Cybersecurity

Full protection
against external threats

The latest AI BOX PRO is equipped with a range of features protecting against external attacks.

You can be sure that your data is secured against unauthorized access and minimize the risk of cyberattacks, which is an extremely important aspect in light of newly introduced security standards.

Advanced features of device security

HTTPS for web gui

The WEB GUI interface is based on a static page + HTTPS API. This means that when logging into the device, user data is encrypted and maximally secured with an SSL certificate, confirming the site's identity and protecting against fake websites. Additionally, the AIBOX PRO device allows you to upload your own certificate.

Login Block

This feature blocks an IP address after multiple failed login attempts. It acts as a personal guardian, protecting your device account from unauthorized individuals or password guessing attempts by bots.

Password Strength

Configurable enforcement of specific password strength prevents the device from being vulnerable to unauthorized access through the cracking of simple/default user passwords.

IP Filter

It allows for the creation of a list of authorized IP addresses from which to connect to the AIBOX PRO device, as well as a list of forbidden IP addresses. This provides an additional level of control and protection against unauthorized connection attempts.

RTSP over HTTPS (video stream encrypted with SSL)

Video data is under the highest protection, thanks to video stream encryption, preventing the interception of images downloaded by AIBOX from cameras. Video encryption also covers AIBOX – VMS communication.

TPM/ATF Module

The built-in specialized microchip in the form of ATF (Arm Trusted Firmware) forms the foundation of hardware trust. It securely stores cryptographic keys and protects critical data from unauthorized access and physical tampering attempts.

Encrypted Firmware

The entire firmware file is encrypted using keys, which completely eliminates the possibility of inspecting its content or uploading modified (infected) firmware to the device.