The widespread use of CCTV systems and the benefits of cellular connections | Security News

2021-12-14 11:51:48 By : Mr. Yep yang

Illustra Edge camera with onboard exacqVision recording software provides a complete IP solution

HID Signo access control reader

G4S deploys Everbridge control center to accelerate the digital transformation of physical security in Abu Dhabi Global Market Square

Leonardo brought the ELSAG fixed plate hunter LPR system to ensure the safety of the building and its surroundings

Delta provides anti-collision doors to enhance the safety of Los Angeles International Airport

Vanderbilt’s ACT365 integration helps protect the dock facilities in Danish cities

Provide frictionless cloud video storage as a service (VSaaS)

Realize true situational awareness in the operation center through computer vision and artificial intelligence

How will artificial intelligence and analytics change physical security, and what should we expect next?

Protect unmanned infrastructure at the edge of the network

14 successful cases on how video technology can improve urban life

The rise of ethical facial recognition

Companies large and small rely on their closed-circuit television systems to stop intruders and provide recorded evidence of security incidents. Over time, closed-circuit television has evolved to provide real-time intrusion detection and monitoring, and companies now want to be able to easily and securely access cameras and data at any time. For this, they need a networked closed-circuit television system. These modern installations can benefit from cellular connectivity, helping companies protect their sites, while also supporting CCTV to provide more functional enhancements.

According to Surfshark data, there are now more than 600,000 cameras in London, UK, and CCTV cameras are so widely used, and IHS Markit predicts that by the end of 2021, there will be more than 1 billion cameras in operation worldwide.

CCTV is usually the core of the company's on-site security arrangements

Closed-circuit television is usually the core of the company's on-site security arrangements. However, despite this, traditional settings cannot take full advantage of all the functions that physical security can provide.

Designated personnel must personally visit the site to access the CCTV video when it is recorded and only kept on site. When potential crimes must be reported and investigated, this can result in the loss of valuable time. More importantly, if the intruder still exists, it will put the first person on the scene at risk.

Nowadays, CCTV installations can take full advantage of connectivity. They can provide real-time feeds, and authorized users can safely access these feeds from anywhere. This extends the security credentials of the CCTV system, not just records. A detected intrusion can trigger an alarm and provide a real-time visualization of what is happening so that the required action can be taken.

Of course, to realize these CCTV functions, the system must be connected and the correct connection type must be used. The connection must be flexible in order to provide a continuous feed, even if the primary connection is lost, it is safe for authorized users, scalable, and cost-effective. Traditionally, connections have come from wired connections and WiFi, but now cellular connections provide an attractive alternative.  

There are many reasons. First, fixed line connections are not available in all locations. If there is no infrastructure, especially at remote sites, cables must be laid. That is expensive and takes time. For example, CCTV towers in the construction industry need CCTVs that can be quickly deployed in areas most likely to have no fixed line connections. Cellular connections can be quickly arranged so that the closed-circuit television system can be up and running in the shortest possible time.

For CCTV solution providers, relying on third-party infrastructure (such as fixed line networks) can also be a problem, because any policy changes will make integration difficult. Issues that may require changes by a third-party network administrator may take longer to resolve, and if the fixed line network fails, there is usually no backup.

The cellular connection provided by the solution provider provides end-to-end control of the connection

The cellular connection provided by the solution provider provides end-to-end control of the connection. In the event of a problem, the solution provider can quickly manage the solution.

In cases involving multiple sites, cellular connectivity can provide a single solution, simplifying the overall management of a fully installed CCTV system and reducing the total cost of ownership of the connection.

Through a single connection management platform, companies can supervise the entire security installation, view and manage data usage, and use information to assist decision-making as security requirements develop.

This brings us to the fourth benefit-the ability to scale easily. This may be because a certain site requires additional cameras, or needs to meet additional site requirements. It may even be because the CCTV installation is being enhanced to support other features.

