显示标签为“Business Security”的博文。显示所有博文
显示标签为“Business Security”的博文。显示所有博文

2008年12月22日星期一

Three Typical Monitoring Program

At present, there are three main control system of a typical program, the following were each on the strengths and weaknesses of the system.

If installed properly, the traditional security system still has a few advantages. For example, through traditional analog transmission system, CCTV image quality is very good. Moreover, there is no need after a video network, it will not be video-inch extension on the issue. However, such a system in the inferior performance of the in camera and digital video equipment management system between the coaxial cable will be laid to occupy the building expensive space. As the coaxial cable does not support IP-based applications, so. If you decide to use the full IP-based security systems, the current customer base on the need to replace coaxial cable. Analog cameras in the coaxial cable-based facilities on the basis not on the same day can not support the audio-inch transmission, and IP-based cameras to the goods. At the same time, support data, voice and video streaming signal of a variety of large graphical user interface (GUll for video surveillance, the use of hybrid systems from analog technology to the investment lP security system should be commended. Once the system is IP-based, The system will be able to use IP networks to provide all the features, including remote monitoring, however, hybrid systems, there are some disadvantages, which is mainly embodied in an excellent analog video into a video lP costs associated with these decisions at the cost of analog signal transmission line before the digital Coding, as well as the physical location of the encoding / decoding occurred in the number of times, and video quality may be adversely affected.

LP and the standardization of the network provides a good interoperability and compatibility on the network lP not prepared to reduce the long-term infrastructure costs. For the cameras and other equipment for Power over Ethernet (POE) can be installed to further reduce the cost of electricity because it is centrally managed, and reduce the need to install the signal due to the number of wires inside the camera in be coded for transmission lP, and do not need to Converted to analog signals, so saving the cost of equipment conversion. Although lP systems and networking security system has many notable advantages, but there are potential flaws. The big flaw is that the bandwidth out of consideration, lT staff present in the video do not want their products on the network. Dimension, which needs to teach lT managers to understand the different video compression technology division to help ease their doubts.

The Design of Hotel Video Surveillance System

The system is the use of video technology to detect and monitor the regional security and real-time display and record live images of the electronic system or network. This project at all entrances and exits, the Office of the elevator, the elevator car box set up at places such as surveillance cameras. Power to control use of bus lines, video line for one-on-one. The whole floor, a total of 62 cameras.

(1) security system can be configured for digital recorders and video cameras record data (24 hours a day, one month) in order to record all surveillance activities in the area, and again at any time frame possible. Video disk configuration will be used repeatedly, when the camera detection device to detect anomalies, the video disk recorded under unusual circumstances occurred in the previous section of the 15S will be maintained so that security personnel to track the whole process of the incident.

(2) Center for the host system-wide matrix system, all at the same time video camera. Use of hard disk video recorders. According to the security control room hosts need to achieve full-screen, four screen, the Kowloon-screen, the monitor's display screen includes cameras, address, hours, etc. According to the information needs of some of the security cameras in the control room, such as Yunnan control, focus adjustment, and so on.

(3) the system can switch timing. Switching time adjustable from 1 to 30 seconds, at the same time can manually select a camera to track and video.

(4) CTV with a fixed camera, shaking his head, pitching movement, zoom in and illumination application of the low environmental characteristics, and can be mounted on access to the best picture. Selection of cameras inside the elevator fixed, and other selected places with cloud desktop. Camera ~ 220V power supply, power supply provided by the security control room, equipped with its own camera transformation, rectification and emergency batteries.

(5) selection of video cables SYV - 75 - 5, choose Control Cable RVVP - 2X1. 0, optional power ZRBV - 2X2. 5, the laying of the cable trunking methods used to wear metal, galvanized steel pipe dark enough.

The Design of Hotel Monitoring Center

Monitoring Center, located in a hotel, combined with the fire control room, with an area of 30m2, in charge of the entire large embrace of security control. Security control room for all video cameras and alarm monitoring.

(1) center should be set to monitor the restricted area, should guarantee its own security and protective measures inside and outside the contact means of communication and should set up an emergency alarm and the alarm then left to a higher center of the police communications interface.

(2) monitoring center area with security system suited to the size, not less than 20 h, should be on duty to ensure the normal work of the corresponding ancillary facilities.

(3) Center for Monitoring the indoor surface should be anti-static, smooth, smooth, not dust. The width of the door should not be less than 0. 9m, height should not be less than 2. 1m.

(4) to monitor the temperature inside the center should be for 16 ~ 30 ° C, relative humidity should be 30% to 75%.

(5) control center should have good lighting.

(6) indoor cables, the Line of Control should be laid to set up slot when not to set up slot, the cable can be laid in the frame slot, the cable corridor, the wall plate trough, or the activities of the floor.

2008年12月21日星期日

Video Surveillance Knowledge

Video surveillance camera system is mainly composed of front-end parts, transmission parts, control, and records show that the majority of which consists of four. System so that managers at the control room can be observed in the region to prevent the front end to all activities and personnel records for the security of information systems to provide dynamic images.

With modern computer technology, multimedia technology, network technology and digital image compression technology and the rapid development of the birth of the DVR digital surveillance system is at the core of the multimedia computer monitor, to the management of the computer, not the people's subjective sense. At the same time, its own inherent properties for future development of a broad space, with the society as a whole digital, networks accelerate the pace of traditional analog control system is bound to be a new generation of digital, networked multimedia management control system To replace. As long as needed to be in place to monitor the installation of a certain number of cameras can be on duty at the control center to monitor real-time location of the district's staff activities, and to record preserved. For the investigation of the incident to provide first-hand information.

How to Select a GPS

As some domestic manufacturers to produce products of the GPS is not mature enough, there are always a weak signal, not positioning, not alarm, alarm or disorder with features of its on-board phone owners to easily dropped, and so much trouble. GPS technology experts remind consumers to buy GPS products should pay attention to the following areas.

The stability of the product.

First of all, to consider the option of anti-electromagnetic interference strong, stable performance GPS products. Vehicle hit bumps along the way, the high temperature, EMI, the car is rather poor environmental conditions will affect the operation of GPS, so the stability of the product would like to stress.

Select operator.

To consider the choice of powerful networks, the sustainable development of the operator to prevent the network coverage area is too small or as a result of the closure of the company and can not be reliable follow-up services.

Aesthetics of the product.

GPS products are installed hidden, but the high-end products, usually with on-board telephone (handle), to buy time to consider whether the handle of fashion, design aesthetic appearance, with the interior color guard, and whether the co-ordination and so on.

Tell-level module.

GPS module is divided into two levels, civil and industrial grades. Industrial-class performance and stability of the modules, some of the relatively expensive; civilian class module adaptation to the environment was not so satisfactory, but some of the relatively inexpensive price. Consumers should be considered cost-effective.

Security of energy delivery.

GPS's greater energy expenditure, should set up a dedicated GPS power to prevent ordinary power in the lower-frequency electrical environment of instability, so that the burn circuit fault occurs. Electricity cable car traffic, a common line to connect easily burned, the quality of the cable in order to better ensure the safety and reliable.

Capabilities.

At present, products are not cheap, GPS is a general price increase as an initial installation fee of 50-100 yuan per month cost. Model car of the main economic capabilities.

How to Purchase an Access Control

The basic system consists of access card readers, controllers, cards, electronic control locks and other accessories components. On the stability of the entire system, are essential to any part of, any of the components of the instability will affect the stability of the entire system. However, on security, and the card reader should be the most important cards like an "electronic key", if the key was easy to copy someone else, the entire access control system there is no security to speak of the.

Card identification technology is probably gone through several stages:

Magnetic cards - contactless smart card - card - contactless smart cards. Contactless smart card and proximity card though and are based on the RFID, has a contact-free, easy-to-use features. But among them there are still many differences. From a technical development, the contactless smart card to replace the card is taken for granted. The market situation is also evidenced in China, the contactless smart card has 2 consecutive years of growth in the median, contactless smart card technology is bound to the next generation of mainstream technology, this is an indisputable fact. Domestic and foreign companies have been offering their own contactless smart card reader and (13.56MHz), in the face of so many brands on the market and the card reader, how to choose a safe, reliable products? How do users spend a minimum price from the sensor card technology to upgrade to contactless smart card technology? This is also a concern for many users.

Product Selection

Choice of profession and access control card reader

Speaking of professional, business or project may have a lot of users find it difficult to have a scale, personal feel that the following factors should be taken into account. Follow the ISO standard: 13.56MHz contactless smart card, usually 4 ISO standard: ISO14443A, ISO14443B, ISO15693, ISO18000.

ISO standards are each composed of four parts, such as: physical size, frequency, power and signal interface, initialization and anti-collision and Transport Protocol, and so on. And the card reader to follow the ISO standards in the performance of the user is directly in front of the card reader and the reader distance, speed communications, and so on, such as: ISO15693 in line with the products than the products in line with ISO14443 further reading From the card, but the communication speed slower than the ISO14443. As with the access cards and card readers, among them the volume of data transmission is very small, any ISO standard rate sufficient to meet the communications requirements, but if there are more distant from the reader to be the most convenient Therefore, in line with the ISO15693 standard option cards and card readers for access control system users will be more convenient. However, if the user to carry out, such as fingerprint, iris and palm-shaped, and other biometric authentication, and the biometric templates stored on the card, it is necessary to choose products that meet the ISO14443 standard, because biometric template there is a larger amount of data. Some products may be more than the same time, in line with ISO standards, such as: HID's iCLASS products. HIDiCLASS cards in general iCLASS card reader on the ISO15693 standard used to be distant from the reader; but with a card, close to the iCLASS fingerprint reader will automatically ISO14443B standards for high speed communications.