Thursday, July 15, 2021

Before Buying Intrusion Alarm System

Before Buying Intrusion Alarm System 

This is a short note on Intrusion or Burglar alarm system. A burglar alarm system is not something you shop for regularly. That’s because it’s an important purchase for your business that is meant to last — so make sure you have the best. While you can always upgrade as new technology is released, you still need to trust that your alarm system will work when it needs to.

In terms of cost, a high-quality alarm system can be expensive but it is an investment that provides peace of mind.

The system charges are generally separate from the monthly subscription costs besides the installation fees. While there is a lot to learn about alarm systems, it’s important to first learn which one would be the best fit for your home by reaching out to the professionals and asking the right questions.

Here are three questions you need to ask before deciding on which home alarm system is right for your home or your small offices:

Question #1: Accreditation?
The first question you should ask is to make sure that the company has the required accreditations to perform the service. There are a lot of companies who claim they have all the required levels of accreditations, but that might not be true. If they are able to produce some level of documentation that could authenticate that, it can’t get much better than that.

Question #2: Type of System?
The second question to ask is the type of system that is best for your business. Some homes are configured for both wired and wireless security systems while some are not. Hence, you need to be sure about it and avoid settling for a type of connection that is not already configured at your facility.

Question #3: How Much?
The most important question to ask is the cost associated with the total installation. Some companies offer incentives like free installation while others may offer discounts on monthly subscriptions.

Since there are so many types of commercial alarm systems available on the market, that suits your needs and your budget; just because a provider promises you the best, doesn’t mean and could be more effective doesn’t mean you necessarily need it.

Question #4: Installation by whom?
This is another most important questing to ask installation, testing & training of system that is best for your business. Both wired and wireless security systems recommended to involve certified installer. Non-certified experienced person may share password and backdoor entry details with hacker and connection that is not already configured correctly as per your needs.

Hopefully, this post has provided you with the information you can use to determine if you going to install. If you’re not sure, SSA Integrate can help. We have Texecom Certified (Level 3) Intrusion experts that can help you determine the best solution to meet your security needs while keeping you compliant with all the relevant codes. Contact SSA Integrate today to learn more.

Thursday, July 1, 2021

Police stations must have functional CCTV cameras

Police stations must have functional CCTV cameras

The premier investigating agencies comes under the scanner of CCTV. The Supreme Court today (December 2, 2020) directed Centre to install CCTV cameras and recording equipment in the offices of Central Bureau of Investigation (CBI), National Investigating Agency (NIA), Enforcement Directorate (ED), Narcotics Control Bureau (NCB), Department of Revenue Intelligence (DRI), Serious Fraud Investigating Office (SFIO) & any other agency which carries out interrogation and has power of arrest.

Supreme Court through its judgement dated December 02nd, 2020 emphasized the pressing need for all State Police Forces to implement IP based CCTV surveillance system in each police station of the state / UT in order to prevent unlawful activities, ensuring safety of its citizens and also to efficiently deal with the cases involving allegations of torture in custody.

The Supreme Court has passed directions for constitution of “Oversight Committees” at the State (State Level Oversight Committee) and District (District Level Oversight Committee) level for ongoing installation and maintenance of CCTVs in Police Stations across all UTs and States while it directed Finance Departments of all UTs and States to allocate fund for it. 

The State Level Oversight Committee must consist of:
(i) The Secretary/Additional Secretary, Home Department;
(ii) Secretary/Additional Secretary, Finance Department;
(iii) The Director General/Inspector General of Police; and
(iv) The Chairperson/member of the State Women’s Commission.

So far as the District Level Oversight Committee is concerned, this should comprise of:
(i) The Divisional Commissioner/ Commissioner of Divisions/ Regional Commissioner/ Revenue Commissioner Division of the District (by whatever name called);
(ii) The District Magistrate of the District;
(iii) A Superintendent of Police of that District; and
(iv) A mayor of a municipality within the District/ a Head of the Zilla Panchayat in rural areas.

Salient features of Supreme Court Judgement in respect of CCTV surveillance of all Police Stations in the country.

