SlideShare a Scribd company logo
1 of 71
Download to read offline
HikCentral V 1.2
Making Security Easier
HikCentral
V1.2
01
02
03
What’s New
Improvements
Spec & Road Map
Access Control/Facial Recognition/UVSS
Interactive Design/Functionalities/Maintainability/Openness
2018 Road Map
System Architecture
 Software Structure
• Server + Clients
 Device /System Layer
• Supports Cameras , NVR/DVR Access
• Provides Central Storage with Hybrid SAN/Cloud Storage
Server
• Supports Decoder /Video Wall Controller Management
• Supports Keyboard Access
• Supports Door Controller and Door Management
• Supports Under-Vehicle Surveillance System management
 Server Layer
• VMS Server for Video Surveillance
• Streaming Server for Streaming forwarding and balance
• Functional Layer
• Centralized Management of all the elements
• User-friendly design operation ideally suit for all users
• User Interface
• Flexible Clients
Door
01
What’s New
1.1
Access Control
Supports multiple clients
Flexible Access Control permissions
Seamlessly Iintegration with video
surveillance system
1.1 Access Control System Overview
Series DS-K2600 Series DS-K2800 Series Standalone Access Control Terminal
Fingerprint Enrollment
Scanner
Card Issue Reader
Fingerprint
Reader
Model
DS-K2601 DS-K2801 DS-K1T105E DS-K1T201MF DS-K1F820-F DS-K1F100-D8E DS-K1100 Series DS-K1201EF
DS-K2602 DS-K2802 DS-K1T105M DS-K1T201EF-C / DS-K1F180-D8E DS-K1800 Series DS-K1201MF
DS-K2604 DS-K2804 DS-K1T105E-C DS-K1T201MF-C / / /
/ / DS-K1T105M-C DS-K1T802E / / /
/ / DS-K1T201EF DS-K1T802M / / /
1.1 Device compatibility
 Access Group
The person's access group. All the persons in the
access group have the same permissions
 Access Level
The person‘s access level. That is, the
permissions consisted for a designated time
and designated doors.
Access
Level
Other
Access
Levels
Access
Level
Access
Group
Jay
Simon
Assign
Remove
Jay
Simon
Remove
Assign
1.1.1 Easy Person Management
Note: Rules have been created to avoid permission conflicts when multiple administrators configure
permissions.
Issue
 Process Instruction
The permitted doors and access time are combined into
access levels. Persons are assigned to or removed from an
access group with the same access levels. This simplifies
person permission configuration.
Combine
1.1.1 Easy Person Management
Card Reader Access Modes
 Card
 Fingerprint
 Card and Fingerprint
 Card or Fingerprint
 Card and PIN
 PIN and Fingerprint
 Card and PIN and Fingerprint
Advanced Person Permissions
Extend Access:
 Extend the door’s open time, suitable for people with
limited mobility.
Super Permission:
 Exempt from remaining locked restriction.
 Exempt from anti-passback rule restriction.
 Exempt from person’s first card authorization
restriction.
Note: PIN entry only is not supportedin the HikCentral platform.
1.1.1 Easy Person Management
3.Apply to device.
• The person information in the system can be
applied to Access groups, Face Comparison
Groups, and Attendance Groups.
Batch Operation
Customized
Fields
Batch Support for the following:
• Importing person photos
• Issuing cards
• Exporting person information
• Importing person information via a template
• In addition to the basic, pre-defined
information, there are five additional fields
which can be customized for your
organization's needs.
Data Issue
• Apply all (manual) is commonly used to issue data
increments (e.g., adding a new person).
• Apply all (scheduled) is commonly used to issue data on
the basis of schedule, avoiding bandwidth occupation
when busy.
Person Reuse
1.1.2 Access Control Applications - Anti-Passback
Increases the area over which persons can apply anti-passback. Configure areas that span across each controller.
Note:1.Set the area without the reader sequence
 Manually forgive the Anti-Passback on live view:
2. Resetting the anti-passback by schedule is not supported
Server
 Robust Solution:
Area
Cable
Server
Area
Network Error
Still Alive
X
Office Area1
Border Door
Office Area2
Border Door
Border Door
1.1.2 Access Control Applications – First Card Remains Unlocked
First Card Remains Unlocked
Designated person opens
the door after swiping the
first card
Duration
expires
Outsiders access area
Door opens and
remains unlocked
for a designated
period
Restore to door’s initial state
Designated person swipes
first card again to cancel
the authority
1.1.2 Access Control Applications – First Card Authorization
First Person Authorization
Designated person opens
the door after swiping the
first card
Door is
considered
authorized
Others swipe authorized
cards to access area
Designated person swipes
first card again to cancel
the authority
Authority
automatically
withdrawn after
00:00
Restore to door’s initial status
1.1.2 Access Control Applications – Lock All Doors
Operators can lock/recover all doors with just one click remotely on the (CS  Mobile) client
Emergency occur
Alarm detected Security staff monitored
Manually lock all doors
Manually recover
 After manually lock all doors is executed, manually recover is necessary if
the door is expected to return to its initial status.
 Lock all doors is unrestricted when the doors remain unlocked by
schedule.
 Super permission can exempt from lock all doors period.
Lock All Doors
Alarms
Live View
1.1.3 Video/Access Control Linkages
• Live view of person’s access.
• Live display of person’s access records and
information.
• Dual window real-time switch preview.
• Real-time control of doors according to person’s
access state.
Reports
• Search person’s records in Access Control module
by criteria: person name, certificate result,
certificate type.
• Playback of person’s access, dual window
playback .
• Display of person’s detailed information.
• Cameras can be linked to record when door
alarms are triggered.
• Door actions can be linked to emergency
requirements or other situations when video
alarms are triggered.
 Live View  Alarms Linkages
 Records Search
1.1.4 Time & Attendance
T&A follows the principle of first-in
and last-out.
T&A time schedules support weekly cycles
or several fixed days, creating easy
attendance management.
T&A shift supports fixed and flexible
schedule to meet common attendance
requirements.
T&A supports holiday attendance
management , fitting actual
attendance needs.
T&A supports selecting on-demand
attendance points for flexible
attendance point management.
T&A supports attendance records
correction and reports download.
T & A
Group
Jay
Simon
Assign
Remove
Jay
Simon
Shift
Schedule
T & A
Schedule
Assign
Remove
Monitoring
Door control
Doors can be remotely controlled - unlock / close / keep open / keep
close in Live View. So real-time and effective door control will meet some
occurrences.
1.1.5 Mobile Client (available May, 2018)
Record
 Live View
• Record
• Capture
• Voice intercom
 Playback
• Speed control : 1x, 2x, 4x, 1/2x, 1/4x
• Capture
• Clip
Alarm
Door alarms can be received by Mobile Client. Related videos, images and
detailed alarm information are shown to accurately assess situations.
1.2
Facial Recognition
1.2 HikCentral Facial Recognition
Intelligent
Devices
HikCentral
High Recognition Rate
User-friendly Interface Intelligent Retrieval
HikCentral incorporates powerful facial recognition functions from Hikvision's intelligentdevices.
• Multi-level deep-learning algorithms
create strong environmental
adaptability
• Good User Interface design makes it easy
to manage thousands of facial images
• Video clips can be retrieved by specific human faces
• Advanced Face Detection event and alarm functions help to
increase business security and recognize your customers
1.2.1 Facial Recognition Process
01
02
03
04
Import all the people you want to
monitor into a face group
HikCentral sends the face list to an
intelligent device such as an
DeepinMind NVR
Example for VIP List
Facial Recognition
Module
Devices
The camera captures a face and the
system runs comparison analytics. HikCentral clients receive the
comparison result , record it as a face
event, and display it in the view
window
05
HikCentral generates an
alarm and informs
security
Comparison
The Face Detection event can
send an alarm and inform
security personnel to take
further action
1.2.2 Intelligent Monitoring
 Automatically display all the captured Faces
 Displays match results with similarities
 Click the corresponding picture to get detailed information
 Support “Search by picture” with intelligent devices .
 Add the suspicious picture into a person group.
 Display multiple cameras' s result simultaneously.
1.2.3 Intelligent Retrieval
 Search related video clips with Time, Picture, Name and Similarity.
 Multiple searches allows you to find the “one” you want
 Search results across multiple devices to achieve centralized face
management
 Alarm information provides face picture, face ID, telephone number,
similarity, video ,captured picture, and additional information
1.3
Under Vehicle Surveillance
System (UVSS)
Hand-held Model
• Time-consuming, low-efficiency
• Areas easy to miss inspection
• Standalone device, unable to post review
Rail-mounted Model
• Vehicle needs to be stopped for inspection,
low-efficiency
• Results shown in multiple images
• Moving components reduce product
lifespan
• Complicated installation
Mobile Model
• Light material, easily damaged
• Image is easily damaged by vehicle Shaking.
• Poor protection performance
1.3.1 Issues with Current Models on the Market
1.3.2 UVSS in HikCentral
UVSS Benefit
 Auto-detection of the vehicle undercarriage
 Synchronize LPR camera data with Under Vehicle image
 Suitable for various vehicle models, entire undercarriage of vehicle in one
image .
 High-strength structure
 High-quality picture, low distortion
Efficient
Multiple Operations
White List and Black List
Multiple Maintenance Methods
Efficient Monitoring
Flexible System Deployment
Easy Investigation
• Tag the suspicious plate number for later retrieval
• Tag multiple suspicious areas with specific picture for later
investigation
• Manually trigger user-defined events with any pre-defined actions.
• List management with the ability to upload reference picture for
each plate number
• White list and black list alarm
• Add a suspicious plate number to the database during live view
• Health monitor dashboard for UVSS system (.e.g.
Net status, Line Scan camera status, Capture
Camera status, Storage status)
• Supports device offline/online event monitoring
/searching/report
• Video search/ VCA search for related cameras
• LPR search for corresponding events
• Provides the original image with live picture for better comparison
• Provides history search records of the car with the same plate number
during live view for better investigation
• Provides User-defined events search for emergency scenarios
• Auto-detection/record vehicle undercarriage without
manpower
• Manage multiple exits & entrances simultaneously
• Ability to provide any type of camera for live view reference
• Supports Fixed UVSS and Portable UVSS
• Supports 4 UVSS per HikCentral server
• IP connectivity
1.3.3 HikCentral with UVSS Benefit
Flexible
Investigation
Operability
Maintainable
LPR list
Door
02
Improvements
Overall Improvements
Event & Alarm Smart Wall
Control Client
& BS Experience
Map Management
