Intruder Alarms: Communicators & Communication Systems (204)
Pairing sensors with video for enhanced security There are clear benefits to adding video to a monitored alarm system. It allows to visually verify what has triggered the alarm, have a better understanding of the events and assess what the necessary response should be. Another key benefit is a reduction in false alarms. However, for many companies and homeowners, the main drawback of a full video monitored alarm system is the cost of combining alarm and video surveillance systems and maintaining it. OPTEX’s award-winning Intelligent Visual Verification solution brings an innovative solution to the alarm monitoring market by offering an easy, cost-effective and secure way to connect intrusion detection sensors and/or panic buttons with ONVIF video devices. The solution consists of an IP gateway, The OPTEX Bridge, and a secure cloud portal and provides fast, secure and audited visual verification to the participating monitoring stations/Alarm Receiving Centres (ARCs). How does the solution work? The OPTEX Bridge, available as a four- or 12-channel model enables ONVIF cameras or NVRs to be linked with indoor and outdoor intrusion detectors, panic button and door contacts, mapping the detection zones to the associated cameras. The Bridge is connected to the cloud portal, powered by CheKT, and registered with a participating monitoring centre. When an alarm is triggered The Bridge transmits the information simultaneously to the monitoring station via the monitored system and to the cloud with the associated video footage. Within seconds, the operator is presented with the pre- and post-event recording and the live view of the site. Depending on the procedures in place, the operator will action the appropriate response or send the footage to the customer for verification and instructions. The customer will access the footage with a clear action of ‘disregard’ or ‘response required’. All events and responses are logged in a clear audited trail. What can be connected to The Bridge? There are two models of The OPTEX Bridge: CKB-304 and CKB-312, which enable to physically pair respectively up to four or 12 indoor/ outdoor intrusion sensors or panic buttons with the same amount of IP cameras. The Bridge can be connected to existing or new systems. To add visual verification, The Bridge’s digital inputs can be connected to IP cameras or DVRs, and for alarm activation, it can be connected to indoor and outdoor motion detectors, alarm panels, panic buttons and door contacts. The relay outputs can be used to switch lighting on, issue a voice warning via a siren or to trigger the opening of a gate. In some retail applications, customers have connected The Bridge to release a smoke cloak in case of burglary. Who is this solution for? The Bridge can be used for many different applications such as monitoring intrusion and personal attacks, to visually verifying when a leak sensor has gone into alarm. Retail, commercial and campus buildings, industrial, warehouses and homeowners too can benefit from a comprehensive visual verification solution.Add to Compare
The award-winning REDSCAN Pro range uses LiDAR technology to create a high-resolution virtual laser wall or plane up to 100m long, delivering ideal intrusion protection for many high-security sites, from utilities such as water treatment, telecommunications, transportation hubs, substations, manufacturing, and logistics to campus-style commercial sites. With onboard sensing analytics, REDSCAN Pro can analyse the size, speed and distance of moving objects, providing point detection by tracking the X & Y coordinates of the objects. A further advantage of LiDAR technology is that the detection performance is stable at any time without being affected by light, weather changes or temperature. The sensor can operate from -20 to +60 degrees, and when using a heated lens can extend its operating temperature to -40 degree. Long range and multizone logic detection The new REDSCAN Pro Series sensors can cover large areas with a high degree of accuracy which remains constant over the entire detection area. The RLS-3060V model provides 30x60m coverage, and the RLS-50100V a 50x100m detection area. The rectangular detection pattern (instead of fan-shaped) allows seamless protection from corner to corner, ideal for facades, flat roofs of commercial buildings and perimeter structures of large installations. A key feature of the new LiDAR series is the multizone logic which provides a great level of customisation and flexibility. With just one sensor, customers can create up to eight different detection zones with configurable sensitivity, target size and output, so for instance an immediate alert can be set for restricted areas and a lower sensitivity for lower risk areas. Versatile installation REDSCAN Pro sensors can be installed in different ways to adapt to the area or the application required; they can be mounted indoor or outdoor, in a vertical, tilted or horizontal mode. To make the mounting options easy, the sensor has a built-in 95 degree adjustment bracket within its housing, so there is no need for accessories. Assistance camera for easy set up and event reviews To ease the process of set up and configuration, the REDSCAN Pro series features an integrated panoramic assistance camera, that allows the detection area to be visualised to quickly make any optical alignments. Additionally, the camera module can be used to take pre- and post-alarm images for later verification and if necessary, to assist in re-adjusting the detection area. Up to 500 events can be stored onboard. The benefits of ONVIF compliance Through the ONVIF protocol (Profile S), REDSCAN Pro allows alarm outputs and the video stream from the assistance camera to be sent to any ONVIF-compliant network video system or IP network devices. At the same time REDSCAN Pro maintains the REDWALL event codes (REC Codes) so those sites which already have RLS units can easily be updated. Network Security Online security is a major concern for the industry, which is why REDSCAN Pro is a PoE+ sensor that complies with HTTPS, SNMPv3, IEEE802.1X protocols. To ensure the device is secure, installers can also set up encryption and high-level authentication to protect against unauthorised access to the device. The sensor performs a constant health check and is equipped with all the features to provide the highest levels of security. The REDSCAN Pro series includes two models: RLS-3060V: with a detection range of 30 x 60 m RLS 50100V with a detection range of 50 x 100 m
Climax Hybrid Security System is a wired and wireless IP-based smart home security gateway with LTE capability. It provides a customizable and robust system which takes advantages of both kinds of technology for commercial and large home applications, offering a comprehensive solution, including home security, total visual monitoring solution, ZigBee / Z-Wave home automation, and energy management and bringing all-round convenience, comfort and safety. Scalable System Hybrid Security System can be expandable to 64 wired zones by installing zone expansion module. Besides, Hybrid Security System is compatible with HWC-1, Hardwire to Wireless Converter, providing flexibility for installations of a wide range of wired sensors and devices. Smart Automation Hybrid Security System incorporates ZigBee or Z-Wave devices to create an integrated, comprehensive smart automation system, able to adapt to your lifestyle habits and enhance security. Energy Management Hybrid Security System can integrate whole-premise energy meters to report how much electricity the entire household/facility uses and ZigBee/Z-Wave power meter switches to monitor the power consumption of individual home appliances. With this power-saving system you can develop a useful strategy to reduce energy consumption. World-leading 2-Km RF Range Hybrid Security System utilizes Climax’s groundbreaking Security@2km Wireless Technology that delivers RF communication range of 2 kilometers (1.5 miles), fast signal transmission, and relentless reliability. 24-Hour Emergency Monitoring Hybrid Security System can incorporate smoke/heat detectors, water sensors, air quality sensors, panic buttons, light and humidity sensors to protect user’s premises and property from damage cause by fire, heat, water, or air toxins. Total Visual Monitoring Solution Indoor/outdoor PIR cameras, PIR video cameras, and IP cameras can be incorporated in Hybrid Security System for visual verification and real-time visual monitoring. Remote and Mobile Control Hybrid Security System can be accessed anytime, anywhere, via Vesta Home 5 web portal or app.
