⎝⎛韦德足球⎞⎠

Tianjin Optoelectronics Group (State-owned 754 Factory)
Tianjin Optoelectronics Anchen Information Technology Co., Ltd.

Focus on information security for 70 years
Stock code: 871339

Service Hotline: 4009999754

HD video surveillance information security solution

2018-12-06

【Project Overview】
With the continuous advancement of the national "Internet +" plan, the network process has rapidly covered all walks of life. In the field of video surveillance, IP-based network video surveillance and solutions are also changing the relatively closed mode of the original analog surveillance, which enables users to remotely access and obtain the required video data anytime, anywhere.
However, with the convenience of network, the security problems of video data have also come one after another.
On February 27, 2015, an urgent notice issued by the Jiangsu Public Security Department stated that the network video products of a well-known security monitoring manufacturer had serious security risks, some equipment had been controlled by overseas IP addresses, and there was a danger of large amounts of video information leakage; 2015 The "Look and See" website broadcast live video surveillance incidents in September was illegally stealing hundreds of network surveillance video information from many places for direct commercial use, which greatly infringed on the privacy of ordinary citizens. .
Today, with network monitoring equipment covering almost daily life, how to use monitoring equipment to ensure property security while ensuring the security of network high-definition video data during video acquisition, transmission, decoding, playback, and recording has become an urgent need for the industry to consider problem. To this end, the company started from the perspective of preventing and controlling video surveillance system access security, and proposed a pioneering network HD surveillance security encryption solution.

【solution】
In view of the security of network video surveillance itself, its basic conditions (network security) and necessary conditions (information security) should be fully considered, and adequate protection should be done in these two aspects. Network security is the basis of information transmission. If it is arbitrarily invaded by external illegal elements, all important information transmitted on the network, including video information, personal information, and corporate business information, will have great security risks.
1. Network security: Including the physical security of the network equipment setting area and the security of the hardware and software of the network equipment itself, as well as firewalls, antivirus attacks, intrusion detection technology, and network monitoring technology, etc., all ensure the network environment at a basic level. Health is an indispensable and important content of any network. From the perspective of video surveillance systems, the network security system was relatively complete before the construction of video surveillance. What we need to do is to improve the access control security of video surveillance systems.
2. Video information encryption: This part is the core content of network video encryption. Through the encryption algorithm, the plaintext of the information is converted to ciphertext for transmission. The back-end platform restores the ciphertext to the plaintext through the encryption algorithm, thereby achieving high security. The role of information protection. Since the network monitoring system is widely distributed, from the perspective of information encryption, encryption should be started from the source (camera) to avoid the situation where video information is stolen at any transmission node.
In addition, in view of the large amount of data on the network video signal, video encryption must consider the processing speed of the encryption chip (from the perspective of national secrets, the encryption must be hardware encryption, and the encryption chip is a standard solution), which must meet at least 10Mbps. It is required to reserve dual SPI or USB interface at the same time. As the decryption core device, the back-end encryption machine is responsible for the management of dozens of channels or even hundreds of videos in response to the high-definition monitoring of the network. Therefore, the technical performance, decryption speed, and bandwidth margin of the encryption machine have high requirements.
Network HD Video Security Information Resolution Topology Diagram
3. State secret encryption technology: State secret is a national password algorithm recognized by the State Password Bureau, also known as a commercial password. It refers to technologies that can implement the functions of encryption, decryption, and authentication of commercial cryptographic algorithms, including cryptographic algorithm programming technology, cryptographic algorithm chips, and encryption card and other implementation technologies. High-security cryptographic algorithms such as SM1, SM2, SM3, and SM4 approved by the State Password Bureau implement functions such as encryption, decryption, identity recognition, and access control through dedicated hardware encryption devices. The relevant enterprises of State Encryption Technology shall have the production and sales licenses of commercial password products issued by the State Password Bureau.
4. Hardware identification: Different from the software identification technology used by traditional surveillance vendors, the company's self-developed network HD video encryption products based on national secret requirements use hardware identification technology, which can effectively reduce access security vulnerabilities. The encryption chip can improve the security of the front-end camera, and Ukey can effectively reduce the vulnerability of external intruders to access control.

【Core Products】
1. Network video encryption server
  • Built-in National Cryptography Bureau State Secret Algorithm (SM1, SM2, SM3, SM4)
  • Supports audio and video data encryption
  • Products passed the certification
  • Data encryption speed is greater than 10Mbps
  • Can cooperate with network video surveillance manufacturers to do product docking services

2.Crypto chip
  • Built-in National Cryptography Bureau State Secret Algorithm (SM1, SM2, SM3, SM4)
  • Support dual SPI / USB high-speed encryption interface
  • Data encryption speed is greater than 10Mbps
  • Cooperate with network video surveillance manufacturers to provide product OEM services and provide certification support


3.USB decryption key
  • Domestic independent security SOC chip
  • USB2.0 interface
  • Hardware security chip decrypts encrypted video information
  • Decryption speed is greater than 20Mbps

4.Encryption machine
  • Built-in National Cryptography Bureau State Secret Algorithm (SM1, SM2, SM3, SM4)
  • All encryption, decryption, and signature algorithms are implemented by the encryption chip hardware
  • Support 128-channel 1080P HD video decryption
  • With firewall function, gatekeeper function
  • Virtual Private Network (VPN) Device Features
  • Support NAT traversal function
  • Support hardware identification function
  • 128-byte Ethernet frame length, 550 Mbps throughput in clear text packets
  • 128-byte Ethernet frame length, 200 Mbps tunnel cipher text packet throughput
  • Tunnel average negotiation time
  • Concurrent negotiation and successful establishment of 5000 tunnels in 480s
  • Maximum number of tunnels that can be established per second 50
  • Number of concurrent tunnels supported
真人游戏平台注册 七乐彩 欢乐拼三张 欢乐拼三张