Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Video security access system based on agency and isolation and method of video security access system

A security access and video technology, applied in image communication, selective content distribution, electrical components, etc., can solve the problems of weak security protection, intrusion, lack of security guarantee, etc., and achieve the effect of improving security level and security

Inactive Publication Date: 2015-02-25
STATE GRID CORP OF CHINA +2
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the disadvantage is obvious: weak security protection
A general-purpose firewall cannot effectively identify the legitimacy of the access source, whether the access protocol is a specified video source protocol, and cannot filter or reorganize the content of the video source protocol. Therefore, the accessed video source may be invaded by other application protocols. risk, there is also the risk of harmful programs or instructions intruding through the video source protocol
Moreover, there is also a lack of security guarantees on the network channel for transmitting video source packets, and there are certain security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Video security access system based on agency and isolation and method of video security access system
  • Video security access system based on agency and isolation and method of video security access system
  • Video security access system based on agency and isolation and method of video security access system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0074] The present invention proposes a proxy and isolation-based video security access system, which realizes automatic protocol conversion through proxy technology, and the proxy and isolation filter modules jointly build a security channel through a dedicated protocol, thereby realizing efficient data access and protocol protection capabilities. After the front-end server performs feature filtering, scrambling and protocol reorganization on the video, it uploads to the isolation and filtering module through a secure channel based on a dedicated protocol; after the isolation and filtering module completes protocol decapsulation and security policy filtering, it is finally transmitted to the video-on-demand platform . The access system ensures the security of video data during the video access process. The whole system ensures the security, stability, reliability and controllability of video source access.

[0075] A proxy and isolation-based video security access method flo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a video security access system based on agency and isolation and a method of the video security access system. The video security access system comprises a front agency module, a special communication protocol and an isolation filtering module, wherein a video source safely has access to an internal network unified monitoring platform through the front agency module, the special communication protocol and the isolation filtering module. The method includes the steps that firstly, the front agency module authenticates the video source which has access to the internal network unified monitoring platform; secondly, video data have access to the front agency module, and the video protocol is analyzed; thirdly, characteristic filtering, scrambling and strategy labor adding are conducted on the video data; fourthly, the video data are recombined through the special communication protocol and sent to the isolation filtering module; fifthly, the isolation filtering module receives the video data, packaged through the special protocol, sent by the front agency module; sixthly, the isolation filtering module analyzes labels and conducts filtering; seventhly, video metadata are recovered; eighthly, the video format packaging is conducted on the video metadata, and the video metadata are sent to the internal network unified monitoring platform.

Description

technical field [0001] The invention belongs to the technical field of computer and network security, and in particular relates to a proxy and isolation-based video security access system and a method thereof. Background technique [0002] With the increasing improvement of social informatization construction, many large enterprises and government departments have realized informatization and digitization of office operations. There are large-scale private networks with multi-level networking within the government and large enterprises. Due to the consideration of security during the construction process, each network maintains a situation of horizontal division and internal and external separation. The rapid development of informatization has brought about the need to transform from the decentralized construction of information networks to the integration and utilization of resources, and from the independent operation of information systems to the sharing of interconnected...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04N21/254H04N21/24H04N21/234H04N21/643H04N21/222
CPCH04N21/643H04N21/222H04N21/23418H04N21/2353H04N21/2541H04N21/25816H04N21/64723
Inventor 汪晨周诚林为民张涛马媛媛邵志鹏时坚钱炫宇刘时敏楚杰
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products