ReX expands the boundaries of the protected area. The range extender controls the system devices connected to it enabling the user to place them at a considerable distance from the hub — in a high-rise office, in a detached garage or in a large production plant — while maintaining a stable connection. ReX acts as a reliable link between the hub and Ajax devices. Depending on the requirements, all detectors or only some of them can operate via the intelligent range extender. While regular range extenders represent the weakest link in the security systems increasing the risk of losing the alarm signal during transmission, ReX takes the reliability and resilience of Ajax to a new level. After the hub, ReX is the second decision-making center. It integrates detectors into an autonomous group within the system. If the connection with the hub is interrupted for some reason, ReX will assume control: it will receive an alarm signal from the detector and activate the siren to attract attention to the incident and scare off the burglar.
MotionCam is a wireless motion detector with visual alarm verification for indoor use. It operates for up to 4 years on bundled batteries, detects movement at up to 12 meters, ignores animals, but recognizes a human move instantly. MotionCam works within Ajax security systems, connecting to a hub through the two secure radio protocols. The detector uses Jeweller to transmit alarms and events, and Wings to transmit photos. Wireless coverage may reach up 1,700 m line-of-sight. The infrared sensor of MotionCam detects intrusion into the secured premises by identifying moving objects with a temperature close to that of the human body. The temperature compensation function makes the detector effective inside premises with temperature ranging from 0 to +40°C. If placed and adjusted properly, MotionCam ignores pets. When movement is detected, the armed detector instantly transmits an alarm signal to the hub. The hub activates the connected sirens and notifies the user and the security company. MotionCam uses Jeweller radio protocol to transmit alarms and events to the hub. The built-in MotionCam camera can take from 1 to 5 shots with the resolution of 320×240 and up to 3 shots with the resolution of 640×480 pixels. A series of photos is displayed in the app as an animation, so the user is able to evaluate the unfolding of the event over time. Photos are available both in Ajax apps and on the Central Monitoring Station software of the security company. MotionCam uses Wings radio protocol to transmit photos to the hub. The detector features infrared illumination for shooting in the dark, which is activated only when triggering.
Version 8.0 of long-range award-winning LiDAR – the REDSCAN RLS-3060 series and its configuration software REDSCAN Manager are both now available. The laser sensor with the new firmware version, together with the new configuration software provide a number of new features for both the standard model, RLS-3060L, and the high-end model, RLS-3060SH. The RLS-3060SH will offer more flexibility in managing dry contacts with the option to switch from normally open (N.O.) to normally closed (N.C.). The RLS-3060-SH provides additional detection modes to the L model, such as indoor ceiling protection and vehicle detection mode, and has one major new feature – an extended detection area between 30 and 50m. When used in horizontal detection it creates a pre-warning zone from 30 to 50m radius that is able to detect larger objects such as vehicles. In vertical mode when mounted at 3m off the ground, it can detect a standing or squatting person over 100m making it ideal to pick up intruders, a long wall or fence.
Exhibiting at Security Essen, Hall 6, Booth 6D90. Wireless technology is coming of age, with two-way communication capabilities now cementing wireless’ reliability. Vanderbilt’s SPC Wireless range includes detectors, panic buttons, fobs, and a transceiver, and has a number of benefits intended to make installers’ day-to-day work life easier. The SPC wireless range can extend to 500 meters, proving a more cost effective alternative than having to wire an entire building with cable. This range of 500 meters also cuts down on install time, ultimately cutting down on an installer’s expenses. SPC Wireless devices use the industry-leading Energizer® lithium batteries, meaning an extended battery life of five years. This means installers don’t have to go to site as often to keep changing out batteries, freeing up time for more urgent tasks. Settings for the SPC Wireless range are all configurable over the air. Again, this reduces the need for time-consuming site visits. Most other products require the physical need to flick dipswitches to change commands but Vanderbilt’s SPC Wireless is aimed at convenience first. All-in-all, installs for SPC Wireless are designed to be hassle-free. You just put up the control panel, wire the mains to it, place the wireless detector in position, and you’re good to go. In contrast, a wired solution can take, at a minimum, a day’s work fitting cable. By reducing time on site, Vanderbilt’s SPC Wireless can enable installers to get more work done elsewhere, essentially meaning more profits from more jobs.
