⎝⎛韦德足球⎞⎠

Tianjin Optoelectronics Group (State-owned 754 Factory)
Tianjin Optoelectronics Anchen Information Technology Co., Ltd.

Focus on information security for 70 years
Stock code: 871339

Service Hotline: 4009999754

Security video surveillance system based on national secret algorithm

    Product Description

    ...

    1 Product Introduction According to the definition of information security by the International Organization for Standardization, information encryption should achieve the following five aspects: ensuring the authenticity, confidentiality, integrity, controllability and non-repudiation of information. Specific to the security video surveillance system, it is to prevent possible theft, retransmission, forgery, tampering, illegal copying, illegal monitoring, illegal control, and behavior of video information during processing, transmission, storage, display, control, and playback. Deny acts that compromise system security.
    The video encryption products of Tianjin Optoelectronics Anchen Information Technology Co., Ltd. are based on the national secret algorithm promulgated by the National Cryptography Bureau (OSCCA), using a hardware encryption algorithm to implement a highly secure video surveillance system. The system can protect users' important and sensitive images from being illegally stolen, tampered with, and deny illegal users from using fake devices to invade the system. All security devices in the network use digital certificates to implement identity authentication, data integrity protection algorithms, and session and control protocols Protect against protocol attacks by illegal users.
    2 System composition The security video surveillance system based on the national secret algorithm is a complete product solution that can cover the front-end equipment to the back-end management platform, to achieve security protection in the process of video surveillance data acquisition, transmission, storage and application; Collection access terminal and back-end central management platform.

