Manual Dmss Dahua
Manual Dmss Dahua
Manual Dmss Dahua
User’s Manual
User’s Manual
V1.1.0
I
Foreword
General
This manual introduces the functions and operations of DMSS App (hereinafter referred to as
"the App").
Safety Instructions
The following categorized signal words with defined meaning might appear in the manual.
Signal Words Meaning
Revision History
As the device user or data controller, you might collect personal data of others such as face,
fingerprints, car plate number, email address, phone number, GPS and so on. You need to be in
compliance with the local privacy protection laws and regulations to protect the legitimate rights
and interests of other people by implementing measures include but not limited to: providing
clear and visible identification to inform data subject the existence of surveillance area and
providing related contact.
The manual is for reference only. If there is inconsistency between the manual and the
actual product, the actual product shall prevail.
We are not liable for any loss caused by the operations that do not comply with the manual.
The manual would be updated according to the latest laws and regulations of related
regions. For detailed information, see the paper manual, CD-ROM, QR code or our official
website. If there is inconsistency between paper manual and the electronic version, the
I
electronic version shall prevail.
All the designs and software are subject to change without prior written notice. The product
updates might cause some differences between the actual product and the manual. Please
contact the customer service for the latest program and supplementary documentation.
There still might be deviation in technical data, functions and operations description, or
errors in print. If there is any doubt or dispute, please refer to our final explanation.
Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
All trademarks, registered trademarks and the company names in the manual are the
properties of their respective owners.
Please visit our website, contact the supplier or customer service if there is any problem
occurred when using the device.
If there is any uncertainty or controversy, please refer to our final explanation.
II
Table of Contents
Foreword .................................................................................................................................................... I
1 Overview ................................................................................................................................................. 1
1.1 Introduction ................................................................................................................................... 1
1.2 Features ........................................................................................................................................ 1
1.3 Applicable Mobile Phone Model.................................................................................................... 1
2 Basic Operations ................................................................................................................................... 2
2.1 Login.............................................................................................................................................. 2
2.2 Adding Devices ............................................................................................................................. 4
2.2.1 Adding Uninitialized Devices .............................................................................................. 4
2.2.2 Adding Initialized Device ..................................................................................................... 6
2.3 Managing Devices ........................................................................................................................ 8
2.3.1 Device Configuration .......................................................................................................... 8
2.3.2 Alarm Subscription .............................................................................................................. 9
2.3.3 Device Channel .................................................................................................................. 9
2.3.4 Stream Setting .................................................................................................................. 10
2.3.5 Remote Configuration ....................................................................................................... 10
2.3.6 Alarm Output ..................................................................................................................... 20
2.3.7 HDD Management ............................................................................................................ 21
2.3.8 Time Zone ......................................................................................................................... 21
2.3.9 Custom Audio and Video Encryption ................................................................................ 21
2.3.10 Sharing Devices.............................................................................................................. 22
2.3.11 Cloud Update .................................................................................................................. 22
2.3.12 Other Parameters ........................................................................................................... 22
2.3.13 Creating Device Card ..................................................................................................... 23
2.3.14 Deleting Device............................................................................................................... 24
3 Live View .............................................................................................................................................. 25
4 Video Playback .................................................................................................................................... 29
5 Video Call ............................................................................................................................................. 32
6 Alarm Control....................................................................................................................................... 34
6.1 Protection Mode .......................................................................................................................... 34
6.2 Configuring Alarm Devices.......................................................................................................... 36
7 Access .................................................................................................................................................. 38
8 Cloud Storage ...................................................................................................................................... 41
9 Favorites............................................................................................................................................... 43
10 File....................................................................................................................................................... 44
11 Message.............................................................................................................................................. 46
11.1 Subscribing Alarm Messages .................................................................................................... 46
11.2 Viewing Messages .................................................................................................................... 48
11.3 Marking Alarm Messages .......................................................................................................... 50
11.4 Deleting Alarm Messages ......................................................................................................... 50
12 System Configuration ....................................................................................................................... 51
12.1 Setting ....................................................................................................................................... 51
12.2 General ..................................................................................................................................... 52
III
12.3 Password Security .................................................................................................................... 53
12.4 Changing Region ...................................................................................................................... 53
12.5 More Service ............................................................................................................................. 53
12.6 Help and Feedback ................................................................................................................... 53
12.7 About ......................................................................................................................................... 53
13 Account Management ....................................................................................................................... 55
14 FAQ ..................................................................................................................................................... 56
Appendix 1 Cybersecurity Recommendations ................................................................................... 59
IV
1 Overview
1.1 Introduction
DMSS App is a mobile monitoring software that is designed for professional security
surveillance. It has functions such as live view, video playback, alarm notification push, and
cloud storage. Various devices can be added and used with cellular data or Wi-Fi, such as
cameras, video recorders, video intercoms, doorbells, access control devices, and alarm
devices.
