted, the implication of the term of using among the present invention, words and claim can not only only limit to its literal and common implication and go to understand, also comprise the implication and the notion that conform to technology of the present invention, this is because we are as the inventor, to suitably provide the definition of term, so that the most appropriate description is carried out in our invention.Therefore, the configuration that provides in this explanation and the accompanying drawing is first-selected embodiment of the present invention, rather than will enumerates all technical characteristics of the present invention.We will recognize to also have the various equivalent scheme or the modifications that can replace our scheme.
The registration of supposing terminal and gatekeeper is safe (having passed through registration gatekeeper's the account number and the checking of password), the present invention is main is noted that between remote monitoring end and the local monitor end it is how to adopt H.323 that multimedia communication protocol makes the Active Eyes of IP based network have perfect calling control and medium control procedure, and adopts simple and practical method to increase the fail safe of Active Eyes.
System configuration described in the invention as shown in Figure 1.System comprises remote monitoring end and local monitor end, local monitor end described in the invention is to be positioned at the on-the-spot independently embedded device of monitoring, be responsible for collection, coding, encryption and the transmission of local audio/video information, and responsible safety certification to the remote monitoring password, realize the H.323 terminal called part of agreement, but be not limited to called part.
Remote monitoring end described in the invention is computer or the IP video terminal with remote monitoring function, be responsible for the encryption and the transmission of remote monitoring password, and be responsible for after the remote monitoring password is passed through by safety certification, monitored end audio-video frequency media data are decrypted, decode and play, realize the H.323 calling terminal part of agreement, but be not limited to the caller part.Be connected by IP network between remote monitoring end and the local monitor end.
The method of the monitoring remote video of safety is on the basis of ITU-TH.323 multimedia communication protocol flow process on the IP based network described in the invention, has increased the calling control flow of safety certification and the safe transport process of media data.Wherein, the calling control identifying procedure of safety is on agreement flow process H.323, has increased the process of encryption, transmission, deciphering and the checking of remote monitoring password.Wherein, the safe transport process of media data is after the remote monitoring password is by checking, the process of encryption, transmission and the deciphering of the audio-video frequency media data of local monitor end.
Described monitoring password is to be sent by the remote monitoring end, and the local monitor termination is received and checking.The monitoring password transmits in the dark text mode.At first, monitored end need dispose and preserve the monitoring password, can use unified remote monitoring password, also can adopt the different corresponding different remote monitoring passwords of calling another name.The remote monitoring end is according to following two kinds of different transmission flow processs, input the remote monitoring password corresponding stage prompting user, password generally has certain figure place restriction, and data volume is very little, therefore the encryption of remote monitoring password can be adopted public key encryption algorithm, as RSA Algorithm.
Fig. 2 and Fig. 3 represented respectively at ITU-T H.323 on the basis of agreement flow process, and the encryption that has increased the remote monitoring password transmits and two kinds of flow processs of the end to end communication of checking.Those skilled in the art can adopt other method to transmit and authenticating remote monitoring password based on thinking of the present invention and principle.
In the represented flow process of Fig. 2, the safety certifying method of monitoring password is that encryption, transmission, deciphering, the proof procedure with the remote monitoring password is placed in the H.225 call control procedure, the steps include:
Step 201: the remote monitoring end is called out the local monitor end, and monitoring password dark text is sent to the local monitor end as the expansion item in the message H.225;
Step 202: the local monitor termination is received described H.225 message, and from an expansion taking-up monitoring password dark text, deciphering and checking if the monitoring password authentification is failed, finish communication; If the monitoring password authentification is passed through, then enter step 203;
Step 203: it is mutual that H.245 remote monitoring end and local monitor end carry out medium control, if interaction success H.245 then enters step 204;
Step 204: the local monitor end transmits the audio-video frequency media data at monitored scene to the remote monitoring end in the mode of dark text.Concrete steps are seen embodiment one.
In the represented flow process of Fig. 3, the safety certifying method of monitoring password is after encryption, transmission, deciphering, the proof procedure with the remote monitoring password is placed on H.225 call control procedure and H.245 the medium control procedure is finished, and utilizes the DTMF mode to transmit the monitoring password.The steps include:
Step 301: the remote monitoring end is called out the local monitor end, if H.225 call out successful connection, then enters step 302;
Step 302: it is mutual that H.245 remote monitoring end and local monitor end carry out medium control, if interaction success H.245 then enters step 303;
Step 303: the local monitor end requires remote monitoring end input monitoring password by suggestion voice, the DTMF mode that adopts the remote monitoring end transmits monitoring password dark text, and the local monitor termination is taken into custody control password dark text, deciphering and checking, if monitoring password authentification failure finishes communication; If the monitoring password authentification is passed through, then enter step 304;
Step 304: the local monitor end transmits the audio-video frequency media data at monitored scene to the remote monitoring end in the mode of dark text.Concrete steps are seen embodiment two.
The audio-video frequency media data at monitored scene are to be sent by the local monitor end, and the remote monitoring termination is received.The audio-video frequency media data at monitored scene are to transmit in the dark text mode.
The audio-video frequency media data volume is big, the method that its encrypting and decrypting can adopt symmetric key encryption algorithm to combine with public key encryption algorithm, and symmetric key encryption algorithm is adopted in promptly a large amount of sounds, the encryption of video data, deciphering, as the DES algorithm.Utilize public key encryption algorithm to exchange the secret keys of using when carrying out symmetric cryptography safely.
Embodiment one
Present embodiment specifies the multimedia communication protocol H.323 based on ITU-T, increases the remote monitoring communication process of safety certification in call control procedure, as shown in Figure 4.
Step 401: the remote monitoring end subscriber is called out the local monitor end, and remote monitoring end subscriber interface module ejects password input window, requires user's input monitoring password;
Step 402: remote monitoring end H.323 module is encrypted the monitoring password;
Step 403~404: remote monitoring end H.323 module sends access permission request (ARQ) to the gatekeeper as calling terminal, after (ACF) replied in the affirmation that receives the gatekeeper, continues step 405;
