2.5.4 How to configure alteration detection settings
The settings relating to alteration detection that detects when data in the SD memory card is altered or edited can be configured on this page.
 
The alteration detection settings will be configured in the following procedure.
2.5.4.1 Generation of the CRT key (encryption key)
IMPORTANT
When the certificate (CA certificate) issued by CA is valid, it is impossible to generate the CRT key.
When the certificate (CA certificate) issued by CA is used, the available key size varies depending on the CA. Check the available key size in advance.
To generate the CRT key, it may take about 2 minutes. Do not operate the web browser until the generation of CRT key is complete. While the CRT key is being generated, the refresh interval and line speed may be lower.
1.
Click the [Execute] button of “CRT key generate”.
The “CRT key generate” dialog box will be displayed.
2.
Click the [Execute] button.
The generation of CRT key will be started. When the generation is finished, the key size and generation time & date of the generated key will be displayed on “Current CRT key”.
Note
To change (or update) the generated CRT key, perform step 1 to 2. The CRT key and certificate issued by CA are valid in a set. When the CRT key is changed, it is necessary to re-apply for the certificate issued by CA.
When the CRT key is updated, the log of the previous CRT key is saved. When the [History] button of “Current CRT key” on the “CRT key generate” dialog box is clicked, the “Previous CRT key” dialog box will be displayed, and it is possible to check the key size and generation time & date of the previous key. When the [Apply] button is clicked on the “Previous CRT key” dialog box, it is possible to replace the current CRT key with the previous one.
2.5.4.2 Generation of CSR (Certificate Signing Request)
IMPORTANT
If the CRT key is not generated, it is impossible to generate the CSR.
Before generating the CSR file, configure the following settings on [Internet Options] of the web browser in advance. Click [Internet Options...] under [Tools] of the menu bar of Internet Explorer, and then click the [Security] tab.
Register the camera for [Trusted Sites].
Click the [Custom level] button to open the [Security Settings] window, and check the [Enable] radio button of [File Download] under [Downloads].
Click the [Custom level] button to open the [Security Settings] window, and check the [Enable] radio button of [Automatic prompting for file downloads] under [Downloads].
1.
Click the [Execute] button of “CA Certificate - Generate Certificate Signing Request”.
The “CA Certificate - Generate Certificate Signing Request” dialog box will be displayed.
2.
Enter the information of the certificate to be generated.
Item
Description
Available number of characters
[Common Name]
Enter the camera address or host name.
64 characters
[Country]
Enter the country name.
2 characters (Country code)
[State]
Enter the state name.
128 characters
[Locality]
Enter the locality name.
128 characters
[Organization]
Enter the organization name.
64 characters
[Organizational Unit]
Enter the unit name of the organization.
64 characters
[CRT key]
Displays the key size and generation time & date of the current key.
3.
Click the [OK] button after entering the items.
The [Save As] dialog box will be displayed.
4.
Enter a file name for the CSR in the [Save As] dialog box to save on the PC.
The saved CSR file will be applied to the CA.
IMPORTANT
The certificate will be issued for the set of the generated CSR and CRT key. If the CRT key is re-generated or updated after applying to the CA, the issued certificate will be invalidated.
Note
This camera generates the CSR file in the PEM format.
2.5.4.3 Installation of the certificate issued by CA
IMPORTANT
If the CSR file is not generated, it is impossible to install the certificate (CA certificate) issued by CA.
For the installation of the certificate issued by CA, the CA certificate issued by CA is required.
1.
Click the [Browse...] button of “CA Certificate - Certificate install”.
The [Open] dialog box will be displayed.
2.
Select the certification file and click the [Open] button. Then, click the [Execute] button.
The certification will be installed.
Note
The host name registered in the installed certificate will be displayed on “CA Certificate - Information”. Depending on the status of the certificate, the following are displayed.
Indication
Description
Invalid
The CA certificate is not installed.
[Host name of the certificate]
The certificate has already been installed and validated.
Expired
The certification has already expired.
When the [Confirm] button is clicked, the registered information of the installed certificate (CA certificate) will be displayed in the “CA Certificate - Confirm” dialog box. (Only “Organizational Unit” will be displayed with an asterisk (*).)
When the [Delete] button is clicked, the installed certificate (CA certificate) will be deleted.
When “On” is selected for “Additional info for detecting alteration”, it is impossible to delete the certificate (CA certificate) issued by CA.
To change (or update) the certificate issued by CA, perform step 1 and 2.
IMPORTANT
Before deleting the valid certificate (CA certificate), confirm that there is a backup file of the certificate (CA certificate) on the PC or another media. The backup file will be required when installing the certificate (CA certificate) again.
The expiration date of the certificate issued by CA can be checked by double-clicking the server certification file issued by CA.
2.5.4.4 Configuration of alteration detection
1.
Select “On” for “Additional info for detecting alteration”, and click the [Set] button.
2.
Extensive information for alteration detection will be added to video files (MP4 format) recorded after changing the setting.
IMPORTANT
When the “Additional info for detecting alteration” setting is changed, manual recording on the SD memory card will stop. Start manual saving again as necessary.
Note
Alteration detection can be performed on video files (MP4 format) recorded when “On” is selected for “Additional info for detecting alteration” using exclusive software.
For further information about exclusive software and how to use it, refer to our website below.