Digital Indoor Monitor Guide
Digital Indoor Monitor Guide
6 version)
User's Manual
V1.0.0
Foreword
General
This manual introduces the installation, functions and operations of the digital indoor monitor
device (hereinafter referred to as "the Device"). Read carefully before using the device, and keep the
manual safe for future reference.
Safety Instructions
The following signal words might appear in the manual.
Signal Words Meaning
Revision History
Version Revision Content Release Time
V1.0.0 First release. September 2022
I
might result in some differences appearing between the actual product and the manual. Please
contact customer service for the latest program and supplementary documentation.
● There might be errors in the print or deviations in the description of the functions, operations
and technical data. If there is any doubt or dispute, we reserve the right of final explanation.
● Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
● All trademarks, registered trademarks and company names in the manual are properties of their
respective owners.
● Please visit our website, contact the supplier or customer service if any problems occur while
using the device.
● If there is any uncertainty or controversy, we reserve the right of final explanation.
II
Important Safeguard and Warnings
This section introduces content covering the proper handling of the device, hazard prevention, and
prevention of property damage. Read carefully before using the device, and comply with the
guidelines when using it.
Operation Requirements
Installation Requirements
● Do not connect the power adapter to the device while the adapter is powered on.
● Strictly comply with the local electric safety code and standards. Make sure the ambient voltage
is stable and meets the power supply requirements of the device.
● Do not connect the device to two or more kinds of power supplies, to avoid damage to the
device.
● Improper use of the battery might result in a fire or explosion.
● Personnel working at heights must take all necessary measures to ensure personal safety
including wearing a helmet and safety belts.
● Do not place the device in a place exposed to sunlight or near heat sources.
● Keep the device away from dampness, dust, and soot.
● Install the device on a stable surface to prevent it from falling.
● Install the device in a well-ventilated place, and do not block its ventilation.
● Use an adapter or cabinet power supply provided by the manufacturer.
● Use the power cords that are recommended for the region and conform to the rated power
specifications.
● The power supply must conform to the requirements of ES1 in IEC 62368-1 standard and be no
higher than PS2. Please note that the power supply requirements are subject to the device label.
● The device is a class I electrical appliance. Make sure that the power supply of the device is
connected to a power socket with protective earthing.
III
Table of Contents
Foreword ........................................................................................................................................................................................................I
Important Safeguard and Warnings .............................................................................................................................................. III
1 Product Overview ................................................................................................................................................................................. 1
1.1 Introduction ................................................................................................................................................................................. 1
1.2 Function.......................................................................................................................................................................................... 1
2 VTH Screen Operation ........................................................................................................................................................................ 3
2.1 Home Screen ................................................................................................................................................................................ 3
2.2 Call..................................................................................................................................................................................................... 6
2.2.1 Call Log................................................................................................................................................................................. 6
2.2.2 Contacts ............................................................................................................................................................................... 7
2.2.3 Calling User ........................................................................................................................................................................ 8
[Link] By Room Number ................................................................................................................................................. 8
[Link] From Contact.......................................................................................................................................................... 9
2.2.4 Call from User ................................................................................................................................................................. 10
2.2.5 Call from VTO .................................................................................................................................................................. 11
2.2.6 Calling DMSS ................................................................................................................................................................... 12
2.3 Information.................................................................................................................................................................................13
2.3.1 Security Alarm ................................................................................................................................................................13
2.3.2 Guest Message ...............................................................................................................................................................14
2.3.3 Publish Information.....................................................................................................................................................14
2.3.4 Video Pictures................................................................................................................................................................. 15
2.4 Monitor .........................................................................................................................................................................................15
2.4.1 Monitoring VTO .............................................................................................................................................................16
2.4.2 Monitoring IPC ...............................................................................................................................................................17
[Link] Adding IPC .............................................................................................................................................................17
[Link] Modifying IPC ......................................................................................................................................................19
[Link] Deleting IPC ..........................................................................................................................................................19
[Link] Monitoring IPC ....................................................................................................................................................19
2.4.3 Favorite ..............................................................................................................................................................................20
2.5 Concierge .....................................................................................................................................................................................21
2.6 Setting ...........................................................................................................................................................................................21
2.6.1 Ring Settings ................................................................................................................................................................... 21
[Link] VTO Ring ................................................................................................................................................................. 21
[Link] VTH Ring ................................................................................................................................................................. 22
[Link] Alarm Ring .............................................................................................................................................................23
IV
[Link] Other Ring Settings...........................................................................................................................................23
2.6.2 Card Information...........................................................................................................................................................24
2.6.3 Alarm Setting .................................................................................................................................................................. 25
