Your most reliable partner
您最可信赖的伙伴
为商业伙伴创造前所未有的价值和机会,构建"芯“的未来世界
Product Programme
Video security solutions
Time:08-20-2019
        "Black Swan", "PRISM" and other incidents to our public video monitoring system security application sounded an alarm. According to the report, 26.35 million cameras in 8,063 cities in 228 countries and regions are exposed to the public network, which will pose a great threat to public security if they are successfully controlled by hackers.
        GB3514-2017 "video monitoring and networking information security technical requirements for public security", as the first technical standard on video monitoring and networking information security in China, for the first time puts forward clear normative requirements on video monitoring information security for public security, which is the technical basis for comprehensively strengthening information security in the field of video monitoring of public security.
        ICTK actively responded to the national policy, put forward video monitoring system key security protection solution. Through the combination of front-end device and PUF SE chip, the goal of "Trusted Identity, Controllable Device and Reliable Data" can be achieved.
        Driven by the Internet of things and big data applications, IP cameras are used on a scale. However, with the development of video monitoring application, there are many challenges. First of all, from the front-end equipment to the monitoring center, video data is "exposed" in the process of collection, transmission, storage and reading, information security protection is weak, and data and sensitive information may be leaked out of control. Secondly, mass terminal access has problems of identity authentication and large-scale management, and mass data forecasting, early warning, security and prevention processing capacity is insufficient. In addition, the current video monitoring system has a single access capability, and the application of security products and the performance of security functions are not in place.
        Based on the above security risk analysis, ICTK puts forward the following security requirements:
        1) implement device identity security authentication based on public key cryptography algorithm;
        2) to realize the authenticity, integrity and traceability of signaling and data;
        3) end-to-end video encryption and protection based on video frames to ensure the confidentiality of video data;
        4) manage user authentication based on digital certificate to ensure authorized access by legitimate users;
        5) based on public key cryptography, it is easy to update.