Step 405: the remote monitoring password of dark text is filled in the nonStandardData extended field of Setup message, send Setup message to the local monitor end;
Step 406: after the local monitor end is received Setup message, take out the monitoring password of dark text and preserve, and send CallProceeding message to the remote monitoring end;
Step 407~408: the local monitor end sends to the gatekeeper to insert as called end and allows request (ARQ), after (ACF) replied in the affirmation that receives the gatekeeper, continues step 409;
Step 409~413: the local monitor end is to the monitoring password to decipher of dark text and verify, if authentication failed then sends H.225 ReleaseComplete message, terminated call to the remote monitoring end; If be proved to be successful, then send H.225 Connect message to the remote monitoring end, represent that 225 call link set up, the local monitor end has been in off hook state;
Step 414~416: carry out the H.245 reciprocal process in the flow process H.323, comprise capabilities exchange, principal and subordinate's decision, open the audio frequency and video logical channel;
Step 417: if interaction success H.245, the local monitor end will transmit the on-the-spot audio-video frequency media data of monitoring to the remote monitoring end, and audio-video frequency media stream transmits in the mode of encrypting;
Step 418~419: the remote monitoring end is to the audio-video frequency media data decryption that receives, the situation that broadcast just can monitor the scene, opposite end by IP network.
Embodiment two
Present embodiment specifies the multimedia communication protocol H.323 based on ITU-T, in call control procedure H.225 with after H.245 the medium control procedure is finished, entering sound, video media-data increases the remote monitoring communication process of safety certification before transmitting, as shown in Figure 5.
Step 501: the remote monitoring end subscriber is called out the local monitor end;
Step 502~503: the remote monitoring end H.323 module as calling terminal to the gatekeeper (GK1) send to insert allow request (ARQ), after (ACF) replied in the affirmation that receives gatekeeper (GK1), continue step 504;
Step 504: the remote monitoring end is to local monitor end transmission Setup message H.225;
Step 505: the local monitor end sends CallProceeding message to the remote monitoring end after receiving Setup message;
Step 506~507: the local monitor end as called end to the gatekeeper (GK2) send to insert allow request (ARQ), after (ACF) replied in the affirmation that receives gatekeeper (GK2), continue step 508;
Step 508~509: the local monitor end is to remote monitoring end transmission Connect message H.225, and the expression call link is set up, and the local monitor end has been in off hook state;
Step 510~512: carry out the H.245 reciprocal process in the flow process H.323, comprise capabilities exchange, principal and subordinate's decision, open the audio frequency and video logical channel;
Step 513: if interaction success H.245, the local monitor end will transmit " please input monitoring password " suggestion voice to the remote monitoring end;
Step 514: remote monitoring end subscriber interface module play cuing voice;
Step 515: the user keys in the remote monitoring password;
Step 516~517: remote monitoring H.323 module is encrypted separately each character of monitoring password successively, is sent to the local monitor end in the DTMF mode then;
Step 518: the local monitor termination is taken into custody the monocase dark text of control password, and deciphering is also preserved;
Step 519~521: remote monitoring end subscriber input monitoring password end mark, remote monitoring H.323 module is encrypted this end mark, and is sent to the local monitor end in the DTMF mode;
Step 522: the monocase dark text of local monitor end deciphering monitoring password, judge whether to be monitoring password end mark, if, then monitor the checking of password, receive otherwise continue wait; In addition, the local monitor end is provided with and receives monitoring password DTMF timer, if this timer expiry then stops to wait for reception monitoring password and end mark, begins to monitor the checking of password;
Step 523~525: if the local monitor end is to monitoring password authentification failure, then to remote monitoring end transmission EndSession message H.245, terminated call; If to monitoring password authentification success, then the local monitor end just transmits the on-the-spot audio-video frequency media data of monitoring to the remote monitoring end, audio-video frequency media stream transmits in the mode of encrypting;
Step 526~527: the remote monitoring end is to the audio-video frequency media data decryption that receives, the situation that broadcast just can monitor the scene, opposite end by IP network.
In above flow process, DTMF can adopt one of following four kinds of bearing modes to the transmission of packing of the monitoring password of dark text: by message transmission Q.931; By SIGNAL field transmission H.245; By STRING field transmission H.245; By the transmission of RTP audio logical channel, load type is 101, follows standard RFC2833.
The advantage of above embodiment one is that remote monitoring end and local monitor end communication process are more succinct, and since the monitoring password checking at call control phase, if therefore password authentification failure, then do not need to carry out flow processs such as H.245 medium control, system is very fast for the response time of monitoring password mistake again.The advantage of embodiment two is except that the encryption and decryption part, and the remote monitoring end can be a common H.323 terminal of supporting DTMF, H.225 call out control and H.245 medium control all be normal process, do not need customization.
More than two kinds of embodiment medium-long range monitoring clients and local monitor end support the encryption and decryption process of monitoring password of following elaboration and the encryption and decryption process of audio-video frequency media data.
Fig. 6 is the encryption and decryption process of remote monitoring password, specifically may further comprise the steps:
Step 601: the remote monitoring end obtains the PKI of local monitor end;
Step 602: the remote monitoring end adopts public key encryption algorithm, and the PKI in the use step 601 will be monitored password string and be converted to the dark text data;
Step 603: the remote monitoring end sends the monitoring password of dark text to the local monitor end;
Step 604: after the local monitor termination is received monitoring password dark text, uses the private key corresponding that the monitoring password of dark text is converted to plaintext and monitor password with PKI in the step 601.
Fig. 7 is the encryption and decryption process of audio-video frequency media data, specifically may further comprise the steps:
Step 701: the local monitor end obtains the PKI of remote monitoring end;
Step 702: the local monitor end is created a secret keys at random;
Step 703: the local monitor end adopts symmetric key algorithm, uses the secret keys in the step 702 that plaintext audio-video frequency media data are converted to the dark text data;
Step 704: the local monitor end adopts public key encryption algorithm, uses the PKI in the step 701 that secret keys is converted to the dark text secret keys;
Step 705: the local monitor end is issued the remote monitoring end together with dark text data and dark text secret keys;
Step 706: the remote monitoring termination is received the dark text data of local monitor end, and at first the pairing private key of PKI is converted to the dark text secret keys expressly in use and the step 701;
Step 707: the remote monitoring end uses the plaintext secret keys that dark text audio-video frequency media data are converted to clear data.