For whatever reason, being able to quickly deploy connections to a range of locations is critical for existing and new installations. Ideally, the connection should be possible within a few days, and the end user should be able to simply plug and play and get their camera online safely.

Resilience is the next factor to consider. The pre-configured router or the embedded SIM card in the camera can reconnect to the easiest alternative cellular network when the network is interrupted. In this way, cellular connections can form part of business continuity options. In some cases, it can work with fixed line connections as part of a robust installation, with built-in mitigation measures if the main connection fails.

4G and now 5G also allow easy access and remote monitoring of CCTV applications

4G and now 5G also allow easy access and remote monitoring of CCTV applications. It can be deployed quickly, supports an "always-on" method, and can transmit large amounts of data and images. Authorized users can view real-time video sources on any device, and they can also receive alerts and notifications directly to their mobile phones.

The high speed, high bandwidth, and low latency of 5G connections also provide opportunities to enhance CCTV system functions, such as real-time feed analysis. This is ideal because it can help companies establish primary security functions, such as occupancy monitoring. Over the past 18 months or more, this has been outstanding, as companies have had to pay more attention to the occupancy rate of their buildings than ever before.

At the same time, retailers have built on the real-time basis of closed-circuit television technology to monitor the number of customers in the store based on social distancing guidelines. In crime detection and traffic enforcement, another CCTV application can be found through Automatic License Plate Recognition (ANPR). Combined with software, feeds from CCTV cameras are used to help find and track vehicles for law enforcement or traffic monitoring.

For most closed-circuit television applications, the speed and features that 4G brings are more than enough. However, 5G is likely to promote new applications and methods to expand CCTV capabilities for the benefit of enterprises.

Once a single application is installed, CCTV use can only provide live recording capabilities. Now, closed-circuit television systems can support remote monitoring and higher-quality visual effects. They can send alerts and back up by accessing real-time video sources so that authorized users can assess the situation and act quickly. These additional features support enhanced use cases for CCTV.

The data generated by the closed-circuit television system is very valuable to the enterprise. Companies that capture and analyze data can take full advantage of its potential. Cellular connections provide a flexible and scalable way to connect single or multiple sites. Through the connection management platform, companies can integrate CCTV connections and manage connections across networks and deployments.

Aiphone's secure communication solution-configurable IP video intercom

Dahua provides surveillance cameras, NVR and Ethernet switches to enhance the safety of pet corners

Access control: 5 minutes with Mike Maxsenti of Genea

Sadly, active shooter events have become so common that they no longer make headlines or dominate the news cycle. In the context of our collective consciousness, a series of nearly constant active shooting events continue to exist. This is a familiar drum sound, and its tragic nature also continues. As more active shooter incidents occur, the security market continues to implement solutions to minimize the impact, including gunshot detection. We asked at this week’s expert panel roundtable: What is the role of gunshot detectors in today’s security ecosystem? 

