Download presentation
Presentation is loading. Please wait.
Published byDaniela Elms Modified over 10 years ago
1
Manufactured by RSIalarm Best of Show ISC West 2007 Intrusion Detection/Prevention Innovation
2
What is Videofied? It is NOT surveillance. Totally Wireless EVENT based intrusion Alarm and Video Verification system. Cameras are on ONLY during an alarm event Priority Police Response. Greater security and priority police response is valuable. Efficient Tidy Installation. No holes, no wires, no mess and no waiting. Proven. We have the largest installed base of video-verification in the world with over 70,000 systems installed.
3
Videofied ® Concept Priority Police Response Higher Level of Security Central Station can forward videos to Police Benefits security stakeholders: Law Enforcement – efficiency Residents – responsive law enforcement Additional Features Video notifications reduced false alarm issues
4
Priority Dispatch European case study 2000 pre-legislation Police response time 34 minutes 80 minutes 7 minutes 2001 post-legislation using Guards to verify alarm 2005 Central Stations and videofied dispatch
5
How does Videofied work? 1.When the P-Cam detects an intruder it captures a 10 second video. The alarm and video are transmitted to the Central Station. 2.Verified alarms are treated as crimes-in- progress and get higher priority response.
6
How does it work? Revolutionary P-Cam Motion Detector Night Vision Digital Camera Infrared Illuminators Self-powered No AC connection 4 year battery life Radio Transceiver 2 way encrypted
7
How does it work? Blind System: Alarm sent as Contact ID code Videofied: 10 second video with Contact ID
8
Add Videofied to Existing Systems
9
Actual Video
10
Privacy remains the single most important factor in residential video. No Alarm No Video Camera remains off to conserve power. Camera is only activated during an alarm. No Wires No Peeking Wired cameras create doubts in residential market; are they really off? P-Cam batteries last 4 years because they are usually off. Privacy is Key
11
Privacy Protected Armed: Alarm activates Camera to capture video Unarmed: Camera remains OFF
12
VIA-Pro Complete Video Security System -Panel -P-Cams -Accessories VIA-VU (Videofied Upgrade) Upgrade Kit for Existing Systems -Interface Module -P-Cams Two Product Lines Existing System
13
Innovations: Reporting and Communications Multiple Innovations in Basic Technology Controller is Native Internet Protocol (IP) communicator Videofied features combinations of 6 methods of communication: Telephone PSTN Dial-Up (Contact ID) Email MMS/SMS Voice Synthesized Reporting to telephone Optional Internal Plug-In GPRS Cellular Transceiver Optional Ethernet LAN/WAN - Intranet and Internet
14
Operation - How? – Intelligent Field Devices Intelligent / Power Smart Field Devices : Competitively priced TWO WAY supervised door contact features reed switch, magnet and connections for external devices Keypad is a TWO WAY alphanumeric communicator. It is a system control, programming tool and diagnostic tool Key Fob is a TWO WAY arming device, control and annunciator – feeds back alarm and arming status All devices only consume battery power according to the power management scheme and instructions or the need to initiate because of an input or event
15
GPRS Cell Option Ideal for remote applications with no power or communications
16
Premises Wiring Diagram 6 Zones, 2 Keypads, 1 Key-Fob, 1 Siren-Strobe, GPRS Communication PIR-Camera (P-Cam) Door – Window/ External Detector TX/RX Siren -Strobe Keypads –Key-Fobs Control – Communicator
17
Premises Wiring Diagram 6 Zones, 2 Keypads, 1 Key-Fob, 1 Siren-Strobe, GPRS Communication NO Wires – Zero, Zip, Zilch, Nada
18
Premises Wiring Diagram 6 Zones, 2 Keypads, 1 Key-Fob, 1 Siren-Strobe, GPRS Communication NO Wires – Zero, Zip, Zilch, Nada
19
Military-Level RF S 2 VIEW Technology –Spread Spectrum 25 Channels –Videofied –Interactive Bi-Directional transceivers on all devices –Encrypted 128 bit AES encryption –Wireless Click for more info on RF
20
Central Station Simple for Central Station operator: –Alarm received by operator –Video launched with alarm –Highly efficient CS operation –Video can be sent to Police Dispatch
21
End User benefits On-site product demonstrations Cost Effective Priority Response Greater Security Minimal disruption during installation
22
For More Information: Visit www.nexlar.comwww.nexlar.com Call 1888-563-9527 Send an email to info@nexlar.cominfo@nexlar.com
24
Transceiver Radio: 915 MHz Provides superior range at less power. Enables better transmission through difficult infrastructure, masonry walls, etc. Minimizes dead spots in installation. Miniature antenna enables small sized devices
25
Spread Spectrum How Spread Spectrum Works Spread Spectrum uses wide band, noise-like signals. Because Spread Spectrum signals are noise-like, they are hard to detect. Spread Spectrum signals are also hard to Intercept or demodulate. Further, Spread Spectrum signals are harder to jam (interfere with) than narrowband signals. These Low Probability of Intercept (LPI) and anti-jam (AJ) features are why the military has used Spread Spectrum for so many years. Spread signals are intentionally made to be much wider band than the information they are carrying to make them more noise- like.
26
Spread Spectrum Improved transmission/reception in difficult environments. Resistance to jamming. Deterrence to hacking and eavesdropping. Easy installation.
27
Bi-directional Every device is supervised by control panel every 8 minutes to validate communications and status. Enables capture of Serial #, manufacturing date, firmware and revision from each device by the panel with no manual input during installation. Facilitates installation with Roaming Keypad for range testing, validate detection, device locator. Enables AES encryption to secure communications and prevent hacking.
28
AES Encryption Figure 2Figure 2 shows an Advanced Encryption Standard (AES) encryption process under a 128-bit secret key. Eleven sets of round keys are generated from the secret key and fed to each round of the ciphering block. The round operation is a combination of four primitive functions: SubBytes (sixteen 8-bit S-Boxes), ShiftRows (byte boundary rotations), MixColumns (4- byte × 4-byte matrix operation), and AddRoundKeys (bit-wise XOR). In decryption, the inverse functions (InvSubBytes, InvShiftRows, and InvMixColumns, with AddRoundKey as its own inverse) are executed in reverse order. The key scheduler uses four S- Boxes and 4-byte constant values Rcon(i) (1 i 10). In decryption, these sets of keys are used in reverse order.
29
Return AES Encryption Encryption Key between devices is changed every second. Eliminates eavesdropping. Eliminates hacking into the panel or devices. Eliminates crosstalk and interference from other RSIalarm systems/devices in close proximity and overlapping RF.
30
Return Click Here
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.