Jaste Solar Technology Co.,Ltd

Technical support

Contact Us

Video surveillance storage device operating characteristics and encryption

Sep 29, 2017

1 (3).jpg

Video surveillance storage device operating characteristics and encryption

Video surveillance storage device operating characteristics and encryption


Storage devices are an integral part of video surveillance systems. Video storage system used in the storage device in the data read and write with other types of systems with different features.


Features one:


Digital video encoder or video server to write data to the storage device, real-time monitoring point back to the image and the screen to stream storage in the storage, the playback station to stream media to read the stored video files The This kind of reading and writing is different from the small data block or the level read and write in the ordinary database system or the file server system. Therefore, the video monitoring system is stored in the technical parameter requirements and has different big difference with other application systems.


Features two:


Large video surveillance system often have 1000-2000, or even more surveillance cameras, each camera generally use D1 format back image. Each channel D1 image rate of 2Mb / s, all cameras accumulated over a total of 200-380MB / s bandwidth required. Video capture process, the video file format generally will not change, and the code rate remains constant, the video image frame rate is generally between 15-25 frames / S, that is stored in the read and write operations, must To ensure that every 1/25 seconds can reach 200-380MB / S bandwidth, or image acquisition or playback will appear dropped frame phenomenon, unless the storage device itself is configured a large capacity cache. Therefore, video surveillance system storage requires not only bandwidth, but also requires a constant bandwidth.



Features three:


Data read and write operations for a long time. As the camera is generally 7 * 24 hours of work, even if the streaming media files using segment saving mode, the duration of the write operation may also be up to 2-6 hours, the latter part of the playback also need the same time. So the requirements of the storage has a strong long-term ability to work, to maintain a long period of stability.


Features four:


Video surveillance system generally has a large number of cameras, video images stored for a long time, so the storage capacity is huge, and with the image storage time increases, storage capacity demand is linear, explosive growth. So the video surveillance system storage must support large capacity, and the capacity is highly scalable, to meet the long-term demand for large-capacity video image storage.


When people refer to the security network applications most of the network surveillance cameras, in fact, the composition of the monitoring system is not limited to front-end products, if there is no back-end storage devices, then the huge image data can only become "clouds."


Cloud storage: through cluster applications, grid technology or distributed file system and other functions, the network will be a large number of different types of storage devices through the application software together to work together to provide external data storage and business access functions of a system.


HBA: A pluggable card that connects host computers to a network / storage device and supports multiple storage networking protocols.


IP storage: Connect to remote SANs using the IP protocol. In the Fiber Channel SAN, the IP protocol is used to send FC frames within IP packets. For non-Fiber Channel SANs, SCSI data is used to convert SCSI data to IP packets.


RAID: An independent redundant disk array that requires multiple disks for improved performance and fault redundancy.


LANfree backup: Backs up data to a storage array, tape library, or other storage device without a LAN or WAN network.


Fiber Channel: Transfers data requests from the server to disk arrays, Fiber Channel switches in the SAN are used to connect to servers and storage arrays.


Block-level storage: block-level access ensures that network users do not have to manage data when they read files from disk / write files to disk, allowing network administrators to specify where data is stored to solve performance problems.


How do I encrypt the monitored video?


Through the installation of three ways to estimate the data encryption software does not work, this will lead to video abnormalities. I do not know what you are using monitoring software, can not be achieved I am not sure. But you can try the following way you can meet your request not.


Step 1: monitoring software operation usually need to login with the user name and password to operate, you can set the software in the super user a password, and then create a new limited users, do not allocate "playback video" and "off the system" The authority to it. And then do not have the right to playback users landing software. Through the above settings, although the restrictions on the user in the software playback or shutdown authority, but there is a possibility: the software to minimize or through other means back to the WINDOWS desktop, and then through the "My Computer" into the video where the video Hard disk partition directly click on the video file to play.


Step 2: See if there is such a setting in the software: whether to lock the keyboard CTRL, ALT, DEL and WINDOWS micro-key (CTRL and ALT between the key). Plainly, that is, let the user through the micro-key to call up the "Start" menu, so you can not enter the "My Computer". Disable the CTRL + ALT + DEL key combination to prohibit the operation of the "Task Manager", so that the process can not end the way through the end of the monitoring software. It is possible that the software does not have a related setting option, but the software has automatically locked the above key. This step is the most critical. If the monitoring software does not support locking the above mentioned a few keys, it is regrettable, no way to protect the video. I do not know whether there is a three-party lock keyboard software, if there is, the problem can still be resolved, if not, had no need for the keyboard.


Step 3: Set the monitoring software to boot automatically. That is, the system will automatically start a monitoring system. And then disable the USB socket in the BIOS setup and set the password for the BIOS. Because when the system is running into the USB device WINDOWS system may automatically open the dialog box, through this dialog box is very likely to enter the computer any disk partition. Of course, the above description of the method for knowledgeable people who crack is not difficult. Monitoring system as a rather special software, developers in the design are usually taken into account the above mentioned these functional requirements. Although the software set the argument is not the same, but the function should be similar

Related Industry Knowledge
Product series
4G bullet camera
4G dome camera
AP bullet camera
AP dome camera
Information Center
35W solar system camera
55W solar system camera
90W solar system camera
Contact information

4th Floor , 3rd Building , Weijian Technology Park , Beihuan Road , Shiyan , Bao'an , Shenzhen , China

Tel: +86-755-27656876


QR Code

Copyright © Jaste Solar Technology Co.,Ltd All Rights Reserved.