China's first network HD video surveillance security solution strong attack

As we all know, networking is the main trend in the development of video surveillance industry. IP-based network video surveillance and solutions are changing the relatively closed analog surveillance-based local monitoring model. Users are no longer limited to local access, access to video resources, but can access and obtain the required video remotely and easily, anytime, anywhere. Even now they face the challenge of some new technologies such as HD-SDI and other high-definition technologies. Basically, it will become the main trend of video surveillance applications. This is beyond doubt.

However, from the perspective of IT or CT applications, the open IP technology also brings some new technical threats, that is, the security of video data. Security is the only key word for video surveillance. How to ensure the security of network HD video data in video capture, transmission, decoding, playback, and video recording to achieve secure access and use, and to avoid malicious access and virus attacks caused by IP Malicious control, malicious tampering with video and other issues have caused some manufacturers to think. Tongfang (Shenzhen) Cloud Computing Technology Co., Ltd., relying on its strong technical strength, has profound expertise in network technology, video image technology, encoding compression algorithms, and security technologies. It has discovered and first published the industry's first end-to-end Security network high-definition video surveillance solutions, including a series of secure encrypted network HD cameras, security video storage devices NVR, security network video surveillance management platform VMS.

First, the network HD video surveillance faces security threats Digital and network technology further guide the development trend of video surveillance industry technology, products and solutions, especially in the past two years, in the analog video upgrade or network new project, the network Technology basically occupies a dominant position. In fact, according to survey data, by 2015, in the field of high-definition surveillance, network video surveillance products will occupy more than 70% market share. Compared to traditional video surveillance systems, the deployment and application of video surveillance based on mature Internet architectures is simpler and more effective. However, we see that network video surveillance brings tremendous technical advantages, product advantages, program advantages, and application advantages. Also note the new security threats posed by the open IP network in the field of video surveillance applications.

The first is attacks from the Internet. Network attacks are not new in the field of IT or communications. However, the scale application of network technologies in the field of video surveillance inevitably faces similar problems: Trojans, viruses, denial of service attacks, and hacking attacks.

Second, malicious access from the network. Currently, there are some webcam addresses through Google GOOGLE search on the Internet. It can capture network cameras installed around the world through simple technical processing, and can adjust camera angles and PTZ controls. There have even appeared companies specializing in online live broadcast of global network cameras, providing video services for special needs.

In addition, attacks from hackers are no longer the vision of directors in the United States. They are actually happening. Hacking Webcams is no longer a sensational news. Recently there have also been cases where criminals intercepted video footage of surveillance cameras and replaced surveillance information with counterfeit video material, allowing criminals to steal without fear before monitoring cameras and vividly guarding against the incredible scene in the movie.

Finally, all unencrypted video data was maliciously acquired and maliciously tampered with. The video obtained by some means can be purposely tampered with, which makes video surveillance video as a reliable evidence also has a risk.

Second, the network video surveillance encryption measures In order to deal with the above-mentioned network video surveillance there is a huge security risk, various manufacturers have also conducted targeted research for this purpose, and introduced some solutions.

The first is based on user names and passwords, or using user authentication such as 802.1x to enhance security and classify users based on permissions. This method has preliminary protective measures, but it can only solve the problem of primary equipment safety and can not effectively deal with data security. Even simple user names and passwords can be easily obtained to break through, and even now it is found that many users are almost It is rare to change the device's default user name and password.

In addition, in the deployment of network cameras, relying more on integrated network cameras, NVRs, network DVR network security technologies, such as the transmission of content using DES, 3DES, AES and other algorithms for encryption. Or hope to deploy other network devices such as security firewalls. Unfortunately, this method is effective for general users, but it is difficult for professional IT personnel and hackers to be effective. Especially using software encryption is easier to crack.

Effectively analyzing the possible ways of attack on network video surveillance is of great significance for us to deploy a more effective and safe network camera surveillance solution. In general, attacks can be divided into two main aspects. The first is the attack on data during transmission, such as interception of data during transmission, insertion of modified data, or backup of video data through transmission; On the one hand, infiltrating into image acquisition, storage or video equipment to steal confidential video information, and then process, falsify or even destroy data.

Third, China's first network video surveillance solution with stable and mature security features Today, Tongfang Cloud Computing Technology Co., Ltd. has released a hardware security encryption prevention solution with proprietary knowledge and proprietary encryption chips, including a series of products. Encryption cards, keys, and industry solutions are the first end-to-end stable and mature video surveillance solutions with security features introduced in China.

First, adopt a more comprehensive and safe user authentication technology to ensure equipment safety. The user's authority is divided more closely, and all functions are hidden or displayed based on the user's type. The general user does not have control authority. The administrator user must have the corresponding key to be able to log in to the device.

