Saturday, March 17, 2018

Mobile & Remote Video Surveillance

Mobile & Remote Video Surveillance Camera Systems

Customers often ask how to access a live view of their remote security cameras when they’re away from their home or business. After all, people lead busy lives, come in and out of work, go on vacations, and run errands so investing in a remote video surveillance system is crucial to the well-being and safety of your home or business. Thus, much of the time you’re not actually able to be onsite where your cameras are installed. One of the primary benefits of IP video is that you’re not limited to viewing your remote video surveillance system on site. The advancements in video surveillance technology have made it possible to view your remote security camera from any internet-enabled PC or smartphone. arindamcctvaccesscontrol.blogspot.com has outlined the key components of remote security camera system and video surveillance app, everything you need to know in order to start viewing your security cameras off-site.

What is Remote Video Surveillance?
Remote video surveillance enables users to view live video on a PC or laptop from just about anywhere in the world with internet access. To facilitate remote viewing, you simply type in the IP address of your network security camera in your internet browser like you would a website. This is done through DDNS and port-forwarding, which is discussed in greater detail further below. Once you’ve configured DDNS and port-forwarding and have obtained an IP address to view online, you can then begin to experience what it’s like to view your security camera system from a remote location. Remote security cameras are typically compatible with a wide range of web browsers. It is worth noting that specific web browser support varies by manufacturer.

What is Mobile Monitoring?
Remote mobile video surveillance takes remote monitoring to a whole new level. Several IP camera manufacturers offer complimentary mobile surveillance apps that give you the ability to view and manage your security cameras from a smartphone or tablet such as the iPhone, iPad, or Android. Many of these security camera apps allow you to view multiple cameras simultaneously, control PTZ settings, view recorded images, search through archived footage, play back events, and much more. Just like you would view your security camera(s) on a remote PC/laptop, you will need to have an internet data plan and IP address to do so. Remote video surveillance is perfect for users who are often off-site, and therefore not able to be on the local computer system where their IP cameras are connected.

What’s the Difference between Remote and Mobile Video Surveillance?
The common denominator of remote monitoring and a security camera app is online viewing. The main differences between the two are usability features. Remote monitoring tends to give you greater control over your camera system when it comes to managing settings and recording video. If you’re checking up on your business cameras from your home or hotel on a PC or Mac, you usually have a more reliable and secure internet connection.
A mobile security camera app requires a smartphone data plan, and may lose connection from time to time in no-coverage zones. It’s also a matter of personal preference – if you use the internet primarily on your smartphone, then mobile surveillance may be the right choice for you.

How can Remote Video Surveillance and Mobile Monitoring Help You?
Remote security camera monitoring and mobile surveillance do not require you to be “on location” in order to view and manage each of your security cameras. You’re not limited to monitoring just one camera remotely; most video surveillance apps provide simultaneous viewing and multi-site options so you can check up on all of your remote security cameras in your business or home. Monitoring off-site is also extremely convenient for users as it gives them the freedom to come and go as they please without having to worry about their property. For example, mobile and remote monitoring is great to have when you’re on vacation. If you’ve got two or three IP cameras installed at your home, and decide to take a trip somewhere, you can still monitor your property and receive email notifications if your cameras detect motion or tampering. Essentially, remote video surveillance makes it so you don’t have to be at the exact location of your security cameras to keep a watchful eye on your property. In addition, remote monitoring works wonderfully with pet cams, nanny cams, and pool cams. You’re not limited to what you can view. Surveillance on the go has never been easier.

Features:
View Live StreamReal-time video display is a primary selling point for remote and mobile monitoring. Having direct access to your live camera feed gives you the power to monitor your property without actually being there.
View NVR Live StreamSome NVR manufacturers offer remote web interfaces and video surveillance apps that provide remote access to your IP camera system. These Internet-based platforms give you instant access to live camera displays and recorded video footage that work on PCs, and some smartphones. You simply log on to the NVR’s web interface or app to facilitate real-time monitoring.
View Recorded Video from your camera/NVRAnother benefit of remote monitoring and mobile surveillance is with some mobile apps and NVR web interfaces, you can view recorded video. This is especially helpful when you’re on vacation; you can review recorded video and decide if it’s relevant or not, or notify law enforcement if you come across something suspicious that was captured on video.
Images are sent to your phone, on motion or scheduleYou can configure your IP camera so that images are sent directly to your email account or smartphone via message MMS if motion, tampering, or vandalism is detected. Images can also be sent on a schedule to keep you abreast of what your video monitors.
Send images to email accountWith video management software, you can configure your security cameras to send email alerts to your smartphone, iphone or email account for evidentiary purposes and as a way to archive footage deemed important.
Administer VS System remotelyYou can do a lot more with mobile and remote monitoring than just viewing live video. A number of IP camera and NVR brands offer web interfaces and cloud services that can be accessed from remote locations. These online platforms allow you to control the settings and configure your IP camera system like you would onsite.