For security professionals who believe that analog systems have become a thing of the past, a new approach from Mythic Inc. shows that everything old will be completely new. The Mythic M1076 analog matrix processor uses the old technology in a new way, using the previous generation of analog computer chips to push the new level of artificial intelligence (AI) performance with lower power requirements. Low-power and high-speed Mythic provides energy-efficient AI at the edge, including internal cameras. The design combines embedded flash memory with analog computing capabilities to achieve faster AI processing, supports up to 25 trillion operations per second (TOPS), and extremely low power consumption levels are conducive to edge devices. The scalable single-chip analog memory computing architecture provides high-performance inference without consuming the power and energy required by digital solutions to move data at high speeds between independent processing and storage components. The single-chip design has low-latency, high-resolution video analysis, comparable to GPUs, and is provided by AI, but power consumption is reduced by 10 times in scale and cost," said Tim Vehling, senior vice president of product and business development at Mythic. Mythic chips are made for cameras The vendor has solved a number of design challenges. The single-chip design without DRAM (Dynamic Random Access Memory) caters to the limited space requirements. The high-resolution video analysis with low latency is comparable to the graphics processing unit (GPU). AI provides, but the power consumption is 10 times lower than a typical system-on-chip (SoC) or GPU. The typical 3-4 watts of power consumption is consistent with the limited power budget of Power over Ethernet (PoE). Passive cooling does not require active thermal management. Simulation Chip application For video applications, the chip provides faster speed to accommodate more cameras, higher resolution and more image details. In addition to providing scalability, the chip also supports a variety of host platforms, including X86, NVIDIA Jetson Xavier NX/TX2, Qualcomm RB5 and NXP i.MX8M. It supports Linux Ubuntu 18.04 and Linux for Tegra (NVIDIA) operating systems. These chips can be plugged into NVIDIA or Qualcomm platforms to enhance the artificial intelligence capabilities of various applications The chip can also be used for other deployments, including drones, where Mythic cooperates with the Qualcomm RBS platform to provide thousands of dollars in drones for larger applications. The chip can be integrated into the device to enhance the functionality of the CPU without the need Replace it or completely redesign the product. The chip handles image sensing, multi-camera, radar and lidar sensors, as well as flight navigation, control and communication, in addition-flight analysis. Vehling said that in NVR, Mythic chips are at a very low cost Provides advanced processing. It is easy to integrate the technology into cameras and other products-just insert the M.2 expansion slot, and then download the software to drive the AI ​​algorithm. The chip can enhance the function of the CPU without having to replace it or completely rebuild Designing a product can actually improve performance immediately. There is no shortage because Mythic uses older technology, so it is not lacking compared with some later generation chips. 40-nanometer chips are mature technology made in Japan, and newer processors are more Small, only 5 or 7 nanometers. Newer chips are more likely to be in short supply. The Mythic M1076 chip is currently under evaluation but has not yet been put into production. The company expects to ship the product in the second half of 2022 and sell it to camera manufacturers Manufacturers and other original equipment manufacturers to integrate into their products. Increase the value of the camera's internal For security end users, Mythic's AI chip will be better in terms of performance, smaller size and lower power consumption Add new value to video cameras and other equipment. For integrators, the technology Device options will be expanded, such as providing advanced analysis in the camera, while only requiring 2 to 3 watts of power, consistent with the use of PoE.