Claims (6)

1, a kind of method that realizes safe monitoring remote video may further comprise the steps:
A: the process of utilizing message flow transmission and authenticating remote monitoring password;
B: the encrypting and decrypting process of remote monitoring password;
C: the encrypting and decrypting process of audio-video frequency media data.
2, the method that realizes the monitoring remote video of safety as claimed in claim 1, it is characterized in that step a further is included in transmission in the call control procedure, authenticating remote monitoring pin mode and transmission after calling out control and medium control procedure, authenticating remote is monitored pin mode.
3, the method that realizes the monitoring remote video of safety as claimed in claim 2 is characterized in that, described transmission in call control procedure, authenticating remote monitoring pin mode specifically comprise:
A11: the remote monitoring end is called out the local monitor end, and monitoring password dark text is sent to the local monitor end as the expansion item in the message H.225;
A12: the local monitor termination is received H.225 message, and from an expansion taking-up monitoring password dark text, the deciphering back compares with the monitoring password that the local monitor end is stored.
4, the method that realizes the monitoring remote video of safety as claimed in claim 2 is characterized in that, described transmission after calling out control and medium control procedure, authenticating remote monitoring pin mode specifically comprise:
A21: the remote monitoring end is called out the local monitor end, access success and medium control interaction success H.245, and then the local monitor end requires remote monitoring end input monitoring password;
A22: the remote monitoring end adopts the DTMF mode to transmit monitoring password dark text with each single character mode;
A23: the local monitor termination is taken into custody control password monocase dark text and deciphering, is preserved, and when the reception monitoring password timer expiry of receiving monitoring password end mark or setting, the monitoring password of the monitoring password that then will receive and the storage of local monitor end compares.
5, the method that realizes the monitoring remote video of safety as claimed in claim 1 is characterized in that step b specifically comprises:
B1: the remote monitoring end obtains the PKI of local monitor end;
B2: the remote monitoring end adopts public key encryption algorithm, uses described public key encryption remote monitoring password, and sends to the local monitor end;
B3: after the local monitor termination is received monitoring password dark text, uses the private key corresponding that the monitoring password of dark text is converted to plaintext and monitor password with described PKI.
6, the method that realizes the monitoring remote video of safety as claimed in claim 1 is characterized in that step c specifically comprises:
C1: the local monitor end is created a secret keys and use described secret keys at random, adopts symmetric key algorithm to encrypt the audio-video frequency media data;
C2: the local monitor end obtains the PKI of remote monitoring end, and uses described PKI, adopts public key encryption algorithm to encrypt described secret keys;
C3: the local monitor end is issued the remote monitoring end together with dark text secret keys and dark text audio-video frequency media data;
C4: the remote monitoring end uses the private key corresponding with described PKI that the dark text secret keys is converted to expressly, utilizes described secret keys that dark text audio-video frequency media data are converted to clear data again.
CN2005100963880A 2005-11-21 2005-11-21 A method for implementing safe remote video monitoring Active CN1972278B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2005100963880A CN1972278B (en) 2005-11-21 2005-11-21 A method for implementing safe remote video monitoring