[Link] Wired Zone ............................................................................................................................................................25
[Link] Wireless Zone.......................................................................................................................................................27
[Link] Alarm Output .......................................................................................................................................................28
2.6.4 Mode Setting................................................................................................................................................................... 29
2.6.5 Forward Setting .............................................................................................................................................................31
2.6.6 General Setting ..............................................................................................................................................................32
[Link] Time Setting and DND ..................................................................................................................................... 32
[Link] Display Setting ....................................................................................................................................................33
[Link] QR Code .................................................................................................................................................................. 34
[Link] Other Settings .....................................................................................................................................................36
2.6.7 WLAN ..................................................................................................................................................................................39
2.6.8 User Password Setting ...............................................................................................................................................41
2.6.9 Network Password Setting....................................................................................................................................... 42
[Link] Creating Network Password.........................................................................................................................42
[Link] Changing Network Password ......................................................................................................................44
[Link] Resetting Network Password.......................................................................................................................45
2.6.10 Product Information .................................................................................................................................................45
2.7 Project Settings ........................................................................................................................................................................46
2.7.1 Forget Password............................................................................................................................................................46
2.7.2 Network Settings ..........................................................................................................................................................47
2.7.3 VTH Configuration .......................................................................................................................................................48
2.7.4 VTO Configuration .......................................................................................................................................................49
2.7.5 Factory Reset................................................................................................................................................................... 50
2.7.6 Adding Device ................................................................................................................................................................51
2.7.7 Reset MSG .........................................................................................................................................................................53
2.8 Unlock Function ....................................................................................................................................................................... 54
2.9 Arm and Disarm Function....................................................................................................................................................54
2.9.1 Arm.......................................................................................................................................................................................54
2.9.2 Disarm ................................................................................................................................................................................55
3 DSS Agile VDP ......................................................................................................................................................................................57
3.1 Downloading the App ...........................................................................................................................................................57
3.2 Registration and Login .........................................................................................................................................................57
3.3 Call Functions ............................................................................................................................................................................60
3.3.1 Forwarding Calls ...........................................................................................................................................................60
3.3.2 Calling Operations .......................................................................................................................................................62
V
3.4 Monitoring ..................................................................................................................................................................................63
3.5 Call Records ................................................................................................................................................................................65
3.6 Message ........................................................................................................................................................................................66
3.7 Visitor ............................................................................................................................................................................................69
3.7.1 Creating Pass................................................................................................................................................................... 69
3.7.2 Visit Records .................................................................................................................................................................... 72
3.8 Setting ...........................................................................................................................................................................................73
4 DMSS .........................................................................................................................................................................................................75
4.1 Downloading DMSS................................................................................................................................................................75
4.2 Registration and Login .........................................................................................................................................................75
4.3 Adding VTH to DMSS .............................................................................................................................................................77
4.4 Configuring Arm and Disarm .............................................................................................................................................79
4.5 DMSS Calling VTH .................................................................................................................................................................... 81
4.6 DMSS Calling VTO.................................................................................................................................................................... 82
4.7 DMSS Unlocking Door ...........................................................................................................................................................83
4.8 DMSS Monitoring VTO ..........................................................................................................................................................84
4.9 Viewing Alarm Information ................................................................................................................................................86
4.10 Device Sharing........................................................................................................................................................................87
Appendix 1 Cybersecurity Recommendations ........................................................................................................................91
VI
1 Product Overview
1.1 Introduction
A digital VTH is a device that can perform monitoring, voice/video call, and door unlock.
