Presentation on theme: "1 Enterprise Wide Security Management Software Solution Saugaato Ray Director & CEO SATMAC INFOSYS LTD. Video Management Software Solution."— Presentation transcript:
1 Enterprise Wide Security Management Software Solution Saugaato Ray firstname.lastname@example.org Director & CEO SATMAC INFOSYS LTD. Video Management Software Solution & Video Analytical Intelligence with Omnicast™ Enterprise 4 Managed Video Services Software
2 Server Features… IP Communication Open Platform Bandwidth Management Digital Video IP Public Address Archive Management Storage Management Failover and Redundancy Security Measures User Interface Federation Events / Action Mechanism Alarm Management Motion Detection Hybrid Technology – with analogue Video Analytics Access Control Integration Video Wall Integration Map Creation
3 IP Communication 1.IP Based Architecture: The software should be equipped to enable the management of cameras, monitors, recorders and peripherals through any existing IP network. a)Unequalled Scalability: The software should support for addition of cameras, workstations or any other component of the system anywhere on the network, at any time. Systems can grow from a single camera to tens of thousands of cameras, one camera at a time. b)Network Layout Flexibility: The software should allow seamless network connectivity in case of wired and wireless devices. Hence the software should understand, wired and wireless devices separately.
4 Open Platform 2.Open Architecture: The software should supports a very wide range of IP units and CODECS a)IP cameras, b)Video units c)IP encoders and decoders d)CCTV equipment e)Dome cameras, f)Hardware matrices g)Keyboards and h)Video walls a)Hardware Independence: Major global brands of IP equipment manufacturer should be supported. b)Automatic IP Unit Discovery: The software should have hardware discovery service (plug and play) that automatically detects the addition of new units on the network.
5 Bandwidth Management 3.Bandwidth Management: The software should have bandwidth management tools for local area network and wide area network surveillance bandwidth control a)Multicasting: The software should have multicasting technology which allows a video feed to be viewed by multiple users at multiple locations simultaneously, using the bandwidth of each network segment only once. Hence users wanting to view cameras don ’ t connect to the video source (IP encoder or IP camera), they connect to the network (a multicast group) and gain instantaneous access to all cameras for which they have proper privileges. b)Bandwidth Control: The option for bandwidth control will allow to limit the total amount of bandwidth that each video encoder or IP camera transmits, thus allowing network administrators to limit the maximum amount of bandwidth allocated to the security system.
6 Digital Video 4.Digital Video: The software should give minimum the following and more scope of manipulating with the digital video format. The software should allow minimum 16 camera per monitor. a)Video Quality: Frames / sec: - The software should give real time video of upto 60 frames / sec (maximum capability), regardless of number of camera managed by the system. CIF: - The camera should be capable of giving CIF (Common Intermediate Format) which should be from QCIF (Quarter – CIF) to 4CIF for viewing live as well as stored images. The stored image viewing should be irrespective of a live feed format of the camera. Non-CIF:- The software should support non-CIF resolutions also, in case there is an attachment of higher resolution than 4CIF viz. megapixel IP camera on to the software.
7 Digital Video b)Video Compression: The software should supports a)H.264 b)MPEG-4, c)MPEG-2, d)MJPEG e)Wavelet video encoders c)Multiple Setting Video Streaming: The software should support multiple video streams from a single video encoder or IP camera. This will allow to configure different video settings for different video usage, such as for live viewing, remote live viewing (with restricted bandwidth), recording, or other specific usage. d)Video Down-Sampling: The software should support video down sampling capability for each camera. The down sampling of the camera for the live feed and the recording can be set differently.
8 IP Public Address 5.IP Public Address / Intercom: The software should support an audio application apart from the video application. The audio application should be a separate layer than the video application. The audio application can integrate well with the camera audio and speaker port. The intercom VOIP facility should allow users to interact over voice / audio to all LAN and WAN locations.
9 Archive Management 6.Archive Management The software should allow storage of video, audio and data to any PC based storage device. The storage can be anywhere in the network. a)Standard Storage Technologies: The software should be compatible with any storage technologies like DAS, NAS and SAN, and compatible with any kind of hard-disk viz. IDE, SCSI.
