Saturday, January 1, 2022

Security Camera Input Setup

 Security Camera Input Setup

Artificial Intelligence (AI) security cameras are specialized network IP cameras that perform advanced analytical functions such as vehicle detection, person detection, face detection, traffic counting, people counting, and license plate recognition (LPR). These artificial intelligence functions are achieved using highly advanced video analytics software that is built-in to the camera and recorder they are connected to. AI cameras can be used as a stand-alone device by recording to an SD card, or they can be connected to a network video recorder (NVR) to create a multi-camera AI system that records to a central hard drive. Please note that only certain models are capable of license plate recognition / automated number plate recognition (ANPR).

A special characteristic some network video devices possess is an integrated input & output ports. This incorporation allows for the communication and interaction of external devices, such as but not limited to:
1.   Doorbells
2.   Switches
3.   Alarm System Relay
4.   Pressure strips
5.   Detectors (frequency, smoke, movement, sound, temperature, and humidity sensors)

All these functions can be achieved via:
1.   NVR/DVR (remote or local)
2.   Application through a smart device (Tablet or Phone)
3.  
Computer (local or remote / software or browser)

 

Camera / DVR / NVR Alarm Input

Motion sensors / motion detectors can be integrated with video surveillance systems to provide additional security for buildings and also outdoor areas. For example, a PIR sensor (passive infrared) can be connected to the alarm input of a security camera DVR or IP camera NVR to trigger video recording and send an alert to the property owner that motion has been detected in a certain area.

When motion is detected by the motion sensor, it triggers the following alarm actions.
1.   Trigger video recording on the camera associated with the alarm.
2.   Enable the alarm output on channel one, where I have an alarm light attached (turn the strobe light on).
3.   Pop-up live video of the camera associated with the alarm on the DVR’s display monitor.
Here are some additional actions that can be triggered from an alarm input.
1.   Capture a still image snapshot.
2.   Send a push notification to the mobile app for iPhone & Android.
3.   Enable the alarm buzzer on the DVR / NVR.
4.   Send an email notification.

The inputs and outputs can be used to eliminate unnecessary recording of video or coincide with your alarm system to systematically create a reliable and accountable security source. When input and output mechanisms are triggered, you can (manually or automatically) request through the network video device that certain actions be performed over the network as well as trigger devices attached to the output ports. Example:

This example picture above shows a person interrupting a sensors function. This creates a signal that travels to the camera and the camera computes the message. The camera then functions as programmed and starts recording (snapshots or footage) to the delegated device while simultaneously triggers a relay to close. When the relay closes, it completes the circuit for the siren or strobe to activate. Another configuration (as long as the cameras capable), have the camera record to the desired method based on motion and simultaneously trigger the relay to set off the siren. In this example, a motion sensor is taken out of the equation.

Again, the above picture shows only one of many configurations. You can configure in whatever method you desire. Including or excluding recording methods based off of:
·        Motion (movement takes place)
·        Masking (the camera has been covered or obstructed significantly)
·        Video Loss (picture is no longer materializing, this feature is more prone to function correctly via a recorder or program)

Other devices that can be attached and configured to your I/O ports are as follows:

Device Type

Description

Occurrence of activation

Entry Contacts

Simple magnetic sensors detecting opening of doors, windows, gates and shutters.

When the circuit is broken (door is opened) the camera can record and/or send a snapshot and notifications

Motion Sensors

A sensor that detects motion either based on heat, light, or frequency

When motion is detected, the sensor breaks the circuit and  the camera can record and/or send a snapshot and notifications

Glass Break or Glass Shock Sensor

A sensor capable of distinguishing the sound/vibration of breaking glass and/or splintering wood.