1.2 Function
Wi-Fi Networking
Connect to Wi-Fi networks.
Video/Voice Call
Make video or voice call to other VTOs and VTHs.
Monitoring
Monitor fence station, VTO and IPC devices (only supported by certain models).
Concierge
Make calls to the Management Center.
Auto Snapshot
Take snapshots when calling or monitoring, and store them in the SD card.
Remote Unlock
Unlock doors remotely.
Playback
Play back videos and pictures in the SD card.
Alarm
Alarms will trigger linkage and be sent to the Call Center.
Record
View call and alarm records.
1
Message
View messages, including videos, pictures and announcements.
2
2 VTH Screen Operation
3
No. Name Description
Network connection status is displayed.
● :Not connected to the network.
4
Figure 2-2 Home screen (2)
5
No. Name Description
The network connection status.
● : Cloud function not enabled or in abnormal
8 Cloud Connection
status.
● : Cloud function enabled.
2.2 Call
Manage contact, call and view call records.
6
If storage is full, the oldest records will be overwritten. Back up the records as needed.
2.2.2 Contacts
Viewing Contacts
Tap Call > Contacts, and then add or edit the users.
Adding User
Figure 2-5 User information
1. Tap Add.
2. Enter the information.
7
3. Tap OK.
Related Operations
● Edit user information: Tap a user and tap Edit.
● Delete a user: Tap Edit, select a user, and then tap Delete.
◇ Call a user in other buildings or units, add the building number. For example, dial
8
If main VTH (101#0) calls extension (101#1), please enter room no.: #1; if the extension calls
main VTH, please enter room number.: #0.
Step 3 Tap .
If the VTH has a camera, there will be videos after answering the call.
9
Step 2 Select the one you want to call.
Step 3 Tap to start.
● : Answer.
● : Hang up.
10
Figure 2-10 Call screen (2)
/
The system provides 2-channel unlock. If the icon is gray, it means that the
unlock function of this channel is not available.
11
Key Description
Take snapshot.
Mute.
Reduce volume.
Increase volume.
Answer calls.
Hang up.
Tap to call the DMSS app account that the VTH has bonded with.
12
2.3 Information
You can view and manage different kinds of information.
● Information in Security Alarm and Publish Info is stored in the device, and the one in Guest
Message and Video Pictures is stored in the SD card, which means you need an SD card for
these two functions.
● Only certain models support SD card.
● If the storage in the Device or SD card is full, the oldest records will be overwritten. Back up the
records as needed.
Select Info > Security Alarm, and then you can view and manage all alarm records.
13
Figure 2-14 Security alarm
14
Figure 2-16 Publish information
2.4 Monitor
You can monitor VTO, fence station or IPC on the VTH.
15
2.4.1 Monitoring VTO
When adding VTOs, make sure that the username and password of each device is consistent with the
web login username and password. Otherwise, monitoring will not work properly.
Step 1 Select Monitor > VTO.
Select an IPC, and when this VTO or fence station calls, you will see the
monitoring image from this IPC.
Display the serial number of the VTO or fence station in QR code. Scan the
QR code in the app to add it to the app, and then you can monitor the VTO
from your smart phone.
Step 2 Tap .
16
Figure 2-19 Monitoring VTO
/
The system provides 2-channel unlock function. If the icon is gray, it means
that unlock function of this channel is not available.
Take snapshot.
Exit monitoring.
Tap to speak to the other end device, and tap again to stop.
17
● Before adding an IPC, make sure that it is powered on, and connected to the same network as the
VTH.
Step 1 Select Monitor > IPC.
18
Parameter Description
IPC32 Name Name of the IPC/NVR.
IP IP address of the IPC/NVR.
User Name
The login username and password of the web page of the IPC/NVR.
Password
Port 554 by default.
● Main stream: High definition that needs large amount of bandwidth.