10 Archive Management b)Recording Schedules: The software should have an elaborate schedule for archiving. The schedules should be characterized by recurrence patterns, like daily / weekly / monthly or specific dates, with specific time ranges. The archiving schedule should be applicable to each video stream, irrespective of the video settings (format, frame rate and resolution). The schedule should also have settings to archive based on motion detection, continuous recording or manual recording. c)Relational Database : The software should use relational database (Microsoft SQL Server) to store data associated with video and audio sequences.
11 Storage Management 7.Storage Management Options: –The software should allow user to control the disk space used for the online video archive for each camera, or of a cluster. –The software should also allow to purge old video files after a preset retention period. –The software should allow deletion of files as the storage disk reaches a pre-marked threshold value. –Important video sequences under investigation can also be protected against deletion for any period of time. a)Disk Performance Options: The software should be capable of archive storage of different cameras to different disks controlled by different drive controllers. This allows the system to write on multiple drives in parallel.
12 Failover and Redundancy 8.Failover and Redundancy The software services should have a failover mechanism to guarantee the availability of all critical system components a)Service Availability : The failover is a backup operational mode in which every system component can be backed up by any number of secondary components on standby. As the primary service component goes down the secondary component will take over automatically and seamlessly.
13 Failover and Redundancy b)Data Availability : The software should ensure continuous data (video and audio in file format) availability and should have mechanism to protect from accidental data loss. The software should have the following facility to protect against data loss. a)Redundant Archiving – Redundant archiving is the exact backup copy of the regular archiving with all recorded video, audio and associated data (events and bookmarks) on a camera to camera basis. The redundant archive can be created on to a separate disk array. b)Auxiliary Archiving – The software should be capable of creating redundancy of selected cameras. The auxiliary archives can be setup with a different recording schedule and with a different video quality and image size than the ones used for primary and redundant archives. c)Regular Backups – The software should allow video archives storage media like tapes directly. The software should be fully integrated with Windows NT-Backup utility.
14 Security Measures 9.Security Measures The software should have security against multiple security threats multiple security layers built-in to protect against security threats such as video tampering, non-authorized access to the system, and interception or distortion of video and audio transmissions. a)Command Encryption: The software should have capability to have 128bit SSL encryption from the video encoders / camera to the software. b)Digital Signature: The software should apply digital signature coding to the video files that is being stored. The software should apply digital signature to each and every frame of the video while doing online archiving. Each frame should relate to the previous and next frame digital signature. In case of any tampering tried on the archived data, the software should immediately notify the administrator.
15 Security Measures c)External Access Security: The software should be capable of creating user accounts, and the entire user password will be stored as encrypted data and transmitted as encrypted data as it is passed over the network. All user activity should be logged. d)Internal Access Security : The software should have administrator based control for the following: a)User authentication and individual rights creation on usage of specific features of the software. b)Rights allocation to control services and features. c)Policy creation for specific device access d)Policy creation for cluster and site creation and security rights enabling for a particular cluster and site. e)Camera Blocking :- The software should allow user rights creation for camera blocking in LAN / WAN or Federation environment. This feature should allow administrators and other high-level users to censor specific video feeds from lower-level users. Up to 10 levels of viewing priorities should be defined to suit every configuration needs.
16 User Interface 10.User Interface The user interface of the software should be simple, easy to configure, and can be used by computer non-literates. a)Intuitive UI: The user interface is intuitive and menu driven for easy monitoring. The user interface is optimized for touch screen technology. b)Entity Search Tool: The software being used for large scale surveillance and monitoring. Hence the software should have normal search and advanced search mode for local as well global connectivity.
17 User Interface c)Full Screen Layout The software should be capable of giving a full screen display omitting the non-video part out of the display whenever required. The full screen display should be capable of covering the entire display area in case of video walls. d)Simple/Advanced mode The user interface should have two user modes, one simple for general users and one advanced for administrating operations.
18 Federation – Central Coordination Module 11.Federation The software should be capable of integrating multiple small surveillance networks to a mother network to create a single seamless network for online viewing, archival and total control of remote end camera and other devices. The federation service should be able to incorporate other network operational on all version and models of other video management software.
19 Events / Action Mechanism 12.Events / Action Mechanism The software should support a flexible system to configure the events and action mechanism of the events a)Events: The software should support system behavior of the following minimum events: a) Camera Events b) Archive Events c) PTZ Events d) User Events e) I/O Events The software manufacturer should help in creation of custom events if need be. The events should be tracked in a relational database format of RDBMS for queries and report generation.
20 Events / Action Mechanism b)Actions: The software should have array of standard to take actions on various situations reported in the events log. The minimal requirement of the events are listed below: a)Start / Stop recording. b)Point a camera to a specific preset c)Send email notifications d)Trigger output relays to control external devices e)Trigger alarm
21 Alarm Management 13.Alarm Management The software should have an elaborate alarm management, and every alarm should be archived and searched easily. a)Alarm Specification: Each camera should be configured for alarm. Any alarm can be configured to one or multiple recipient. b)Contextual Alarm: The software should also have capability to handle unpredictable alarm situations. The idea is to let the user define adhoc alarms based on any emergency he sees on a given camera. All the user needs to do is to select the alarm recipients and send it.
22 Alarm Management b)Alarm Handling: The alarm can be triggered easily and can be associated to any events defined in the system. The alarm should be configured to with certain set of trigger commands. The software should be capable to playback of events leading to the triggering separately from the database of the alarm. Users who receive the alarm can do any of the following actions: a)Acknowledge the alarm b)Forward the alarm to another user c)Snooze the alarm (put it temporarily to sleep) d)Show the alarm procedure (if one is defined) All alarm instances should be stored in a database and can be used to search video archive.
23 Alarm Management Associated cameras will be displayed the same way they were shown when the alarm was triggered. Recording can be started automatically when alarms are triggered. Videos and audio associated to alarms should be automatically protected against deletion to secure the evidence.
24 Motion Detection 14.Motion Detection: The software should have the capability to trigger motion detection for each individual camera. The motion detection triggering should not be based on frame analysis and should be based on video analytics of the pixels or blocks. The system administrator can select the level of motion required to trigger an event or the archiving of relevant cameras. The administrator should be able to select the degree of motion to trigger a motion detection alarm. The administrator should also be able to select blocks to enable motion detection with respect to configurable time schedule.
25 Hybrid Technology – Analogue with IP 15.Hybrid Technology Creation: The software apart from doing video analytics from the post-processor of the IP camera should be able to perform co-ordination and video analytics from analogue camera, encoded to IP packets by encoders. a)Camera Sequences: The software should have the capability to sequence multiple camera individually or in a cluster. The software should sequence PTZ of a single camera also. The software should be able to sequence between IP cameras and IP converted legacy analogue cameras.
26 Hybrid Technology – Analogue with IP b)Video Matrix Server Compatibility: The software should be capable of integrating with video matrix switches which caters to bunch of analogue camera. The software should be capable of viewing continuously all cameras attached to the video matrix input. c)CCTV Keyboards: The software should allow to integrate with any CCTV keyboard of any make and can work with any make of video matrix switch. d)Customization Option: The software should have total customization option in regards to adaptation to legacy technology by mode of easy programmable macros and plugin.
27 Hybrid Technology – Analogue with IP 16.Extensibility through Plugins The software should have the capability to be customized by incorporation of various software plugin options.
28 Video Analytics Video Analytics : The software should be able to integrates Intelligent Video Analytics. The software should be capable to create alerts for real-time processing. Object Video a)Integrates ObjectVideo's Intelligent Video Solution to Omnicast. b)Imports ObjectVideo's alerts for real-time processing in Omnicast. c)Allows video archive search based on ObjectVideo's alerts and rules. d)Generates events such as: a)Alert b)Camera found/lost c)Camera view found/lost d)Database full
29 Video Analytics Video Analytics Capabilities: OBJECT Detection, CLASSIFICATION & TRACKING VEW's numerous patented algorithms enable automatic analysis of all video types which allow the software to intelligently discern objects of interest, distinguish humans from vehicles, and continuously track positions and descriptive info for moving or stationary targets. EVENT COUNTING SUITE Through an advanced set of algorithms, ObjectVideo offers the most superior people counting solution available in the market today. The ObjectVideo Event Counting Suite is highly optimized for event-based and occupancy counting scenarios, not requiring direct overhead camera positions. The suite also enables multi-rule and cross-camera counting scenarios, and provides a new Web-enabled user interface to easily manage, monitor and report on counting data. ObjectVideo Event Counting Suite
30 Video Analytics Video Analytics Capabilities: LEADER / FOLLOWER VEW's Leader/Follower functionality allows a Pan-Tilt-Zoom (PTZ) camera to automatically follow an object that triggered an event in another camera's view. Specialized tools are also provided for precise camera calibration to insure accurate tracking of one or many targets. HIGH RESOLUTION VEW supports high-resolution video processing, allowing for better image detail and larger coverage areas (more than double in most cases). As a result, the software identifies, classifies, and tracks objects from much greater distances when analyzing video from high- resolution cameras.
31 Video Analytics Video Analytics Capabilities: RULE-SPECIFIC INTELLIGENCE VEW enables users to create rules and notifications appropriate for those rules. Users can create rules that mimic defined security policies and receive real-time, actionable alerts when those rules are violated. Also users can define rules to gather business intelligence about customer behaviors or gather data for historical reporting and analysis. Available rule types include detection of objects crossing single or multiple video tripwires, loitering, entering or exiting areas of interest, left behind or taken away objects, occupancy, and dwell time. HIGH RESOLUTION VEW supports high-resolution video processing, allowing for better image detail and larger coverage areas (more than double in most cases). As a result, the software identifies, classifies, and tracks objects from much greater distances when analyzing video from high- resolution cameras.
32 Video Analytics Video Analytics Capabilities: OBJECTVIDEO FORENSICS ObjectVideo Forensics is a feature that allows users to discern critical intelligence about the environment based on past events. With this optional add-on, users can repeatedly apply rules to any repository of collected or stored video, and understand how to better define rules in the future. MULTI-VIEW Pan-Tilt-Zoom (PTZ) cameras are essential threat assessment tools found in almost every CCTV environment. ObjectVideo VEW adds intelligence to any PTZ camera by allowing multiple camera views/positions to be defined, each with their own unique set of security rules. VEW automatically recognizes which view the camera is using and quickly engages the appropriate rule set.
33 Video Analytics Video Analytics Capabilities: FLOW CONTROL ObjectVideo VEW Flow Control is specifically designed to detect people traveling the wrong way in crowded environments, such as airport security exits. Users can define the acceptable direction of motion and, when people move against the flow, the system generates an alert.
34 Video Analytics Video Analytics Advantages Non-Human driven surveillance, where human become facilitator of the process Includes the full compliment of ObjectVideo’s most advanced analytic features such as Forensics, Multiple Tripwire, High Resolution Camera Support, Flow Control, PTZ Leader-Follower, and Event Counting Suite (new in 5.0).Event Counting Suite Excels in any environment – indoor and outdoor, including those considered the most challenging (e.g. rain, fog, low light and nighttime). Analyzes video from any camera type, including black & white, 360°, IDN, infrared, and thermal. Works out-of-the box with any video input, including analog, digital or streaming video feeds. Utilizes the ObjectVideo patented Video Tripwire technology, which has not been licensed to any other company
35 Details on the Video Management Software b) AutoVu LPR a)Reads license plates from video feeds at rates up to 30 frames per second. b)Recognizes different license plate formats around the world. c)Offers the options to highlight the license plate on the video by enclosing the license plate in a box, by showing the plate number, or both. c) LPR Matcher a)Match license plates reads from the AutoVu LPR against a list of special interest plates. b)Generate events such as: a)Authorized vehicle b)Unauthorized vehicle c)Stolen vehicle d)Match found e)No match found
36 Details on the Video Management Software a)Access Control Integration:- The software should have plugins that integrate third party access control systems. Specific third party door events should be converted into the following generic events which are as follows: Access control (door alarm) Access control (tampering) Access control (unit connected) Access control (unit lost) Access control (alarm acknowledged) Access denied/granted Door opened/closed Door forced/forced (restored) Door held open/held open (released) Intrusion
37 Details on the Video Management Software b)Video Wall Integration :- The software should allow integrate and manage from the software itself third party video walls.
38 Details on the Video Management Software 17.Map Creation:- The software should have option for ‘ map ’ creation of the area, and all the camera can be positioned in the map by simple drag & drop of the IP device / camera on the map.
39 Details on the Video Management Software 18.Client Applications:- The software should come with a client application module for user specific settings and operations. The client software should communicate with the server services to provide user specific settings. The module should help the end user to configure the following applications:- a) Live Viewer – The end user should be able to configure his interface, for live viewing and archive playing. The live viewer should allow utilizing the options and features listed in section 1-14 of the software. b) Archive Player – The client application software should allow quick and effective retrieval and playback of all stored video, audio and data. Through the Archive Player interface, users should be able to perform intelligent queries based on date, time, camera, event type, motion level, complex metadata tags, bookmarks, past alarms and motion in specific areas of the camera view. The software should aloe users to pinpoint specific events.
40 Details on the Video Management Software c) Config Tool – The Config Tool application provides an intuitive interface that enables users to manage and configure various components of the software system such as sites, users, archiving schedules, cameras, applications, Virtual Matrix elements and various other devices. With real-time configuration, users have the flexibility of adjusting the system to best suit their needs without hassle, at any time. d) Web Clients – The software should allow accessibility of it ’ s services from any web browser for live viewing, archiving and restoration. e) Report Viewer - The client application part of the software should allow, the user to track the operation of the whole server system, events and alerts by analysis of the report viewer.
41 Details on the Video Management Software f) Map Editor – The client application should allow user with given rights to edit the map in case the installation location is being changed. g) Camera Blocking - The camera blocking feature mentioned in the security part of the server software should be configurable from the client application, so that the administrator can create user and user rights for camera blocking for the client application.
42 Application of MVS Server Software Modules (SSM) Directory (System Server) Standby Directory Gateway Federation Server Archiver Standby Archiver Redundant Archiver Auxiliary Archiver Restore Archiver Media Gateway Metadata Engine Standby Metadata Engine Virtual Matrix Standby Virtual Matrix Watchdog Server Administrator
43 Application of MVS Client Software Applications (CSA) Configuration Tool Live Viewer Archive Player Web Live Viewer Web Archive Player Macro Editor Report Viewer
44 Application of MVS Software Development Kit (SDK) Configuration Tool Live Viewer Archive Player Web Live Viewer Web Archive Player Macro Editor Report Viewer
45 Case Study… Airport Analysis… Perimeter SecurityPerimeter Security –With VMS (Intellivision Module), monitoring the airport perimeter becomes child’s play as all objects are automatically detected, identified and tracked. Unified Security InterfaceUnified Security Interface –VMS (Synergis module) provides security personnel with a unified interface for access control, video surveillance and other security systems Aeronautical Operations Area (AOA)Aeronautical Operations Area (AOA) –Vehicle movement is tracked and entries and exists controlled by VMS (LPR Module) license plate recognition solution.
46 Unified View of X-Ray, CT Images and Metal DetectorsUnified View of X-Ray, CT Images and Metal Detectors –VMS provides security personnel with unified view of X-Ray, CT images and Metal Detectors through a single interface. Information SharingInformation Sharing –VMS (Federations Module) allows for security data sharing across various independent organizations. Live & Forensic InvestigationsLive & Forensic Investigations –VMS (Meta-Data Module) enables live or forensic investigations by indexing, managing and displaying data from multiple security systems Case Study… Airport Analysis…