Content security for video stream

A technology for video streaming and video capture, applied in secure communication devices, selective content distribution, and key distribution, can solve privacy issues, encryption, decryption of video data by unauthorized users, etc., to increase scalability and reduce computational complexity degree of effect

Active Publication Date: 2020-04-07
AXIS
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The problem with this solution may be that in some cases the video data is not encrypted differently (i.e. with the new encryption key) since the detected events still have to be decrypted and viewed, when the fetch may include Privacy concerns can still arise when decrypting video data of intrusive content unrelated to the cause
Furthermore, in the case of stolen encryption keys, this could lead to unauthorized users decrypting large amounts of video data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Content security for video stream
  • Content security for video stream
  • Content security for video stream

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention will now be described more fully hereinafter with reference to the accompanying drawings, in which embodiments of the invention are shown. The systems and devices disclosed herein will be described during operation.

[0038] It is an object of the invention to reduce the risk of unauthorized access to video streams. One solution could be to encrypt the memory where the video stream is stored. However, the security level of this scheme is considered insufficient. To further reduce the risk of unauthorized access to the video stream, the video stream may be encrypted using an encryption key. To increase the level of security, different parts of the video stream can be encrypted with different encryption keys. Figure 1 to Figure 5 Different schemes for changing encryption keys used for encryption of video streams according to the invention are shown.

[0039] It should be understood that the following examples only discuss encryption of video str...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to a video capturing device configured to capture video data, the image capturing device comprising: an image processing pipeline configured to generate a video stream from the captured video data; an encryption key activating module configured to, upon request, activate an encryption key and deactivate any previously activated encryption key used for encrypting the video stream, such that only one encryption key is activated to be used for encryption of the video stream at each instance in time; an encryption scheduler module configured to, at predetermined timeintervals, instruct the encryption key activating module to activate an encryption key; an event handling module configured to, as a response to receiving indications of a detected event, instruct theencryption key activating module to activate an encryption key; an encryption module configured to encrypt the video stream using the one activated encryption key.

Description

technical field [0001] The invention relates to the field of encryption of video streams, and more particularly to a device handling the activation and deactivation of encryption keys used to encrypt video streams. Background technique [0002] As devices that capture video data in public spaces are used more frequently, content security of the captured video data becomes more and more important. The privacy and integrity of those being photographed in public places is one of the reasons that apply to the day-to-day management of installing security cameras or the use of body warning cameras (BWC) by law enforcement officers. For privacy and security reasons, it is important to use encryption of the video data to restrict access to the video data, both by restricting which users are allowed to access the decrypted video data, and by restricting which portions of the captured video data users can decrypt. This can be done by only allowing certain users to obtain the encrypti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N21/2347H04L9/08
CPCH04N21/2347H04L9/088H04L9/0891H04N7/183H04N21/26613G08B13/19617H04L9/0825H04N7/1675G06V20/41G06V20/52G06V20/44
Inventor 马兹达克·法尔佐内阿克塞尔·凯斯基坎加斯
Owner AXIS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products