Applicable to local storage.
Stream Type
● Extra stream: Relatively smooth image that needs small amount of
bandwidth. Applicable to network with insufficient bandwidth.
It includes local protocol and Onvif protocol. Please select according to
Protocol
the protocol of the connected device.
Encryption Enable it if the IPC to be added is encrypted.
● If IPC is connected, default setting is 1.
Channel
● If NVR is connected, set channel number of IPC on NVR.
Step 4 Tap OK.
Step 3 Modify IPC parameters. Please refer to Table 2-6 for details.
Step 4 Tap OK.
19
Figure 2-22 Monitoring video
2.4.3 Favorite
Displays VTO, fence stations or IPC that have been added to favorites.
To view favorite list, please ensure that VTO, fence station or IPC have been added to favorites.
Otherwise, the list is empty.
Step 1 Select Monitor > Favorite.
20
The system displays monitoring interface. In case of multiple devices in Favorite tab, tap
/ to switch and monitor them.
2.5 Concierge
Please ensure that management center has been connected. Otherwise, it will fail to call.
2.6 Setting
● There is an SD card on the VTH, and users can import ring tones to the SD card.
● Ring tones must be stored in the /Ring folder at the root directory of the SD card.
● Audio files must be .pcm files (audio files of other formats cannot be played if you change their
extension names).
● Audio file size must be less than 100 KB.
● Ring tone format: .pcm.
● You can only customize 10 ring tones. Other ring tones will not be displayed at the VTH.
21
Figure 2-24 VTO ring setup
Step 3 Tap text box to select rings, and tap and to adjust the volume.
Step 3 Tap text box to select rings, and tap and to adjust the volume.
22
[Link] Alarm Ring
Set the ring when the VTH gives an alarm.
Step 1 Tap Setting.
Step 2 Select Ring > Alarm Ring.
Step 3 Tap text box to select rings, and tap and to set the volume.
VTO Ring and VTH Ring of extension VTH are synchronized with main VTH, and cannot be set.
Step 1 Tap Setting.
Step 2 Select Ring > Other.
23
Figure 2-27 Other settings
Step 3 Tap and to set the time or volume. Tap to enable Ring Mute,
● VTO ring time: ring time when a VTO calls this VTH.
● VTH ring time: ring time when another VTH calls this VTH.
24
This function is only available under Villa mode.
25
Figure 2-29 Wired zone
26
Parameter Description
● Instant Alarm: After armed, if
● Instant Alarm: After armed, if an
an alarm is triggered, the device
alarm is triggered, the device
produces siren at once and
produces siren at once and enters
enters alarm status.
alarm status.
● Delay Alarm: After armed, if an
● Delay Alarm: After armed, if an
alarm is triggered, the device
alarm is triggered, the device enters
enters alarm status after a
alarm status after a specified time,
specified time, during which you
during which you can disarm and
can disarm and cancel the alarm.
cancel the alarm.
● Bypass: Alarm will not be
● Bypass: Alarm will not be triggered
Status triggered in the area. After
in the area. After disarmed, this area
disarmed, this area will restore
will restore to normal working status.
to normal working status.
● Remove: The area is invalid during
● Remove: The area is invalid
arm/disarm.
during arm/disarm.
● 24 Hour: Alarm will be triggered all
● 24 Hour: Alarm will be triggered
the time in the area regardless of
all the time in the area
arm or disarm.
regardless of arm or disarm.
Exit Delay
If multiple areas set the exit delay,
interface prompt will conform to
maximum delay time.
27
Step 1 Tap Setting.
Step 2 Select Alarm > Wireless Zone.
Tap Edit to select a zone and Delete to delete the selected area.
28
Figure 2-31 Output
Step 3 Tap to enable alarm output function, and the icon becomes .
29
Multiple areas can be added into one arm mode simultaneously, whereas one area can be
added into different modes.
Step 4 (Optional) Tap to page down the screen to where the WirelessArea is located, and
then turn on or turn off the area you selected to add it into or remove from the arm mode.