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2005100963880A CN1972278B (en) 2005-11-21 2005-11-21 A method for implementing safe remote video monitoring

Publications (2)

Publication Number Publication Date
CN1972278A true CN1972278A (en) 2007-05-30
CN1972278B CN1972278B (en) 2011-06-15

Family

ID=38112866

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2005100963880A Active CN1972278B (en) 2005-11-21 2005-11-21 A method for implementing safe remote video monitoring

Country Status (1)

Country Link
CN (1) CN1972278B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102223631A (en) * 2010-04-16 2011-10-19 华为技术有限公司 Data encryption transmission method, device and system in M2M (man to machine, machine to machine and machine to man)
CN102724563A (en) * 2012-06-15 2012-10-10 深圳市汇海威视科技有限公司 Monitoring front end and terminal, monitoring system as well as audio/video signal encryption and decryption methods
CN102740161A (en) * 2012-06-19 2012-10-17 华为技术有限公司 Set-top box integrating functions of video telephone and media data monitoring and method thereof
CN101946459B (en) * 2008-02-26 2015-08-12 艾利森电话股份有限公司 For the method and apparatus of reliable broadcast/multicast service
CN104967974A (en) * 2008-02-26 2015-10-07 艾利森电话股份有限公司 Method used for reliable broadcast/multicast service and equipment thereof
CN105262945A (en) * 2015-09-18 2016-01-20 北京奇虎科技有限公司 Signaling transmission method and device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100395747C (en) * 2003-11-01 2008-06-18 鸿富锦精密工业(深圳)有限公司 Network video data replay system and method
CN1556636A (en) * 2004-01-02 2004-12-22 南京金鹰国际集团软件***有限公司 Character terminal monitoring system
CN1254972C (en) * 2004-01-19 2006-05-03 上海交通大学 Intelligent video content monitoring system based on IP network
CN100588166C (en) * 2004-11-25 2010-02-03 武汉大学 Distributed GIS space information integration apparatus based on mobile agent and GML

