[go: up one dir, main page]

CN119545114A - A video conversation credibility assessment method and device - Google Patents

A video conversation credibility assessment method and device Download PDF

Info

Publication number
CN119545114A
CN119545114A CN202510073057.2A CN202510073057A CN119545114A CN 119545114 A CN119545114 A CN 119545114A CN 202510073057 A CN202510073057 A CN 202510073057A CN 119545114 A CN119545114 A CN 119545114A
Authority
CN
China
Prior art keywords
signaling
credibility
video
signature
video session
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202510073057.2A
Other languages
Chinese (zh)
Other versions
CN119545114B (en
Inventor
张敏强
张帅
王刚
李建磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Venustech Cybervision Co ltd
Venustech Group Inc
Original Assignee
Beijing Venustech Cybervision Co ltd
Venustech Group Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Venustech Cybervision Co ltd, Venustech Group Inc filed Critical Beijing Venustech Cybervision Co ltd
Priority to CN202510073057.2A priority Critical patent/CN119545114B/en
Publication of CN119545114A publication Critical patent/CN119545114A/en
Application granted granted Critical
Publication of CN119545114B publication Critical patent/CN119545114B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/63Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
    • H04N21/647Control signaling between network components and server or clients; Network processes for video distribution between server and clients, e.g. controlling the quality of the video stream, by dropping packets, protecting content from unauthorised alteration within the network, monitoring of network load, bridging between two different networks, e.g. between IP and wireless
    • H04N21/64784Data processing by the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

Each video session sent to a video management platform through a video network is subjected to deep packet analysis to obtain session information, protocol information, signaling content and signature information, signaling credibility Y and signature credibility S of the signaling message are obtained based on analysis results, signaling credibility Y i of the video session is obtained based on signaling credibility Y of all signaling messages, signature credibility S i of the video session is obtained based on signature credibility S of all signaling messages, video stream safety L i of the video session is obtained based on key frames in the video stream, reliability K i of the video session is obtained according to Y i、Si and L i, reliability evaluation is realized based on signaling messages and video stream, and the video session credibility comprises three-dimensional information of signaling credibility, signature credibility and video stream safety and is stronger.

