[go: up one dir, main page]

CN108882030A - A kind of monitor video classification encryption and decryption method and system based on time-domain information - Google Patents

A kind of monitor video classification encryption and decryption method and system based on time-domain information Download PDF

Info

Publication number
CN108882030A
CN108882030A CN201810602441.7A CN201810602441A CN108882030A CN 108882030 A CN108882030 A CN 108882030A CN 201810602441 A CN201810602441 A CN 201810602441A CN 108882030 A CN108882030 A CN 108882030A
Authority
CN
China
Prior art keywords
video
key
encryption
module
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810602441.7A
Other languages
Chinese (zh)
Inventor
吴震
张正强
唐蕾
周彦西
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHENGDU 30KAITIAN COMMUNICATION INDUSTRY Co Ltd
Original Assignee
CHENGDU 30KAITIAN COMMUNICATION INDUSTRY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHENGDU 30KAITIAN COMMUNICATION INDUSTRY Co Ltd filed Critical CHENGDU 30KAITIAN COMMUNICATION INDUSTRY Co Ltd
Priority to CN201810602441.7A priority Critical patent/CN108882030A/en
Publication of CN108882030A publication Critical patent/CN108882030A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4408Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4405Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The step of monitor video that the present invention relates to a kind of based on time-domain information is classified encipher-decipher method, this method is as follows:S1:It takes video camera root key to calculate abstract using SM3 algorithm, generates the video seed key of different important levels;S2:Corresponding video-encryption key is derived by cipher key derivation function;S3:Use video-encryption key as key, the real time video data currently obtained using SM4 algorithm for encryption;S4:After the failure of corresponding video-encryption key, step S2 is jumped back to;S5:Decrypting end sends authentication information to Key Management server;S6:After authenticating successfully, decrypting end can get corresponding decrypted video data from Key Management server.The present invention distributes multiple keys to a video monitoring source contents, it is to divide based on time-domain information, to encrypt to different time sections content, reduces Key Management server management complexity and key management quantity, using the technology, it can be achieved that checking that permission fine granularity is managed to video.

