Synergy Pro Client Operational Manual


Add to my manuals
273 Pages

advertisement

Synergy Pro Client Operational Manual | Manualzz

6.7.1 Play Incident Video

To play the incident video click the at the bottom of the dialog. The View

Locker Contents dialog closes and the video is played in the viewer.

6.7.2 Validate Incidents

You can validate incidents that are partially saved to the locker to identify any files that have been missing and perform the save again. To validate an incident click the button.

If the status of the selected incident is Saved in Locker after you press Validate a message is shown indicating that all files for the incident have been successfully saved:

Click OK to close the message.

You will now be given the opportunity to check the MD5 of the video. The MD5 test checks that the checksum on the video file is the same as when recorded; that proves that files have not been

modified. See 6.7.2.1 for more details.

If then you select an incident with status Import Error- Copy, or that has been partially saved, after you press Validate you will be given information as of the missing files:

Synergy Pro Client Operational Manual, Issue 5 ©

Synectic Systems Group Ltd 2013.

All Rights Reserved. Specifications subject to change. E & OE

Page 177

Click OK to close the message. You will now be given the opportunity to repair the incident:

Click Yes if you wish to try the repair.

If the missing files are found they will be saved to the incident and its status will changed to Saved in

Locker, or a percentage figure will be indicated.

When an incident is successfully validated the following transaction record is added to the incident:

‘Validation Complete. All files available for incident Successfully loaded’

You can view the transactions for an incident on the Transactions tab of the Incident Details dialog;

see 6.6.6.

Performing the validation and having the transaction record for this is particularly important should the incident be used as evidence.

6.7.2.1 SHA-256 Message Digest Algorithm

Synergy Pro and Synectics VMS Platform technologies uses the standard MD5 Message Digest

Algorithm to create an unique 256 bit “fingerprint” which is embedded in the one minute video file at point of creation.

The

SHA-256

is a widely recognised standard in the IT community. It was developed by The Internet

Engineering Task Force (IETF) which is a large open international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and the smooth operation of the Internet. It is open to any interested individual.

Evidence Considerations

When Evidence is produced to be taken from the Synergy system the

SHA-256 hash should be noted,

From this point all down- stream uses of the evidence can be audited for unchanged video by recalculating the

SHA-256

hash and checking against the recorded

SHA-256 hash. If the hashes are not the same then the data has become corrupt or has been altered.

Whilst data is within the system the operating procedures coupled with standard password protection and audit trails ensures evidential quality.

Synergy Pro Client Operational Manual, Issue 5 ©

Synectic Systems Group Ltd 2013.

All Rights Reserved. Specifications subject to change. E & OE

Page 178

advertisement

Was this manual useful for you? Yes No
Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Related manuals

Download PDF

advertisement

Table of contents