Description

Video session credibility assessment method and device
Technical Field
The present disclosure relates to the field of network security, and in particular, to a method and apparatus for evaluating reliability of a video session.
Background
At present, in order to strengthen security management and control, a video management platform receives a video session sent by a camera or other video equipment of a social face to realize video monitoring, but directly receives the video session to cause a certain threat to the security of the video management platform, and the security of the video management platform is required to be maintained in the face of the threat, when the video session is sent by a network camera of the social face, the application layer is mainly accessed to the video management platform through SIP, GB28181 and GB35114, a baseline is established based on signaling for the SIP and GB28181, and the behavior of the network camera is detected through the baseline threshold.
Disclosure of Invention
The embodiment of the application provides a video session reliability evaluation method and device, which are used for realizing the evaluation of the video session reliability based on a signaling message and a video stream included in a video session, wherein the video session reliability comprises three dimensions of signaling reliability, signature reliability and video stream security, and the reliability is higher.
In one aspect, an embodiment of the present application provides a method for evaluating reliability of a video session, where the method includes the following operations performed on each video session sent to a video management platform through a video network:
Carrying out deep packet analysis on a signaling message after obtaining a signaling message of the video session, and obtaining session information, protocol information, signaling content and signature information; acquiring the signaling credibility y of the signaling message based on the session information and the signaling content, and acquiring the signaling credibility s of the signaling message based on the protocol information or based on the protocol information and the signature information;
Acquiring the signaling credibility Y i of the video session based on the signaling credibility Y of all signaling messages of the video session, and acquiring the signature credibility S i of the video session based on the signature credibility S of all signaling messages of the video session;
acquiring a video stream of the video session, and acquiring video stream security L i of the video session based on key frames in the video stream;
Obtaining the credibility K i of the video session according to the signaling credibility Y i, the signature credibility S i and the video stream safety L i;
Where i represents that the video session is the i-th video session.
On the other hand, the embodiment of the application also provides a video session credibility assessment device, which comprises a memory and a processor,
The memory is used for storing a video session credibility evaluation program;
The processor is configured to read the video session reliability evaluation program and perform the video session reliability evaluation method according to the foregoing embodiment.
Compared with the related art, the video session reliability evaluation method and device provided by the embodiment of the application realize the evaluation of the video session reliability based on the signaling message and the video stream included in the video session, namely, the evaluation is performed based on all data included in the video session, the signaling reliability and the signature reliability are calculated based on the analysis result of the signaling message, the calculation is simple, the evaluation efficiency is high, the security level of the video stream can be obtained efficiently according to the key frame in the video stream without additional hardware configuration, the video session reliability comprises the information of three dimensions of the signaling reliability, the signature reliability and the video stream security, the obtained video session reliability is stronger, and the coverage of the evaluation data is stronger.
Additional features and advantages of the application will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the application. Other advantages of the application may be realized and attained by the structure particularly pointed out in the written description and drawings.
Drawings
The accompanying drawings are included to provide an understanding of the principles of the application, and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain, without limitation, the principles of the application.
FIG. 1 is a flow chart of a video session reliability evaluation method according to an embodiment of the present application;
FIG. 2 is a schematic diagram of a program stream with a coding type svac according to an embodiment of the present application;
FIG. 3 is a second diagram of a program stream with a coding type svac according to an embodiment of the present application;
fig. 4 is a schematic diagram of a video session reliability evaluation apparatus according to an embodiment of the present application.
Detailed Description
The present application has been described in terms of several embodiments, but the description is illustrative and not restrictive, and it will be apparent to those of ordinary skill in the art that many more embodiments and implementations are possible within the scope of the described embodiments. Although many possible combinations of features are shown in the drawings and discussed in the detailed description, many other combinations of the disclosed features are possible. Any feature or element of any embodiment may be used in combination with or in place of any other feature or element of any other embodiment unless specifically limited.
The present application includes and contemplates combinations of features and elements known to those of ordinary skill in the art. The disclosed embodiments, features and elements of the present application may also be combined with any conventional features or elements to form a unique inventive arrangement. Any feature or element of any embodiment may also be combined with features or elements from other inventive arrangements to form another unique inventive arrangement. It is therefore to be understood that any of the features shown and/or discussed in the present application may be implemented alone or in any suitable combination. Accordingly, the embodiments are not to be restricted except in light of the attached claims and their equivalents. Further, various modifications and changes may be made within the scope of the appended claims.
Furthermore, in describing representative embodiments, the specification may have presented the method and/or process as a particular sequence of steps. However, to the extent that the method or process does not rely on the particular order of steps set forth herein, the method or process should not be limited to the particular sequence of steps described. Other sequences of steps are possible as will be appreciated by those of ordinary skill in the art. Accordingly, the particular order of the steps set forth in the specification should not be construed as limitations on the claims. Furthermore, the claims directed to the method and/or process should not be limited to the performance of their steps in the order written, and one skilled in the art can readily appreciate that the sequences may be varied and still remain within the spirit and scope of the embodiments of the present application.
The embodiment of the application provides a video session reliability evaluation method, which comprises the steps of executing steps S100-S400 on each video session sent to a video management platform through a video network, as shown in FIG. 1:
S100, carrying out deep packet analysis on a signaling message after obtaining one signaling message of the video session to obtain session information, protocol information, signaling content and signature information, obtaining signaling credibility y of the signaling message based on the session information and the signaling content, obtaining signature credibility S of the signaling message based on the protocol information or based on the protocol information and the signature information;
S200, acquiring the signaling credibility Y i of the video session based on the signaling credibility Y of all signaling messages of the video session, and acquiring the signature credibility S i of the video session based on the signature credibility S of all signaling messages of the video session;
s300, acquiring a video stream of the video session, and acquiring video stream security L i of the video session based on a key frame in the video stream;
S400, obtaining the credibility K i of the video session according to the signaling credibility Y i, the signature credibility S i and the video stream safety L i.