Secondly, at the network layer and transport layer, IPSEC encryption is used to implement device communication based on the SIP session protocol, and TLS is used to encrypt the SIP messages one by one. RSA (1024-bit and 2048-bit optional) session keys are used during transmission. Encryption, the transmission content using DES, 3DES, AES and other algorithms for encryption.

In addition, the hardware encryption chip that uses the same party's own encryption algorithm certified by the National Encryption Bureau is used for image encryption and decryption in front-end image capture devices such as cameras, back-end storage decryption and display devices such as NVRs, DVRs, and VMS software. It is worth noting that this is a complete hardware encryption and decryption method, basically impossible to achieve by any means to crack. The security decryption card provided by the same party to the user must be provided with a key to implement the decryption function. Only users with secret cards and keys can access the network cameras, video preview, playback, video search, device management, and user configuration.

It is worth noting that encrypted video data can be flexibly configured according to the needs of users to achieve different realistic effects.

The secure encrypted network video surveillance equipment released by Tongfang Cloud Computing Technology Co., Ltd. can provide customers with more secure, reliable and effective end-to-end products and comprehensive solutions.

1. A series of high-definition security encryption cameras, including 1.3 million pixels 720P@30FPS, 2 million pixels 1080@P30FPS, and 3 million and 5 million pixels series of bolts, hemispheres, infrared hemisphere, infrared one machine and high-speed ball.

TF-NZ Series Security (SC Series) Network HD Infrared Camera - Support 1.3 million, 2 million, 3 million Sony's latest ultra-low illumination CMOS

- Support 720P60FPS, 1080P30FPS, the first to support the highest resolution 1080P60FPS

-Comprehensive security features, the first in China to introduce comprehensive security features - support Tongfang protocol, support ONVIF/PSIA open protocol - optimized H. 264 codec algorithm to improve coding efficiency and reduce bandwidth and storage requirements;

-Comprehensively optimized image processing technology supports ultra-wide dynamic and ultra-low illumination - Built-in megapixel 2.8-12mm (optional 4-9mm) auto iris lens - Intelligent infrared design, 42 infrared lamps, infrared distance 30-50 meters , IP66

- Supports SD memory, alarm, audio, 485 control, local CVBS video output - DC12V, DC12V & AC24V dual power supply, POE

2. The series of high-definition security encryption and video recording equipment NVR supports up to 32/48/96/128 2Mbps video and video transmission and 32-channel video search, with the same side security features, support for the same side of the independent security video, decryption function, maximum support 24, Hardware RAID (0, 1, 5, 6, 10) operation, support enterprise-class SATAII hard drive.

3. TF-CloudVisionC security network camera client V1.0, high-definition video preview, video, etc., you can choose to record secure encryption or ordinary video stream, management of high-definition video decoding, decoding and video playback.

4. TF-CloudVisionS2.0 security network video management platform software, centralized management platform for the centralized management of multi-channel security HD network cameras and video.

The above series of products have the following characteristics:

1. Domestic security The first and only high-definition network camera with security encryption feature introduced by the company can complete the following security features: In addition to IPSEC, DES, 3DES, AES and other security measures at the network layer and transport layer Data encryption before the occurrence of data is the first encryption algorithm to use the secret authentication, with independent intellectual property rights.

2. The first HD network camera to provide security encryption features, NVR, CMS or VMS end-to-end products.

3. The use of hardware encryption cards, hardware decryption cards and keys, support USB decryption cards, PCI decryption cards to meet the needs of different customers. (USB decryption card, PCI decryption card need to purchase separately)

4. The decryption process must: hardware decryption cards (UKEY or PCIKEY), and each customer's unique one key file is indispensable. Deletion cannot be achieved without any one of them.

5. The key file is a key for each customer, corresponding to the customer name or key identification, traceable.

Tongfang's "security, network, high-definition, and intelligent cloud security platform" will provide users with completely different security experience. With more than ten years of experience in networking and IT technology, Tongfang has integrated the latest digital technologies, image processing technologies and cloud computing technologies to provide global security products solutions that provide more professional and efficient security products and solutions for users around the world. , applications and services.

Electric heating plate

China Intelligent Temperature Hot Plate,Intelligent Temperature Portable Hot Plate manufacturer, choose the high quality Intelligent Temperature Double Hot Plate,Intelligent Temperature Industrial Hot Plate, etc.

Intelligent Temperature Hot Plate,Intelligent Temperature Portable Hot Plate,Intelligent Temperature Double Hot Plate,Intelligent Temperature Industrial Hot Plate

Zenith Lab (Jiangsu) Co.,Ltd , https://www.zenithlabo.com