⎝⎛韦德足球⎞⎠

Tianjin Optoelectronics Group (State-owned 754 Factory)
Tianjin Optoelectronics Anchen Information Technology Co., Ltd.

Focus on information security for 70 years
Stock code: 871339

Service Hotline: 4009999754

National Security High Security HD Video Surveillance System

National security high security HD video surveillance system


Product Description

With the country and individuals attaching importance to safety protection, safe cities, smart cities, intelligent transportation ...

As the country and individuals attach great importance to security protection, various types of network video high-definition surveillance in booming cities, such as safe cities, smart cities, intelligent transportation, and even enterprises, homes, and chain stores. The recent "Look and See" live video website incidents illegally stole nearly 100 network surveillance video information from Wenzhou for commercial purposes. On February 27, the Jiangsu Public Security Department issued an urgent notice saying that a well-known security surveillance manufacturer's network video products have serious security risks, some devices have been controlled by overseas IP addresses, and there is a danger of large amounts of video information leakage. Network monitoring equipment, which is the entrance of sensitive information, is widely used in the fields of finance, transportation, public security, justice, energy and other fields. It will inevitably lead to sensitive video information being obtained by criminals, which is equivalent to installing a "sky eye" for criminals.
The security issue of video information is really in front of us. We need to propose targeted video information security solutions based on industry needs and customer habits. The video surveillance system with security as its core purpose plays the role of ensuring social stability, people's safety, and deterring illegal acts, and its own security cannot be taken lightly.
Guomi High Security Video Surveillance System is a complete product solution that can cover the front-end equipment to the back-end management platform, to achieve security protection in the process of video surveillance data acquisition, transmission, storage and application; the system is collected by the front-end access terminal and Backend central management platform.
The front-end acquisition and access terminal includes a camera, a network hard disk video recorder, and an SD encryption card.
The back-end central management platform includes: video decryption server, USB password module, PCI-E password card, card issuing equipment, key management and card issuing system, and background management system.
Security front-end equipment: mainly complete audio and video acquisition, alarm data acquisition, video and data encryption, security authentication, data transmission and other functions;
Back-end security management platform: complete video data and data viewing, distribution, storage, encryption and decryption, key management and distribution, permission authentication, security audit functions.

Product advantage

Using "Source Encryption" mode, the data is "confidential" from the point of collection ...

(1) Adopt "Source Encryption" mode, the data is "Confidential" from the point of collection, until the client is unlocked to "Bright state", the data collection, transmission and storage are solved in the most simple and effective mode Safety.
(2) The high-security dedicated encryption chip is used as the computing core, and the algorithm can be replaced. When the equipment is not changed, the algorithm loading method can be used, which is suitable for different industry application requirements.
(3) In the implementation of data encryption, effective video data payload encryption can be achieved, which is completely transparent to the original streaming media forwarding and other business processes of the video system, and fully complies with GB / T28181 regulations.
(4) The PKI system has a complete and reliable identity authentication mechanism and data integrity check mechanism, and a key dispersion mechanism is adopted to ensure "one secret and one secret".

...

Product parameter Spec

Product parameters ...

1.Network video decryption server

PCI-E password card
  • Built-in National Cryptography Bureau State Secret Algorithm (SM1, SM2, SM3, SM4)
  • Supports audio and video data encryption
  • Products passed the certification
  • Data encryption speed is greater than 700Mbps
  • Can cooperate with network video surveillance manufacturers to do product docking services
  • Support 16 / 32CH 1080P HD video decryption
  • Support hardware identification function

2.Crypto chip

SD password card

USB password module
  • Built-in National Cryptography Bureau State Secret Algorithm (SM1, SM2, SM3, SM4)
  • Support dual SDIO / USB2.0 high-speed encryption interface
  • Data encryption speed is greater than 10Mbps
  • Cooperate with network video surveillance manufacturers to provide product OEM services and provide certification support
Support hardware identification function


4.Encryption machine
  • Built-in National Cryptography Bureau State Secret Algorithm (SM1, SM2, SM3, SM4)
  • All encryption, decryption, and signature algorithms are implemented by the encryption chip hardware
  • Support 128-channel 1080P HD video decryption
  • With firewall function, gatekeeper function
  • Virtual Private Network (VPN) Device Features
  • Support NAT traversal function
  • Support hardware identification function
  • 128-byte Ethernet frame length, 550 Mbps throughput in clear text packets
  • 128-byte Ethernet frame length, 200 Mbps tunnel cipher text packet throughput

Honor Rertificate

Award certificate...

    Application scenarios

    In theory, except for service video information that needs to be open to the public ...

    In theory, except for service video information that needs to be open to the public, all surveillance systems will have security requirements for the uniqueness and privacy of video information no matter where or what purpose it is used for. It is an important department with higher risks and higher security levels.
    (1) Government departments (2) Military industry (3) Armed police border defense (4) Aerospace (5) Railway shipping (6) Financial storage (7) Judicial prisons (8) Important departments of enterprises or units

    ...

    真人游戏平台注册 七乐彩 欢乐拼三张 欢乐拼三张