In this embodiment, devices such as a camera or a terminal that stores video sessions send n video sessions to a video management platform through a video network, where each video session includes multiple signaling messages and one video stream, i in the above step represents an i-th video session, i=1, 2.
In this embodiment, before the video management platform receives the video session, the signaling reliability, signature reliability, video Stream security and reliability of the video session of each video session are determined by executing steps S100-S400, where steps S100 and S200 are Real-time operations performed on each signaling message, step S300 is a Real-time operation performed on the video Stream, the video Stream may be transmitted in the form of an RTP message (Real-time transport protocol message, RTP full-scale Real-Time Transport Protocol), where the video Stream includes a plurality of video frames, the video frames are encoded to form elementary streams (ES, full-scale ELEMENTARY STREAM), the elementary streams are encapsulated to form a Program Stream (PS, full-scale Program Stream) for transmission, and when executing step S300, the video Stream security L i is obtained based only on the Program Stream including the key frames, the Program Stream including the key frames starts with 000001ba (hexadecimal) and may be parsed into a PSM (full-scale Program STREAM MAP, program Stream map).
In this embodiment, the video management platform may be a public security system video management platform, a home security video management platform, an educational system video management platform, a medical health video management platform, a retail business video management platform, an industrial production video management platform, etc., which are all exemplary descriptions, and are not used as limitations of the present application, and are not repeated.
In this embodiment, step S100 may include steps S110-S130 for each time a signaling message is received in real time:
s110, carrying out deep packet analysis on the signaling message to obtain session information, protocol information, signaling content and signature information;
S120, acquiring the signaling credibility y of the signaling message based on the session information and the signaling content;
S130, acquiring the signature credibility S of the signaling message based on the protocol information or based on the protocol information and the signature information;
In this embodiment, in step S110, session information, protocol information, signaling content and signature information of the signaling message may be obtained by deep packet parsing (abbreviated as DPI, full term DEEP PACKET inspection) of the signaling message, where the session information includes five tuples including a source IP address, a destination IP address, a source port number, a destination port number, and a transport layer protocol, the transport layer protocol may include a TCP protocol, a UDP protocol, etc., the protocol information is one of the application layer protocols including SIP, GB28181, GB35114, the signaling content includes but is not limited to signaling such as REGISTER, keepalive, INVITE, pan-tilt control, video playback, etc., and the signature information includes whether there is a signature or not and a signature when there is a signature.
The video session reliability evaluation method in the embodiment realizes the evaluation of the video session reliability based on the signaling message and the video stream included in the video session, namely, the evaluation is performed based on all data included in the video session, the signaling reliability and the signature reliability are calculated based on the analysis result of the signaling message, the calculation is simple, the evaluation efficiency is high, the security level of the video stream can be obtained efficiently according to the key frame in the video stream without additional hardware configuration, the video session reliability comprises the information of three dimensions of the signaling reliability, the signature reliability and the video stream security, the reliability of the obtained video session is higher, and the coverage of the evaluation data is stronger.
In an exemplary embodiment, step S120 may include steps S121-S122:
s121, establishing a session state according to the session information and the signaling content;
S122, acquiring a trusted signaling set and an abnormal signaling set corresponding to the session state, if the signaling content is in the trusted signaling set, setting the signaling reliability y corresponding to the signaling message to be a preset trusted value, and if the signaling content is an abnormal signaling in the abnormal signaling set, setting the signaling reliability y corresponding to the signaling message to be a score corresponding to the abnormal signaling.
In this embodiment, the abnormal signaling set includes one abnormal signaling or a plurality of different abnormal signaling, each abnormal signaling corresponds to a score, and the score is smaller than the preset trusted value.
In this embodiment, a corresponding relationship between a session state and a trusted signaling set and a corresponding relationship between a session state and an abnormal signaling set are pre-stored, for a session state, where the trusted signaling set includes one or more trusted signaling, the abnormal signaling set includes one or more abnormal signaling, after a session state is established, the trusted signaling set and the abnormal signaling set in the session state can be obtained in real time, when the signaling content obtained by parsing in step S110 is a trusted signaling, the signaling reliability y of the signaling message can be set to a preset trusted value, for example, the preset trusted value is 100, and when the signaling content obtained by parsing in step S110 is an abnormal signaling, the signaling reliability y of the signaling message can be set to a score corresponding to the abnormal signaling, and the corresponding relationship between the session state and the abnormal signaling set is shown in table 1, and when the session state registration (REGISTER) is not completed, the abnormal signaling set includes two abnormal signaling, and other requests are sent after repeating registration and incompletion.
Table 1 correspondence between session state and abnormal signaling set
In this embodiment, after the next signaling packet is obtained, steps S121-S122 are still performed on the next signaling packet, and after a session state is established according to session information and signaling content obtained by parsing the next signaling packet, a reliable signaling set and an abnormal signaling set need to be obtained again for the session state, so as to set signaling reliability y corresponding to the next signaling packet.
In an exemplary embodiment, step S130 may include steps S131-S133:
s131, when the protocol information indicates that an application layer protocol is GB35114, the signature credibility S of the signaling message is set as a first preset signature value;
S132, when the protocol information indicates that an application layer protocol is SIP or GB28181 and the signature information indicates no signature, setting the signature reliability S of the signaling message as a second preset signature value;
And S133, when the protocol information indicates that the application layer protocol is SIP or GB28181 and the signature information indicates that the signature exists, executing signature verification operation, and setting the signature credibility S of the signaling message according to a signature verification result.
In this embodiment, the first preset signature value may be 100, and the second preset signature value may be 60.
In an exemplary embodiment, before performing step S110, step S000 may be performed:
S000, when the protocol of the video session is SIP or GB28181, performing encryption and signing operations on the signaling message, including steps S010-S030:
s010, adding a Data field into the signaling message to obtain a first signaling, wherein the Data field represents a time stamp;
S020, carrying out encryption operation with a key on the first signaling by adopting a hash algorithm HMACSHA, carrying out Base64 coding on an encryption result, and taking the obtained coding result A as a signature;
And S030, adding the signature into the first signaling to obtain a second signaling with reinforced reliability, and adopting the second signaling to replace the signaling message.
In this embodiment, before deep packet analysis is performed on the signaling message, the application layer protocol of the traffic can be initially identified through information such as keywords and ports, and since the video session transmitted by using GB35114 already has signature content for preventing falsification, falsification and playback, step S000 is not required to be performed on the video session, and for the video session transmitted by using SIP or GB28181, the signaling message is a plaintext signaling, encryption and signature can be performed on the plaintext signaling by using step S000, and the implementation can be performed by steps S010-S030.
