Sunday, July 14, 2013

Access Control Standards Revolution Now In Progress

Access Control Standards Revolution Now In Progress 



Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and round a building.

Access control is essential for all businesses to protect people and assets and has the added benefit of being expanded from controlling, for example, a single entrance door, to a large integrated security network. There are also huge potentials in terms of integrating other systems, such as Time and Attendance, Visitor Management, ANPR, Fire, Intruder and CCTV.

Few specifications are seen more commonly in access control than UL 294. However, aside from seeing it in print, very few understand what it means. In this note, we break apart and define this spec, describing why it is a vital part of many Access RFPs.


A Standard Defined
The scope of UL 294 covers three aspects of Access Control systems: 
  • Construction (Installation)
  • Performance
  • Operation
Essentially, the heart of UL 294 is a safety standard, where testing proves that system components can be assembled and operate reliably without hazard. In the case of access control, this is a step beyond just validating devices will not catch fire or spark - it attests that the system will not harm the safety or impede egress of those using the system.
In practical terms, this means doors will not accidentally stay locked and keep people in harm's way even during a malfunction. The UL standard subjects each labeled device to a range of testing designed to show the equipment meet relevant code expectations from:
  • NEC (NFPA 99): Requirements that each component will not create a hazard either during (recommended) install or use (Sparking, Grounding)
  • NFPA 72: Fire Code compliance, assures that controllers include interfaces with fire alarm/suppression systems 
  • NFPA 101: System devices 

A UL 294 mark is a 'extra step' the vendor has taken to 'prove' their equipment is safe, and it stands as a 'mark of assurance' when included in buying specifications that dubious equipment will not be purchased.

The Mark

While Underwriter's Laboratories offer a range of 'UL Symbols' that can be interpreted to signify different standards. In the case of UL 294, the mark looks like this:
The UL 'Security Mark' applies only to products such as intrusion detectors, burglar alarms, access control, safes, and vaults.

Performance Tests
UL 294 includes several tests that evaluate how well devices withstand damaging environments. Devices are subjected to atypical electrical, environmental, and brute force situations, including:
  • Variable Voltage
  • Variable Ambients (Environment)
  • Humidity
  • Endurance (Ruggedness)
  • Transients
  • Corrosion
  • Standby Power (Battery backup)
  • Physical Attack Toughness
Tests are performed individually and are not 'layered' or 'stacked' simultaneously as might occur in the field. The exact methodology for each test depends on the device being tested, but the resulting grade is given in four levels of security performance with Level I (lowest level security equipment) to Level IV (highest level security equipment). 

Exclusions
However, not all parts and features of an Access platform fall under the scope of UL 294. Two areas excluded from the scope include:
  • Headend Server/Database: The scope reads "The accuracy of logged data is not evaluated by this standard", and also "This standard does not apply to supplementary computer equipment that is not necessary for operation of the access control system..."
  • Intrusion Detection: Again, the scope details "Where an access control equipment and/or system incorporates the features and functions of a burglar alarm control unit, the requirements of the Standard for Proprietary Burglar Alarm Units and Systems, UL 1076, shall also apply"
This is important to note when careless specs are written that "All Access Equipment shall be UL 294 Certified", because this is inherently not possible. There will be major functional aspects outside the scope of the standard.

Large System Adoption
Especially for larger systems, UL 294 is common, including devices from: Mercury Security, C*Cure, S2, Maxxess, Sargent, etc.
However, certification is done on a component basis, and there may be gaps in a brand's portfolio. If UL 294 compliance is required in a system, every hardware component must be checked for conformity, as there is no 'system' certification.
Systems and platform intended for smaller deployments (<100 doors) typically forego the certification, because it simply is not a purchasing driver for many non-enterprise customers.

Prime Use
Regardless of the 'safety' overtures, like UL certification for surveillance equipment, 294 is primarily used to exclude non-compliant systems from specifications. UL 294 evaluation is not mandatory for Access Equipment, and many vendors forego the cost of certification especially when their offerings are not well suited for larger government, institutional, and hospital verticals where 294 is commonly cited. 
Likewise, while the mark's testing 'proves' that devices are safe, the onus remains on the field technician to install them in the correct fashion to indeed live up to the certification.

Remember once UL certification has void OEM is not responsible for any health & safety incident of your premises. UL certification void due to repairing through unauthorized service provider....etc.