  • CCTV cameras should be installed at each and every Police Station and no part of a Police Station should be left uncovered, it is imperative to ensure that CCTV cameras are installed at following locations:
    Entry and exit points, Main gate of the police station, All lock-ups, All corridors, lobby/the reception area, All verandas/outhouses, Inspector’s room, Sub-Inspector’s room, Areas outside the lock-up room, Station hall, In front of the police station compound, Outside (not inside) washrooms/toilets, Duty Officer’s room, Back part of the police station etc.
  • CCTVs shall also be installed in all the offices where interrogation and holding of accused takes place in the same manner as it would in a police station
  • CCTV systems that have to be installed must be equipped with night vision and must necessarily consist of audio as well as video footage.
  • In areas where there is either no electricity and/or internet, it shall be the duty of the States/Union Territories to provide the same as expeditiously as possible using any mode of providing electricity, including solar/wind power.
  • The internet systems should support clear image resolutions and audio.
  • CCTV camera footages should be preserved for a maximum possible period up to 18 months but not lesser than 12 months
  • An oversight mechanism should be created whereby an independent committee can study the CCTV camera footages and periodically publish a report of its observations thereon.
  • The District Level Oversight Committee shall have the following obligations:
    • Health Monitoring and reporting of the CCTV systems
    • To review footage stored from CCTVs in the various Police Stations to check for any human rights violation that may have occurred but are not reported
  • The Commission/Court can immediately summon CCTV camera footage in relation to the complaint of any incident for its safe keeping, which may then be made available to an investigation agency in order to further process the complaint made to it.
  • Posters at the entrance and inside of police station informing about the coverage of premises by CCTV, their privilege to file complaint to given authorities in case of any human rights violations inside the premises

The Government of Bihar has taken a huge step forward in its efforts to introduce transparency in the functioning of the police forces in the state. The Bihar State Electronics Development Corporation Ltd (BELTRON) has recently completed an ambitious project to bring the police stations of the state under 24×7 CCTV surveillance. More than 10,000 IP based CCTV cameras have been installed at over 900 police stations of Bihar. The project initiated and funded by the Home Department, Government of Bihar aims to fulfill the mandate of the Hon’ble Supreme Court to bring all police stations of the country under constant CCTV surveillance to protect human rights and prevent the use of torture in detention. The project was awarded to TATA Advanced Systems Ltd, one of India’s leading Physical & Cyber Security firms through a competitive bidding process at a cost of Rs 168 crores including operation and maintenance support for 5 years. Mr. C P Kariappa, Vice President, Tata Advanced Systems said “At TASL we have always taken pride in executing projects that build the nation, it was a prestigious project to be completed in challenging timeline across the state. Our teams could meet the expectations of customer despite disruptions due to flood and Covid-19”. The entire surveillance system is powered by Solar and online UPS to ensure 24X7 operations even if there is disruption in power supply. Mr. Kariappa further said “It was a pleasure working with Home Department, Govt of Bihar, Bihar Police and Beltron; this would not have been possible without their active participation and support. Also, we had an excellent team and partner ecosystem that lived up to all the challenges that was faced during the execution period”.

Bihar Government has plans to upgrade the existing system in line with the directions given by the Supreme Court and also extend it to the remaining police stations including outposts in the near future.

(2018) 5 SCC 311, directed that a Central Oversight Body be set up by the Ministry of Home Affairs to implement the plan of action with respect to the use of videography in the crime scene during the investigation. While considering the directions issued in D.K. Basu Vs. State of West Bengal & Others (2015) 8 SCC 744, it had held that there was a need for further directions that in every State an oversight mechanism be created whereby an independent committee can study the CCTV camera footages and periodically publish a report of its observations thereon. The COB was further directed to issue appropriate instructions in this regard at the earliest.

The Ministry of Home Affairs had constituted the Central Oversight Committee to oversee the implementation of the use of photography and videography in the crime scene by the State / Union Territory Government and other Central Agencies, to suggest the possibility of setting up a Central Server for implementation of videography, and to issue appropriate directions so as to ensure that use of videography becomes a reality in a phased manner.

The Court on 16/07/2020 had issued further notice to the MHA on the question of audio-video recordings of Section 161 CrPC statements as is provided by Section 161 (3) proviso, as well as the larger question as to installation of CCTV cameras in police stations generally. After which, action taken report was filed by 14 States till 24/11/2020, namely, West Bengal, Chhattisgarh, Tamil Nadu, Punjab, Nagaland, Karnataka, Tripura, Uttar Pradesh, Assam, Sikkim, Mizoram, Madhya Pradesh, Meghalaya, Manipur; and 2 Union Territories, namely, Andaman & Nicobar Islands and Puducherry.

The Court noted that the majority of the Compliance Affidavits and Action Taken Reports fail to disclose the exact position of CCTV cameras qua each Police Station. Further, it noted that the position qua constitution of Oversight Committees in accordance with the Order dated 03.04.2018, and/or details with respect to the Oversight Committees already constituted in the respective States and Union Territory have also not been disclosed.

Accordingly, the Supreme Court has passed the direction for filing of the Compliance affidavits by all the States and Union Territories by either the Principal Secretary of the State or the Secretary, Home Department of the States/Union Territories. “These affidavits are to be filed within a period of six weeks from today,” it said.

The Supreme Court has passed the slew of directions;

The Director General/Inspector General of Police of each State and Union Territory should issue directions to the person in charge of a Police Station to entrust the SHO of the concerned Police Station with the responsibility of assessing the working condition of the CCTV cameras installed in the police station and also to take corrective action to restore the functioning of all non-functional CCTV cameras. The SHO should also be made responsible for CCTV data maintenance, backup of data, fault rectification etc.

The State and Union Territory Governments should ensure that CCTV cameras are installed in each and every Police Station functioning in the respective State and/or Union Territory. Further, in order to ensure that no part of a Police Station is left uncovered, it is imperative to ensure that CCTV cameras are installed at all entry and exit points; main gate of the police station; all lock-ups; all corridors; lobby/the reception area; all verandas/outhouses, Inspector’s room; Sub-Inspector’s room; areas outside the lock-up room; station hall; in front of the police station compound; outside (not inside) washrooms/toilets; Duty Officer’s room; back part of the police station etc.

CCTV systems that have to be installed must be equipped with night vision and must necessarily consist of audio as well as video footage. In areas in which there is either no electricity and/or internet, it shall be the duty of the States/Union Territories to provide the same as expeditiously as possible using any mode of providing electricity, including solar/wind power. If the recording equipment, available in the market today, does not have the capacity to keep the recording for 18 months but for a lesser period of time, it shall be mandatory for all States, Union Territories and the Central Government to purchase one which allows storage for the maximum period possible, and, in any case, not below 1 year. It is also made clear that this will be reviewed by all the States so as to purchase equipment which is able to store the data for 18 months as soon as it is commercially available in the market. The affidavit of compliance to be filed by all States and Union Territories and Central Government shall clearly indicate that the best equipment available as of date has been purchased.

The Madhya Pradesh High Court while hearing a plea against alleged unlawful detention of the Petitioner by local Police authorities in the state, made prima facie observation that in order to escape liability, the Police often take a false stand that the CCTVs installed at Police station are not functioning. This Court feels prima facie that in order to cover up instances of unlawful detention by the police, the police comes up with the argument that the CCTV cameras are dysfunctional,” observed a Bench of Justice Atul Sreedharan.

It added that such a stand taken by the Police does not augur well for the ordinary citizens of the State as it creates an environment of giving an opportunity to the Police to act with impunity in complete disregard to human rights and personal liberty and enables them to detain anyone in the police station and conveniently give an explanation that the CCTV cameras were disfunctional during the period which the citizen says that he was unlaw detainer in the police station.

The remarks were made after the Court noted contradictions in the statements made by the local Police and by the Prosecutor, regarding reasons for not furnishing CCTV footage of the alleged date of detention. The former claimed that CCTV footage cannot be given as the cameras are not functioning since February 17. The prosecutor on the other hand submitted that the CCTV footage of the said period cannot be shown to the petitioner as that would reveal the identity of the source informant.

The facts of the petitioner’s case reveal a very shocking state of affairs in the State of Madhya Pradesh,” the Bench remarked while expressing surprise at the contrary stance. It noted that the prosecutor’s excuse for not giving the footage logically means that the CCTV cameras were functioning and there was indeed footage. But the police on the other hand claimed that the cameras themselves had turned dysfunctional from February, 2021.

In these circumstances, the Bench noted that the case discloses a larger issue and it has therefore summoned DIG- Bhopal (Urban), and SP (South Bhopal) on the next date of hearing, through video conferencing. They have been asked to come up with an explanation as to why the cameras were dysfunctional from 17.2.2021, whether the authorities who had to be informed about the dysfunctionality of the cameras were duly so informed by the SHO of PS Piplan, Bhopal and if they were so informed, what were the steps taken forthwith by those officials to have the cameras rectified in the shortest possible time.

Ref: 

https://www.isrmag.com/supreme-court-directive-to-implement-cctvs-in-all-police-stations-across-india/
https://www.scconline.com/blog/post/2020/12/02/sc-directs-all-states-uts-to-install-cctv-cameras-in-all-police-station-read-how-cctv-cameras-will-help-curb-custodial-violence/

Tuesday, June 15, 2021

LiDAR based Motion Detection Technology

 LiDAR based Motion Detection Technology

White light comprises every color of the visible spectrum, with multiple colors having different frequencies and wavelengths. As a result, it's very challenging to beam this type of light onto a single point. LEDs commonly utilized for visual indication in electronic devices and equipment generate light containing electromagnetic waves of varying frequencies.

Laser diodes (LDs), on the other hand, produce "coherent light," which consists of a focused light beam of a specific frequency and wavelength. Their unique properties make them highly useful in today’s fast-changing world.

LDs are semiconductor devices similar in function to LEDs, but capable of producing coherent laser light. LEDs generate light via electroluminescence — the process of passing an electric current through the device to create photons by creating excess electron and hole pairs. LDs, on the other hand, amplify visible light via stimulated emission of radiation.

Laser light has the following distinct properties:

Coherence: Laser light can be termed coherent since the wavelength of the light waves emitted is in phase.

High-power and Intensity: Laser is incredibly bright since it is emitted by continuous emissions with more power per unit surface area.

MonochromaticityLaser comprises light waves of a single wavelength.

Directionality: Light emitted from laser diodes is highly directional, as it shows minimal divergence.

Laser diodes are designed by doping semiconductor materials like aluminum gallium arsenide to create n-type and p-type layers. Doping is the process of adding small amounts of impurities to pure semiconductors to improve conductivity.

LDs give off light when electric current applied to the device causes the holes and electrons in a semiconductor material to interact at the p-n junction, also known as stimulated emission. They can also accurately measure an object’s shape and distance by taking advantage of the laser beam’s linearity. This technology is known as Light Detection and Ranging (LiDAR).

The time of flight (ToF) method is the most used distance measurement method in LiDAR. In the ToF method as depicted in the image below, distance is calculated by measuring the time it takes for the light emitted from the light source to be reflected by the object and returned to the detector (flight time).

LiDAR follows a simple principle — throw laser light at an object on the earth surface and calculate the time it takes to return to the LiDAR source. Given the speed at which the light travels (approximately 186,000 miles per second), the process of measuring the exact distance through LiDAR appears to be incredibly fast. However, it’s very technical. The formula that analysts use to arrive at the precise distance of the object is as follows:

The distance of the object = (Speed of Light x Time of Flight)/ 2

Motion detectors have long been key tools in a security designer’s & customers. Some of devices / detector gives nuisance alarms and installer frustration. The first motion sensor was invented in the 1940s by Samuel Bagno using technology developed during World War II. Using his military knowledge of radar, Bagno developed a device that used ultrasonic waves and the Doppler Effect to detect motion. By the 1970s, these motion detectors were popular components in home burglar alarm systems; however, they were prone to false alarms, as the ultrasonic waves could easily be disrupted by innocent disruptors such as wind or a clock chime.

In the 1980s, advancements in technology brought us the infrared motion sensor. Active infrared sensors work by emitting infrared radiation, detecting differences in temperature between an object and its surroundings. Many motion detectors combine multiple technologies to reduce false alarms. Passive infrared, for example, is commonly paired with microwave detection. Both sensors should be activated before an alarm is triggered.

Fast-forward to today, and companies at the forefront of motion detection have been implementing a new technology: Light Detection and Ranging (LiDAR). Popularized by the autonomous vehicle industry and smartphone manufacturers, LiDAR uses a pulsed laser to calculate the distance from the laser source to an object. By measuring the light from the laser’s reflection, 3-D representations of surfaces can be created. Once a static scene is established, changes to that scene can trigger a motion alarm.

The advantage of LiDAR in this application is how finely the detection area and target object size can be tuned, and how well a target can be tracked. By adding intelligence to how these values are programmed, the days of the security technician “walk test” to determine the detection area may be numbered. LiDAR sensors enhance motion sensor capabilities by providing more detection customization and on-board laser analytics that give you the ability minimize false and nuisance alarms.

The LiDAR sensors themselves have rectangular detection areas, which drastically simplifies design and implementation over traditional fan-shaped detection areas. This enables coverage of large areas with fewer sensors, since they can be placed in locations that eliminate overlap. Rectangular detection areas can be easily used to create detection “planes” along a perimeter, building face or rooftop, for example.

The amount of intelligence built into the device had me wondering whether these motion detectors have jumped categories and are in competition with motion analytics-equipped video surveillance cameras. Motion detectors outperform video analytics because they are purpose-built for the application and have detection technology superior to video cameras. The major value add for using a sensor with a motion detection analytic is to create an IP video double knock.

Motion sensors can transmit coordinate data to integrated video management platforms to help direct cameras to track a target. Because visible light is not a requirement, they can help track targets in darkness, in conditions when a video surveillance camera may be challenged. If a camera is not present to help validate the motion detector alarm, the device itself can store a snapshot of the alarm-inducing condition for retrieval by a security operator.

With motion detectors joining the evergrowing Internet of Things (IoT), ensuring the devices have the appropriate level of cyber features must be considered.


Tuesday, June 1, 2021

Use Backup Power For EM Locks

Use Backup Power For EM Locks 

Access control, one of the key components of a comprehensive security solution, comes in many different varieties. Essentially there are two components, the lock (i.e. the physical mechanism keeping the door locked) and the access control system (such as a card reader, biometric reader, keypad etc, which opens the lock).
Most locks can be set to function in one of the following ways:

Fail-safe: in the event of a loss of power supply, the lock will automatically unlock, ensuring that people can still exit through the door (safety first)

Fail-secure: in the event of a loss of power supply, the lock will automatically lock, meaning people are unable to enter (or exit) through the door (security first)

It therefore only takes a loss of power to make a fail-safe lock ineffective. Of course there can be a battery backup supply installed, but the battery will have a limited lifespan, perhaps not more than a couple of hours, which limits the time available for the power supply issue to be resolved. Fail-secure locks are therefore better for doors which require higher security, but carry greater risk for safety as there could be people trapped inside the building.

When the main power fails, many believe maglocks must leave doors unlocked.

However, battery backed up maglocks are allowed according to IBC / NFPA code. It just needs to be done properly. We examine the five critical steps for using backing up maglock power correctly:

·        Understanding Codes

·        Calculating Power Budgets

·        Factoring In Power Source

·        Connecting Power Supply Fire Alarm Loops

·        Including The AHJ

In this note, we look at what the code actually says about power backups for maglocks, where they might be illegal, and how to do it right when allowed.

Multiple Factors

When it comes to preventing your Electromagnetic locks (mag-locks) doors from being unsecured when power drops, there are three basic considerations to make:

·        Codes: Understanding the applicable codes and how they apply to a building's use of maglocks is the fundamental start.

·        Engineering: Translating those code requirements into a compliant design.

·        The AHJ: Getting approval from the relevant authority is the last, and maybe most critical aspect of the process.

Codes

Accounting for about 80% of the access control in use, mag-locks operate by an electromagnetic strip attached to the door frame which aligns with an armature attached to the door. The lock can be fail-safe (whereby the electromagnet releases the armature) or fail-secure (whereby the electromagnet attracts the armature) depending on the use and safety standards.

Surprising to many, national codes do not forbid the use of battery backed up maglocks, despite the dominant 'free egress must always be possible' theme. If codes indeed forbid battery backups, these exceptions are made at the local level. However, their use is allowed if done correctly. Take a look at these passages, covering the full scope of controlled openings regardless of occupancy code:

·        NFPA 101 (2012) 7.2.1.5.6 (Electrically Controlled Egress Door Assemblies)

·        NFPA 101 (2012) 7.2.1.6.2 (Access-Controlled Egress Door Assemblies)

·        NFPA 72 (2012) 21.9.1 Electrically Locked Doors

·        IBC 1008.1.9.9 (2012)

The fundamental relevant clause cited is:

Loss of power to the listed hardware must automatically unlock the door.

However, the clause does not prohibit the use of backup power. Any electric lock in the direction of egress shall be connected to the fire alarm system and unlock when the system is activated or when power is lost.

The local jurisdiction may have a variation of these 'model codes' that take exception to the rules, so maintaining local awareness of using maglocks or backup power to them is a crucial step, often undertaken when meeting the AHJ. (See the last section in this artical.)

Calculating Power Budgets

Knowing how long a battery will keep a maglock locked is crucial. Maglocks are typically high demand devices that can drain batteries rapidly as the current draw of maglock is continuous, unlike other lock types that only use power when unlocking.

Take this example 500 pound maglock that requires 320mA at 12 VDC or 170mA at 24VDC:

Assume a 12VDC backup system furnished with two 5 amp hour batteries that must keep four maglocked doors (two sets of double doors) energized. The locks alone consume over 1.25 amps per hour, so with a 10 amp supply, doors will fall unlocked in less than eight hours. As such, prolonged outages may still require manual security response, such as guard staff mechanically locking normally maglocked doors.

Calculating this demand is complicated by other devices that must also be powered in the access system, typically the controllers, readers, and even some RTE devices like PIR motion detectors. The total demand associated with the backup supply may quickly shave the backup power duration to mere minutes in a large system, and ample capacity is a matter of careful design.

Designing Battery Backup - Device / Door Priority

Part of designing a battery backup system may be prioritizing specific (perimeter) doors to stay locked, but leaving others (inside) unlocked when power drops. Of course, the decision must conform with facility security management plans, but in the interest of maximizing uptime for critical doors, others may need to be excluded.

Factoring In Controller Power Support

However, even if one specifies sufficient batteries, a door controller may not support passing sufficient power for the period desired for battery back up power.

Normally, the maglock will be powered by main power and power will be switched on/off by controller contacts.  However, in cases when main power fails or the access designer connects maglocks as field-powered devices, power may then supplied and routed through the controller itself. Flat out, many controller contacts are not designed or rated to deliver substantial amps for long periods.  

While card readers may draw modest amounts of power (ie: 35mA - 100mA), the controller's output relay contacts may not be rated to pass through sufficient amperage to power maglocks (ie: 125mA - 850mA+)

(Note: Later versions of eIDC32 do not include this output power limitation.)

It is because of this limitation, and the way that codes address 'direct interruption' of power to maglocks, that most maglocks are best installed using a separate linear power supply, not powered by pass-thru capacity in the controller.

Batteries vs UPS vs Generators

It is worth noting that batteries are not always the only, or even preferred method, of backup power. UPS devices or batteries, as noted in UPS Backup Power for Security Guide, are the most unitized and least expensive to deploy, but run duration is always a concern. As a result, especially in critical infrastructure or services facilities, the entire building may be backed up by a generator. In this case, the supply is generally much more substantial and runs into hundreds of amps per hour. In these situations, the run length of the backup system may simply not be a realistic problem.

Power Supply Fire Alarm Loops

The codes are clear on one engineering point: when the fire alarm activates, all power to maglock must drop. This typically is implemented by tying the linear power supply into the fire alarm via an input loop.  When the alarm is pulled, it sends a signal to the supply that it must cut power to whatever device is wired to it.

Most access panel and maglock manufacturers include these instructions, although they are typically vague on details in how to connect their components so that it happens.  In many cases, the install instructions state 'Installer must wire controller and/or power supply to stop issuing power when local fire alarm is activated', or similar. However, connection plans for doing this are not hard to accomplish if understood graphically. 

For example, take this Kisi access control knowledge base schematic that shows this common connection graphically: 

Power to the maglock is directly issued by a linear power supply, that in turn is triggered to drop power when a fire alarm is detected at the controller.  Alternatively, the power supply itself may include fire alarm input contacts instead of connecting to a door controller. As previously noted, however, this power drop may apply to every device connected to the supply: readers, controllers, RTE and more.

This may leave the door unsecured, and the main motivation of 'occupant safety' takes a clear precedence over 'building security'. Therefore, schematically planning out where each device is powered, and under what conditions backup power is supplied, should not be oversimplified.

Including The AHJ

Even after all this is done, the answer might still be "no".  If the local authority having jurisdiction, or AHJ, does not approve, the idea is dead. There are two basic reasons why local AHJs may not accept the idea:

·        First Responder Access: AHJs simply do not want any possibility that firefighters cannot enter a building because the door is locked.

·        System Malfunction: Alternatively, some AHJs refuse backed up maglocks because if the fire alarm interface malfunctions, the batteries could potentially keep the door locked and trap panicked occupants inside a dangerous building.

As a result, some areas outright forbid using backup power of these types of door locks as a matter of local exception and take any decision out of the hands of local inspectors.

Proceed Cautiously

These issues describe why maglocks are hated or deemed too difficult to work with by many. While using maglocks may be less expensive or easier to install that other types of electric locks, they are not always the best choice. If the opening design is too restrictive or costly to employ other lock types, then backup power must be supplied to keep doors locked.

Working through a code compliant design and getting approval of the AHJ become a priority for the new access system.

Before you make any decisions about what lock is best for your site, it's important to first think carefully about what your site requires in terms of safety and security, and to evaluate how risk can be reduced to ensure that security related incidents won’t interrupt your business operations.

Another key consideration is the state of the site itself: if you are adding access control to a site after its completion, it may be easier (and certainly more cost effective) to opt to use wireless locks as installing all the components and wires for mag-locks and electric strike locks will require a lot of additional time, labor and effort.

Some end-user opt for a combination of locks, installing a mag-lock and an electric strike lock on a single door to ensure that it is safe, secure and is able to accurately record movements of people in and out of the door at all times. However, in this case, it may just be simpler and more cost effective to install a wireless lock. 

If you still aren't sure what type of lock and access control system best meets your needs, feel free to get in touch with one of our experts via ssaintegrate@gmail.com. Before selecting vendor / installer check and verify they are authorized or not to execute your access control system.

Saturday, May 8, 2021

Luxriot Video Management Software

 Luxriot Video Management Software

A video management software (VMS) is a part of video surveillance system that allows the user to access real time videos, record, store, & playback recorded videos and derive useful insights of the surveillance site.

Current Video Management Systems are capable of offering much more than just surveillance, hence, upgrading a VMS system becomes as important as upgrading the other assets of the business. A VMS system can be upgraded when an organization is:

·        Using a traditional CCTV surveillance system (Old equipment and cameras)

·        Incurring increased maintenance costs of the existing surveillance system.

·        Expanding from Single site to multiple sites (Small to medium to large sized enterprises)

·        In the need of Intelligent Video Analytics for monitoring sites, employees or business processes.

·        Requiring Video Analytics for improving the site operations to benefit the customers, users of the VMS or employees.

·        In need for standardization of VMS system equipment.

There are few things that users must consider while selecting Video surveillance cameras for their VMS system. Users must check:

·        The camera resolution (image quality)

·        Indoor or outdoor camera compatibility

·        Wired or wireless cameras

·        Light sensitivity of the camera (ability of a surveillance camera to work in low light)

·        Shape of the camera (box type, bullet camera or dome camera)

·        Frame rate (more frames per second –fps defines more clear video)

Video Management Software can be classified into three main categories are per the surveillance sites ― small, medium and large sized VMS installations. Small size VMS installations support 10-20 cameras and are suitable for small enterprises, primarily operating in single sites. Mid-sized VMS installations (connecting 20 -50 cameras) are suitable for small to mid-sized enterprises and large-sized VMS installations (more than 50 cameras) are suitable for big multi-site or multi location enterprises. Small enterprises can just purchase plug-and-play VMS packages and get it installed by any technician. In medium or large sized VMS projects, companies can either outsource the services to VMS service providers or system integrators.

Third party systems are compatible devices, systems, and applications (from another vendor) that can be integrated with a Video Management System to improve its functionality. Security devices like access control devices, IP cameras, alarms, fire, and smoke detectors or devices like barcode scanners, speakers, Point of sale systems, electronic tags, etc., which can help businesses to streamline their operations are a few of the third-party systems for a video management software. Luxriot VMS is an open architecture Video Management System (VMS). Luxriot VMS accepts MJPEG, MPEG4 and H.264 as well as HD and megapixel video streams from Network (IP) cameras, encoders and video capture boards. Luxriot® VMS is integrated with over 3000 devices from all major manufacturers including ACTi, Arecont Vision, Axis, Hikvision, Messoa, Samsung, SONY, UDP, Vivotek and others. This along with Luxriot® VMS client-server architecture allows to build hybrid scalable solutions from a single NVR/DVR to the multiple server system handling thousands of cameras. Indian Country business partner is SSA Integrate.

Video Management Software can be classified into three deployment types:

·        On-premise VMS
On-premise VMS solutions are best suitable for managing video surveillance of a single site. All the streaming, recording & management servers, storage devices & applications are installed locally on-site. This allows user to manage their security and connected device ecosystem from the site itself.

·        Cloud based VMS
The cloud based VMS, unlike the on-premise VMS possesses higher flexibility and scalability. It allows the user to manage multiple sites, all at the same time – from any location and at any time.

·        Hybrid VMS
Hybrid VMS solution is a flexible surveillance solution, which generally comes with the capability of managing both analog and IP video signals simultaneously. It allows the enterprises to have traditional VMS solution to coexist with the functionalities of cloud Video Surveillance.

Latency in Video Management System can be defined as a delay in time between the frames captured by the surveillance camera and video feeds displayed on the screen. Latency is measured in seconds and milliseconds (ms). The delay in video feeds (Latency) in a VMS system can occur at different stages of the system; right from IP cameras, transmission network, streamer server to display monitors. To have efficient and real-time video surveillance, VMS systems are intended to function with zero or low latency.

Small businesses with a single location can be secured using on premise video management systems, which may require IP cameras as per requirement (up to 9 / 16 cameras), a DVR for on premise storage, a monitor to display footage, and an open software for basic surveillance functionality. Users can also upgrade their systems with additional security analytical features by purchasing specific licensed versions of the VMS software. Small businesses can also integrate systems like POS software, time and attendance software, and security alarms to manage important business processes with the VMS system.

Video analytics is a capability of leveraging structured algorithms in a video management software to analyse the unstructured video data and generate actionable insights for immediate response and effective decisions. Video analytics continuously scans the live video footage and captures the incidents according to the user configured criteria.  The data generated through live and recorded videos, via video analytics, helps in establishing a comprehensive security solution for retail, fleet transportation, city surveillance & other industry verticals.

Luxriot VMS Software Features

·        English, German, French, Spanish, Portuguese, Italian, Czech, Polish, Russian, Hebrew, Hungarian, Chinese, Danish, Estonian, Finnish, Greek, Simplified Chinese, Turkish, Korean, Japanese and Dutch localizations

·        DATA MINING with smart search filters for all Analytics

·        Luxriot API/SDK (Client Kit) 

·        License Plate Recognition (add-on product)

·        Broadcast Server for web and mobile clients

·        Video Analytics (add-on product) (people counting, car counting, object counting, intruder perimeter detection, direction filter, dwell filter, removed object detection, abandoned object detection, tailgating, calibration, camera shake cancellation, camera tamper detection, enter exit filters, stopping filter and more.

·        JPEG, MPEG2, MPEG4, H.264 video compressions 

·        HTTP, RTP, RTSP, TFTP  protocols 

·        Certified ONVIF Profile S compliancy

·        4K Ready

·        Chromecast support

·        Two-way audio for Audio enabled devices

·        Multicast for multicast enabled cameras

·        Support for multiple capture boards for hybrid installations

·        Video and Audio recording, playback and export. Export both remotely and locally

·        Full, time-lapse, motion-controlled, scheduler-controlled recording

·        SAN, DAS and NAS storage support (DAS support for Luxriot® VMS servers)

·        Multiple monitors support 

·        Extensive user/group permissions control

·        Web access from IE, Firefox, Chrome, Safari browsers

·        Mobile Applications for Android and iOS devices

·        PTZ control by Joystick and CCTV Keyboard

·        Bandwidth, FPS and resolution control 

Insights from video analytics not only helps retail stores in improving security, but also helps in improving customer’s shopping experience through in-depth insights on their buying behavior.  Devices like cameras, temperature sensors, handheld scanners, smart shelves, smart carts & access control devices, etc. generate in-store video analytics data.

Multi-site businesses require Video Management Software to be installed as a combination of On-premise and Cloud based VMS systems (Hybrid VMS). While, on premise Video Management Software allows each site to secure its premise through video surveillance, at the same time, cloud based VMS on multi-tenant federated architecture ensures interconnectivity and centralized monitoring of the sites. A federated cloud architecture based VMS also provides scalability and multi-tenancy to VMS system of geographically distributed multi-site enterprises.

Mail us to know more: ssaintegrate@gmail.com