    3 System Function This system is a high-security video surveillance system implemented by hardware encryption algorithm based on the national secret algorithm promulgated by the National Cryptography Bureau (OSCCA). The system can protect users' important and sensitive images from being illegally stolen, tampered with, and deny illegal users from using forged devices to invade the system. All security devices in the network use digital certificates to implement identity authentication, data integrity protection algorithms, and session and control protocols. Protect against protocol attacks by illegal users.
    The function of this system is to realize the encryption processing of video information in the process of processing, transmission, storage, display, control and playback; the functions of the key management and card issuing system are to provide certificate issuance, key generation, key decentralization, and password Password services such as module authentication.
    4 System advantages
    l Use "Source Encryption" mode, the data is "closed" from the point of collection, and it is not cleared to "bright state" until the client, which solves the data collection, transmission and storage security in the most concise and effective mode.
    l The high-security dedicated encryption chip is used as the computing core, and the algorithm can be replaced. When the device is not changed, the algorithm loading method can be used, which is suitable for different industries.
    l In the implementation of data encryption, effective video payload encryption can be achieved, which is completely transparent to the original streaming media forwarding and other business processes of the video system, and complies with GB / T28181.
    l The PKI system has a complete and reliable identity authentication mechanism and data integrity check mechanism, and uses a key dispersion mechanism to ensure "one machine and one secret".
    5 Product introduction 2 million 10 times integrated gimbal gun
    Product main performance indicators:
    Ø Using Ambar A5S compression chip
    Ø Built-in 8 cruise paths, 4 pattern paths
    Ø Real-time detection of the front-end supply voltage value through the menu
    Ø Built-in precision RTC clock
    Ø 1 / 2.8 "Sony Exmor CMOS Sensor
    Ø Support 10x optical zoom
    Ø Support ONVIF protocol, compatible with mainstream market protocols
    Ø Chinese and English OSD menu
    Ø Horizontal manual control speed: 0.5 ° ~ 12 ° / s; vertical manual control speed 0.5 ° ~ 12 ° / s
    Ø Preset speed 0.5 ° ~ 12 ° / s
    Ø Support 256 preset positions
    Ø Support 3D positioning function ② 2 million network HD infrared dome camera
    Product main performance indicators:
    Ø Adopt Ambar A5S compression scheme, SONY HD Sensor
    Ø The first video analysis dimming technology to increase the life of infrared lamps by three times
    Ø Use array infrared light, the projection distance is 150 meters
    Ø Powerful infrared light control software, suitable for more occasions
    Ø Automatic defrosting and defogging functions (manually enabled)
    Ø Can detect the illumination value of the installation environment
    Ø Built-in 8 cruise paths, 4 pattern paths
    Ø Real-time detection of the value of the front-end supply voltage through the menu
    Ø Intelligent temperature control design, real-time display of the internal temperature of the dome camera
    Ø The working power of the infrared lamp can be set individually through the menu, which is related to the optical multiple
    Ø Vertical elevation angle adjustment, can reach 10 °
    Ø Built-in design of wall mount bracket power supply, convenient for site construction and maintenance
    Ø Outdoor power box design, convenient for site construction and debugging (optional)
    Ø IP66 / secondary lightning protection, 3000V surge protection design ③Security password module
    Product main performance indicators:
    Ø Follow the standard: ISO7816 (1-4)
    Ø International certification: CE, FCC
    Ø Hardware algorithms: DES, 3DES, SSF33, SM1, SM2, 1024 / 2048-bit RSA, SM3, SHA-1
    Ø Processor: 8-bit, 16-bit and 32-bit smart card chip
    Ø Storage space: 32K, 64K, 256K
    Ø Interface type: USB2.0
    Ø Random number: true random number generated by hardware
    Ø Storage life: at least 10 years
    Ø Erase times: at least 300,000 times
    Ø Interface specifications: CSP, PKCS # 11
    Ø Interface languages: Java, VB, VC, ASP, ASP.NET, Delphi
    Ø Supported platforms: Windows98 / Me / NT / 2000 / XP / 2003 / Vista / Win7 / Linux
    ④SD password card
    Product main performance indicators:
    Ø Follow the standard SDIO1.1, SD1.1 / 2.0 physical layer specifications, ISO7816, national secret standard interface
    Ø International certification: CE, FCC
    Ø Hardware algorithms: DES, 3DES, SSF33, SM1, SM2, 1024 / 2048-bit RSA, SM3, SHA-1
    Ø Processor: 32-bit smart card chip
    Ø Storage space: 256K COS space, 4G ordinary storage area
    Ø Interface type: standard SD card interface
    Ø Random number: true random number generated by hardware
    Ø Working voltage: 5V
    Ø Working current: 40-150mA
    Ø Working temperature: -25-85 ℃
    Ø Storage temperature: -25-85 ℃
    Ø Storage life: at least 10 years
    Ø Erase times: at least 300,000 times
    Ø Interface specifications: CSP, PKCS # 11
    Ø Interface language: Java, J2ME, C, C ++
    Ø Supported platforms: Windows2000 / XP / 2003 / Vista / Win7 / Win8 / Linux / iOS / Winphone
    ⑤PCI-E password card
    Product main performance indicators:
    Ø SM1 / SM2 / SM3 / SM6 algorithm is implemented with a cryptographic algorithm chip approved by the State Password Administration.
    Ø Support SM4 wireless LAN and dedicated block cipher algorithm in trusted computing field.
    Ø Provide a variety of security measures to protect themselves to protect sensitive information in password cards from illegal acquisition, forgery, and tampering.
    Ø Adopt strict key protection security mechanism, the keys at all levels in the card cannot be exported in plain text to the outside of the password card.
    Ø Multi-level authority management, administrators and operators can be set up to ensure the security of data and programs in the card through authority division.
    Ø The user's identity is identified by a high-security smart password key, and the backup of keys and sensitive information is supported by the smart password key.
    Ø Has a complete file system, providing custom configuration of user storage space, number of supported keys, and file space.
    Ø Support 32-bit and 64-bit operating system platforms.
    Ø Support multi-threaded, multi-process, cross-platform application layer, general C programming interface, and support kernel-mode programming interface.
    Ø Support PKCS # 11, CSP, JCE and other international standard security interfaces.
    Ø Support COM component interface
    6 Application areas In theory, except for service video information that needs to be open to the public, all surveillance systems will have security requirements for the uniqueness and privacy of video information, regardless of where or what purpose it is used. The industry should be an important sector with higher risks and higher security levels.
    (1) Government departments (2) Military military industry (3) Armed police border defense (4) Aerospace (5) Railway shipping (6) Financial storage (7) Judicial prisons (8) Important departments of enterprises or units

    ...

    ...

    Product parameter Spec

    Product parameters ...

    Honor Rertificate

    Award certificate...

      ...

      ...

      真人游戏平台注册 七乐彩 欢乐拼三张 欢乐拼三张