How Do You View Your Video Surveillance Cameras Remotely?
In order to monitor your video surveillance cameras from a remote device like a PC or smartphone, you will typically need to set up DDNS and port forwarding.
DDNSWith video management software, you can configure your security cameras to send email alerts to your smartphone, iphone or email account for evidentiary purposes and as a way to archive footage deemed important.
Port-ForwardingWhen you purchase your IP camera system, you’re at first limited to viewing your cameras locally, meaning you can only access them in a local area network. To view your cameras remotely, you must configure port-forwarding. Port-forwarding sends network ports used by your IP camera(s) onto the World Wide Web so that you can monitor your cameras remotely. Network ports are typically forwarded through your network’s router, which tech support specialist at VideoSurveillance.com can help you with. Port-forwarding can only be set up by obtaining the IP address of your router that connects to your video surveillance cameras. It should be noted your IP cameras and NVRs are still secure when accessed via the Internet because of password protection.
Special Plug-and-Play SolutionsSome NVR manufacturers such as Smartvue offer online cloud services that allow you to access your video surveillance system from a remote location by simply logging into your cloud account. Once logged in, you can view your live video feed, manage settings, and search recorded video as needed.

Benefits Of Remote Surveillance Monitoring

24/7 Protection

One of the more popular benefits of a modern surveillance system is the ability to monitor footage remotely with a mobile app. There's a wide array of apps that allow a user to log into your system from anywhere with just a touch of your smart phone. Upon logging in, you will have the ability to view live and recorded video, control PTZ settings, search through past footage and manage alerts. To set up the app properly, you'll need to work closely with a security company and have an internet data plan as well as an IP address.
The best aspect of this feature is that you don’t have to be on location to view and manage your security cameras, thus offering you and/or your security staff the ability to monitor and respond to issues whenever they may occur, even after hours or while you are on vacation. The added peace of mind that comes with remote monitoring can be the greatest benefit of all.

Monitor Multiple Feeds Across Multiple Locations

Also, you don’t have to be limited to monitoring only one security camera remotely. If your building requires multiple cameras in seperate locations, you're in luck as you can monitor multiple camera feeds from across multiple locations. This is a popular feature for property managers who need to monitor multiple buildings.
This is incredibly useful when combined with a motion alert camera system-- you can be alerted if any of your cameras detect motion while your business is closed. In addition, you will get an email and/or text alert notifying you that one of your cameras detected motion.

Less False Alarms

The overriding advantage associated with a remote monitored system is the fact that it provides visual confirmation to an operator regarding the cause of anyone specific activation. In turn, this lessens the likelihood of false alarms and allows the operator to orchestrate the fastest possible and most appropriate action.
When an alarm is triggered, the process begins and the images are transmitted to a central control room where the operator consults site plans to determine whether to issue audio warnings or alert the relevant emergency services. Audio warnings have been proven to act as a successful deterrent for a majority of cases, in terms of contacting the emergency services, the visual confirmation provided by the operator allows them to give the activation a priority response and increases the likelihood of the culprit of any trespass or theft committed on the property in question.

Monitored Alarm System Provides Peace Of Mind

Remote access can also assist business owners in detecting threats  such as fires, high carbon dioxide levels or intrusion that could otherwise be detrimental to their employees and valuable assets.

Business owners can use remote access with their monitored alarm system to:


·        Schedule notifications in case of an emergency.
·        Arm or disarm security systems remotely.
·        Lock or unlock doors remotely

Controlling these security features with remote access creates peace of mind for business owners who can stay connected with their business, even when they are away.

Conclusion
What makes remote video surveillance and mobile monitoring so favorable is that they both fit within your busy schedule. Remote monitoring and mobile surveillance give you on-the-go, real-time access to your live camera view so you can check up on your property anytime, day or night. The remote solutions made available by IP camera, NVR manufacturers, and even third-party mobile app developers are manifold; it is up to you to decide which one best aligns with your day-to-day routine.

Sunday, March 4, 2018

Aadhaar based Bio-metric Attendance System

Biometrics Market – India Aadhaar based Bio-metric Attendance System

Biometrics Market size is estimated to surpass USD 50 billion by 2024; according to a new research report by Global Market Insights, Inc. High acceptance among various verticals including mobile banking and financial services owing to rising security concerns has enhanced biometrics market size. Government initiatives for biometrics implementation coupled with high deployment for criminal identification will remain the key factors driving industry demand.
India’s Home Ministry will ask for regulations or an amendment to the recently passed UIDAI Act to mandate that the Unique Identification Authority of India (UIDAI) share biometric data with the Registrar General of India (RGI).

Sharing the data will ensure that RGI need not collect 18.5 million biometric identifiers for the National Population Register (NPR) which have already been collected for the Aadhaar scheme.
While the NPR is used for the determine residency and establish the citizenship of each individual, Aadhaar is the civil ID program used by the Indian government to provide social services. To date, Aadhaar has issued over one billion Aadhaar numbers, with a goal of ultimately enrolling 1.28 billion people.
Unnamed sources in the Home Ministry note that by using Aadhaar data, the RGI would not need to replicate biometric enrolment efforts or incur additional costs.
“RGI faces the prospect of taking biometrics of 70 crore people again for preparing NPR,” a top government official told the Economic Times. “Any such exercise will be a huge financial burden.”