When glass is  disturbed or shattered, the glass sensor breaks the circuit and the camera can record and/or send a snapshot and notifications

Pressure strip or switch

A pressure or switch sensor that are needed to interact with before gaining entry or exiting a premise or structure

When the sensor is triggered it breaks the circuit and the camera can record and/or send a snapshot and notifications


How-to Install Motion Detectors with a Security Camera System

Installing a motion detector and integrating it with a security camera system is fairly simple. CCTV Camera Pros supports professional and DIY installers. Most PIR motion sensors are 12V DC powered which gives installers the choice of using a individual 12V DC power supply or one of the ports on a multi-channel power supply box (the same ones used with security cameras).

In this first diagram, a single 12V DC power transformer is used. This is how it works.

1.   On the right side of the diagram, the alarm input / output panel of the DVR is shown. This is what the alarm panel on the back.

2.   18/2 gauge power cable connects the output of the motion detector to one of the alarm input ports on the DVR.

3.   18/2 gauge power cable is also used to connect the motion detector to an individual DC power supply.

4.   A PT-4 power lead connects the raw cables to the 3.1mm plug on the power supply.

Installation with Power Supply Box

A multi-channel power supply box can be used instead of an individual power supply.

This installation is the same as the one above using the single power supply. The only difference is the use of a multi-channel power supply box to power the motion detector. CCTV Camera Pros supplies many of these power boxes for security camera installations. These power boxes can be shared with cameras and 12V DC powered alarm sensors. Because power supply boxes use screw based wire terminals, there is no need to use a PT-4 power lead (as with the individual power supply installation). Same connection for Camera & NVR.

Most of Camera PIR motion sensor is located on the front of the camera, just below the camera lens. This motion sensor is designed to detect movement of human sized objects when they come into view of the camera’s lens. The camera has a 2.8-12mm varifocal lens which when adjusted to the widest angle (the 2.8mm setting) the camera provides a 109 degree horizontal field of view. The PIR sensor detects motion across a 100 degree field of view. Please note that if you adjust the lens to a more narrow field of view, this does not effect the area where the PIR sensor will detect motion.
In my experience, using a PIR sensor based motion detection is much more reliable than software based video motion detection (especially for outdoor video surveillance). Typically there are a lot of small moving objects outdoors which makes it difficult to get the sensitivity just right. When security cameras turn to night mode, there is typically some video noise because of the lack of light. This noise can cause false alarms when using video motion detection. A PIR sensor uses infrared light to measure the radiation reflected by objects in its view. When a certain amount of this radiation changes, the PIR sensor triggers an alarm, so they are not susceptible to some of the challenges of outdoor video motion detection.

FAQ

Here are some frequently asked questions about integrating PIR motion detectors with security camera systems.

·        How are motion detectors used with security camera systems?
The most common way to integrate a motion detector with a security camera system is to hard wire the motion detector to the same surveillance DVR that your security cameras are connected to. You must make sure that your DVR that has alarm inputs.

·        Can I just use motion detected from my security camera instead of an external motion sensor?
Yes, most DVRs support video motion detection triggered by cameras. Please note that this is different from PIR (passive infrared) motion detection and can be less reliable. Video motion detection tends to produce more false positives than PIR motion detection, especially in outdoor and infrared camera applications. This is because the video tends to be more noisy and outdoor environments tend to always have some motion from wind and other natural elements.

·        What type of cable is used to wire motion detectors to DVRs?
The following types of cable can be used to wire motion detectors: CAT-5 cable (one pair), 18/2 conductor power cable.

·        Do motion detectors require power?
Yes. Most PIR motion detectors use 12V DC power. All of ours include the proper power supply with them.

·        Can I use multiple motion detectors with my surveillance system?
Yes, as long as your DVR has multiple alarm input ports, you can use multiple motion detectors. Different model DVRs support different numbers of alarm inputs so consult the specification or contact us if you need help.

Not every camera or NVR/DVR possesses this unique features or can be operated through the above mentioned methods. Be sure you research everything you will need to make this type of setup successfully work for you. This includes the correct relays, power supplies, capable camera and recording devices. Most our IP mega pixel cameras and recorders have the capability of all previous mention features above.