30
● The WirelessArea is only available for devices supporting Wi-Fi connection.
● Multiple areas can be added into one arm mode simultaneously, whereas one area can
be added into different modes.
Parameters at this interface are set on main VTH only, and extension VTH synchronizes with the main
VTH.
Step 1 Tap Setting.
Step 2 Select Forward.
31
Figure 2-34 Forward
Step 3 Enter the VTH number in the corresponding forward mode, tap to enable the
forward function.
● To forward to a user of another building or unit, the forward number is Building + Unit
+ VTH room number. For example, input 1#1#101 for 101 of Unit 1, Building 1.
● To forward to a user of the same unit, the forward number is VTH room number.
Step 4 Tap OK to save settings.
32
Parameters at this interface are set on main VTH only, and extension VTH synchronizes with main
VTH.
Step 1 Tap Setting.
Step 2 Select General > Time.
The snapshots are for reference only, and might differ from the actual screen.
Set VTH screen brightness, screensaver time and clean.
Step 1 Tap Setting.
Step 2 Select General > Display.
33
Figure 2-36 Display
than your expectation, you can go to choose adjust the brightness by taping
or
● Screenclose Time: The screen will automatically turn off when it reaches the time limit
of being idle. If it is longer or shorter than your expected time limit, you can go to
choose adjust the time by taping or .
● Clean: Tap the icon, and then the screen will be locked for 30 seconds. During the
period, clean the screen. It restores after 10 seconds.
[Link] QR Code
Download the app on your smart phone by scanning the QR code, register the VTH on the app, and
then you can unlock the door, or talk to the VTH, and more directly on your smart phone.
Step 1 Tap Setting.
Step 2 Select General > QR Code.
If you go to the screen for the first time, there is an onscreen prompt that reminds you to
create a DMSS app account before using the DMSS function. For detailed operations,
please refer to "4.3 Adding VTH to DMSS" for details.
34
Figure 2-37 DMSS onscreen prompt
35
Figure 2-39 QR Code (with DMSS QR code)
Step 3 (Optional) Scan the DMSS QR code on your DMSS App to automatically obtain the device
information of the VTH, and gain remote access to the device.
Step 4 Scan the Download App QR code on the right to download the DSS Agile VDP on your
smart phone.
Step 5 Scan the Register QR code on the left to register the VTH to the DSS Agile VDP.
For detailed operation of this step, see "3.2 Registration and Login".
Extension VTH can set Auto Capture and Touch Ring, but other parameters synchronize with main
VTH and cannot be set.
Step 1 Tap Setting.
Step 2 Select General > Other.
36
Figure 2-40 Other
37
Parameter Description Operation
● When VTO Message
Time(s) is not 0:
◇ If the VTH has an SD
card and does not
answer the VTO, it will
enter message status
according to prompt,
and save the message
in the SD card.
◇ If VTH does not have
SD card, and the leave
message upload
function is not
enabled on the VTO,
the call will be hung
up automatically if the
VTO Message Time (s)
VTH does not answer
the VTO.
● When VTO Message
Time(s) is 0:
● In any situation, the call
will be hung up
automatically if the VTH
does not answer the VTO.
38
Parameter Description Operation
After enabled, 3 pictures will
be captured automatically
when the VTO calls the VTH.
Tap Info > Record and
Picture to view them.
2.6.7 WLAN
● Only certain models support WLAN function.
● Use a router with secured encryption protocols.
WLAN
1. On the main screen, select Setting > WLAN.
2. Tap WLAN screen, and tap next Wi-Fi Name to see all of the available Wi-Fi services.
39
Figure 2-41 Enable Wi-Fi
3. Tap a Wi-Fi, and then enter the password to connect to the Wi-Fi.
WireLess IP
1. On the main screen, select Setting > WLAN.
2. Tap Wireless IP, and enter Local IP, Subnet Mask and Gateway, and then tap OK.
40
Figure 2-43 Wireless IP
You can also tap Wireless IP, and turn on DHCP to obtain the information automatically.