Description

A kind of monitor video classification encryption and decryption method and system based on time-domain information
Technical field
The present invention relates to technical field of information encryption, especially a kind of monitor video based on time-domain information is classified encryption and decryption Method and system.
Background technique
In the practical application of video monitoring system, there are concerning security matters or individual privacy informations for monitoring area, so needs pair Video content carries out classification control, realizes access and the operating right of different stage.However, traditional carry out nothing to whole road video The mode of difference encryption, processing data volume are big, inconvenient to use, it is difficult to guarantee the safety of extensive massive video data.Cause This, only carries out fine granularity management to video content space-time importance classification etc., and the reality for being just able to satisfy security video monitoring is answered With demand, the secure distribution and data staging management of public security monitoring data are realized.
Summary of the invention
The purpose of the present invention is to overcome the shortcomings of the existing technology, provides a kind of monitor video classification based on time-domain information Encryption and decryption method and system.
The purpose of the present invention is achieved through the following technical solutions:
A kind of the step of monitor video classification encipher-decipher method based on time-domain information, this method, is as follows:
S1:It takes video camera root key to calculate abstract using SM3 algorithm, generates the video seed key of different important levels;
S2:Corresponding video-encryption key is derived by cipher key derivation function;
S3:Use video-encryption key as key, the real time video data currently obtained using SM4 algorithm for encryption;
S4:After the failure of corresponding video-encryption key, step S2 is jumped back to;
S5:Decrypting end sends authentication information to Key Management server;
S6:After authenticating successfully, decrypting end can get corresponding decrypted video data from Key Management server, complete video Decoding plays.
Further, the input of the cipher key derivation function include different important grade video seed keys, equipment only One information and time segment information.
Further, the step S5 includes following sub-step:
S501:Time segment information that decrypting end will check, equipment unique information are sent to Key Management server;
S502:Key Management server inquires video camera root key by equipment unique information;
S503:After the completion of inquiry, Key Management server reads corresponding video-encryption key and is sent to by safe lane Video camera.
Further, a kind of monitor video classification encrypting and deciphering system based on time-domain information, including photographing module, seed are close Key generation module, key derivation module, data encryption module, data decryption module and Key Management server, the camera shooting mould Block, seed key generation module, key derivation module, data encryption module are sequentially connected, the data decryption module and key Management server connection, the data encryption module and the Key Management server are connected to the network;
Real time video data is sent to the seed key and generates mould by the photographing module for generating real time video data Block;
The seed key generation module is used to generate real time video data the video seed key of different important levels, and will Real time video data and video seed key are sent to the key derivation module;
Real time video data and video-encryption key are sent to by the key derivation module for generating video-encryption key The data encryption module;
The data encryption module for real time video data to be encrypted, and will be encrypted after ciphertext video data The Key Management server is sent to video-encryption key;
The data decryption module is for being decrypted ciphertext video data;
The Key Management server receives ciphertext video data and real time video data, is also used to and the data decryption module Carry out authentication information interaction.
Further, the photographing module is camera or video cassette recorder.
Further, the calculation that the video seed key of different important levels uses is generated in the seed key generation module Method is SM3 algorithm.
Further, the key derivation module uses cipher key derivation function, and the input of the cipher key derivation function is not With important level video seed key, equipment unique information and time segment information.
Further, the data encryption module is encryption chip.
Further, the Encryption Algorithm that the encryption chip uses is SM4 algorithm.
Further, the data decryption module is deciphering chip.
The present invention has the following advantages that:
The present invention distributes multiple keys to a video monitoring source contents, is to divide based on time-domain information, so as to different time Section content is encrypted, and Key Management server management complexity and key management quantity are reduced, using the technology, it can be achieved that Permission fine granularity, which is managed, is checked to video.
Detailed description of the invention
Fig. 1 is method and step schematic diagram of the invention.
Fig. 2 is system structure diagram of the invention.
Specific embodiment
The present invention will be further described with reference to the accompanying drawing, but protection scope of the present invention is not limited to following institute It states.
As depicted in figs. 1 and 2, a kind of the step of monitor video classification encipher-decipher method based on time-domain information, this method It is as follows:
S1:It takes video camera root key to calculate abstract using SM3 algorithm, generates the video seed key of different important levels;
S2:Corresponding video-encryption key is derived by cipher key derivation function;
S3:Use video-encryption key as key, the real time video data currently obtained using SM4 algorithm for encryption;
S4:After the failure of corresponding video-encryption key, step S2 is jumped back to;
S5:Decrypting end sends authentication information to Key Management server;
S6:After authenticating successfully, decrypting end can get corresponding decrypted video data from Key Management server, complete video Decoding plays.
Further, the input of the cipher key derivation function include different important grade video seed keys, equipment only One information and time segment information.
Further, the step S5 includes following sub-step:
S501:Time segment information that decrypting end will check, equipment unique information are sent to Key Management server;
S502:Key Management server inquires video camera root key by equipment unique information;
S503:After the completion of inquiry, Key Management server reads corresponding video-encryption key and is sent to by safe lane Video camera.
Further, a kind of monitor video classification encrypting and deciphering system based on time-domain information, including photographing module, seed are close Key generation module, key derivation module, data encryption module, data decryption module and Key Management server, the camera shooting mould Block, seed key generation module, key derivation module, data encryption module are sequentially connected, the data decryption module and key Management server connection, the data encryption module and the Key Management server are connected to the network;
Real time video data is sent to the seed key and generates mould by the photographing module for generating real time video data Block;
The seed key generation module is used to generate real time video data the video seed key of different important levels, and will Real time video data and video seed key are sent to the key derivation module;
Real time video data and video-encryption key are sent to by the key derivation module for generating video-encryption key The data encryption module;
The data encryption module for real time video data to be encrypted, and will be encrypted after ciphertext video data The Key Management server is sent to video-encryption key;
The data decryption module is for being decrypted ciphertext video data;
The Key Management server receives ciphertext video data and real time video data, is also used to and the data decryption module Carry out authentication information interaction.
Further, the photographing module is camera or video cassette recorder.
Further, the calculation that the video seed key of different important levels uses is generated in the seed key generation module Method is SM3 algorithm.
Further, the key derivation module uses cipher key derivation function, and the input of the cipher key derivation function is not With important level video seed key, equipment unique information and time segment information.
Further, the data encryption module is encryption chip.
Further, the Encryption Algorithm that the encryption chip uses is SM4 algorithm.
Further, the data decryption module is deciphering chip.
It should be noted that for simple description, therefore, it is stated as a systems for each embodiment of the method above-mentioned The combination of actions of column, but those skilled in the art should understand that, the application is not limited by the described action sequence, because For according to the application, certain some step be can be performed in other orders or simultaneously.Secondly, those skilled in the art also should Know, the embodiments described in the specification are all preferred embodiments, related movement and unit not necessarily this Shen It please be necessary.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in some embodiment Part, reference can be made to the related descriptions of other embodiments.
The above disclosure is only the preferred embodiments of the present invention, cannot limit the right model of the present invention with this certainly It encloses, therefore equivalent changes made in accordance with the claims of the present invention, is still within the scope of the present invention.