NFPA 101
While NFPA 101 is comprehensive, the most relevant passages for access control include:
  • NFPA 101: 'Electrically Controlled Egress Doors' (2012: 7.2.1.5.6; 2009: 7.2.1.5.5)
  • NFPA 101: 'Releasing Devices' ( 2012: 7.2.1.5.10-12; 2009, 2006, 2003: 7.2.1.5.9 -7.2.1.5.11)
  • NFPA 101: 'Access Controlled Egress Doors' (7.2.1.6.2)
Specifically, requirements like Access Control Request to Exit (RTE), Exit Devices, and Delayed Egress foundationally conform to NFPA 101.

NFPA 72
In general, this code is the foundation of requirements that doors must release when fire alarms or smoke detectors go into alarm.

NFPA 80
Specifically, this code examines Fire Doors and how they are properly used for protection in a building. In many cases, these door types are also slated to become access-controlled openings, and the 'Locks or Latches (6.4.4)' section describes which modifications are permitted for access use without voiding their fire door ratings.

IBC: International Building Code
The IBC, published by the International Code Council, is essentially a guidebook for designing and engineering safe buildings.

If not observed directly as the authority, then whatever resulting codes that do have authority take guidance from the source.
  • ·     IBC: 'Door Operations' (2012, 2009: 1008.1.9; 2006, 2003: 1008.1.8)
  • ·       IBC: 'Sensor Release of Electrically Locked Egress Doors' (2012: 1008.1.9.8; 2009: 1008.1.4.4; 2006, 2003: 1008.1.3.4)
  • ·       IBC: 'Electromagnetically Locked Egress Doors' (2012: 1008.1.9.9; 2009: 1008.1.9.8)

Saturday, June 29, 2013

How To Convince Your Customers To Choose IP Cameras Over Analog



As IP surveillance technology becomes more affordable, it’s also becoming a more attractive solution for smaller installations – installations that used to be the sole domain of analog product. But how do you convince your customers to upgrade their analog to IP, preferably before an incident forces their hand? There are three primary selling points for an IP system of an Analog system – higher resolution, more in-depth analytics, and the ease of new network configuration.

Modern IP cameras generally offer a higher level of resolution than analog cameras. Almost all analog cameras will be limited to the equivalence of a 4CIF or D1 resolution (that is, 704 x 480 or 720 x 480). Many IP cameras boast 5MP resolutions or higher – that’s 15.5 times more pixels than a standard analog camera! And a higher pixel count means more usable surveillance information. This is especially important when it comes to identifying intruders. For positive identification, a general guideline is to have at least 12.7 pixels per inch across the face of a suspect. It’s much better to have that resolution in place during an incident, rather than upgrading to that resolution because the suspect could not be identified with footage from the existing system.

For positive identification, a general guideline is to have at least 12.7 pixels per inch across the face of a suspect.

Another way to utilize this higher resolution as a selling point is the potential lower cost of the total installation. A camera with 5MP mounted 10 feet away from the viewing area will be able to provide identification level resolution across 17 feet horizontally, while a standard analog camera can only cover just over a quarter of this area. This means that you would need four analog cameras to provide the same level of coverage as one 5MP IP camera. When cables, software licenses, mounting hardware, lenses, and all other costs are factored in this can make the IP installation much more appealing from a cost basis.

Another advantage that IP cameras have is the ability to perform increasingly sophisticated analytics onboard the camera itself. Most recorded video is never watched – typically, footage is only reviewed when there is an incident. This is especially true on small installations that do not have a dedicated security guard. With the advent of on-board analytics, IP cameras themselves can now be programmed to independently analyze events, interact with other alarm systems, and send email or text alerts with pictures to interested parties. For example, a camera can be programmed to watch a specific door and only send an alert if that door is opened after regular business hours. At the very least, analytics can make it easier to sift through footage after the fact.
Finally, a lot of customers are concerned that IP video is overly complicated to manage when compared to an analog system. It’s true, earlier versions of IP cameras did require some level of networking know-how. But newer cameras are getting extremely close to plug-and-play with features that automatically detect and configure cameras added to a network through tools such as DDNS, DHCP, and other networking protocols. Depending on the brand selected, all that could be involved in the installation of a new device is plugging the camera into the switch and then selecting “Detect New Hardware” in the accompanying software. Network cameras can also run on existing network infrastructure and only one cable is required for both data and power with Power over Ethernet technology.

As every device begins to merge onto the network, it makes sense that security cameras move there as well. An IP video installation may cost more than a conventional analog system, but the price difference is getting smaller – and the benefits are increasing.

Wednesday, June 26, 2013

Android IP Camera Android Apps

Android IP Camera Android Apps
As a well-known eSecurity Professional in India I got many appreciation call/mail for my Blog writing. Thanks to all of you for read and understand my wrong English writing on my blog. Recently I visit Bhubaneswar (Located in India, Capital of Orissa) and face some question, customer ask you people highlight our NVR/ DVR is support Remote viewing on Android enable phone, but we are not enjoy the benefits of mobile security camera monitoring through our android phone. Our System Integrator / Installer technical person come and say something that we are not understands. So you’ve come to the right place. Many of today’s most trusted manufacturers of IP security cameras, DVR, NVRs, and video management software offer Android IP camera apps for safe and reliable monitoring. I share with you a list of Android security camera apps offered by manufacturers, and the high-end features available on each.

Optica
Android Security Camera App Name: OpticaMobile
Optica, a leading manufacturer of high-definition IP cameras, offers OpticaMobile and OpticaMobile HD mobile apps designed for iPhone, iPad, and Android devices. OpticaMobile delivers a wide spectrum of features to improve the viewing experience for all Optica IP cameras, including quad-view mode, live video streams, bookmarking, audio, snapshots, dual stream support, and PTZ control of Optica’s P218Z speed dome. It’s an easy and convenient way to tap into your Optica IP camera system while on the go. OpticaMobile HD is built for use on the iPad, while OpticaMobile is compatible with iPhone and Android devices.

Milestone
Android IP Camera App Name: XProtect Mobile
Created by Milestone, one of world’s leading developers of video management software, the XProtect Mobile Android security app offers a bevy of features catered to on-the-go surveillance users. With an average rating of 4.6, with 5 being the highest score, users have raved about its built-in features and usability. What’s great about this video surveillance app is how many cameras you’re able to view and manage at once. Users were most excited about the number of cameras they can monitor on this app – one even wrote that the app was able to support all 38 of the user’s IP cameras. Key features include video push, control of inputs and outputs, control of PTZ cameras, viewing live video feed from numerous remote security cameras, snapshot sharing to send via email or MMS, and compatibility with WiFi, 3G, and 4G networks.

Smartvue
Android IP Camera App Name: Smartvue Android App
Smartvue has remained on the cutting-edge of NVR technology since its inception. Recognized as an innovator in this market, Smartvue offers complimentary remote video surveillance access to its NVRs so you can check your IP cameras while on-the-go. Designed for Android versions 2.2 and up, the Smartvue Android App gives you complete access to your IP camera system when you’re physically off-site. With the Smartvue Android App installed, you can view your live video feed, playback archived recordings, swipe the screen to change cameras, control display settings as needed, monitor multiple cameras at once, and control PTZ functions. It also works with a wide variety of IP camera brands and body styles. Users have given this video surveillance app excellent ratings for its convenience, ease-of-use, and intuitively designed interface.

VivoTek
Android IP Camera App Name: iViewer LITE
This Android IP camera viewer app offered by Vivotek enables surveillance users to monitor live streaming video from all of their IP cameras, or those that are managed by Vivotek’s video management software for up to 360 seconds at a time. Note that this app currently works only with Android V2.3 and higher. Supporting IP cameras from a multitude of server connections, this app allows PTZ control via the touch screen, real-time video switching for different display options, image snapshots, single-channel playback by search, and the ability to playback recorded video for 1, 2, 5, and 10 minute intervals Additionally, you can configure your app to support fisheye camera views.

QNAP
Android IP Camera App Name: VMobile
Offered by NVR manufacturer QNAP, the VMobile Android App facilitates remote and wireless monitoring of IP cameras by connecting to the company’s VioStar NVR through Android versions v1.6, v2.1, and v2.2. VMobile is able to manage an unlimited number of servers and cameras for a wide variety of IP camera brands and body styles. With this app, you’re able to adjust the display mode, control PTZ, receive notifications if your IP camera detects tampering or vandalism, and capture snapshots that you want to save. You’re also able to playback recorded video from each of your IP cameras and search recorded video based on date and time.

EverFocus
Android IP Camera App Name: MobileFocus & MobileFocusPlus
Through the MobileFocus Android security camera app, you can connect to Everfocus DVRs and IP cameras at the touch of a button. Everfocus is one of the leading manufacturers of CCTV cameras, DVRs, and professional security products, including a select line of IP cameras catered to the ever-growing IP surveillance market. The mobile monitoring app’s easiest functions are viewing your cameras in real-time and controlling PTZ remote security camera models. Auxiliary mobile monitoring technologies include device management, channel control, gesture digital zoom, image snapshots, and full screen mode.

Saturday, June 15, 2013

CCTV Quad Splitter


The Video quad splitter is a very important component of close circuit television systems. Quad splitters were developed to eliminate the not so cost effective way of one camera per monitor and time lapse recorder design. A Quad enables the user to view up to four cameras on the same screen simultaneously. It displays all cameras on the screen two on the top quadrants and two on the bottom quadrants. This gives the user a tremendous advantage over security camera systems using video sequential or manual switchers. Using a quad, the system operator will not miss any activity he or she would have if they were using a sequential or manual switcher. However there is a slight drawback to the quad splitter. Its images can sometimes be too small to distinguish any specific details on an image, especially when using small CCTV monitors.

While viewing a live feed this drawback can be overcome since the quad allows full screen viewing of any camera with a simple push of a button. However the same cannot be said once a picture has been recorded. When a quad output is recorded, it is recorded the same exact way as it is seen on the screen. Therefore if a quad view is being displayed while recording that’s the only way it can be retrieved on playback. And if an operator has switched to a full screen camera view while recording that will be the only camera that could be viewed on playback. As you can see this could pose a problem in many applications and is also the main reason why many people upgrade theirs systems from quads to video multiplexers.

Monochrome cctv Quads
Monochrome Quads are designed for use with black and white cameras can also be used with color cameras but the picture on the screen will always be displayed in black and white. They are Ideal for use in pubs, clubs, hotels, commercial and residential premises

Color cctv Quads
Color quads are designed for use with color cameras but can also be used with black and white cameras. They are commonly uses in pubs, clubs, hotels, commercial and residential premises

Dual page cctv quads
Dual page quads are equipped with 8 video input to allow for up to 8 camera connection. The picture is displayed in two separate groups of four cameras. The switch between the two groups can be done manually or it can be set automatically at a predetermined switch time.

Friday, May 31, 2013

Private and Public IP Addresses: What’s the Difference ?


Internet Protocol (IP) addresses is usually of two types: Public and Private. If you have ever wondered to know what is the difference between a public and a private IP address, then you are at the right place.
In this post I will try to explain the difference between a public and a private IP address in layman’s terms so that it becomes simple and easy to understand.

What are Public IP Addresses?

A public IP address is assigned to every computer that connects to the Internet where each IP is unique. In this case, there cannot exist two computers with the same public IP address all over the Internet. This addressing scheme makes it possible for the computers to “find each other” online and exchange information. User has no control over the IP address (public) that is assigned to the computer. The public IP address is assigned to the computer by the Internet Service Provider as soon as the computer is connected to the Internet gateway.
A public IP address can be either static or dynamic. A static public IP address does not change and is used primarily for hosting web pages or services on the Internet. On the other hand, a dynamic public IP address is chosen from a pool of available addresses and changes each time one connects to the Internet.
Most Internet users will only have a dynamic IP assigned to their computer which goes off when the computer is disconnected from the Internet. Thus when it is re-connected it gets a new IP.

What are Private IP Addresses?

An IP address is considered private if the IP number falls within one of the IP address ranges reserved for private networks such as a Local Area Network (LAN). The Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the IP address space for private networks (local networks):
10.0.0.0 – 10.255.255.255 (Total Addresses: 16,777,216)
172.16.0.0 – 172.31.255.255 (Total Addresses: 1,048,576)
192.168.0.0 – 192.168.255.255 (Total Addresses: 65,536)

Private IP addresses are used for numbering the computers in a private network including home, school and business LANs in airports and hotels which makes it possible for the computers in the network to communicate with each other.
Say for example, if a network X consists of 10 computers, each of them can be given an IP starting from 192.168.1.1 to 192.168.1.10. Unlike the public IP, the administrator of the private network is free to assign an IP address of his own choice (provided the IP number falls in the private IP address range as mentioned above).
Devices with private IP addresses cannot connect directly to the Internet. Likewise, computers outside the local network cannot connect directly to a device with a private IP. It is possible to interconnect two private networks with the help of a router or a similar device that supports Network Address Translation.
If the private network is connected to the Internet (through an Internet connection via ISP), then each computer will have a private IP as well as a public IP. Private IP is used for communication within the network where as the public IP is used for communication over the Internet. Most Internet users with a DSL/ADSL connection will have both a private as well as a public IP.
You can know your private IP by typing ipconfig command in the command prompt. The number that you see against “IPV4 Address:” is your private IP which in most cases will be 192.168.1.1 or 192.168.1.2. Unlike the public IP, private IP addresses are always static in nature.

Common Myth about Private IP Address:

Most people assume that a private IP is the one used for stealth Internet activities and hence cannot be detected. But this is NOT TRUE!.
Unlike what most people think, a private IP address (unlike the private telephone number) is just like any other IP address that belongs to a private network. In reality, there is no public IP address that is impossible to trace as the protocol itself is designed for transparency.
 

Friday, May 24, 2013

Fingerprint vs.Facial recognition

Biometric technology and ID identification has greatly reduced the possibilities of buddy punching and unauthorized access for businesses. Yet there are different types of biometric technology on the market as a business owner has to decide which will work right for their building.
Fingerprint recognition:
Door fingerprint locks rely on scanning the unique ridges and valleys on the tips of a worker's finger. These fingerprints are used to match the fingerprints on file in the system to identify the worker.
Facial identification:
Facial identification works by taking pictures of a worker's face at different angles during the enrollment program. These pictures are stored in the system's database. When a worker uses the facial recognition system, they show their ID card as the system scans their face through the camera and matches it to the pictures in the system.

How To Choose A Biometric System? 
Both facial and fingerprint biometric recognition systems have their advantages and disadvantages. Yet the benefits should convince most business owners to invest in one of these security and time clock attendance systems. To decide which biometric identification system to pick, use these factors based on the type of business:
* How much can you invest in a biometric system?
* How many biometric systems will you need?
* Where will the biometric systems be placed (interior or exterior)?
* What environmental issues may affect the biometric system operations (i.e. dirty work areas that will affect fingerprint scans or lighting that may affect facial recognition)?




Sunday, May 19, 2013

45% of End User Security Budgets Increasing



With much talk of budget cuts, many US-based organizations are still willing to pour dollars into their physical security initiatives, at least according to a recent study from by IMS Research. In fact, 45 percent of end users say that their security budget increased in 2012, the study found.

"It's clear that end users are still feeling the risk to their facilities -- and that means there's plenty of opportunity for manufacturers of physical security equipment," said Niall Jenkins, manager for video surveillance and security services research at IMS, in a press statement. "Just having a budget available was actually one of the top two reasons for end users paying to replace or upgrade their systems as well."

The survey, which polled 200 end users of physical security equipment across North America, found that the majority of these organizations are dedicating large amounts of resources to physical security. In fact, 44 percent reported that their organization's annual budget exceeded Rs. 5000K.

"Budgets either stayed the same or increased last year for those that spent approximately Rs. 1Cr and also for 85 percent of the overall market," Jenkins noted. "I wouldn't say that the security boom is over just yet."

Even with bigger budgets, users report concerns. Despite investing in new equipment, buyers say that their biggest worry is that vendors will suspend support for newly-acquired security products while they are still being productively used within the organization, the survey found.

Especially as the market in the US transitions from analog to network-based video surveillance, vendors are shifting their product mixes and ending support for products, said Jenkins in an interview with IFSEC Global. "There's also a transition to the use of video analytics, PSIM, and wireless infrastructure," he added. "In the fire market, you don't see that pace of development, while intruder alarm and access control are probably somewhere in the middle."
In addition, some vertical markets feel better served by security vendors. "The majority of end user markets, when asked about whether security meet their needs, were positive, but the transportation industry overall jumped out as one vertical that said the security industry wasn't meet their needs," Jenkins told us.

So, let us know. Is your budget on the rise? Where do you plan to invest?

Indian Company also increase there Security Budgets in 2013.

We hope that you have found this resource page to be helpful.  
 
If you have any questions about this page or anything related to CCTV or surveillance systems, please contact us at bhadra_1980@yahoo.com