In this embodiment, by executing step S010, a time stamp Data may be added TO the signaling message TO form a first signaling with a structure { METHOD, FROM, TO, CALL-ID, information body, data }, where { METHOD, FROM, TO, CALL-ID, information body } is an information message before adding Data, where METHOD represents a signaling METHOD, FROM represents a terminal for sending a video session, such as a camera or a terminal for storing a video session, TO represents a video management platform for receiving a video session, and CALL-ID represents a number of a video session.
In this embodiment, the { METHOD, FROM, TO, CALL-ID, information body, data } may be encrypted by the hash algorithm HMACSHA to generate a key, the key used in encryption is generated by the video session reliability evaluation device, after encryption, the encryption result is encoded by the Base64 encoding algorithm, and the encoding result a is added to the first signaling to generate a second signaling, where the second signaling has the structure of { METHOD, FROM, TO, CALL-ID, information body, data, a }, and in the video session, the second signaling is used to replace the information message { METHOD, FROM, TO, CALL-ID, information body }, to generate an information message with reinforced reliability, and in executing step S110, the information message with reinforced reliability is subjected to deep packet analysis.
In this embodiment, by encrypting and signing the plain text signaling of SIP or GB28181, reliability reinforcement of the signaling message is achieved, and attacks such as tampering and playback on the plain text signaling are avoided.
In an exemplary embodiment, step S133 may include steps S1331-S1333:
S1331, acquiring a time difference between the current time and the time stamp;
S1332, if the time difference is smaller than or equal to the preset effective time, carrying out encryption operation with a key on the first signaling by adopting the hash algorithm HMACSHA and carrying out Base64 coding on an encryption result to obtain a coding result A ', if A' =A, setting the signature reliability S of the signaling message as the first preset signature value, and if A '=A, setting the signature reliability S of the signaling message as a third preset signature value if A' =A, carrying out signature error;
s1333, if the time difference is larger than the preset effective time, setting the signature reliability S of the signaling message as the second preset signature value;
In this embodiment, the first preset signature value > the second preset signature value > the third preset signature value.
In this embodiment, when the application layer protocol is SIP or GB28181 and the signature information indicates that there is a signature, a signature verification operation is performed, the signature reliability is set according to the signature verification result, steps S331-S333 may be performed to verify the signature, and the signature reliability is set according to the signature verification result, where the first preset signature value may be 100, the second preset signature value may be 60, and the third preset signature value may be 10.
In this embodiment, in combination with steps S131, S132, S1331-S1333, the settings of the signature confidence level S are shown in table 2.
Table 2 table of settings for signature confidence level s
In an exemplary embodiment, step S200 may include steps S210-S220:
S210, taking min { Y } as the signaling credibility Y i of the video session, wherein min { Y } is the minimum value in the signaling credibility Y corresponding to all signaling messages of the video session;
and S220, taking min { S } as the signature credibility S i of the video session, wherein min { S } is the minimum value in the signature credibility S corresponding to all signaling messages of the video session.
In one implementation manner of this embodiment, when executing step S210, the signaling credibility Y of all signaling messages of the video session may be obtained, then the minimum value is taken as the signaling credibility Y i of the video session, for example, the video session corresponds to 20 signaling messages, since the signaling credibility Y corresponds to the signaling messages one by one, 20 signaling credibility Y is obtained, the minimum value in the 20 signaling credibility Y is taken as the signaling credibility Y i of the video session, when executing step S220, the signature credibility S of all signaling messages of the video session may be obtained, then the minimum value is taken as the signature credibility S i of the video session, for example, the video session corresponds to 20 signaling messages, since the signature credibility S corresponds to the signaling messages one by one, 20 signature credibility S is obtained, and the minimum value in the 20 signature credibility S is taken as the signature credibility S i of the video session.
In another implementation of this embodiment, when step S210 is performed, for the video session, after the signaling trustworthiness Y 1 and Y 2 corresponding to the first two signaling messages are obtained, the smaller value in Y 1 and Y 2 is tentatively set as the signaling trustworthiness Y i of the video session, after the signaling trustworthiness Y 3 corresponding to the third signaling message is obtained, the smaller value in Y 3 and Y i is tentatively set as the signaling trustworthiness Y i of the video session, and so on until the signaling trustworthiness Y i of the video session is obtained, when step S220 is performed, for the video session, the smaller value in S 1 and S 2 is tentatively set as the signaling trustworthiness S i of the video session, after the signaling trustworthiness Y 3 corresponding to the third signaling message is obtained, the signature is tentatively set as the signaling trustworthiness S 3 of the video session, and so on until the signature is tentatively set as the signaling trustworthiness S 3 of the video session is obtained, and so on until the signature is tentatively set as the signature trustworthiness S6295 of the video session is obtained.
In an exemplary embodiment, step S300 may include steps S310-S320, wherein step S320 may include steps S321-S325:
S310, when the application layer protocol of the video session is SIP or GB28181, setting the video stream security L i of the video session to a fourth preset security value;
s320, when the application layer protocol of the video session is GB35114, executing steps S321-S324 when one program stream containing key frames in the video stream is obtained:
S321, positioning a PSM position in the program stream, and acquiring a coding type field of the PSM;
s322, if the coding type field indicates that the coding type is h264 or mpeg4, judging that the security level of the program stream is A level, and setting the security level of the program stream as a first preset security value;
s323, if the coding TYPE field indicates that the coding TYPE is svac, locating the NALU position of the program stream, obtaining NALU_TYPE field in NALU header, if the NALU_TYPE field is converted into decimal value to be 9, then bytes immediately following the NALU header are safety parameter sets, obtaining the safety parameter sets;
S324, converting the security parameter set into binary data, wherein the first bit in the binary data is an encryption_flag, the second bit is an authentication_flag, if only the authentication_flag in the encryption_flag and the authentication_flag is 1, the security level of the program stream is judged to be B level and the security level of the program stream is set to be a second preset security value, and if the encryption_flag and the authentication_flag are both 1, the security level of the program stream is judged to be C level and the security level of the program stream is set to be a third preset security value;
And S325, taking the minimum value as the video stream security L i of the video session in the security degrees respectively corresponding to all program streams containing the key frames.
In this embodiment, the fourth preset security value < the first preset security value < the second preset security value < the third preset security value, the fourth preset security value may be 60, the first preset security value may be 70, the second preset security value may be 80, and the third preset security value may be 100.
In this embodiment, when the application layer protocol of the video session is SIP or GB28181, step S310 is executed, where the video stream security level L i of the video session may be directly set to a fourth preset security value, for example, set to 60.
In this embodiment, when the application layer protocol of the video session is GB35114, the video stream may correspond to a plurality of program streams PS, where the program stream PS including the key frame is shown in fig. 2, the program stream PS including the key frame is shown in hexadecimal in fig. 2, the program stream PS including the key frame starts in a fixed format 000001ba, and may be parsed into a PSM, and the coding type of the program stream shown in fig. 2 is svac.