Wireless touch keypad is used for arming/disarming of Ajax security system. It is mounted in the room near the entrance door to provide quick access to the keypad. Authentication to prevent forgery Jamming detection and communication channels encryption Tampering alarm Principle of operation The device operates security modes when a digital code is entered on the keypad. Indication notifies of current security status, problems with detectors or breakdown of communication with the hub. Features Alarm button is available. It notifies of each attempt to guess the password and blocks automatically if the permissible number of entries is exceeded. Installation and set up Ready to operate straight out the box: the battery is already installed, therefore there is no need to disassemble the keypad. With one click, it can be connected to the hub in the mobile application. It can be mounted on the SmartBracket in just a few minutes.Add to Compare
Call backup in one click Press the Button in case of emergency. It’ll send an immediate alarm to a hub following by a green blink to indicate successful delivery. The security system will call a response company and send the notifications to your close ones or colleagues. It can also turn on the sirens to scare off the intruders. Within a hand’s reach Ajax Button is very compact and almost weightless. You can always keep it on the body or set it up on any surface. Without false alarms The body of the Ajax Button is designed to prevent false alarm even if you sit or lay on it. And to ensure additional protection, you can set it up to react only on a double tap or a long press (for 1.5 seconds). Guarantees alarm delivery Ajax panic button communicates with a hub using Jeweller Channels protocol on a distance of up to 1300 m. Once it delivers an alarm, you’ll see a green blink. Jeweller encrypts all of the transmitted data. In case of signal interference or radio jamming, Ajax system switches the radio frequency and notifies you as well as the security company about the situation. Signal range up to 1300 m Alarm delivery confirmation Encryption with a modified AES algorithm Frequency hoppingAdd to Compare
A key fob for controlling security modes. Features a panic button for sending alarms to your inner circle and a security company in case of trouble. Principle of operation The device controls the security modes and sends an alarm signal to the Central Monitoring Station by pressing the buttons on the key fob. Features Authentication prevents replacement of the device and false alarms. Installation and set up Ready to operate straight out the box: the battery is already installed, therefore there is no need to disassemble the detector. With one click, it can be connected to the hub in the mobile application.Add to Compare
5 Handshake programmable sequences. 500 memory events per card. 4 line LCD display with 20 characters for each line. 1 Parallel & 2 serial ports. 2 Rear SBUS connectors. On-board touchpad for manual operation and programming. Supplied with one RC-CARD. 18 Months warranty.Add to Compare
The IP/GSM Receiver receives TCP/IP events and alarms generated by the ACM or GSM/GPRS. When the encrypted data is transmitted to the IP/GSM Receiver, the encryption is opened and, in turn, forwarded to any existing automation software, in either Contact ID or SIA format, emulating any standard receiver.Add to Compare
The SPCN310.000 GSM module can be assigned to any mobile network by the insertion of a standard SIM card. The modem is compatible with the complete range of SPC panels and plugs directly on the main PCB removing the need for any additional wiring. The unit comes with an external antenna that fits on the cabinet. The modem communicates with a central station (ARC) using common format protocols (SIA, Contact ID) or IP over GPRS to SPC Com alarm receiver. It also supports PPP connection to SPC Pro Software for remote programming and configuration up-/download. The SMS feature allows user / engineer to be sent a predefined text when selected events occur in the system or receiving of predefined SMS commands for security system control. The GSM modem can be used as the primary source of communication or as backup to the PSTN modem or IP communication.Add to Compare
Alarm receiver central station running under Linux Operating System. With multiple communication protocols including Secom3, PE1800XS alarm receiver has been specifically designed around Domonial system features to provide a high service level to the monitoring station and the installer.Add to Compare
The SPCN110.000 PSTN module (up to 56K) is compatible with the complete SPC panel range and plugs directly on the main PCB removing the need for any additional wiring. The modem can take control of the line and communicates with a central station (ARC) using common format protocols (SIA, Contact ID). It also supports PPP connection to SPC Pro software for remote programming and configuration up-/download. The PSTN modem can be used as the primary source of communication or as backup to GSM modem.Add to Compare
Enables PCX and Enforcer panels* to upload/download data to a PC running InSite 2013 v9.1r software. Up to 4 alarm calls (to ARC or mobile phone SMS message). *Except Euro Mini range (non communicating Grade 2x panels). Fast Format 4.8.1, 4.16.1, 6.8.1 & 6.16.1TelenotSIA Level 1SIA-DKContact IDARM Compatible (Automatic Remote Maintenance)Add to Compare
GPRS module for use with the PCX 46 and Enforcer 32-WE panels, allowing up/download, ARC and SMS messaging. The GPRS module is used to communicate either via Contact ID IP, Fast Format IP, SIA IP or SMS. It will also enable remote uploading/downloading via a PC to the control panel. DIGI-GPRS can only be used on PCX 46 (Export only) and Enforcer version 10 and above control panels (inc. Enforcer 32-WE APP).Add to Compare
Digi GSM Modem for PCX 46 panels v9 and above and Enforcer v9 and above. The Digi-GSM provides SMS text messaging for communication of alarm events, remote control and remote diagnostics for the Enforcer control panel. It also communicates Fast Format and Contact ID. An antenna is supplied on purchasing the Digi-GSM and can be easily installed on an existing or new installation. Please note a SIM card is not supplied. Up/downloading over GSMAllows communication between the panel and PC running our unique UDL software for up/downloading, diagnostic interrogation, and Automatic Remote Maintenance (ARM©) (subject to network) ARC Signalling over GSMAllows alarm messages to be sent to a central alarm receiving centre via common protocols Fast Format and SIA. SMS Messaging overGSM Allows text messages to be sent via GSM directly to up to 4 mobile telephones.Add to Compare