41
2.6.9 Network Password Setting
The network password is used when adding the VTH to the DMSS app.
Make sure that you have created a strong password. Otherwise, there will be onscreen
prompt appeared.
42
Figure 2-46 Weak password prompt
Result
The VTH would automatically generate a QR code that contains the User account. When you scan
the DMSS QR code in the Setting > General > QR Code, the DMSS App would synchronize the
device information of the VTH.
43
When going to the QR Code screen for the first time, the DMSS OR code would not appear. Only
after you set the network password, this module would be displayed.
44
[Link] Resetting Network Password
This section applies to the situation when you forget your network password and you can reset it to
create a new one.
Step 1 On the home screen, select Setting > Password > Network PWD.
Step 2 Tap Forget PWD, and enter the new password in the Password Verification window, and
then tap OK.
45
Figure 2-50 Product information
46
Figure 2-51 Password
Step 3 Scan the QR code with any code-scanning APP, bind your email box, send it by email to the
specified email addressed on the screen to obtain a security code.
Step 4 Tap Next.
Step 5 Enter the password and confirm it, and then enter the obtained security code.
Step 6 Tap OK to complete resetting the password.
47
Figure 2-52 Configuring LAN
Step 5
48
◇ Main VTH Username and Main VTH PWD are turned grey and cannot be edited in
this situation.
◇ Room number must be the same with Room No., which is configured when adding
VTHs on the VTO web page. Otherwise, it will fail to connect to the VTO. When there
are extension VTHs, room numbers must end with #0. Otherwise, it will fail to
connect to the VTO.
● As an extension VTH.
1. Tap Main to witch Main to Extension.
2. Enter the room number (such as 101#1), Main VTH IP and password (IP address and
password of the main VTH), and then tap OK.
Main VTH Username and Main VTH PWD are the username and password of main
VTH. Default user name is admin, and the password is the one set during initialization.
Step 5 Turn on the following functions as needed.
● SSH: The debugging terminal will connect to the VTH remotely through SSH protocol.
● Security Mode: Log in to the VTO in a secured way.
● Password Protection: Encrypt the password before sending out.
It is recommended to turn off SSH, and turn on security mode and password protection.
Otherwise, the device might be exposed to security risks and data leakage.
Step 6 Tap OK.
49
Figure 2-54 VTO configuration
User Name and Password must be consistent with the web interface login
username and password of the VTO.
● Add sub VTO or fence station.
1. Enter the sub VTO or fence Station name, IP address, username and password.
2. Turn on Enable Status.
Tap / to turn page and add more sub VTO or fence stations.
50
2.7.6 Adding Device
This module differs in Villa and Apartment mode. This section takes the Apartment mode as an
example. The snapshots are for reference only.
You can add VTHs and VTOs.
Step 1 On the main screen, select Setting > Project Setting > Add Device
Step 2 Set a password for the VTH you want to add.
51
Figure 2-56 Set a password an Email address for the VTO
Step 4 Tap Initialize to initialize a single device or Batch Initialization to initialize all available
devices, and then click Next.
52
Figure 2-58 Network configuration
Step 4 Enter a new email address, turn on Reset PWD, and then tap OK.
● The email will obtain security code during password resetting. See "2.7.1 Forget
Password"for details.
● If Reset PWD is turned off, you cannot reset the password.
53
2.8 Unlock Function
When the VTH is being called, during monitoring, talking and speaking, tap unlock button, and the
VTO will be unlocked remotely.
2.9.1 Arm
In case of triggering alarm after arm, produce linkage alarm and upload alarm info.
● Please ensure that the area has been added into arm mode. Otherwise, there will be no alarm
triggering after arm.
● Please ensure that it is in disarmed status. Otherwise, arm will fail.
There are two kinds of arm mode depending on the model you are using.
● Home: An arming mode that allows you to arm the system when inside the area of the
alarm system.
● Away: Arm the system when you leave the area of the alarm system.
