CN119545114A - A video conversation credibility assessment method and device - Google Patents
A video conversation credibility assessment method and device Download PDFInfo
- Publication number
- CN119545114A CN119545114A CN202510073057.2A CN202510073057A CN119545114A CN 119545114 A CN119545114 A CN 119545114A CN 202510073057 A CN202510073057 A CN 202510073057A CN 119545114 A CN119545114 A CN 119545114A
- Authority
- CN
- China
- Prior art keywords
- signaling
- credibility
- video
- signature
- video session
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/63—Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
- H04N21/647—Control signaling between network components and server or clients; Network processes for video distribution between server and clients, e.g. controlling the quality of the video stream, by dropping packets, protecting content from unauthorised alteration within the network, monitoring of network load, bridging between two different networks, e.g. between IP and wireless
- H04N21/64784—Data processing by the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/22—Parsing or analysis of headers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
Each video session sent to a video management platform through a video network is subjected to deep packet analysis to obtain session information, protocol information, signaling content and signature information, signaling credibility Y and signature credibility S of the signaling message are obtained based on analysis results, signaling credibility Y i of the video session is obtained based on signaling credibility Y of all signaling messages, signature credibility S i of the video session is obtained based on signature credibility S of all signaling messages, video stream safety L i of the video session is obtained based on key frames in the video stream, reliability K i of the video session is obtained according to Y i、Si and L i, reliability evaluation is realized based on signaling messages and video stream, and the video session credibility comprises three-dimensional information of signaling credibility, signature credibility and video stream safety and is stronger.
Description
Technical Field
The present disclosure relates to the field of network security, and in particular, to a method and apparatus for evaluating reliability of a video session.
Background
At present, in order to strengthen security management and control, a video management platform receives a video session sent by a camera or other video equipment of a social face to realize video monitoring, but directly receives the video session to cause a certain threat to the security of the video management platform, and the security of the video management platform is required to be maintained in the face of the threat, when the video session is sent by a network camera of the social face, the application layer is mainly accessed to the video management platform through SIP, GB28181 and GB35114, a baseline is established based on signaling for the SIP and GB28181, and the behavior of the network camera is detected through the baseline threshold.
Disclosure of Invention
The embodiment of the application provides a video session reliability evaluation method and device, which are used for realizing the evaluation of the video session reliability based on a signaling message and a video stream included in a video session, wherein the video session reliability comprises three dimensions of signaling reliability, signature reliability and video stream security, and the reliability is higher.
In one aspect, an embodiment of the present application provides a method for evaluating reliability of a video session, where the method includes the following operations performed on each video session sent to a video management platform through a video network:
Carrying out deep packet analysis on a signaling message after obtaining a signaling message of the video session, and obtaining session information, protocol information, signaling content and signature information; acquiring the signaling credibility y of the signaling message based on the session information and the signaling content, and acquiring the signaling credibility s of the signaling message based on the protocol information or based on the protocol information and the signature information;
Acquiring the signaling credibility Y i of the video session based on the signaling credibility Y of all signaling messages of the video session, and acquiring the signature credibility S i of the video session based on the signature credibility S of all signaling messages of the video session;
acquiring a video stream of the video session, and acquiring video stream security L i of the video session based on key frames in the video stream;
Obtaining the credibility K i of the video session according to the signaling credibility Y i, the signature credibility S i and the video stream safety L i;
Where i represents that the video session is the i-th video session.
On the other hand, the embodiment of the application also provides a video session credibility assessment device, which comprises a memory and a processor,
The memory is used for storing a video session credibility evaluation program;
The processor is configured to read the video session reliability evaluation program and perform the video session reliability evaluation method according to the foregoing embodiment.
Compared with the related art, the video session reliability evaluation method and device provided by the embodiment of the application realize the evaluation of the video session reliability based on the signaling message and the video stream included in the video session, namely, the evaluation is performed based on all data included in the video session, the signaling reliability and the signature reliability are calculated based on the analysis result of the signaling message, the calculation is simple, the evaluation efficiency is high, the security level of the video stream can be obtained efficiently according to the key frame in the video stream without additional hardware configuration, the video session reliability comprises the information of three dimensions of the signaling reliability, the signature reliability and the video stream security, the obtained video session reliability is stronger, and the coverage of the evaluation data is stronger.