1.2 Features
1
2 Basic Operations
You can do the operations such as device initialization, live view, video playback, remote
configuration, push notifications, video talk, and more.
You can use the App after logging in or use it without logging in, and the functions and types of
added devices (divided as account devices and local devices) might vary. For example, cloud
storage and cloud upgrade are available only after login. This manual takes operations after
login as an example.
Interfaces might vary with different added devices, and the actual interface shall prevail.
Account Device
Account devices have following features in general:
Added after login.
Have "From ***" below the device name.
Figure 2-1 Account device
Bound to the account, cannot be used after logout, and cannot be added by other accounts,
but can be shared with other users.
Local Devices
Local devices have following features in general:
Added without login, or added after login but does not have "From ***" below the device
name.
Can only be used on the current mobile phone, cannot be shared, but can be added on
multiple mobile phones.
2.1 Login
Step 1 Search for DMSS in Google Play, download, and then install the App.
2
Step 3 Select your region, and then tap Done.
Display the main function modules. Tap and drag the icon to
4 Function modules
change its place.
3
No. Function Description
Display the added devices.
Tap a thumbnail under the device name to play a single
channel. If a device has several channels, slide thumbnails
5 Devices to the left to view more.
Tap to play all channels under this device.
Tap to view device details and top the device or move
down.
6 Navigation bar Three tabs: Home, Message, and Me.
Before operating on the App, you need to add devices such as cameras, video recorders, video
intercoms, alarm devices, and access control devices.
Before adding devices, make sure that the device is connected to power, and is in the same
LAN as your mobile phone.
Wi-Fi connection: Connect the device to the same Wi-Fi as the mobile phone.
Wired connection: Connect the device to the same network as the mobile phone.
AP configuration: Turn on device hotspot, and connect the mobile phone to the hotspot.
Uninitialized devices can only be added through scanning device QR code, or manually
entering device SN.
The on-screen instructions might vary depending on the device you add, and the actual
interface shall prevail.
Step 2 Scan device QR code, or manually enter device SN, and then the system will identify
the device type automatically.
If the device type cannot be identified by the system, you need to select the device
type.
Step 3 Follow on-screen instructions to connect the device, and then tap Next.
Step 4 Enter the Wi-Fi password connected by the mobile phone, and then tap Next.
Tap at the upper-right corner to switch network configuration by Wi-Fi, wire, or AP.
4
Figure 2-3 Enter Wi-Fi password
Step 5 Set device username, device password, enter email address as needed, and then tap
OK.
Step 6 On the Cloud Update Configuration interface, read Cloud Access and Auto-check
items, select them as needed, and then tap OK. The device is initialized.
The Cloud Update Configuration only displays when you add uninitialized devices.
Step 7 Enter device name, and then save settings.
Step 8 Configure time zone as needed, and then tap Completed.
The live view is displayed and the device is added.
5
Figure 2-4 Time zone
Step 2 Scan device QR code, or manually enter device SN, and then the system will identify
the device type automatically.
If the device type cannot be automatically identified by the system, you need to select
the device type.
Step 3 Enter device name, device password, and save settings.
The live view is displayed and the device is added.
Figure 2-5 Add initialized device (SN/scan)
6
2.2.2.2 Adding by IP/Domain
You can add devices by entering IP of the device or specific domain. This section takes
entering device IP as an example.
Step 1 Tap at the upper-right corner, and then select Search online.
7
Figure 2-8 Add initialized device (search online)
You can configure devices, subscribe alarm messages, configure devices remotely, set video
streams, configure alarm output, and more.
