Browse Intercom: Audio, Video Intercom Systems

Audio, video or keypad entry - Expert commentary

The digital transformation of access control solutions
The digital transformation of access control solutions

The safeguarding of premises through the monitoring of entrance and exit points has traditionally been a very manual aspect of security. Human operators have been relied on to make decisions about who to admit and deny based on levels of authorisation and the appropriate credentials. But the access control business, like many industries before it, is undergoing its own digital transformation; one where the protection of premises, assets and people is increasingly delivered by interconnected systems utilising IoT devices and cloud infrastructure to offer greater levels of security and protection. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification, right through to complex networks of thermal cameras, audio speakers and sensors. These systems, connected through the cloud, can be customised and scaled to meet the precise requirements of today’s customer. And it’s the ease of cloud integration, combined with open technologies and platforms that is encouraging increasing collaboration and exciting developments while rendering legacy systems largely unfit for purpose. Remote management and advanced diagnostics Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution.Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution. For example, as the world faces an unprecedented challenge and the COVID-19 pandemic continues to cause disruption, the ability to monitor and manage access to sites remotely is a welcome advantage for security teams who might otherwise have to check premises in person and risk breaking social distancing regulations. The benefits of not physically having to be on site extend to the locations within which these technologies can be utilised. As an example, within a critical infrastructure energy project, access can be granted remotely for maintenance on hard to reach locations. Advanced diagnostics can also play a part in such a scenario. When access control is integrated with video surveillance and IP audio, real-time monitoring of access points can identify possible trespassers with automated audio messages used to deter illegal access and making any dangers clear. And with video surveillance in the mix, high quality footage can be provided to authorities with real-time evidence of a crime in progress. Comprehensive protection in retail Within the retail industry, autonomous, cashier-less stores are already growing in popularity The use of connected technologies for advanced protection extends to many forward-looking applications. Within the retail industry, autonomous, cashier-less stores are already growing in popularity. Customers are able to use mobile technology to self-scan their chosen products and make payments, all from using a dedicated app. From an access control and security perspective, connected doors can be controlled to protect staff and monitor shopper movement. Remote management includes tasks such as rolling out firmware updates or restarting door controllers, with push notifications sent immediately to security personnel in the event of a breach or a door left open. Remote monitoring access control in storage In the storage facility space, this too can now be entirely run through the cloud with remote monitoring of access control and surveillance providing a secure and streamlined service. There is much to gain from automating the customer journey, where storage lockers are selected online and, following payment, customers are granted access. Through an app the customer can share their access with others, check event logs, and activate notifications. With traditional padlocks the sharing of access is not as practical, and it’s not easy for managers to keep a record of storage locker access. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers. The elimination of manual tasks, in both scenarios, represents cost savings. When doors are connected to the cloud, their geographical location is rendered largely irrelevant. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers They become IoT devices which are fully integrated and remotely programmable from anywhere, at any time. This creates a powerful advantage for the managers of these environments, making it possible to report on the status of a whole chain of stores, or to monitor access to numerous storage facilities, using the intelligence that the technology provides from the data it collects. Open platforms power continuous innovation All of these examples rely on open technology to make it possible, allowing developers and technology providers to avoid the pitfalls that come with the use of proprietary systems. The limitations of such systems have meant that the ideas, designs and concepts of the few have stifled the creativity and potential of the many, holding back innovation and letting the solutions become tired and their application predictable. Proprietary systems have meant that solution providers have been unable to meet their customers’ requirements until the latest upgrade becomes available or a new solution is rolled out. This use of open technology enables a system that allows for collaboration, the sharing of ideas and for the creation of partnerships to produce ground-breaking new applications of technology. Open systems demonstrate a confidence in a vendor’s own solutions and a willingness to share and encourage others to innovate and to facilitate joint learning. An example of the dynamic use of open technology is Axis’ physical access control hardware, which enables partners to develop their own cloud-based software for control and analysis of access points, all the while building and expanding on Axis’ technology platform. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification Opportunities for growth Open hardware, systems and platforms create opportunities for smaller and younger companies to participate and compete, giving them a good starting point, and some leverage within the industry when building and improving upon existing, proven technologies. This is important for the evolution and continual relevance of the physical security industry in a digitally enabled world. Through increased collaboration across technology platforms, and utilising the full range of possibilities afforded by the cloud environment, the manufacturers, vendors and installers of today’s IP enabled access control systems can continue to create smart solutions to meet the ever-changing demands and requirements of their customers across industry.