Additional features and advantages of the application will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the application. Other advantages of the application may be realized and attained by the structure particularly pointed out in the written description and drawings.
Drawings
The accompanying drawings are included to provide an understanding of the principles of the application, and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain, without limitation, the principles of the application.
FIG. 1 is a flow chart of a video session reliability evaluation method according to an embodiment of the present application;
FIG. 2 is a schematic diagram of a program stream with a coding type svac according to an embodiment of the present application;
FIG. 3 is a second diagram of a program stream with a coding type svac according to an embodiment of the present application;
fig. 4 is a schematic diagram of a video session reliability evaluation apparatus according to an embodiment of the present application.
Detailed Description
The present application has been described in terms of several embodiments, but the description is illustrative and not restrictive, and it will be apparent to those of ordinary skill in the art that many more embodiments and implementations are possible within the scope of the described embodiments. Although many possible combinations of features are shown in the drawings and discussed in the detailed description, many other combinations of the disclosed features are possible. Any feature or element of any embodiment may be used in combination with or in place of any other feature or element of any other embodiment unless specifically limited.
The present application includes and contemplates combinations of features and elements known to those of ordinary skill in the art. The disclosed embodiments, features and elements of the present application may also be combined with any conventional features or elements to form a unique inventive arrangement. Any feature or element of any embodiment may also be combined with features or elements from other inventive arrangements to form another unique inventive arrangement. It is therefore to be understood that any of the features shown and/or discussed in the present application may be implemented alone or in any suitable combination. Accordingly, the embodiments are not to be restricted except in light of the attached claims and their equivalents. Further, various modifications and changes may be made within the scope of the appended claims.
Furthermore, in describing representative embodiments, the specification may have presented the method and/or process as a particular sequence of steps. However, to the extent that the method or process does not rely on the particular order of steps set forth herein, the method or process should not be limited to the particular sequence of steps described. Other sequences of steps are possible as will be appreciated by those of ordinary skill in the art. Accordingly, the particular order of the steps set forth in the specification should not be construed as limitations on the claims. Furthermore, the claims directed to the method and/or process should not be limited to the performance of their steps in the order written, and one skilled in the art can readily appreciate that the sequences may be varied and still remain within the spirit and scope of the embodiments of the present application.
The embodiment of the application provides a video session reliability evaluation method, which comprises the steps of executing steps S100-S400 on each video session sent to a video management platform through a video network, as shown in FIG. 1:
S100, carrying out deep packet analysis on a signaling message after obtaining one signaling message of the video session to obtain session information, protocol information, signaling content and signature information, obtaining signaling credibility y of the signaling message based on the session information and the signaling content, obtaining signature credibility S of the signaling message based on the protocol information or based on the protocol information and the signature information;
S200, acquiring the signaling credibility Y i of the video session based on the signaling credibility Y of all signaling messages of the video session, and acquiring the signature credibility S i of the video session based on the signature credibility S of all signaling messages of the video session;
s300, acquiring a video stream of the video session, and acquiring video stream security L i of the video session based on a key frame in the video stream;
S400, obtaining the credibility K i of the video session according to the signaling credibility Y i, the signature credibility S i and the video stream safety L i.
In this embodiment, devices such as a camera or a terminal that stores video sessions send n video sessions to a video management platform through a video network, where each video session includes multiple signaling messages and one video stream, i in the above step represents an i-th video session, i=1, 2.
In this embodiment, before the video management platform receives the video session, the signaling reliability, signature reliability, video Stream security and reliability of the video session of each video session are determined by executing steps S100-S400, where steps S100 and S200 are Real-time operations performed on each signaling message, step S300 is a Real-time operation performed on the video Stream, the video Stream may be transmitted in the form of an RTP message (Real-time transport protocol message, RTP full-scale Real-Time Transport Protocol), where the video Stream includes a plurality of video frames, the video frames are encoded to form elementary streams (ES, full-scale ELEMENTARY STREAM), the elementary streams are encapsulated to form a Program Stream (PS, full-scale Program Stream) for transmission, and when executing step S300, the video Stream security L i is obtained based only on the Program Stream including the key frames, the Program Stream including the key frames starts with 000001ba (hexadecimal) and may be parsed into a PSM (full-scale Program STREAM MAP, program Stream map).
