Manufactured by RSIalarm Best of Show ISC West 2007 Intrusion Detection/Prevention Innovation.

Slides:



Advertisements
Similar presentations
Product Overview: Construction Sites
Advertisements

INTRUSION ALARM TECHNOLOGY
SCW9057 Key Features/Benefits
Welcome to the Radionet Monitoring Secure-Com Presentation.
CLOSED CIRCUIT TELEVISION (CCTV) SURVEILLANCE SYSTEMS
3G Monitor. 3G Camera Contents 3G camera Function Features 3G Camera's Application Scenes 3G camera's business mode 3G Camera Technical parameters.
HWg-Juno HW group is a manufacturer of IP-based sensors from Prague, Czech republic. HWg delivers remote monitoring & control solutions.
AIM Armstrong’s Intelligent Monitoring Training presentation.
Videofied Product/Service presented by Cooperative Response Center, Inc.
ZXM10 EISU Training.
POC Security System High security system combining PIN-on-Card, information security, physical access, control and alarm – all in one system.
A new Network Concept for transporting and storing digital video…………
1 RISCO Agility, PIR Cam & Cloud Combined Presentation.
1 Bosch Solution 16i Intrusion Control System. 2 STAU/SAL | March 2010 | © Robert Bosch GmbH reserves all rights even in the event of industrial property.
Do’s and Dont’s - How to Prevent Troubles iConnect / CommPact
Pyronix Ltd. Secure House Braithwell Way, Hellaby, Rotherham, S66 8QY, UK T F E
Digital video security systems 2 Multi-functional CCTV Management System The Most Complete Integrated Digital CCTV Management System.
Tel: Unique Home Security Systems Security Supplies Captures Boards Digital Video Recorders Power Line Communication Wireless Solutions.
Remote Monitoring and Management Solutions ®
PARTNERSHIP FOR PRIORITY VIDEO ALARM RESPONSE Steve Dye, Chief of Police Grand Prairie Police Department.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Three Police Technology Wireless Communications.
Wireless and going mobile Browsing via low energy photons.
Flexible Hybrid Solution
Sep 08, 2005CS477: Analog and Digital Communications1 Example Systems, Signals Analog and Digital Communications Autumn
Av-Gad Promo 2010 Av-Gad ATM & Bank Protection Av-Gad Promo 2010 SesMo is a combined seismic detector used to protect bank safes, media safes, strong.
IT-101 Section 001 Lecture #15 Introduction to Information Technology.
DUE Security and Fire Alarm Systems LEARNING OUTCOME 7B Describe design overview and location considerations.
JA-63KRG PROFI GSM Alarm JA-63KRG PROFI What? security & home automation & communicationWhere? residential & business & special applications.
1 INTRUSION ALARM TECHNOLOGY WIRELESS SYSTEMS. 2 INTRUSION ALARM TECHNOLOGY Wireless systems use radio frequencies (RF) to connect sensors to the control.
1 INTRUSION ALARM TECHNOLOGY LOCAL VS. MONITORING.
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
AVT2000D is a portable and compact in size magnetic installation vehicle tracking device which is easy in mounting and hiding to where there is the metal.
MOBILE PHONE ARCHITECTURE & TECHNOLOGY. HISTORY  The idea of the first cellular network was brainstormed in 1947  Disadvantages  All the analogue system.
Make your premises an Oasis of security Oasis_EN_1010_c1.
1 INTRUSION ALARM TECHNOLOGY KEYPADS (CONTROL UNITS)
EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.
Wireless Networking 102.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module E Network Basics.
Basic Data Communication
System Elements HighPoint Broadband Delivery System Sector 1 Sector 3
NV V5.7 Product Presentation. Brand New Professional GUI  Multiple User Interface for different look and feel  Audio indicator on camera (play audio.
Cryptography and Network Security
December 2013 – Alexandre TRIFFAULT Alarm system Inspired by Babak Javadi presentation.
Videofied Overview Presentation
SuperSleuth Wise. Marketing and Sales Presentation/Training.  Complete video surveillance system in the palm of your hand.  Proven video motion Detection.
Who is Inner Range? Inner Range is an Australian Electronic Security Manufacturing Company. Established in 1988 with a Major focus on the Australian Security.
Toda una gama de proyectos domóticos listos para instalar Home Automation proyects ready to install.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Paradox Communication Solution GPRS / GSM
MG6250 Magellan 2-Partition 64-Zone Wireless Console with GPRS/GSM
 Cryptography is the science of using mathematics to encrypt and decrypt data.  Cryptography enables you to store sensitive.
A O I $B. A O I $B Immediate Police alarm response while the incident is still in progress! TO CATCH THE BAD GUYS! The BEST deterrence is arrests! In.
Cellular Communication SNSCE - CS2402 Mobile Pervasive Computing.
Videofied / Overview Presentation
1 William Stallings Data and Computer Communications 7 th Edition Chapter 9 Spread Spectrum.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Networks and Communications.
Unit 4 Cellular Telephony
Wireless LAN Technology Chapter 13. Wireless LAN  Wireless LAN is one that make use of a wireless transmission medium.  Wireless LAN use infrared or.
 Abbreviation of fourth generation wireless technology  It will provide a comprehensive IP solution where voice, data and multimedia can be given to.
Flame & Smoke Detection System Flame & Smoke Vision Detection is an intelligent vision-based analytics system which can timely detect suspicious fire or.
Unit 1: Protecting the Facility (Virtual Machines)
Prototyping Home Automation Concepts
S4 Combo Secual Product Training March 2016.
Wireless Technologies
Spread Spectrum L.Tahani Aljehani.
AIM Armstrong’s Intelligent Monitoring Training presentation.
MG6250 Magellan 2-Partition 64-Zone Wireless Console with GPRS / GSM.
RF Solutions 433 MHz Range.
Security in Wide Area Networks
Presentation transcript:

