您当前的位置是:  首页 > technology > Corporate communications > technology > Video communication > Technical abstracts >
Technology - Corporate Communications -Video Communication Technology Channel
  Home >technology > Corporate communications > technology > Video communication > Technical abstracts > An Ruo Shishi, Kodak new national secret video conference system

An Ruo Shishi, Kodak new national secret video conference system

2018-05-15 17:06:15 Author: CUT LAMPS Source:CTI ForumComment:0  Click:


Recently, Kodak, the industry's leading provider of video and security products and solutions, has officially released its state-of-the-art videoconferencing products to reconstruct security boundaries. The Kodak videoconferencing system applies the national secret algorithm developed by the country. On the one hand, it promotes the development of cryptographic technology. On the other hand, the algorithm can completely replace international common cryptographic algorithms in terms of function and security, and it can defend against existing international Password attack crisis, more effectively protect the user's video communications security.
Quantum cryptography is a new type of cryptosystem based on modern cryptography and quantum mechanics, and quantum physics methods to implement cryptographic ideas and operations. This encryption method uses a quantum state as a key for information encryption and decryption. Compared with the mathematical code, the quantum communication encryption scheme has two main advantages of unconditional security and detectability of disturbance. There is no doubt that this is a truly secure, eavesdropping and deciphering encryption technology. The quantum communication encryption technology is superimposed on the videoconferencing system that supports the country's trade secrets. It is the ultimate in the security of the video conference system.
Cyber ​​security is highly valued by the country
With the progress of the times, informatization and economic globalization have promoted each other. The Internet has been integrated into all aspects of social life and has profoundly changed people’s production and lifestyle. At the same time, it has spawned black industries such as false information and fraud, which not only infringe upon the legitimate rights and interests of users and enterprises, but also brought about many unstable factors to the public order. Network security has risen to the height of national strategy. In recent years, the regulatory policy for the information security industry has continued. As the threats to global Internet security are constantly changing and escalating, Internet security experts have summarized the three core performances of current cyber security: First, the security issue has no borders and has become a pan-globalization issue; secondly, it spans industries and enterprises. The boundary has risen as a social issue. Third, new technologies have continuously spawned rapid changes and upgrades in cyber attacks.
Cyber ​​security is like a war without gun smoke. There are different levels of threats at all levels. The national supervision of cyber security is gradually increasing. At the Central Cyber ​​Security and Informationization Leading Group meeting, Comrade Xi Jinping emphasized that cyber security and informationization are major strategic issues that concern national security and national development and affect the work and life of the broad masses of the people. We must proceed from the international and domestic trends and general layout. , Coordinate all parties, innovate and develop, and strive to build our country into an internet power. In order to safeguard network security, safeguard cyberspace sovereignty and national security, and protect public interests, protect the legitimate rights and interests of citizens, legal persons and other organizations, and promote the healthy development of economic and social information, the State has formulated and implemented the "PRC Cyber ​​Security Law." To monitor, defend, and dispose of cyber security risks and threats originating from home and abroad, protect key information infrastructure from attacks, intrusions, interference, and destruction, and maintain cyberspace security and order.
Security is the pain point for videoconferencing users
Video conferencing has been in the telecommunications industry for more than 50 years. It was born in the 1960s and has entered all aspects of social life after experiencing three stages of analog video conferencing, digital video conferencing, and internationally standardized digital videoconferencing; The rapid development of the conference system industry is also facing security challenges, resulting in attacks such as the disclosure of private information, the interception of conference content, the impersonation of participants, the disruption of conferences, and the insertion of illegal information, which seriously affect the information security of government and enterprises.
In particular, the main users of the videoconferencing system are the government, military, aerospace, public security, judiciary, energy, water conservancy, telecommunications, education, and news, and other key industries. Their "level of protection for information security" reaches level 3 or above, once the government agencies, When enterprises hold video conferences, they have security problems and the consequences are unthinkable. Therefore, the videoconferencing platform must have security and confidentiality mechanisms to ensure that the conference is not compromised due to illegal monitoring and recording, and that it has a standardized, secure and reliable communication encryption mechanism.
There are various security threats in current videoconferencing systems, and cryptographic algorithms are one of the most powerful solutions to various information security problems.
What is a national secret?
National secret is the country's commercial password, a set of our own communications encryption algorithm system, and foreign AES, DES and other encryption algorithms are the same point to ensure the transmission of keys on the communications link security, the difference is that the secret is China's independent research and development, self-controllable encryption algorithm, and AES, DES and other encryption algorithms are not controllable abroad. The country secret algorithm is widely used in China and has reached the international advanced level. The country secret algorithm should help reverse the passive situation in which core technologies and products are subject to human beings and significantly improve our national security.
Several dimensions of national security promotion
a) Full support for localization, self-controllability, no dependence on foreign technology, no backdoor threats;
b) The security is even higher. At present, the secret algorithm will not be cracked, and important information will not be in danger of leaking. If something goes wrong, the country will correct it in time.
c) Better performance, more in line with national conditions, the most fundamental way to ensure safety is that the basic software and the underlying hardware are controlled by themselves. At present, China is unable to localize in the short term, and data encryption is the best method.
d) The key is stored in the security chip, effectively preventing the key from being stolen;
e) Use digital certificates/dynamic passwords for strong identity authentication to ensure that user identities are not counterfeited due to password leakage or cracking;
f) The secret SM1 algorithm is not publicly available and can only be implemented in hardware, further reducing the risk of being compromised.
What is Quantum Encrypted Communication?
The first thing to understand is what quantum is. A hundred years ago, when Planck studied blackbody radiation, he discovered that energy was discontinuous, and thus started the curtain of the quantum physics revolution in the early 20th century. After more than one hundred years of development, quantum theory has become one of the two cornerstones of modern physics.
Quantum mechanics gave birth to the first quantum revolution since its establishment 100 years ago. From atomic bombs to chips, to lasers, all originated from quantum mechanics. This is macroscopic top-down application of quantum mechanics. At present, in academic circles, we are standing on the second quantum revolution, which is the principle, form, and law of applying quantum mechanics from the bottom up. For example, it has received extensive attention at home and abroad, and it is also a cross-cutting field in physics and information science. Quantum science and information science have spawned quantum computing, quantum communication, and quantum measurement. Our current quantum communication actually comes from a simple application of quantum mechanics. It may be the simplest application. The current quantum key distribution has achieved very good practical results, solving many traditional cryptography millennia failed to solve. The fundamental security issue.
Quantum communication is the technology that encodes and transmits information through quantum states. The carrier of information is not the same, and the special features of the carrier are reflected in the information to be transmitted. Quantum has three characteristics: entanglement, non-clonability, and uncertainty. Quantum encryption communication is based on these three characteristics, so as to ensure the security of photon transmission and the communication link is not eavesdropped, thus ensuring the safety of the user communication link. . Quantum communication technology is an encryption communication technology that China is in a leading position in the world.
Videoconferencing system based on quantum privacy
Keda released a videoconferencing system based on quantum secrecy that uses quantum communication to implement absolute secure key exchange between the two parties. Then both parties use the key to use a symmetric cryptographic algorithm (such as AES, SM4, SM1, etc.) for signaling. The stream is encrypted to achieve secure communication. Because the video conference code stream traffic is very large and cannot be transmitted directly on the quantum network, the encrypted signaling and code stream are still transmitted on the traditional network (such as LAN, private network, Internet, etc.). However, as the most critical part of the videoconferencing security, the key uses quantum communication in the key transmission, making the key transmission truly foolproof.