Configurations of different devices might vary, and the actual interface shall prevail.
You can also tap the device or channel, and then tap on the interface to go to
device management interface.
Step 2 Tap Device Configuration, and then you can view and modify device information.
8
Figure 2-9 Device configuration
9
Figure 2-10 Device channels
10
Motion Detection
Alarm linkage action is performed when a moving object appears on the image and its moving
speed reaches the preset sensitivity.
Step 1 On the Home interface, tap , and then tap Device Details.
Step 2 Tap Remote Configuration > Video Detection > Motion Detection.
Step 3 Select the device channel you want to configure.
Step 4 Enable Advanced Configuration to configure other parameters.
Figure 2-11 Advanced configuration (motion detection)
Tap , select the date, and then set the start time and end time of the
Arm/Disarm
Period period (up to 6 periods can be set each date). See Figure 2-12.
Tap Copy, select other days as needed, and then the set arming period
will apply to the selected days.
11
Function Description
Set anti-dither period from 0 s to 600 s. Only one motion detection event is
Anti-dither
recorded during the period.
Set sensitivity value from 0 to 100. It is more easier to trigger the alarm
Sensitivity
with higher sensitivity.
Set motion detection region. The whole video image is the effective
area for motion detection by default. See Figure 2-13.
Tap , and then pinch or stretch out with fingers to zoom out or
zoom in the image.
By enabling Record, the system record automatically when the alarm is
Record
triggered.
Delay The alarm record keeps for the defined time after the alarm is ended.
By enabling Alarm Output, the connected alarm output device will be
Alarm Output
linked when the alarm is triggered.
Delay The alarm keeps output for the defined time after the alarm is ended.
By enabling Snapshot, the system automatically captures pictures when
Snapshot
the alarm is triggered.
Figure 2-12 Arm/Disarm period
12
Figure 2-13 Region setting
Video Mask
Alarm is triggered when the monitoring image is shielded and the output video is in single color.
Step 1 On the Home interface, tap , and then tap Device Details.
Step 2 Tap Remote Configuration > Video Detection > Video Mask.
Step 3 Select the device channel you want to configure.
Step 4 Enable Advanced Configuration to configure other parameters. For details, see Table
2-2.
Figure 2-14 Advanced configuration (video mask)
13
Table 2-3 Alarm setting
Alarm Type Description
Connect the alarm device to the alarm input port of the added device.
Local Alarm
When the alarm is triggered, alarm linkage action performs.
Alarm linkage action performs when alarm signal is transmitted to the
Network Alarm
device through network.
IPC External Connect the IPC to the alarm input device. When the alarm is
Alarm triggered, alarm linkage action performs.
IPC Offline Alarm linkage action performs when the added device and IPC are
Alarm disconnected.
The alarm is triggered when an object is detected by a PIR-based
PIR Alarm
motion detector.
This section takes setting local alarm as an example.
Step 1 On the Home interface, tap , and then tap Device Details.
Step 2 Tap Remote Configuration > Alarm Setting > Local Alarm.
Step 3 Select the device channel you want to configure.
Step 4 Enable Advanced Configuration to configure other parameters.
Figure 2-15 Advance configuration (local alarm)
14
Table 2-4 Advanced configuration (local alarm)
Function Description
Arm/Disarm Period
See Table 2-2.
Anti-dither
Sensor Type Set sensor type as normally open or normally closed.
Record
See Table 2-2.
Delay
Select Channel Select the channel to record videos.
Alarm Output
See Table 2-2.
Delay
Select channel Select one or multiple channels to output the alarm.
Snapshot See Table 2-2.
Step 5 Tap Save.
It is recommended to set a channel name that is easy to be recognized. You can set
according to device installation place.
Step 5 Select main stream or sub stream.
Figure 2-16 Video stream (main)
15
Table 2-5 Video stream parameters
Function Description
Main stream: Large bit stream, small compression image, and high
resolution, but also requires large bandwidth.
Main/Sub Sub stream: Smaller bit steam, smoother video, and requires smaller
bandwidth. Used to replace main stream when the bandwidth is
insufficient.
MJPEG: The image requires high bit rate to ensure clarity. It is
recommended to set the Bitrate value to the biggest for a better
image.
Encode Mode
H.264: Main Profile encode mode.
H.264H: High Profile encode mode; use smaller bandwidth than H.264
with the same image quality.
This parameter can be set only when you select sub stream. By
Video
enabling Video, the video stream type is sub stream.
Audio Set the audio stream type as main stream or sub stream.
Set video stream resolution. The higher the resolution is, the better the
video quality, but the bigger the bandwidth will be.
Resolution
Resolutions supported by the device might vary, and the actual interface
shall prevail.
Set frame rate from 1 to 30. The higher the frame rate is, the more vivid
Frame rate
and fluent the video, but the bigger the bandwidth will be.
CBR (Constant Bit Rate): The bit rate changes little and keeps close to
the defined bit rate value. When the scene is complicated, the image
might not be clear; when the scene is simple, the bandwidth might be
Bitrate Type wasted.
VBR (Variable Bit Rate): The bit rate changes along with monitoring
scene, so as to make image clear under complicated scene and the
bandwidth is small under simple scene.
This parameter can be configured only when the Bitrate Type is set as
Quality
VBR. The better the quality is, the larger the bandwidth will be.
Set video bitrate. The higher the bitrate is, the faster the data is
Bitrate
transmitted.
Step 6 Tap Save.
16
Red: Alarm recording. Record when alarm is triggered.
Figure 2-17 Schedule
Step 4 Tap , select the date, and then set the start time and end time of the period (up to 6
Tap Copy, select other days as needed, and then the set arming period will apply to the
selected days.
17
Figure 2-18 Set recording
18
Figure 2-19 Image adjustment
Focus/Zoom
Tap to zoom out or zoom in the image.
19
Function Description
Video quality
Tap to switch to fluent mode.
20
2.3.7 HDD Management
You can view HDD name, status, and capacity.
Step 1 On the Home interface, tap , and then tap Device Details.
Step 2 Tap HDD Manager.
Figure 2-21 Hardware management
21
The function is available on account devices.
Step 1 On the Home interface, tap , and then tap Device Details.
Step 2 Tap Custom Audio and Video Encryption.
Step 3 Enable the function and set password.
22
Figure 2-23 Solar power system
Step 2 Tap , select devices (up to 10), and then tap Create Device Card.
23
Figure 2-24 Create device card
You need to enter the password when you import devices by scanning the device card.
Step 4 Save the QR code of the device card to your album.
24
3 Live View
You can view the monitoring channels and do the operations such as taking snapshots,
recording videos, and adding channels to favorites.
On the Home interface, tap a thumbnail under the device to play the selected channel.
Figure 3-1 Live
Play a channel: Tap in the window, and then select a channel in the device list
to be played.
Play multiple channels: Tap , select channels in the device list as needed.
When displayed channels exceed the maximum number of displaying window you set,
swipe left or right to view other live videos.
25
Figure 3-2 Live view of a single channel
You can also tap of a device on the Home to view its details.
Window split Tap to change window split modes. You can display in 1, 4, 9, or 16
windows.
26
Function Description
Favorites Tap to create a favorites group and add the selected channel to
the Favorites or to the existing favorites group. See "9 Favorites."
You can configure the capture mode in Me > Setting. For more
Snapshot
details, see "12.1 Setting."
Snapshots are saved in the File. You can also tap the captured
image at the lower-left corner on Live interface to go to File. For
more details, see "10 File."
Select a video, and then tap to start recording. Tap the icon
again to stop recording.
Video recording
Recorded videos are saved in the File. You can also tap the video at the
lower-left corner on Live interface to go to File. For more details, see "10
File."
Select a video, and then tap to enable two-way voice call if the
function is supported.
Tap and hold the icon till the Voice Call interface is displayed. Tap
the device to which the channel belongs to enable device talk if the
Voice call
function is supported.
Tap , select the preset point, and then tap to turn the PTZ to
the monitoring target.
27
Function Description
Select a video, tap More Functions, tap , and then the wiper
control interface is displayed.
Tap Single, the wiper works one time, and then stop.
Wiper Tap Enable, then configure time interval, the wiper works after each
time interval.
Tap Stop, the wiper stops working.
28
4 Video Playback
You can search and play back videos according to time, video type, and channels.
Before playing back videos, you need to set alarm rules and record plan of the channel.
Step 3 Tap to change date and record type. The date with a blue dot
means it has videos.
29
Figure 4-2 Playback conditions
30
Function Description
Select a video, and then tap to clip the video. Drag time bar, tap
Clip
to set a start point, and then tap to set a stop point.
Snapshot
Video
See "Table 3-1 Live view function icons."
recording
Fisheye
The color block indicates recorded videos with different types. Grey
means all videos; green means regular videos; red means alarm
videos; orange means motion detection videos; yellow means smart
Time bar
videos.
Drag the time bar to view the record of any time frame. Pinch or
stretch out to zoom the bar.
31
5 Video Call
You can view the live video of the added video intercoms, realize video call between the device
and App, lock/unlock the door, and more.
Favorites Tap to create a favorites group and add the selected channel to the
Favorites or to the existing favorites group. See "9 Favorites."
Record See "Table 3-1 Live view function icons."
32
Function Description
Enable Alarm Subscription of the VTO, and then you can answer the call
on App when VTO is called.
Answer/End
the call App calls VTO: Tap to call the TVO; tap to hang up the call.
App answers the call from VTO: Tap to answer the call; tap to
Unlock
VTO that has two locks can be added to the App. Tap , and then select
33
6 Alarm Control
You can manage the added alarm hub and its detectors such as switching protection mode,
setting arm or disarm, and deleting devices.
Tap the protection mode icon, and then you can switch modes.
34
Figure 6-2 Switch protection mode
: Disarm mode. All detectors are disabled by default and you can set as needed.
: Stay mode. All detectors are disabled by default and you can set as needed.
: Away mode. All detectors are disabled by default and you can set as needed.
Tap the protection mode icon, tap , and then you can enable or disable detectors under
different protection modes.
Figure 6-3 Mode setting
35
6.2 Configuring Alarm Devices
Configuration interfaces might vary with different devices, and the actual interface shall prevail.
You can also tap the alarm detector under an alarm hub on the Home interface, and then tap
36
Select a linked channel, and then tap Live View of Linked Channel, you can view live
video of that channel.
By enabling the siren, it will give a sound when the alarm is triggered.
Figure 6-5 Configure the alarm detector
37
7 Access
You can view door status, unlock records, remotely unlock the door, watch live video of the
access control device, and more.
Tap to go to device details interface, and then you can view device
configuration, and view unlock records within 7 days.
Device details
You can also tap of the access control device on the Home interface,
and then tap Device Details.
38
Function Description
: Unlock by card.
: Unlock by fingerprint.
: Unlock by password.
: Unlock by key.
Unlock records
: Unlock by face.
: Duress unlock.
Tap More at the bottom of the interface to view unlock records within 7
More
days.
Tap Live View to go to live view of the device. See Figure 7-2.
Tap for snapshot.
Live view Tap to mute the video; tap unmute the video.
39
Figure 7-2 Access (live)
40
8 Cloud Storage
Recorded videos and snapshots of account devices are stored in Cloud Storage, and you can
view them on different mobile clients.
Tap , and then you can view information about your cloud storage plan such as
paid, cancelled, and unpaid orders.
Tap search bar, and then you can enter keywords to search the device.
Tap Purchase Cloud Storage to purchase cloud storage.
Tap of a device to view its cloud storage details.
Step 2 Tap the video files of a device in the list.
Step 3 Tap one video to play back.
41
Tap to select the date on the calendar. The date with a blue dot means it has cloud
record.
42
9 Favorites
You can save channels to Favorites so as to find them and go to live view quickly when
needed.
Step 2 Tap , select one or multiple channels from the same device type, and then tap Next.
Step 3 Enter favorites name to create the favorites.
Figure 9-1 Favorites created
43
10 File
You can view, manage, share, and export the recorded videos and snapshots in File.
Tap , select one or multiple files, and then tap to share; tap to save files on your
Tap a video or a snapshot to view details, and for detailed function icon descriptions on video
playback interface, see Table 4-1.
44
Figure 10-2 Recorded videos
45
11 Message
Alarm messages generated by added devices can be pushed to the App. You can view
recorded videos, live video, and picture playback of alarm events.
You need to set alarm rules and enable alarm function of the device or channel.
You need to subscribe alarm messages, and then the alarm notification can be pushed to App
when the alarm is triggered.
Step 1 On the Home interface, tap , and then tap Device Details.
Step 2 Tap Alarm Subscription, and then enable the alarm subscription.
Figure 11-1 Enable alarm subscription
Step 3 Set Prompt Type and alarm types as needed. Multiple alarm types can be selected
simultaneously.
46
Table 11-1 Configure alarm subscription
Name Description
Live: Live video is pushed when the alarm is triggered.
Video: The recorded alarm video will be pushed when the alarm is
triggered.
Prompt type
You need to install storage device and configure video plan of the device
first.
Select alarm types and its specific alarm event, and then alarm notification
will be pushed when the alarm events happened.
AI analysis: The alarm is triggered when the set rules are broken such
as Tripwire, Intrusion, Abandoned Object, and Scene Changing.
Stereo Vision: Defined behaviors will be detected and alarmed such as
Fall Detection, People Approaching, and People Stay.
Thermal Alarm: The alarm is triggered when there is abnormal
temperature change in the image such as Fire Alarm, Temperature
Contrast Alarm, Hot Spot Alarm, and Smoking Alarm.
47
11.2 Viewing Messages
Function Description
Personal Display messages such as sharing
message devices, and deleting devices. Personal and system messages
System Display messages such as system can only be viewed after login.
message maintenance and declaration.
Display messages when alarm events happened.
Alarm
message Tap at the upper-right corner to select alarm message sources from
cameras, video intercoms, alarm devices, or all devices.
Step 1 On the Message interface, tap an alarm event to view its alarm messages.
48
Figure 11-3 Alarm messages
49
Figure 11-4 Display the alarm message
Step 3 Tap , select one or multiple messages with red dot, and then tap Mark as read to
mark the selected messages as read.
Step 3 Tap , select one or multiple messages, and then tap Delete.
50
12 System Configuration
On Me interface, you can set PTZ speed, snapshot capturing mode, enable password
protection, view help files, and more.
Tap Me at the bottom of the interface.
Figure 12-1 Me
12.1 Setting
51
Figure 12-2 Setting
12.2 General
By enabling Auto Play When Not in a Wi-Fi Network, videos can be automatically played
with other network such as cellular data.
By enabling Notification and set push period, notifications can only be pushed within the
defined period. Period setting is only supported by account devices.
52
12.3 Password Security
By enabling Password Protection, set password, and then you need to enter password
every time you log in to the App or return to App from any interruption.
Modify Password: The function appears after you enable Password Protection, and you
can modify the protection password.
Reset Device Password: Follow on-screen instructions to scan the QR code and reset
device password as needed.
On Me interface, tap Change Region, and then you can reselect your region.
You can connect to Alexa and Google Home assistant to DMSS App, and control devices on
the DMSS with Alexa or Google assistant. Follow on-screen instructions to finish configuration.
12.7 About
53
You can view information about the App such as the version, privacy policy, user agreement,
declaration, and user data protection guideline, and join user experience plan.
54
13 Account Management
You can modify the account password, delete account, export account information, and log out.
On Me interface, tap .
Figure 13-1 Account management
Delete Account
55
14 FAQ
1. Invalid username/Incorrect password/Forgot password
Please confirm the username and password. If you forget the password, reset the device,
and then log in to the App again.
2. Locked account
Account is locked due to multiple times of incorrect input. Please wait until lock period ends
or you can reboot the device to unlock.
Make sure that the password is correct or enter it again. If you forget the password, reset
the device, and then log in to the App again.
3. Device connection failed/Login timeout
Make sure that the device has connected to the network.
Make sure that the port and IP are correct. Default IP/domain port is 37777.
Use another device port in case that it is shielded by the Internet carrier or used by other
device in the same LAN.
Use another network or Internet carrier in case of network problem.
4. Over max user connections
The prompt means that current device has reached max user limitation. If you want to add
this device to your App, please reduce users connected to this device.
5. Out of resource. The system is currently busy.
Please restart the device or reduce users connected to the device.
6. Alarm notification cannot be received
If the device does not support alarm notification push, then your mobile phone cannot
receive alarm notification.
Make sure that the device connects to network correctly and live view is available.
Make sure that the device or channel has subscribed alarm notification.
If all of the above operations are proper, make sure that device port mapping is correct.
Otherwise, you can change http port for mapping.
7. Alarm message cannot be subscribed
The device does not support alarm notification subscription.
Make sure that the device connects to network correctly and live view is available.
Change device http port, and then map again to prevent port conflict or occupation,
otherwise improper device might be connected, which do not support alarm notification
subscription.
8. The device can be connected to App in a Wi-Fi network not in a cellular network
The device can be connected to App through Wi-Fi but not cellular data
When the device can be used in a Wi-Fi network, its configuration is correct. If you need to
play with cellular data, you need to:
Add a fixed Internet IP to your device.
Connect the device to a router with an Internet IP, and map http port.
Connect the device to an Internet network. If the device supports P2P and can be
registered through P2P, you can add the device through P2P.
9. Failed to play back videos and snapshots
56
Enable recording/snapshot plan for the device.
If the problem still exists, check if device storage component is loose, or disk is damaged.
10. Live view lagged
Change main stream to sub stream.
Network bandwidth is insufficient. We recommend you to use a better network.
Mobile phone decoding capacity is limited. You can play live video in one window, or adjust
definition from HD to SD or auto.
11. Wi-Fi configuration failed
Make sure that the mobile phone has connected to Wi-Fi network and check Wi-Fi
password during network configuration.
Do not use dual band router with 5G frequency.
During network configuration, keep your mobile phone close to the device (max distance
30 cm).
If you have configured the network for the device, you need to reset the device, and then
configure other network.
If the problem still exists, please reset the device.
12. Device initialization failed
Make sure that the device has connected to the network.
Make sure that the mobile phone and the device are in the same LAN with either Wi-Fi
connection or wired connection.
If the problem still exists, please reset the device.
13. How to view multiple channels simultaneously
Make sure the function is support by the App. Tap on live view interface, select
channels you want to view, and then tap Start Live View.
14. How to control PTZ directions and PTZ zoom
Select a video, and then tap to control PTZ. You can use icons or gestures to control
PTZ. Swipe on the screen to control the PTZ direction. Pinch or stretch out with two fingers
to zoom in or zoom out.
15. How to make a blurred video clear
Select a video, and then tap to switch the stream from SD and HD.
On Live interface, tap , select Remote Configuration > Image Adjustment, select the
device channel, and then tap to switch video quality. Tap to switch to real-time
interface, tap , select Remote Configuration > Camera Setting > Video Stream. If
your mobile phone performance and network environment are both good, select main
stream, and then customize resolution, frame rate, and bitrate.
16. How to close a playing video
57
Tap and hold the video, drag it to the trash bin appeared on the top of the interface, and
then release.
17. How to close video during playback
Tap and hold the video, drag it to the trash bin appeared on the top of the interface, and
then release.
You can also tap (a cross in the center) to close all the played videos.
18. Videos cannot be viewed
Step 1 Make sure that the information such as IP address and port (37777 by default) is
correct when you add the device.
Step 2 Deal with the problem according to the on-screen instructions when you failed to log in.
Step 3 If the problem still exists, check whether the device is online.
19. Where are Remote Configuration, HDD, and Alarm Output
On the Home interface, tap , and then tap Device Details.
You can also tap the device or channel, and then tap on the interface to go to device
management interface.
20. What are the differences between the following device adding methods
P2P type: P2P function is supported by the device. You can add the device by scanning or
manually enter QR code.
IP/Domain: Generally, devices can be added by entering their IP. You can also add
devices if you have domain address from the third party.
21. How to share snapshots with my friend
You can share recorded videos or snapshots in File.
22. Why storage device is needed for local devices if you want to view videos after
alarm message is pushed
Videos cannot be stored on Android system. They are acquired from the added device.
23. Where to get the App
Search DMSS in Google Play.
58
Appendix 1 Cybersecurity Recommendations
Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is
connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic
steps toward protecting and strengthening networks and networked appliances will make them
less susceptible to attacks. Below are some tips and recommendations on how to create a
more secured security system.
