Foreword General This manual describes the structure, function and operation of intelligent video surveillance server (IVSS). Models 8-HDD, 12-HDD, 16-HDD, and 24-HDD. HDD Number Model IVSS708 IVSS712 IVSS716, IVSS716D, IVSS716DR IVSS724, IVSS724D, IVSS724DR In the model name, R indicates that the model has redundant power. ...
Revision History Version Revision Content Release Time Added search by image, cluster, and fisheye dewarp. V3.0.0 Updated chapters including intelligent operation December 2019 and device management according to the new device version. Add video metadata, vehicle recognition, and vehicle V2.1.0 June 2019 comparison functions.
Important Safeguards and Warnings The following description is the correct application method of the Device. Read the Guide carefully before use to prevent danger and property loss. Strictly conform to the Guide during application and keep it properly after reading. Operating Requirement ...
Table of Contents Foreword ..............................I Important Safeguards and Warnings ....................III 1 Overview ..............................1 Introduction ........................... 1 Login Mode ........................... 1 2 The Grand Tour ............................2 Front Panel ............................ 2 Rear Panel ............................ 3 Dimensions ........................... 5 3 Hardware Installation ..........................
Page 6
Video Metadata ........................... 38 6.5.1 Enabling AI Plan ....................... 39 6.5.2 Configuring Video Metadata ..................... 39 6.5.3 Live View of Video Metadata .................... 41 6.5.4 AI Search .......................... 43 IVS ............................... 45 6.6.1 Enabling AI Plan ....................... 45 6.6.2 Configuring IVS Rules ...................... 45 6.6.3 Live View of IVS ........................
Overview Introduction As an intelligent video surveillance server (hereinafter referred to as IVSS or the Device), IVSS delivers not only the basic video surveillance functions, but also a bunch of advanced AI features including face recognition, perimeter protection, video metadata and ANPR, providing AI-based all-in-one surveillance solution for customers.
The Grand Tour This chapter introduces front panel, rear panel, port function and button function, indicator light status, and so on. This chapter takes 16-HDD for example. For other models, see user’s manual. Front Panel Figure 2-1 Font panel with LCD Figure 2-2 Front panel without LCD Table 2-1 Front panel description...
Name Description Displays the system running status. System status The blue light is on: Device is running properly. indicator The indicator light is off: The device is not running. Displays local input alarm status. Alarm indicator Red indicator light is on: There is local alarm input event. ...
Page 10
Name Description Displays AI module status. The yellow light flashes: AI module is running properly. AI module The yellow light is on: AI module is malfunctioning. indicator light This function is valid if there is AI module. RESET button Reserved.
Hardware Installation This chapter introduces HDD installation, cable connection, and so on. WARNING Some series product is heavy. It needs several people to carry or move jointly to prevent person injury. Installation Flow See Figure 3-1 for installation flows. Please follow the steps to install. Figure 3-1 Installation flows Unpacking the Box...
Different models support different HDD numbers. See the actual situation. 3.3.1 12-HDD Series Installing HDD ② Place one side of the ①Press the button on the front closely along ③Insert the HDD box into the panel of IVSS device, open the upper side of the box and HDD slot, press it to the bottom, handle, and then pull out the...
③Lock the screws on the back of the HDD box. Insert the box into the HDD ①Press the button on the slot, push it to the bottom, and then ② Put the HDD into the front panel IVSS close the handle. device, open the handle, box along the direction and then pull out the HDD...
For device security, connect other cables of the Device first, and then connect the Device to the power socket. Boot-up might vary depending on the model you purchased. 8-HDD series product: Press the power button on the rear panel to boot up device. For other series products: ...
Initial Settings For first-time use, you need to initialize the Device, set basic information and functions, and so on. Initializing Device If it is your first time to use the Device after purchasing or after restoring factory defaults, set a login password of admin (system default user).
Page 19
Table 5-1 Time parameters description Parameters Description Time Zone The time zone of the Device. Set system date and time manually or by synchronizing with NTP server time. Manual setting: Select date and time from the calendar. Time Sync with Internet Time Server: Select Sync with Internet Time ...
Figure 5-3 Password protection Step 7 Set password protection information. You can use the email you input here or answer the security questions to reset admin password. Click to enable email or security questions. Click it again to disable the function.
Page 21
Figure 5-4 IP setting Click of the corresponding NIC to configure IP address. See Figure 5-5. When there is a DHCP server on the network, check Use Dynamic IP Address, system can allocate a dynamic IP address to the Device. There is no need to set IP address manually.