Kodak National Secret Series Product Logo
Kodak has been cultivating the video communications market for almost 20 years. As early as 2003, Kodak took the lead in introducing domestic MPEG4-based standard definition video conferencing products, raising the industry's video clarity from CIF to 4CIF. In 2005, Kodak launched a full range of H.264 products. In 2008, Kodak launched a high-definition video conference and upgraded HD to 1080@60p in 11 years. In addition to technical proactiveness, Kodak has always been concerned about the stability and reliability of the system. In 2006, it provided 1+1 hot backups, N+1 backups, line backups, and redundant backups for carrier-class MCUs. Protection. In 2016, Kodak introduced a new generation of cloud-based H.265 video conferencing system, bringing the definition to the 4K era. Last year, Kodak introduced hybrid cloud technology into the videoconferencing industry. Through the combination of industrial cloud and public cloud, the company will bring ubiquitous and ubiquitous video communications experience to users.
It can be seen that after 17 years of accumulation, Kodak has reached the leading domestic and international level in the three core areas of cloud computing and H.265/4K. Through cloud computing technology, Kodak provides customers with stable, reliable, Large capacity, auto-scaling platform service. With the H265 and 4K, Kodak can provide ultra-clear audio and video experience for video communications, ultra-low network bandwidth usage and excellent network adaptability. After the video communications industry came to a cloud and ultra-clear era, Kodak believes that intelligence is the development trend of video communications, and security has become the most basic and most necessary condition for video communications.
As we all know, the three elements of video conferencing are platforms, terminals, and links. The security of the transmission link is the most critical factor in ensuring the security of video conferencing information. Encryption of the transmission stream is the primary means of ensuring security for video conferencing vendors. Encryption algorithms and key distribution are the core elements of video conferencing system security.
From the terminal to the link to the platform to use, Kodak has an end-to-end security solution, and the application of encryption algorithms is interlocking in all aspects. Kodak offers different solutions from the terminal, the link, to the platform to the use. In the authentication phase, two-factor authentication for static passwords, digital certificates, and dynamic passwords is provided; on the link, the content is confidential and complete, and key exchange, symmetric encryption, and secure transmission are implemented. The key exchange phase also supports quantum encryption; the access control layer provides multi-level administrator and user design; conference business design provides multiple levels of conference security.
At the product level, based on the complete set of conference systems of the state secrets, this includes the SSU national secret encryption unit, CA server, and dynamic password server on the platform side. On the terminal side, there is an SSC encryption card and a dynamic port token.
The Kodak secret encryption conference process is that the encryption algorithm of the transmission link is changed from the classic RSA/AES to the national secret, and the encryption algorithm is truly autonomous and controllable. That is, on the transmission link, algorithms such as RSA/AES are replaced with country secret algorithms, and SM1, SM4, and various levels of security levels for strong authentication conferences are provided.
With the release of the Kodak State Secret and Quantum Confidential Conference System, we believe that these products of Kodak Company are in line with the state’s requirements for network security and can help customers achieve independent and controllable security, so as to better serve high-end government clients. It will inevitably lead the security technology direction of the entire video communication industry, and it will further enhance the security of cloud conferences and promote the cloudization of video communications. Safety is a very big issue and an industrial chain. It takes a long way to go, and Kodak will continue to increase the research and development of safety technology and bring more value to customers along with upstream and downstream suppliers.
[Disclaimer] This article only represents the author's own opinion and has nothing to do with the CTI Forum. The CTI Forum maintains its neutrality in the presentation of statements and opinions, and does not provide any express or implied warranty for the accuracy, reliability or completeness of the contents contained therein. Readers are for reference only, and please bear full responsibility for yourself.

Recommended reading

Topics