Real-time high-speed encryption (confidentiality) to prevent forgery, deletion, and damage of CCTV and video information data, data forgery verification (integrity) to secure decisive evidence from various criminal activities, and face masking to prevent abuse. It is a privacy protection SW system to block external leakage of personal information and manage its export.
The main functions include the function of encrypting CCTV video information in real time, preventing unauthorized leakage of video information data, automatic masking processing when exporting video, specifying the source of video information, password setting function, and providing video export management functions such as providing a dedicated viewer.
characteristic
·Video encryption technology performs high-speed encryption at over 30,000 video x-frames per second (30KFPS) and shows performance of over 99% in the encryption coverage area.
·Icert's high-speed encryption processing technology uses the standard encryption algorithm LEA method that supports the National Intelligence Service's KCMVP certification, and can provide real-time encryption of video information from multiple channels at the same time.
·Supports simultaneous recording while encrypting 32-channel video in real time based on standard specifications
·When encrypting video x-frames, high-speed encryption is possible by extracting and encrypting only specific parts that do not affect the system, rather than encrypting the entire video.
-Real-time high-speed encryption storage technology for video information
Icert's video encryption technology provides real-time encryption and storage of video information from multiple channels at the same time through a high-speed encryption function of over 30,000 x-frames per second (30 KFPS) of video x-frames. Icert's high-speed encryption processing technology uses the standard encryption algorithm LEA method, but When encrypting a video x-frame, rather than encrypting the entire video, only a specific part that does not affect the system is extracted and encrypted using its own specific pattern.
-Possesses video information data forgery prevention and forgery verification technology (patented) and an encryption method that does not require encryption key transmission (patented). ICERTI's specialized encryption method divides video data into several blocks, extracts the key in its own way based on specific block data, and uses the extracted key to encrypt the remaining data other than the specific block from which the key was extracted. By supporting the method of extracting and decrypting the key in the same way at the decryption stage without transmitting the key separately, there is no security risk due to key leakage and the burden of key management on the administrator is eliminated.
Product differentiation is that it is possible to adopt court evidence through data identity and integrity security, and by strengthening data confidentiality security, masking function, face recognition, and object detection technology can be applied. Reading, leakage and export blocking are strengthened, and the functional range of the SW system is up to 128. Channel support available.
-Real-time high-speed encryption function of video information (guarantees confidentiality)
-Prevention and verification of forgery and alteration of video information (integrity verification)
-Playback function only through dedicated viewer
-Video export function with personal information protection applied
-Automatic/manual masking function (privacy protection)
-Automatic facial masking function using AI facial recognition technology
-Video source watermark insertion function
-Exported video file password and playback period setting function
-Public benefit can be realized by securing video information data integrity, confidentiality and security
-Easy to accept evidence from forgery, alteration, deletion, etc. of video information
-Social cost reduction effect from legal battles in various criminal cases, etc.
- Strengthening privacy protection function by securing confidentiality
-Resolving negative views caused by leakage and exportation due to abuse of rights by video information control system managers and increasing the reliability of public institutions
-Effect of history management and access rights management through system log analysis
- Privacy protection and confidentiality security effects when blocking leaks and exports due to abuse of rights and requesting provision of video information from external organizations