A secured entrance is the first defence against an active shooter
A secured entrance is the first defence against an active shooter

The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols. The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in 2018. The report reveals that 16 of the 27 incidents occurred in areas of commerce, seven incidents occurred in business environments, and five incidents occurred in education environments. Deadly active-shooter events Six of the 12 deadliest shootings in the country have taken place in the past five years Six of the 12 deadliest shootings in the country have taken place in the past five years, including Sutherland Springs church, Marjory Stoneman Douglas High School, the San Bernardino regional center, the Walmart in El Paso and the Tree of Life Synagogue in Pittsburgh, which have all occurred since 2015. Although these incidents occurred in facilities with designated entry points common to churches, schools and businesses, the two most deadly active-shooter events since 2015 were the Route 91 Harvest music festival shooting in Las Vegas that left 58 dead and the Pulse nightclub killings in Orlando where 49 perished. As Christopher Combs, special agent in charge of the FBI field office in San Antonio, Texas, said during a news conference following the August 31 mass shooting in Odessa, Texas that claimed seven lives: “We are now at almost every two weeks seeing an active shooter in this country." Active shooter incidents Between December 2000 and December 2018, the FBI’s distribution of active shooter incidents by location looks like this: Businesses Open to Pedestrian Traffic (74) Businesses Closed to Pedestrian Traffic (43) K-12 Schools (39) Institutions of Higher Learning (16) Non-Military Government Properties (28) Military Properties—Restricted (5) Healthcare Facilities (11) Houses of Worship (10) Private Properties (12) Malls (6) What the majority of these venues have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. Situational awareness in perimeter and door security Preventing people with the wrong intentions from entering the space is the goal" According to Paul Franco, an A&E with more than 28 years of experience as a consultant and systems integrator focusing on schools, healthcare and large public and private facilities, that while active shooter incidents continue to rise, the residual effect has been an increase in situational awareness in perimeter and door security. “Certainly, protecting people and assets is the number one goal of all our clients. There are multiple considerations in facilities like K-12 and Healthcare. Preventing people with the wrong intentions from entering the space is the goal. But a critical consideration to emphasise to your client is getting that person out of your facility and not creating a more dangerous situation by locking the person in your facility,” says Franco. High-security turnstiles “Schools today are creating a space for vetting visitors prior to allowing access into the main facility. Using technology properly like high-security turnstiles offer great benefits in existing schools where space constraints and renovation costs can be impractical.” What steps should they be taken when recommending the proper door security to ensure the building is safe As a consultant/integrator, when discussions are had with a client that has a facility in a public space like a corporate building, government centre or industrial facility, what steps should they be taken when recommending the proper door security to ensure the building is safe and can protect its people and assets? For Frank Pisciotta, President and CEO of Business Protection Specialists, Inc. in Raleigh, North Carolina, a fundamental element of his security strategy is making appropriate recommendations that are broad-based and proactive. Properly identifying the adversaries “As a consultant, my recommendations must include properly identifying the adversaries who may show up at a client’s door, the likelihood of that event occurring, the consequences of that event occurring, determining if there are tripwires that can be set so an organisation can move their line of defence away from the door, educating employees to report potential threats and creating real-time actionable plans to respond to threats. A more reactionary posture might include such thing as target hardening such as ballistic resistant materials at entry access points to a facility,” Pisciotta says. Veteran consultant David Aggleton of Aggleton & Associates of Mission Viejo, California recommends that clients compartmentalise their higher security areas for limited access by adding multiple credential controls (card + keypad + biometric), along with ‘positive’ access systems that inhibit tailgating/piggybacking such as secure turnstiles, revolving door and mantrap if your entrances and security needs meet the required space and access throughput rates. Integrated solution of electronic access control Defining a single point of entry in some public facilities is becoming the new standard of care according to many A&Es and security consultants, especially in a school environment. This approach allows a concerted effort when it comes to staffing, visitor monitoring and an integrated technology solution. The bottom line remains: most buildings are vulnerable to a security breach A proactive stance to securing a door entryway will use an integrated solution of electronic access control, turnstiles, revolving doors and mantraps that can substantially improve a facility’s security profile. The bottom line remains: most buildings are vulnerable to a security breach, so it’s not a matter of if there will be a next active shooter tragedy, it’s only a matter of where. Enhancing access control assurance “There is no easy answer to this question,” says Pisciotta referring to how a secured entrance can deter an active shooter. “There have been at least two high-profile incidents of adversaries shooting their way into a facility through access control barriers. So, if the threat so dictates, a ballistic resistant might be required.” He concludes: “There is obviously no question that turnstiles, revolving doors and man traps enhance access control assurance. Electronic access control is easy to integrate with these devices and providing that credentials are secure, approval processes are in place, change management is properly managed and the appropriate auditing measures in place, access control objectives can be met.”