Claims (10)

1. a kind of monitor video based on time-domain information is classified encipher-decipher method, it is characterised in that:The step of this method, is as follows:
S1:It takes video camera root key to calculate abstract using SM3 algorithm, generates the video seed key of different important levels;
S2:Corresponding video-encryption key is derived by cipher key derivation function;
S3:Use video-encryption key as key, the real time video data currently obtained using SM4 algorithm for encryption;
S4:After the failure of corresponding video-encryption key, step S2 is jumped back to;
S5:Decrypting end sends authentication information to Key Management server;
S6:After authenticating successfully, decrypting end can get corresponding decrypted video data from Key Management server, complete video Decoding plays.
2. a kind of monitor video based on time-domain information according to claim 1 is classified encipher-decipher method, it is characterised in that: The input of the cipher key derivation function includes different important grade video seed keys, equipment unique information and period letter Breath.
3. a kind of monitor video based on time-domain information according to claim 1 is classified encipher-decipher method, it is characterised in that: The step S5 includes following sub-step:
S501:Time segment information that decrypting end will check, equipment unique information are sent to Key Management server;
S502:Key Management server inquires video camera root key by equipment unique information;
S503:After the completion of inquiry, Key Management server reads corresponding video-encryption key and is sent to by safe lane Video camera.
4. it is classified encrypting and deciphering system to a kind of monitor video based on time-domain information described in 3 any one according to claim 1, It is characterized in that:Including photographing module, seed key generation module, key derivation module, data encryption module, data deciphering mould Block and Key Management server, the photographing module, seed key generation module, key derivation module, data encryption module according to Secondary connection, the data decryption module are connected with Key Management server, and the data encryption module and the key management take Business device network connection;
Real time video data is sent to the seed key and generates mould by the photographing module for generating real time video data Block;
The seed key generation module is used to generate real time video data the video seed key of different important levels, and will Real time video data and video seed key are sent to the key derivation module;
Real time video data and video-encryption key are sent to by the key derivation module for generating video-encryption key The data encryption module;
The data encryption module for real time video data to be encrypted, and will be encrypted after ciphertext video data The Key Management server is sent to video-encryption key;
The data decryption module is for being decrypted ciphertext video data;
The Key Management server receives ciphertext video data and real time video data, is also used to and the data decryption module Carry out authentication information interaction.
5. a kind of monitor video based on time-domain information according to claim 4 is classified encrypting and deciphering system, it is characterised in that: The photographing module is camera or video cassette recorder.
6. a kind of monitor video based on time-domain information according to claim 4 is classified encrypting and deciphering system, it is characterised in that: Algorithm that the video seed keys of different important levels uses is generated in the seed key generation module as SM3 algorithm.
7. a kind of monitor video based on time-domain information according to claim 4 is classified encrypting and deciphering system, it is characterised in that: The key derivation module uses cipher key derivation function, and the input of the cipher key derivation function is different important level video seeds Key, equipment unique information and time segment information.
8. a kind of monitor video based on time-domain information according to claim 4 is classified encrypting and deciphering system, it is characterised in that: The data encryption module is encryption chip.
9. a kind of monitor video based on time-domain information according to claim 8 is classified encrypting and deciphering system, it is characterised in that: The Encryption Algorithm that the encryption chip uses is SM4 algorithm.
10. a kind of monitor video based on time-domain information according to claim 4 is classified encrypting and deciphering system, feature exists In:The data decryption module is deciphering chip.
CN201810602441.7A 2018-06-12 2018-06-12 A kind of monitor video classification encryption and decryption method and system based on time-domain information Pending CN108882030A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810602441.7A CN108882030A (en) 2018-06-12 2018-06-12 A kind of monitor video classification encryption and decryption method and system based on time-domain information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810602441.7A CN108882030A (en) 2018-06-12 2018-06-12 A kind of monitor video classification encryption and decryption method and system based on time-domain information

Publications (1)

Publication Number Publication Date
CN108882030A true CN108882030A (en) 2018-11-23

Family

ID=64337967

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810602441.7A Pending CN108882030A (en) 2018-06-12 2018-06-12 A kind of monitor video classification encryption and decryption method and system based on time-domain information

Country Status (1)