In this embodiment, the video management platform may be a public security system video management platform, a home security video management platform, an educational system video management platform, a medical health video management platform, a retail business video management platform, an industrial production video management platform, etc., which are all exemplary descriptions, and are not used as limitations of the present application, and are not repeated.
In this embodiment, step S100 may include steps S110-S130 for each time a signaling message is received in real time:
s110, carrying out deep packet analysis on the signaling message to obtain session information, protocol information, signaling content and signature information;
S120, acquiring the signaling credibility y of the signaling message based on the session information and the signaling content;
S130, acquiring the signature credibility S of the signaling message based on the protocol information or based on the protocol information and the signature information;
In this embodiment, in step S110, session information, protocol information, signaling content and signature information of the signaling message may be obtained by deep packet parsing (abbreviated as DPI, full term DEEP PACKET inspection) of the signaling message, where the session information includes five tuples including a source IP address, a destination IP address, a source port number, a destination port number, and a transport layer protocol, the transport layer protocol may include a TCP protocol, a UDP protocol, etc., the protocol information is one of the application layer protocols including SIP, GB28181, GB35114, the signaling content includes but is not limited to signaling such as REGISTER, keepalive, INVITE, pan-tilt control, video playback, etc., and the signature information includes whether there is a signature or not and a signature when there is a signature.
The video session reliability evaluation method in the embodiment realizes the evaluation of the video session reliability based on the signaling message and the video stream included in the video session, namely, the evaluation is performed based on all data included in the video session, the signaling reliability and the signature reliability are calculated based on the analysis result of the signaling message, the calculation is simple, the evaluation efficiency is high, the security level of the video stream can be obtained efficiently according to the key frame in the video stream without additional hardware configuration, the video session reliability comprises the information of three dimensions of the signaling reliability, the signature reliability and the video stream security, the reliability of the obtained video session is higher, and the coverage of the evaluation data is stronger.
In an exemplary embodiment, step S120 may include steps S121-S122:
s121, establishing a session state according to the session information and the signaling content;
S122, acquiring a trusted signaling set and an abnormal signaling set corresponding to the session state, if the signaling content is in the trusted signaling set, setting the signaling reliability y corresponding to the signaling message to be a preset trusted value, and if the signaling content is an abnormal signaling in the abnormal signaling set, setting the signaling reliability y corresponding to the signaling message to be a score corresponding to the abnormal signaling.
In this embodiment, the abnormal signaling set includes one abnormal signaling or a plurality of different abnormal signaling, each abnormal signaling corresponds to a score, and the score is smaller than the preset trusted value.
In this embodiment, a corresponding relationship between a session state and a trusted signaling set and a corresponding relationship between a session state and an abnormal signaling set are pre-stored, for a session state, where the trusted signaling set includes one or more trusted signaling, the abnormal signaling set includes one or more abnormal signaling, after a session state is established, the trusted signaling set and the abnormal signaling set in the session state can be obtained in real time, when the signaling content obtained by parsing in step S110 is a trusted signaling, the signaling reliability y of the signaling message can be set to a preset trusted value, for example, the preset trusted value is 100, and when the signaling content obtained by parsing in step S110 is an abnormal signaling, the signaling reliability y of the signaling message can be set to a score corresponding to the abnormal signaling, and the corresponding relationship between the session state and the abnormal signaling set is shown in table 1, and when the session state registration (REGISTER) is not completed, the abnormal signaling set includes two abnormal signaling, and other requests are sent after repeating registration and incompletion.
Table 1 correspondence between session state and abnormal signaling set
In this embodiment, after the next signaling packet is obtained, steps S121-S122 are still performed on the next signaling packet, and after a session state is established according to session information and signaling content obtained by parsing the next signaling packet, a reliable signaling set and an abnormal signaling set need to be obtained again for the session state, so as to set signaling reliability y corresponding to the next signaling packet.
