Validate Incidents
You can validate incidents that are partially saved to the locker to identify any files that have been missing and perform the save again. To validate an incident click the button.
If the status of the selected incident is Saved in Locker after you press Validate a message is shown indicating that all files for the incident have been successfully saved:
Click OK to close the message.
You will now be given the opportunity to check the MD5 hash of the video. The MD5 hash test checks that the checksum on the video file is the same as when recorded; that proves that files have not been modified. See TBDR for more details.
If then you select an incident with status Import Error- Copy, or that has been partially saved, after you press Validate you will be given information as of the missing files:
Click OK to close the message. You will now be given the opportunity to repair the incident:
Click Yes if you wish to try the repair.
If the missing files are found they will be saved to the incident and its status will changed to Saved in Locker, or a percentage figure will be indicated.
When an incident is successfully validated the following transaction record is added to the incident:
‘Validation Complete. All files available for incident Successfully loaded’
You can view the transactions for an incident on the Transactions tab of the Incident Details dialog; see TBDR.
Performing the validation and having the transaction record for this is particularly important should the incident be used as evidence.
SHA-256 Message Digest Algorithm
Synergy and Synectics VMS Platform technologies uses the standard SHA-256 Message Digest Algorithm to create an unique 256 bit “fingerprint” which is embedded in the one minute video file at point of creation.
The SHA-256 is a widely recognized standard in the IT community. It was developed by The Internet Engineering Task Force (IETF) which is a large open international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and the smooth operation of the Internet. It is open to any interested individual.
Evidence Considerations
When Evidence is produced to be taken from the Synergy system the SHA-256 hash should be noted, From this point all down- stream uses of the evidence can be audited for unchanged video by recalculating the SHA-256 hash and checking against the recorded SHA-256 hash. If the hashes are not the same then the data has become corrupt or has been altered.
Whilst data is within the system the operating procedures coupled with standard password protection and audit trails ensures evidential quality.
In this section:
Visit us online at www.synecticsglobal.com
Copyright 2025© Synectic Systems Group Limited. All rights reserved.
Comments
0 comments
Please sign in to leave a comment.