Are mobile credentials more secure than smart cards?
Are mobile credentials more secure than smart cards?

For the past several years, there has been a focus by integrators and customers to assure that their card-based access control systems are secure. To give businesses an extra incentive to meet their cybersecurity threats, the Federal Trade Commission (FTC) has decided to hold the business community responsible for failing to implement good cybersecurity practices and is now filing lawsuits against those that don't. For instance, the FTC filed a lawsuit against D-Link and its U.S. subsidiary, alleging that it used inadequate safeguards on its wireless routers and IP cameras that left them vulnerable to hackers.Many companies perceive that they are safer with a card but, if done correctly, the mobile can be a far more secure option  Now, as companies are learning how to protect card-based systems, such as their access control solutions, along comes mobile access credentials and their readers which use smart phones instead of cards as the vehicle for carrying identification information. Many companies perceive that they are safer with a card but, if done correctly, the mobile can be a far more secure option with many more features to be leveraged. Handsets deliver biometric capture and comparison as well as an array of communication capabilities from cellular and Wi-Fi to Bluetooth LE and NFC. As far as security goes, the soft credential, by definition, is already a multi-factor solution. Types of access control authentication Access control authenticates you by following three things: Recognises something you have (RFID tag/card/key), Recognises something you know (PIN) or Recognises something you are (biometrics). Your smart phone has all three authentication parameters. This soft credential, by definition, is already a multi-factor solution. Your mobile credentials remain protected behind a smart phone's security parameters, such as biometrics and PINs. Organisations want to use smart phones in their upcoming access control implementations Once a biometric, PIN or password is entered to access the phone, the user automatically has set up 2-factor access control verification - what you know and what you have or what you have and a second form of what you have.                 To emphasise, one cannot have access to the credential without having access to the phone. If the phone doesn’t work, the credential doesn’t work. The credential operates just like any other app on the phone. The phone must be “on and unlocked.” These two factors – availability and built-in multi-factor verification – are why organisations want to use smart phones in their upcoming access control implementations. Smart phone access control is secure Plus, once a mobile credential is installed on a smart phone, it cannot be re-installed on another smart phone. You can think of a soft credential as being securely linked to a specific smart phone. Similar to a card, if a smart phone is lost, damaged or stolen, the process should be the same as with a traditional physical access credential. It should be immediately deactivated in the access control management software - with a new credential issued as a replacement. Your mobile credentials remain protected behind a smart phone's security parameters, such as biometrics and PINs Leading readers additionally use AES encryption when transferring data. Since the Certified Common Criteria EAS5+ Computer Interface Standard provides increased hardware cybersecurity, these readers resist skimming, eavesdropping and replay attacks.            When the new mobile system leverages the Security Industry Association's (SIA) Open Supervised Device Protocol (OSDP), it also will interface easily with control panels or other security management systems, fostering interoperability among security devices.All that should be needed to activate newer systems is simply the phone number of the smart phone Likewise, new soft systems do not require the disclosure of any sensitive end-user personal data. All that should be needed to activate newer systems is simply the phone number of the smart phone. Bluetooth and NFC the safer options Bottom line - both Bluetooth and NFC credentials are safer than hard credentials. Read range difference yields a very practical result from a security aspect. First of all, when it comes to cybersecurity, there are advantages to a closer read range. NFC eliminates any chances of having the smart phone unknowingly getting read such as can happen with a longer read range. There are also those applications where multiple access readers are installed very near to one-another due to many doors being close. One reader could open multiple doors simultaneously. The shorter read range or tap of an NFC enabled device would stop such problems. However, with this said in defence of NFC, it must also be understood that Bluetooth-enabled readers can provide various read ranges, including those of no longer than a tap as well. One needs to understand that there are also advantages to a longer reader range capability. Since NFC readers have such a short and limited read range, they must be mounted on the unsecure side of the door and encounter all the problems such exposure can breed. Conversely, Bluetooth readers mount on the secure sides of doors and can be kept protected out of sight. Aging systems could cause problems Research shows that Bluetooth enabled smart phones are continuing to expand in use to the point where those not having them are already the exceptions With that said, be aware. Some older Bluetooth-enabled systems force the user to register themselves and their integrators for every application. Door access – register. Parking access – register again. Data access – register again, etc. Newer solutions provide an easier way to distribute credentials with features that allow the user to register only once and need no other portal accounts or activation features. By removing these additional information disclosures, vendors have eliminated privacy concerns that have been slowing down acceptance of mobile access systems. In addition, you don’t want hackers listening to your Bluetooth transmissions, replaying them and getting into your building, so make very sure that the system is immunised against such replays. That’s simple to do. Your manufacturer will show you which system will be best for each application. Research shows that Bluetooth enabled smart phones are continuing to expand in use to the point where those not having them are already the exceptions. They are unquestionably going to be a major component in physical and logical access control. Gartner suggests that, by 2020, 20 percent of organisations will use mobile credentials for physical access in place of traditional ID cards. Let’s rephrase that last sentence. In less than 18 months, one-fifth of all organisations will use the smart phone as the focal point of their electronic access control systems. Not proximity. Not smart cards. Phones!

Latest Hikvision news

Hikvision intelligent traffic management system to help vehicles to flow through Xi'an city
Hikvision intelligent traffic management system to help vehicles to flow through Xi'an city