Mobile Client Devices Management HikCentral Open-SDK
2.1
Event & Alarm
Manual Trigger Alarm
Event Report
Composite Alarm
Richer Events Types
Richer Event Types
• More Event types to enrich the function of the system
• More Device/Storage server events to increase system stability
• Addition system settings to provide better maintenance
Composite Alarm
• Combined multiple events to defined a certain alarm
to reduce false alarm
• Allow alarm escalation when the alarm is not
acknowledged.
Manual Trigger Alarms
• Allow manually triggered alarms with user-defined events
in the Control Client for different scenarios
• Test Alarm on Web Client list for better alarm
configuration and maintenance
Event/Alarm Report
• Create event/alarm reports for monitored events on the
Web Client and inform users through daily /weekly email
• Export the Alarm/Event lists on the Control Client with
any filter settings
• Report may include the item quantity statistics and basic
information
2.1 Event/Alarm Improvements
New Module Events
New Type Events
RS/Encoding Device/
Camera
Current Events Improved
HikCentral System
Monitor
2.1.1 Richer Events Types
• 48 door Events
• 8 Access Control Device Events
• UVSS Events
• User Login /Log out
• User-defined Event
• Expand Hybrid SAN events to 26 in total
• Camera Commination Exception/Recovered
• Device Recovered
• CPU Eexception/ Recovered/Warning
• RAM Exception/Recovered/Warning
• System Service Abnormally Stopped /Recovered to Run
• Clear and unified Event names
• Generic Events able to have all the linkages.
Unified Event Name for Search
<V1.1 V1.2 Control Client
Loitering,Loitering Detection Loitering (Detection)
Line Crossing, Line Crossing Detection Line Crossing(Detection)
Fast Moving, Fast Moving Detection Fast Moving(Detection)
Parking, Parking Detection Parking(Detection)
Object Removal, Object Removal Detection Object Removal(Detection)
Unattended Baggage, Unattended Baggage
Detection
Unattended Baggage
(Detection)
Intrusion,Intrusion Detection Intrusion(Detection )
Region Entrance,Region Entrance Detection Region Entrance(Detection)
Region Exiting ,Region Exiting Detection Region Exiting Detection)
People Gathering , People Gathering Detection People Gathering (Detection)
User-defined Events
Manual Trigger
• Manual trigger in the Control Client to enhance system
surveillance (e.g. UVSS, door, camera)
• Ability to predefine events and link alarms to notify
specific users
3rd-party System Trigger
• External events triggered from HikCentral
OpenSDK to improve system integration
Maintenance Trigger
• Alarms not handled after a configurable time period can
trigger events, allowing the customer to be informed of
significant alarms
• Alarms not handled after a configurable time period can
trigger alarm escalation
Alarm Trigger
• Automatically triggered after specific alarm occurs to
optimize Event Arming
• Multiple alarms triggered simultaneously can result in
alarm escalation
System Events Trigger
• Can be triggered by cameras ,alarm inputs, encoding devices,
servers, ANPR, generic events, remote site events
• Define different events to trigger for different time periods to
provide flexible scenarios
2.1.1 User-defined Events
• Triggered by Generic events to allow 3rd-party
integration without OpenSDK
• Support for new device types and systems
Future-proof
User-defined event
User-defined
event2
System event, user-
defined events
Alarm
Manual events,3rd
party events, alarm
input
During
arming
schedule
Not
acknowledged
after X times
User-defined events-
other
ALL events, alarm
inputs
Automatic arming
started Composed
Automatic arming
stopped
User-defined event
User-defined event2
2.1.1 How Do User-defined Events Work?
Event detected
(Camera A) Trigger alarm A Operator 1 receives Alarm A
in alarm center1
User-defined event B
Alarm Escalation :
Operator 1
Detect Intrusion
Alarm A: receiver Operator1
Priority 50
Operator needs to acknowledge
alarm within X minutes
Trigger alarm B
Operator 2 receives Alarm B in alarm center2
Operator 2
Alarm B :receiver Operator2
Priority 100
Alarm
acknowledged
When an important alarm is not acknowledged within a configured
time period, it will trigger an Alarm Escalation so a higher-priority
operator can help to investigate the alarm.
Arming
Period
Arming
Period
Alarm dwell
X minutes
?
Yes
2.1.1 User Case1-Alarm Escalation
Event detected
(Camera A) Trigger alarm A Operator 1 receives Alarm A
in alarm center1
User-defined event B
Keep sending until acknowledgement received :
Operator 1
Detect Intrusion
Alarm A receiver Operator1
Operator needs to
acknowledge alarm within X
minutes
Trigger alarm B
Operator 2
receives Alarm B
Operator 2
Alarm B receiver Operator2
Alarm
acknowledged
An important alarm can be resent by a cycle trigger.
When the alarm has been acknowledged it will stop triggeringthe
same user-defined events.
Arming
Period
Arming
Period
Alarm dwell
X minutes
?
Yes
2.1.1 Use Case2-Keep sending until acknowledgement received
Alarm dwell
X minutes
?
No
Yes
One alarm’s triggering can trigger a user-defined event
which can be another alarms’ starting or ending event .
This setting is available for more than 2 events
happening together to compose an alarm.
Composed alarms
All the system events can use events-based arming to
control the alarm. The arming condition can also
contain a time template, making it possible to combine
event arming and time arming.
Composed events
A single event can trigger alarm, but having only one
condition may cause false alarms in some complex
scenarios.
Single event
Event arming
2.1.2 Composite Events/Alarms
Using events to arm the alarm, the arming events for
starting and ending can be alarm input or user-defined
events, allowing you to combine 2 events together
when triggering an alarm.
Alarm Trigger
Event detected
(Camera A)
Trigger UD events
Arming
Period
Arming
start
User-defined event A
(Arming Started Condition)
Trigger alarm A
operator2
Operator 1 receives Alarm A in
alarm center1
Alarm acknowledged
Composite Events/Alarms
When 2 events happen at night or in a restricted area, it can
trigger a composite alarm.
Event detect?
(Camera B)
Arming
Period Trigger UD events
User-defined event B
(Arming Stopped Condition)
Arming
Stopped
Yes
No
2.1.2 Use Case2-Composite Events/Alarms
2.1.2 Composite Alarm Example
Alarm1 :
Trigger Events: If Perimeter Intrusion detected +
Person entering area “A”
Time period : Weekend
Priority :50
A
B
Alarm2 :
Trigger Events: If Perimeter Intrusion detected +
Person entering area “B”
Time period : Sunday
Priority :60
Alarm3 :
Trigger Events: Person entering area “A”
+ Person entering area “B”
Time period : Sunday
Priority :80
Alarm4 :
Trigger Events: Person entering area “A”
+ Person entering area “B”+1 hour guardless
Time period : Sunday
Priority :80
2.1.2 Composite Events/Alarm Example
Person
Detection
Alarm1
Person
Detection
Alarm2
Intrusion
Intrusion
Person
Detection
Person
Detection
Alarm3
Alarm4
2.1.2 Configuration Example
Alarm1 :
• UD-Perimeter Intrusion detected trigger: Intrusion event triggered on
Weekend
• UD-Alarm 1 trigger: Automatically triggered by Alarm1
• Event arming:
 Start event: UD-Perimeter Intrusion detected
 Stop event: UD-Alarm 1
• Trigger event: Person detected in area “A”
UD = User-defined events
Alarm2 :
• UD-Perimeter Intrusion detected 2 trigger: Intrusion
event triggered on Sunday
• UD-Alarm 2 trigger: Automatically triggered by
Alarm2
• Event arming:
 Start event: UD-Perimeter Intrusion
detected 2
 Stop event: UD-Alarm 2
• Trigger event: Person detected in area “B”
Alarm3 :
• UD-Manual Stop arming :Manual trigger by operator
• Event arming:
 Start event: UD-Alarm 1
 Stop event: UD-Manual Stop arming
• Trigger event: UD-Alarm2
Alarm4 :
• UD-Alarm 3 trigger: one hour after Alarm3 triggered
and this alarm not acknowledged.
• Event arming:
 Start event: UD-Alarm 1
 Stop event: UD-Manual Stop arming
• Trigger event: UD-Alarm 3
Add UD Events
Define the UD trigger with system events
Event Arming
configuration
Alarms not acknowledged after a configured period of
time trigger UD events
2.1.3 Manual Trigger Events/Alarms
Manual Alarm Testing on the Web Client:
• Check if the alarm linkage responds as configured
• Check if the composite alarm configuration is working
• Easy to create alarm demo in Control Client
• Adjust the alarm settings according to the test results
Manual alarm triggering on the Control Client
• Different users can trigger different UD events
• Manually trigger UD events to arm/disarm an alarm
• Manually trigger UD events to create system alarms and triggers with pre-configured actions
UD = User-defined events
User-defined event A
( Arming Started Condition )
User-defined event B
( Arming Stopped Condition )
operator 1
Operator 1 monitors the building
entrance
Arming
period
Manual trigger UD A
operator 2
Operator 2 receives Alarm B in alarm
center2
Trigger alarm B
Event detect?
(Alarm Source)
Manual trigger
Alarm acknowledged
Arming
stopped
Manual arming:
Operator can manually arm or disarm events
Manually trigger alarms for suspicious behavior
2.1.3 Manual Arming/Manual Triggering Alarms
Operator1 detects some
suspicious behavior
Suspicious behavior
confirmed
Trigger alarm A
Arming
period
Operator 1 receives Alarm A
in alarm center1
2.1.4 Event/Alarm Report
Create Event /Alarm reports on the Web
Client
• Export to PDF, Excel format
• Daily/Weekly email reports
• Batch adding of Events/Alarms
• Up to 32 events or alarms can be
configured in one report.
• Up to 10,000 events or alarms can be
calculated in total.
Create Event /Alarm reports on the Control Client
• Generate reports by multiple condition in Event & Alarm Search
• Export in PDF, Excel, CSV format
• Generate key information summary
• Alarm list displays Area information
• Each alarm in alarm list could jump to Alarm Search and automatically fill in the
alarm source ,event type and more (e.g. LPR events come with plate number,
vehicle list )
2.2
Smart Wall
2.2 Smart Wall
 Window Expand and Restore
 Roaming window operation
 Window Expand and Restore
 Display Stream details in the Control Client
 1200K/1600K Keyboard
 64/69 Series Decoding devices
 C10S video wall Controller
 32 Smart Walls
 32 Decoding devices
1
2
3
Note:
64 series Decoding devices:
1.Not support enlarging sub window after window division.
C10Snot support :
1.creating roaming windows on the Split Window
2.Split windows under the Roaming Window;
Supports the following:
2.3
Control Client/BS Improvements
Live view +Playback
+Map=View
• The logical resource tree, View
pane, and map show their
corresponding relationship.
• If you select a pane, the map
automatically translates to the
location of the monitoring point,
and the resource point is
highlighted.
• Map pane defaults to display the
location of the current selected
device resource.
• Click an area to see all related E-
maps.
• Seamless change between live
view and playback.
• Enable/Disable Map as needed.
+ View
2.3.1 View Improvements
2.3.2 Fisheye Camera Dewarping
HikCentral V1.2
 Smooth and Intuitive operation design.
 Support zoom to expand the video using the mouse wheel &Flexible PTZ
operation.
 Multiple Fisheye Dewarping support without software limitation but with only
