CN108882030A - A kind of monitor video classification encryption and decryption method and system based on time-domain information - Google Patents
A kind of monitor video classification encryption and decryption method and system based on time-domain information Download PDFInfo
- Publication number
- CN108882030A CN108882030A CN201810602441.7A CN201810602441A CN108882030A CN 108882030 A CN108882030 A CN 108882030A CN 201810602441 A CN201810602441 A CN 201810602441A CN 108882030 A CN108882030 A CN 108882030A
- Authority
- CN
- China
- Prior art keywords
- video
- key
- encryption
- module
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
- H04N21/4408—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
- H04N21/4405—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The step of monitor video that the present invention relates to a kind of based on time-domain information is classified encipher-decipher method, this method is as follows:S1:It takes video camera root key to calculate abstract using SM3 algorithm, generates the video seed key of different important levels;S2:Corresponding video-encryption key is derived by cipher key derivation function;S3:Use video-encryption key as key, the real time video data currently obtained using SM4 algorithm for encryption;S4:After the failure of corresponding video-encryption key, step S2 is jumped back to;S5:Decrypting end sends authentication information to Key Management server;S6:After authenticating successfully, decrypting end can get corresponding decrypted video data from Key Management server.The present invention distributes multiple keys to a video monitoring source contents, it is to divide based on time-domain information, to encrypt to different time sections content, reduces Key Management server management complexity and key management quantity, using the technology, it can be achieved that checking that permission fine granularity is managed to video.
Description
Technical field
The present invention relates to technical field of information encryption, especially a kind of monitor video based on time-domain information is classified encryption and decryption
Method and system.
Background technique
In the practical application of video monitoring system, there are concerning security matters or individual privacy informations for monitoring area, so needs pair
Video content carries out classification control, realizes access and the operating right of different stage.However, traditional carry out nothing to whole road video
The mode of difference encryption, processing data volume are big, inconvenient to use, it is difficult to guarantee the safety of extensive massive video data.Cause
This, only carries out fine granularity management to video content space-time importance classification etc., and the reality for being just able to satisfy security video monitoring is answered
With demand, the secure distribution and data staging management of public security monitoring data are realized.
Summary of the invention
The purpose of the present invention is to overcome the shortcomings of the existing technology, provides a kind of monitor video classification based on time-domain information
Encryption and decryption method and system.
The purpose of the present invention is achieved through the following technical solutions:
A kind of the step of monitor video classification encipher-decipher method based on time-domain information, this method, is as follows:
S1:It takes video camera root key to calculate abstract using SM3 algorithm, generates the video seed key of different important levels;
S2:Corresponding video-encryption key is derived by cipher key derivation function;
S3:Use video-encryption key as key, the real time video data currently obtained using SM4 algorithm for encryption;
S4:After the failure of corresponding video-encryption key, step S2 is jumped back to;
S5:Decrypting end sends authentication information to Key Management server;
S6:After authenticating successfully, decrypting end can get corresponding decrypted video data from Key Management server, complete video
Decoding plays.
Further, the input of the cipher key derivation function include different important grade video seed keys, equipment only
One information and time segment information.
Further, the step S5 includes following sub-step:
S501:Time segment information that decrypting end will check, equipment unique information are sent to Key Management server;
S502:Key Management server inquires video camera root key by equipment unique information;
S503:After the completion of inquiry, Key Management server reads corresponding video-encryption key and is sent to by safe lane
Video camera.
Further, a kind of monitor video classification encrypting and deciphering system based on time-domain information, including photographing module, seed are close
Key generation module, key derivation module, data encryption module, data decryption module and Key Management server, the camera shooting mould
Block, seed key generation module, key derivation module, data encryption module are sequentially connected, the data decryption module and key
Management server connection, the data encryption module and the Key Management server are connected to the network;
Real time video data is sent to the seed key and generates mould by the photographing module for generating real time video data
Block;
The seed key generation module is used to generate real time video data the video seed key of different important levels, and will
Real time video data and video seed key are sent to the key derivation module;
Real time video data and video-encryption key are sent to by the key derivation module for generating video-encryption key
The data encryption module;
The data encryption module for real time video data to be encrypted, and will be encrypted after ciphertext video data
The Key Management server is sent to video-encryption key;
The data decryption module is for being decrypted ciphertext video data;
The Key Management server receives ciphertext video data and real time video data, is also used to and the data decryption module
Carry out authentication information interaction.
Further, the photographing module is camera or video cassette recorder.
Further, the calculation that the video seed key of different important levels uses is generated in the seed key generation module
Method is SM3 algorithm.
Further, the key derivation module uses cipher key derivation function, and the input of the cipher key derivation function is not
With important level video seed key, equipment unique information and time segment information.
Further, the data encryption module is encryption chip.
Further, the Encryption Algorithm that the encryption chip uses is SM4 algorithm.
Further, the data decryption module is deciphering chip.
The present invention has the following advantages that:
The present invention distributes multiple keys to a video monitoring source contents, is to divide based on time-domain information, so as to different time
Section content is encrypted, and Key Management server management complexity and key management quantity are reduced, using the technology, it can be achieved that
Permission fine granularity, which is managed, is checked to video.
Detailed description of the invention
Fig. 1 is method and step schematic diagram of the invention.
Fig. 2 is system structure diagram of the invention.
Specific embodiment
The present invention will be further described with reference to the accompanying drawing, but protection scope of the present invention is not limited to following institute
It states.
As depicted in figs. 1 and 2, a kind of the step of monitor video classification encipher-decipher method based on time-domain information, this method
It is as follows:
S1:It takes video camera root key to calculate abstract using SM3 algorithm, generates the video seed key of different important levels;
S2:Corresponding video-encryption key is derived by cipher key derivation function;
S3:Use video-encryption key as key, the real time video data currently obtained using SM4 algorithm for encryption;
S4:After the failure of corresponding video-encryption key, step S2 is jumped back to;
S5:Decrypting end sends authentication information to Key Management server;
S6:After authenticating successfully, decrypting end can get corresponding decrypted video data from Key Management server, complete video
Decoding plays.
Further, the input of the cipher key derivation function include different important grade video seed keys, equipment only
One information and time segment information.
Further, the step S5 includes following sub-step:
S501:Time segment information that decrypting end will check, equipment unique information are sent to Key Management server;
S502:Key Management server inquires video camera root key by equipment unique information;
S503:After the completion of inquiry, Key Management server reads corresponding video-encryption key and is sent to by safe lane
Video camera.
Further, a kind of monitor video classification encrypting and deciphering system based on time-domain information, including photographing module, seed are close
Key generation module, key derivation module, data encryption module, data decryption module and Key Management server, the camera shooting mould
Block, seed key generation module, key derivation module, data encryption module are sequentially connected, the data decryption module and key
Management server connection, the data encryption module and the Key Management server are connected to the network;
Real time video data is sent to the seed key and generates mould by the photographing module for generating real time video data
Block;
The seed key generation module is used to generate real time video data the video seed key of different important levels, and will
Real time video data and video seed key are sent to the key derivation module;
Real time video data and video-encryption key are sent to by the key derivation module for generating video-encryption key
The data encryption module;
The data encryption module for real time video data to be encrypted, and will be encrypted after ciphertext video data
The Key Management server is sent to video-encryption key;
The data decryption module is for being decrypted ciphertext video data;
The Key Management server receives ciphertext video data and real time video data, is also used to and the data decryption module
Carry out authentication information interaction.
Further, the photographing module is camera or video cassette recorder.
Further, the calculation that the video seed key of different important levels uses is generated in the seed key generation module
Method is SM3 algorithm.
Further, the key derivation module uses cipher key derivation function, and the input of the cipher key derivation function is not
With important level video seed key, equipment unique information and time segment information.
Further, the data encryption module is encryption chip.
Further, the Encryption Algorithm that the encryption chip uses is SM4 algorithm.
Further, the data decryption module is deciphering chip.
It should be noted that for simple description, therefore, it is stated as a systems for each embodiment of the method above-mentioned
The combination of actions of column, but those skilled in the art should understand that, the application is not limited by the described action sequence, because
For according to the application, certain some step be can be performed in other orders or simultaneously.Secondly, those skilled in the art also should
Know, the embodiments described in the specification are all preferred embodiments, related movement and unit not necessarily this Shen
It please be necessary.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in some embodiment
Part, reference can be made to the related descriptions of other embodiments.
The above disclosure is only the preferred embodiments of the present invention, cannot limit the right model of the present invention with this certainly
It encloses, therefore equivalent changes made in accordance with the claims of the present invention, is still within the scope of the present invention.
Claims (10)
1. a kind of monitor video based on time-domain information is classified encipher-decipher method, it is characterised in that:The step of this method, is as follows:
S1:It takes video camera root key to calculate abstract using SM3 algorithm, generates the video seed key of different important levels;
S2:Corresponding video-encryption key is derived by cipher key derivation function;
S3:Use video-encryption key as key, the real time video data currently obtained using SM4 algorithm for encryption;
S4:After the failure of corresponding video-encryption key, step S2 is jumped back to;
S5:Decrypting end sends authentication information to Key Management server;
S6:After authenticating successfully, decrypting end can get corresponding decrypted video data from Key Management server, complete video
Decoding plays.
2. a kind of monitor video based on time-domain information according to claim 1 is classified encipher-decipher method, it is characterised in that:
The input of the cipher key derivation function includes different important grade video seed keys, equipment unique information and period letter
Breath.