Traffic continues to grow in every major city. But how do people beat congestion in these restricted urban spaces? In China’s ancient-walled city of Xi’an, they’re adopting an intelligent traffic management system based on Hikvision technology - and boosting traffic flow while reducing journey time. The Chinese city of Xi'an, known as Chang'an in ancient times, was the centre of ancient oriental civilisation. Thirteen dynasties spanning Chinese history have chosen Xi'an as their capital. Today, Xi'an is not simply a part of history: it’s a high-tech hub, renowned across China for its scientific research and education, manufacturing, technology, and transportation. In spite of being a modern hub, Xi’an still retains its ‘checkerboard’ layout from the Tang Dynasty, complete with its border of tall and ancient walls. Urban Traffic Administration Nevertheless, while economic growth has enabled the city to develop, the walls place great restrictions on the city’s daily movement - especially to its burgeoning traffic. Vehicles can only enter and exit through the city gates, but with some three million vehicles in the city, the limited number of entrances was beginning to cause serious congestion. What’s more, there are also many ancient ruins in the city, which were further limiting the development of the urban area. Managing a growing city while protecting its history presented a serious challenge to Xi’an Plus, as of 2018, the city was home to over 10 million people, while the number of construction projects was steadily increasing. Managing a growing city while protecting its history presented a serious challenge to Xi’an. So, to address this, Xi’an Urban Traffic Administration turned to Hikvision and its intelligent cameras. Traffic sensing system “Xi’an’s city walls make it impossible to increase the size of the urban area. So, it was only through technology that we could allow the modern city to grow and develop,” says Lihu Ma, the Project Manager from Hikvision. “A core part of the Hikvision solution involves our AI-powered video technology.” The Xi'an traffic police worked with experts from Hikvision, as well as urban planning experts, internet service providers and other technology companies, to design and implement an intelligent traffic management system. The construction of this system fully utilises Hikvision's core advantages in urban transportation intelligence, employing AI-powered video to create a powerful traffic sensing system. Physical urban transportation network The latest sonar monitoring equipment is being used to detect illegal use of car horns in banned areas “Effectively, we are building a bridge between an intelligent digital world and the physical urban transportation network in Xi’an,” explains Lihu. The intelligent traffic management system analyses comprehensive and detailed data about the movement of traffic through the urban Xi’an area, and uses the insight gathered to make the flow of traffic more smoothly in three key ways. Comprehensive road traffic violation monitoring Xi'an traffic police have installed Hikvision’s Checkpoint Capture Cameras and Intersection Violation Capture Units as part of a monitoring system that can detect illegal vehicle behaviour at intersections. These full view ultra-high zoom cameras record vehicles making illegal maneuvers - such as running red lights, making banned turns and illegal lane changes - in real time. What’s more, the latest sonar monitoring equipment is being used to detect illegal use of car horns in banned areas. Intelligent mobile applications  Visual integrated command and dispatching platform Using real-time video streams from Hikvision Traffic Flow Capture Cameras, a number of road condition perception technologies, plus intelligent mobile applications, Xi'an traffic police has created a visual command and control centre, coupled with an intelligent police dispatch system. All data is aggregated and dynamically displayed on a large screen in the command and control centre. In the event of a traffic incident, the system generates dispatch recommendations intelligently, according to the location and distribution of traffic police officers throughout the city. Those closest to an incident receive an automated message to their mobile terminals, enabling them to arrive at the scene quickly. Intelligent traffic management system The Xi’an traffic management team also employs congestion management practices More importantly, the intelligent traffic management system uses advanced machine learning capabilities to gain insight into typical congestion patterns, in order to actively identify potential traffic events before they happen. By analysing large volumes of road condition data and information from Hikvision’s intelligent video cameras, the system can predict which intersections are most prone to congestion and when, enabling traffic police to put evasive measures in place before serious issues arise. Improved vehicle flow capacity with intelligent signal control The Xi’an traffic management team also employs congestion management practices to ease the flow of traffic, largely through the optimisation of signal timing. Using Hikvision intelligent video cameras coupled with augmented reality (AR) technology, the intelligent traffic management system analyses traffic flow data and dynamically alters the timing of signal lights accordingly. Adjusting signal timing It will monitor traffic flow, queue length and average driving speed in all directions of intersections in real-time, automatically adjusting signal timing to optimise the flow of vehicles. The Xi'an traffic management system has now been trained with a wealth of traffic data, including Hikvision video, enabling it to build multiple intelligent algorithms for managing congestion in the city. Driver behaviour is improving, and drivers are becoming more compliant with the rules of the road First of all, map-based congestion reports suggest that Xi'an's congestion rankings have improved significantly. In fact, compared with the test results of pilot roads before the system went live, intelligent signal control alone has increased the throughput of traffic by 10%, while the average vehicle journey time is reduced by about 12%. What’s more, driver behaviour is improving, and drivers are becoming more compliant with the rules of the road. Traffic incident warning function Traffic law enforcement data reveals that traffic offences are generally decreasing, with traffic violations dropping by some 30% in one short-term observation. Additionally, thanks to the proactive traffic incident warning function, the incident detection rate has also increased by more than 30% compared to the traditional model. With the continuous optimisation of the system algorithm, plus ongoing installation of monitoring equipment, the accuracy of this identification will only improve. In the process of urbanisation, tackling congestion is not only about improving the flow of the transportation network: it’s also basic governance for building a smart city.