hardware performance limitation.
HikCentral V1.1.1
 Using the cursor for control is less intuitive.
 Only support one channel dewarping.
2.3.3 PTZ Operation Improvements
HikCentral V1.2
 Smooth and Intuitive operation design.
 Support for PTZ operation on Chrome ,IE10/11, etc.
 Enhanced cursor operation, combines the 3D positioning function and
zooming In /Out.
 Support achieving different speed according to how far the cursor position is
from the center.
HikCentral V1.1.1
 Using the cursor for control is less intuitive and difficult to control.
 Support for PTZ control on Control client.
 Support for PTZ operation on IE only.
2.3.4 People Counting Improvements
Enter and Exit:
• Display reports with All cameras or specific cameras
Key Improvements:
• Increase the camera for
reports from 4 to 8
• Display the totals of multiple
cameras
Enter or Exit Only:
• Display both the total amounts and statistic data of specific
cameras
 Per client supports 256 channels for live video
simultaneously.
 Support searching Video clip of the cameras
belong to the remote site.
 Continuous Decoding Switch : When switch window
division between one window and multiple windows.
 Video Caching Setting : Video Caching should be
determined based on network performance,
computer performance , and bit rate. large frame
caching will result in better video performance.
 Display Stream Bitrate, Frame Rate, Resolution, Stream Format per channel.
 ANPR Alarm provide Owner info.
Easy to
Use
Performance
User Experice
Improvements
Visibility
 Support Opening/Closing the alarm
output belong to the same area during
per camera viewing.
 Double-click the resource tree to get live
view/playback channel by channel. The
view division will automatically change to
fit the channel number.
 View function is supported in both live
view and playback. Camera list is
displayed in view.
2.3.5 Other Improvements in Control Client
Non-IE Browser Support(Chrome and Firefox)
• Support open Digital Zoom, Audio Control, Switch Stream types and
Instant Playback.
• Support PTZ operations.
• Searching and zooming time during playback.
UX Improvements
• Support list items by alphabet order: logical area list ,Trigger Events,
Assign Roles for each user, alarm receipts, etc.
• Combine logic setting and recoding setting together for each channels,
and keep you stopping at one page to get all the setting.
License & Users Management Improvements
• Support setting max login number per user to avoid unauthorized person login the system
via specific account.
• Support setting initial password while creating users. To avoid unauthorized person use
the default Abc123 to login to the system.
• Support displaying all the login numbers/types of each users.
• System License Management : SUP Expire time display, warning about trail license
expiation, lacking of resource license (e.g. camera license less than 7)Warning.
2.3.6 Other Improvements in Browser Client
2.4
Map Management
2.4.1 Map Improvements
RSM (GIS & Static images)
VSM (GIS & Static images)
RSM ( GIS &E-map ,GIS map support manages remote sites only)
VSM ( E-map )
HikCentral V1.1.1
HikCentral V1.2
 Users can manage the resources of remote sites
more dynamically in GIS.
 Integrated map display and resource
management, including hot region configuration
cameras, doors, hot regions, alarm
Inputs/Outputs, remote sites, UVSSs.
 Map display and monitor integration. In live view,
functions can be accessed on the map.
 Live View /playback single/multiple cameras from GIS Map with simply drag
the cameras from the map.
 Lock/unlock the doors , get related videos and other info of doors.
 Arming control for the cameras, UVSS, doors.
 History Alarm Search for the cameras, UVSS, doors.
 Edit/ Delete the labels.
 Get related video of UVSS.
 Support turn on the Outputs.
 Quickly jump to other e-map via hot region.
GIS
And more ……
2.4.2 GIS Map Operation
2.5
Mobile Client
2.5.1 New Features In Mobile(Available May, 2018)
Newly added Access Control
Newly added ANPR
Newly added UVSS
Mobile Client
Support for iPad, iPhone, Android phones,
and Android tablets
Mobile Access:
anywhere, anytime
Download from Google Play or App Store
2.5.2 UI Improvement
 Intuitive GUI Design  Support maximization Preview/ Playback monitor screen
 Emphasize important information  Alarm cue card
2.5.2 UI Improvement
2.6
Devices Management
2.6.1 Devices Management Optimizing
Devices
VMS platform
Enhance
HikCentral V1.2 optimizes Devices Access which improve performance and the easy-use of the platform
Optimize
 When playback the camera via WAN access support
indicate the recording status on Month calendar.
 Support changing the password and activating the
device in batch.
 Support to set Audio control per channel.
 Support one-touch configuration for Hybrid SAN.
2.6.2 Health Monitoring
 New Resources Status : Access Control ,UVSS ,
Access Control Device.
 More clearer definition of Camera Status :
Integrated Getting Signal Flailed and Getting
Recording Schedule Failed into Communication
Error ; Signal Loss Rename to Video Loss.
 Allow change Device Access Mode .
 Provide More info to diagnose error massage of
Hybrid SAN.
 Incoming /Outcoming streaming number/status
for Streaming Gateway.
 CPU /Memory Usage and Status displaying(via BS
setting).
SMS: Streaming Server
2.6.3 Device Access Mode
VLAN
Isolation
IPC
VSM(SG): Streaming Gateway Control client
LAN 1
LAN 2
 Direct Connection
When CC & devices are in the same network, CS client get
stream via local network to achieve a better network
performance.
 Proxy
If Control Client and devices are isolated by different
VLAN, or the control client is in another LAN , the CS
client need to access the streaming via SG.
 SMS
Support choosing the specific channel(s) to go through the
specific SMS to expand the streaming performance.
Control client
Control client
×
2.6.3 Device Access Mode
 BS admin
• Automatically judge: The system automatically judges the network
topology and results in some with proxy mode and some with direct
mode.
• Proxy: All the device chooses the direct mode to avoid some
mistakes e.g. when the system can not judge if the device and
client’s network are isolated by VLAN.
 CS Client
• support searching the device by name or IP address in batch, and
selecting them to change the device access mode.
• Support display all the device Access Mode.
• Restore Default: using the BS admin configuration.
• Automatically judge.
• Direct connect. Even the BS admin had configured the camera to go
through SMS, it still works.
• Proxy: Even the BS admin had configured the camera to go through
SMS, it still work.
 BS Client
• Support the same mode with CS client for all cameras.
2.6.4 Hybrid SAN of the health Monitoring
 Detailed cameras
information in Hybrid SAN
 Detailed Hardware Status of
Hybrid SAN
 Detailed HDD Status of Hybrid
SAN
2.6.5 OpenSDK
OpenSDK enables HikCentral an corroborative platform, providing the ability for HC to be
integrated with 3rd party system.
Simple
 Easy to install
 easy to use
Samples
 Detailed API code
 Multilingual code
Standard
 Standard specification allows
large systems to integrate
HikCentral.
Consistent & Documented
 Continuous iteration update
 Rich interface information and
product manuals.
Note: You are suggested to sign MLA before using OpenSDK. Please get more info via the link:
http://127.0.0.1:5000/ISAPI/OpenSdk/Documentation/index.html?url=/swagger/v1/swagger.json after installing HikCentral and OpenSDK .
OpenSDK
Door
03
Spec & Road Map
VSM Server’s Maximum Performance
Items
Without RSM
(E3-1220)
With RSM
(E5-2620)
Face Comparison
Face Pictures 10,000 10,000
Face Comparison Groups 64 64
Persons in One Face Comparison Group 10,000 10,000
Smart Wall
Decoding Devices 32 32
Smart Walls 32 32
View Groups 100 100
Views per View Group 10 10
Views Auto-Switched Simultaneously 32 32
Operation Logs Storage 500,000 500,000
Person
Persons 10,000 10,000
Cards 50,000 50,000
Fingerprints 40,000 40,000
Credentials (Card + Fingerprint) 50,000 50,000
3.1 Software Key Specification
VSM Server’s Maximum Performance
Items
Without RSM
(E3-1220)
With RSM
(E5-2620)
Access Control
Access Control Devices 128 128
Doors 128 128
Doors on Each E-map 128 128
Doors on E-maps in Total 128 128
Anti-Passback Rules 128 128
Doors in One Anti-Passback Rule 16 16
Access Groups 64 64
Persons in One Access Group 1,000 1,000
Access Levels 128 128
Doors in One Access Level 128 128
Access Levels Assigned to One Access Group 8 8
Access Schedules 32 32
Attendance Groups 64 64
Persons in One Attendance Group 1,000 1,000
Shift Schedules 128 128
Holidays 16 16
3.1 Software Key Specification
3.2 Dell Server Specification
Feature E3-1220 V5 E5-2620 V4
Processer E3-1220 V5 (4-Core, 3.0 GHz) E5-2620 V4 (8-Core, 2.1 GHz)
OperatingSystem Windows Server 2012 R2 Windows Server 2012 R2
Memory 16G DDR4, 2400MT/s UDIMMS 8G RDIMM × 2, 2400MT/s RDIMMS
Storage 1T SATA × 2, 3.5" Enterprise SATA 7.2k HDDs 1T SATA × 2, 3.5" Enterprise SATA 7.2k HDDs
RAID H330 RAID Controller with RAID 1 H330 RAID Controller with RAID 1
NIC 1GbE × 4 1GbE × 4
Chassis 1U, Rack Mount 2U, Rack Mount
Battery CR-2032 Coin Cell/Lithium/0.0032kg CR-2032 Coin Cell/Lithium/0.0032kg
Power Supply 250W Cabled PSU 750W AC Power Supply × 2
Dimensions
(W × D × H)
482.38 mm × 567.92 mm × 42.8 mm
(18.99" × 22.36" × 1.69")
482.38 mm × 755.8 mm × 87.3 mm
(18.99" × 29.76" × 3.44")
Weight 9.5 kg 23.5 kg
Dimensions
with Package
(W × D × H)
750 mm × 614 mm × 259 mm
(29.53" × 24.17" × 10.2")
960 mm × 610 mm × 295 mm
(37.8" × 24.02" × 11.61")
Weight
with Package 15.8 kg (34.8 lb) 32.1 kg (70.8 lb)
License License with 64/300 Cameras Manageable
License with 16/64/300 Cameras Manageable
License with 8 Cameras and 2 Remote Sites Manageable
Note: For the detailed specification please refer to the related document 《UD09789B_HikCentral SpecificationV1.2_20180420》
Q1 Q2 Q3 Q4
2018
3.3 HikCentral 2018 Product Roadmap
2018/04 - 2018/08
2018/08 - 2019/01
HikCentral V1.3.0
 New devices compatible and related application develop:
• Windows-based recorder
• Facial access controller/gate , related application
 New features & function:
• HikCentral customer/user feedback response (mainly from N.A)
• Enhance cross browser support (plugin)
• Mobile apps support face image capture and person info edit
• Mobile HD apps function and features improve (Maps, playback thumb
• Improve smart wall function and features
• Improve database backup and HDD space usage
• Improve UX, remove client windows division, 4K auto-adaption etc
• Improve AD import (access control person management)
• Improve facial related applications
• Enhance log search and improve problem shooting user experience
 New devices compatible and related application develop:
• Ehome 5.0 device (Body worn camera, mobile recorder)
• Support mobile surveillance application (GIS enhance)
• Alarm panel (not confirm yet)
 New features & function:
• HikCentral customer/user feedback response (Global)
• Support new SMS cyber security certification
• Support device patch upgrade
• Improve BI features (people counting, heat map etc.)
• Smart wall module support PC display card
• RSM module support access control
• Improve UX, release Visual 2.0
HikCentral V1.4

