A simple system for complex protection

Issue 8 2023 Surveillance, AI & Data Analytics, IoT & Automation

Reconeyez is a company that provides autonomous wireless visual verification systems with built-in artificial intelligence. The systems are used in various industries, including defence, law enforcement, border security, critical infrastructure, private security, and commercial environments. It is easy and quick to install.

The system is designed for use in inaccessible areas where there is no or limited power and communications infrastructure. Running on batteries, each ‘Detector’ includes communication capabilities, creating a mesh network between the various devices, enabling users to receive alarm events without installing a dedicated network. Since it is a mesh network, communications will continue, even if one device is inoperable.

Reconeyez devices communicate using secure and reliable 2,4 GHz low-power radios. The signals can reach up to 500 m with direct line-of-sight or about 100 m if obstructions exist between the devices or the bridge. Eight detectors (depending on the environment) can be managed and connected to a single bridge, a communication gateway that provides a 4G mobile data connection. The bridge has a battery life of around 150 days, which can be extended with an additional battery pack or a solar panel.

The Bridge I/O is a multi-frequency radio transceiver that connects Reconeyez Detectors with the control room. It combines three modules: short-range radio, long-range radio and battery. With three inputs and five outputs, the Bridge I/O offers high automation and security, allowing users to integrate third-party systems and sensors with Detectors.

Detection via PIR

Reconeyez Detectors use passive infrared (PIR) sensors and signal analysis to track thermal signatures across the monitored area (it sports a 35 m detection range). Once motion is detected, the Detector activates the appropriate camera for the available light conditions, captures an image and generates an alarm. A range of snapshots can be sent to a central control room to provide operators with insight into whatever caused the alarm.

The AI Reconeyez uses is supported by machine learning algorithms, which means it learns as it works, continually improving its recognition capabilities to reduce false alarms.

Each Detector also includes two different cameras to ensure the system can capture images in all light and weather conditions. A colour daytime camera captures clear HD images during the day, while a monochrome camera is automatically used during low light conditions, and an infrared flash illuminates the area in case of darkness.

The day camera can capture 1920 × 1080 images, while the night camera produces images with a resolution of 1280×960. Operators can adjust the resolution of either camera via a cloud-based management platform. Up to 2000 images can be stored on the device’s internal memory.

The system captures snapshots instead of full video streams to ensure optimal battery life. This means Reconeyez can continue autonomous operations without human intervention for up to 400 days (or 50 000 events). The operating time can be extended by adding an extra battery pack or attaching a solar panel.

As it is designed for inaccessible, harsh areas, the hardware has been field-tested from -40°C to +60°C. It is also encased in a rugged IP67-rated enclosure, making it resistant to frequent moving, transporting, and environmental conditions.

Additional products are available as an add-on to the system, including a battery-powered siren offering 400 days of standby time or 200 hours of constant alarm. A wireless keypad designed for arming and disarming the Reconeyez security system is also available, suited for construction sites and other environments where frequent arming and disarming is necessary. The keypad battery supports 400 days of standby time or 300 keypad operations.

Cloud control

The Reconeyez Cloud empowers users to manage all their devices remotely, from setting up, configuring, managing, and controlling individual devices, to whole sites. View, track and configure events as they occur or adjust device parameters based on intelligent analysis of previously recorded incidences. With Internet access, the cloud-based control centre is always available. A mobile app is also available to make sure authorised users remain in control wherever they are.

Reconeyez (www.reconeyezsa.co.za, www.reconeyez.com) is distributed by Blacklight Group SA.

For more information, contact Blacklight Group, info@blacklightgroup.co.za, www.reconeyezsa.co.za




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...
Access & identity expectations for 2024
Technews Publishing IDEMIA ZKTeco Gallagher Salto Systems Africa Regal Distributors SA Reditron Editor's Choice Access Control & Identity Management Information Security AI & Data Analytics
What does 2024 have in store for the access and identity industry? SMART Security Solutions asked several industry players for their brief thoughts on what they expect this year.

Read more...
The promise of mobile credentials
Technews Publishing Suprema neaMetrics HID Global Editor's Choice Access Control & Identity Management IoT & Automation
SMART Security Solutions examines the advantages and disadvantages of mobile credentials in a market dominated by cards and fobs, in which biometrics is viewed as a secure alternative.

Read more...
Eliminate privacy concerns and enhance security
Suprema Access Control & Identity Management IoT & Automation
Suprema’s Template on Mobile enables secure access to corporate facilities and assets using facial recognition biometric devices, while protecting users’ privacy.

Read more...
Embracing next-generation surveillance for safer cities
Surveillance Integrated Solutions AI & Data Analytics
With the South African government highlighting the importance of building smart cities by integrating advanced technologies to make them more resilient and liveable, the role of next-generation network video and surveillance technologies cannot be ignored.

Read more...
Hik-Connect for Teams released
Hikvision South Africa Products & Solutions Surveillance
Hikvision has released an update for its security management platform; Hik-Connect for Teams not only meets the specific needs of individual users, but also caters to various medium-sized businesses (SMBs) and multi-site management scenarios.

Read more...
The human factor side of video management systems
Leaderware Editor's Choice Surveillance Risk Management & Resilience
A video management system (VMS) is central to, and the most vital element to any control room operation using CCTV as part of its service delivery, however, all too often, it is seen as a technical solution rather than an operational solution.

Read more...
Lock down your access control with Alcatraz AI
C3 Shared Services Healthcare (Industry) Access Control & Identity Management AI & Data Analytics
Alcatraz AI, represented in South Africa by C3 Shared Services, changes access control by harnessing the power of artificial intelligence and analytics at the edge, where facial recognition becomes the essential credential autonomously.

Read more...
Zero Trust in 2024
Mantis Security Integrated Solutions IoT & Automation
The rapid development of artificial intelligence (AI) applications and uses in 2024 will profoundly impact security operations and AI-driven analytics, which can enhance threat detection, anomaly identification and predictive maintenance.

Read more...