3. a kind of monitor video based on time-domain information according to claim 1 is classified encipher-decipher method, it is characterised in that:
The step S5 includes following sub-step:
S501:Time segment information that decrypting end will check, equipment unique information are sent to Key Management server;
S502:Key Management server inquires video camera root key by equipment unique information;
S503:After the completion of inquiry, Key Management server reads corresponding video-encryption key and is sent to by safe lane
Video camera.
4. it is classified encrypting and deciphering system to a kind of monitor video based on time-domain information described in 3 any one according to claim 1,
It is characterized in that:Including photographing module, seed key generation module, key derivation module, data encryption module, data deciphering mould
Block and Key Management server, the photographing module, seed key generation module, key derivation module, data encryption module according to
Secondary connection, the data decryption module are connected with Key Management server, and the data encryption module and the key management take
Business device network connection;
Real time video data is sent to the seed key and generates mould by the photographing module for generating real time video data
Block;
The seed key generation module is used to generate real time video data the video seed key of different important levels, and will
Real time video data and video seed key are sent to the key derivation module;
Real time video data and video-encryption key are sent to by the key derivation module for generating video-encryption key
The data encryption module;
The data encryption module for real time video data to be encrypted, and will be encrypted after ciphertext video data
The Key Management server is sent to video-encryption key;
The data decryption module is for being decrypted ciphertext video data;
The Key Management server receives ciphertext video data and real time video data, is also used to and the data decryption module
Carry out authentication information interaction.
5. a kind of monitor video based on time-domain information according to claim 4 is classified encrypting and deciphering system, it is characterised in that:
The photographing module is camera or video cassette recorder.
6. a kind of monitor video based on time-domain information according to claim 4 is classified encrypting and deciphering system, it is characterised in that:
Algorithm that the video seed keys of different important levels uses is generated in the seed key generation module as SM3 algorithm.
7. a kind of monitor video based on time-domain information according to claim 4 is classified encrypting and deciphering system, it is characterised in that:
The key derivation module uses cipher key derivation function, and the input of the cipher key derivation function is different important level video seeds
Key, equipment unique information and time segment information.
8. a kind of monitor video based on time-domain information according to claim 4 is classified encrypting and deciphering system, it is characterised in that:
The data encryption module is encryption chip.
9. a kind of monitor video based on time-domain information according to claim 8 is classified encrypting and deciphering system, it is characterised in that:
The Encryption Algorithm that the encryption chip uses is SM4 algorithm.
10. a kind of monitor video based on time-domain information according to claim 4 is classified encrypting and deciphering system, feature exists
In:The data decryption module is deciphering chip.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810602441.7A CN108882030A (en) | 2018-06-12 | 2018-06-12 | A kind of monitor video classification encryption and decryption method and system based on time-domain information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810602441.7A CN108882030A (en) | 2018-06-12 | 2018-06-12 | A kind of monitor video classification encryption and decryption method and system based on time-domain information |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108882030A true CN108882030A (en) | 2018-11-23 |
Family
ID=64337967
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810602441.7A Pending CN108882030A (en) | 2018-06-12 | 2018-06-12 | A kind of monitor video classification encryption and decryption method and system based on time-domain information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108882030A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109614792A (en) * | 2018-11-29 | 2019-04-12 | 中国电子科技集团公司第三十研究所 | A kind of hierarchial file structure key management method |
CN110737910A (en) * | 2019-10-16 | 2020-01-31 | 福州汇思博信息技术有限公司 | Android log decryption management method, device, equipment and medium |
CN111770343A (en) * | 2020-07-17 | 2020-10-13 | 成都三零凯天通信实业有限公司 | Method for supporting hierarchical security protection of ultra-high-definition video data |
CN112422287A (en) * | 2021-01-22 | 2021-02-26 | 杭州城市大数据运营有限公司 | Multi-level role authority control method and device based on cryptography |
CN113259719A (en) * | 2021-05-13 | 2021-08-13 | 长春理工大学 | SM 4-based video encryption method and system |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1917451A (en) * | 2006-09-05 | 2007-02-21 | 杭州华为三康技术有限公司 | Method for managing authorization of multicast flow, and management server |
CN101271501A (en) * | 2008-04-30 | 2008-09-24 | 北京握奇数据系统有限公司 | Encryption and decryption method and device of digital media file |
US20140215591A1 (en) * | 2008-11-05 | 2014-07-31 | Comcast Cable Communications, Llc | System and method for providing digital content |
CN104219224A (en) * | 2014-07-30 | 2014-12-17 | 南京邮电大学 | Priority-based IPV6 heterogeneous sensor network data security communication method |
CN104270614A (en) * | 2014-10-16 | 2015-01-07 | 浙江宇视科技有限公司 | A video encryption and decryption method and device |
CN104410828A (en) * | 2014-11-26 | 2015-03-11 | 北京视博数字电视科技有限公司 | Home monitoring method and apparatus |
CN104836656A (en) * | 2015-05-08 | 2015-08-12 | 厦门大学 | Method for storing and transmitting video file |
CN105959648A (en) * | 2016-06-23 | 2016-09-21 | 浙江宇视科技有限公司 | Encryption method and device, and video monitoring system |
-
2018
- 2018-06-12 CN CN201810602441.7A patent/CN108882030A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1917451A (en) * | 2006-09-05 | 2007-02-21 | 杭州华为三康技术有限公司 | Method for managing authorization of multicast flow, and management server |
CN101271501A (en) * | 2008-04-30 | 2008-09-24 | 北京握奇数据系统有限公司 | Encryption and decryption method and device of digital media file |
US20140215591A1 (en) * | 2008-11-05 | 2014-07-31 | Comcast Cable Communications, Llc | System and method for providing digital content |
CN104219224A (en) * | 2014-07-30 | 2014-12-17 | 南京邮电大学 | Priority-based IPV6 heterogeneous sensor network data security communication method |
CN104270614A (en) * | 2014-10-16 | 2015-01-07 | 浙江宇视科技有限公司 | A video encryption and decryption method and device |
CN104410828A (en) * | 2014-11-26 | 2015-03-11 | 北京视博数字电视科技有限公司 | Home monitoring method and apparatus |
CN104836656A (en) * | 2015-05-08 | 2015-08-12 | 厦门大学 | Method for storing and transmitting video file |
CN105959648A (en) * | 2016-06-23 | 2016-09-21 | 浙江宇视科技有限公司 | Encryption method and device, and video monitoring system |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109614792A (en) * | 2018-11-29 | 2019-04-12 | 中国电子科技集团公司第三十研究所 | A kind of hierarchial file structure key management method |
CN109614792B (en) * | 2018-11-29 | 2022-02-08 | 中国电子科技集团公司第三十研究所 | Hierarchical file key management method |
CN110737910A (en) * | 2019-10-16 | 2020-01-31 | 福州汇思博信息技术有限公司 | Android log decryption management method, device, equipment and medium |
CN110737910B (en) * | 2019-10-16 | 2021-09-10 | 福州汇思博信息技术有限公司 | Android log decryption management method, device, equipment and medium |
CN111770343A (en) * | 2020-07-17 | 2020-10-13 | 成都三零凯天通信实业有限公司 | Method for supporting hierarchical security protection of ultra-high-definition video data |
CN112422287A (en) * | 2021-01-22 | 2021-02-26 | 杭州城市大数据运营有限公司 | Multi-level role authority control method and device based on cryptography |
CN112422287B (en) * | 2021-01-22 | 2021-04-13 | 杭州城市大数据运营有限公司 | Multi-level role authority control method and device based on cryptography |
CN113259719A (en) * | 2021-05-13 | 2021-08-13 | 长春理工大学 | SM 4-based video encryption method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Thwin et al. | Blockchain‐based access control model to preserve privacy for personal health record systems | |
US12170723B2 (en) | Methods for splitting and recovering key, program product, storage medium, and system | |
CN109033855B (en) | Data transmission method and device based on block chain and storage medium | |
Fabian et al. | Collaborative and secure sharing of healthcare data in multi-clouds | |
US9852300B2 (en) | Secure audit logging | |
US20230370248A1 (en) | Data sharing system, data sharing method and data sharing program | |
US9020149B1 (en) | Protected storage for cryptographic materials | |
US20190327086A1 (en) | Reciprocal data mirror system and method of data security | |
CN108882030A (en) | A kind of monitor video classification encryption and decryption method and system based on time-domain information | |
CN104158827B (en) | Ciphertext data sharing method, device, inquiry server and upload data client | |
CN108667605B (en) | Data encryption and decryption method and device | |
CN105122265A (en) | Data security service system | |
CN110708291B (en) | Data authorization access method, device, medium and electronic equipment in distributed network | |
CN110674521B (en) | Privacy protection evidence management system and method | |
CN107871081A (en) | A kind of computer information safe system | |
CN112740615A (en) | Multi-party computed key management | |
KR101615137B1 (en) | Data access method based on attributed | |
CN109165526A (en) | A kind of big data security and privacy guard method, device and storage medium | |
US8401183B2 (en) | Method and system for keying and securely storing data | |
KR101220166B1 (en) | How to manage data access permissions | |
CN114979210A (en) | A blockchain-based medical data sharing method | |
Soomro et al. | Review and open issues of cryptographic algorithms in cyber security | |
Thummavet et al. | A novel personal health record system for handling emergency situations | |
EP4154142A1 (en) | Systems and methods for whitebox device binding | |
CN109450925B (en) | User authority verification method and device for operation and maintenance of power secondary system and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181123 |