More Related Content

What's hot

What's hot (20)

Presentation on FACE MASK DETECTION
Presentation on FACE MASK DETECTIONPresentation on FACE MASK DETECTION
Presentation on FACE MASK DETECTION
 
Fields of digital image processing slides
Fields of digital image processing slidesFields of digital image processing slides
Fields of digital image processing slides
 
Computer vision introduction
Computer vision  introduction Computer vision  introduction
Computer vision introduction
 
MagicEye Driver Fatigue Monitoring System
MagicEye Driver Fatigue Monitoring System MagicEye Driver Fatigue Monitoring System
MagicEye Driver Fatigue Monitoring System
 
Vehicle tracking system using gps and gsm
Vehicle tracking system using gps and gsmVehicle tracking system using gps and gsm
Vehicle tracking system using gps and gsm
 
Fuzzy image processing- fuzzy C-mean clustering
Fuzzy image processing- fuzzy C-mean clusteringFuzzy image processing- fuzzy C-mean clustering
Fuzzy image processing- fuzzy C-mean clustering
 
Emotion recognition using image processing in deep learning
Emotion recognition using image     processing in deep learningEmotion recognition using image     processing in deep learning
Emotion recognition using image processing in deep learning
 
Facel expression recognition
Facel expression recognitionFacel expression recognition
Facel expression recognition
 
Criminal identification system
Criminal identification systemCriminal identification system
Criminal identification system
 
"Intelligent Video Surveillance: Are We There Yet?," a Presentation from Chec...
"Intelligent Video Surveillance: Are We There Yet?," a Presentation from Chec..."Intelligent Video Surveillance: Are We There Yet?," a Presentation from Chec...
"Intelligent Video Surveillance: Are We There Yet?," a Presentation from Chec...
 
IMAGE SEGMENTATION.
IMAGE SEGMENTATION.IMAGE SEGMENTATION.
IMAGE SEGMENTATION.
 
Automotive infotainment system
Automotive infotainment systemAutomotive infotainment system
Automotive infotainment system
 
Introduction of Faster R-CNN
Introduction of Faster R-CNNIntroduction of Faster R-CNN
Introduction of Faster R-CNN
 
Automobile UX: Emerging Infotainment Systems and In-Car Apps From a User Expe...
Automobile UX: Emerging Infotainment Systems and In-Car Apps From a User Expe...Automobile UX: Emerging Infotainment Systems and In-Car Apps From a User Expe...
Automobile UX: Emerging Infotainment Systems and In-Car Apps From a User Expe...
 
Machine Learning for Self-Driving Cars
Machine Learning for Self-Driving CarsMachine Learning for Self-Driving Cars
Machine Learning for Self-Driving Cars
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Video Processing Applications
Video Processing ApplicationsVideo Processing Applications
Video Processing Applications
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Chest X-ray Pneumonia Classification with Deep Learning
Chest X-ray Pneumonia Classification with Deep LearningChest X-ray Pneumonia Classification with Deep Learning
Chest X-ray Pneumonia Classification with Deep Learning
 
Face Recognition Methods based on Convolutional Neural Networks
Face Recognition Methods based on Convolutional Neural NetworksFace Recognition Methods based on Convolutional Neural Networks
Face Recognition Methods based on Convolutional Neural Networks
 

Similar to hikcentral_introduction_ppt-version_1.2.pdf

Powerpoint Marketing Template
Powerpoint Marketing TemplatePowerpoint Marketing Template
Powerpoint Marketing Template
Mike Lee
 
Integrated-perimeter-protection-solution.pdf
Integrated-perimeter-protection-solution.pdfIntegrated-perimeter-protection-solution.pdf
Integrated-perimeter-protection-solution.pdf
LongJidin1
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
jpmccormack
 
Few RFID security solutions concepts..
Few RFID security solutions concepts..Few RFID security solutions concepts..
Few RFID security solutions concepts..
Vineet M Srivastav
 
Sanctuary Device Control
Sanctuary Device ControlSanctuary Device Control
Sanctuary Device Control
HassaanSahloul
 

Similar to hikcentral_introduction_ppt-version_1.2.pdf (20)

Powerpoint Marketing Template
Powerpoint Marketing TemplatePowerpoint Marketing Template
Powerpoint Marketing Template
 
Access-control-system
Access-control-systemAccess-control-system
Access-control-system
 
Integrated-perimeter-protection-solution.pdf
Integrated-perimeter-protection-solution.pdfIntegrated-perimeter-protection-solution.pdf
Integrated-perimeter-protection-solution.pdf
 
Latest Web based Access Management Software - Resilient Technologies
Latest Web based Access Management Software - Resilient TechnologiesLatest Web based Access Management Software - Resilient Technologies
Latest Web based Access Management Software - Resilient Technologies
 
iGUARD: An Intelligent Way To Secure - Presentation
iGUARD: An Intelligent Way To Secure - PresentationiGUARD: An Intelligent Way To Secure - Presentation
iGUARD: An Intelligent Way To Secure - Presentation
 
Minder RTP Product Overview
Minder RTP Product OverviewMinder RTP Product Overview
Minder RTP Product Overview
 
Multisentry Enterprise Platform
Multisentry Enterprise PlatformMultisentry Enterprise Platform
Multisentry Enterprise Platform
 
protegegx-brochure-ict-access-control- system
protegegx-brochure-ict-access-control- systemprotegegx-brochure-ict-access-control- system
protegegx-brochure-ict-access-control- system
 
Brochure-HikCentral-Professional-V2.4.pdf.pptx
Brochure-HikCentral-Professional-V2.4.pdf.pptxBrochure-HikCentral-Professional-V2.4.pdf.pptx
Brochure-HikCentral-Professional-V2.4.pdf.pptx
 
Surveon Video Management Solutions - Feature Highlights
Surveon Video Management Solutions - Feature HighlightsSurveon Video Management Solutions - Feature Highlights
Surveon Video Management Solutions - Feature Highlights
 
Migrate from BigFix to Ivanti
Migrate from BigFix to IvantiMigrate from BigFix to Ivanti
Migrate from BigFix to Ivanti
 
Internet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsInternet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open Standards
 
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
 
ACTAtek 3 Introduction
ACTAtek 3 IntroductionACTAtek 3 Introduction
ACTAtek 3 Introduction
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 
Few RFID security solutions concepts..
Few RFID security solutions concepts..Few RFID security solutions concepts..
Few RFID security solutions concepts..
 
Sanctuary Device Control
Sanctuary Device ControlSanctuary Device Control
Sanctuary Device Control
 
CIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open StandardsCIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open Standards
 

More from MichelleSaver (6)

20160913_AlteryxPHX.PPTX
20160913_AlteryxPHX.PPTX20160913_AlteryxPHX.PPTX
20160913_AlteryxPHX.PPTX
 
13733827.ppt
13733827.ppt13733827.ppt
13733827.ppt
 
9222290.ppt
9222290.ppt9222290.ppt
9222290.ppt
 
9544349.ppt
9544349.ppt9544349.ppt
9544349.ppt
 
Media_644046_smxx (1).pptx
Media_644046_smxx (1).pptxMedia_644046_smxx (1).pptx
Media_644046_smxx (1).pptx
 
vtiger.ppt
vtiger.pptvtiger.ppt
vtiger.ppt
 

Recently uploaded

Prest Reed Portfolio revamp Full Sail Presentation 2
Prest Reed Portfolio revamp Full Sail Presentation 2Prest Reed Portfolio revamp Full Sail Presentation 2
Prest Reed Portfolio revamp Full Sail Presentation 2
5203records
 
Abortion Clinic in Hazyview +27791653574 Hazyview WhatsApp Abortion Clinic Se...
Abortion Clinic in Hazyview +27791653574 Hazyview WhatsApp Abortion Clinic Se...Abortion Clinic in Hazyview +27791653574 Hazyview WhatsApp Abortion Clinic Se...
Abortion Clinic in Hazyview +27791653574 Hazyview WhatsApp Abortion Clinic Se...
mikehavy0
 
Rahul Chauhan - Data Scientist Resume.pdf
Rahul Chauhan - Data Scientist Resume.pdfRahul Chauhan - Data Scientist Resume.pdf
Rahul Chauhan - Data Scientist Resume.pdf
rach3246
 