Country Link
CN (1) CN108882030A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109614792A (en) * 2018-11-29 2019-04-12 中国电子科技集团公司第三十研究所 A kind of hierarchial file structure key management method
CN110737910A (en) * 2019-10-16 2020-01-31 福州汇思博信息技术有限公司 Android log decryption management method, device, equipment and medium
CN111770343A (en) * 2020-07-17 2020-10-13 成都三零凯天通信实业有限公司 Method for supporting hierarchical security protection of ultra-high-definition video data
CN112422287A (en) * 2021-01-22 2021-02-26 杭州城市大数据运营有限公司 Multi-level role authority control method and device based on cryptography
CN113259719A (en) * 2021-05-13 2021-08-13 长春理工大学 SM 4-based video encryption method and system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1917451A (en) * 2006-09-05 2007-02-21 杭州华为三康技术有限公司 Method for managing authorization of multicast flow, and management server
CN101271501A (en) * 2008-04-30 2008-09-24 北京握奇数据系统有限公司 Encryption and decryption method and device of digital media file
US20140215591A1 (en) * 2008-11-05 2014-07-31 Comcast Cable Communications, Llc System and method for providing digital content
CN104219224A (en) * 2014-07-30 2014-12-17 南京邮电大学 Priority-based IPV6 heterogeneous sensor network data security communication method
CN104270614A (en) * 2014-10-16 2015-01-07 浙江宇视科技有限公司 A video encryption and decryption method and device
CN104410828A (en) * 2014-11-26 2015-03-11 北京视博数字电视科技有限公司 Home monitoring method and apparatus
CN104836656A (en) * 2015-05-08 2015-08-12 厦门大学 Method for storing and transmitting video file
CN105959648A (en) * 2016-06-23 2016-09-21 浙江宇视科技有限公司 Encryption method and device, and video monitoring system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1917451A (en) * 2006-09-05 2007-02-21 杭州华为三康技术有限公司 Method for managing authorization of multicast flow, and management server
CN101271501A (en) * 2008-04-30 2008-09-24 北京握奇数据系统有限公司 Encryption and decryption method and device of digital media file
US20140215591A1 (en) * 2008-11-05 2014-07-31 Comcast Cable Communications, Llc System and method for providing digital content
CN104219224A (en) * 2014-07-30 2014-12-17 南京邮电大学 Priority-based IPV6 heterogeneous sensor network data security communication method
CN104270614A (en) * 2014-10-16 2015-01-07 浙江宇视科技有限公司 A video encryption and decryption method and device
CN104410828A (en) * 2014-11-26 2015-03-11 北京视博数字电视科技有限公司 Home monitoring method and apparatus
CN104836656A (en) * 2015-05-08 2015-08-12 厦门大学 Method for storing and transmitting video file
CN105959648A (en) * 2016-06-23 2016-09-21 浙江宇视科技有限公司 Encryption method and device, and video monitoring system

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109614792A (en) * 2018-11-29 2019-04-12 中国电子科技集团公司第三十研究所 A kind of hierarchial file structure key management method
CN109614792B (en) * 2018-11-29 2022-02-08 中国电子科技集团公司第三十研究所 Hierarchical file key management method
CN110737910A (en) * 2019-10-16 2020-01-31 福州汇思博信息技术有限公司 Android log decryption management method, device, equipment and medium
CN110737910B (en) * 2019-10-16 2021-09-10 福州汇思博信息技术有限公司 Android log decryption management method, device, equipment and medium
CN111770343A (en) * 2020-07-17 2020-10-13 成都三零凯天通信实业有限公司 Method for supporting hierarchical security protection of ultra-high-definition video data
CN112422287A (en) * 2021-01-22 2021-02-26 杭州城市大数据运营有限公司 Multi-level role authority control method and device based on cryptography
CN112422287B (en) * 2021-01-22 2021-04-13 杭州城市大数据运营有限公司 Multi-level role authority control method and device based on cryptography
CN113259719A (en) * 2021-05-13 2021-08-13 长春理工大学 SM 4-based video encryption method and system

Similar Documents

Publication Publication Date Title
Thwin et al. Blockchain‐based access control model to preserve privacy for personal health record systems
US12170723B2 (en) Methods for splitting and recovering key, program product, storage medium, and system
CN109033855B (en) Data transmission method and device based on block chain and storage medium
Fabian et al. Collaborative and secure sharing of healthcare data in multi-clouds
US9852300B2 (en) Secure audit logging
US20230370248A1 (en) Data sharing system, data sharing method and data sharing program
US9020149B1 (en) Protected storage for cryptographic materials
US20190327086A1 (en) Reciprocal data mirror system and method of data security
CN108882030A (en) A kind of monitor video classification encryption and decryption method and system based on time-domain information
CN104158827B (en) Ciphertext data sharing method, device, inquiry server and upload data client
CN108667605B (en) Data encryption and decryption method and device
CN105122265A (en) Data security service system
CN110708291B (en) Data authorization access method, device, medium and electronic equipment in distributed network
CN110674521B (en) Privacy protection evidence management system and method
CN107871081A (en) A kind of computer information safe system
CN112740615A (en) Multi-party computed key management
KR101615137B1 (en) Data access method based on attributed
CN109165526A (en) A kind of big data security and privacy guard method, device and storage medium
US8401183B2 (en) Method and system for keying and securely storing data
KR101220166B1 (en) How to manage data access permissions
CN114979210A (en) A blockchain-based medical data sharing method
Soomro et al. Review and open issues of cryptographic algorithms in cyber security
Thummavet et al. A novel personal health record system for handling emergency situations
EP4154142A1 (en) Systems and methods for whitebox device binding
CN109450925B (en) User authority verification method and device for operation and maintenance of power secondary system and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181123