In this embodiment, the fixed format 000001ba representing the start of the program stream PS is followed by PS header, SYSEM HEADER, PSM, PES and NALU in this order, where PES is an elementary stream packet (fully packed ELEMENTARY STREAM), NALU is a network abstraction layer unit (fully Network Abstraction Layer Unit), in PSM, after PSM start code, length code, info len and map len is a coding type field, when the coding type field is 1b, indicating the coding type is h264, when the coding type field is 10, indicating the coding type is mpeg4, when the coding type field is 80, indicating the coding type is svac, as shown in fig. 3, where fig. 3 and 2 are the same program stream PS, and where the coding type is h264 or mpeg4, the security of the program stream may be set to 70.
In this embodiment, if the encoding TYPE is svac, after PSM and PES, the NALU header is located by the NALU start code 00000001, and the NALU header is located after the NALU start code 00000001, as shown in fig. 3, e4 is included in the NALU header, for example, the nalu_type field is converted into binary number 11100100, 1001 is the nalu_type field, the decimal number corresponding to 1001 is 9, the NALU header is then a security parameter set, as shown in fig. 3, c7 is converted into binary data 11000111, and the first bit and the second bit are both 1, the security of the program stream shown in fig. 2 and 3 can be set to 100, and when the nalu_type field is converted into decimal number other than 9, the security of the program stream can be set to 70, and if the nalu_type field is converted into binary number 9, and the security parameter set is converted into binary number, the security of the second bit is only 1, and the security of the program stream can be set to 80.
In this embodiment, the security level is determined by using the program stream including the key frame, because three security levels, level A, level B, and level C, can be determined by using the program stream including the key frame, the security level is level C when the program stream including the key frame is both encrypted and signed, the security level is level B when the program stream including the key frame is only signed, the security level is level A when the program stream including the key frame is neither encrypted nor signed, and the program stream not including the key frame can only determine whether the program stream is level C, the security level is level C when the program stream is encrypted, and the security level is not level C when the program stream is not encrypted, as shown in Table 3 for the areas of the key frame and the non-key frame.
Table 3 shows the distinction between program streams that include key frames and program streams that do not include key frames
In this embodiment, in combination with step S310 and steps 321 to S324, the security settings of the program stream are shown in table 4:
Table 4 security level setting table for program streams
In the present embodiment, in the prior art, in a video session with an application layer protocol of GB35114, three levels are generally determined A, B, C based on signaling messages with signature and encryption, but a portion of signaling messages of GB35114 does not indicate whether to encrypt and join the signature, and in this case, three levels A, B, C cannot be determined, in which, in the present embodiment, the security level is classified into three levels A, B, C, that is, three levels A, B, C, wherein the security of level C is the highest, the security of level B is centered, and the security of level a is the lowest, by determining the security of video session with an application layer protocol of GB35114 through a program stream including a key frame.
In one implementation manner of this embodiment, there may be a plurality of program streams including key frames in the program streams of the video session, and when step S325 is performed, after the security L corresponding to each program stream including a key frame is obtained, the minimum value is then taken as the video stream security L i of the video session, for example, the video stream of the video session corresponds to 20 program streams including a key frame, the security L corresponds to the program stream including a key frame one by one, 20 security L are obtained in total, and the minimum value is taken as the video stream security L i of the video session in the 20 security L.
In another implementation manner of this embodiment, there may be a plurality of program streams including key frames in the program stream of the video session, after the security degrees L 1 and L 2 of the first two program streams including key frames are obtained in the execution of step S325, the smaller value in L 1 and L 2 is tentatively set as the video stream security degree L i of the video session, after the security degree L 3 corresponding to the third program stream including key frames is obtained, the smaller value is continuously selected in L 3 and L i, tentatively set as the video stream security degree L i of the video session, and so on until the video stream security degree L i of the video session is obtained.
In an exemplary embodiment, step S400 may include step S410:
S410, obtaining the credibility K i of the video session according to a formula K i=WYYi+WSSi+WLLi, wherein W Y、WS、WL is the weight of Y i、Si and L i respectively.
In this embodiment, after step S410 is performed, step S420 may also be performed:
S420, if Y i of the video session is larger than or equal to preset signaling credibility, S i is larger than or equal to preset signature credibility, L i is larger than or equal to preset video stream safety, or K i is larger than or equal to preset credibility, the video session is sent to the video management platform.
In this embodiment, for a certain video session, whether to send the video session to the video management platform may be determined according to one of the signaling reliability Y i, the signature reliability S i, the video stream security L i, and the reliability K i corresponding to the video session, for example, the video management platform only receives a video session with the reliability K i greater than or equal to the preset reliability, and sends the video session meeting the condition that "K i is greater than or equal to the preset reliability" to the video management platform.
In an exemplary embodiment, after performing steps S100-S400 for each video session, obtaining the reliability K i of each video session sent to the video management platform through the video network, steps S510-S520 may further include:
S510, calculating an average value based on the credibility K i of all video sessions, and taking the average value as the overall credibility K of the video network;
S520, if the integral credibility K is more than or equal to the preset integral credibility, all video sessions are sent to the video management platform through the video network.
In this embodiment, the formula can be usedThe method comprises the steps of calculating the overall credibility K of n video sessions, wherein the overall credibility K is an average value of the credibility of the n video sessions, the overall credibility K can be used as a basis for evaluating whether a video network is credible, if K is more than or equal to the preset overall credibility, the video network can be indicated to be credible, and all the video sessions in the video network can be sent to a video management platform.
The embodiment of the application also provides a video session credibility assessment device, which comprises a memory and a processor, as shown in fig. 4:
the memory is used for storing a video session credibility evaluation program;
The processor is configured to read the video session reliability evaluation program and perform the video session reliability evaluation method according to the foregoing embodiment.
Those of ordinary skill in the art will appreciate that all or some of the steps, systems, functional modules/units in the apparatus, and methods disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware implementation, the division between functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components, for example, one physical component may have a plurality of functions, or one function or step may be cooperatively performed by several physical components. Some or all of the components may be implemented as software executed by a processor, such as a digital signal processor or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term "computer storage media" includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as known to those skilled in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer. Furthermore, as is well known to those of ordinary skill in the art, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.

