Transcript Slide 1

Best of Show
ISC West 2007
Innovation
Intrusion Detection/Prevention
Manufactured by RSIalarm
What is Videofied?
It is NOT surveillance.
Totally Wireless EVENT based intrusion Alarm and
Video Verification system.
Cameras are on ONLY during an alarm event
Priority Police Response.
Greater security and priority police response is valuable.
Efficient Tidy Installation.
No holes, no wires, no mess and no waiting.
Proven.
We have the largest installed base of video-verification in the
world with over 70,000 systems installed.
Videofied Concept
®
• Priority Police Response
• Higher Level of Security
• Central Station can forward videos to Police
• Benefits security stakeholders:
• Law Enforcement – efficiency
• Residents – responsive law enforcement
• Additional Features
• Video notifications
• reduced false alarm issues
Priority Dispatch
European case study
• 2000 pre-legislation
Police response time
• 2001 post-legislation
using Guards to verify
alarm
• 2005
Central Stations and
videofied dispatch
34 minutes
80 minutes
7 minutes
How does
Videofied work?
1. When the P-Cam detects an intruder it
captures a 10 second video. The alarm and
video are transmitted to the Central Station.
2. Verified alarms are treated as crimes-inprogress and get higher priority response.
How does it work?
Revolutionary P-Cam
Radio Transceiver
• 2 way encrypted
Motion Detector
Night Vision
Digital Camera
Self-powered
No AC connection
• 4 year battery life
Infrared Illuminators
How does it work?
Blind System:
Alarm sent as
Contact ID code
Videofied:
10 second video
with Contact ID
Add Videofied to
Existing Systems
Actual Video
Privacy is Key
Privacy remains the single most
important factor in residential video.
No Alarm
No Video
Camera remains off to conserve power.
Camera is only activated during an alarm.
No Wires
No Peeking
Wired cameras create doubts in residential
market; are they really off? P-Cam batteries last 4
years because they are usually off.
Privacy Protected
Armed:
Alarm activates
Camera to
capture video
Unarmed:
Camera
remains
OFF
Two Product Lines
VIA-Pro
Complete Video Security System
- Panel
- P-Cams
- Accessories
Existing
System
VIA-VU (Videofied Upgrade)
Upgrade Kit for Existing Systems
- Interface Module
- P-Cams
Innovations:
Reporting and Communications
• Multiple Innovations in Basic Technology
• Controller is Native Internet Protocol (IP) communicator
• Videofied features combinations of 6 methods of communication:
•
•
•
•
•
•
Telephone PSTN Dial-Up (Contact ID)
Email
MMS/SMS
Voice Synthesized Reporting to telephone
Optional Internal Plug-In GPRS Cellular Transceiver
Optional Ethernet LAN/WAN - Intranet and Internet
Operation - How? –
Intelligent Field Devices
• Intelligent / Power Smart Field Devices:
•
Competitively priced TWO WAY supervised door contact
features reed switch, magnet and connections for
external devices
•
Keypad is a TWO WAY alphanumeric communicator.
It is a system control, programming tool and diagnostic
tool
•
Key Fob is a TWO WAY arming device, control and
annunciator – feeds back alarm and arming status
•
All devices only consume battery power according to
the power management scheme and instructions or the
need to initiate because of an input or event
GPRS Cell Option
Ideal for remote
applications with
no power or
communications
Premises Wiring Diagram
6 Zones, 2 Keypads, 1 Key-Fob, 1 Siren-Strobe,
GPRS Communication
Siren -Strobe
PIR-Camera (P-Cam)
Door – Window/ External Detector TX/RX
Control – Communicator
Keypads –Key-Fobs
Premises Wiring Diagram
6 Zones, 2 Keypads, 1 Key-Fob, 1 Siren-Strobe,
GPRS Communication
NO Wires – Zero, Zip, Zilch, Nada
Premises Wiring Diagram
6 Zones, 2 Keypads, 1 Key-Fob, 1 Siren-Strobe,
GPRS Communication
NO Wires – Zero, Zip, Zilch, Nada
Military-Level RF
• S2VIEW Technology
– Spread Spectrum
• 25 Channels
– Videofied
– Interactive
• Bi-Directional transceivers on all devices
– Encrypted
• 128 bit AES encryption
– Wireless
Click for
more info
on RF
Central Station
• Simple for Central Station operator:
– Alarm received by operator
– Video launched with alarm
– Highly efficient CS operation
– Video can be sent to Police Dispatch
End User
benefits
•
•
•
•
•
On-site product demonstrations
Cost Effective
Priority Response
Greater Security
Minimal disruption during installation
For More Information:
• Visit www.nexlar.com
• Call 1888-563-9527
• Send an email to [email protected]
Transceiver Radio: 915 MHz
• Provides superior range at less power.
• Enables better transmission through
difficult infrastructure, masonry walls, etc.
• Minimizes “dead spots” in installation.
• Miniature antenna enables small sized
devices
Spread Spectrum
How Spread Spectrum Works
Spread Spectrum uses wide band,
noise-like signals. Because Spread
Spectrum signals are noise-like, they
are hard to detect. Spread Spectrum
signals are also hard to Intercept or
demodulate. Further, Spread
Spectrum signals are harder to jam
(interfere with) than narrowband
signals. These Low Probability of
Intercept (LPI) and anti-jam (AJ)
features are why the military has
used Spread Spectrum for so many
years. Spread signals are
intentionally made to be much wider
band than the information they are
carrying to make them more noiselike.
Spread Spectrum
• Improved transmission/reception in difficult
environments.
• Resistance to jamming.
• Deterrence to hacking and eavesdropping.
• Easy installation.
Bi-directional
• Every device is supervised by control panel every
8 minutes to validate communications and status.
• Enables capture of Serial #, manufacturing date,
firmware and revision from each device by the
panel with no manual input during installation.
• Facilitates installation with Roaming Keypad for
range testing, validate detection, device locator.
• Enables AES encryption to secure
communications and prevent hacking.
AES Encryption
Figure 2 shows an Advanced
Encryption Standard (AES) encryption
process under a 128-bit secret key.
Eleven sets of round keys are
generated from the secret key and fed
to each round of the ciphering block.
The round operation is a combination of
four primitive functions: SubBytes
(sixteen 8-bit S-Boxes), ShiftRows (byte
boundary rotations), MixColumns (4byte × 4-byte matrix operation), and
AddRoundKeys (bit-wise XOR). In
decryption, the inverse functions
(InvSubBytes, InvShiftRows, and
InvMixColumns, with AddRoundKey as
its own inverse) are executed in reverse
order. The key scheduler uses four SBoxes and 4-byte constant values
Rcon(i) (1 i 10). In decryption, these
sets of keys are used in reverse order.
AES Encryption
• Encryption Key between devices is
changed every second.
• Eliminates eavesdropping.
• Eliminates hacking into the panel or
devices.
• Eliminates crosstalk and interference from
other RSIalarm systems/devices in close
proximity and overlapping RF.
Return
Click Here
Return