Paxton unveils new version v6.04 Net2 Occupancy Management & Thermal Scan integrations to facilitate COVID-secure Buildings
Paxton unveils new version v6.04 Net2 Occupancy Management & Thermal Scan integrations to facilitate COVID-secure Buildings

Paxton Access Ltd. (Paxton) has announced new additions to their renowned Net2 access control product line, helping installers make their customers’ buildings more COVID-secure. The latest version of Net2 – v6.04 has been in rapid development since May 2020 and is now ready for installers to download. Net2 – v6.04 The latest version features Net2 Occupancy Management, which allows enterprises to limit the number of people in any given area, either barring access or sending an email or text to the building manager when a space nears capacity. It works across multiple areas of a site and can be set to operate a one-in, one-out system to support social distancing measures. In addition to this update, installers who want to use thermal scanning to help limit the spread of the virus can do so with three new thermal scan integrations. Making buildings more COVID-secure We understand the important part that access control plays in managing the flow of people around a building" Adam Stroud, Chief Executive Officer (CEO) at Paxton Access Ltd. stated, "We understand the important part that access control plays in managing the flow of people around a building in order to support a hygienic environment. In addition, controlling the density of people in any given area is a valuable tool to help businesses of all types to become 'COVID-secure'." Adam adds, “Net2 is one of the best-selling access control systems and so we have developed the new Occupancy Management feature to meet this specific need. For new and existing Net2 customers we hope that this new functionality helps the efforts that we are all making to observe social distancing and keep people safe." Occupancy Management with Net2 v6.04: Ensure users maintain a safe social distance by setting and controlling the maximum number of people in any given area. Real-time visual reports - see live occupancy levels in a clear, web-based visual report from smartphone, tablet, PC or widescreen wall display. Dynamic control of entry permissions - set alerts and prevent user access when maximum capacity is neared or reached. Simplified area management - set and manage multiple areas simultaneously, with specific occupancy levels per area. Support continuous flow of people movement with one-in-one-out user access when people numbers are high. Thermal scan hardware Paxton has also tested a range of thermal scan hardware and the company’s free 45-minute webinars will take installers through what is available and how to apply it. Paxton references solutions from Hikvision - Face Recognition Terminal (Minmoe), Dahua Technology - Thermal Temperature Station and ZKTeco – SpeedFace to help ensure health and wellbeing in high security areas and identify people that could be at risk, quickly. Net2 integrations with Hikvision, Dahua, and ZKTeco solutions Paxton has validated Net2 integrations with Hikvision, Dahua, and ZKTeco Paxton has validated Net2 integrations with Hikvision, Dahua, and ZKTeco. However, Net2 can work with most thermal devices that utilise a Wiegand output. Paxton has been running their ‘Guide to COVID-secure Buildings’ webinars to help get the U.S. back to work safely. Installers receive a live 45-minute webinar that will take them through the CDC and OSHA guidelines, as well as a free end-user guide to help their customers understand the access control solutions available when updating their buildings. ‘Guide to COVID-secure Buildings’ webinars Gareth O’Hara, the Chief Sales Officer at Paxton Access Ltd. said, “We’ve had a great response from customers so far, with hundreds joining us in the first couple of weeks. The webinar provides installers with practical access control solutions that businesses need now.” He adds, “The new Occupancy Management feature in Net2 has been eagerly anticipated and we are looking forward to getting it out there to help with social distancing on sites around the world. We are continuing to develop Net2 in line with installer feedback to provide even more flexibility for COVID-secure buildings, so watch this space.” Paxton’s latest webinar, the Guide to COVID-secure Buildings with Net2 started on June 30 and runs twice weekly.

