user manual of docking stations PD80

Publish Time: 2025-08-22 06:55:15

Docking Station Basic operation

   Docking Station The switch is similar to the ordinary home computer switch machine. The specific switch machine steps are as follows:

1Turn on the main power

The host is equipped with a 220V power supply, the power cable is plugged into the host, and the other end is connected to the 220V power supply. When the power cable is connected, ensure that the host is in the power-off state to avoid damage to the host when the power is turned on instantaneously.Press the 220V power switch. The 220V power switch indicator is on.

 

(2)Open the power button at the bottom of the back of the display device display to enter the computer boot state.

 

 

3Under normal conditions,ou can see that the (Data collection station)Acquisition interface.   

 

 

 

 

 

 

Catalogue

1. Document description..................................................................................................... 3

1.1 Purpose of this guide.............................................................................................. 3

1.2 Range of application............................................................................................... 3

1.3 File structure......................................................................................................... 3

2 System settings............................................................................................................... 4

2.1 Setting storage space............................................................................................. 4

2.2 How do clean up file when pc have not storage?........................................................ 6

2.2 Setting department................................................................................................ 7

2.3 Setting Officer ID.................................................................................................. 10

3. Download files from camera........................................................................................... 12

4. Review files.................................................................................................................. 13

4.1 Search a files....................................................................................................... 13

4.2 Playback a video file.............................................................................................. 14

4.3 protect a file........................................................................................................ 17

4.4 Download a file to you remove drive....................................................................... 18

4.5 Burn video file to you rewrite CD............................................................................ 19

4.6 Import files from a storatge directory..................................................................... 19

5.Report.......................................................................................................................... 20

6. log.............................................................................................................................. 21

7. Security for system........................................................................................................ 22

7.1 Create user......................................................................................................... 23

7.2 authorizate to a user............................................................................................ 24

8. Change password......................................................................................................... 25

9.Exit System................................................................................................................... 27

9.1. How do modify the password for exit system.......................................................... 28

10. Web UI System............................................................................................................ 31

10.1 Website URL login........................................................................................ 31

10.2 Platform login............................................................................................. 31

10.3 Navigator menu.......................................................................................... 32

10.4 Features menu............................................................................................ 33

10.5 Reports...................................................................................................... 39

10.6 System....................................................................................................... 41

 

 

1. Document description

1.1 Purpose of this guide  

 This manual is the user manual of Digital Evidence Management System, mainly to guide users to use this product. By providing detailed instructions interface for user, and to guide software operator to fast and convenient to use this system.

Intended readers of this manual is the final user, the system administrator, system installation and maintenance people.

1.2 Range of application

  This manual is aimed at the final user of Digital Evidence Management System. We assume that user equipped with basic computer skills, familiar with the Windows operating environment and has mastered the basic operation method of the software, and the basic use of the Internet Explorer browser.

1.3 File structure

This specification is comprised of the documentation, system settings and system function module operation. There is detailed description for users to use this system in second chapter, please read it carefully before using it.

2 System settings

 2.1 Setting storage space

If you install the progarm at first time,Please setting the program storage space as soon. Default storage is drive E.But some use have not the drive.

First step:Click right the button, enter the password

(note: The administrator is "admin"  and the initial password:888) 

 Enter  login user and password interface

Second step: Click the button " options " right the menu

 

 

parameter Settings interface

Note: If your pc have not the drive E,Please select other drive.

2.2 How do clean up file when pc have not storage?

  There are three storage strategys for selecting.

1.     Cover the oldest file.

The docking station system will delete the oldest file when you PC have not space. And the docking station only delete few file and empty enough  storage  when the full space event occur.

2.     Auto purge expired file

The docking station system will delete all expired files and empty much more storage when the full space event occur.

   For the expired date parameter. You can set it in basic intormation feature.

3.     Manual clean up space

The docking station sysem will not delete any file when the full event occur.

 

2.2 Setting department

If there are more department in your division. And every officer of each department was not allowed share video file. You have to set the department. The setting step:

First step: log in system

Open the docking station system, use the admin user log in (initial password is 888), Login to system.

Second step: Setting department

   Set up department management first:     

           Department management interface diagram  

Select 01 XX division, click” edit “to change the name of the entity (Note:the first department is a main division,It is default division for system, you can change the department name to your division and department Number, but you can not delete it), Other department was abled to create under the main division.                         