WiFi Network communication module for the Pyronix IP control panels Uses existing broadband Communicates via the PyronixCloud, so no complicated port forwarding setup is required Low cost installation with no additional costs other than the existing broadband connection Send push notifications directly to the user’s smartphone via the HomeControl+ App Easy setup by DHCP or manual IP configuration Fully secure IP connection Compatible with InSite programming software Supplied with an antenna (1m cable)Add to Compare
The residential home security market is rapidly migrating away from PSTN lines toward IP communications. As a result, security service providers need to adopt new communications technologies. Visonic offers a complete set of solutions for IP-based security services. Our solutions are ideal for service providers who wish to take advantage of this large and fast-growing Internet opportunity to not only meet changing customer needs but also to maximise recurring revenues.Visonic's range of IP solutions offers compelling advantages for alarm monitoring stations and security service providers. These advantages include more reliable communication, reduced costs and the opportunity to differentiate through premium services.IP Management Platform - IPMPA unique service management platform that provides a total solution for the management of IP-based services. It serves as the IP receiver for all Visonic communications modules (GPRS and broadband). The unique architecture of Visonic's IPMP - targeted to the needs of security service providers - makes it one of the most cost-effective IP service management solutions on the market. A single IPMP receiver can easily handle up to 20,000 accounts at a keep-alive period of 2 minutes. The IPMP delivers the events received to the central station software using standard receiver protocols, so the ARC software does not need any special adaptations in order to work with IPMP.The IPMP supervises the IP and cellular internal modules and forwards all events received from them to the central station software. This enabling the central station operator to track an alarmed system quickly, and to view the alarm-time recorded images via a standard web browser on the operator console, with no need to leave his/her work station. PowerLink An Internet-based solution for advanced home security and control. It provides a plug and play broadband IP event notification solution for alarm central stations. Also, it can be expanded with up to 12 cameras placed around the premises to create a comprehensive IP-based video alarm verification solution.GPRS connectivity Our GPRS modules ensure maximum reliability of event delivery to the alarm central station. It also includes advanced features such as two-way voice communication and SMS control.Add to Compare
Software based alarm receiver interface for connecting with Premier ComIP alarm signalling equipment. Supports fast format, contact ID and SIA communication protocols. Manages received polling information for each monitored site.Add to Compare
The SPCN910.000 is an interface module which will enable the SPC control panel to support secure alarm signaling services offered within the UK. A range of 3rd party single & dual path communication devices, offered by UK market leaders in the provision of these services, can be easily connected to the module & placed within SPC G2 & G3 cabinets.Add to Compare
The GSM/GPRS module is an easy to add plug-in module that enables the system to communicate over the GPRS/GSM networks for reporting, control and programming. It can be used as the primary communication or as a back up for the IP or PSTN communications in case of communication failure. Reporting events to monitoring stations can be done over voice, SMS or GPRS using the RISCO IP Receiver. The GSM/GPRS module also supports two- way voice communication which is beneficial for elderly care, allowing two way communication with users in times of emergency.Add to Compare
Fully redundant Internet and Cellular dual-path alarm communication Integrated call routing Panel remote uploading/downloading support via Cellular and Internet Supervision heartbeats via Cellular and Internet 128-bit AES encryption via Cellular and Internet Full event reporting SIA and Contact ID protocolAdd to Compare
Full duplex hands free Can be used as a fully operational phone On-board microphone and speaker Remote microphone and speaker outputs Full remote control via DTMF tones Output remote control External antenna Automatic Phone Number Recoginition (CLIP) 6 On-board programmable inputs (Expandable to 14) 4 On-board programmable outputs (Expandable to 52) 9 Destination phone numbers Voice/SMS messages to each input 256 event memory log, time and date stampedAdd to Compare
Half duplex hands free Can be used as a fully operational phone On-board microphone and speaker Remote microphone and speaker outputs Full remote control via DTMF tones Output remote control Automatic Phone Number Recoginition (CLIP) 6 On-board programmable inputs 4 On-board programmable outputs 9 Destination phone numbers Voice messages to each input 256 event memory log, time and date stampedAdd to Compare
WiFi Network communication module for the IP connected control panels Uses existing broadband Communicates via the PyronixCloud, so no complicated port forwarding setup is required Low cost installation with no additional costs other than the existing broadband connection Send push notifications directly to the user’s smartphone via the HomeControl+ App Easy setup by DHCP or manual IP configuration Fully secure IP connection Compatible with InSite programming softwareAdd to Compare
The PIMA GSM-100™ is a tri-band GSM module, which integrates fully with PIMA’s control panels - a full-data transmitter that supports most popular Central Monitoring Stations (CMS) protocols. Integrated GSM module (installed in the same box as the control panel) Easy and simple installation: Just plug it to the panel and it is set for operation Does not require phone line and thus requires no special settings and adjustments Fully programmed via the alarm system keypad, locally or remotely via a windows based download software, or via a fast programmer tool Full-Data Reporting Tri-band engine, suitable almost anywhere in the worldThe unit is highly suitable as backup to a regular PSTN line communicator, in building & construction plants where a PSTN line is unavailable or as the main communicator with boats in marinas, holiday homes, etc. where leasing a PSTN line is unwarranted.In addition, the GSM-100™ presents a number of opportunities for Central Monitoring Stations (CMS), as the GSM module sends short messages via voice channel requiring no additional CMS hardware, with low operational costs and vast coverage with the GSM network.Add to Compare