Mandatory actions to be taken for basic equipment network security:
1. Use Strong Passwords
Please refer to the following suggestions to set passwords:
The length should not be less than 8 characters;
Include at least two types of characters; character types include upper and lower case
letters, numbers and symbols;
Do not contain the account name or the account name in reverse order;
Do not use continuous characters, such as 123, abc, etc.;
Do not use overlapped characters, such as 111, aaa, etc.;
2. Update Firmware and Client Software in Time
According to the standard procedure in Tech-industry, we recommend to keep your
equipment (such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the
system is equipped with the latest security patches and fixes. When the equipment is
connected to the public network, it is recommended to enable the “auto-check for
updates” function to obtain timely information of firmware updates released by the
manufacturer.
We suggest that you download and use the latest version of client software.
"Nice to have" recommendations to improve your equipment network security:
1. Physical Protection
We suggest that you perform physical protection to equipment, especially storage devices.
For example, place the equipment in a special computer room and cabinet, and implement
well-done access control permission and key management to prevent unauthorized
personnel from carrying out physical contacts such as damaging hardware, unauthorized
connection of removable equipment (such as USB flash disk, serial port), etc.
2. Change Passwords Regularly
We suggest that you change passwords regularly to reduce the risk of being guessed or
cracked.
3. Set and Update Passwords Reset Information Timely
The equipment supports password reset function. Please set up related information for
password reset in time, including the end user’s mailbox and password protection
questions. If the information changes, please modify it in time. When setting password
protection questions, it is suggested not to use those that can be easily guessed.
4. Enable Account Lock
The account lock feature is enabled by default, and we recommend you to keep it on to
guarantee the account security. If an attacker attempts to log in with the wrong password
several times, the corresponding account and the source IP address will be locked.
5. Change Default HTTP and Other Service Ports
59
We suggest you to change default HTTP and other service ports into any set of numbers
between 1024~65535, reducing the risk of outsiders being able to guess which ports you
are using.
6. Enable HTTPS
We suggest you to enable HTTPS, so that you visit Web service through a secure
communication channel.
7. Enable Whitelist
We suggest you to enable whitelist function to prevent everyone, except those with
specified IP addresses, from accessing the system. Therefore, please be sure to add your
computer’s IP address and the accompanying equipment’s IP address to the whitelist.
8. MAC Address Binding
We recommend you to bind the IP and MAC address of the gateway to the equipment,
thus reducing the risk of ARP spoofing.
9. Assign Accounts and Privileges Reasonably
According to business and management requirements, reasonably add users and assign a
minimum set of permissions to them.
10. Disable Unnecessary Services and Choose Secure Modes
If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP,
etc., to reduce risks.
If necessary, it is highly recommended that you use safe modes, including but not limited to
the following services:
SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication
passwords.
SMTP: Choose TLS to access mailbox server.
FTP: Choose SFTP, and set up strong passwords.
AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords.
11. Audio and Video Encrypted Transmission
If your audio and video data contents are very important or sensitive, we recommend that
you use encrypted transmission function, to reduce the risk of audio and video data being
stolen during transmission.
Reminder: encrypted transmission will cause some loss in transmission efficiency.
12. Secure Auditing
Check online users: we suggest that you check online users regularly to see if the
device is logged in without authorization.
Check equipment log: By viewing the logs, you can know the IP addresses that were
used to log in to your devices and their key operations.
13. Network Log
Due to the limited storage capacity of the equipment, the stored log is limited. If you need
to save the log for a long time, it is recommended that you enable the network log function
to ensure that the critical logs are synchronized to the network log server for tracing.
14. Construct a Safe Network Environment
In order to better ensure the safety of equipment and reduce potential cyber risks, we
recommend:
Disable the port mapping function of the router to avoid direct access to the intranet
devices from external network.
The network should be partitioned and isolated according to the actual network needs.
If there are no communication requirements between two sub networks, it is
60
suggested to use VLAN, network GAP and other technologies to partition the network,
so as to achieve the network isolation effect.
Establish the 802.1x access authentication system to reduce the risk of unauthorized
access to private networks.
61