In an exemplary embodiment, step S130 may include steps S131-S133:
s131, when the protocol information indicates that an application layer protocol is GB35114, the signature credibility S of the signaling message is set as a first preset signature value;
S132, when the protocol information indicates that an application layer protocol is SIP or GB28181 and the signature information indicates no signature, setting the signature reliability S of the signaling message as a second preset signature value;
And S133, when the protocol information indicates that the application layer protocol is SIP or GB28181 and the signature information indicates that the signature exists, executing signature verification operation, and setting the signature credibility S of the signaling message according to a signature verification result.
In this embodiment, the first preset signature value may be 100, and the second preset signature value may be 60.
In an exemplary embodiment, before performing step S110, step S000 may be performed:
S000, when the protocol of the video session is SIP or GB28181, performing encryption and signing operations on the signaling message, including steps S010-S030:
s010, adding a Data field into the signaling message to obtain a first signaling, wherein the Data field represents a time stamp;
S020, carrying out encryption operation with a key on the first signaling by adopting a hash algorithm HMACSHA, carrying out Base64 coding on an encryption result, and taking the obtained coding result A as a signature;
And S030, adding the signature into the first signaling to obtain a second signaling with reinforced reliability, and adopting the second signaling to replace the signaling message.
In this embodiment, before deep packet analysis is performed on the signaling message, the application layer protocol of the traffic can be initially identified through information such as keywords and ports, and since the video session transmitted by using GB35114 already has signature content for preventing falsification, falsification and playback, step S000 is not required to be performed on the video session, and for the video session transmitted by using SIP or GB28181, the signaling message is a plaintext signaling, encryption and signature can be performed on the plaintext signaling by using step S000, and the implementation can be performed by steps S010-S030.
In this embodiment, by executing step S010, a time stamp Data may be added TO the signaling message TO form a first signaling with a structure { METHOD, FROM, TO, CALL-ID, information body, data }, where { METHOD, FROM, TO, CALL-ID, information body } is an information message before adding Data, where METHOD represents a signaling METHOD, FROM represents a terminal for sending a video session, such as a camera or a terminal for storing a video session, TO represents a video management platform for receiving a video session, and CALL-ID represents a number of a video session.
In this embodiment, the { METHOD, FROM, TO, CALL-ID, information body, data } may be encrypted by the hash algorithm HMACSHA to generate a key, the key used in encryption is generated by the video session reliability evaluation device, after encryption, the encryption result is encoded by the Base64 encoding algorithm, and the encoding result a is added to the first signaling to generate a second signaling, where the second signaling has the structure of { METHOD, FROM, TO, CALL-ID, information body, data, a }, and in the video session, the second signaling is used to replace the information message { METHOD, FROM, TO, CALL-ID, information body }, to generate an information message with reinforced reliability, and in executing step S110, the information message with reinforced reliability is subjected to deep packet analysis.
In this embodiment, by encrypting and signing the plain text signaling of SIP or GB28181, reliability reinforcement of the signaling message is achieved, and attacks such as tampering and playback on the plain text signaling are avoided.
In an exemplary embodiment, step S133 may include steps S1331-S1333:
S1331, acquiring a time difference between the current time and the time stamp;
S1332, if the time difference is smaller than or equal to the preset effective time, carrying out encryption operation with a key on the first signaling by adopting the hash algorithm HMACSHA and carrying out Base64 coding on an encryption result to obtain a coding result A ', if A' =A, setting the signature reliability S of the signaling message as the first preset signature value, and if A '=A, setting the signature reliability S of the signaling message as a third preset signature value if A' =A, carrying out signature error;
s1333, if the time difference is larger than the preset effective time, setting the signature reliability S of the signaling message as the second preset signature value;
In this embodiment, the first preset signature value > the second preset signature value > the third preset signature value.
In this embodiment, when the application layer protocol is SIP or GB28181 and the signature information indicates that there is a signature, a signature verification operation is performed, the signature reliability is set according to the signature verification result, steps S331-S333 may be performed to verify the signature, and the signature reliability is set according to the signature verification result, where the first preset signature value may be 100, the second preset signature value may be 60, and the third preset signature value may be 10.
In this embodiment, in combination with steps S131, S132, S1331-S1333, the settings of the signature confidence level S are shown in table 2.