The SD3, showcased at FIREX 2007, is the latest development in Menvier's world-beating speech dialler range. In addition to the standard PSTN connection, the SD3 also has an integral, full-function GSM module enabling it to use any of the standard mobile phone networks. The SD3 accepts all standard SIM cards (not supplied).The unit is user programmable allowing the user to digitally record a standard ‘home' message and up to eight individual trigger messages, enter up to ten contact phone numbers and select the type of message for each input. A user can select to send messages (either spoken or SMS text) via either connection or via both, if both, they can further pre-select which will dial first. Four programmable outputs are provided allowing designated users to dial into an SD3 at anytime and remotely switch up to four connected devices. These can also be controlled when a message has been received and the line is still open. The integral microphone allows any person called to listen-in to the premises and even talk back, if required.SD3 has an additional unique feature that opens up a whole new area of use for speech diallers. When an input is triggered, an automatic digital sound recorder can be programmed to record and store either the next 15 or 30 seconds of sound received from the integral microphone. This can be replayed either at the unit itself or, remotely, from anywhere in the world, via a fixed or mobile telephone.An integral, digital sensor can be preset at any given temperature from 0°C - 50°C and will automatically transmit a message when that temperature has been reached or exceeded. Ideal for ensuring that buildings or rooms never get to too cold if the heating system fails.The wide operating voltage range, 10.5VDC -28VDC, enables an SD3 to be used for monitoring virtually any kind of system, intruder, fire, access or Building Management System (BMS). Reducing the need for an installer to have to stock separate 12 and 24VDC versions.Cooper showcased the SD3 along with a wide range of their other products at FIREX 2007.Add to Compare
Texbase is an alarm management software package designed for use in conjunction with the Premier Elite Com IP and Montex software, ideally suited to installers who wish to individually monitor their installed security systems for specific alarm signals. Texbase is event selectable, features include printable reports, detailed account history and alarm status emailing.Add to Compare
Commercial fire ethernet IP communicator Works with any control panel that communicates using contact ID format Configured for standalone commercial fire applications Compliant with NFPA72 Editions: 2002, 2007, 2010 Power supply included Compatible with most control panels that use the Contact ID formatAdd to Compare
DSC 3G2055 wireless alarm communicator features panel remote uploading/downloading support via HSPA, supervision heartbeats, 128-bit AES encryption, remote activating and programming through C24 communications, full event reporting and 2-Way voice over cellular. It is compatible with Sur-Gard system I/II/III/IV monitoring station receivers.Add to Compare
DSC TL2553G is a fully redundant internet and HSPA dual-path alarm communication. It features integrated call routing, 128-bit AES encryption via HSPA and internet, SIA and contact ID protocol and 2-Way voice over cellular. It is compatible with Sur-Gard System I/II/III/IV monitoring station receiversAdd to Compare
Allows extension of the PC-LINK connection by 50 feet(15 m) so communicator can be mounted in separate enclosure from panel Distance can be extended up to 1000 feet (300 m) if additional power supply is used Compatible with 3G2080, TL2803G and TL280 alarm communicatorsAdd to Compare
Browse Intruder Alarms: Communicators & Communication Systems
Intruder alarm communicator products updated recently
In the field of access control, face recognition has come a long way. Once considered too slow to authenticate people's identities and credentials in high traffic conditions, face recognition technology has evolved to become one of the quickest, most effective access control identity authentication solutions across all industries. Advancements in artificial intelligence and advanced neural network (ANN) technology from industry leaders like Intel have improved the accuracy and efficiency of face recognition. However, another reason the technology is gaining traction is due to the swiftly rising demand for touchless access control solutions that can help mitigate the spread of disease in public spaces. Effective for high volumes Face recognition eliminates security risks and is also virtually impossible to counterfeit Modern face recognition technology meets all the criteria for becoming the go-to solution for frictionless access control. It provides an accurate, non-invasive means of authenticating people's identities in high-traffic areas, including multi-tenant office buildings, industrial sites, and factories where multiple shifts per day are common. Typical electronic access control systems rely on people providing physical credentials, such as proximity cards, key fobs, or Bluetooth-enabled mobile phones, all of which can be misplaced, lost, or stolen. Face recognition eliminates these security risks and is also virtually impossible to counterfeit. Affordable biometric option Although there are other biometric tools available, face recognition offers significant advantages. Some technologies use hand geometry or iris scans, for example, but these options are generally slower and more expensive. This makes face recognition a natural application for day-to-day access control activities, including chronicling time and attendance for large workforces at construction sites, warehouses, and agricultural and mining operations. In addition to verifying personal credentials, face recognition can also identify whether an individual is wearing a facial covering in compliance with government or corporate mandates regarding health safety protocols. Beyond securing physical locations, face recognition can also be used to manage access to computers, as well as specialised equipment and devices. Overcoming challenges with AI So how did face recognition become so reliable when the technology was once dogged by many challenges, including difficulties with camera angles, certain types of facial expressions, and diverse lighting conditions? Thanks to the emergence of so-called "convolutional" neural network-based algorithms, engineers have been able to overcome these roadblocks. SecurOS FaceX face recognition solution FaceX is powered by neural networks and machine learning which makes it capable of authenticating a wide range of faces One joint effort between New Jersey-based Intelligent Security Systems (ISS) and tech giant Intel has created the SecurOS FaceX face recognition solution. FaceX is powered by neural networks and machine learning which makes it capable of authenticating a wide range of faces and facial expressions, including those captured under changing light, at different resolution levels, and varying distances from the video camera. Secure video management system A common face recognition system deployment begins with IP video cameras that feed footage into a secure video management system connected to a video archive. When the software initially enrolls a person’s face, it creates a "digital descriptor" that is stored as a numeric code that will forever be associated with one identity. The system encrypts and stores these numeric codes in a SQL database. For the sake of convenience and cost savings, the video server CPU performs all neural network processes without requiring any special GPU cards. Unique digital identifiers The next step involves correlating faces captured in a video recording with their unique digital descriptors on file. The system can compare newly captured images against large databases of known individuals or faces captured from video streams. Face recognition technology can provide multi-factor authentication, searching watchlists for specific types of features, such as age, hair colour, gender, ethnicity, facial hair, glasses, headwear, and other identifying characteristics including bald spots. Robust encryption SED-compatible drives rely on dedicated chips that encrypt data with AES-128 or AES-256 To support privacy concerns, the entire system features an encrypted and secure login process that prevents unauthorized access to both the database and the archive. An additional layer of encryption is available through the use of Self-Encrypting Drives (SEDs) that hold video recordings and metadata. SED-compatible drives rely on dedicated chips that encrypt data with AES-128 or AES-256 (short for Advanced Encryption Standard). Anti-spoofing safeguards How do face recognition systems handle people who try to trick the system by wearing a costume mask or holding up a picture to hide their faces? FaceX from ISS, for example, includes anti-spoofing capabilities that essentially check for the "liveliness" of a given face. The algorithm can easily flag the flat, two-dimensional nature of a face mask, printed photo, or image on a mobile phone and issue a "spoof" alarm. Increased speed of entry Incorporating facial recognition into existing access control systems is straightforward and cost-effective Incorporating facial recognition into existing access control systems is straightforward and cost-effective. Systems can operate with off-the-shelf security cameras and computers. Users can also leverage existing infrastructure to maintain building aesthetics. A face recognition system can complete the process of detection and recognition in an instant, opening a door or turnstile in less than 500ms. Such efficiency can eliminate hours associated with security personnel checking and managing credentials manually. A vital tool Modern face recognition solutions are infinitely scalable to accommodate global enterprises. As a result, face recognition as a credential is increasingly being implemented for a wide range of applications that transcend traditional access control and physical security to include health safety and workforce management. All these capabilities make face recognition a natural, frictionless solution for managing access control, both in terms of performance and cost.
The past year has elevated consumer awareness about personal safety, from COVID-19 issues to social unrest, making safety top-of-mind and the need for personal safety solutions, even more prevalent. In addition, consumers spent more time at home, as schools closed, events were canceled and remote work increased. This prompted two major shifts that, in my opinion, most significantly opened the need for and raised the popularity of mobile safety solutions. Demand for grocery and food delivery apps surged Rise in use of app-based delivery services During the past 18 months, the use of app-based delivery services has skyrocketed During the past 18 months, the use of app-based delivery services has skyrocketed. With more use comes more interactions among strangers in homes and businesses, and while the majority of these moments are completely safe and convenient, incidents are happening, ranging from uncomfortable situations to physical assaults. And, with more delivery drivers on the road, there are going to be more accidents among gig-economy workers. Based on recent estimates, food and grocery delivery are expected to remain popular, even as we get back to normal life. High popularity of mobile security apps and wearables With more work shifting from stationary locations to working on-the-go, mobile security apps or wearables can be a lifeline in all sorts of situations. It’s important for these mobile safety products to be comprehensive, dynamic and designed to address the full range of people’s safety and security needs, from providing simple human reassurance to dispatching emergency help. Domestic violence cases increased According to the National Domestic Violence Hotline, due to COVID-19 lockdown restrictions, domestic violence rose as a result of many victims being stuck at home with their abusers, while sheltering in place and working from home. Mobile safety apps, such as ADT’s SoSecure U.S. Attorneys General and other state-elected officials have endorsed mobile safety apps, like SoSecure by ADT These situations necessitate the need for discreet ways for victims to call for help. U.S. Attorneys General and other state-elected officials have endorsed mobile safety apps, like SoSecure by ADT, as a tool to help victims of domestic abuse, safely call for help, without alerting their abuser. Over the past year, the mobile safety app market has seen tremendous innovation, including more user-friendly ways to make SOS calls. Today, within a single app, a person can summon help hands-free, by saying a secret phrase, by text or by swiping a button. Extension of mobile safety into wearable devices And, users can connect with people trained to help in unsettling situations over video, which can be an effective deterrent and provide video evidence. We’ve also seen the extension of mobile safety into wearable devices, in order to make these devices more discreet and usable. There will always be some safety risks in our lives. However, the good news is there’s no need to live in a constant state of fear. The easiest, most direct way to be prepared and ready to ‘fight back’ is by having a personal safety tool in your pocket, a mobile safety app that is there, when you need it most.