Biometrics is an automated system of recognizing a person based on the person's physical or behavioral characteristics. It is the same system that the human brain uses to recognize and distinguish one person from another. It is a system that recognizes a person based on "who" the person is and does not rely on "what a person is carrying" or "what a person knows." Things that a person can carry, such as keys and ID-badges, can be lost, stolen, or duplicated. Things that a person knows, such as passwords and pin-numbers, can be forgotten, stolen, or duplicated. Instead, biometrics relies on "who" a person is and is based on a unique immutable human characteristic that cannot be lost, forgotten, stolen or duplicated. For these reasons, biometrics provides a much stronger level of security, while maintaining convenience and ease for users of biometrics.

Aadhaar Enabled Biometric Attendance System is used to mark attendance using the Aadhaar Card number linked with Aadhaar server. Aadhaar based attendance machines can be used for student’s attendance.
Options of Bio-metric Attendance Machines that can be used to mark attendance.
1.      Wifi 3G tablet based Aadhaar enabled Biometric machine
2.      Wifi 3G tablet with LAN based Aadhaar enabled Biometric system
3.      Iris Based Aadhaar enabled Biometric machine
4.      Wifi 4G tablet based Aadhaar enabled Biometric machine
5.      Fingerprint Scanner for Desktop Computer

Traditional panel-based access control systems use a central control panel or controller, card reader and controller at every door, card reader at every door controller in one place, which requires a significant investment in costly equipment and wiring, and makes the systems difficult to scale.

IP-based access control solutions leverage the network, eliminating the need for costly central panels, and offering shorter wiring and cabling runs than traditional panel-based access control systems.

11% in Hospitals/ Schools/ Universities:
We have absolutely seen an increase in biometric access control interest from hospitals, schools (day-cares), and universities. The uses range from just securing filing closets, accounting servers, and office to providing easy access to certain areas for certain employees, or parents. Physicians and technicians are given access to laboratories but restricted from hospitals filing areas. With door access devices students are not able to gain access to faculty areas without a proper card, pin code, or administered fingerprint.

Advantages of Aadhaar based Bio-metric Attendance System
Here are some compelling reasons that will force you to consider installing an Aadhaar enabled Biometric Identification System if you haven’t already done so.

It’s literally fail proof
Since the system combines the twin approval from the Aadhaar database as well as the organization’s database, chances of misuse are next to zero. Even if one system fails a second one is in place to ensure verity.

It reduces administrative costs
Modern biometric systems comprise of hardware and software that are pretty simple to install and set up. This reduces the need for intense training and thus management is also quite simple and easy. The documentation is not very intense leading to saving time and as a result costs. Plus it saves you on many costs like issue of new cards, replace lost/damaged card etc.

Clear accountability
Creating a Biometric Access System creates a clear trail of movement and accountability with lower chances of misuse. Give a friend your access card to swipe you in? – Easy. Ask him to put your thumbprint or retinal scan on a Biometric Reader? – Impossible. Apart any event can be easily traced back to the persons involved.

Better Return on Investment
With the enhanced security, better accountability and lower opportunities for fraud that a Biometric System provides the ROI on investment is much higher than traditional systems.

Integrated System
Modern systems can help you seamlessly integrate and manage time attendance, access control, surveillance and visitor management through a single window with instant alerts and actionable information delivered through multiple devices. They provide centralized control in the hands of the security administrator. With a Biometric Identification System, this becomes even more effective.

In a nutshell biometric time attendance solution permits you to focus on your core business by giving quickest and easiest way to overcome your time tracking issues.

Conclusion:
If security of your physical and intellectual assets is on top of your mind, you cannot ignore an Aadhaar based Biometric Identification Systems that are really effective, versatile and cost effective. Combine this with an advanced integrated security platform that will improve control, reduce management costs and provide a better user experience.

Note:
Central Government employees meanwhile have expressed their objection to linking the daily attendance timecard with Aadhaar. Mr. Duraipandi, the General Secretary of the Employees’ Sammelan, said, “We have no objection to implementing a biometric attendance system. But, linking the Aadhaar card information with the attendance record is unnecessary and in violation of personal rights. Adding my personal information to my office attendance violates my right to privacy.

The honorable Supreme Court, in its judgement, has clearly specified that Aadhaar details should not be used for personal reasons.”

The Ministry of Home Affairs (MHA) going to announce in the 15th Finance Commission about its budgetary requirement of more than Rs 3.5 lakh crore for internal security and other responsibilities between 2020-25. The budgetary requirement is meant for internal security, Central Armed Police Forces, police modernisation, border security, disaster management and Union Territories.



মুখ্যমন্ত্রীর কড়া নির্দেশ, সময়ে অফিস আসতে হবে সরকারি কর্মীদের। এই বার্তা আগেই দিয়েছিলেন উত্তরপ্রদেশের (ভারত) মুখ্যমন্ত্রী যোগী আদিত্যনাথ। এবার সেই নির্দেশ কার্যকর করতে তৎপর হল তাঁর প্রশাসন। সরকারি নির্দেশমতো ব্লক লেভেল পর্যন্ত সব সরকারি দপ্তরে বায়োমেট্রিক অ্যাটেনডেন্স সিস্টেম চালু করা হবে।
রুরাল ডেভেলপমেন্ট বিভাগের আধিকারিকদের সঙ্গে বৈঠক হতে চলেছে মুখ্যমন্ত্রীর। সেখানেই এই সিদ্ধান্ত নেওয়া হবে। সরকারি বার্তায় মুখ্যমন্ত্রী জানাবেন, ব্লক লেভেল থেকে প্রত্যেক সরকারি দপ্তরে বায়োমেট্রিক সিস্টেমের ব্যবহার শুরু হবে। এছাড়াও প্রত্যেক গ্রাম পঞ্চায়েতে একটি বোর্ড তৈরি হবে। প্রধানের ডিটেলস গ্রামে কী কী কাজ চলছে তার সব তথ্য রাখবে ওই বোর্ড। আধার-বেসড পেমেন্ট সিস্টেমের উপর জোর দিচ্ছেন উত্তরপ্রদেশের সরকার (ভারত)

কলকাতা সরকারি কর্মচারীদেরআসি, যাই বেতন পাইকর্ম সংস্কৃতি বন্ধের উদ্দেশ্যে আরও কড়া হতে চলেছে রাজ্য সরকার নিজের ইচ্ছেমত সরকারী কর্মচারীদের আসা-যাওয়া বন্ধ করতে সমস্ত সরকারি অফিসগুলিতে কর্মীদের বায়োমেট্রিক হাজিরার ব্যবস্থা করেছে রাজ্য এবার থেকে পাকাপাকিভাবে বন্ধ হতে চলেছে খাতায় সই করে হাজিরা দেওয়ার প্রথা
নবান্ন সূত্রে জানানো হয়েছে, সরকারি কর্মীদের হাজিরা নিয়ে আরও কড়া হতে চলেছে রাজ্য সরকার এবার থেকে কর্মীদের উপস্থিতির প্রমাণ হিসেবে বায়োমেট্রিক অ্যাটেনডেন্সকেই চুড়ান্ত মান্যতা দেওয়া হবে অফিসে ঢুকতে দেরি হলে কাটা যাবে ছুটি বায়োমেট্রিক অ্যাটেনডেন্স অনুযায়ী তিনটি লেট হলে একটি ক্যাজুয়াল লিভ কেটে নেওয়ার নিয়ম আবারও জারি করছে পশ্চিমবঙ্গ সরকার (ভারত)

নকশালবাড়ি ( ভারত, পশ্চিমবঙ্গ, উত্তরবঙ্গ ) ব্লকের মণিরাম, নকশালবাড়ি, হাতিঘিসা, আপার বাগডোগরা, লোয়ার বাগডোগরা এবং গোঁসাইপুর গ্রাম পঞ্চায়েত দপ্তরে সিসিটিভি ক্যামেরা এবং বায়োমেট্রিক অ্যাটেনডেন্স ডিভাইস বসছে। ইতিমধ্যে টেন্ডার প্রক্রিয়া শেষ হবার পর এগুলো বসানোর কাজ শুরু হয়েছে। নকশালবাড়ি পঞ্চায়েত সমিতির সভাপতি সরোজ কিরণ টোপ্পো প্রসঙ্গে জানান, নকশালবাড়ি পঞ্চায়েত সমিতির নিজস্ব তহবিল থেকে ব্লকের ৬টি গ্রাম পঞ্চায়েত দপ্তরে সিসিটিভি ক্যামেরা এবং বায়োমেট্রিক অ্যাটেনডেন্স ডিভাইস বসানো হচ্ছে।

২০১৮ সালের ৩১ জানুয়ারি থেকে ভারতীয় রেল সমস্ত স্তরের কর্মীদের জন্য চালু হয়েছে আধার নির্ভর বায়োমেট্রিক অ্যাটেনডেন্স। এক রেল কর্তা জানিয়েছেন, শুধু দেরিতে আসা নয়, অনুপস্থিত কর্মীদের তথ্যও এতদিন ঠিক ভাবে পাওয়া যেত না। সে সব নিশ্চিত করতেই এই কড়াকড়ি ব্যবস্থা।  বায়োমেট্রিক যন্ত্রের উপরে যাতে কোনও কারিকুরি না করা হয় সেটা নিশ্চিত করতে সিসিটিভি ক্যামেরা বসানোরও নির্দেশ দিয়েছে ভারতীয় রেল।