Manufactured by RSIalarm Best of Show ISC West 2007 Intrusion Detection/Prevention Innovation

What is Videofied? It is NOT surveillance. Totally Wireless EVENT based intrusion Alarm and Video Verification system. Cameras are on ONLY during an alarm event Priority Police Response. Greater security and priority police response is valuable. Efficient Tidy Installation. No holes, no wires, no mess and no waiting. Proven. We have the largest installed base of video-verification in the world with over 70,000 systems installed.

Videofied ® Concept Priority Police Response Higher Level of Security Central Station can forward videos to Police Benefits security stakeholders: Law Enforcement – efficiency Residents – responsive law enforcement Additional Features Video notifications reduced false alarm issues

Priority Dispatch European case study 2000 pre-legislation Police response time 34 minutes 80 minutes 7 minutes 2001 post-legislation using Guards to verify alarm 2005 Central Stations and videofied dispatch

How does Videofied work? 1.When the P-Cam detects an intruder it captures a 10 second video. The alarm and video are transmitted to the Central Station. 2.Verified alarms are treated as crimes-in- progress and get higher priority response.

How does it work? Revolutionary P-Cam Motion Detector Night Vision Digital Camera Infrared Illuminators Self-powered No AC connection 4 year battery life Radio Transceiver 2 way encrypted

How does it work? Blind System: Alarm sent as Contact ID code Videofied: 10 second video with Contact ID

Add Videofied to Existing Systems

Actual Video

Privacy remains the single most important factor in residential video. No Alarm No Video Camera remains off to conserve power. Camera is only activated during an alarm. No Wires No Peeking Wired cameras create doubts in residential market; are they really off? P-Cam batteries last 4 years because they are usually off. Privacy is Key

Privacy Protected Armed: Alarm activates Camera to capture video Unarmed: Camera remains OFF

VIA-Pro Complete Video Security System -Panel -P-Cams -Accessories VIA-VU (Videofied Upgrade) Upgrade Kit for Existing Systems -Interface Module -P-Cams Two Product Lines Existing System

Innovations: Reporting and Communications Multiple Innovations in Basic Technology Controller is Native Internet Protocol (IP) communicator Videofied features combinations of 6 methods of communication: Telephone PSTN Dial-Up (Contact ID) MMS/SMS Voice Synthesized Reporting to telephone Optional Internal Plug-In GPRS Cellular Transceiver Optional Ethernet LAN/WAN - Intranet and Internet

Operation - How? – Intelligent Field Devices Intelligent / Power Smart Field Devices : Competitively priced TWO WAY supervised door contact features reed switch, magnet and connections for external devices Keypad is a TWO WAY alphanumeric communicator. It is a system control, programming tool and diagnostic tool Key Fob is a TWO WAY arming device, control and annunciator – feeds back alarm and arming status All devices only consume battery power according to the power management scheme and instructions or the need to initiate because of an input or event

GPRS Cell Option Ideal for remote applications with no power or communications

Premises Wiring Diagram 6 Zones, 2 Keypads, 1 Key-Fob, 1 Siren-Strobe, GPRS Communication PIR-Camera (P-Cam) Door – Window/ External Detector TX/RX Siren -Strobe Keypads –Key-Fobs Control – Communicator

Premises Wiring Diagram 6 Zones, 2 Keypads, 1 Key-Fob, 1 Siren-Strobe, GPRS Communication NO Wires – Zero, Zip, Zilch, Nada

Premises Wiring Diagram 6 Zones, 2 Keypads, 1 Key-Fob, 1 Siren-Strobe, GPRS Communication NO Wires – Zero, Zip, Zilch, Nada

Military-Level RF S 2 VIEW Technology –Spread Spectrum 25 Channels –Videofied –Interactive Bi-Directional transceivers on all devices –Encrypted 128 bit AES encryption –Wireless Click for more info on RF

Central Station Simple for Central Station operator: –Alarm received by operator –Video launched with alarm –Highly efficient CS operation –Video can be sent to Police Dispatch

End User benefits On-site product demonstrations Cost Effective Priority Response Greater Security Minimal disruption during installation

For More Information: Visit Call Send an to

Transceiver Radio: 915 MHz Provides superior range at less power. Enables better transmission through difficult infrastructure, masonry walls, etc. Minimizes dead spots in installation. Miniature antenna enables small sized devices

Spread Spectrum How Spread Spectrum Works Spread Spectrum uses wide band, noise-like signals. Because Spread Spectrum signals are noise-like, they are hard to detect. Spread Spectrum signals are also hard to Intercept or demodulate. Further, Spread Spectrum signals are harder to jam (interfere with) than narrowband signals. These Low Probability of Intercept (LPI) and anti-jam (AJ) features are why the military has used Spread Spectrum for so many years. Spread signals are intentionally made to be much wider band than the information they are carrying to make them more noise- like.

Spread Spectrum Improved transmission/reception in difficult environments. Resistance to jamming. Deterrence to hacking and eavesdropping. Easy installation.

Bi-directional Every device is supervised by control panel every 8 minutes to validate communications and status. Enables capture of Serial #, manufacturing date, firmware and revision from each device by the panel with no manual input during installation. Facilitates installation with Roaming Keypad for range testing, validate detection, device locator. Enables AES encryption to secure communications and prevent hacking.

AES Encryption Figure 2Figure 2 shows an Advanced Encryption Standard (AES) encryption process under a 128-bit secret key. Eleven sets of round keys are generated from the secret key and fed to each round of the ciphering block. The round operation is a combination of four primitive functions: SubBytes (sixteen 8-bit S-Boxes), ShiftRows (byte boundary rotations), MixColumns (4- byte × 4-byte matrix operation), and AddRoundKeys (bit-wise XOR). In decryption, the inverse functions (InvSubBytes, InvShiftRows, and InvMixColumns, with AddRoundKey as its own inverse) are executed in reverse order. The key scheduler uses four S- Boxes and 4-byte constant values Rcon(i) (1 i 10). In decryption, these sets of keys are used in reverse order.

Return AES Encryption Encryption Key between devices is changed every second. Eliminates eavesdropping. Eliminates hacking into the panel or devices. Eliminates crosstalk and interference from other RSIalarm systems/devices in close proximity and overlapping RF.

Return Click Here