Intrusion alarm systems are currently facing a growing number of potential error sources in the environment. At the same time, alarm systems must comply with increasingly demanding legal requirements for sensors and motion detectors. As a future-proof solution, detectors equipped with Sensor Data Fusion technology raise the level of security while reducing the risk of cost- and time-intensive false alarms. This article provides a comprehensive overview of Sensor Data Fusion technology. Anti-masking alarms A cultural heritage museum in the South of Germany for decades, the installed intrusion alarm system has provided reliable protection on the premises. But suddenly, the detectors trigger false alarms every night after the museum closes. The system integrators are puzzled and conduct extensive tests of the entire system. When they finally identify the culprit, it’s unexpected: As it turns out, the recently installed LED lighting system in the museum’s exhibition spaces radiates at a wavelength that triggers anti-masking alarms in the detectors. Not an easy fix situation, since a new lighting system would prove far too costly. Ultimately, the integrators need to perform extensive detector firmware updates and switch to different sensor architecture to eliminate the error source. This scenario is by no means an isolated incident, but part of a growing trend. Need for reliable detector technology Legal requirements for anti-masking technology are becoming stringent in response to tactics by criminals The number of potential triggers for erroneous alarms in the environment is on the rise. From the perspective of system operators and integrators, it’s a concerning development because every false alarm lowers the credibility of an intrusion alarm system. Not to mention steep costs: Every false call to the authorities comes with a price +$200 tag. Aside from error sources in the environment, legal requirements for anti-masking technology are becoming more stringent in response to ever more resourceful tactics employed by criminals to sidestep detectors. What’s more, today’s detectors need to be fortified against service outages and provide reliable, around-the-clock operability to catch intruders in a timely and reliable fashion. Sensor Data Fusion Technology In light of these demands, one particular approach has emerged as a future-proof solution over the past few years: Sensor Data Fusion technology, the combination of several types of sensors within one detector – designed to cross-check and verify alarm sources via intelligent algorithms – holds the keys to minimising false alarms and responding appropriately to actual alarm events. This generation of detectors combines passive infrared (PIR) and microwave Doppler radar capabilities with artificial intelligence (AI) to eliminate false alarm sources without sacrificing catch performance. Motion detectors equipped with Sensor Data Fusion technology present a fail-proof solution for building security “It’s not about packing as many sensors as possible into a detector. But it’s about including the most relevant sensors with checks and balances through an intelligent algorithm that verifies the data for a highly reliable level of security. The result is the highest-possible catch performance at the minimum risk for erroneous alarms,” said Michael Reimer, Senior Product Manager at Bosch Security Systems. Motion detectors with sensor data fusion Looking ahead into the future, motion detectors equipped with Sensor Data Fusion technology not only present a fail-proof solution for building security. The comprehensive data collected by these sensors also unlock value beyond security: Constant real-time information on temperature and humidity can be used by intelligent systems and devices in building automation. Integrated into building management systems, the sensors provide efficiency improvements and lowering energy costs Integrated into building management systems, the sensors provide the foundation for efficiency improvements and lowering energy costs in HVAC systems. Companies such as Bosch support these network synergies by constantly developing and optimising intelligent sensors. On that note, installers must be familiar with the latest generation of sensor technology to upgrade their systems accordingly, starting with a comprehensive overview of error sources in the environment. Prominent false alarm triggers in intrusion alarm systems The following factors emerge as frequent triggers of false alarms in conventional detectors: Strong temperature fluctuations can be interpreted by sensors as indicators of a person inside the building. Triggers range from floor heating sources to strong sunlight. In this context, room temperatures above 86°F (30°C) have proven particularly problematic. Dust contamination of optical detectors lowers the detection performance while raising susceptibility to false alarms. Draft air from air conditioning systems or open windows can trigger motion sensors, especially when curtains, plants, or signage attached to the ceilings (e.g. in grocery stores) are put in motion. Strong light exposure directly on the sensor surface, e.g. caused by headlights from passing vehicles, floodlights, reflected or direct sunlight – all of which sensors may interpret as a flashlight from an intruder. Extensive bandwidth frequencies in Wi-Fi routers can potentially confuse sensors. Only a few years ago, wireless routers operated on a bandwidth of around 2.7GHz while today’s devices often exceed 5GHz, thereby catching older detectors off guard. LED lights radiating at frequencies beyond the spectrum of visible light may trigger sensors with their infrared signals. Regarding the last two points, it’s important to note that legislation provides clear guidelines for the maximum frequency spectrum maintained by Wi-Fi routers and LED lighting. Long-term security But the influx of cheap and illegal products in both product groups – products that do not meet the guidelines – continues to pose problems when installed near conventional detectors. For this reason, Sensor Data Fusion technology provides a reliable solution by verifying alarms with data from several types of sensors within a single detector. Beyond providing immunity from false alarm triggers, the new generation of sensors also needs to comply with the current legislature. These guidelines include the latest EN50131-grade 3, and German VdS class C standards with clear requirements regarding anti-masking technology for detecting sabotage attempts. This is exactly where Sensor Data Fusion technology provides long-term security. Evolution of intrusion detector technology Initially, motion detectors designed for intrusion alarm systems were merely equipped with a single type of sensor; namely passive infrared technology (PIR). Upon their introduction, these sensors raised the overall level of building security tremendously in automated security systems. But over time, these sensors proved limited in their catch performance. As a result, manufacturers began implementing microwave Doppler radar capabilities to cover additional sources of intrusion alarms. First step detection technology In Bosch sensors, engineers added First Step detection to trigger instant alarms upon persons entering a room Over the next few