An NIC that is connected to the network can be set as the default NIC. Step 2 Configure P2P settings Make sure that the system has connected to the network. Otherwise, the P2P function is null. On IP Set interface, click Next. The P2P Access interface is displayed.
Page 23
Figure 5-7 Web login interface Step 2 Double-click the installation package, and then follow the onscreen instructions to complete the installation. After the installation finishes, the following interface is displayed. See Figure 5-8. Figure 5-8 Installation finishes Step 3 On the installation completion interface, click Run. The login interface is displayed.
Figure 5-9 Login Step 4 Enter device user name and password. Step 5 Click Login. Adding Remote Devices After you initialize remote device, you can view the live video from the remote device, change remote device settings, and so on. ...
Page 25
Figure 5-10 Remote device Step 4 Set device username and password. Select a remote device, click Password, and then enter the username and password of the selected device. Click OK. If you do not enter device username and password, the system will try to add the device by using the username and password of the current IVSS.
Intelligent Operation In addition to the basic video monitoring functions, the Device can also provide a number of AI functions including face recognition, people counting, video metadata, ANPR, and IVS (behavior detections such as fence-crossing, intrusion, loitering, crowd gathering, parking and more.
Figure 6-1 Overview indicates that the AI function is enabled. indicates that AI by device is enabled. Face Detection System triggers alarms when human faces are detected within the detection zone. 6.2.1 Enabling AI Plan To use AI by camera, you need to enable AI plan first. AI plan is available on select models.
Page 28
Figure 6-2 AI plan(1) Figure 6-3 AI plan(2) Intelligent Operation 22...
Step 4 Click to enable AI detection plan. The icon becomes When there is a conflict between the to-be-enabled AI plan and an enabled plan, disable the enabled plan first. Step 5 Click Save. 6.2.2 Configuring Face Detection Configure alarm rule of face detection. Step 1 Click or click...
Page 30
Figure 6-5 AI by device Step 4 Click AI by camera or AI by device, and then click to enable face detection. AI by camera supports Face RoI function. After enabling Face RoI function, system displays enhanced human face zone on the surveillance window. Step 5 Set detection region on the video (yellow area).
Click to set the minimum size or maximum size of the face detection area. System triggers an alarm once the size of detected target is between the maximum size and the minimum size. Step 6 Click Deployment Time to select schedule from the drop-down list. After setting arm period, system triggers corresponding operations when there is a motion detection alarm in the specified period.
6.2.3.2 Live View Go to the LIVE interface, enable view, and then view videos are displayed. See Figure 6-8. The view window displays currently detected face rule boxes. Features panels are displayed on the right side in real time. The features panel displays detection time, face snapshot and face features details.
Step 1 On the LIVE interface, click , select AI SEARCH > Search by Face > By Property. The By Property interface is displayed. See Figure 6-10. Figure 6-10 Search by property Step 2 Select a remote device, and then set Event Type to be Face Detection. In the Event Type drop-down list, if you select All, the search results will include both face detection records and face recognition records.
6.3.1 Configuration Procedure Figure 6-11 Face recognition procedure (AI by camera) Face recognition procedure (AI by device) 6.3.2 Enabling AI Plan To use AI by camera, you need to enable the corresponding AI plan first. For details, see "6.2.1 Enabling AI Plan." 6.3.3 Configuring Face Database You can create the face database to save face image, and the intelligent detection function can trigger the face database to carry out human face recognition, human face search, and...
Page 35
Figure 6-12 Create face database Step 3 Set face database name. Step 4 Click Save and close. 6.3.3.2 Adding Face Image Add face images to the created face database in the way of manual add, batch import or detection. This section takes batch import as an example. For details about manual add or adding from detection results, see User's Manual.
Page 36
Figure 6-13 Batch import Step 4 Import face image. The system supports to upload file and folder. Select according to your actual need. Step 5 Click OK. The batch import result interface is displayed. See Figure 6-14. Figure 6-14 Batch import Step 6 Click Continue to add or OK.
After adding the image, at the lower-left corner of the face image, the icon appears, which indicates that face information is being processed. For details, see User's Manual. 6.3.4 Configuring Face Recognition Configure face recognition rules. To use AI by device, enable face detection first. For details, see "6.2.2 Configuring Face Detection."...