Claims (10)

1.一种视频会话可信度评估方法,其特征在于,对经过视频网络向视频管理平台发送的每一个视频会话执行以下操作,包括:1. A method for evaluating the credibility of a video session, characterized in that the following operations are performed on each video session sent to a video management platform via a video network, including: 每获取到该视频会话的一个信令报文,对该信令报文进行深度包解析,获得会话信息、协议信息、信令内容和签名信息;基于所述会话信息和所述信令内容获取该信令报文的信令可信度y;基于所述协议信息,或者基于所述协议信息和所述签名信息获取该信令报文的签名可信度sEach time a signaling message of the video session is obtained, deep packet parsing is performed on the signaling message to obtain session information, protocol information, signaling content and signature information; based on the session information and the signaling content, a signaling credibility y of the signaling message is obtained; based on the protocol information, or based on the protocol information and the signature information, a signature credibility s of the signaling message is obtained; 基于该视频会话的所有信令报文的所述信令可信度y,获取该视频会话的信令可信度Y i ;基于该视频会话的所有信令报文的所述签名可信度s,获取该视频会话的签名可信度S i Based on the signaling credibility y of all signaling messages of the video session, the signaling credibility Yi of the video session is obtained; based on the signature credibility s of all signaling messages of the video session, the signature credibility Si of the video session is obtained ; 获取该视频会话的视频流,基于所述视频流中的关键帧获取该视频会话的视频流安全度L i Obtain a video stream of the video session, and obtain a video stream security level L i of the video session based on key frames in the video stream; 根据所述信令可信度Y i 、所述签名可信度S i 和所述视频流安全度L i 获得该视频会话的可信度K i Obtaining the credibility K i of the video session according to the signaling credibility Y i , the signature credibility S i and the video stream security L i ; 其中,i代表该视频会话为第i个视频会话。Here, i represents that the video session is the i- th video session. 2.如权利要求1所述的视频会话可信度评估方法,其特征在于,所述基于所述会话信息和所述信令内容获取该信令报文的信令可信度y,包括:2. The method for evaluating the credibility of a video session according to claim 1, wherein the step of obtaining the signaling credibility y of the signaling message based on the session information and the signaling content comprises: 根据所述会话信息和所述信令内容建立会话状态;Establishing a session state according to the session information and the signaling content; 获取所述会话状态对应的可信信令集和异常信令集,如果所述信令内容在所述可信信令集中,则将该信令报文对应的信令可信度y设置为预设可信值;如果所述信令内容为所述异常信令集中的一个异常信令,则将该信令报文对应的信令可信度y设置为所述异常信令对应的分值;Obtain the trusted signaling set and the abnormal signaling set corresponding to the session state; if the signaling content is in the trusted signaling set, set the signaling credibility y corresponding to the signaling message to a preset credibility value; if the signaling content is an abnormal signaling in the abnormal signaling set, set the signaling credibility y corresponding to the signaling message to the score corresponding to the abnormal signaling; 其中,所述异常信令集包括一个异常信令或多个不同的异常信令,每一个异常信令对应一个分值,所述分值小于所述预设可信值。The abnormal signaling set includes one abnormal signaling or a plurality of different abnormal signalings, each abnormal signaling corresponds to a score, and the score is less than the preset credible value. 3.如权利要求1所述的视频会话可信度评估方法,其特征在于,所述基于所述协议信息,或者基于所述协议信息和所述签名信息获取该信令报文的签名可信度s,包括:3. The method for evaluating the credibility of a video session according to claim 1, wherein the acquiring the signature credibility s of the signaling message based on the protocol information, or based on the protocol information and the signature information, comprises: 当所述协议信息指示应用层协议为GB35114,设置该信令报文的签名可信度s为第一预设签名值;When the protocol information indicates that the application layer protocol is GB35114, the signature credibility s of the signaling message is set to a first preset signature value; 当所述协议信息指示应用层协议为SIP或GB28181且所述签名信息指示无签名时,设置该信令报文的签名可信度s为第二预设签名值;When the protocol information indicates that the application layer protocol is SIP or GB28181 and the signature information indicates that there is no signature, setting the signature credibility s of the signaling message to a second preset signature value; 当所述协议信息指示应用层协议为SIP或GB28181且所述签名信息指示有签名时,执行验签操作,根据验签结果设置该信令报文的签名可信度sWhen the protocol information indicates that the application layer protocol is SIP or GB28181 and the signature information indicates that there is a signature, a signature verification operation is performed, and the signature credibility s of the signaling message is set according to the signature verification result. 4.如权利要求3所述的视频会话可信度评估方法,其特征在于,在所述对该信令报文进行深度包解析之前,包括:4. The method for evaluating the credibility of a video session according to claim 3, characterized in that before performing deep packet parsing on the signaling message, it comprises: 当该视频会话的应用层协议为SIP或GB28181时,对该信令报文执行以下加密和签名操作:When the application layer protocol of the video session is SIP or GB28181, the following encryption and signing operations are performed on the signaling message: 在该信令报文中加入Data字段获得第一信令,其中,所述Data字段代表时间戳;Adding a Data field to the signaling message to obtain a first signaling, wherein the Data field represents a timestamp; 采用杂凑算法HMACSHA256对所述第一信令进行有密钥的加密操作,并对加密结果进行Base64编码,将获得的编码结果A作为签名;The first signaling is encrypted with a key using the hash algorithm HMACSHA256, and the encryption result is Base64-encoded, and the obtained encoding result A is used as a signature; 将所述签名加入所述第一信令获得可信度加固后的第二信令,采用所述第二信令代替该信令报文。The signature is added to the first signaling to obtain a second signaling with enhanced credibility, and the second signaling is used to replace the signaling message. 5.如权利要求4所述的视频会话可信度评估方法,其特征在于,所述执行验签操作,根据验签结果设置该信令报文的签名可信度s,包括:5. The method for evaluating the credibility of a video session according to claim 4, wherein the performing of the signature verification operation and setting the signature credibility s of the signaling message according to the signature verification result comprises: 获取当前时刻与所述时间戳的时间差;Get the time difference between the current time and the timestamp; 如果所述时间差小于或等于预设有效时间,则对所述第一信令采用所述杂凑算法HMACSHA256对所述第一信令进行有密钥的加密操作,并对加密结果进行所述Base64编码,获得编码结果A’,如果A’=A则签名正确,将该信令报文的签名可信度s设置为所述第一预设签名值;如果A’≠A则签名错误,将该信令报文的签名可信度s设置为第三预设签名值;If the time difference is less than or equal to the preset valid time, the hash algorithm HMACSHA256 is used to perform a key encryption operation on the first signaling, and the encryption result is Base64 encoded to obtain the encoding result A', if A'=A, the signature is correct, and the signature credibility s of the signaling message is set to the first preset signature value; if A'≠A, the signature is wrong, and the signature credibility s of the signaling message is set to the third preset signature value; 如果所述时间差大于所述预设有效时间,将该信令报文的签名可信度s设置为所述第二预设签名值;If the time difference is greater than the preset validity time, setting the signature credibility s of the signaling message to the second preset signature value; 其中,所述第一预设签名值>所述第二预设签名值>所述第三预设签名值。