一比一原版(UCI毕业证)加州大学欧文分校毕业证成绩单学位证留信学历认证
一比一原版(UCI毕业证)加州大学欧文分校毕业证成绩单学位证留信学历认证一比一原版(UCI毕业证)加州大学欧文分校毕业证成绩单学位证留信学历认证
一比一原版(UCI毕业证)加州大学欧文分校毕业证成绩单学位证留信学历认证
vflw6bsde
 
如何办理(USC毕业证书)南加利福尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(USC毕业证书)南加利福尼亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(USC毕业证书)南加利福尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(USC毕业证书)南加利福尼亚大学毕业证成绩单本科硕士学位证留信学历认证
gakamzu
 
Abortion pills in Jeddah Saudi Arabia (+966572737505) buy cytotec
Abortion pills in Jeddah Saudi Arabia (+966572737505) buy cytotecAbortion pills in Jeddah Saudi Arabia (+966572737505) buy cytotec
Abortion pills in Jeddah Saudi Arabia (+966572737505) buy cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
如何办理(TMU毕业证书)多伦多都会大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(TMU毕业证书)多伦多都会大学毕业证成绩单本科硕士学位证留信学历认证如何办理(TMU毕业证书)多伦多都会大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(TMU毕业证书)多伦多都会大学毕业证成绩单本科硕士学位证留信学历认证
gkyvm
 
如何办理纽约大学毕业证(NYU毕业证)成绩单硕士学位证原版一比一
如何办理纽约大学毕业证(NYU毕业证)成绩单硕士学位证原版一比一如何办理纽约大学毕业证(NYU毕业证)成绩单硕士学位证原版一比一
如何办理纽约大学毕业证(NYU毕业证)成绩单硕士学位证原版一比一
ovxelckll
 
如何办理(UoA毕业证书)奥克兰大学毕业证成绩单原件一模一样
如何办理(UoA毕业证书)奥克兰大学毕业证成绩单原件一模一样如何办理(UoA毕业证书)奥克兰大学毕业证成绩单原件一模一样
如何办理(UoA毕业证书)奥克兰大学毕业证成绩单原件一模一样
qyguxu
 
B. A. (Prog.) Political Science 6th Semester 2019.pdf
B. A. (Prog.) Political Science 6th Semester 2019.pdfB. A. (Prog.) Political Science 6th Semester 2019.pdf
B. A. (Prog.) Political Science 6th Semester 2019.pdf
paraspiyush3
 
如何办理(Galway毕业证书)爱尔兰高威大学毕业证成绩单原件一模一样
如何办理(Galway毕业证书)爱尔兰高威大学毕业证成绩单原件一模一样如何办理(Galway毕业证书)爱尔兰高威大学毕业证成绩单原件一模一样
如何办理(Galway毕业证书)爱尔兰高威大学毕业证成绩单原件一模一样
qyguxu
 
如何办理(UST毕业证书)圣托马斯大学毕业证成绩单原件一模一样
如何办理(UST毕业证书)圣托马斯大学毕业证成绩单原件一模一样如何办理(UST毕业证书)圣托马斯大学毕业证成绩单原件一模一样
如何办理(UST毕业证书)圣托马斯大学毕业证成绩单原件一模一样
muwyto
 
WIOA Program Info Session | PMI Silver Spring Chapter | May 17, 2024
WIOA Program Info Session | PMI Silver Spring Chapter | May 17, 2024WIOA Program Info Session | PMI Silver Spring Chapter | May 17, 2024
WIOA Program Info Session | PMI Silver Spring Chapter | May 17, 2024
Hector Del Castillo, CPM, CPMM
 
BLAHALIFHKSDFOILEWKHJSFDNLDSKFN,DLFKNFMELKFJAERPIOAL
BLAHALIFHKSDFOILEWKHJSFDNLDSKFN,DLFKNFMELKFJAERPIOALBLAHALIFHKSDFOILEWKHJSFDNLDSKFN,DLFKNFMELKFJAERPIOAL
BLAHALIFHKSDFOILEWKHJSFDNLDSKFN,DLFKNFMELKFJAERPIOAL
CaitlinCummins3
 

Recently uploaded (20)

Prest Reed Portfolio revamp Full Sail Presentation 2
Prest Reed Portfolio revamp Full Sail Presentation 2Prest Reed Portfolio revamp Full Sail Presentation 2
Prest Reed Portfolio revamp Full Sail Presentation 2
 
Abortion Clinic in Hazyview +27791653574 Hazyview WhatsApp Abortion Clinic Se...
Abortion Clinic in Hazyview +27791653574 Hazyview WhatsApp Abortion Clinic Se...Abortion Clinic in Hazyview +27791653574 Hazyview WhatsApp Abortion Clinic Se...
Abortion Clinic in Hazyview +27791653574 Hazyview WhatsApp Abortion Clinic Se...
 
We’re looking for a Technology consultant to join our Team!
We’re looking for a Technology consultant to join our Team!We’re looking for a Technology consultant to join our Team!
We’re looking for a Technology consultant to join our Team!
 
Rahul Chauhan - Data Scientist Resume.pdf
Rahul Chauhan - Data Scientist Resume.pdfRahul Chauhan - Data Scientist Resume.pdf
Rahul Chauhan - Data Scientist Resume.pdf
 
Sales Experience Presentation - Angel Lopez
Sales Experience Presentation - Angel LopezSales Experience Presentation - Angel Lopez
Sales Experience Presentation - Angel Lopez
 
We’re looking for a junior patent engineer to join our Team!
We’re looking for a junior patent engineer to join our Team!We’re looking for a junior patent engineer to join our Team!
We’re looking for a junior patent engineer to join our Team!
 
一比一原版(UCI毕业证)加州大学欧文分校毕业证成绩单学位证留信学历认证
一比一原版(UCI毕业证)加州大学欧文分校毕业证成绩单学位证留信学历认证一比一原版(UCI毕业证)加州大学欧文分校毕业证成绩单学位证留信学历认证
一比一原版(UCI毕业证)加州大学欧文分校毕业证成绩单学位证留信学历认证
 
如何办理(USC毕业证书)南加利福尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(USC毕业证书)南加利福尼亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(USC毕业证书)南加利福尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(USC毕业证书)南加利福尼亚大学毕业证成绩单本科硕士学位证留信学历认证
 
Abortion pills in Jeddah Saudi Arabia (+966572737505) buy cytotec
Abortion pills in Jeddah Saudi Arabia (+966572737505) buy cytotecAbortion pills in Jeddah Saudi Arabia (+966572737505) buy cytotec
Abortion pills in Jeddah Saudi Arabia (+966572737505) buy cytotec
 
如何办理(TMU毕业证书)多伦多都会大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(TMU毕业证书)多伦多都会大学毕业证成绩单本科硕士学位证留信学历认证如何办理(TMU毕业证书)多伦多都会大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(TMU毕业证书)多伦多都会大学毕业证成绩单本科硕士学位证留信学历认证
 
如何办理纽约大学毕业证(NYU毕业证)成绩单硕士学位证原版一比一
如何办理纽约大学毕业证(NYU毕业证)成绩单硕士学位证原版一比一如何办理纽约大学毕业证(NYU毕业证)成绩单硕士学位证原版一比一
如何办理纽约大学毕业证(NYU毕业证)成绩单硕士学位证原版一比一
 
The Best VFX Course with Job Placement near Dunlop
The Best VFX Course with Job Placement near DunlopThe Best VFX Course with Job Placement near Dunlop
The Best VFX Course with Job Placement near Dunlop
 
如何办理(UoA毕业证书)奥克兰大学毕业证成绩单原件一模一样
如何办理(UoA毕业证书)奥克兰大学毕业证成绩单原件一模一样如何办理(UoA毕业证书)奥克兰大学毕业证成绩单原件一模一样
如何办理(UoA毕业证书)奥克兰大学毕业证成绩单原件一模一样
 
B. A. (Prog.) Political Science 6th Semester 2019.pdf
B. A. (Prog.) Political Science 6th Semester 2019.pdfB. A. (Prog.) Political Science 6th Semester 2019.pdf
B. A. (Prog.) Political Science 6th Semester 2019.pdf
 
如何办理(Galway毕业证书)爱尔兰高威大学毕业证成绩单原件一模一样
如何办理(Galway毕业证书)爱尔兰高威大学毕业证成绩单原件一模一样如何办理(Galway毕业证书)爱尔兰高威大学毕业证成绩单原件一模一样
如何办理(Galway毕业证书)爱尔兰高威大学毕业证成绩单原件一模一样
 
LinkedIn For Job Search Presentation May 2024
LinkedIn For Job Search Presentation May 2024LinkedIn For Job Search Presentation May 2024
LinkedIn For Job Search Presentation May 2024
 
Rahul Chauhan - Data Scientist Resume.pdf
Rahul Chauhan - Data Scientist Resume.pdfRahul Chauhan - Data Scientist Resume.pdf
Rahul Chauhan - Data Scientist Resume.pdf
 
如何办理(UST毕业证书)圣托马斯大学毕业证成绩单原件一模一样
如何办理(UST毕业证书)圣托马斯大学毕业证成绩单原件一模一样如何办理(UST毕业证书)圣托马斯大学毕业证成绩单原件一模一样
如何办理(UST毕业证书)圣托马斯大学毕业证成绩单原件一模一样
 
WIOA Program Info Session | PMI Silver Spring Chapter | May 17, 2024
WIOA Program Info Session | PMI Silver Spring Chapter | May 17, 2024WIOA Program Info Session | PMI Silver Spring Chapter | May 17, 2024
WIOA Program Info Session | PMI Silver Spring Chapter | May 17, 2024
 
