Integration: access control with digital surveillance

Access & Identity Management Handbook 2006 Access Control & Identity Management

The ‘convergence trend’ taking place in the security industry brings with it a host of really interesting market developments.

Fuelled by a general awareness of information technology the market is driving product development with expectations in terms of information access and automated system management.

A typical example of this is integrated security systems where the demand is for singular point of information access and control and in particular, rules-based system control and trends analysis. Probably the most common requirement is that of integrated video surveillance, access control and alarm management.

This article looks at some of the special system features that can be achieved by integrating access control with video surveillance. While there are many alarm situations that can be detected and reported by both the video surveillance and access control systems, alarm management and the integration of alarm panels is a subject in its own right.

Consider an integrated system along the lines of that depicted in Figure 1 below. A digital video system, which may be either integrated (PC-based) digital video recorders or video-over-IP encoders and cameras, or even a composite blend of the two architectural types, is connected via LAN to an access control system server.

Figure 1. Integrated digital video surveillance and access control system
Figure 1. Integrated digital video surveillance and access control system

The underlying principle is simplicity in architecture, complexity in information exchange. Important aspects to the integration engineering are as follows:

* Each subsystem can independently carry out its basic function, either providing surveillance monitoring and video recording or controlling access to premises.

* Each subsystem can be interrogated, controlled and in particular configured at an applicable user interface.

* An additional server plays host to integrated system software capable of accessing information from the databases in each subsystem and controlling each subsystem, typically via an application programme interface (API).

* The host server also provides a highly interactive user interface, typically with multiple screens.

* Additional client stations can be added for large sites and for providing remote monitoring on alarm escalation by a security manager.

Integration software packages are available in varying degrees of power, lists of integrated brands and subsequent cost. Some higher-end video surveillance and access control system vendors offer integration with selected brands of the other system type, but a market has also emerged for vendors of so-called independent integration software packages. These are often marketed as enterprise management systems with extensive lists of drivers for equipment that can be integrated (and hefty price tags). Even in our simple integration example the host software should ideally be capable of:

* Allowing an operator to monitor, control and evaluate information for both systems from a single, multiscreen console.

* Displaying system resource information relative to a hierarchical site map with icons indicating position and views of cameras, door states and so on.

* Presenting information on events in such a way as to provide easy understanding of occurrences as well as detailed reporting functionality.

* Processing event triggers to allow for a customised response (rules-based engine) in a logical 'if-then' formula.

* Providing a trend analysis capability to graph long-term trends and to isolate and report on unusual activities.

The screen capture of Figure 2 shows a typical example of information presentation. Some of the interesting facilities offered by this integration include:

* Automatic video recording of access events along with access token details and retrieval of historical video based on a search by token number or any other token holder information.

* Generation of alarms due to events such as use of black-listed tokens and forced doors with clear representation of entry point and nearest video camera view on site map.

* Detection of 'tailgating' using video object counting coupled with expectation in token acceptance.

* Trends analysis of entries to determine unusual situations such as excessive overtime, frequent access to areas where employee has no business.

* Tracking of visitors from zone to zone with contiguous video data based on token usage.

* Remote access control by operator based on visual verification of token holder.

Figure 2. Typical information presentation
Figure 2. Typical information presentation

These are just some of the more obvious facilities that a well-integrated system can provide - there will be more that can be created on a custom basis. As other systems are integrated, the list of interaction will grow, such as 'open all doors on fire detection system alarming' or 'switch on lights when building accessed after hours' - but that is the subject of a more in-depth look at building management.

Maximising the installation of integrated systems is the domain of the specialist systems integrator with knowledge gleaned from experience.

For more information contact Clive Putman, i to i technologies, +27 (0) 31 562 9535.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...
Unlocking efficiency and convenience
OPTEX Access Control & Identity Management Transport (Industry)
The OVS-02GT vehicle detection sensor is the newest member of Optex’s vehicle sensor range, also known as ‘virtual loop’, and offers reliable motion detection of cars, trucks, vans, and other motorised vehicles using microwave technology.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...
Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...