গোপালগঞ্জের কোটালীপাড়া উপজেলায় (বাংলাদেশ - ঢাকা) সরকারি প্রাথমিক বিদ্যালয়গুলোতে ১৮৭টি বিদ্যালয়ে বায়োমেট্রিক অ্যাটেনডেন্স বিতরণ করেন। এই বায়োমেট্রিক অ্যাটেনডেন্স ব্যবহারের মাধ্যমে শিক্ষক- শিক্ষার্থীদের উপস্থিতি অনলাইনে শিক্ষা প্রতিষ্ঠানের নিয়ন্ত্রণকারী সকল কর্তৃপক্ষ দূর-তদারকি করতে পারবে। আর পদ্ধতি ব্যবহারে একটি বিদ্যালয়ের বছরে ৫৫০০ হাজার ঘণ্টা সাশ্রয় হবে। যে সময়টা শিক্ষকগণ শ্রেণী কক্ষে পাঠদানের কাজে লাগাতে পারবে। উপজেলা নির্বাহী অফিসার জিলাল হোসেন বলেন, এই পদ্ধতি ব্যবহারে ডিজিটাল বাংলাদেশ নির্মাণে নতুন প্রজন্মকে নতুন প্রযুক্তির সাথে পরিচিত করার মধ্য দিয়ে শিক্ষার্থীদের আরো বিজ্ঞান মনস্ক, আধুনিক বিজ্ঞান প্রযুক্তিতে অভিজ্ঞ এবং দক্ষ করে গড়ে তোলা যাবে।

বাংলাদেশে রোগীরা বঞ্চিত হচ্ছেন চিকিৎসাসেবা থেকে। কারণ সরকারি হাসপাতালগুলোতে ডাক্তাররা উপস্থিত থাকেন না বা কম সময় দেন। এতে শুধু স্বাস্থ্যমন্ত্রী নয়, গত ডিসেম্বরে (২০১৭) কর্মস্থলে অনুপস্থিত ডাক্তারদের চাকরিচ্যুত করার হুঁশিয়ারি দিয়ে ক্ষোভ প্রকাশ করেছেন প্রধানমন্ত্রী। ২০১২ সাল থেকে শুরু হয়েছে সরকারি হাসপাতালগুলোতে বায়োমেট্রিক পদ্ধতিতে ডাক্তারসহ সকল কর্মকর্তা কর্মচারীর উপস্থিতি নিশ্চিত করণ কার্যক্রম।এ প্রেক্ষিতে দেশের মোট ৪৭৯ টি স্বাস্থ্য কমপ্লেক্সে বসানো হয় বায়োমেট্রিক অ্যাটেনডেন্স মেশিন। যার মাধ্যমে প্রতিদিন পর্যবেক্ষণ করা হচ্ছে ওই হাসপাতালগুলোতে সংশ্লিষ্টদের উপস্থিতির হার। আর দায়িত্ব পালন করছে স্বাস্থ্য অধিদপ্তরের ম্যানেজমেন্ট ইনফরমেশন সিস্টেম (এমআইএস) বিভাগ। এমআইএস সূত্রে জানা গেছে, বরিশাল বিভাগের ৪০টি, চট্টগ্রাম বিভাগে ৯৫টি, ঢাকা বিভাগে ৯১টি, খুলনা বিভাগে ৬০টি, ময়মনসিংহ বিভাগে ৩৪টি, রাজশাহী বিভাগে ৬৫টি, রংপুর বিভাগে ৫৮টি এবং সিলেট বিভাগের ৩৬টি স্বাস্থ্য কমপ্লেক্সে এই বায়োমেট্রিক অ্যাটেনডেন্স মেশিন বসানো হয়েছে।

Sunday, February 18, 2018

Graded requirements under CCTV

Graded requirements under BS EN 62676 Standards for CCTV

This is a pure technical guide for installers, specifiers and manufacturers under BS EN 62676 Standards for CCTV (Form No. 218). The BS EN 62676 series of standards are the first standards for CCTV video surveillance that will be used to any significant extent in the UK and include the use of security grading. This guide is intended to assist installers of CCTV and other interested parties to understand how a choice of grade is to be made and then used to determine the design requirements of a CCTV system.

It is important to understand that the majority of requirements given by the BS EN 62676 series of standards are not grade dependent. This guide deals only with the minority of requirements that are grade dependent. Most of these are to be found in BS EN 62676-1-1 but there are a few in BS EN 62676-1-2 (the names of the standards can be found in 2.1).

The approach to grading given in the BS EN 62676 series of standards is intended to allow for flexibility to overcome problems that a system designer may face. It is not intended to be complicated but the flexibility can give the appearance of complexity. Having an understanding of the flexible possibilities will benefit system designers whether they choose to use them or not.

A summary of the key points about grading detailed in this document are:
• System designers should choose the simplest approach that will work.
• The recommended approach is to choose a grade of system and apply that single grade throughout the system.
• The grading will affect the protection level and restriction of access to the system.
• It is the functions of the CCTV system that are graded rather than each component.
• Grading of a system does not determine the quality of the images captured by the system. BS EN 62676-4 includes requirements and recommendations that will determine the quality of image recording.
• The chosen grade(s) should be recorded in the Operational Requirement or System Design Proposal.
• Where use of a single grade for all system functions is not practical the standard permits the grading to be divided up by function. 18 Functions are described in the standard.
• Additional flexibility can be obtained by documenting specific requirements in the Operational Requirements or System Design Proposal.


Note: For security practitioners with a knowledge of intruder alarms (as installed under the PD 6662 scheme) it is important to note that the way that grading is described in the CCTV standards is not the same and confusion may arise if the differences are not understood. Additionally for intruder systems the installer’s life is made easy by the existence of component standards. For example an installer seeking a Grade 3 passive infra-red detector simply looks for a device that a manufacturer states meets the requirements of the associated standard. This is not the case for CCTV. There are currently no standards for CCTV system components specifying differences between their requirements at each grade.

Scope

These guidelines are for use in conjunction with the BS EN 62676 series of standards for “Video Surveillance Systems for Use in Security Applications”. In particular they give guidance to the requirements in BS EN 62676-1-1 “System Requirements – General”.

Note: The BS EN 62676 series of standards uses the term Video Surveillance System (VSS) for systems commonly known in the UK as CCTV (Closed Circuit Television) systems. Although CCTV is no longer technically correct in all situations the terms may be used interchangeably.

It is not mandatory to use Security Grading when installing systems to meet the standard but the use of Grading can give benefit and simplify matters.

Grading of a system does not specifically determine the quality of the images captured by the system although implementation of a higher grade may coincidentally result in an improvement. The grading will affect the protection level and restriction of access to the system.

BS EN 62676-4 includes recommendations that will determine the quality of image recording.


Referenced Standards

The following referenced documents are indispensable for the application of this document.
BS EN 62676 series: Video surveillance systems for use in security applications
BS EN 62676-1-1      : Video System Requirements
BS EN 62676-1-2      : Video Transmission – General Video Transmission – Requirements
BS EN 62676-2-1      : Video Transmission Protocols – General Requirements
BS EN 62676-2-2      : Video Transmission Protocols – IP Interoperability implementation based on HTTP & REST Services.
BS EN 62676-2-3      : Video Transmission Protocols – IP Interoperability implementation based on web services
BS EN 62676-3         : Analog and Digital Video Interfaces
BS EN 62676-4         : Application guidelines

How to Use this Guide

This guide consists of three main sections.
Section 6 “Grade Selection” explains how the Security Grade can be applied to all or to parts of the installation.
Section 9 “Commentary on the Requirements” looks at each of the graded requirements in the standard in turn and gives advice and commentary.
Section 10 “Graded Requirements” summarises the requirements in a checklist style.


How does the customer benefit by the use of Grading

This guide is primarily aimed at those wishing to understand the technical issues associated with grading in terms of how the requirements differ by grade and also how to apply the graded requirements to the system. BSIA have a separate guide (Form 217) that is intended to help customers of CCTV systems understand the differences between an installation meeting the requirements of the BS EN 62676 series of standards and other systems (e.g. systems that pre-dated those standards). This includes an overview of the differences introduced by grading.

It is important that the customer realises that the choice of one grade over another will not affect the quality of images obtained by the system. The use of different grades will however affect the robustness and integrity of the system and its ability to continue to serve its purpose in the face of a criminal attack or likely fault conditions.

The factors that are affected by the grade choice are indicated by the function titles in section 6.3.1 and section 8.

As can be seen by the table in section 8, the majority of differences between system requirements are associated with the step from Grade 2 to Grade 3. 13 of the 18 functions have identical requirements in Grades 1 and 2 and 9 of the 18 are the same in Grades 3 and 4.

BS EN 62676-4 describes how the selection of security grades should be based on a risk assessment and the system should be designed to mitigate the assessed risks. As the graded requirements primarily affect the protection of the system itself then it is these aspects of a risk assessment that would determine the grade.

Therefore typically the grade will be the result of risks associated with threats and hazards such as:
• Vandalism or malicious attack on the CCTV system (without other criminal intent).
• Deliberate attack on the CCTV system (to assist with a crime).
• Environmental factors (e.g. flood damage to equipment, radio interference, lightning) and possible power outages.
A higher risk will be associated with increased likelihoods of events. These may be indicated by:
• How attractive the criminal target is (e.g. valuables / persons at risk of kidnap).
• Lack of other security measures.
• Location in a high crime area or close to easy escape routes.
• Lack of occupancy.
• Easy public access.
• High crime history.

A higher risk will also be associated with a high impact. Many things might cause a high impact, including:
• Potentially high losses.
• Disruption to site activities.

Some aspects of the graded functions do not directly relate to the threat but are a consequence of the risk assessment. An example is the need to preserve evidential data of good quality images. Although this is unlikely to prevent a crime it is more likely to be important when a criminal will go to greater lengths to protect their identity. This is associated with higher risks.

To keep in shot we can summarized of Grading

1.   System designers should choose the simplest approach that will work.
2.  The recommended approach is to choose a grade of system and apply that single grade throughout the system.
3.    The grading will affect the protection level and restriction of access to the system.
4.    It is the functions of the CCTV system that are graded rather than each component.
5.   Unlike the other functions, tamper protection and detection requirements may be applied with different grades in various locations because of the varying risk of tamper in those locations.
6.    Grading of a system does not determine the quality of the images captured by the system. BS EN 62676-4 includes requirements and recommendations that will determine the quality of image recording.
7.    CCTV security systems are installed to mitigate the risks associated with a number of threats
8.    If the mitigation by CCTV for a particular threat is not the primary mitigation then grading is optional for that threat but may apply for other threats. If CCTV is not the primary mitigation for any threat then grading is optional for the whole system.
9.     Grade 1 is the minimum grade that can be assigned.
10. If necessary, any of the 18 functions (listed in 6.3.1) can be graded separately but the grade for that function applies throughout the system.
11. It is recommended that if any of the 18 functions (with the exception of tamper protection and detection) are graded differently the overall system grade be that of the majority of the functional grades chosen. 

If a VSS is designed and configured in a way that single or multiple operators request video images via common interconnections, the design of the system shall ensure that the available capacity is sufficient for the anticipated operation of the VSS. This may be achieved by configuring the maximum throughput of image streams on the VSS.

The following table can be used as a checklist.
Key:
Op = Optional
M = Mandatory
R = Recommended
Clause number (e.g. 6.1.2.2) means a clause in 62676-1-1, if a standard number is also given then it is the clause in that standard.
Tm.n (e.g. T1.4) means the nth row in table m (e.g. 4th row of table 1).

Table & Row or Clause
Subject
Security Grade
G1
G2
G3
G4
FUNCTION: Common Interconnections
6.1.2.2
Common Interconnections
Op
Op
M
M
If a VSS is designed and configured in a way that single or multiple operators request video images via common interconnections, the design of the system shall ensure that the available capacity is sufficient for the anticipated operation of the VSS. This may be achieved by configuring the maximum throughput of image streams on the VSS.
FUNCTION: Storage
Table 1
Storage




T1.1
Data backup and/or redundant recording
Op
Op
M
M
T1.2
Operating a fail-safe storage (e.g. RAID 5, continuous mirror) or switching automatically over from one storage media to another in case of storage failure
Op
Op
Op
M
T1.3
Reacting to a trigger with a maximum latency time of
-
1 s
500ms
250ms
T1.4
Replaying an image from storage with a maximum time after the incident or actual recording of after the incident or actual recording of
-
-
2s
1s
FUNCTION: Archiving and backup
Table 2
Archiving and Backup




T2.1
Authentication of every single image and image sequence
Op
Op
Op
M
T2.2
An automatically scheduled backup of alarm image data
Op
Op
Op
M
T2.3
A backup of alarm image data by manual request
Op
Op
M
M
T2.4
Verify the successful image backup
Op
Op
M
M
FUNCTION: Alarm Related Information

6.2.2.3
The VSS system shall be able to display alarm related information. The information presented for each alarm message shall include: a) the origin or source of alarm; b) the type of alarm; c) the time and date of alarm.
Op
Op
M
M
FUNCTION: System Logs




Table 3
System Logs




T3.1
Alarms
Op
M
M
M
T3.2
Tampers
Op
Op
M
M
T3.3
Video loss and recovery from video loss
Op
Op
M
M
T3.4
Power loss
Op
M
M
M
T3.5
Essential function failure and recovery from failure
Op
Op
M
M
T3.6
Fault messages displayed to the user
Op
Op
Op
M
T3.7
System reset, start, stop
Op
M
M
M
T3.8
Diagnostic actions (health check)
Op
Op
Op
M
T3.9
Export, print/ hardcopy incl. the image source identifier, time range
Op
M
M
M
T3.10
User log in and log out at workstation with time stamp, successful and denied logins (local/remote) including reason of denial (wrong password, unknown user, exceeded account
Op
M
M
M
T3.11
Changes in authorisation codes
Op
Op
M
M
T3.12
Control of functional cameras
Op
Op
Op
M
T3.13
Search for images and replay of images
Op
Op
M
M
T3.14
Manual changes of recording parameters
Op
Op
M
M
T3.15
Alarm acknowledge / restore
Op
Op
M
M
T3.16
System configuration change
Op
Op
M
M
T3.17
Date and time set and change with current time and new time
Op
Op
M
M
FUNCTION: Backup and Restore of System
6.3.2.1
Capable of backup and restore of all system data.
Op
M
M
M
FUNCTION: Repetitive Failure Notification




6.3.2.2.1
The system shall be able to detect repetitive failures from a component and shall be configurable to generate a single message which shall only be repeated each time a new user logs in or the system restarts.
Op
Op
M
M
FUNCTION: Image Handling Device PSU Monitoring
6.3.2.2.2
Failure of the primary and, if available alternative, power supplies to the system shall be monitored, with notification according to clause 6.3.2.2.1.
Op
Op
Op
M
6.3.2.2.2
In any case power supply failure shall always be indicated locally.
Op
Op
Op
M
6.3.2.2.2
The VSS shall attempt to resume normal operation after recovering from power loss. If the system is unable to resume after power has been restored, with the settings which existed before the power failure, this shall be logged and also indicated to an operator
Op
Op
Op
M
FUNCTION: Image Buffer Holding Time
6.3.2.2.2
Images shall not be held in a buffer for longer than 5 seconds without being written into the storage medium
Op
Op
M
M
FUNCTION: Essential Function Device Failure Notification Time
6.3.2.2.3
The VSS shall manage device failure by indicating any failure of the essential functions within 100 s of the failure.
Op
Op
M
M
FUNCTION: Monitoring of Interconnections
Table 4
Monitoring of interconnections




T4.1
Repeatedly verify the interconnection at regular intervals with a maximum of
-
-
30s
10s
T4.2
Try to re-establish a interconnection with following number of retries before notification
-
-
5
2
T4.3
Maximum time permitted before notification to an operator of an interconnection failure
-
-
180s
30s
62676-1-2 T7.1
Maximum permitted duration of device unavailability
-
-
180s
30s
FUNCTION: Tamper Detection
Table 5
Tamper Detection




T5.1
Video loss
Op
M
M
M
62676-1-2 T7.2
Maximum detection time for live signal loss
-
8s
4s
2s
T5.2
If an image capturing device with a fixed field of view no longer includes the entire specified field of view
Op
Op
M
M
T5.3
Deliberately obscuring or blinding of the imaging device range
Op
Op
M
M
T5.4
The substitution of any video data at image source, interconnection or handling
Op
Op
Op
M
T5.5
Significant reduction of the contrast of the image
Op
Op
Op
M
6.3.2.3.2
Image capturing devices shall be protected against tamper
Op
Op
M
M
FUNCTION: Authorisation Code Requirements
Table 7
Authorisation Code Requirements




T7.1
Minimum number of possible logical authorisation keys
-
10,000
100,000
1,000,000
T7.2
Minimum number of possible physical authorisation keys
-
3,000
15,000
50,000
FUNCTION: Time Synchronisation
6.3.2.5
Time settings of various components of a VSS system shall always be within +/- 10 seconds of UTC.
Op
Op
M
M
FUNCTION: Data Labelling
Table 11
Data Labelling




T11.1
Location (e.g. name of site)
Op
M
M
M
T11.2
Source (e.g. capturing device labelled by camera number)
Op
M
M
M
T11.3
Date and time
Op
M
M
M
T11.4
Date and time in UTC including offset for local time
Op
Op
Op
M
FUNCTION: Data Authentication
6.3.3.2
Provide a method (e.g. watermarking, checksums, fingerprinting) to authenticate image and meta data and their identity.
Op
Op


The authentication method shall be applied at the time the data is recorded and shall notify the user if any of the following has occurred:
•      Any of the images has been changed or altered;
•      One or more images have been removed from a sequence;
•      One or more images have been added to a sequence;
•      The data label has been changed or altered.
FUNCTION: Export / Copy Authentication
6.3.3.2
Provide a method by which the authenticity of copied and exported data is verified
Op
Op
M
M
FUNCTION: Data (manipulation) Protection
6.3.3.3
Provide a method (e.g. encryption) to prevent unauthorized persons viewing the images and other data without permission
Op
Op
Op
M
6.3.3.3
Provide a method to protect the confidentiality of copied and exported data
Op
Op
Op
M
62676-1-2 Clause 12.1
All data communication outside secured technical room areas shall be encrypted in the security grade 4. AES with 128 bit key for symmetric and RSA with 1024 bit key shall be provided. Native encryption shall not be accepted. The VTDs shall not store any form of passwords in clear text. All such passwords either in configuration files or a database shall be encrypted.
Op
Op
Op
M
A VTD according to this standard shall support transport level security for the security grade 4.
62676-1-2 Clause 12.2
A VTD compliant to this standard shall support in security grade 4 TLS 1.0 according to the IETF standard RFC 2246 and TLS 1.1 according to RFC 4346. Optionally the VTD may support TLS 1.2 according to RFC 5246.
Op
Op
Op
M
62676-1-2 Clause 8.3.4
Digest Access Authentication is recommended in security grade 3 and 4 systems, because of the higher security provided.
Op
Op
R
R
Note: VTD is an abbreviation for Video Transmission Device
Ref: BS EN 62676 series books.

Summary

Expecting an installer or integrator to analyse the specification of every product used to form a system is somewhat impractical but it is also difficult for a manufacturer to guarantee the suitability of a product with regard to graded requirements given the diverse possibilities for an installation.
Assessment by the manufacturer of the potential grading of their products (or at a minimum a statement about the best possible grade that could be achieved) and the presentation of this in a standard format, such as that shown above, will assist all parties in meeting the operational requirements of the CCTV system.