Table 2 table of settings for signature confidence level s
In an exemplary embodiment, step S200 may include steps S210-S220:
S210, taking min { Y } as the signaling credibility Y i of the video session, wherein min { Y } is the minimum value in the signaling credibility Y corresponding to all signaling messages of the video session;
and S220, taking min { S } as the signature credibility S i of the video session, wherein min { S } is the minimum value in the signature credibility S corresponding to all signaling messages of the video session.
In one implementation manner of this embodiment, when executing step S210, the signaling credibility Y of all signaling messages of the video session may be obtained, then the minimum value is taken as the signaling credibility Y i of the video session, for example, the video session corresponds to 20 signaling messages, since the signaling credibility Y corresponds to the signaling messages one by one, 20 signaling credibility Y is obtained, the minimum value in the 20 signaling credibility Y is taken as the signaling credibility Y i of the video session, when executing step S220, the signature credibility S of all signaling messages of the video session may be obtained, then the minimum value is taken as the signature credibility S i of the video session, for example, the video session corresponds to 20 signaling messages, since the signature credibility S corresponds to the signaling messages one by one, 20 signature credibility S is obtained, and the minimum value in the 20 signature credibility S is taken as the signature credibility S i of the video session.
In another implementation of this embodiment, when step S210 is performed, for the video session, after the signaling trustworthiness Y 1 and Y 2 corresponding to the first two signaling messages are obtained, the smaller value in Y 1 and Y 2 is tentatively set as the signaling trustworthiness Y i of the video session, after the signaling trustworthiness Y 3 corresponding to the third signaling message is obtained, the smaller value in Y 3 and Y i is tentatively set as the signaling trustworthiness Y i of the video session, and so on until the signaling trustworthiness Y i of the video session is obtained, when step S220 is performed, for the video session, the smaller value in S 1 and S 2 is tentatively set as the signaling trustworthiness S i of the video session, after the signaling trustworthiness Y 3 corresponding to the third signaling message is obtained, the signature is tentatively set as the signaling trustworthiness S 3 of the video session, and so on until the signature is tentatively set as the signaling trustworthiness S 3 of the video session is obtained, and so on until the signature is tentatively set as the signature trustworthiness S6295 of the video session is obtained.
In an exemplary embodiment, step S300 may include steps S310-S320, wherein step S320 may include steps S321-S325:
S310, when the application layer protocol of the video session is SIP or GB28181, setting the video stream security L i of the video session to a fourth preset security value;
s320, when the application layer protocol of the video session is GB35114, executing steps S321-S324 when one program stream containing key frames in the video stream is obtained:
S321, positioning a PSM position in the program stream, and acquiring a coding type field of the PSM;
s322, if the coding type field indicates that the coding type is h264 or mpeg4, judging that the security level of the program stream is A level, and setting the security level of the program stream as a first preset security value;
s323, if the coding TYPE field indicates that the coding TYPE is svac, locating the NALU position of the program stream, obtaining NALU_TYPE field in NALU header, if the NALU_TYPE field is converted into decimal value to be 9, then bytes immediately following the NALU header are safety parameter sets, obtaining the safety parameter sets;
S324, converting the security parameter set into binary data, wherein the first bit in the binary data is an encryption_flag, the second bit is an authentication_flag, if only the authentication_flag in the encryption_flag and the authentication_flag is 1, the security level of the program stream is judged to be B level and the security level of the program stream is set to be a second preset security value, and if the encryption_flag and the authentication_flag are both 1, the security level of the program stream is judged to be C level and the security level of the program stream is set to be a third preset security value;
And S325, taking the minimum value as the video stream security L i of the video session in the security degrees respectively corresponding to all program streams containing the key frames.
In this embodiment, the fourth preset security value < the first preset security value < the second preset security value < the third preset security value, the fourth preset security value may be 60, the first preset security value may be 70, the second preset security value may be 80, and the third preset security value may be 100.
In this embodiment, when the application layer protocol of the video session is SIP or GB28181, step S310 is executed, where the video stream security level L i of the video session may be directly set to a fourth preset security value, for example, set to 60.
In this embodiment, when the application layer protocol of the video session is GB35114, the video stream may correspond to a plurality of program streams PS, where the program stream PS including the key frame is shown in fig. 2, the program stream PS including the key frame is shown in hexadecimal in fig. 2, the program stream PS including the key frame starts in a fixed format 000001ba, and may be parsed into a PSM, and the coding type of the program stream shown in fig. 2 is svac.
In this embodiment, the fixed format 000001ba representing the start of the program stream PS is followed by PS header, SYSEM HEADER, PSM, PES and NALU in this order, where PES is an elementary stream packet (fully packed ELEMENTARY STREAM), NALU is a network abstraction layer unit (fully Network Abstraction Layer Unit), in PSM, after PSM start code, length code, info len and map len is a coding type field, when the coding type field is 1b, indicating the coding type is h264, when the coding type field is 10, indicating the coding type is mpeg4, when the coding type field is 80, indicating the coding type is svac, as shown in fig. 3, where fig. 3 and 2 are the same program stream PS, and where the coding type is h264 or mpeg4, the security of the program stream may be set to 70.
In this embodiment, if the encoding TYPE is svac, after PSM and PES, the NALU header is located by the NALU start code 00000001, and the NALU header is located after the NALU start code 00000001, as shown in fig. 3, e4 is included in the NALU header, for example, the nalu_type field is converted into binary number 11100100, 1001 is the nalu_type field, the decimal number corresponding to 1001 is 9, the NALU header is then a security parameter set, as shown in fig. 3, c7 is converted into binary data 11000111, and the first bit and the second bit are both 1, the security of the program stream shown in fig. 2 and 3 can be set to 100, and when the nalu_type field is converted into decimal number other than 9, the security of the program stream can be set to 70, and if the nalu_type field is converted into binary number 9, and the security parameter set is converted into binary number, the security of the second bit is only 1, and the security of the program stream can be set to 80.
In this embodiment, the security level is determined by using the program stream including the key frame, because three security levels, level A, level B, and level C, can be determined by using the program stream including the key frame, the security level is level C when the program stream including the key frame is both encrypted and signed, the security level is level B when the program stream including the key frame is only signed, the security level is level A when the program stream including the key frame is neither encrypted nor signed, and the program stream not including the key frame can only determine whether the program stream is level C, the security level is level C when the program stream is encrypted, and the security level is not level C when the program stream is not encrypted, as shown in Table 3 for the areas of the key frame and the non-key frame.
Table 3 shows the distinction between program streams that include key frames and program streams that do not include key frames
In this embodiment, in combination with step S310 and steps 321 to S324, the security settings of the program stream are shown in table 4:
Table 4 security level setting table for program streams
In the present embodiment, in the prior art, in a video session with an application layer protocol of GB35114, three levels are generally determined A, B, C based on signaling messages with signature and encryption, but a portion of signaling messages of GB35114 does not indicate whether to encrypt and join the signature, and in this case, three levels A, B, C cannot be determined, in which, in the present embodiment, the security level is classified into three levels A, B, C, that is, three levels A, B, C, wherein the security of level C is the highest, the security of level B is centered, and the security of level a is the lowest, by determining the security of video session with an application layer protocol of GB35114 through a program stream including a key frame.
In one implementation manner of this embodiment, there may be a plurality of program streams including key frames in the program streams of the video session, and when step S325 is performed, after the security L corresponding to each program stream including a key frame is obtained, the minimum value is then taken as the video stream security L i of the video session, for example, the video stream of the video session corresponds to 20 program streams including a key frame, the security L corresponds to the program stream including a key frame one by one, 20 security L are obtained in total, and the minimum value is taken as the video stream security L i of the video session in the 20 security L.
In another implementation manner of this embodiment, there may be a plurality of program streams including key frames in the program stream of the video session, after the security degrees L 1 and L 2 of the first two program streams including key frames are obtained in the execution of step S325, the smaller value in L 1 and L 2 is tentatively set as the video stream security degree L i of the video session, after the security degree L 3 corresponding to the third program stream including key frames is obtained, the smaller value is continuously selected in L 3 and L i, tentatively set as the video stream security degree L i of the video session, and so on until the video stream security degree L i of the video session is obtained.
In an exemplary embodiment, step S400 may include step S410:
S410, obtaining the credibility K i of the video session according to a formula K i=WYYi+WSSi+WLLi, wherein W Y、WS、WL is the weight of Y i、Si and L i respectively.
