Transcript Slide 1
Best of Show ISC West 2007 Innovation Intrusion Detection/Prevention Manufactured by RSIalarm What is Videofied? It is NOT surveillance. Totally Wireless EVENT based intrusion Alarm and Video Verification system. Cameras are on ONLY during an alarm event Priority Police Response. Greater security and priority police response is valuable. Efficient Tidy Installation. No holes, no wires, no mess and no waiting. Proven. We have the largest installed base of video-verification in the world with over 70,000 systems installed. Videofied Concept ® • Priority Police Response • Higher Level of Security • Central Station can forward videos to Police • Benefits security stakeholders: • Law Enforcement – efficiency • Residents – responsive law enforcement • Additional Features • Video notifications • reduced false alarm issues Priority Dispatch European case study • 2000 pre-legislation Police response time • 2001 post-legislation using Guards to verify alarm • 2005 Central Stations and videofied dispatch 34 minutes 80 minutes 7 minutes How does Videofied work? 1. When the P-Cam detects an intruder it captures a 10 second video. The alarm and video are transmitted to the Central Station. 2. Verified alarms are treated as crimes-inprogress and get higher priority response. How does it work? Revolutionary P-Cam Radio Transceiver • 2 way encrypted Motion Detector Night Vision Digital Camera Self-powered No AC connection • 4 year battery life Infrared Illuminators How does it work? Blind System: Alarm sent as Contact ID code Videofied: 10 second video with Contact ID Add Videofied to Existing Systems Actual Video Privacy is Key Privacy remains the single most important factor in residential video. No Alarm No Video Camera remains off to conserve power. Camera is only activated during an alarm. No Wires No Peeking Wired cameras create doubts in residential market; are they really off? P-Cam batteries last 4 years because they are usually off. Privacy Protected Armed: Alarm activates Camera to capture video Unarmed: Camera remains OFF Two Product Lines VIA-Pro Complete Video Security System - Panel - P-Cams - Accessories Existing System VIA-VU (Videofied Upgrade) Upgrade Kit for Existing Systems - Interface Module - P-Cams Innovations: Reporting and Communications • Multiple Innovations in Basic Technology • Controller is Native Internet Protocol (IP) communicator • Videofied features combinations of 6 methods of communication: • • • • • • Telephone PSTN Dial-Up (Contact ID) Email MMS/SMS Voice Synthesized Reporting to telephone Optional Internal Plug-In GPRS Cellular Transceiver Optional Ethernet LAN/WAN - Intranet and Internet Operation - How? – Intelligent Field Devices • Intelligent / Power Smart Field Devices: • Competitively priced TWO WAY supervised door contact features reed switch, magnet and connections for external devices • Keypad is a TWO WAY alphanumeric communicator. It is a system control, programming tool and diagnostic tool • Key Fob is a TWO WAY arming device, control and annunciator – feeds back alarm and arming status • All devices only consume battery power according to the power management scheme and instructions or the need to initiate because of an input or event GPRS Cell Option Ideal for remote applications with no power or communications Premises Wiring Diagram 6 Zones, 2 Keypads, 1 Key-Fob, 1 Siren-Strobe, GPRS Communication Siren -Strobe PIR-Camera (P-Cam) Door – Window/ External Detector TX/RX Control – Communicator Keypads –Key-Fobs Premises Wiring Diagram 6 Zones, 2 Keypads, 1 Key-Fob, 1 Siren-Strobe, GPRS Communication NO Wires – Zero, Zip, Zilch, Nada Premises Wiring Diagram 6 Zones, 2 Keypads, 1 Key-Fob, 1 Siren-Strobe, GPRS Communication NO Wires – Zero, Zip, Zilch, Nada Military-Level RF • S2VIEW Technology – Spread Spectrum • 25 Channels – Videofied – Interactive • Bi-Directional transceivers on all devices – Encrypted • 128 bit AES encryption – Wireless Click for more info on RF Central Station • Simple for Central Station operator: – Alarm received by operator – Video launched with alarm – Highly efficient CS operation – Video can be sent to Police Dispatch End User benefits • • • • • On-site product demonstrations Cost Effective Priority Response Greater Security Minimal disruption during installation For More Information: • Visit www.nexlar.com • Call 1888-563-9527 • Send an email to [email protected] Transceiver Radio: 915 MHz • Provides superior range at less power. • Enables better transmission through difficult infrastructure, masonry walls, etc. • Minimizes “dead spots” in installation. • Miniature antenna enables small sized devices Spread Spectrum How Spread Spectrum Works Spread Spectrum uses wide band, noise-like signals. Because Spread Spectrum signals are noise-like, they are hard to detect. Spread Spectrum signals are also hard to Intercept or demodulate. Further, Spread Spectrum signals are harder to jam (interfere with) than narrowband signals. These Low Probability of Intercept (LPI) and anti-jam (AJ) features are why the military has used Spread Spectrum for so many years. Spread signals are intentionally made to be much wider band than the information they are carrying to make them more noiselike. Spread Spectrum • Improved transmission/reception in difficult environments. • Resistance to jamming. • Deterrence to hacking and eavesdropping. • Easy installation. Bi-directional • Every device is supervised by control panel every 8 minutes to validate communications and status. • Enables capture of Serial #, manufacturing date, firmware and revision from each device by the panel with no manual input during installation. • Facilitates installation with Roaming Keypad for range testing, validate detection, device locator. • Enables AES encryption to secure communications and prevent hacking. AES Encryption Figure 2 shows an Advanced Encryption Standard (AES) encryption process under a 128-bit secret key. Eleven sets of round keys are generated from the secret key and fed to each round of the ciphering block. The round operation is a combination of four primitive functions: SubBytes (sixteen 8-bit S-Boxes), ShiftRows (byte boundary rotations), MixColumns (4byte × 4-byte matrix operation), and AddRoundKeys (bit-wise XOR). In decryption, the inverse functions (InvSubBytes, InvShiftRows, and InvMixColumns, with AddRoundKey as its own inverse) are executed in reverse order. The key scheduler uses four SBoxes and 4-byte constant values Rcon(i) (1 i 10). In decryption, these sets of keys are used in reverse order. AES Encryption • Encryption Key between devices is changed every second. • Eliminates eavesdropping. • Eliminates hacking into the panel or devices. • Eliminates crosstalk and interference from other RSIalarm systems/devices in close proximity and overlapping RF. Return Click Here Return