Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption and decryption method for realizing safe video transmission of power monitoring system

A technology of power monitoring and encryption method, which is applied to encryption devices with shift registers/memory, transmission systems, digital transmission systems, etc. security threats, etc.

Active Publication Date: 2019-11-08
湖南匡安网络技术有限公司
View PDF13 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the existing video surveillance system itself has certain security flaws: on the one hand, video acquisition devices such as high-definition cameras are difficult to manage, and these devices are easily accessed or replaced illegally, and there are problems such as weak passwords; In the process of remote monitoring of lower-level power plants or substations by the center, the video data transmitted is usually transmitted in plain text, which is easy to be stolen, tampered with or even replaced, so that the upper-level cannot obtain safe and reliable monitoring video data, thus threatening the security of the power grid In the third aspect, hackers will also use the security risks of the video surveillance system to inject malicious code, and use the backend of the surveillance system as a springboard to attack other systems in the intranet, thereby bringing greater security threats

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method for realizing safe video transmission of power monitoring system
  • Encryption and decryption method for realizing safe video transmission of power monitoring system
  • Encryption and decryption method for realizing safe video transmission of power monitoring system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0104] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0105] figure 1 is a schematic diagram of a power monitoring system applied in the present invention, the power monitoring system includes a first local area network and a second local area network connected to each other through a network, wherein the first local area network includes a plurality of first terminal devices and a first server connected to them in communication , the second local...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption method for realizing safe video transmission of a power monitoring system. The encryption method comprises the following steps: after establishing a secure connection between a first server and a second server, a video calling request is sent to the second server through a secure channel, and the second server uses a public key corresponding to the security device number in the video call request; the video calling request is processed based on an IBC method; consequently, ciphertext can be obtained, and the ciphertext is sent to the safety device corresponding to the safety device number; and the security device decrypts the ciphertext by using an encryption private key corresponding to the security device number to obtain a video call request, encrypts a random number in the video call request by using a signature private key corresponding to the security device number to obtain an encrypted random number, and sends the encrypted random number back to the second server. According to the invention, a security protection mechanism can be designed for the characteristics and security threats of the video monitoring system, so that the security and reliability of the video monitoring system are ensured.

Description

technical field [0001] The invention belongs to the technical field of video monitoring, and more specifically relates to an encryption and decryption method for realizing secure video transmission in a power monitoring system. Background technique [0002] With the continuous improvement of power system security requirements, the demand for video surveillance systems is also increasing accordingly. These video surveillance systems monitor and record the real-time operation of power plants, substations and other key places to maintain power. stable operation of the system. [0003] The application of video monitoring system includes the following levels. The first level is on-site video monitoring, which is mainly composed of front-end cameras, video recorders, video displays, etc., used to realize on-site monitoring and monitoring video storage, etc.; the second level is remote Video surveillance is composed of monitoring front-end, console and transmission network, and is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60H04L9/00H04L9/06H04L9/08H04L29/06
CPCG06F21/602H04L9/001H04L9/0631H04L9/0869H04L63/0428
Inventor 李肯立刘俊覃舒婕杨志邦徐晓阳王远亮
Owner 湖南匡安网络技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products