If you are not understand, you can touch with us for further support. We deal Infinova, Hanwha, Milestone, Mirasys & Luxriot brand.


Wednesday, December 15, 2021

Emergency Door Release

Emergency Door Release 

Emergency Door Releases (EDR's) to provide a physical method of unlocking an electronic lock in the event of an emergency. EDR's are usually fitted to emergency exit doorways in higher security areas.
This unique triple pole break glass door release button remains lit permanently. This is so it can be found should the lights fail in the event of a fire. A manual call point (MCP) is a device which enables personnel to raise an alarm in the event of a fire incident by pressing a frangible element to activate the alarm system. A fire alarm call point should be installed at a height of 1.4m above floor level at easily accessible and conspicuous positions.
Illuminated Emergency Door Release button Once pressed to release the doors, the light turns from yellow to light red colour. Only once the reset key is used will the door be secured back in place. EDR is mostly use in door access control system.

Break Glass is not glass!
The button mimics the feel of breaking glass without the owner having to go to the cost and trouble of replacing the glass once it has been pressed. Being 100% re-usable, all the owner/operator has to do is simply insert plastic key provided into the front to reactivate the unit (supply with unit).

You can easily tell when button is activated
Any individual that needs to exit the building or pass through the door simply has to push or press the button. When pushed, it momentarily releases the fail-secure or fail-safe lock of the door. The exit button releases power to the magnetic lock. With this, the door automatically releases and allows free exit. When this break glass unit is activated it permanently unlocks a door until the unit is reset. In addition to the lights changing colour, the sounder will be activated. This sounder can be adjusted as required.

Prevent accidental activation
To prevent accidental activation of the unit and to deter malicious activation of the button, Emergency Door Release resettable Button comes with its own protective cover. This can be removed if you would prefer.

No extra signage needed
The words EMERGENCY DOOR RELEASE appear on the green plastic area above the break glass button. The standard safe condition/evacuation green is also used to ensure the button is easily located.

Features and benefits

·        Protective cover supplied as standard

·        Single gang

·        Adjustable sounder

·        Adjustable LEDs

·        Surface mount

·        Triple pole

·        Resettable

·        Power 12/24Vdc

Technical Information

·        Contact load 125v/3A (approx)

·        Dual-colour indicator

·        Active current 75mA (approx)

·        Standby current 41mA (approx)

·        Approx. Size 85mm x 85mm x 42mm (excluding cover)

If you not able to understand which one is prefect for your building Access Control System, touch with us via ssaintegrate@gmail.com . SSA Integrate will guide you free of cost in this matter.

We wish you a peaceful and safe holiday season, and an exciting, productive new year.

Wednesday, December 1, 2021

AI Based Camera Output Triggers Strobe Light

AI Based Camera Output Triggers Strobe Light 

Artificial Intelligence (AI) security cameras are specialized network IP cameras that perform advanced analytical functions such as vehicle detection, person detection, face detection, traffic counting, people counting, and license plate recognition (LPR). These artificial intelligence functions are achieved using highly advanced video analytics software that is built-in to the camera and recorder they are connected to. AI cameras can be used as a stand-alone device by recording to an SD card, or they can be connected to a network video recorder (NVR) to create a multi-camera AI system that records to a central hard drive. Please note that only certain models are capable of license plate recognition / automated number plate recognition (ANPR).

 

DVR / NVR Alarm Relay Output

Please note that the the alarm strobe light is self-powered. The alarm outputs on the DVR / NVR are simple relays (they are either open or closed). They DO NOT provide any power output. Also, please note that you can ONLY connect low voltage devices alarm devices to these alarm relay ports. Connecting high powered devices can fry your motherboard and ruin your DVR / NVR.

Important WARNING! The maximum current rating of these alarm relays is 1A, the voltage is 30VDC/ 250VAC, so the maximum power rating is 30W for DC alarm device, 250W for AC alarm device.