 

Create a department:

                                

                            

Note:You must select a parent department.

2.3 Setting Officer ID.

   If you would like to all files  that  were record by  camera show camera information and officer information. You have to bind a officer information to a camera.

  The setting stetp as follow:

  First  enter personnel feature,

 

Second step add a offier and allocate a camera to the new officer.

                                               

Note:You also may do that after download files from camera.

 

3. Download files from camera.

Open the docking station system and insert a camera. It will download files from camera automatically.

Downloading files

4. Review files.

 function description

  You can search file by camera ID, Officer name,recorded date etc. And you also playback a video file and label these files etc.of couse. You may delete a file, protect a file,download a file to your remove drive etc, And more Instructions by read follow description.

  4.1 Search a files.

  Please enter the query condition. And click the “Search” button.

4.2 Playback a video file

 Select a record, and click “play” button. You will can playback the video file.

 

 

 

 

 

 

 

If you would like to show the file more informations when playback the video. You have to click the “Detail” button or double click the record.

 

4.3 protect a file

If you would like to protect a file prevent the file deleted.you have to click the “protect” button after select a file .Of couse. You  click the “unprotect” button to cancel protect status.

 

4.4 Download a file to you remove drive

Note:You need select a directory for storage the file in pop-pup window.

 

4.5 Burn video file to you rewrite CD.

   If you would like to use the feature. You need check your PC wether have a rewrite DVD drive. If there is not rewrite DVD drive. You will be able to use the feature.

4.6 Import files from a storatge directory.

   You can import some indexes of video files to the database. So that the docking sation system can management other video file  that storaged your PC but did not download by docking station system.

Note:You may select more files when select file with mouse at same time key down the shift keyboard.

Note: Only  structure of file name “ID@yyyymmddhhnnss.xxx”  can be Identificated and import to database.

 

5.Report

Report feature only provide some simple total information.

 

6. log

function description

User can see the log information for docking station system.

 

Note: the logs are automatically cleaned up on a regular basis. The time interval is about 6 months.

              

7. Security for system

function description

   The feature is provided to administrator user for management the login user. Include to add a user. And authorize to a user etc.

 

 

7.1 Create user

 instruction

User click “add” button,as follow:

Create user information

1. The new user need be inputed the user ID , the user name, department. Password.

2.The password need be set six digits include number and letter.

 

7.2 authorizate to a user

 instruction

1 Use admin account log in system and into security feature as follow:

 

2. Select a function feature, and setting "√" will be allowed.

 

8. Change password

function description

User can modify the password for logining system.

 

 

 

 

 

 

 

 

9.Exit System

If you would like to exit the program, Please click the button.

And enter password:2014 in a pop-pup window,It is the default password.Of couse. You can modify the password in the options menu.

 

9.1. How do modify the password for exit system

Note:You must save the information after setting these parameters.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

10. Web UI System

Note:Web UI system only is installed in the docking station with motherboard and hard drive and screen. If you are using a PC as docking station. The package of WebUI system will not be included to be released install file package.

10.1 Website URL login

Open the browser, enter 127.0.0.1 address in the address bar, as shown below:

10.2 Platform login

After login platform, enter user name (admin) and password (888) to enter the DEMS platform interface.

10.3 Navigator menu

The left bar shows the Navigator menu, which consists of Features, Reports and System.

The right bar shows  login account, edit password, safe logout, and time display.

10.3.1 To ensure the safety of user login password and data, user can reset password. Click on  to change password.

10.3.2 If user intends to log out DEMS platform, click on  button and system will return to login page.

 

10.4 Features menu

Features menu consists of Review Files, Division, Personnel and Docking Station.

10.4.1 In Review Files, users can search and browse files according to their needs through single or multiple conditions such as Date Update, Office ID and Device ID

 

10.4.2 The user can also Lock, Unlock, Play, Protect, Unprotect, Remove, Download, Export the uploaded files.

Ÿ   Lock: user can protect the uploaded important files, so the locked files will not be deleted during the system automatically empty the expired files.

Ÿ   Unlock: unlock the locked files so user can promptly deal with those files after being unlocked.

