AXISQ36DomeCameraSeries
Learnmore
AXISObjectAnalytics
AXISObjectAnalyticsisananalyticapplicationthatcomespreinstalledonthecamera.Itdetectsobjectsthatmoveinthesceneand
classiesthemas,forexample,humansorvehicles.Youcansetuptheapplicationtosendalarmsfordifferenttypesofobjects.To
ndoutmoreabouthowtheapplicationworks,seeAXISObjectAnalyticsusermanual.
Security
Signedrmware
Signedrmwareisimplementedbythesoftwarevendorsigningthermwareimagewithaprivatekey.Whenarmwarehasthis
signatureattachedtoit,adevicewillvalidatethermwarebeforeacceptingtoinstallit.Ifthedevicedetectsthatthermware
integrityiscompromised,thermwareupgradewillberejected.
Secureboot
Securebootisabootprocessthatconsistsofanunbrokenchainofcryptographicallyvalidatedsoftware,startinginimmutable
memory(bootROM).Beingbasedontheuseofsignedrmware,securebootensuresthatadevicecanbootonlywithauthorized
rmware.
AxisEdgeVault
AxisEdgeVaultisasecurecryptographiccomputemodulewhichcanbeusedforcryptographicoperationsonsecurelystored
certicates.EdgeVaultprovidestamperprotectedstorage,enablingeachdevicetoprotectitssecrets.Itsetsafoundationforsafe
implementationofmoreadvancedsecurityfeatures.
TPMmodule
TheTPM(TrustedPlatformModule)isacomponentthatprovidescryptographicfeaturestoprotectinformationfromunauthorized
access.Itisalwaysactivatedandtherearenosettingsyoucanchange.
AxisdeviceID
AxisdeviceIDworkslikeadigitalpassport,uniqueforeachdeviceunit.ItissecurelyandpermanentlystoredinEdgeVaultasa
certicatesignedbyAxisrootcerticate.AxisdeviceIDisdesignedtoprovetheoriginofthedevice,enablinganewlevelof
devicetrustthroughthelifecycleoftheproduct.
Signedvideo
Signedvideoensuresthatvideoevidencecanbeveriedasuntamperedwithoutprovingthechainofcustodyofthevideole.Each
camerausesitsuniqueAxisdeviceID,securelykeptinAxisEdgeVault,toaddasignatureintothevideostream.Whenthevideo
isplayed,theleplayershowswhetherthevideoisintact.Signedvideohencemakesitpossibletotracethevideobacktothe
origincameraandverifythatthevideohasnotbeentamperedafteritleftthecamera.
TolearnmoreaboutcybersecurityfeaturesinAxisdevices,gotoaxis.com/learning/white-papersandsearchforcybersecurity.
58