You can see above how I wired the strobe light to the output port. Notice how the strobe light’s 12V DC power supply is connected in-line. I used 18 gauge 2 conductor PVC Insulation Jacket Unsheilded / Stranded Copper wire to connect the strobe light to the recorder.

Here is a close-up of the alarm output ports on the back of the DVR / NVR. I am using the COM1 and NO1 ports. NO stands for normally open, which means that power does not flow thorough the relay until the alarm is triggered.

AI Software Setup

Please follow these steps to configure the AI software on the NVR.

From the DVR/ NVR main menu, select AI / Event.

On the AI / Event screen, do the following.

1.   Select More from the AI Event menu.

2.   Select the camera that you are applying the AI rule to from the camera dropdown.

3.   Select Line Crossing as the event type.

Next, do the following.

1.   Check the Enable Detection by IPC (IP Camera) checkbox.

2.   Check the Draw Line checkbox and draw your tripwire on the screen.

3.   Choose the direction of the traffic flow used to trigger the alarm. You can choose a single direction or both directions.

Next.

1.   Click on the Detection Target tab.

2.   Check Human for the detection target type. Uncheck Motor Vehicle and Non-motor Vehicle as they are not applicable in this case.

1.   Click on the Trigger Mode tab.

2.   Click on the Alarm Out Configure button. Please note that you may setup additional alarm triggers on this screen such as image snapshot, mobile app push notification, alarm buzzer, pop-up video, and email alerts.

On the DVR alarm output screen, select the alarm output that your light (or other device) is connected to from the window on the left and click on the arrows (>>) to put the alarm output on the right window. Then, check the checkbox next to it.

Click OK. Then, click Apply in the lower right.

You may then close all of the DVR / NVR configurations screens and return to the live view of your security cameras.

AI Software / Object Detection Visualization

On the live security camera view of your recorder, double click on the camera that you are using for this alarm project to show that camera’s live view full screen. You can enable the AI / Object Visualizations by clicking on the above icon.

 

When you enable the AI software visualizations on the live camera view, a few things happen.

1.   The alarm event window opens on the right. When your security camera detects the event that you configured, a snapshot image will appear in that screen to document the event.

2.   All objects that the system is able to detect will be outlined. Please note above that I am outlined with that yellow box because the AI software is detecting me as a human. The cars in the background are outlined in purple. Even though we are only using people detection for our alarm, the NVR software still outlines the other object types that it recognizes.

3.   The line crossing / virtual trip wire is shows in red. And the A->B traffic flow that I setup it also shown

4.   NVR / DVR Alarm Output Turns Light On

Last, here is a screenshot of the strobe light turned on as a result of the human detection / line crossing event.

Trigger Alarm Output from iPhone App

This is how you can manually trigger (turn on) the alarm relay output on the DVR from the iPhone app. Please note that the Android mobile app is identical to the iPhone all in looks and functionality. They are exactly the same app.

1.   Tap the menu icon in the lower right (the icon with the 3 dots…).

2.   Tap Manual Alarm.

3.   Tap the Alarm Output that you want to trigger / enable.

If you are not understand, you can touch with us for further support. We deal Infinova, Hanwha, Milestone, Mirasys & Luxriot brand.

Monday, November 15, 2021

Should I Upgrade My Existing Security System?

Should I Upgrade My Existing Security System? 

A security system is designed to do one thing: keep you, your property, and those you care about safe. However, if you are using a security system that is ten or more years old, it may not be able to provide you with the level of security you want or need. Not only are older systems susceptible to malfunction, but since they are less sophisticated than systems available today, they put you at risk of malicious activities by tech-savvy thieves.

Unsure how to decide whether it is time for your upgrade? Below are three reasons that you should consider installing a new security system today!

Here are four signs it is time to upgrade your security system:

1. Dated technology
Security systems are not a once-in-a-lifetime investment. Like any piece of technology that you purchase, they have to be frequently updated and maintained to optimize their functionality. Your security system is like a phone — it requires periodic investment and replacement over time, not to mention that since technology changes so quickly, your device could soon become obsolete.