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101946459B (en) * 2008-02-26 2015-08-12 艾利森电话股份有限公司 For the method and apparatus of reliable broadcast/multicast service
CN104967974A (en) * 2008-02-26 2015-10-07 艾利森电话股份有限公司 Method used for reliable broadcast/multicast service and equipment thereof
CN104967974B (en) * 2008-02-26 2019-07-30 艾利森电话股份有限公司 Method and apparatus for reliable broadcast/multicast service
CN102223631A (en) * 2010-04-16 2011-10-19 华为技术有限公司 Data encryption transmission method, device and system in M2M (man to machine, machine to machine and machine to man)
WO2011127804A1 (en) * 2010-04-16 2011-10-20 华为技术有限公司 Method, apparatus and system for data encryption transmission in m2m
CN102223631B (en) * 2010-04-16 2014-06-04 华为技术有限公司 Data encryption transmission method, device and system in M2M (man to machine, machine to machine and machine to man)
CN102724563A (en) * 2012-06-15 2012-10-10 深圳市汇海威视科技有限公司 Monitoring front end and terminal, monitoring system as well as audio/video signal encryption and decryption methods
CN102740161A (en) * 2012-06-19 2012-10-17 华为技术有限公司 Set-top box integrating functions of video telephone and media data monitoring and method thereof
CN102740161B (en) * 2012-06-19 2015-04-08 华为技术有限公司 Set-top box integrating functions of video telephone and media data monitoring and method thereof
CN105262945A (en) * 2015-09-18 2016-01-20 北京奇虎科技有限公司 Signaling transmission method and device

Also Published As

Publication number Publication date
CN1972278B (en) 2011-06-15

Similar Documents

Publication Publication Date Title
KR101438243B1 (en) Sim based authentication
US20060090067A1 (en) Method and apparatus for performing a secure transaction in a trusted network
CN101304423B (en) Method and system for authenticating user identification
CN102868665A (en) Method and device for data transmission
CN103974241A (en) Voice end-to-end encryption method aiming at mobile terminal with Android system
CA2649402C (en) Method, devices and computer program product for encoding and decoding media data
CN1972278B (en) A method for implementing safe remote video monitoring
US20160044030A1 (en) Method of providing real-time secure communication between end points in a network
US20130232560A1 (en) Method, device and system for verifying communication sessions
CN102202299A (en) Realization method of end-to-end voice encryption system based on 3G/B3G
CN104683098B (en) A kind of implementation method of secure traffic, equipment and system
US20090070586A1 (en) Method, Device and Computer Program Product for the Encoded Transmission of Media Data Between the Media Server and the Subscriber Terminal
CN113347215B (en) Encryption method for mobile video conference
US20110135093A1 (en) Secure telephone devices, systems and methods
US20150009916A1 (en) Pairing of devices through separate networks
CN101087326B (en) A communication terminal registration method and system
KR100499664B1 (en) Security handfree kit and security communication system and method using public key infrastructure
US20050228997A1 (en) Methods and devices for providing secure communication sessions
US8208638B2 (en) Set of equipment for secure direct information transfer over the internet
CN113795022B (en) Public network interphone encryption communication method and public network interphone system
CN101222503A (en) Safety parameter generating method and device for implementing media stream safety
CN108092938A (en) Authentication method based on fingerprint, first server and terminal based on finger print identifying
CN106533686A (en) Encryption communication method and system, communication unit and client
WO2024100677A1 (en) A system for lora based lightweight blockchain financial network for offline payments and method thereof
CN113489765A (en) Method and system for video exchange identity authentication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant