Development of those things: summary of encryption machine authorization considerations and solutions

In previous articles, we have mentioned the authorization methods of video platforms such as EasyGBS, EasyNVR, EasyCVR, and EasyDSS. There are three ways: encryption machine, dongle, and activation code, among which the encryption machine is used more. Recently, some users have reported that the authorization of the encryption machine is abnormal. We have sorted out the precautions for the authorization of the encryption machine. You can learn it in case of emergency.

First, use the encryption machine search tool EasyTools to search for the encryption machine IP (you can choose a fixed IP if you can’t find it), the default port is 10888, and log in to the encryption machine background as follows:

1. The network where the encryption machine is located must communicate with the network of the server where the authorized target is located. If the server is on the public network, then the encryption machine network must ensure access to the public network, which is the prerequisite for encryption machine authorization;

2. Confirm whether the authorized software of the encryption machine is consistent with the purchased software. There are often users who purchase EasyNVR, but actually use EasyCVR, the product is different, and naturally the authorization cannot be obtained;

3. Confirm the system platform Windows/Linux. The encryption machine is divided into systems, and the server system must be consistent with the encryption machine system platform;

4. The information configured in the encryption machine is the information of the software platform (access address, user name, password). It is worth noting that the server address here must be complete and must include the port. Taking EasyCVR products as an example, the server address should be: 127.0.0.1:18000;

5. There is another situation, that is, all the above items are correct but the authorization is still abnormal. You can pay attention to whether the firewall of the target server is turned on, because there may be a possibility of intercepting the port of the encryption machine. In this case, you can first turn off the firewall for verification.

Common authorization problems and solutions are the above. If you still have authorization problems after excluding the above situations, you can contact our technical staff for assistance.

We have also recently released an introduction to the cloud-side AI intelligent analysis gateway, related functions and application scenarios. Interested users can read our historical articles to learn more. The device has a built-in multi-algorithm framework, supports AI intelligent identification of multiple video streams connected, and supports accurate research and judgment of abnormalities and violations in the monitoring scene. The intelligent identification functions that can be provided include: face detection, human body detection, Area intrusion detection, helmet detection, etc. The AI ​​project also supports trial and error in small batches, and interested users can learn more about it.

Guess you like

Origin blog.csdn.net/TsingSee/article/details/127692227