In the field of access control, face recognition has made considerable progress. Face recognition technology used to be considered too slow to verify personnel identities and credentials under high traffic conditions, but it has now developed into one of the fastest and most effective access control authentication solutions in all industries. Advances in artificial intelligence and advanced neural network (ANN) technology by industry leaders such as Intel have improved the accuracy and efficiency of face recognition. However, another reason for the attractiveness of this technology is the rapid growth in demand for contactless access control solutions that can help reduce the spread of diseases in public places. Massive effective face recognition eliminates security risks, and it is almost impossible to be forged. Modern face recognition technology meets all the standards that have become the preferred solution for barrier-free access control. It provides an accurate and non-intrusive way to verify the identity of high-traffic areas, including multi-tenant office buildings, industrial sites, and factories where multiple shifts per day are common. A typical electronic access control system relies on the person providing physical credentials, such as proximity cards, key chains, or Bluetooth-enabled mobile phones, all of which can be misplaced, lost, or stolen. Face recognition eliminates these security risks, and it is almost impossible to forge. Affordable biometric options Although there are other biometric tools available, face recognition has significant advantages. For example, some techniques use hand geometry or iris scanning, but these options are generally slower and more expensive. This makes facial recognition a natural application for daily access control activities, including recording the time and attendance of large numbers of laborers in construction sites, warehouses, and agricultural and mining operations. In addition to verifying personal credentials, face recognition can also identify whether an individual wears a facial mask in accordance with government or company health and safety agreements. In addition to protecting the physical location, face recognition can also be used to manage access to computers and special equipment and devices. Overcoming challenges with artificial intelligence So, when this technology has faced many challenges, including camera angles, certain types of facial expressions, and different lighting conditions, how has face recognition become so reliable? Thanks to the advent of so-called "convolutional" neural network algorithms, engineers have been able to overcome these obstacles. The SecurOS FaceX face recognition solution FaceX is powered by neural networks and machine learning, which allows it to authenticate various faces. The New Jersey Intelligent Security System (ISS) and the technology giant Intel have worked together to create SecurOS FaceX face Identify the solution. FaceX is powered by neural networks and machine learning, which enables it to verify a variety of faces and facial expressions, including those captured under changing light, different resolution levels, and different distances from the camera. Security video management systems Common face recognition system deployments start with IP video cameras, which connect the camera input to the security video management system of the video archive. When the software initially registers a person's face, it creates a "digital descriptor" that is stored as a digital code that is always associated with an identity. The system encrypts these digital codes and stores them in the SQL database. For convenience and cost saving, the video server CPU can perform all neural network processing without any special GPU card. Unique Digital Identifier The next step involves associating the face captured in the video recording with the unique digital descriptor in its file. The system can compare newly captured images with a large database of known persons or faces captured from a video stream. Face recognition technology can provide multi-factor authentication and search for a watch list of specific types of characteristics, such as age, hair color, gender, race, beard, glasses, headwear, and other identifying characteristics, including bald spots. The strong encryption SED compatible drive relies on a dedicated chip that uses AES-128 or AES-256 to encrypt data. To support privacy issues, the entire system has an encrypted and secure login process to prevent unauthorized access to databases and files. By using a self-encrypting drive (SED) that saves video recordings and metadata, an additional layer of encryption can be obtained. SED compatible drives rely on a dedicated chip that uses AES-128 or AES-256 (short for Advanced Encryption Standard) to encrypt data. Anti-spoofing protection measures How does the face recognition system deal with people who try to deceive the system by wearing a costume mask or holding up a photo to hide their face? For example, FaceX from ISS includes an anti-spoofing feature that mainly checks the "vitality" of a given face. The algorithm can easily mark the flat two-dimensional characteristics of the exit hood, printed photos or cell phone images, and send out a "spoofing" alarm. Increasing entry speed. Integrating facial recognition into existing access control systems is simple and cost-effective. Integrating facial recognition into existing access control systems is simple and cost-effective. The system can be operated using off-the-shelf security cameras and computers. Users can also use existing infrastructure to maintain architectural aesthetics. The face recognition system can complete the detection and recognition process in an instant, opening a door or revolving door in less than 500ms. This efficiency can eliminate the time associated with security personnel manually checking and managing credentials. Important tools. Modern face recognition solutions can be infinitely expanded to adapt to global enterprises. Therefore, face recognition as a credential is increasingly used in various applications, which go beyond traditional access control and physical security, including health and safety and labor management. All these features make face recognition a natural, frictionless solution for managing access control, both in terms of performance and cost.

LiDAR provides security and intelligence for casinos without worrying about privacy issues

What are the security challenges in the healthcare industry?

Meet Chris Bone, CTO of ASSA ABLOY Group

Protect unmanned infrastructure at the edge of the network

Use AEOS to achieve frictionless physical access control

14 successful cases on how video technology can improve urban life

Provide frictionless cloud video storage as a service (VSaaS)

4 smart ways to use security to power future business

Why is key management so important?

How does the new management system innovate the hotel industry?

Alcatraz AI Rock & C•CURE 9000

Wireless access solutions in the field of healthcare

SecurityInformed.com-Make the world safer Copyright © Notting Hill Media Limited 2000-2021, all rights reserved. Our other website: SourceSecurity.com | TheBigRedGuide.com | HVACInformed.com | Maritime Information Network

Understand how your organization has become safer and more efficient