years, sensors were also equipped with sensors detecting visible light to catch flashlights used by burglars, as well as temperature sensors. In Bosch sensors, engineers added proprietary technologies such as First Step detection to trigger instant alarms upon persons entering a room. But experience in the field soon proved, especially due to error sources such as rats and other animals, that comprehensive intrusion detection demands a synergetic approach: A combination of sensors aligned to cross-check one another for a proactive response to incoming signals. At the same time, the aforementioned bandwidth expansion in Wi-Fi routers and LED lighting systems required detectors to implement the latest circuit technology to avoid serving as ‘antennas’ for undesired signals. Sensor data fusion approach At its very core, Sensor Data Fusion technology relies on the centralised collection of all data captured by the variety of different sensors included in a single detector. These data streams are directed to a microprocessor capable of analysing the signals in real-time via a complex algorithm. This algorithm is the key to Sensor Data Fusion. It enables the detector to balance active sensors and adjust sensitivities as needed, to make truly intelligent decisions regarding whether or not the data indicates a valid alarm condition – and if so, trigger an alarm. Advanced verification mechanisms The current generation of Sensor Data Fusion detectors, for instance from Bosch, feature advanced verification mechanisms, including Microwave Noise Adaptive Processing to easily differentiate humans from false alarm sources (e.g. ceiling fans or hanging signs). For increased reliability, signals from PIR and microwave Doppler radar are compared to determine whether an actual alarm event is taking place. Additionally, the optical chamber is sealed to prevent drafts and insects from affecting the detector, while the detector is programmed for pet and small animal immunity. Sensor cross-verification Further types of sensors embedded in current and future generations of Sensor Data Fusion detectors include MEM-sensors as well as vibration sensors and accelerometers. Ultimately, it’s important to keep in mind that the cross-verification between sensors serves to increase false alarm immunity without sacrificing the catch performance of actual intruders. It merely serves to cover various indicators of intrusion. Protecting UNESCO World Cultural Heritage in China Intelligent detectors equipped with Sensor Data Fusion are protecting historic cultural artifacts in China from theft and damage. At the UNESCO-protected Terracotta Warriors Museum site, one hundred TriTech motion detectors from Bosch with PIR and microwave Doppler radar technology safeguard the invaluable treasures against intruders. To provide comprehensive protection amid the specific demands of the museum site, the detectors have been installed on walls and ceilings to safeguard the 16,300-square-meter museum site. To ensure an optimal visitor experience without interference from glass walls and other barriers, many detectors are mounted at a height of 4.5 meters (15 feet) above ground under the ceiling. Despite their height, the detectors provide accurate data around the clock while exceeding the performance limits of conventional motion detectors, which clock out at a mere 2 meters (6 feet) catchment area. Integrated video systems The site also presents additional error sources such as large amounts of dust that can contaminate the sensors, as well as visitors accidentally dropping their cameras or mobile phones next to museum exhibits. To distinguish these events from actual criminal activity, the intrusion alarm system is integrated with the museum’s video security system. This allows for verifying alarm triggers with real-time video footage at a fast pace: In the case of an actual alarm event, the system alerts the on-site security personnel in the control room in less than two seconds. Added value beyond security Sensor Data Fusion technology provides a viable solution for the rising number of error sources in the environment As of today, Sensor Data Fusion technology already provides a viable solution for the rising number of error sources in the environment while providing legally compliant building security against intruders. In light of future developments, operators can leverage significant added value from upgrading existing systems – possibly without fundamentally replacing current system architecture – to the new detector standard. Added value how? On one hand, the detectors can integrate with access control, video security, voice alarm, and analytics for a heightened level of security. These synergetic effects are especially pronounced on end-to-end platforms like the Bosch Building Management system. On the other hand, the data streams from intelligent detectors also supply actionable intelligence to building automation systems, for instance as the basis for efficiency improvements and lowering energy consumption in HVAC systems. New backward-compatible detectors Bosch will release a new series of commercial detectors by end of 2021, based on the latest research on risk factors for false alarm sources in the environment and line with current legislation and safety standards. Throughout these developments, installers can rest assured that all new detectors are fully backward compatible and work with existing networking/architecture. With that said, Sensor Data Fusion technology emerges as the key to more secure intrusion alarm systems today and in the future. TriTech detectors from Bosch For reliable, fail-proof alarms the current series of TriTech detectors from Bosch relies on a combination of different sensor data streams, evaluated by an integrated algorithm. These Sensor Data Fusion detectors from Bosch combine up to five different sensors in a single unit, including: Long-range passive infrared (PIR) sensor Short-range PIR sensor Microwave sensor White light sensor Temperature sensor Equipped with these sensors, TriTech detectors are capable of detecting the most frequent sources of false alarms; from headlights on passing cars to a mouse passing across the room at a 4.5-meter distance to the detector. What’s more, TriTech detectors provide reliable performance at room temperatures above 86°F (30°C) while fully guarding against actual intrusion and sabotage attempts from criminals.
Related white papers
Preparing your organisation with quality situational awareness
14 success stories about how video technology is improving city lifeDownload
Empowering cameras with AIDownload
The rise of ethical facial recognitionDownload
Webcast: Access control integration increases security while reducing costsDownload
Bosch provides their Praesensa public address and voice alarm system at Wycombe Wanderers’ Adams Park stadium
- Bosch provides their Praesensa public address and voice alarm system at Wycombe Wanderers’ Adams Park stadium
- Mister Car Wash picks Interface Security Systems to upgrade its security operations nationwide
- SmartTask’s mobile operations selected by 360 Alert Security to streamline mobile patrol & alarm response activities and drive service delivery
- G4S ensures state-of-the-art diplomatic security services provided at foreign embassies in Jordan