● Sleep: An alarming mode that allows you to arm the system in the sleep time.
● Custom: Arm the system based on your customized needs.
54
Figure 2-60 Arm mode (type1)
● Default password of arm and disarm is 123456. If you want to modify the password,
please refer to"2.6.8 User Password Setting" for details.
● If delay alarm is set in the area, the device will beep continuously at the end of exit
delay time.
2.9.2 Disarm
55
Setting"for details.
● If you are forced to enter disarm password in case of emergencies, enter anti-hijacking
password, which is the reversed arm password. The system will disarm, and at the same
time, upload alarm info to management center/platform.
56
3 DSS Agile VDP
You can download DSS Agile VDP (hereinafter referred to as the "app") and link your VTH to the app
to unlock the door, talk to connected VTO devices, call the management center, and view call
records and messages.
Interfaces and operations might vary between iOS and Android OS. This section takes Android OS as
an example.
Step 1 Tap on your smartphone, read the Software license agreement and Privacy
57
Figure 3-2 Registration interface
Step 2 Tap , and then scan the Register code on the VTH. See Step 2 in "3.1 Downloading
the App"
58
Figure 3-3 Confirm IP address and port number
Step 3 Verify the IP address and port number, and then tap Confirm.
Step 4 Enter the username and password, and then tap Registration. You can add 5 users to one
VTH at most.
59
Figure 3-4 Login
Step 5 Tap the Login, enter the username and password you have set, and then tap Login.
To receive push notifications of call messages on the mobile phone, make sure that notifications of
the app are enabled on your smart phone, and you are logged in to the app.
60
Figure 3-5 Settings
61
Figure 3-6 Forward
62
Figure 3-7 A call from a VTO
3.4 Monitoring
After a VTO is added, you can view its live video, have two-way audio talk, call management center,
and remotely unlock the door.
Step 1 Log in to the app, and then tap Monitor.
63
Figure 3-8 Monitor screen
Step 2 Tap , select the VTO from the channel list as needed.
64
Figure 3-9 Live video
65
Log in to the APP, and then tap Records.
3.6 Message
You can view the unlocking records and alarm messages, and search for history messages.
● You need to enable Event Subscription in Setting of the App first.
66
● To receive messages on your smart phone, make sure that notifications of the app are enabled on
your smart phone and the you are logged in to the app.
Viewing Messages
● Log in to the app, tap Messages > Access, and then you can view unlocking records, such as
unlocking method, which user unlocked the door, and when the door is unlocked.
● Log in to the App, tap Messages > Alarm, and then you can view alarm messages.
67
Figure 3-12 Alarm messages
68
Figure 3-13 History messages
3.7 Visitor
You can create a pass for a visitor to have access permission. The pass is invalid after it is manually
invalidated, the visiting period expires, or the visit is ended. You can also view visit records.
69
Figure 3-14 Visitor information
Step 2 Enter the information of the visitor, and then tap Generate Pass.
70
Each visitor can only register one plate number.
71
Tap Invite Again to generate a new pass for the visitor.
72
Figure 3-17 Visitor records
3.8 Setting
You can view SIP ID, and enable message subscription, stream encryption, message sound, login by
pattern, and more.
Log in to the app, and then tap Setting.
73
Figure 3-18 Setting
● Event Subscription: Enable it, and then you can receive unlocking messages and alarm
messages. See "3.6 Message"for details.
● Stream Encryption: Enable it to enhance security, but stream acquisition speed might slow
down.
● Gesture: Draw a pattern, and then you can log in by that pattern.
● About: View app version, software license and privacy policy, help document, or log out of the
current account.
74
4 DMSS
You can download DMSS App and link your VTH to the app to unlock the door, talk to connected
VTO devices, call the management center, and view call records and messages.
75
Figure 4-2 Sign up
76
Use the verification code within 60 seconds of receiving it. Otherwise, the verification
code will become invalid.
5) Tap OK.
Step 3 On the Login screen, enter your email and password, and then tap Log in.
You can modify the password on the Me > Account Management > Modify Password.
77
When going to the QR Code screen for the first time, the DMSS OR code would not appear.
Only after you set the network password, this module would be displayed. For the detailed
operation, see
Step 4 On the Add Device screen, enter the device name of the VTH, username and password of
the VTH, and then tap Save.
● Device Name: customized.
78
● Username: Enter user.
● Password: Enter the network password of the VTH you configured in "[Link] Creating
Network Password".
79
Figure 4-7 Disarm VTO
Step 3 Select from the arm/disarm mode list, and the arm/disarm configuration would take effect
on the VTH after you completed the setting.
● Sleep: An alarming mode that allows you to arm the system in the sleep time.
● Home Mode: An arming mode that allows you to arm the system when inside the area
of the alarm system.
● Always Mode: Arm the system when you leave the area of the alarm system.
● Custom Arming: Arm the system based on your customized needs.
● Disarm: Turn the security system off. The opposite of arming.
80
Figure 4-8 Arm and disarm mode
81
Figure 4-9 Calling VTO
82
If there are more than one VTO, you can call the main VTO and sub VTO respectively.
83
Figure 4-11 Unlocking door
84
Figure 4-12 View monitoring video
Play/Pause.
Mute/Unmute.
85
Function Description
Favorites. Select a video, tap , and then select an existing file that you want
to save the video to.
Video stream. Tap the icon to switch between SD and HD video quality.
Video playback.
Take snapshot.
Video recording.
86
Figure 4-14 Viewing alarm records
Procedure
Step 1 On the Home screen, select the VTH you have just added, and tap the .
Step 2 Select Device Sharing.
87
Figure 4-15 Device sharing (1)
Step 3 On the Device Sharing screen, tap to scan the QR code of the users you want to
88
Figure 4-16 Device sharing (2)
Step 4 After scanning the QR code, the user that receives the sharing has to refresh the Home
screen to update the sharing information.
Related Operations
To Obtain the QR Code of the User that Receives the Sharing
1. Log in to the DMSS account of the user that to receive the sharing.
2. Tap Me, and tap the QR code icon at the top of the screen.
89
Figure 4-18 Obtain the QR code
90
Appendix 1 Cybersecurity Recommendations
91
the risk of ARP spoofing.
8. Assign Accounts and Privileges Reasonably
According to business and management requirements, reasonably add users and assign a
minimum set of permissions to them.
9. Disable Unnecessary Services and Choose Secure Modes
If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to
reduce risks.
If necessary, it is highly recommended that you use safe modes, including but not limited to the
following services:
● SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication
passwords.
● SMTP: Choose TLS to access mailbox server.
● FTP: Choose SFTP, and set up strong passwords.
● AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords.
10. Audio and Video Encrypted Transmission
If your audio and video data contents are very important or sensitive, we recommend that you
use encrypted transmission function, to reduce the risk of audio and video data being stolen
during transmission.
Reminder: encrypted transmission will cause some loss in transmission efficiency.
11. Secure Auditing
● Check online users: we suggest that you check online users regularly to see if the device is
logged in without authorization.
● Check device log: By viewing the logs, you can know the IP addresses that were used to log in
to your devices and their key operations.
12. Network Log
Due to the limited storage capacity of the device, the stored log is limited. If you need to save the
log for a long time, it is recommended that you enable the network log function to ensure that
the critical logs are synchronized to the network log server for tracing.
13. Construct a Safe Network Environment
In order to better ensure the safety of device and reduce potential cyber risks, we recommend:
● Disable the port mapping function of the router to avoid direct access to the intranet devices
from external network.
● The network should be partitioned and isolated according to the actual network needs. If
there are no communication requirements between two sub networks, it is suggested to use
VLAN, network GAP and other technologies to partition the network, so as to achieve the
network isolation effect.
● Establish the 802.1x access authentication system to reduce the risk of unauthorized access to
private networks.
● Enable IP/MAC address filtering function to limit the range of hosts allowed to access the
device.
92