BLAHALIFHKSDFOILEWKHJSFDNLDSKFN,DLFKNFMELKFJAERPIOAL
BLAHALIFHKSDFOILEWKHJSFDNLDSKFN,DLFKNFMELKFJAERPIOALBLAHALIFHKSDFOILEWKHJSFDNLDSKFN,DLFKNFMELKFJAERPIOAL
BLAHALIFHKSDFOILEWKHJSFDNLDSKFN,DLFKNFMELKFJAERPIOAL
 

hikcentral_introduction_ppt-version_1.2.pdf

  • 1. HikCentral V 1.2 Making Security Easier
  • 2. HikCentral V1.2 01 02 03 What’s New Improvements Spec & Road Map Access Control/Facial Recognition/UVSS Interactive Design/Functionalities/Maintainability/Openness 2018 Road Map
  • 3. System Architecture  Software Structure • Server + Clients  Device /System Layer • Supports Cameras , NVR/DVR Access • Provides Central Storage with Hybrid SAN/Cloud Storage Server • Supports Decoder /Video Wall Controller Management • Supports Keyboard Access • Supports Door Controller and Door Management • Supports Under-Vehicle Surveillance System management  Server Layer • VMS Server for Video Surveillance • Streaming Server for Streaming forwarding and balance • Functional Layer • Centralized Management of all the elements • User-friendly design operation ideally suit for all users • User Interface • Flexible Clients
  • 6. Supports multiple clients Flexible Access Control permissions Seamlessly Iintegration with video surveillance system 1.1 Access Control System Overview
  • 7. Series DS-K2600 Series DS-K2800 Series Standalone Access Control Terminal Fingerprint Enrollment Scanner Card Issue Reader Fingerprint Reader Model DS-K2601 DS-K2801 DS-K1T105E DS-K1T201MF DS-K1F820-F DS-K1F100-D8E DS-K1100 Series DS-K1201EF DS-K2602 DS-K2802 DS-K1T105M DS-K1T201EF-C / DS-K1F180-D8E DS-K1800 Series DS-K1201MF DS-K2604 DS-K2804 DS-K1T105E-C DS-K1T201MF-C / / / / / DS-K1T105M-C DS-K1T802E / / / / / DS-K1T201EF DS-K1T802M / / / 1.1 Device compatibility
  • 8.  Access Group The person's access group. All the persons in the access group have the same permissions  Access Level The person‘s access level. That is, the permissions consisted for a designated time and designated doors. Access Level Other Access Levels Access Level Access Group Jay Simon Assign Remove Jay Simon Remove Assign 1.1.1 Easy Person Management Note: Rules have been created to avoid permission conflicts when multiple administrators configure permissions. Issue  Process Instruction The permitted doors and access time are combined into access levels. Persons are assigned to or removed from an access group with the same access levels. This simplifies person permission configuration. Combine
  • 9. 1.1.1 Easy Person Management Card Reader Access Modes  Card  Fingerprint  Card and Fingerprint  Card or Fingerprint  Card and PIN  PIN and Fingerprint  Card and PIN and Fingerprint Advanced Person Permissions Extend Access:  Extend the door’s open time, suitable for people with limited mobility. Super Permission:  Exempt from remaining locked restriction.  Exempt from anti-passback rule restriction.  Exempt from person’s first card authorization restriction. Note: PIN entry only is not supportedin the HikCentral platform.
  • 10. 1.1.1 Easy Person Management 3.Apply to device. • The person information in the system can be applied to Access groups, Face Comparison Groups, and Attendance Groups. Batch Operation Customized Fields Batch Support for the following: • Importing person photos • Issuing cards • Exporting person information • Importing person information via a template • In addition to the basic, pre-defined information, there are five additional fields which can be customized for your organization's needs. Data Issue • Apply all (manual) is commonly used to issue data increments (e.g., adding a new person). • Apply all (scheduled) is commonly used to issue data on the basis of schedule, avoiding bandwidth occupation when busy. Person Reuse
  • 11. 1.1.2 Access Control Applications - Anti-Passback Increases the area over which persons can apply anti-passback. Configure areas that span across each controller. Note:1.Set the area without the reader sequence  Manually forgive the Anti-Passback on live view: 2. Resetting the anti-passback by schedule is not supported Server  Robust Solution: Area Cable Server Area Network Error Still Alive X Office Area1 Border Door Office Area2 Border Door Border Door
  • 12. 1.1.2 Access Control Applications – First Card Remains Unlocked First Card Remains Unlocked Designated person opens the door after swiping the first card Duration expires Outsiders access area Door opens and remains unlocked for a designated period Restore to door’s initial state Designated person swipes first card again to cancel the authority
  • 13. 1.1.2 Access Control Applications – First Card Authorization First Person Authorization Designated person opens the door after swiping the first card Door is considered authorized Others swipe authorized cards to access area Designated person swipes first card again to cancel the authority Authority automatically withdrawn after 00:00 Restore to door’s initial status
  • 14. 1.1.2 Access Control Applications – Lock All Doors Operators can lock/recover all doors with just one click remotely on the (CS Mobile) client Emergency occur Alarm detected Security staff monitored Manually lock all doors Manually recover  After manually lock all doors is executed, manually recover is necessary if the door is expected to return to its initial status.  Lock all doors is unrestricted when the doors remain unlocked by schedule.  Super permission can exempt from lock all doors period. Lock All Doors
  • 15. Alarms Live View 1.1.3 Video/Access Control Linkages • Live view of person’s access. • Live display of person’s access records and information. • Dual window real-time switch preview. • Real-time control of doors according to person’s access state. Reports • Search person’s records in Access Control module by criteria: person name, certificate result, certificate type. • Playback of person’s access, dual window playback . • Display of person’s detailed information. • Cameras can be linked to record when door alarms are triggered. • Door actions can be linked to emergency requirements or other situations when video alarms are triggered.  Live View  Alarms Linkages  Records Search
  • 16. 1.1.4 Time & Attendance T&A follows the principle of first-in and last-out. T&A time schedules support weekly cycles or several fixed days, creating easy attendance management. T&A shift supports fixed and flexible schedule to meet common attendance requirements. T&A supports holiday attendance management , fitting actual attendance needs. T&A supports selecting on-demand attendance points for flexible attendance point management. T&A supports attendance records correction and reports download. T & A Group Jay Simon Assign Remove Jay Simon Shift Schedule T & A Schedule Assign Remove
  • 17. Monitoring Door control Doors can be remotely controlled - unlock / close / keep open / keep close in Live View. So real-time and effective door control will meet some occurrences. 1.1.5 Mobile Client (available May, 2018) Record  Live View • Record • Capture • Voice intercom  Playback • Speed control : 1x, 2x, 4x, 1/2x, 1/4x • Capture • Clip Alarm Door alarms can be received by Mobile Client. Related videos, images and detailed alarm information are shown to accurately assess situations.
  • 19. 1.2 HikCentral Facial Recognition Intelligent Devices HikCentral High Recognition Rate User-friendly Interface Intelligent Retrieval HikCentral incorporates powerful facial recognition functions from Hikvision's intelligentdevices. • Multi-level deep-learning algorithms create strong environmental adaptability • Good User Interface design makes it easy to manage thousands of facial images • Video clips can be retrieved by specific human faces • Advanced Face Detection event and alarm functions help to increase business security and recognize your customers
  • 20. 1.2.1 Facial Recognition Process 01 02 03 04 Import all the people you want to monitor into a face group HikCentral sends the face list to an intelligent device such as an DeepinMind NVR Example for VIP List Facial Recognition Module Devices The camera captures a face and the system runs comparison analytics. HikCentral clients receive the comparison result , record it as a face event, and display it in the view window 05 HikCentral generates an alarm and informs security Comparison The Face Detection event can send an alarm and inform security personnel to take further action
  • 21. 1.2.2 Intelligent Monitoring  Automatically display all the captured Faces  Displays match results with similarities  Click the corresponding picture to get detailed information  Support “Search by picture” with intelligent devices .  Add the suspicious picture into a person group.  Display multiple cameras' s result simultaneously.
  • 22. 1.2.3 Intelligent Retrieval  Search related video clips with Time, Picture, Name and Similarity.  Multiple searches allows you to find the “one” you want  Search results across multiple devices to achieve centralized face management  Alarm information provides face picture, face ID, telephone number, similarity, video ,captured picture, and additional information
  • 24. Hand-held Model • Time-consuming, low-efficiency • Areas easy to miss inspection • Standalone device, unable to post review Rail-mounted Model • Vehicle needs to be stopped for inspection, low-efficiency • Results shown in multiple images • Moving components reduce product lifespan • Complicated installation Mobile Model • Light material, easily damaged • Image is easily damaged by vehicle Shaking. • Poor protection performance 1.3.1 Issues with Current Models on the Market
  • 25. 1.3.2 UVSS in HikCentral UVSS Benefit  Auto-detection of the vehicle undercarriage  Synchronize LPR camera data with Under Vehicle image  Suitable for various vehicle models, entire undercarriage of vehicle in one image .  High-strength structure  High-quality picture, low distortion
  • 26. Efficient Multiple Operations White List and Black List Multiple Maintenance Methods Efficient Monitoring Flexible System Deployment Easy Investigation • Tag the suspicious plate number for later retrieval • Tag multiple suspicious areas with specific picture for later investigation • Manually trigger user-defined events with any pre-defined actions. • List management with the ability to upload reference picture for each plate number • White list and black list alarm • Add a suspicious plate number to the database during live view • Health monitor dashboard for UVSS system (.e.g. Net status, Line Scan camera status, Capture Camera status, Storage status) • Supports device offline/online event monitoring /searching/report • Video search/ VCA search for related cameras • LPR search for corresponding events • Provides the original image with live picture for better comparison • Provides history search records of the car with the same plate number during live view for better investigation • Provides User-defined events search for emergency scenarios • Auto-detection/record vehicle undercarriage without manpower • Manage multiple exits & entrances simultaneously • Ability to provide any type of camera for live view reference • Supports Fixed UVSS and Portable UVSS • Supports 4 UVSS per HikCentral server • IP connectivity 1.3.3 HikCentral with UVSS Benefit Flexible Investigation Operability Maintainable LPR list
