AXISD1110VideoDecoder4K
Learnmore
Learnmore
Streamingandstorage
Videocompressionformats
Decidewhichcompressionmethodtousebasedonyourviewingrequirements,andonthepropertiesofyournetwork.The
availableoptionsare:
H.264orMPEG-4Part10/AVC
Note
H.264isalicensedtechnology.TheAxisproductincludesoneH.264viewingclientlicense.Toinstalladditionalunlicensed
copiesoftheclientisprohibited.Topurchaseadditionallicenses,contactyourAxisreseller.
H.264can,withoutcompromisingimagequality,reducethesizeofadigitalvideolebymorethan80%comparedtotheMotion
JPEGformatandbyasmuchas50%comparedtoolderMPEGformats.Thismeansthatlessnetworkbandwidthandstoragespace
arerequiredforavideole.Orseenanotherway,highervideoqualitycanbeachievedforagivenbitrate.
H.265orMPEG-HPart2/HEVC
H.265can,withoutcompromisingimagequality,reducethesizeofadigitalvideolebymorethan25%comparedtoH.264.
Note
•H.265islicensedtechnology.TheAxisproductincludesoneH.265viewingclientlicense.Installingadditionalunlicensed
copiesoftheclientisprohibited.Topurchaseadditionallicenses,contactyourAxisreseller.
•Mostwebbrowsersdon’tsupportH.265decodingandbecauseofthisthecameradoesn’tsupportitinitswebinterface.
InsteadyoucanuseavideomanagementsystemorapplicationsupportingH.265decoding.
Externalstoragedevice
Toberecognizedbythevideodecoder,therstpartitionofyouexternalstoragedevicemustuseanexFATorext4lesystem.
Cybersecurity
Signedrmware
Signedrmwareisimplementedbythesoftwarevendorsigningthermwareimagewithaprivatekey.Whenarmwarehasthis
signatureattachedtoit,adevicewillvalidatethermwarebeforeacceptingtoinstallit.Ifthedevicedetectsthatthermware
integrityiscompromised,thermwareupgradewillberejected.
Secureboot
Securebootisabootprocessthatconsistsofanunbrokenchainofcryptographicallyvalidatedsoftware,startinginimmutable
memory(bootROM).Beingbasedontheuseofsignedrmware,securebootensuresthatadevicecanbootonlywithauthorized
rmware.
AxisEdgeVault
AxisEdgeVaultprovidesahardware-basedcybersecurityplatformthatsafeguardstheAxisdevice.Itoffersfeaturestoguaranteethe
device’sidentityandintegrityandtoprotectyoursensitiveinformationfromunauthorizedaccess.Itbuildsonastrongfoundationof
cryptographiccomputingmodules(secureelementandTPM)andSoCsecurity(TEEandsecureboot),combinedwithexpertisein
edgedevicesecurity.
24