Click Actions to set alarm actions. For details, see User's Manual. Step 7 Set linked face database. Before you use AI by camera function, go to the remote device to set face database. On IVSS interface, set alarm activation event. ...
During face recognition, features panel displays detection time, the detected face image, face image in the database, comparison result and database name. After setting stranger mode, when the detected face image mismatches face image in the database, features panel will have Stranger tag. Figure 6-18 Live 6.3.5.3 Face Total...
Figure 6-20 Search by property Step 2 Select a remote device, and then set Event Type to be Face Detection. In the Event Type drop-down list, if you select All, the search results will include both face detection records and face recognition records. Step 3 Set face property and time.
6.4.2 People Counting The system counts the number of people in and out of the detection area. When the statistical number exceeds the threshold, or the average dwell time is longer than the threshold time, an alarm is triggered. Step 1 Click , click , and then select EVENT.
Click to restore to the default area. Step 4 Set parameters. See Table 6-1. Table 6-1 Parameters description of people counting Parameters Description Enable Click to enable the selected area. Name Enter area name Click to enable the alarm. Set people number threshold.
Page 43
Figure 6-22 Queuing Step 3 Draw a queuing detection area. Click to draw the first detection area. Click to draw more areas. You can draw 4 areas at most. Click to edit the area. Click and drag to adjust the position and length. ...
Parameters Description an alarm will be triggered. Select , and enter a threshold value. When the people number in the area is smaller than the threshold, an alarm will be triggered. Click to enable the alarm. Set time threshold for the alarm. When the queuing time of any Queuing Time Alarm person in the area is longer than the threshold, an alarm will be triggered.
This section introduces how to configure the video metadata feature from enabling it and selecting target types to setting the live view of video metadata. 6.5.1 Enabling AI Plan You need to enable AI plan when AI by camera is used. For details, see "6.2.1 Enabling AI Plan."...
Page 46
can also be enabled at the same time. Vehicle: Click corresponding to enable vehicle detection. Non-Motor Vehicle: Click corresponding to enable non-motor vehicle detection. Step 6 Click (the icon changes to ), and then you can configure detection area (orange) in the video image.
6.5.3 Live View of Video Metadata You can view the detected features and properties of face, people, motor vehicle and non-motor vehicle on the LIVE interface. 6.5.3.1 Setting AI Display You can set the features and properties that you want to display in the real-time video image of the LIVE interface.
Page 48
6.5.3.3 Detection statistics You can view the features and properties of detected human body, face, motor vehicle and non-motor vehicle. On the Live interface, click . The PEOPLE TOTAL interface is displayed. Click , and then select Snap With Face and Snap Without Face. The information of detected human and face is displayed.
6.5.4 AI Search 6.5.4.1 Human Search Select device and set properties to search for detection results. For example, you can set human properties such as gender, age, top, pants, and search human with these properties. Step 1 On the LIVE interface, click , and then select AI SEARCH >...
Page 50
Figure 6-31 Property Step 3 Select Vehicle Detection as Event Type. Step 4 Set vehicle properties and time period. Click to set the color. means more than one color. Step 5 Click Query. The search result is displayed.. 6.5.4.3 Non-motor Vehicle Search Step 1 On the LIVE interface, click , and then select AI SEARCH >...
Figure 6-32 Search by non-motor vehicle Step 2 Select the device you want to search. Step 3 Set non-motor vehicle properties and time period. Click to set the color. means more than one color. Step 4 Click Query. The search result is displayed. The IVS feature includes a number of behavior detections such as fence-crossing, intrusion, tripwire, parking, crowd gathering, missing object, abandoned object, fast-moving, and loitering.
Page 52
Table 6-3 IVS functions description Functions Description Fence-crossing Alarm is triggered when a target is crossing the pre-defined fence. Tripwire Alarm is triggered when a target is crossing the pre-defined tripwire. Alarm is triggered when a target is entering, leaving, or appears in the Intrusion detection area.
Page 53
Figure 6-33 Add rules Step 4 Set tripwire rules. Click Add Rule, and select Tripwire. The rule information is displayed. See Figure 6-34. Intelligent Operation 47...
Page 54
Figure 6-34 Configuring cross line detection rules Click to enable detection rule. Click to delete detection rule. Click to edit the tripwire line. Drag to adjust position or length of the line. Click to set the directions. An alarm will be triggered only when the ...
