Integration: access control with digital surveillance

Access & Identity Management Handbook 2006 Access Control & Identity Management

The ‘convergence trend’ taking place in the security industry brings with it a host of really interesting market developments.

Fuelled by a general awareness of information technology the market is driving product development with expectations in terms of information access and automated system management.

A typical example of this is integrated security systems where the demand is for singular point of information access and control and in particular, rules-based system control and trends analysis. Probably the most common requirement is that of integrated video surveillance, access control and alarm management.

This article looks at some of the special system features that can be achieved by integrating access control with video surveillance. While there are many alarm situations that can be detected and reported by both the video surveillance and access control systems, alarm management and the integration of alarm panels is a subject in its own right.

Consider an integrated system along the lines of that depicted in Figure 1 below. A digital video system, which may be either integrated (PC-based) digital video recorders or video-over-IP encoders and cameras, or even a composite blend of the two architectural types, is connected via LAN to an access control system server.

Figure 1. Integrated digital video surveillance and access control system
Figure 1. Integrated digital video surveillance and access control system

The underlying principle is simplicity in architecture, complexity in information exchange. Important aspects to the integration engineering are as follows:

* Each subsystem can independently carry out its basic function, either providing surveillance monitoring and video recording or controlling access to premises.

* Each subsystem can be interrogated, controlled and in particular configured at an applicable user interface.

* An additional server plays host to integrated system software capable of accessing information from the databases in each subsystem and controlling each subsystem, typically via an application programme interface (API).

* The host server also provides a highly interactive user interface, typically with multiple screens.

* Additional client stations can be added for large sites and for providing remote monitoring on alarm escalation by a security manager.

Integration software packages are available in varying degrees of power, lists of integrated brands and subsequent cost. Some higher-end video surveillance and access control system vendors offer integration with selected brands of the other system type, but a market has also emerged for vendors of so-called independent integration software packages. These are often marketed as enterprise management systems with extensive lists of drivers for equipment that can be integrated (and hefty price tags). Even in our simple integration example the host software should ideally be capable of:

* Allowing an operator to monitor, control and evaluate information for both systems from a single, multiscreen console.

* Displaying system resource information relative to a hierarchical site map with icons indicating position and views of cameras, door states and so on.

* Presenting information on events in such a way as to provide easy understanding of occurrences as well as detailed reporting functionality.

* Processing event triggers to allow for a customised response (rules-based engine) in a logical 'if-then' formula.

* Providing a trend analysis capability to graph long-term trends and to isolate and report on unusual activities.

The screen capture of Figure 2 shows a typical example of information presentation. Some of the interesting facilities offered by this integration include:

* Automatic video recording of access events along with access token details and retrieval of historical video based on a search by token number or any other token holder information.

* Generation of alarms due to events such as use of black-listed tokens and forced doors with clear representation of entry point and nearest video camera view on site map.

* Detection of 'tailgating' using video object counting coupled with expectation in token acceptance.

* Trends analysis of entries to determine unusual situations such as excessive overtime, frequent access to areas where employee has no business.

* Tracking of visitors from zone to zone with contiguous video data based on token usage.

* Remote access control by operator based on visual verification of token holder.

Figure 2. Typical information presentation
Figure 2. Typical information presentation

These are just some of the more obvious facilities that a well-integrated system can provide - there will be more that can be created on a custom basis. As other systems are integrated, the list of interaction will grow, such as 'open all doors on fire detection system alarming' or 'switch on lights when building accessed after hours' - but that is the subject of a more in-depth look at building management.

Maximising the installation of integrated systems is the domain of the specialist systems integrator with knowledge gleaned from experience.

For more information contact Clive Putman, i to i technologies, +27 (0) 31 562 9535.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Smart intercoms are transforming access control
Access Control & Identity Management Products & Solutions
Smart intercoms have emerged as a pivotal tool in modern access control. They provide a seamless and secure way to manage entry points without the need for traditional security guards to validate visitors before granting them access.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...
Invixium acquires Triax Technologies
News & Events Access Control & Identity Management
Invixium has announced it has acquired Triax Technologies to expand its biometric solutions with AI-based RTLS (Real-Time Location Systems) offering for improved safety and productivity at industrial sites and critical infrastructure.

Read more...
ControliD's iDFace receives ICASA certification
Impro Technologies News & Events Access Control & Identity Management
The introduction of Control iD's iDFace facial biometric reader, backed by mandatory ICASA certification, underscores the commitment to quality, compliance, and innovation.

Read more...
The future of workplace access
HID Global Access Control & Identity Management
Mobile credentials are considerably more secure than physical access control, because they eliminate the need for physical cards or badges, support multiple security protocols, and add layers of protection on top of basic card encryption.

Read more...
Integrated, mobile access control
SA Technologies Entry Pro Technews Publishing Access Control & Identity Management
SMART Security Solutions spoke to SA Technologies to learn more about what is happening in the estate access world and what the company offers the residential estate market.

Read more...
Bespoke access for prime office space
Paxton Access Control & Identity Management Residential Estate (Industry)
Nicol Corner is home to a six-star fitness club, prime office space, and an award-winning rooftop restaurant. It is also the first building in South Africa to have its glass façade fully incorporate fritted glazing, saving 35% on energy consumption.

Read more...
Next-generation facial recognition access control system
Enkulu Technologies Products & Solutions Access Control & Identity Management Residential Estate (Industry)
With a modern and innovative design, iDFace is the ideal device for monitoring and controlling people entering and exiting a building using facial recognition technology, including liveness detection, for enhanced security.

Read more...
Long-distance vehicle identification
STid Security Products & Solutions Access Control & Identity Management Residential Estate (Industry)
The STid SPECTRE reader can identify vehicles up to 14 metres away, across four traffic lanes, ensuring secure access to an estate without disrupting the traffic flow.

Read more...