2. Alarm safety
Before the days of wireless data, security systems were operated via land lines with wires that could be easily manipulated by unwanted intruders. Luckily, since modern alarm systems operate using cellular transmitters to send and receive messages, they provide a safer alternative for homeowners.

At Video, Intrusion or Fire Monitoring in India, we have partnered with Netra Monitoring to provide customers with specialized Interactive Alarm Monitoring services, including home automation, remote arming and disarming, thermostat control, video surveillance and much more. Unlike an outdated security system, the Alarm Monitoring service feature can be managed centrally for one location or multiple locations through an app on your iPhone, iPad, or Android-powered device.

Your safety is of the upmost importance, but with Netra Monitoring, it doesn’t have to be an inconvenience.

3. Transmission
The biggest reason security systems become obsolete is that technology becomes outdated. Since most modern security devices use the same towers as cellphones to send and receive alerts, it is most likely that the reason your product will be unusable is that, much like a cell phone, the network it uses to operate is no longer available.

The good news is that there is often quite a bit of overlap in what networks are available. For instance, 2G technology is being phased out, but 3G, 4G, and 5G are still available and often work interchangeably.

What is great about a system that works on this kind of network is that while 2G will soon be unavailable, you don’t have to replace your entire system to still use it. Often, you will need to replace a small component to keep it running.

4. Protecting Your Investment
The best way to ensure that you are getting the most out of your investment is to purchase your new security system from a company that is dedicated to making your experience with their product the best one possible. At Fire Monitoring at India, we perform regular service and maintenance on your products and make sure you are informed of any upgrades that your system requires and technology changes or your system ages.

We think of keeping an alarm system up-to-date as being similar to maintaining a car. Just because your car gets old doesn’t mean it is useless — if something breaks, you fix it and keep on driving. By working with one of our technicians, you will get more life out of your equipment than you ever imagined and be able to enjoy the safety you deserve for years to come.

When your security system becomes an afterthought – and eventually an outdated afterthought – it leaves your building vulnerable.

Netra Monitoring installs custom-designed, scalable, user-friendly usable commercial intrusion alarm systems, and we feel that even the least experienced user will be able to use our systems with the proper training. Netra Monitoring also work for Central Alarm Monitoring with Video Verification services in India.



Monday, November 1, 2021

2021 is a big year for Mobile Credentials

2021 is a big year for Mobile Credentials 

Modern electronic access control systems, whether on-premise or cloud-hosted, offer a variety of ways to authenticate users and grant them access to a space. Credentials are typically classified into a few categories, something you have, something you know, something you are, or any combination of these categories (multi-factor).

Keep reading to learn about four of the most common types of access control credentials and how they can help you manage your space more effectively.

In access control and identity management, authentication is done via three factors, namely what you have (keyfobs and access control cards), what you know (passwords) and what you are (biometrics).

Needless to say, more and more people are now using their smartphones to open doors. And 2020-21 is likely to be a big year for mobile credentials, whose market size and deployment are expected to reach a new height.

In terms of the “what you have” factor, regular and smart cards have been in use for a long time, whereby the user either taps the card on the reader or bring the card close to it. Yet more and more, mobile credentials, or user credentials stored in the user’s mobile phone which can then interact with the reader, have become a more popular concept and are increasingly deployed in certain end user entities such as offices, college dorms and hotels.

1. RFID

Historically, the most common credential is RFID technology using some sort of card or fob (something you have). These RFID options can range from basic proximity cards and fobs to more advanced and secure smart cards that use integrated circuit chips embedded into the card itself to provide encrypted communication with the access control readers. Not all access control cards are secure as some can be easily sniffed and cloned. Access control cards can also easily be lost or stolen, which can create a vulnerability.

2. PIN Codes

PIN codes are also a popular method where a PIN code (something you know) is assigned to a user and then used as their credential to access a space. With PIN codes, a user walks up to the keypad on a door and types in a numerical code assigned to them to authenticate and gain access to a space. PIN codes do have some drawbacks as well. PIN codes are often shared, creating a security risk. In addition, PIN codes can be cumbersome to administer and maintain.

3. Biometric

Biometric credentials have grown in popularity over the past several years and can include multiple biometric features (something you are). There are biometric devices that can scan fingerprints, retinas, or the palms of your hand to authenticate you and grant or deny access. Another biometric option is facial scanning where a device can scan a face to determine facial features that can be turned into a hash that can then be used as a credential. Biometric readers have come a long way and can offer a high level of security, but in order for biometric readers to work effectively and efficiently, they need to be installed in the right location and in the right environmental conditions.

4. Mobile Credentials

Perhaps one of the fastest-growing credentials lately is mobile credentials. Mobile credentials allow users to have a credential stored on their mobile devices, usually in the form of a mobile app, that they can use to gain access to spaces providing those spaces have compatible hardware. As a user approaches a reader, they can make an unlock request using a button on their phone or even a gesture, to gain access. Mobile credentials also have the advantage of providing multi-factor authentication easily by leveraging the built-in PIN code functionality or biometric readers of the mobile device for additional security. A system administrator can require that in addition to the mobile credential a user needs to provide either a PIN code and/or a fingerprint/facial recognition, whichever method the mobile device supports. Mobile credentials have grown in popularity so much because just about everyone has a mobile device with them at all times, and they are easy to administer compared to managing RFID cards or PIN codes.

In fact, 2020 is set to be a big year for mobile credentials as suggested by various stats and figures. Gartner, for example, has predicted that in 2020, 20 percent of organizations will use smartphones in place of traditional physical access cards, compared to just 5 percent back in 2016.


Growth drivers

That the mobile credential trend is picking up is quite understandable due to their various benefits, among them the convenience factor. Whereas the user may forget to bring their keycard, they are less likely to forget to bring their smart device. Further, compared to keycards, smartphones are less likely to be lost as users attach greater importance to them. On a related note, since chances are the user already has a mobile device, the end user entity does not have to spend extra cost to make cards for their staff.

Besides those benefits, wider technology availability will drive growth as well. “When they first appeared about 10 years ago, mobile credentials used near-field communication (NFC). Since Apple never provided API access to its NFC capabilities, adoption was limited, because the technology was only available to Android users. Today’s mobile credentials use Bluetooth, which is supported by all smartphone manufacturers and many wearables, such as smartwatches, and is therefore available to virtually everyone with a smart device. Bluetooth also ups the convenience factor since Bluetooth readers allow users to open doors without even taking their phones out of their pockets. If your customer uses a cloud-based access control system, mobile devices can communicate directly with the cloud via Wi-Fi or cellular.
 
Meanwhile, compared to cards, which can be duplicated or cloned, the mobile device has more security features. The biometric function that unlocks the phone in and of itself is a security feature that prevents misuse by others in the even the phone is lost. Meanwhile, the latest technologies also enable communications to be safer between the phone and the reader.
 
Finally, mobile credentials have the “wow” factor. “Everyone loves new gadgets, especially ones that make their lives easier. Mobile credentials are no exception. Our salespeople tell stories of closing deals as soon as they show prospective customers that they can unlock their doors with their smartphone. Property managers have begun listing mobile credentials as one of their high-tech amenities to attract new residents. Users of mobile credential apps write glowing reviews about convenience.

Still not sure which access control credential solution is right for you? We’re here to help.

The goal is no longer just limiting access to a particular space but rather managing that space effectively.

Modern electronic access control systems offer a wide variety of features to allow you to better manage business spaces and to protect your business and your brand.

Working with a qualified security sales consultant will ensure you are not installing old technology into a new installation. There is an access control solution available that is convenient, secure, and works for your user’s technology level. You can touch with SSA Integrate to get proper way, what actual is required for your premises. They are solution service provider for SUPREMA, Magnetic FAAC & certified for Honeywell Winpak Access Control.