Page 55
Table 6-4 IVS rules configuration requirements Functions Description Draw 2 detection lines. Fence-crossing Transparent fences such as iron fence are not supported. Extremely short walls (height lower than normal height) are not supported. Tripwire Draw 1 detection line. Draw 1 detection line.
6.6.3 Live View of IVS On the LIVE interface, view real-time IVS results. 6.6.3.1 Setting AI Display Set the display rules of detection results. Make sure that view is created before setting AI display. For details, see User's Manual. Select a view from LIVE > View > View Group. Click , and then select the Face, Human, Vehicle or Non-Motor Vehicle tab.
Figure 6-37 People total Click . The VEHICLE TOTAL interface is displayed. Click , and then select IVS. The detected vehicles are displayed. See Figure 6-38. Figure 6-38 Vehicle total On the LIVE interface, click . The NONMOTOR TOTAL interface is displayed. Click and then select IVS.
Figure 6-39 Step 2 Select the remote device, and set event type, effective target and time. Step 3 Click Query. The search results are displayed in the panel. ANPR You need the ANPR (Automatic Number Plate Recognition) feature to monitor and control vehicle entry &...
Figure 6-41 Configuring ANPR (AI by IVSS) Create Plate Set Plate Start Add Vehicle Plate Verification Database Comparison Real-time View Main Task Playback Sub Task 6.7.2 Enabling AI Plan Before using AI by camera, AI plan needs to be enabled first. For details, see "6.2.1 Enabling AI Plan."...
Page 60
Figure 6-43 Create vehicle database Step 3 Set Vehicle DB Name, and select Type of vehicle database. Step 4 Click Register Vehicle or Save and close. 6.7.3.2 Registering Vehicle Information Add vehicle information to the created database. You can add vehicles one by one, in batches or directly add from the detection results.
Figure 6-44 Batch import Step 4 Acquire and fill in the template file. Click Download Template to download the template to local PC or USB storage device. The save path might vary when operating on client or local interface, and the actual interface shall prevail.
Page 62
The EVENT interface is displayed. Step 2 Select device from the device tree on the left side. Step 3 Select AI Plan > Plate Comparison. The Plate Comparison interface is displayed. See Figure 6-45. Figure 6-45 Plate comparison Step 4 Click to enable plate comparison.
Step 7 Link database. Repeat the following steps to link multiple databases. Click Associate Vehicle Database, and select the database to be linked. The database linkage interface is displayed. See Figure 6-47. Figure 6-47 Database linkage Set the parameters. See Table 6-5. Table 6-5 Database linkage parameters Parameters Description...
6.7.5.2 Live View On the LIVE interface, select a view, and the video image of the view is displayed. See Figure 6-48. Tracking box is displayed in the video image. Features panel is displayed at the right side of the video image. Figure 6-48 Live 6.7.5.3 Detection Statistics...
Page 65
6.7.6.1 Searching by Property Set search conditions such as device and properties, and then search vehicle recognition information that meets the conditions. Step 1 On the LIVE interface, click , and then select AI SEARCH > Search by Vehicle. The Search by Vehicle interface is displayed. Step 2 Select device, and then click Property tab.
Page 66
Figure 6-51 Search by vehicle database Step 3 Select the database to be searched. Step 4 Click Query. The search result is displayed. If license plate is detected, both the scenario and the license plate will be displayed. Intelligent Operation 60...
OK to shut down. Mode 2: Use power on/off button on the Device. 8-HDD series product: Press power on/off button on rear panel. Other series products: Press the power on/off button on the Device for at least 4 ...
Page 68
Lock Click , and then select Lock to lock the client. The locked client cannot be operated. To unlock the client, click anywhere on the client, and then the Unlock dialogue box is displayed. Enter the username and password, and then click OK. Logout, Reboot, Shut Down, Lock 62...
Appendix 1 Cybersecurity Recommendations Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks.
Page 70
The account lock feature is enabled by default, and we recommend you to keep it on to guarantee the account security. If an attacker attempts to log in with the wrong password several times, the corresponding account and the source IP address will be locked. Change Default HTTP and Other Service Ports We suggest you to change default HTTP and other service ports into any set of numbers between 1024~65535, reducing the risk of outsiders being able to guess which ports you...
Page 71
In order to better ensure the safety of equipment and reduce potential cyber risks, we recommend: Disable the port mapping function of the router to avoid direct access to the intranet devices from external network. The network should be partitioned and isolated according to the actual network needs.
Need help?
Do you have a question about the 8-HDD Series and is the answer not in the manual?
Questions and answers