Ÿ   Remove: user can delete the uploaded files from the device or those files no longer needed.

Ÿ   Download: user can download the important files that he needs.

Ÿ   Export: user can export the required files.

Ÿ   Division: user can add, modify, delete, query operation on the department according to his needs .

 

 

 

 

 

 

 

 

 

10.4.3 Use the button to add the Division information. After the addition is completed, the user can see the information of Add Division. The Add Department shows as follows:

 

Remark: In the Add Department, you must select the parent unit with the following tips.

 

 

 

User can click the button to modify the Division information. After the modification is completed, the user can see the information of Modify Division. The Modify Department shows as follows:

 

The user clicks the  button to delete the information. After the deletion is completed, the user cannot see the information of the Removed Department. The display of the Remove Department is as follows:

 

 

The user can click the button to export Department information. Click the  button to select the location where the files will be saved. The Export Department will display the following figure:

10.4.4 In Personnel, user can query Personnel information here according to their needs through single condition or multiple conditions such as Office ID and Office Name.

User can click the  button to Add Personnel information. After the increase is completed, the user can see Add Personnel. Add Personnel display shown as below:

The user can click the  button to modify the information. After the modification is successful, the user can see Modify Personnel. Modify Personnel as shown in the figure below:

The user can click the  button to delete the information, and the Remove Personnel is displayed as follows:

The user can click the  button to export the police information. After the export is successful, the user can see the police officer information by opening the location of the stored files.

The following shows the Export Personnel:

10.4.5 Docking Station

In Personnel menu, user can quickly query the docking station information through the Department, Host IP and other single or multiple conditions according to his needs.

10.5 Reports

Reports consist of Reports and Log.

10.5.1 Users can query Uploaded by Officer, Uploaded by Department, Playback Frequency, etc. in single or comprehensive conditions such as Office ID, Officer Name, Date Recorded Department, etc. in Reports. The result is as the following figure:

Ÿ   Uploaded by Officer: users can see the police unit name, police number, police name, the number of uploaded files, those files with key annotation and other information.

Ÿ   Uploaded by Department: users can see the number of body worn cameras, the usage rate of body worn cameras, the number of files and other information.

Ÿ   Playback Frequency: users can see the statistics of the file attribution department, file collection staff, collection time, the number of file playback and other information.

10.5.2 Users can quickly search log according to single condition or comprehensive conditions through User, Event, Event Content, Upload IP address and Time.

Log shows what specific action was performed by the user in the system and further records the user's detailed operation.

10.6 System

System is composed of Security, Options, Setting Docking.

In Security menu users can make quick query of User NO, User Name based on single or double conditions.

10.6.1 Users can also allocate Add New User according to their own needs. At the same time, users can assign new permissions to newly added users (for example, file management, log management, system setting, department management, device management, information setting and etc.), as shown below:

10.6.2 Users can also modify their existing accounts according to their own needs and reallocate their existing accounts (for example, allowing deletion of files, downloading of files, setting of systems, prohibition of viewing other users’ profiles, setting of information, etc.) Users modify the operation as shown below:

10.6.3 Users can also delete operation of the existing account so after the user login with the account is deleted, the login will not be successful. User delete operation as shown below:

Options is composed of Options and Subtask

10.6.4 In Options menu, Basic Information includes Media types, Operation Category, Main task, and Importance level.

Media types: operate the format of the upload file.

Ÿ   Increase the file format: if the existing file format cannot meet the needs of users, the user can query the format type of the camera files, and to modify the format this feature to facilitate file playback.

Ÿ   Modify: modify the file format, users can make changes to facilitate use of this feature according to their needs.

Ÿ   Remove: users can delete the unwanted file formats.

 

 

 

 

 

 

 

 

 

10.6.5 In the Operation Category interface, the users can see the following in the system which features with permission to operate information:

10.6.6 In the Main Task interface, user can use the service to be processed or the type of the service that has been processed. Users can also add a new service type according to their needs or modify the existing service type, delete the unwanted business information.

10.6.7 Importance level: to grade the files to be protected, make sure that it is protected for a specified period of time and the file deletion is invalid during the time period of protection.

Modify Importance level: users can modify the file level and storage time.

Remove Importance level: users can empty the unrequired level information according to the demand.