Among them, the first preset signature value>the second preset signature value>the third preset signature value. 6.如权利要求1所述的视频会话可信度评估方法,其特征在于,所述基于该视频会话的所有信令报文的所述信令可信度y,获取该视频会话的信令可信度Y i ;基于该视频会话的所有信令报文的所述签名可信度s,获取该视频会话的签名可信度S i ,包括:6. The method for evaluating the credibility of a video session according to claim 1, wherein the step of obtaining the signaling credibility Y i of the video session based on the signaling credibility y of all signaling messages of the video session and obtaining the signature credibility S i of the video session based on the signature credibility s of all signaling messages of the video session comprises: 将min{y}作为该视频会话的所述信令可信度Y i ,其中,min{y}为该视频会话的所有信令报文对应的所述信令可信度y中的最小值;min{ y } is used as the signaling credibility Yi of the video session, wherein min{ y } is the minimum value of the signaling credibility y corresponding to all signaling messages of the video session ; 将min{s}作为该视频会话的所述签名可信度S i ,其中,min{s}为该视频会话的所有信令报文对应的所述签名可信度s中的最小值。Min{ s } is used as the signature credibility S i of the video session, wherein min{ s } is the minimum value of the signature credibility s corresponding to all signaling messages of the video session. 7.如权利要求1所述的视频会话可信度评估方法,其特征在于,所述获取该视频会话的视频流,基于所述视频流中的关键帧获取该视频会话的视频流安全度L i ,包括:7. The method for evaluating the credibility of a video session according to claim 1, wherein the step of obtaining the video stream of the video session and obtaining the video stream security level L i of the video session based on key frames in the video stream comprises: 当该视频会话的应用层协议为SIP或GB28181时,将该视频会话的所述视频流安全度L i 设置为第四预设安全值;When the application layer protocol of the video session is SIP or GB28181, the video stream security level L i of the video session is set to a fourth preset security value; 当该视频会话的应用层协议为GB35114,每获取到所述视频流中的包含关键帧的一个节目流,执行以下操作:When the application layer protocol of the video session is GB35114, each time a program stream containing a key frame in the video stream is obtained, the following operations are performed: 定位到该节目流中的PSM位置,获取PSM的编码类型字段;Locate the PSM position in the program stream and obtain the encoding type field of the PSM; 如果所述编码类型字段指示编码类型为h264或mpeg4,则判定该节目流的安全等级为A级,且设置该节目流的安全度为第一预设安全值;If the encoding type field indicates that the encoding type is h264 or mpeg4, the security level of the program stream is determined to be level A, and the security level of the program stream is set to a first preset security value; 如果所述编码类型字段指示编码类型为svac,定位该节目流的NALU位置,获取NALUheader中的NALU_TYPE字段,如果所述NALU_TYPE字段转换为十进制的值为9,则紧邻所述NALU header之后的字节为安全参数集,获取所述安全参数集;如果所述NALU_TYPE字段转换为十进制的值不是9,则判定该节目流的安全等级为A级,且设置该节目流的安全度为所述第一预设安全值;If the encoding type field indicates that the encoding type is svac, locate the NALU position of the program stream, obtain the NALU_TYPE field in the NALUheader, and if the decimal value of the NALU_TYPE field is 9, the byte immediately after the NALU header is a security parameter set, and the security parameter set is obtained; if the decimal value of the NALU_TYPE field is not 9, determine that the security level of the program stream is A, and set the security level of the program stream to the first preset security value; 将所述安全参数集转换为二进制数据,其中,所述二进制数据中的第一位为encryption_flag,第二位作为authentication_flag,如果encryption_flag和authentication_flag中仅有authentication_flag为1,则判定该节目流的安全等级为B级且设置该该节目流的安全度为第二预设安全值;如果encryption_flag和authentication_flag均为1,则判定该节目流的安全等级为C级且设置该节目流的安全度为第三预设安全值;Convert the security parameter set into binary data, wherein the first bit in the binary data is encryption_flag, and the second bit is authentication_flag; if only authentication_flag is 1, the security level of the program stream is determined to be B-level and the security level of the program stream is set to a second preset security value; if both encryption_flag and authentication_flag are 1, the security level of the program stream is determined to be C-level and the security level of the program stream is set to a third preset security value; 在包含关键帧的所有节目流分别对应的所述安全度中,取最小值作为该视频会话的所述视频流安全度L i Among the security levels corresponding to all program streams containing key frames, the minimum value is taken as the video stream security level Li of the video session ; 其中,所述第四预设安全值<所述第一预设安全值<所述第二预设安全值<所述第三预设安全值。Among them, the fourth preset safety value < the first preset safety value < the second preset safety value < the third preset safety value. 8.如权利要求1所述的视频会话可信度评估方法,其特征在于,所述根据所述信令可信度Y i 、所述签名可信度S i 和所述视频流安全度L i 获得该视频会话的可信度K i ,包括:8. The method for evaluating the credibility of a video session according to claim 1, wherein obtaining the credibility K i of the video session according to the signaling credibility Y i , the signature credibility S i and the video stream security L i comprises: 根据公式K i =W Y Y i +W S S i +W L L i 获得该视频会话的可信度K i ,其中,W Y W S W L 分别为Y i S i L i 的权重。The credibility K i of the video session is obtained according to the formula K i = W Y Y i + W S S i + W L L i , where W Y , W S , and W L are the weights of Y i , S i, and L i respectively. 9.如权利要求1所述的视频会话可信度评估方法,其特征在于,获得经过所述视频网络向所述视频管理平台发送的每一个所述视频会话的所述可信度K i 后,还包括:9. The method for evaluating the credibility of a video session according to claim 1, characterized in that after obtaining the credibility Ki of each of the video sessions sent to the video management platform via the video network, it further comprises: 基于所有视频会话的所述可信度K i 计算平均值,并将所述平均值作为所述视频网络的整体可信度KCalculate an average value based on the credibility K i of all video sessions, and use the average value as the overall credibility K of the video network; 如果所述整体可信度K≥预设整体可信度,则将所有视频会话经过所述视频网络发送到所述视频管理平台。If the overall credibility K ≥ the preset overall credibility, all video sessions are sent to the video management platform via the video network. 10.一种视频会话可信度评估装置,包括存储器和处理器,其特征在于:10. A video conversation credibility assessment device, comprising a memory and a processor, characterized in that: 所述存储器,用于保存视频会话可信度评估程序;The memory is used to store the video session credibility assessment program; 所述处理器,用于读取所述视频会话可信度评估程序,并进行如权利要求1-9任一项所述的视频会话可信度评估方法。The processor is used to read the video session credibility assessment program and perform the video session credibility assessment method as described in any one of claims 1-9.
CN202510073057.2A 2025-01-17 2025-01-17 A video conversation credibility assessment method and device Active CN119545114B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202510073057.2A CN119545114B (en) 2025-01-17 2025-01-17 A video conversation credibility assessment method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202510073057.2A CN119545114B (en) 2025-01-17 2025-01-17 A video conversation credibility assessment method and device