Hikvision unveils new Dedicated Subseries addition to its DeepinView camera line
Hikvision unveils new Dedicated Subseries addition to its DeepinView camera line

Hikvision, an IoT solution provider with video as its core competency, has announced a brand-new addition to its DeepinView camera line: the Dedicated Subseries. This unprecedented new addition loads a batch of AI-powered deep learning algorithms into each unit, boasting stunning performance and cost-effective pricing. Dedicated DeepinView Cameras Over the last few years, Artificial Intelligence (AI) has been applied in many ways in security markets. As technology advances, AI chipset performance has improved to enable massive computing power using various algorithms and contributing to multi-intelligence functionality and higher accuracy. The new Dedicated DeepinView Cameras are an example of these advances, incorporating several AI-powered deep learning algorithms in one unit. What’s more is that these algorithms can be switched, thereby essentially putting 5 or 6 unique cameras in one housing. Integrated with enhanced AI technology Embedding switchable algorithms is a significant step for Hikvision to take in its AI product development" “Embedding switchable algorithms is a significant step for Hikvision to take in its AI product development. In a world of ever-changing technologies and functionalities, this approach creates great value for end users to try new technologies to ensure security, as well as to implement business intelligence and other applications,” said Frank Zhang, President of the International Product and Solution Center at Hikvision. He adds, “The benefits of our new offerings are numerous including reduced costs, improved efficiency, and speedy and effective incident response.” Vehicle analysis capability The Dedicated DeepinView cameras combine two product categories – the first is vehicle analysis where cameras combine automatic number plate recognition (ANPR) with vehicle attribute recognition. Attributes include the vehicle’s make, colour, and direction of movement. Typical uses include installation at checkpoints of city streets and at entrances & exits of buildings or industrial parks. Switchable deep learning algorithms Models in the second category boast six switchable deep learning algorithms in one camera housing, including facial recognition, face counting, hard hat detection, perimeter protection, queue management, and multiple-target-type detection (detecting multiple targets and multiple types of targets at once). Accordingly, users can simply enable an algorithm manually for dedicated use, and then later switch the algorithm as needed. One example of a switchable algorithm is hard hat detection. This algorithm can be used on construction sites to ensure safety and compliance. Face-counting function Specially-equipped DeepinView cameras can precisely distinguish a worker on the site wearing a hard hat from those without one, and automatically deliver alerts when the hard hat violation is detected. Another example is in a retail setting, a face-counting function can be enabled to precisely count customers entering and leaving the store. Repeat customers and store staff can be automatically excluded in the process, helping store managers count new customers with precision. Flexibility among algorithms enables users to also switch among: Perimeter protection – To monitor outdoor areas needing security and deliver accurate alarms upon intrusions. Facial recognition – To grant authorised access to restricted areas in various organisations, such as school laboratories, archive rooms, and hospital pharmacies. Queue management – To better understand customer wait times, optimise staff levels, and enhance customer experience. DarkFighter and LightFighter technologies The Dedicated DeepinView Cameras are available in 2, 4, 8, and 12 MP resolutions Equipped with Hikvision’s DarkFighter and LightFighter technologies, these cameras capture vivid and color images in extremely low-light environments or in scenes with strong backlighting where color and brightness balance is extremely difficult. Smooth Streaming mode further ensures a high-quality live feed. The Dedicated DeepinView Cameras are available in 2, 4, 8, and 12 MP resolutions for customers to choose from. Vibration detection Furthermore, metadata is supported to allow third-party platforms to receive data from Hikvision cameras for real-time video analysis or recorded into footage archives to enable rapid searching forensic evidence. Finally, these camera models also offer Vibration Detection for outdoor use, which detects and notifies users of vandalism.

Related white papers

RFID and smartphone readers in physical access control

The role of IT in physical access control

Mobile Access - What you need to know