  • 28. Overall Improvements Event & Alarm Smart Wall Control Client & BS Experience Map Management Mobile Client Devices Management HikCentral Open-SDK
  • 30. Manual Trigger Alarm Event Report Composite Alarm Richer Events Types Richer Event Types • More Event types to enrich the function of the system • More Device/Storage server events to increase system stability • Addition system settings to provide better maintenance Composite Alarm • Combined multiple events to defined a certain alarm to reduce false alarm • Allow alarm escalation when the alarm is not acknowledged. Manual Trigger Alarms • Allow manually triggered alarms with user-defined events in the Control Client for different scenarios • Test Alarm on Web Client list for better alarm configuration and maintenance Event/Alarm Report • Create event/alarm reports for monitored events on the Web Client and inform users through daily /weekly email • Export the Alarm/Event lists on the Control Client with any filter settings • Report may include the item quantity statistics and basic information 2.1 Event/Alarm Improvements
  • 31. New Module Events New Type Events RS/Encoding Device/ Camera Current Events Improved HikCentral System Monitor 2.1.1 Richer Events Types • 48 door Events • 8 Access Control Device Events • UVSS Events • User Login /Log out • User-defined Event • Expand Hybrid SAN events to 26 in total • Camera Commination Exception/Recovered • Device Recovered • CPU Eexception/ Recovered/Warning • RAM Exception/Recovered/Warning • System Service Abnormally Stopped /Recovered to Run • Clear and unified Event names • Generic Events able to have all the linkages. Unified Event Name for Search <V1.1 V1.2 Control Client Loitering,Loitering Detection Loitering (Detection) Line Crossing, Line Crossing Detection Line Crossing(Detection) Fast Moving, Fast Moving Detection Fast Moving(Detection) Parking, Parking Detection Parking(Detection) Object Removal, Object Removal Detection Object Removal(Detection) Unattended Baggage, Unattended Baggage Detection Unattended Baggage (Detection) Intrusion,Intrusion Detection Intrusion(Detection ) Region Entrance,Region Entrance Detection Region Entrance(Detection) Region Exiting ,Region Exiting Detection Region Exiting Detection) People Gathering , People Gathering Detection People Gathering (Detection)
  • 32. User-defined Events Manual Trigger • Manual trigger in the Control Client to enhance system surveillance (e.g. UVSS, door, camera) • Ability to predefine events and link alarms to notify specific users 3rd-party System Trigger • External events triggered from HikCentral OpenSDK to improve system integration Maintenance Trigger • Alarms not handled after a configurable time period can trigger events, allowing the customer to be informed of significant alarms • Alarms not handled after a configurable time period can trigger alarm escalation Alarm Trigger • Automatically triggered after specific alarm occurs to optimize Event Arming • Multiple alarms triggered simultaneously can result in alarm escalation System Events Trigger • Can be triggered by cameras ,alarm inputs, encoding devices, servers, ANPR, generic events, remote site events • Define different events to trigger for different time periods to provide flexible scenarios 2.1.1 User-defined Events • Triggered by Generic events to allow 3rd-party integration without OpenSDK • Support for new device types and systems Future-proof
  • 33. User-defined event User-defined event2 System event, user- defined events Alarm Manual events,3rd party events, alarm input During arming schedule Not acknowledged after X times User-defined events- other ALL events, alarm inputs Automatic arming started Composed Automatic arming stopped User-defined event User-defined event2 2.1.1 How Do User-defined Events Work?
  • 34. Event detected (Camera A) Trigger alarm A Operator 1 receives Alarm A in alarm center1 User-defined event B Alarm Escalation : Operator 1 Detect Intrusion Alarm A: receiver Operator1 Priority 50 Operator needs to acknowledge alarm within X minutes Trigger alarm B Operator 2 receives Alarm B in alarm center2 Operator 2 Alarm B :receiver Operator2 Priority 100 Alarm acknowledged When an important alarm is not acknowledged within a configured time period, it will trigger an Alarm Escalation so a higher-priority operator can help to investigate the alarm. Arming Period Arming Period Alarm dwell X minutes ? Yes 2.1.1 User Case1-Alarm Escalation
  • 35. Event detected (Camera A) Trigger alarm A Operator 1 receives Alarm A in alarm center1 User-defined event B Keep sending until acknowledgement received : Operator 1 Detect Intrusion Alarm A receiver Operator1 Operator needs to acknowledge alarm within X minutes Trigger alarm B Operator 2 receives Alarm B Operator 2 Alarm B receiver Operator2 Alarm acknowledged An important alarm can be resent by a cycle trigger. When the alarm has been acknowledged it will stop triggeringthe same user-defined events. Arming Period Arming Period Alarm dwell X minutes ? Yes 2.1.1 Use Case2-Keep sending until acknowledgement received Alarm dwell X minutes ? No Yes
  • 36. One alarm’s triggering can trigger a user-defined event which can be another alarms’ starting or ending event . This setting is available for more than 2 events happening together to compose an alarm. Composed alarms All the system events can use events-based arming to control the alarm. The arming condition can also contain a time template, making it possible to combine event arming and time arming. Composed events A single event can trigger alarm, but having only one condition may cause false alarms in some complex scenarios. Single event Event arming 2.1.2 Composite Events/Alarms Using events to arm the alarm, the arming events for starting and ending can be alarm input or user-defined events, allowing you to combine 2 events together when triggering an alarm. Alarm Trigger
  • 37. Event detected (Camera A) Trigger UD events Arming Period Arming start User-defined event A (Arming Started Condition) Trigger alarm A operator2 Operator 1 receives Alarm A in alarm center1 Alarm acknowledged Composite Events/Alarms When 2 events happen at night or in a restricted area, it can trigger a composite alarm. Event detect? (Camera B) Arming Period Trigger UD events User-defined event B (Arming Stopped Condition) Arming Stopped Yes No 2.1.2 Use Case2-Composite Events/Alarms
  • 38. 2.1.2 Composite Alarm Example Alarm1 : Trigger Events: If Perimeter Intrusion detected + Person entering area “A” Time period : Weekend Priority :50 A B Alarm2 : Trigger Events: If Perimeter Intrusion detected + Person entering area “B” Time period : Sunday Priority :60 Alarm3 : Trigger Events: Person entering area “A” + Person entering area “B” Time period : Sunday Priority :80 Alarm4 : Trigger Events: Person entering area “A” + Person entering area “B”+1 hour guardless Time period : Sunday Priority :80
  • 39. 2.1.2 Composite Events/Alarm Example Person Detection Alarm1 Person Detection Alarm2 Intrusion Intrusion Person Detection Person Detection Alarm3 Alarm4
  • 40. 2.1.2 Configuration Example Alarm1 : • UD-Perimeter Intrusion detected trigger: Intrusion event triggered on Weekend • UD-Alarm 1 trigger: Automatically triggered by Alarm1 • Event arming:  Start event: UD-Perimeter Intrusion detected  Stop event: UD-Alarm 1 • Trigger event: Person detected in area “A” UD = User-defined events Alarm2 : • UD-Perimeter Intrusion detected 2 trigger: Intrusion event triggered on Sunday • UD-Alarm 2 trigger: Automatically triggered by Alarm2 • Event arming:  Start event: UD-Perimeter Intrusion detected 2  Stop event: UD-Alarm 2 • Trigger event: Person detected in area “B” Alarm3 : • UD-Manual Stop arming :Manual trigger by operator • Event arming:  Start event: UD-Alarm 1  Stop event: UD-Manual Stop arming • Trigger event: UD-Alarm2 Alarm4 : • UD-Alarm 3 trigger: one hour after Alarm3 triggered and this alarm not acknowledged. • Event arming:  Start event: UD-Alarm 1  Stop event: UD-Manual Stop arming • Trigger event: UD-Alarm 3 Add UD Events Define the UD trigger with system events Event Arming configuration Alarms not acknowledged after a configured period of time trigger UD events
  • 41. 2.1.3 Manual Trigger Events/Alarms Manual Alarm Testing on the Web Client: • Check if the alarm linkage responds as configured • Check if the composite alarm configuration is working • Easy to create alarm demo in Control Client • Adjust the alarm settings according to the test results Manual alarm triggering on the Control Client • Different users can trigger different UD events • Manually trigger UD events to arm/disarm an alarm • Manually trigger UD events to create system alarms and triggers with pre-configured actions UD = User-defined events
  • 42. User-defined event A ( Arming Started Condition ) User-defined event B ( Arming Stopped Condition ) operator 1 Operator 1 monitors the building entrance Arming period Manual trigger UD A operator 2 Operator 2 receives Alarm B in alarm center2 Trigger alarm B Event detect? (Alarm Source) Manual trigger Alarm acknowledged Arming stopped Manual arming: Operator can manually arm or disarm events Manually trigger alarms for suspicious behavior 2.1.3 Manual Arming/Manual Triggering Alarms Operator1 detects some suspicious behavior Suspicious behavior confirmed Trigger alarm A Arming period Operator 1 receives Alarm A in alarm center1
  • 43. 2.1.4 Event/Alarm Report Create Event /Alarm reports on the Web Client • Export to PDF, Excel format • Daily/Weekly email reports • Batch adding of Events/Alarms • Up to 32 events or alarms can be configured in one report. • Up to 10,000 events or alarms can be calculated in total. Create Event /Alarm reports on the Control Client • Generate reports by multiple condition in Event & Alarm Search • Export in PDF, Excel, CSV format • Generate key information summary • Alarm list displays Area information • Each alarm in alarm list could jump to Alarm Search and automatically fill in the alarm source ,event type and more (e.g. LPR events come with plate number, vehicle list )
  • 45. 2.2 Smart Wall  Window Expand and Restore  Roaming window operation  Window Expand and Restore  Display Stream details in the Control Client  1200K/1600K Keyboard  64/69 Series Decoding devices  C10S video wall Controller  32 Smart Walls  32 Decoding devices 1 2 3 Note: 64 series Decoding devices: 1.Not support enlarging sub window after window division. C10Snot support : 1.creating roaming windows on the Split Window 2.Split windows under the Roaming Window; Supports the following:
  • 47. Live view +Playback +Map=View • The logical resource tree, View pane, and map show their corresponding relationship. • If you select a pane, the map automatically translates to the location of the monitoring point, and the resource point is highlighted. • Map pane defaults to display the location of the current selected device resource. • Click an area to see all related E- maps. • Seamless change between live view and playback. • Enable/Disable Map as needed. + View 2.3.1 View Improvements
  • 48. 2.3.2 Fisheye Camera Dewarping HikCentral V1.2  Smooth and Intuitive operation design.  Support zoom to expand the video using the mouse wheel &Flexible PTZ operation.  Multiple Fisheye Dewarping support without software limitation but with only hardware performance limitation. HikCentral V1.1.1  Using the cursor for control is less intuitive.  Only support one channel dewarping.