Publications (2)

Publication Number Publication Date
CN119545114A true CN119545114A (en) 2025-02-28
CN119545114B CN119545114B (en) 2025-04-29

Family

ID=94706717

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202510073057.2A Active CN119545114B (en) 2025-01-17 2025-01-17 A video conversation credibility assessment method and device

Country Status (1)

Country Link
CN (1) CN119545114B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080072287A1 (en) * 2006-09-14 2008-03-20 Interdigital Technology Corporation Trust evaluation for a mobile software agent on a trusted computing platform
US8990574B1 (en) * 2010-10-06 2015-03-24 Prima Cinema, Inc. Secure device authentication protocol
CN111274578A (en) * 2018-11-20 2020-06-12 慧盾信息安全科技(苏州)股份有限公司 Data safety protection system and method for video monitoring system
CN111343146A (en) * 2020-02-04 2020-06-26 北京字节跳动网络技术有限公司 Data auditing method, system, computer readable medium and electronic equipment
CN114423000A (en) * 2021-12-16 2022-04-29 贵州航天计量测试技术研究所 Identity authentication method based on Beidou short message
CN116566733A (en) * 2023-06-25 2023-08-08 中国人民解放军陆军工程大学 Method and device for network camera behavior monitoring and analysis
CN116614599A (en) * 2023-03-13 2023-08-18 江西佳信捷电子股份有限公司 Video monitoring method, device and storage medium for secure encryption
CN118830275A (en) * 2022-02-11 2024-10-22 交互数字专利控股公司 System and method for credibility determination
CN119182521A (en) * 2024-09-03 2024-12-24 西安电子科技大学 Full-link voice communication safety protection system, method, equipment and medium based on national encryption algorithm

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080072287A1 (en) * 2006-09-14 2008-03-20 Interdigital Technology Corporation Trust evaluation for a mobile software agent on a trusted computing platform
US8990574B1 (en) * 2010-10-06 2015-03-24 Prima Cinema, Inc. Secure device authentication protocol
CN111274578A (en) * 2018-11-20 2020-06-12 慧盾信息安全科技(苏州)股份有限公司 Data safety protection system and method for video monitoring system
CN111343146A (en) * 2020-02-04 2020-06-26 北京字节跳动网络技术有限公司 Data auditing method, system, computer readable medium and electronic equipment
CN114423000A (en) * 2021-12-16 2022-04-29 贵州航天计量测试技术研究所 Identity authentication method based on Beidou short message
CN118830275A (en) * 2022-02-11 2024-10-22 交互数字专利控股公司 System and method for credibility determination
CN116614599A (en) * 2023-03-13 2023-08-18 江西佳信捷电子股份有限公司 Video monitoring method, device and storage medium for secure encryption
CN116566733A (en) * 2023-06-25 2023-08-08 中国人民解放军陆军工程大学 Method and device for network camera behavior monitoring and analysis
CN119182521A (en) * 2024-09-03 2024-12-24 西安电子科技大学 Full-link voice communication safety protection system, method, equipment and medium based on national encryption algorithm

Also Published As

Publication number Publication date
CN119545114B (en) 2025-04-29

Similar Documents

Publication Publication Date Title
CN110463156B (en) Hardware-Accelerated Payload Filtering in Secure Communications
CA2811999C (en) Signing and validating session initiation protocol routing headers
Lennox et al. Connection-oriented media transport over the transport layer security (TLS) protocol in the session description protocol (SDP)
CN108347331A (en) The method and apparatus that T_Box equipment is securely communicated with ECU equipment in car networking system
US20230283479A1 (en) Data Transmission Method and Apparatus, Device, System, and Storage Medium
JP2020532928A (en) Digital signature methods, devices and systems
CN107210910A (en) Method, electronic device and computer program for providing a hash value for a piece of data
CN111711607B (en) A blockchain-based trusted loading and verification method for streaming microservices
WO2023036348A1 (en) Encrypted communication method and apparatus, device, and storage medium
CN103401876B (en) VoIP service security assurance method and system based on scale variable window mechanism
CN101888383B (en) Method for implementing extensible trusted SSH
CN119545114B (en) A video conversation credibility assessment method and device
US20200235938A1 (en) System and methods for generating and authenticating verifiable network traffic
CN102137103A (en) Method for realizing trusted transmission of voice over internet phone (VoIP) media stream by expanding MIKEY protocol
CN112887375B (en) Block chain-based message verification method and equipment
Callas et al. ZRTP: Media path key agreement for unicast secure RTP
CN118659919B (en) Data exchange system based on GB35114 standard on gateway equipment
CN120582799B (en) Cross-domain multimode trusted authentication method for high-dynamic network
CN114726958B (en) Authentication method, device, electronic device and readable storage medium
CN118678126B (en) Self-adaptive cross-domain code stream password security protection method, system and equipment
CN113965323B (en) Certificate-free tamper-proof method and system for body measurement data
CN120017311A (en) A verifiable resource transfer method and device based on incremental encoding
CN118713904A (en) Data transmission method, system, storage medium and computer equipment
CN119854023A (en) Data security encryption processing method and system
CN116318812A (en) Verification method and device in secure multiparty calculation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant