Upload
daniela-elms
View
219
Download
2
Tags:
Embed Size (px)
Citation preview
Manufactured by RSIalarm
Best of ShowISC West 2007
Intrusion Detection/PreventionInnovation
What is Videofied?
It is NOT surveillance.
Totally Wireless EVENT based intrusion Alarm and Video Verification system.
Cameras are on ONLY during an alarm event
Priority Police Response. Greater security and priority police response is valuable.
Efficient Tidy Installation.
No holes, no wires, no mess and no waiting.
Proven. We have the largest installed base of video-verification in the world with over 70,000 systems installed.
Videofied® Concept
• Priority Police Response • Higher Level of Security• Central Station can forward videos to Police
• Benefits security stakeholders: • Law Enforcement – efficiency• Residents – responsive law enforcement
• Additional Features• Video notifications • reduced false alarm issues
Priority DispatchEuropean case study
• 2000 pre-legislation Police response time 34 minutes
80 minutes
7 minutes
• 2001 post-legislationusing Guards to verifyalarm
• 2005Central Stations and videofied dispatch
How does Videofied work?
1. When the P-Cam detects an intruder it captures a 10 second video. The alarm and video are transmitted to the Central Station.
2. Verified alarms are treated as crimes-in-progress and get higher priority response.
How does it work?Revolutionary P-Cam
Motion Detector
Night Vision Digital Camera
Infrared Illuminators
Self-powered
No AC connection• 4 year battery life
Radio Transceiver• 2 way encrypted
How does it work?
Blind System:Alarm sent as Contact ID code
Videofied:10 second videowith Contact ID
Add Videofied to Existing Systems
Actual Video
Privacy remains the single most important factor in residential video.
No Alarm No VideoCamera remains off to conserve power.Camera is only activated during an alarm.
No Wires No PeekingWired cameras create doubts in residential
market; are they really off? P-Cam batteries last 4 years because they are usually off.
Privacy is Key
Privacy Protected
Armed:Alarm activates Camera to capture video
Unarmed:Camera remains OFF
VIA-Pro Complete Video Security System
- Panel- P-Cams- Accessories
VIA-VU (Videofied Upgrade)Upgrade Kit for Existing Systems
- Interface Module- P-Cams
Two Product Lines
ExistingSystem
Innovations:Reporting and Communications
• Multiple Innovations in Basic Technology• Controller is Native Internet Protocol (IP) communicator • Videofied features combinations of 6 methods of communication:
• Telephone PSTN Dial-Up (Contact ID)• Email• MMS/SMS• Voice Synthesized Reporting to telephone• Optional Internal Plug-In GPRS Cellular Transceiver • Optional Ethernet LAN/WAN - Intranet and Internet
Operation - How? – Intelligent Field Devices
• Intelligent / Power Smart Field Devices:
• Competitively priced TWO WAY supervised door contact features reed switch, magnet and connections for external devices
• Keypad is a TWO WAY alphanumeric communicator.It is a system control, programming tool and diagnostic tool
• Key Fob is a TWO WAY arming device, control and annunciator – feeds back alarm and arming status
• All devices only consume battery power according to the power management scheme and instructions or the need to initiate because of an input or event
GPRS Cell Option
Ideal for remote applications with no power or communications
Premises Wiring Diagram 6 Zones, 2 Keypads, 1 Key-Fob, 1 Siren-Strobe,
GPRS Communication
PIR-Camera (P-Cam)
Door – Window/ External Detector TX/RX
Siren -Strobe
Keypads –Key-FobsControl – Communicator
Premises Wiring Diagram 6 Zones, 2 Keypads, 1 Key-Fob, 1 Siren-Strobe,
GPRS Communication
NO Wires – Zero, Zip, Zilch, Nada
Premises Wiring Diagram 6 Zones, 2 Keypads, 1 Key-Fob, 1 Siren-Strobe,
GPRS Communication
NO Wires – Zero, Zip, Zilch, Nada
Military-Level RF
• S2VIEW Technology– Spread Spectrum
• 25 Channels
– Videofied– Interactive
• Bi-Directional transceivers on all devices
– Encrypted• 128 bit AES encryption
– Wireless
Click for more info
on RF
Central Station
• Simple for Central Station operator:– Alarm received by operator– Video launched with alarm– Highly efficient CS operation– Video can be sent to Police Dispatch
End Userbenefits
• On-site product demonstrations
• Cost Effective
• Priority Response
• Greater Security
• Minimal disruption during installation
For More Information:
• Visit www.nexlar.com
• Call 1888-563-9527
• Send an email to [email protected]
Transceiver Radio: 915 MHz
• Provides superior range at less power.
• Enables better transmission through difficult infrastructure, masonry walls, etc.
• Minimizes “dead spots” in installation.
• Miniature antenna enables small sized devices
Spread Spectrum
How Spread Spectrum WorksSpread Spectrum uses wide band, noise-like signals. Because Spread Spectrum signals are noise-like, they are hard to detect. Spread Spectrum signals are also hard to Intercept or demodulate. Further, Spread Spectrum signals are harder to jam (interfere with) than narrowband signals. These Low Probability of Intercept (LPI) and anti-jam (AJ) features are why the military has used Spread Spectrum for so many years. Spread signals are intentionally made to be much wider band than the information they are carrying to make them more noise-like.
Spread Spectrum
• Improved transmission/reception in difficult environments.
• Resistance to jamming.
• Deterrence to hacking and eavesdropping.
• Easy installation.
Bi-directional
• Every device is supervised by control panel every 8 minutes to validate communications and status.
• Enables capture of Serial #, manufacturing date, firmware and revision from each device by the panel with no manual input during installation.
• Facilitates installation with Roaming Keypad for range testing, validate detection, device locator.
• Enables AES encryption to secure communications and prevent hacking.
AES Encryption
Figure 2 shows an Advanced Encryption Standard (AES) encryption process under a 128-bit secret key. Eleven sets of round keys are generated from the secret key and fed to each round of the ciphering block. The round operation is a combination of four primitive functions: SubBytes (sixteen 8-bit S-Boxes), ShiftRows (byte boundary rotations), MixColumns (4-byte × 4-byte matrix operation), and AddRoundKeys (bit-wise XOR). In decryption, the inverse functions (InvSubBytes, InvShiftRows, and InvMixColumns, with AddRoundKey as its own inverse) are executed in reverse order. The key scheduler uses four S-Boxes and 4-byte constant values Rcon(i) (1 i 10). In decryption, these sets of keys are used in reverse order.
Return
AES Encryption
• Encryption Key between devices is changed every second.
• Eliminates eavesdropping.
• Eliminates hacking into the panel or devices.
• Eliminates crosstalk and interference from other RSIalarm systems/devices in close proximity and overlapping RF.
Return
Click Here