Saturday, November 21, 2015

You need an Access Control Systems

Do you need an Access Control Systems?


Access control security systems are designed to restrict physical entry to only users with authorization. Many organizations, governmental and private, have started adopting access control security systems for physical entry into their facilities. Whether it is a simple non intelligent access control system like a punching in a password, or advanced biometric systems that scan and permit entry very specifically, there are many advantages to employing these security systems.
It is important for businesses of every size to keep important data and remove threats. All businesses acknowledge this basic security concern by placing locks on the door and giving keys to employees that need to access these locks. If you answer yes to any of the following questions, you may need access control systems:
    • Is a lost or stolen key a security threat to your business?
    • Time Based Control for Security Systems
    • Do you need different access for different employees and clients?
    • Would it be really beneficial to restrict access based on time or day?
    • Do you need a record of people’s “comings and goings?
    • Could your employees/clients be more secure?
    • Reduced Requirement for Manpower
    • Biometric Systems
Benefits of access control systems
The benefits of access control systems are thus many:
  • Audit trail – With access control systems, you will have a record of every opening and attempted opening of each door or specific area. The audit trail can be valuable in resolving employee issues.
  • Time/day restrictions – Do you have certain employees that should only be there at certain times and days. An access control system make more sense to control their access than to give them a key that allows access at any time or day.
  • Lost or stolen keys – When keys are lost or stolen, it is an expensive process for a business to completely rekey each door. Access control systems allow you to remove access by deactivating the I.D. badges or other security credentials.
  • Remote access control – Many access control systems allow you to control of all of the business’ locks from one main system. With access control systems, you can easily and quickly lock down your businesses in an emergency as well as add and remove credentials.
Design 1:
Design 2: Single Door
Design 3: 4-Door single controller.
Design 4: New Concept, PoE Based
Design 5: SYRiS Product with SQL Database, Multi-location. One SY230NT Controller can controll 4nos of Door. Practically i do many projects with this.
How the Access Control System WorksØ  The typical access control system consists of a card/ pin reader, electromagnetic lock or door strike, power supply system and a push button.
Ø  The valid and authorized card user must present the card to the security system.
Ø  Upon verification by the reader, the locking system will be de-energized and the door can be pushed open.
Ø  To exit the premises, the person will have to press a door lock release switch and the system will release the lock.
Ø  A power back up is also installed while fitting in the access control system.
Ø 
A break glass is also incorporated in case of emergency.

Monday, November 16, 2015

Biometrics Systems usage and Advantages

Biometrics Systems usage and Advantages

Biometrics Systems are spreading its limbs in almost every sector, as it ensures security to the top most level. Looking at its multidimensional features, biometric systems are used for various applications. 

In today's technologically modern era, the biometric systems are replacing other conventional methods for different purposes. Biometrics Systems can be used to-- Manage Attendance, Access Control, Leave Management, Payroll Processing and many more. This really helps to optimize the solutions according to one's requirement. These solutions help to reduce the chaos of work and also reduces administrative costs.
How secure Biometric Systems are?
Biometric features of each individual are unique in itself, which cannot be tampered or manipulated. Though there are few possibilities to break the security, so to manage optimum security level, biometric systems can be secured with passwords and PIN codes.

How Biometrics Systems are beneficial?

Biometrics systems are useful in many ways, and its benefits depend on the application. Following are the most important benefits of biometrics systems which can help any firm to streamline the work force:-

Reduces Time and other paper works
Biometric solutions can easily reduce the time consumed in hectic calculations and paperwork required in salary processing or other processes. Now these solutions generate reports easily. The reports can be generated monthly or weekly or daily; depending on the requirements.

Accurate Identification
While traditional security systems are reliant on passwords, personal identification numbers (PINs) or smart cards, you can achieve a high level of accuracy with biometrics systems. If you have set up the system correctly, you can use biological characteristics like fingerprints and iris scans, which offer you unique and accurate identification methods. These features cannot be easily duplicated, which means only the authorized person gets access and you get high level of security.

Reduces Human efforts and administrative costs
Since each report is easily generated, so there is no requirement of involvement of more than one employee. Also, each and every detail of each employee is managed easily, thus there is no chance of any kind of manipulation. This reduces the administrative costs.

Restricts unauthorized access
The Access Control Solutions are generally used to restrict the unauthorized movements of any person. It basically works on biometrics of an employee. It also allows to limit the access of employees to a certain range of the office premises. 

Accountability
Biometric log-ins mean a person can be directly connected to a particular action or an event. In other words, biometrics creates a clear, definable audit trail of transactions or activities. This is especially handy in case of security breaches because you know exactly who is responsible for it. As a result you get true and complete accountability, which cannot be duplicated.

Helps to maintain attendance and other records
The Biometric Systems can be used to maintain the attendance of each employee and also manages other records, including OTs, Leaves, etc. A report of records can be generated according to the requirements.

Different solutions based on biometrics for different purposes
Biometric systems can be linked with different solutions like leave management system, canteen management system, payroll software and time office software to solve different purposes.

Security
Another advantage these systems have is that they can’t be guessed or stolen; hence they will be a long term security solution for your company. The problem with efficient password systems is that there is often a sequence of numbers, letters, and symbols, which makes them difficult to remember on a regular basis. The problem with tokens is that they can be easily stolen or lost – both these traditional methods involve the risk of things being shared. As a result you can’t ever be really sure as to who the real user is. However that won’t be the case with biometric characteristics, and you won’t have to deal with the problem of sharing, duplication, or fraud.

Scalability
Biometrics systems can be quite flexible and easily scalable. You can use higher versions of sensors and security systems based on your requirements. At the lowest level you can use characteristics that are not very discriminative; however if you are looking for a higher level of security for large scale databases then you can use systems with more discriminable features, or multi-modal applications to increase identification accuracy.

Convenience
It’s considered to be a convenient security solution because you don’t have to remember passwords, or carry extra badges, documents, or ID cards. You are definitely saved the hassle of having to remember passwords frequently or changing cards and badges. People forget passwords and ID cards are lost, which can be a huge nuisance with traditional security methods.

Versatility
There are different types of biometrics scanners available today and they can be used for various applications. They can be used by companies at security checkpoints including entrances, exits, doorways, and more.
Moreover you can make the most out of the biometric solutions to decide who can access certain systems and networks. Companies can also use them to monitor employee time and attendance, which raises accountability.

Sunday, November 1, 2015

Anti-Passback in Access Control Systems

Anti-Passback in Access Control Systems

The anti-passback (APB) feature is designed to prevent misuse of the access control system. The anti-passback feature establishes a specific sequence in which access cards must be used in order for the system to grant access.

The anti-passback (APB) feature is most commonly used at parking gates, where there is both an “in” reader at the entry gate and an “out” reader at the exit gate. The anti-passback feature requires that for every use of a card at the “in” reader, there be a corresponding use at the “out” reader before the card can be used at the “in” reader again. For the typical user of the parking lot, this works fine, because the user would normally swipe their card at the “in” reader to get into the lot in the morning, and swipe it at the “out” reader to get out of the lot in the evening. So long as the sequence is “in – out – in – out – in – out”, everything works fine. However, if a user swipes his card at the “in” reader to get in, and then passes his card back to a friend, the card would not work the second time when it was swiped by the friend. The attempt to use the card a second time would create an “in – in” sequence that is a violation of the anti-passback rules, and this is why access would be denied.

Picture Left: (1.) First the cardholder enters into the area and then the system will allow them to (*2.) exit.

Picture Right: If a cardholder has already (1.) entered and then before they exit they try (or someone else with their card tries) to enter again, the will be (3.) denied because there is an anti-passback violation because it is impossible to Enter and area when the system thinks you are already Inside.


Anti-passback can also be used at employee entrance doors. This requires that a card reader be installed on both the inside and the outside of the door. Employees are required to both "card-in" when they enter the building and "card-out" when they leave the building. The anti-passback feature is also commonly used with turnstiles.

There is an expanded version of the anti-passback feature called “regional anti-passback”. This establishes an additional set of rules for card readers inside of the building itself. Basically, this rule says that unless a card is first used at an “in” reader at the building exterior, it cannot be used at any reader within the interior of the building. The theory is that, if a person did not enter through an approved building entrance, he or she should not be permitted to use any of the readers within the building.

Depending on the access control system manufacturer, there may be additional anti-passback features in the system. Some of these features could include "timed anti-passback", which requires that a designated amount time pass before an access card can be used at the same reader again, and "nested anti-passback" which requires that readers be used in only designated sequence to enter or leave a highly-secured area.

Denying access when a user attempts to use a card out of sequence is sometimes called "hard" anti-passback. Hard anti-passback means that when a violation of the anti-passback rules occurs, the user will be denied access. Some access control systems also offer a feature known as "soft" anti-passback. When a system is using this option, users who violate anti-passback rules are permitted access, but the incident is reported to the person managing the access control system so that corrective action can be taken - most often notifying the offending employee that the access card should be used in the proper sequence in the future.

The anti-passback feature can also be integrated with the corporate computer system, preventing users from logging on to the network at their desktop computer unless they have properly entered the building using their access card. This feature can also temporarily disable the users remote log-on privileges while the user is in the building - the theory being that if the user is at work, there is no reason for someone from off-site to be logging on to the network using his or her user name and password. When the user leaves the building at the end of the day, his or her remote log-on privileges are turned back on.

Some Typical Situations

A. When someone enters the entry gate following others without his own authentication, he or she cannot get through the exit gate through his own authentication even his authentication is a valid one. It’s the same when someone gets through the entry gatefollowing others without his own authentication, he or she cannot get through the entry gate through his own authentication.

B. When someone gets through the gate, and then he or she “passes back” that card, say through a window or another door, to an unauthorized user, who then uses the same card to access the building, he or she cannot get through. The password authentication is the same.
C. When someone get through the Fingerprint/Card/Password authentication, he or she doesn't access, then he or she cannot get through the gate even the authentication is a valid one.

Set up an Anti-passback SYRiS Controller Exp:-


Set up an Anti-passback Suprema BioStar V1.62 Software Exp:-


Anti-passbackis a security mechanism that prevents a person from passing back her access card to the next person. It is designed to prevent the next person from verifying herself with another person's access card. When using BioStar, you can set up an Anti-pass back zone, which requires users who've already entered an area to leave the zone first before entering the area again. For instance, if the zone consists of two devices (let's call them Device A and Device B here), the user who's been already verified on Device A must verify herself on Device B before verifying herself on Device A again.
You can set up an anti-passback zone by performing the following steps:
1. On the Doors page, click Add New Zone.

2. Enter a name for the Anti-passback zone and choose Anti-passback Zone from the Type drop-down list.
3. Configure the settings of the Anti-passback zone and add devices to the zone by clicking Add Device.
·  APB Type
§  Soft - A user who has broken the Anti-passback rule can enter the area without the administrator explicitly releasing the alarm.
§  Hard– A user who has broken the Anti-passback rule can't enter the area without the administrator explicitly releasing the alarm.
·  In case of Disconnected
§  Door Open– Doors in the zone will get opened when the communication between the master and member devices is disconnected.
§  Door Close – Doors in the zone will get closed when the communication between the master and member devices is disconnected.
4. Choose the devices you want to add to the zone as In Device and click the right arrow button. Perform the same for Out Device.
5. Click Apply to transfer the settings to the devices.



Saturday, October 17, 2015

D-Link Port Forwarding of DVR

D-Link Port Forwarding - DIR 615 - DIR-825 - DIR-655 - DIR-628 - DIR-628
D-Link port forwarding, also known as virtual server, allows you to configure inbound Internet connections to your router to be routed to specific devices on the network.  In order for surveillance system cameras to be accessible over the Internet, your router is configured to forward requests to your surveillance DVR or directly to IP cameras.  The IP address that your router assigns to your DVR or to IP security cameras is a LAN (internal IP address) that cannot be accessed from outside of your local network.

These instructions are for more recent D-Link routers such as the following: DIR-615, DIR-825, DIR-655, DIR-628.
1.     Open your D-Link router's control panel by going to the IP address http://192.168.0.1/ in a web browser. You will be prompt for a password.  If you did not setup a password on your router, the dlink default password is usually blank.  Enter admin for the username and leave the password blank or enter your password.
2.     After you are logged into your router

1. Click on the "Advanced" tab (#1 below). The virtual server screen will open.
2.     Click the check box next to the first open virtual server entry and fill in the Name for this service.  This can be anything that you choose.  Also fill in the IP address of the device that you are setting up port forwarding for.
3.     Enter the port # for both the Private Port and Public Port.  Ports 80, 4550, and 5550 are the ports that need to be forwarded for Some DVR webcamserver to work.  You need to make an entry for each port.  Most of our stand alone DVRs only use one port which should be supplied on the instructions for the particular DVR you are installing.
4.     Select "TCP" for Protocol.
5.     Select "Always" for Schedule, and "Allow All" for Inbound Filter.
6.     Click Save Settings.
2.     On success, the screen will display a settings saved screen

The port forwarding entry is now added.  If you need to add additional port forwarding rules, repeat the above steps.

Saturday, October 10, 2015

32-bit and 64-bit CPU

32-bit and 64-bit CPU


If you are CCTV technicians you need to know the two main categories of processors are 32-bit and 64-bit. The type of processor a computer has not only affects it's overall performance, but it can also dictate what type of software it uses.
32-bit processor
The 32-bit processor was the primary processor used in all computers until the early 1990s. Intel Pentium processors and early AMD processors were 32-bit processors. The Operating System and software on a computer with a 32-bit processor is also 32-bit based, in that they work with data units that are 32 bits wide. Windows 95, 98, and XP are all 32-bit operating systems that were common on computers with 32-bit processors.
64-bit processor
The 64-bit computer has been around 1961 when IBM created the IBM 7030 Stretch supercomputer. However, it was not put into use in home computers until the early 2000s. Microsoft released a 64-bit version of Windows XP to be used on computers with a 64-bit processor. Windows Vista, Windows 7, and Windows 8 also come in 64-bit versions. Other software has been developed that is designed to run on a 64-bit computer, which are 64-bit based as well, in that they work with data units that are 64 bits wide.

Differences
The main difference between 32-bit processors and 64-bit processors is the speed they operate. 64-bit processors can come in dual core, quad core, and six core versions for home computing (with eight core versions coming soon). Multiple cores allow for increase processing power and faster computer operation. Software programs that require many calculations to function operate faster on the multi-core 64-bit processors, for the most part. It is important to note that 64-bit computers can still use 32-bit based software programs, even when the Windows operating system is a 64-bit version.
Another big difference between 32-bit processors and 64-bit processors is the maximum amount of memory (RAM) that is supported. 32-bit computers support a maximum of 3-4GB of memory, whereas a 64-bit computer can support memory amounts over 4 GB. This is important for software programs that are used for graphical design, engineering design or video editing, where many calculations are performed to render images, drawings, and video footage.

One thing to note is that 3D graphic programs and games do not benefit much, if at all, from switching to a 64-bit computer, unless the program is a 64-bit program. A 32-bit processor is adequate for any program written for a 32-bit processor. In the case of computer games, you'll get a lot more performance by upgrading the video card instead of getting a 64-bit processor.

In the end, 64-bit processors are becoming more and more commonplace in home computers. Most manufacturers build computers with 64-bit processors due to cheaper prices and because more users are now using 64-bit operating systems and programs. Computer parts retailers are offering fewer and fewer 32-bit processors and soon may not offer any at all.

Saturday, October 3, 2015

Bit Rate

Bit Rate For DVR, NVR & IP Camera

What are Bit Rates?
Let’s start with “what is a bit, and “why do I need to know?” A bit is short for “binary digit”, the smallest unit of information in computing. It takes 8 bits to make a byte of information. “Bit rate” refers to the number of bits of data transferred in a file over a set length of time usually measured in number of “bits per second” or “bps”.
Constant bit rate (CBR) and variable bit rate (VBR) are the main types of bit rate encoding. Scene complexity can vary significantly over several hours of recorded video, and the bit rate you select for recording will have an effect on image quality, bandwidth consumption, and hard drive storage. A complex scene with moving action, such as traffic on a city street, or a scene with a lot of contrasting colors, will affect image quality and bandwidth consumption more than a less complex scene, such as an interior room with very little action or movement.
Most NVRs and IP cameras let you choose either constant or variable bit rates for recording video, and this is why you “need to know” the difference.

Constant Bit Rate (CBR)
With constant bit rate encoding, a fixed bit rate and bandwidth is used throughout the entire encoded video file. With a constant bit rate, image quality may fluctuate over the course of the video stream because some scenes are more difficult to render than others. In order for the bit rate to remain constant, the video may be encoded with fewer bits in some places or more bits in other places resulting in inconsistent image quality. Since bandwidth consumption with constant bit rates does not vary, the file size is limited and more predictable than with variable bit rates.
You will most commonly use CBR to restrict the data flow to keep network utilization as low as possible. If you have 10 cameras set to 8000K (8 megabits) on a 10/100 LAN, you are using 80% of your available bandwidth. With CBR, you can set that bit rate down to 5000K and your utilization will be around 50%.
Pre-planning your security video storage requirements is easier with constant bit rate because the amount of data being recorded never changes.

Variable Bit Rate (VBR)
With variable bit rate encoding, a changeable bit rate and bandwidth is used throughout the encoded video file. The variability of bit rates allows for video to be recorded at a lower bit rate when the  scene on screen is less complex and at a higher bit rate when the scene is more complex. Complex scenes (such as moving traffic) require more data and greater bandwidth to maintain image quality  than less complex scenes such as a wall or hallway with very little movement or action. With variable bit rates, the quality of video is higher and more consistent throughout the video stream compared to constant bit rates, yet the file size is less predictable.

Image quality is better with variable bit rates than with constant bit rates, yet pre-planning your security video storage requirements is more difficult because the bit rate changes and more complex scenes will require greater bandwidth and storage.

Here’s a Quick Look at How Constant and Variable Bit Rates Compare:
Constant Bit Rates
Variable Bit Rates
Variable video image quality
Consistent video image quality
File size is predictable because bit rate and bandwidth consumption is fixed
File size is unpredictable because bit rate and bandwidth consumption varies
Greater compatibility with most systems (compared to variable bit rate)
Less predictable compatibility (compared to constant bit rate)
When to use: When you need to limit file size and the quality of video is less important.
When to use: When consistent image quality is critical and predicting or limiting file size is less important.
The best of both worlds is when the device allows you to set VBR with a ‘Cap’ or maximum allowed bit rate.

Here is a handy ‘Quick Reference’ for setting a constant Bit Rate in bits per second.
Low Activity
Compression
Frame Rate
VGA/D1
720P/1.3MP
1080P/3MP
H.264
25~30
768K
2000K
3000K
15~20
512K
1500K
2000K
8~10
386K
1000K
1500K
2~5
256K
768K
1000K
MPEG4
25~30
1000K
3000K
5000K
15~20
768K
2000K
4000K
8~10
512K
1500K
3000K
2~5
386K
1000K
2000K

Normal Activity
Compression
Frame Rate
VGA/D1
720P/1.3MP
1080P/3MP
H.264
25~30
1000K
3000K
5000K
15~20
768K
2000K
4000K
8~10
512K
1500K
3000K
2~5
386K
1000K
2000K
MPEG4
25~30
1500K
4000K
6000K
15~20
1000K
3000K
5000K
8~10
768K
2000K
4000K
2~5
512K
1500K
3000K

High Activity or PTZ on Tour
Compression
Frame Rate
VGA/D1
720P/1.3MP
1080P/3MP
H.264
25~30
2000K
4000K
6000K
15~20
1500K
3000K
5000K
8~10
1000K
2000K
4000K
2~5
768K
1500K
3000K
MPEG4
25~30
3000K
6000K
8000K
15~20
2000K
4000K
6000K
8~10
1500K
3000K
4000K
2~5
1000K
2000K
3000K
In the bit rate charts above, you will see 1000K / 2000K etc. These figures can be loosely translated into ‘megabits’ per second.
1000K = 1Mb | 2000K = 2Mb and so on.

(In the computing world you would actually use 1024K = 1Mb and 2048K = 2Mb, but since most CCTV devices won’t allow those exact numbers, we just round them down to the closest thousand.) These figures are important to familiarize yourself with to manage your network load.

For example – 1 camera running a high bitrate of 8000Kbps (8Mbps) is no problem on a 10/100 network. 10 cameras at that bit rate = 80Mbps. 80Mbps is 80% network utilization on a 10/100 LAN. This is enough to see visible slowdown on the network and may begin to cause problems.

Switch to a Gigabit LAN and that becomes 8% utilization. Always check the capabilities of the network you are installing on – this can save you from a lot of headaches. When using IP cameras, always use Gigabit routers and switches when possible.  Also, make sure your NVR is connected to a gigabit switch. Plugging your NVR in to a 10/100 switch will limit your NVR to a 100Mb connection.

And finally – here is a “loose rule of thumb” for setting a bitrate:
[image width] x [image height] x [framerate] x [motion rank] x 0.07 = [desired bit rate]

Where the image width and height is expressed in pixels, and the motion rank is a number between 1 and 4. 1 being low motion, 2 being medium motion, and 4 being high motion (motion being the amount of image data that is changing between frames.).

So for instance, if we take a 1280×720 video at 24 FPS, with medium motion (movie with slow camera movements, not many scene changes…), the expected ideal bit rate would be:
1280 x 720 x 24 x 2 x 0.07 = 3,096,576 bps => approximately 3000 kbps, or 3MB
Remember – bit rates are not “universal” – different cams will give different results due to variations in encoding methods, hardware, and environmental conditions. Watch for artifacts like “ghosting” or “smearing” of moving objects.

Ghosting = when someone moving across the image may appear transparent, or may have a “ghost” following them. The “ghost” is not always transparent and may look like two people overlapped.

Smearing = when a moving object causes objects around it to change in appearance or starts to become pixilated.

Pixilated = When objects become unclear – may appear as a “smear” or slightly out of focus. In worst cases you will begin to see blocks of similar colors instead of the object itself.