  • 49. 2.3.3 PTZ Operation Improvements HikCentral V1.2  Smooth and Intuitive operation design.  Support for PTZ operation on Chrome ,IE10/11, etc.  Enhanced cursor operation, combines the 3D positioning function and zooming In /Out.  Support achieving different speed according to how far the cursor position is from the center. HikCentral V1.1.1  Using the cursor for control is less intuitive and difficult to control.  Support for PTZ control on Control client.  Support for PTZ operation on IE only.
  • 50. 2.3.4 People Counting Improvements Enter and Exit: • Display reports with All cameras or specific cameras Key Improvements: • Increase the camera for reports from 4 to 8 • Display the totals of multiple cameras Enter or Exit Only: • Display both the total amounts and statistic data of specific cameras
  • 51.  Per client supports 256 channels for live video simultaneously.  Support searching Video clip of the cameras belong to the remote site.  Continuous Decoding Switch : When switch window division between one window and multiple windows.  Video Caching Setting : Video Caching should be determined based on network performance, computer performance , and bit rate. large frame caching will result in better video performance.  Display Stream Bitrate, Frame Rate, Resolution, Stream Format per channel.  ANPR Alarm provide Owner info. Easy to Use Performance User Experice Improvements Visibility  Support Opening/Closing the alarm output belong to the same area during per camera viewing.  Double-click the resource tree to get live view/playback channel by channel. The view division will automatically change to fit the channel number.  View function is supported in both live view and playback. Camera list is displayed in view. 2.3.5 Other Improvements in Control Client
  • 52. Non-IE Browser Support(Chrome and Firefox) • Support open Digital Zoom, Audio Control, Switch Stream types and Instant Playback. • Support PTZ operations. • Searching and zooming time during playback. UX Improvements • Support list items by alphabet order: logical area list ,Trigger Events, Assign Roles for each user, alarm receipts, etc. • Combine logic setting and recoding setting together for each channels, and keep you stopping at one page to get all the setting. License & Users Management Improvements • Support setting max login number per user to avoid unauthorized person login the system via specific account. • Support setting initial password while creating users. To avoid unauthorized person use the default Abc123 to login to the system. • Support displaying all the login numbers/types of each users. • System License Management : SUP Expire time display, warning about trail license expiation, lacking of resource license (e.g. camera license less than 7)Warning. 2.3.6 Other Improvements in Browser Client
  • 54. 2.4.1 Map Improvements RSM (GIS & Static images) VSM (GIS & Static images) RSM ( GIS &E-map ,GIS map support manages remote sites only) VSM ( E-map ) HikCentral V1.1.1 HikCentral V1.2  Users can manage the resources of remote sites more dynamically in GIS.  Integrated map display and resource management, including hot region configuration cameras, doors, hot regions, alarm Inputs/Outputs, remote sites, UVSSs.  Map display and monitor integration. In live view, functions can be accessed on the map.
  • 55.  Live View /playback single/multiple cameras from GIS Map with simply drag the cameras from the map.  Lock/unlock the doors , get related videos and other info of doors.  Arming control for the cameras, UVSS, doors.  History Alarm Search for the cameras, UVSS, doors.  Edit/ Delete the labels.  Get related video of UVSS.  Support turn on the Outputs.  Quickly jump to other e-map via hot region. GIS And more …… 2.4.2 GIS Map Operation
  • 57. 2.5.1 New Features In Mobile(Available May, 2018) Newly added Access Control Newly added ANPR Newly added UVSS Mobile Client Support for iPad, iPhone, Android phones, and Android tablets Mobile Access: anywhere, anytime Download from Google Play or App Store
  • 58. 2.5.2 UI Improvement  Intuitive GUI Design  Support maximization Preview/ Playback monitor screen
  • 59.  Emphasize important information  Alarm cue card 2.5.2 UI Improvement
  • 61. 2.6.1 Devices Management Optimizing Devices VMS platform Enhance HikCentral V1.2 optimizes Devices Access which improve performance and the easy-use of the platform Optimize  When playback the camera via WAN access support indicate the recording status on Month calendar.  Support changing the password and activating the device in batch.  Support to set Audio control per channel.  Support one-touch configuration for Hybrid SAN.
  • 62. 2.6.2 Health Monitoring  New Resources Status : Access Control ,UVSS , Access Control Device.  More clearer definition of Camera Status : Integrated Getting Signal Flailed and Getting Recording Schedule Failed into Communication Error ; Signal Loss Rename to Video Loss.  Allow change Device Access Mode .  Provide More info to diagnose error massage of Hybrid SAN.  Incoming /Outcoming streaming number/status for Streaming Gateway.  CPU /Memory Usage and Status displaying(via BS setting).
  • 63. SMS: Streaming Server 2.6.3 Device Access Mode VLAN Isolation IPC VSM(SG): Streaming Gateway Control client LAN 1 LAN 2  Direct Connection When CC & devices are in the same network, CS client get stream via local network to achieve a better network performance.  Proxy If Control Client and devices are isolated by different VLAN, or the control client is in another LAN , the CS client need to access the streaming via SG.  SMS Support choosing the specific channel(s) to go through the specific SMS to expand the streaming performance. Control client Control client ×
  • 64. 2.6.3 Device Access Mode  BS admin • Automatically judge: The system automatically judges the network topology and results in some with proxy mode and some with direct mode. • Proxy: All the device chooses the direct mode to avoid some mistakes e.g. when the system can not judge if the device and client’s network are isolated by VLAN.  CS Client • support searching the device by name or IP address in batch, and selecting them to change the device access mode. • Support display all the device Access Mode. • Restore Default: using the BS admin configuration. • Automatically judge. • Direct connect. Even the BS admin had configured the camera to go through SMS, it still works. • Proxy: Even the BS admin had configured the camera to go through SMS, it still work.  BS Client • Support the same mode with CS client for all cameras.
  • 65. 2.6.4 Hybrid SAN of the health Monitoring  Detailed cameras information in Hybrid SAN  Detailed Hardware Status of Hybrid SAN  Detailed HDD Status of Hybrid SAN
  • 66. 2.6.5 OpenSDK OpenSDK enables HikCentral an corroborative platform, providing the ability for HC to be integrated with 3rd party system. Simple  Easy to install  easy to use Samples  Detailed API code  Multilingual code Standard  Standard specification allows large systems to integrate HikCentral. Consistent & Documented  Continuous iteration update  Rich interface information and product manuals. Note: You are suggested to sign MLA before using OpenSDK. Please get more info via the link: http://127.0.0.1:5000/ISAPI/OpenSdk/Documentation/index.html?url=/swagger/v1/swagger.json after installing HikCentral and OpenSDK . OpenSDK
  • 68. VSM Server’s Maximum Performance Items Without RSM (E3-1220) With RSM (E5-2620) Face Comparison Face Pictures 10,000 10,000 Face Comparison Groups 64 64 Persons in One Face Comparison Group 10,000 10,000 Smart Wall Decoding Devices 32 32 Smart Walls 32 32 View Groups 100 100 Views per View Group 10 10 Views Auto-Switched Simultaneously 32 32 Operation Logs Storage 500,000 500,000 Person Persons 10,000 10,000 Cards 50,000 50,000 Fingerprints 40,000 40,000 Credentials (Card + Fingerprint) 50,000 50,000 3.1 Software Key Specification
  • 69. VSM Server’s Maximum Performance Items Without RSM (E3-1220) With RSM (E5-2620) Access Control Access Control Devices 128 128 Doors 128 128 Doors on Each E-map 128 128 Doors on E-maps in Total 128 128 Anti-Passback Rules 128 128 Doors in One Anti-Passback Rule 16 16 Access Groups 64 64 Persons in One Access Group 1,000 1,000 Access Levels 128 128 Doors in One Access Level 128 128 Access Levels Assigned to One Access Group 8 8 Access Schedules 32 32 Attendance Groups 64 64 Persons in One Attendance Group 1,000 1,000 Shift Schedules 128 128 Holidays 16 16 3.1 Software Key Specification
  • 70. 3.2 Dell Server Specification Feature E3-1220 V5 E5-2620 V4 Processer E3-1220 V5 (4-Core, 3.0 GHz) E5-2620 V4 (8-Core, 2.1 GHz) OperatingSystem Windows Server 2012 R2 Windows Server 2012 R2 Memory 16G DDR4, 2400MT/s UDIMMS 8G RDIMM × 2, 2400MT/s RDIMMS Storage 1T SATA × 2, 3.5" Enterprise SATA 7.2k HDDs 1T SATA × 2, 3.5" Enterprise SATA 7.2k HDDs RAID H330 RAID Controller with RAID 1 H330 RAID Controller with RAID 1 NIC 1GbE × 4 1GbE × 4 Chassis 1U, Rack Mount 2U, Rack Mount Battery CR-2032 Coin Cell/Lithium/0.0032kg CR-2032 Coin Cell/Lithium/0.0032kg Power Supply 250W Cabled PSU 750W AC Power Supply × 2 Dimensions (W × D × H) 482.38 mm × 567.92 mm × 42.8 mm (18.99" × 22.36" × 1.69") 482.38 mm × 755.8 mm × 87.3 mm (18.99" × 29.76" × 3.44") Weight 9.5 kg 23.5 kg Dimensions with Package (W × D × H) 750 mm × 614 mm × 259 mm (29.53" × 24.17" × 10.2") 960 mm × 610 mm × 295 mm (37.8" × 24.02" × 11.61") Weight with Package 15.8 kg (34.8 lb) 32.1 kg (70.8 lb) License License with 64/300 Cameras Manageable License with 16/64/300 Cameras Manageable License with 8 Cameras and 2 Remote Sites Manageable Note: For the detailed specification please refer to the related document 《UD09789B_HikCentral SpecificationV1.2_20180420》
  • 71. Q1 Q2 Q3 Q4 2018 3.3 HikCentral 2018 Product Roadmap 2018/04 - 2018/08 2018/08 - 2019/01 HikCentral V1.3.0  New devices compatible and related application develop: • Windows-based recorder • Facial access controller/gate , related application  New features & function: • HikCentral customer/user feedback response (mainly from N.A) • Enhance cross browser support (plugin) • Mobile apps support face image capture and person info edit • Mobile HD apps function and features improve (Maps, playback thumb • Improve smart wall function and features • Improve database backup and HDD space usage • Improve UX, remove client windows division, 4K auto-adaption etc • Improve AD import (access control person management) • Improve facial related applications • Enhance log search and improve problem shooting user experience  New devices compatible and related application develop: • Ehome 5.0 device (Body worn camera, mobile recorder) • Support mobile surveillance application (GIS enhance) • Alarm panel (not confirm yet)  New features & function: • HikCentral customer/user feedback response (Global) • Support new SMS cyber security certification • Support device patch upgrade • Improve BI features (people counting, heat map etc.) • Smart wall module support PC display card • RSM module support access control • Improve UX, release Visual 2.0 HikCentral V1.4