In this embodiment, after step S410 is performed, step S420 may also be performed:
S420, if Y i of the video session is larger than or equal to preset signaling credibility, S i is larger than or equal to preset signature credibility, L i is larger than or equal to preset video stream safety, or K i is larger than or equal to preset credibility, the video session is sent to the video management platform.
In this embodiment, for a certain video session, whether to send the video session to the video management platform may be determined according to one of the signaling reliability Y i, the signature reliability S i, the video stream security L i, and the reliability K i corresponding to the video session, for example, the video management platform only receives a video session with the reliability K i greater than or equal to the preset reliability, and sends the video session meeting the condition that "K i is greater than or equal to the preset reliability" to the video management platform.
In an exemplary embodiment, after performing steps S100-S400 for each video session, obtaining the reliability K i of each video session sent to the video management platform through the video network, steps S510-S520 may further include:
S510, calculating an average value based on the credibility K i of all video sessions, and taking the average value as the overall credibility K of the video network;
S520, if the integral credibility K is more than or equal to the preset integral credibility, all video sessions are sent to the video management platform through the video network.
In this embodiment, the formula can be usedThe method comprises the steps of calculating the overall credibility K of n video sessions, wherein the overall credibility K is an average value of the credibility of the n video sessions, the overall credibility K can be used as a basis for evaluating whether a video network is credible, if K is more than or equal to the preset overall credibility, the video network can be indicated to be credible, and all the video sessions in the video network can be sent to a video management platform.
The embodiment of the application also provides a video session credibility assessment device, which comprises a memory and a processor, as shown in fig. 4:
the memory is used for storing a video session credibility evaluation program;
The processor is configured to read the video session reliability evaluation program and perform the video session reliability evaluation method according to the foregoing embodiment.
Those of ordinary skill in the art will appreciate that all or some of the steps, systems, functional modules/units in the apparatus, and methods disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware implementation, the division between functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components, for example, one physical component may have a plurality of functions, or one function or step may be cooperatively performed by several physical components. Some or all of the components may be implemented as software executed by a processor, such as a digital signal processor or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term "computer storage media" includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as known to those skilled in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer. Furthermore, as is well known to those of ordinary skill in the art, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
Claims (10)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202510073057.2A CN119545114B (en) | 2025-01-17 | 2025-01-17 | A video conversation credibility assessment method and device |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202510073057.2A CN119545114B (en) | 2025-01-17 | 2025-01-17 | A video conversation credibility assessment method and device |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN119545114A true CN119545114A (en) | 2025-02-28 |
| CN119545114B CN119545114B (en) | 2025-04-29 |
Family
ID=94706717
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202510073057.2A Active CN119545114B (en) | 2025-01-17 | 2025-01-17 | A video conversation credibility assessment method and device |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN119545114B (en) |
Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080072287A1 (en) * | 2006-09-14 | 2008-03-20 | Interdigital Technology Corporation | Trust evaluation for a mobile software agent on a trusted computing platform |
| US8990574B1 (en) * | 2010-10-06 | 2015-03-24 | Prima Cinema, Inc. | Secure device authentication protocol |
| CN111274578A (en) * | 2018-11-20 | 2020-06-12 | 慧盾信息安全科技(苏州)股份有限公司 | Data safety protection system and method for video monitoring system |
| CN111343146A (en) * | 2020-02-04 | 2020-06-26 | 北京字节跳动网络技术有限公司 | Data auditing method, system, computer readable medium and electronic equipment |
| CN114423000A (en) * | 2021-12-16 | 2022-04-29 | 贵州航天计量测试技术研究所 | Identity authentication method based on Beidou short message |
| CN116566733A (en) * | 2023-06-25 | 2023-08-08 | 中国人民解放军陆军工程大学 | Method and device for network camera behavior monitoring and analysis |
| CN116614599A (en) * | 2023-03-13 | 2023-08-18 | 江西佳信捷电子股份有限公司 | Video monitoring method, device and storage medium for secure encryption |
| CN118830275A (en) * | 2022-02-11 | 2024-10-22 | 交互数字专利控股公司 | System and method for credibility determination |
| CN119182521A (en) * | 2024-09-03 | 2024-12-24 | 西安电子科技大学 | Full-link voice communication safety protection system, method, equipment and medium based on national encryption algorithm |
-
2025
- 2025-01-17 CN CN202510073057.2A patent/CN119545114B/en active Active
Patent Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080072287A1 (en) * | 2006-09-14 | 2008-03-20 | Interdigital Technology Corporation | Trust evaluation for a mobile software agent on a trusted computing platform |
| US8990574B1 (en) * | 2010-10-06 | 2015-03-24 | Prima Cinema, Inc. | Secure device authentication protocol |
| CN111274578A (en) * | 2018-11-20 | 2020-06-12 | 慧盾信息安全科技(苏州)股份有限公司 | Data safety protection system and method for video monitoring system |
| CN111343146A (en) * | 2020-02-04 | 2020-06-26 | 北京字节跳动网络技术有限公司 | Data auditing method, system, computer readable medium and electronic equipment |
| CN114423000A (en) * | 2021-12-16 | 2022-04-29 | 贵州航天计量测试技术研究所 | Identity authentication method based on Beidou short message |
| CN118830275A (en) * | 2022-02-11 | 2024-10-22 | 交互数字专利控股公司 | System and method for credibility determination |
| CN116614599A (en) * | 2023-03-13 | 2023-08-18 | 江西佳信捷电子股份有限公司 | Video monitoring method, device and storage medium for secure encryption |
| CN116566733A (en) * | 2023-06-25 | 2023-08-08 | 中国人民解放军陆军工程大学 | Method and device for network camera behavior monitoring and analysis |
| CN119182521A (en) * | 2024-09-03 | 2024-12-24 | 西安电子科技大学 | Full-link voice communication safety protection system, method, equipment and medium based on national encryption algorithm |
Also Published As
| Publication number | Publication date |
|---|---|
| CN119545114B (en) | 2025-04-29 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN110463156B (en) | Hardware-Accelerated Payload Filtering in Secure Communications | |
| CA2811999C (en) | Signing and validating session initiation protocol routing headers | |
| Lennox et al. | Connection-oriented media transport over the transport layer security (TLS) protocol in the session description protocol (SDP) | |
| CN108347331A (en) | The method and apparatus that T_Box equipment is securely communicated with ECU equipment in car networking system | |
| US20230283479A1 (en) | Data Transmission Method and Apparatus, Device, System, and Storage Medium | |
| JP2020532928A (en) | Digital signature methods, devices and systems | |
| CN107210910A (en) | Method, electronic device and computer program for providing a hash value for a piece of data | |
| CN111711607B (en) | A blockchain-based trusted loading and verification method for streaming microservices | |
| WO2023036348A1 (en) | Encrypted communication method and apparatus, device, and storage medium | |
| CN103401876B (en) | VoIP service security assurance method and system based on scale variable window mechanism | |
| CN101888383B (en) | Method for implementing extensible trusted SSH | |
| CN119545114B (en) | A video conversation credibility assessment method and device | |
| US20200235938A1 (en) | System and methods for generating and authenticating verifiable network traffic | |
| CN102137103A (en) | Method for realizing trusted transmission of voice over internet phone (VoIP) media stream by expanding MIKEY protocol | |
| CN112887375B (en) | Block chain-based message verification method and equipment | |
| Callas et al. | ZRTP: Media path key agreement for unicast secure RTP | |
| CN118659919B (en) | Data exchange system based on GB35114 standard on gateway equipment | |
| CN120582799B (en) | Cross-domain multimode trusted authentication method for high-dynamic network | |
| CN114726958B (en) | Authentication method, device, electronic device and readable storage medium | |
| CN118678126B (en) | Self-adaptive cross-domain code stream password security protection method, system and equipment | |
| CN113965323B (en) | Certificate-free tamper-proof method and system for body measurement data | |
| CN120017311A (en) | A verifiable resource transfer method and device based on incremental encoding | |
| CN118713904A (en) | Data transmission method, system, storage medium and computer equipment | |
| CN119854023A (en) | Data security encryption processing method and system | |
| CN116318812A (en) | Verification method and device in secure multiparty calculation |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |