3. System Architecture
Software Structure
• Server + Clients
Device /System Layer
• Supports Cameras , NVR/DVR Access
• Provides Central Storage with Hybrid SAN/Cloud Storage
Server
• Supports Decoder /Video Wall Controller Management
• Supports Keyboard Access
• Supports Door Controller and Door Management
• Supports Under-Vehicle Surveillance System management
Server Layer
• VMS Server for Video Surveillance
• Streaming Server for Streaming forwarding and balance
• Functional Layer
• Centralized Management of all the elements
• User-friendly design operation ideally suit for all users
• User Interface
• Flexible Clients
6. Supports multiple clients
Flexible Access Control permissions
Seamlessly Iintegration with video
surveillance system
1.1 Access Control System Overview
7. Series DS-K2600 Series DS-K2800 Series Standalone Access Control Terminal
Fingerprint Enrollment
Scanner
Card Issue Reader
Fingerprint
Reader
Model
DS-K2601 DS-K2801 DS-K1T105E DS-K1T201MF DS-K1F820-F DS-K1F100-D8E DS-K1100 Series DS-K1201EF
DS-K2602 DS-K2802 DS-K1T105M DS-K1T201EF-C / DS-K1F180-D8E DS-K1800 Series DS-K1201MF
DS-K2604 DS-K2804 DS-K1T105E-C DS-K1T201MF-C / / /
/ / DS-K1T105M-C DS-K1T802E / / /
/ / DS-K1T201EF DS-K1T802M / / /
1.1 Device compatibility
8. Access Group
The person's access group. All the persons in the
access group have the same permissions
Access Level
The person‘s access level. That is, the
permissions consisted for a designated time
and designated doors.
Access
Level
Other
Access
Levels
Access
Level
Access
Group
Jay
Simon
Assign
Remove
Jay
Simon
Remove
Assign
1.1.1 Easy Person Management
Note: Rules have been created to avoid permission conflicts when multiple administrators configure
permissions.
Issue
Process Instruction
The permitted doors and access time are combined into
access levels. Persons are assigned to or removed from an
access group with the same access levels. This simplifies
person permission configuration.
Combine
9. 1.1.1 Easy Person Management
Card Reader Access Modes
Card
Fingerprint
Card and Fingerprint
Card or Fingerprint
Card and PIN
PIN and Fingerprint
Card and PIN and Fingerprint
Advanced Person Permissions
Extend Access:
Extend the door’s open time, suitable for people with
limited mobility.
Super Permission:
Exempt from remaining locked restriction.
Exempt from anti-passback rule restriction.
Exempt from person’s first card authorization
restriction.
Note: PIN entry only is not supportedin the HikCentral platform.
10. 1.1.1 Easy Person Management
3.Apply to device.
• The person information in the system can be
applied to Access groups, Face Comparison
Groups, and Attendance Groups.
Batch Operation
Customized
Fields
Batch Support for the following:
• Importing person photos
• Issuing cards
• Exporting person information
• Importing person information via a template
• In addition to the basic, pre-defined
information, there are five additional fields
which can be customized for your
organization's needs.
Data Issue
• Apply all (manual) is commonly used to issue data
increments (e.g., adding a new person).
• Apply all (scheduled) is commonly used to issue data on
the basis of schedule, avoiding bandwidth occupation
when busy.
Person Reuse
11. 1.1.2 Access Control Applications - Anti-Passback
Increases the area over which persons can apply anti-passback. Configure areas that span across each controller.
Note:1.Set the area without the reader sequence
Manually forgive the Anti-Passback on live view:
2. Resetting the anti-passback by schedule is not supported
Server
Robust Solution:
Area
Cable
Server
Area
Network Error
Still Alive
X
Office Area1
Border Door
Office Area2
Border Door
Border Door
12. 1.1.2 Access Control Applications – First Card Remains Unlocked
First Card Remains Unlocked
Designated person opens
the door after swiping the
first card
Duration
expires
Outsiders access area
Door opens and
remains unlocked
for a designated
period
Restore to door’s initial state
Designated person swipes
first card again to cancel
the authority
13. 1.1.2 Access Control Applications – First Card Authorization
First Person Authorization
Designated person opens
the door after swiping the
first card
Door is
considered
authorized
Others swipe authorized
cards to access area
Designated person swipes
first card again to cancel
the authority
Authority
automatically
withdrawn after
00:00
Restore to door’s initial status
14. 1.1.2 Access Control Applications – Lock All Doors
Operators can lock/recover all doors with just one click remotely on the (CS Mobile) client
Emergency occur
Alarm detected Security staff monitored
Manually lock all doors
Manually recover
After manually lock all doors is executed, manually recover is necessary if
the door is expected to return to its initial status.
Lock all doors is unrestricted when the doors remain unlocked by
schedule.
Super permission can exempt from lock all doors period.
Lock All Doors
15. Alarms
Live View
1.1.3 Video/Access Control Linkages
• Live view of person’s access.
• Live display of person’s access records and
information.
• Dual window real-time switch preview.
• Real-time control of doors according to person’s
access state.
Reports
• Search person’s records in Access Control module
by criteria: person name, certificate result,
certificate type.
• Playback of person’s access, dual window
playback .
• Display of person’s detailed information.
• Cameras can be linked to record when door
alarms are triggered.
• Door actions can be linked to emergency
requirements or other situations when video
alarms are triggered.
Live View Alarms Linkages
Records Search
16. 1.1.4 Time & Attendance
T&A follows the principle of first-in
and last-out.
T&A time schedules support weekly cycles
or several fixed days, creating easy
attendance management.
T&A shift supports fixed and flexible
schedule to meet common attendance
requirements.
T&A supports holiday attendance
management , fitting actual
attendance needs.
T&A supports selecting on-demand
attendance points for flexible
attendance point management.
T&A supports attendance records
correction and reports download.
T & A
Group
Jay
Simon
Assign
Remove
Jay
Simon
Shift
Schedule
T & A
Schedule
Assign
Remove
17. Monitoring
Door control
Doors can be remotely controlled - unlock / close / keep open / keep
close in Live View. So real-time and effective door control will meet some
occurrences.
1.1.5 Mobile Client (available May, 2018)
Record
Live View
• Record
• Capture
• Voice intercom
Playback
• Speed control : 1x, 2x, 4x, 1/2x, 1/4x
• Capture
• Clip
Alarm
Door alarms can be received by Mobile Client. Related videos, images and
detailed alarm information are shown to accurately assess situations.
19. 1.2 HikCentral Facial Recognition
Intelligent
Devices
HikCentral
High Recognition Rate
User-friendly Interface Intelligent Retrieval
HikCentral incorporates powerful facial recognition functions from Hikvision's intelligentdevices.
• Multi-level deep-learning algorithms
create strong environmental
adaptability
• Good User Interface design makes it easy
to manage thousands of facial images
• Video clips can be retrieved by specific human faces
• Advanced Face Detection event and alarm functions help to
increase business security and recognize your customers
20. 1.2.1 Facial Recognition Process
01
02
03
04
Import all the people you want to
monitor into a face group
HikCentral sends the face list to an
intelligent device such as an
DeepinMind NVR
Example for VIP List
Facial Recognition
Module
Devices
The camera captures a face and the
system runs comparison analytics. HikCentral clients receive the
comparison result , record it as a face
event, and display it in the view
window
05
HikCentral generates an
alarm and informs
security
Comparison
The Face Detection event can
send an alarm and inform
security personnel to take
further action
21. 1.2.2 Intelligent Monitoring
Automatically display all the captured Faces
Displays match results with similarities
Click the corresponding picture to get detailed information
Support “Search by picture” with intelligent devices .
Add the suspicious picture into a person group.
Display multiple cameras' s result simultaneously.
22. 1.2.3 Intelligent Retrieval
Search related video clips with Time, Picture, Name and Similarity.
Multiple searches allows you to find the “one” you want
Search results across multiple devices to achieve centralized face
management
Alarm information provides face picture, face ID, telephone number,
similarity, video ,captured picture, and additional information
24. Hand-held Model
• Time-consuming, low-efficiency
• Areas easy to miss inspection
• Standalone device, unable to post review
Rail-mounted Model
• Vehicle needs to be stopped for inspection,
low-efficiency
• Results shown in multiple images
• Moving components reduce product
lifespan
• Complicated installation
Mobile Model
• Light material, easily damaged
• Image is easily damaged by vehicle Shaking.
• Poor protection performance
1.3.1 Issues with Current Models on the Market
25. 1.3.2 UVSS in HikCentral
UVSS Benefit
Auto-detection of the vehicle undercarriage
Synchronize LPR camera data with Under Vehicle image
Suitable for various vehicle models, entire undercarriage of vehicle in one
image .
High-strength structure
High-quality picture, low distortion
26. Efficient
Multiple Operations
White List and Black List
Multiple Maintenance Methods
Efficient Monitoring
Flexible System Deployment
Easy Investigation
• Tag the suspicious plate number for later retrieval
• Tag multiple suspicious areas with specific picture for later
investigation
• Manually trigger user-defined events with any pre-defined actions.
• List management with the ability to upload reference picture for
each plate number
• White list and black list alarm
• Add a suspicious plate number to the database during live view
• Health monitor dashboard for UVSS system (.e.g.
Net status, Line Scan camera status, Capture
Camera status, Storage status)
• Supports device offline/online event monitoring
/searching/report
• Video search/ VCA search for related cameras
• LPR search for corresponding events
• Provides the original image with live picture for better comparison
• Provides history search records of the car with the same plate number
during live view for better investigation
• Provides User-defined events search for emergency scenarios
• Auto-detection/record vehicle undercarriage without
manpower
• Manage multiple exits & entrances simultaneously
• Ability to provide any type of camera for live view reference
• Supports Fixed UVSS and Portable UVSS
• Supports 4 UVSS per HikCentral server
• IP connectivity
1.3.3 HikCentral with UVSS Benefit
Flexible
Investigation
Operability
Maintainable
LPR list
30. Manual Trigger Alarm
Event Report
Composite Alarm
Richer Events Types
Richer Event Types
• More Event types to enrich the function of the system
• More Device/Storage server events to increase system stability
• Addition system settings to provide better maintenance
Composite Alarm
• Combined multiple events to defined a certain alarm
to reduce false alarm
• Allow alarm escalation when the alarm is not
acknowledged.
Manual Trigger Alarms
• Allow manually triggered alarms with user-defined events
in the Control Client for different scenarios
• Test Alarm on Web Client list for better alarm
configuration and maintenance
Event/Alarm Report
• Create event/alarm reports for monitored events on the
Web Client and inform users through daily /weekly email
• Export the Alarm/Event lists on the Control Client with
any filter settings
• Report may include the item quantity statistics and basic
information
2.1 Event/Alarm Improvements
31. New Module Events
New Type Events
RS/Encoding Device/
Camera
Current Events Improved
HikCentral System
Monitor
2.1.1 Richer Events Types
• 48 door Events
• 8 Access Control Device Events
• UVSS Events
• User Login /Log out
• User-defined Event
• Expand Hybrid SAN events to 26 in total
• Camera Commination Exception/Recovered
• Device Recovered
• CPU Eexception/ Recovered/Warning
• RAM Exception/Recovered/Warning
• System Service Abnormally Stopped /Recovered to Run
• Clear and unified Event names
• Generic Events able to have all the linkages.
Unified Event Name for Search
<V1.1 V1.2 Control Client
Loitering,Loitering Detection Loitering (Detection)
Line Crossing, Line Crossing Detection Line Crossing(Detection)
Fast Moving, Fast Moving Detection Fast Moving(Detection)
Parking, Parking Detection Parking(Detection)
Object Removal, Object Removal Detection Object Removal(Detection)
Unattended Baggage, Unattended Baggage
Detection
Unattended Baggage
(Detection)
Intrusion,Intrusion Detection Intrusion(Detection )
Region Entrance,Region Entrance Detection Region Entrance(Detection)
Region Exiting ,Region Exiting Detection Region Exiting Detection)
People Gathering , People Gathering Detection People Gathering (Detection)
32. User-defined Events
Manual Trigger
• Manual trigger in the Control Client to enhance system
surveillance (e.g. UVSS, door, camera)
• Ability to predefine events and link alarms to notify
specific users
3rd-party System Trigger
• External events triggered from HikCentral
OpenSDK to improve system integration
Maintenance Trigger
• Alarms not handled after a configurable time period can
trigger events, allowing the customer to be informed of
significant alarms
• Alarms not handled after a configurable time period can
trigger alarm escalation
Alarm Trigger
• Automatically triggered after specific alarm occurs to
optimize Event Arming
• Multiple alarms triggered simultaneously can result in
alarm escalation
System Events Trigger
• Can be triggered by cameras ,alarm inputs, encoding devices,
servers, ANPR, generic events, remote site events
• Define different events to trigger for different time periods to
provide flexible scenarios
2.1.1 User-defined Events
• Triggered by Generic events to allow 3rd-party
integration without OpenSDK
• Support for new device types and systems
Future-proof
33. User-defined event
User-defined
event2
System event, user-
defined events
Alarm
Manual events,3rd
party events, alarm
input
During
arming
schedule
Not
acknowledged
after X times
User-defined events-
other
ALL events, alarm
inputs
Automatic arming
started Composed
Automatic arming
stopped
User-defined event
User-defined event2
2.1.1 How Do User-defined Events Work?
34. Event detected
(Camera A) Trigger alarm A Operator 1 receives Alarm A
in alarm center1
User-defined event B
Alarm Escalation :
Operator 1
Detect Intrusion
Alarm A: receiver Operator1
Priority 50
Operator needs to acknowledge
alarm within X minutes
Trigger alarm B
Operator 2 receives Alarm B in alarm center2
Operator 2
Alarm B :receiver Operator2
Priority 100
Alarm
acknowledged
When an important alarm is not acknowledged within a configured
time period, it will trigger an Alarm Escalation so a higher-priority
operator can help to investigate the alarm.
Arming
Period
Arming
Period
Alarm dwell
X minutes
?
Yes
2.1.1 User Case1-Alarm Escalation
35. Event detected
(Camera A) Trigger alarm A Operator 1 receives Alarm A
in alarm center1
User-defined event B
Keep sending until acknowledgement received :
Operator 1
Detect Intrusion
Alarm A receiver Operator1
Operator needs to
acknowledge alarm within X
minutes
Trigger alarm B
Operator 2
receives Alarm B
Operator 2
Alarm B receiver Operator2
Alarm
acknowledged
An important alarm can be resent by a cycle trigger.
When the alarm has been acknowledged it will stop triggeringthe
same user-defined events.
Arming
Period
Arming
Period
Alarm dwell
X minutes
?
Yes
2.1.1 Use Case2-Keep sending until acknowledgement received
Alarm dwell
X minutes
?
No
Yes
36. One alarm’s triggering can trigger a user-defined event
which can be another alarms’ starting or ending event .
This setting is available for more than 2 events
happening together to compose an alarm.
Composed alarms
All the system events can use events-based arming to
control the alarm. The arming condition can also
contain a time template, making it possible to combine
event arming and time arming.
Composed events
A single event can trigger alarm, but having only one
condition may cause false alarms in some complex
scenarios.
Single event
Event arming
2.1.2 Composite Events/Alarms
Using events to arm the alarm, the arming events for
starting and ending can be alarm input or user-defined
events, allowing you to combine 2 events together
when triggering an alarm.
Alarm Trigger
37. Event detected
(Camera A)
Trigger UD events
Arming
Period
Arming
start
User-defined event A
(Arming Started Condition)
Trigger alarm A
operator2
Operator 1 receives Alarm A in
alarm center1
Alarm acknowledged
Composite Events/Alarms
When 2 events happen at night or in a restricted area, it can
trigger a composite alarm.
Event detect?
(Camera B)
Arming
Period Trigger UD events
User-defined event B
(Arming Stopped Condition)
Arming
Stopped
Yes
No
2.1.2 Use Case2-Composite Events/Alarms
38. 2.1.2 Composite Alarm Example
Alarm1 :
Trigger Events: If Perimeter Intrusion detected +
Person entering area “A”
Time period : Weekend
Priority :50
A
B
Alarm2 :
Trigger Events: If Perimeter Intrusion detected +
Person entering area “B”
Time period : Sunday
Priority :60
Alarm3 :
Trigger Events: Person entering area “A”
+ Person entering area “B”
Time period : Sunday
Priority :80
Alarm4 :
Trigger Events: Person entering area “A”
+ Person entering area “B”+1 hour guardless
Time period : Sunday
Priority :80
39. 2.1.2 Composite Events/Alarm Example
Person
Detection
Alarm1
Person
Detection
Alarm2
Intrusion
Intrusion
Person
Detection
Person
Detection
Alarm3
Alarm4
40. 2.1.2 Configuration Example
Alarm1 :
• UD-Perimeter Intrusion detected trigger: Intrusion event triggered on
Weekend
• UD-Alarm 1 trigger: Automatically triggered by Alarm1
• Event arming:
Start event: UD-Perimeter Intrusion detected
Stop event: UD-Alarm 1
• Trigger event: Person detected in area “A”
UD = User-defined events
Alarm2 :
• UD-Perimeter Intrusion detected 2 trigger: Intrusion
event triggered on Sunday
• UD-Alarm 2 trigger: Automatically triggered by
Alarm2
• Event arming:
Start event: UD-Perimeter Intrusion
detected 2
Stop event: UD-Alarm 2
• Trigger event: Person detected in area “B”
Alarm3 :
• UD-Manual Stop arming :Manual trigger by operator
• Event arming:
Start event: UD-Alarm 1
Stop event: UD-Manual Stop arming
• Trigger event: UD-Alarm2
Alarm4 :
• UD-Alarm 3 trigger: one hour after Alarm3 triggered
and this alarm not acknowledged.
• Event arming:
Start event: UD-Alarm 1
Stop event: UD-Manual Stop arming
• Trigger event: UD-Alarm 3
Add UD Events
Define the UD trigger with system events
Event Arming
configuration
Alarms not acknowledged after a configured period of
time trigger UD events
41. 2.1.3 Manual Trigger Events/Alarms
Manual Alarm Testing on the Web Client:
• Check if the alarm linkage responds as configured
• Check if the composite alarm configuration is working
• Easy to create alarm demo in Control Client
• Adjust the alarm settings according to the test results
Manual alarm triggering on the Control Client
• Different users can trigger different UD events
• Manually trigger UD events to arm/disarm an alarm
• Manually trigger UD events to create system alarms and triggers with pre-configured actions
UD = User-defined events
42. User-defined event A
( Arming Started Condition )
User-defined event B
( Arming Stopped Condition )
operator 1
Operator 1 monitors the building
entrance
Arming
period
Manual trigger UD A
operator 2
Operator 2 receives Alarm B in alarm
center2
Trigger alarm B
Event detect?
(Alarm Source)
Manual trigger
Alarm acknowledged
Arming
stopped
Manual arming:
Operator can manually arm or disarm events
Manually trigger alarms for suspicious behavior
2.1.3 Manual Arming/Manual Triggering Alarms
Operator1 detects some
suspicious behavior
Suspicious behavior
confirmed
Trigger alarm A
Arming
period
Operator 1 receives Alarm A
in alarm center1
43. 2.1.4 Event/Alarm Report
Create Event /Alarm reports on the Web
Client
• Export to PDF, Excel format
• Daily/Weekly email reports
• Batch adding of Events/Alarms
• Up to 32 events or alarms can be
configured in one report.
• Up to 10,000 events or alarms can be
calculated in total.
Create Event /Alarm reports on the Control Client
• Generate reports by multiple condition in Event & Alarm Search
• Export in PDF, Excel, CSV format
• Generate key information summary
• Alarm list displays Area information
• Each alarm in alarm list could jump to Alarm Search and automatically fill in the
alarm source ,event type and more (e.g. LPR events come with plate number,
vehicle list )
45. 2.2 Smart Wall
Window Expand and Restore
Roaming window operation
Window Expand and Restore
Display Stream details in the Control Client
1200K/1600K Keyboard
64/69 Series Decoding devices
C10S video wall Controller
32 Smart Walls
32 Decoding devices
1
2
3
Note:
64 series Decoding devices:
1.Not support enlarging sub window after window division.
C10Snot support :
1.creating roaming windows on the Split Window
2.Split windows under the Roaming Window;
Supports the following:
47. Live view +Playback
+Map=View
• The logical resource tree, View
pane, and map show their
corresponding relationship.
• If you select a pane, the map
automatically translates to the
location of the monitoring point,
and the resource point is
highlighted.
• Map pane defaults to display the
location of the current selected
device resource.
• Click an area to see all related E-
maps.
• Seamless change between live
view and playback.
• Enable/Disable Map as needed.
+ View
2.3.1 View Improvements
48. 2.3.2 Fisheye Camera Dewarping
HikCentral V1.2
Smooth and Intuitive operation design.
Support zoom to expand the video using the mouse wheel &Flexible PTZ
operation.
Multiple Fisheye Dewarping support without software limitation but with only
hardware performance limitation.
HikCentral V1.1.1
Using the cursor for control is less intuitive.
Only support one channel dewarping.
49. 2.3.3 PTZ Operation Improvements
HikCentral V1.2
Smooth and Intuitive operation design.
Support for PTZ operation on Chrome ,IE10/11, etc.
Enhanced cursor operation, combines the 3D positioning function and
zooming In /Out.
Support achieving different speed according to how far the cursor position is
from the center.
HikCentral V1.1.1
Using the cursor for control is less intuitive and difficult to control.
Support for PTZ control on Control client.
Support for PTZ operation on IE only.
50. 2.3.4 People Counting Improvements
Enter and Exit:
• Display reports with All cameras or specific cameras
Key Improvements:
• Increase the camera for
reports from 4 to 8
• Display the totals of multiple
cameras
Enter or Exit Only:
• Display both the total amounts and statistic data of specific
cameras
51. Per client supports 256 channels for live video
simultaneously.
Support searching Video clip of the cameras
belong to the remote site.
Continuous Decoding Switch : When switch window
division between one window and multiple windows.
Video Caching Setting : Video Caching should be
determined based on network performance,
computer performance , and bit rate. large frame
caching will result in better video performance.
Display Stream Bitrate, Frame Rate, Resolution, Stream Format per channel.
ANPR Alarm provide Owner info.
Easy to
Use
Performance
User Experice
Improvements
Visibility
Support Opening/Closing the alarm
output belong to the same area during
per camera viewing.
Double-click the resource tree to get live
view/playback channel by channel. The
view division will automatically change to
fit the channel number.
View function is supported in both live
view and playback. Camera list is
displayed in view.
2.3.5 Other Improvements in Control Client
52. Non-IE Browser Support(Chrome and Firefox)
• Support open Digital Zoom, Audio Control, Switch Stream types and
Instant Playback.
• Support PTZ operations.
• Searching and zooming time during playback.
UX Improvements
• Support list items by alphabet order: logical area list ,Trigger Events,
Assign Roles for each user, alarm receipts, etc.
• Combine logic setting and recoding setting together for each channels,
and keep you stopping at one page to get all the setting.
License & Users Management Improvements
• Support setting max login number per user to avoid unauthorized person login the system
via specific account.
• Support setting initial password while creating users. To avoid unauthorized person use
the default Abc123 to login to the system.
• Support displaying all the login numbers/types of each users.
• System License Management : SUP Expire time display, warning about trail license
expiation, lacking of resource license (e.g. camera license less than 7)Warning.
2.3.6 Other Improvements in Browser Client
54. 2.4.1 Map Improvements
RSM (GIS & Static images)
VSM (GIS & Static images)
RSM ( GIS &E-map ,GIS map support manages remote sites only)
VSM ( E-map )
HikCentral V1.1.1
HikCentral V1.2
Users can manage the resources of remote sites
more dynamically in GIS.
Integrated map display and resource
management, including hot region configuration
cameras, doors, hot regions, alarm
Inputs/Outputs, remote sites, UVSSs.
Map display and monitor integration. In live view,
functions can be accessed on the map.
55. Live View /playback single/multiple cameras from GIS Map with simply drag
the cameras from the map.
Lock/unlock the doors , get related videos and other info of doors.
Arming control for the cameras, UVSS, doors.
History Alarm Search for the cameras, UVSS, doors.
Edit/ Delete the labels.
Get related video of UVSS.
Support turn on the Outputs.
Quickly jump to other e-map via hot region.
GIS
And more ……
2.4.2 GIS Map Operation
57. 2.5.1 New Features In Mobile(Available May, 2018)
Newly added Access Control
Newly added ANPR
Newly added UVSS
Mobile Client
Support for iPad, iPhone, Android phones,
and Android tablets
Mobile Access:
anywhere, anytime
Download from Google Play or App Store
61. 2.6.1 Devices Management Optimizing
Devices
VMS platform
Enhance
HikCentral V1.2 optimizes Devices Access which improve performance and the easy-use of the platform
Optimize
When playback the camera via WAN access support
indicate the recording status on Month calendar.
Support changing the password and activating the
device in batch.
Support to set Audio control per channel.
Support one-touch configuration for Hybrid SAN.
62. 2.6.2 Health Monitoring
New Resources Status : Access Control ,UVSS ,
Access Control Device.
More clearer definition of Camera Status :
Integrated Getting Signal Flailed and Getting
Recording Schedule Failed into Communication
Error ; Signal Loss Rename to Video Loss.
Allow change Device Access Mode .
Provide More info to diagnose error massage of
Hybrid SAN.
Incoming /Outcoming streaming number/status
for Streaming Gateway.
CPU /Memory Usage and Status displaying(via BS
setting).
63. SMS: Streaming Server
2.6.3 Device Access Mode
VLAN
Isolation
IPC
VSM(SG): Streaming Gateway Control client
LAN 1
LAN 2
Direct Connection
When CC & devices are in the same network, CS client get
stream via local network to achieve a better network
performance.
Proxy
If Control Client and devices are isolated by different
VLAN, or the control client is in another LAN , the CS
client need to access the streaming via SG.
SMS
Support choosing the specific channel(s) to go through the
specific SMS to expand the streaming performance.
Control client
Control client
×
64. 2.6.3 Device Access Mode
BS admin
• Automatically judge: The system automatically judges the network
topology and results in some with proxy mode and some with direct
mode.
• Proxy: All the device chooses the direct mode to avoid some
mistakes e.g. when the system can not judge if the device and
client’s network are isolated by VLAN.
CS Client
• support searching the device by name or IP address in batch, and
selecting them to change the device access mode.
• Support display all the device Access Mode.
• Restore Default: using the BS admin configuration.
• Automatically judge.
• Direct connect. Even the BS admin had configured the camera to go
through SMS, it still works.
• Proxy: Even the BS admin had configured the camera to go through
SMS, it still work.
BS Client
• Support the same mode with CS client for all cameras.
65. 2.6.4 Hybrid SAN of the health Monitoring
Detailed cameras
information in Hybrid SAN
Detailed Hardware Status of
Hybrid SAN
Detailed HDD Status of Hybrid
SAN
66. 2.6.5 OpenSDK
OpenSDK enables HikCentral an corroborative platform, providing the ability for HC to be
integrated with 3rd party system.
Simple
Easy to install
easy to use
Samples
Detailed API code
Multilingual code
Standard
Standard specification allows
large systems to integrate
HikCentral.
Consistent & Documented
Continuous iteration update
Rich interface information and
product manuals.
Note: You are suggested to sign MLA before using OpenSDK. Please get more info via the link:
http://127.0.0.1:5000/ISAPI/OpenSdk/Documentation/index.html?url=/swagger/v1/swagger.json after installing HikCentral and OpenSDK .
OpenSDK
68. VSM Server’s Maximum Performance
Items
Without RSM
(E3-1220)
With RSM
(E5-2620)
Face Comparison
Face Pictures 10,000 10,000
Face Comparison Groups 64 64
Persons in One Face Comparison Group 10,000 10,000
Smart Wall
Decoding Devices 32 32
Smart Walls 32 32
View Groups 100 100
Views per View Group 10 10
Views Auto-Switched Simultaneously 32 32
Operation Logs Storage 500,000 500,000
Person
Persons 10,000 10,000
Cards 50,000 50,000
Fingerprints 40,000 40,000
Credentials (Card + Fingerprint) 50,000 50,000
3.1 Software Key Specification
69. VSM Server’s Maximum Performance
Items
Without RSM
(E3-1220)
With RSM
(E5-2620)
Access Control
Access Control Devices 128 128
Doors 128 128
Doors on Each E-map 128 128
Doors on E-maps in Total 128 128
Anti-Passback Rules 128 128
Doors in One Anti-Passback Rule 16 16
Access Groups 64 64
Persons in One Access Group 1,000 1,000
Access Levels 128 128
Doors in One Access Level 128 128
Access Levels Assigned to One Access Group 8 8
Access Schedules 32 32
Attendance Groups 64 64
Persons in One Attendance Group 1,000 1,000
Shift Schedules 128 128
Holidays 16 16
3.1 Software Key Specification
70. 3.2 Dell Server Specification
Feature E3-1220 V5 E5-2620 V4
Processer E3-1220 V5 (4-Core, 3.0 GHz) E5-2620 V4 (8-Core, 2.1 GHz)
OperatingSystem Windows Server 2012 R2 Windows Server 2012 R2
Memory 16G DDR4, 2400MT/s UDIMMS 8G RDIMM × 2, 2400MT/s RDIMMS
Storage 1T SATA × 2, 3.5" Enterprise SATA 7.2k HDDs 1T SATA × 2, 3.5" Enterprise SATA 7.2k HDDs
RAID H330 RAID Controller with RAID 1 H330 RAID Controller with RAID 1
NIC 1GbE × 4 1GbE × 4
Chassis 1U, Rack Mount 2U, Rack Mount
Battery CR-2032 Coin Cell/Lithium/0.0032kg CR-2032 Coin Cell/Lithium/0.0032kg
Power Supply 250W Cabled PSU 750W AC Power Supply × 2
Dimensions
(W × D × H)
482.38 mm × 567.92 mm × 42.8 mm
(18.99" × 22.36" × 1.69")
482.38 mm × 755.8 mm × 87.3 mm
(18.99" × 29.76" × 3.44")
Weight 9.5 kg 23.5 kg
Dimensions
with Package
(W × D × H)
750 mm × 614 mm × 259 mm
(29.53" × 24.17" × 10.2")
960 mm × 610 mm × 295 mm
(37.8" × 24.02" × 11.61")
Weight
with Package 15.8 kg (34.8 lb) 32.1 kg (70.8 lb)
License License with 64/300 Cameras Manageable
License with 16/64/300 Cameras Manageable
License with 8 Cameras and 2 Remote Sites Manageable
Note: For the detailed specification please refer to the related document 《UD09789B_HikCentral SpecificationV1.2_20180420》
71. Q1 Q2 Q3 Q4
2018
3.3 HikCentral 2018 Product Roadmap
2018/04 - 2018/08
2018/08 - 2019/01
HikCentral V1.3.0
New devices compatible and related application develop:
• Windows-based recorder
• Facial access controller/gate , related application
New features & function:
• HikCentral customer/user feedback response (mainly from N.A)
• Enhance cross browser support (plugin)
• Mobile apps support face image capture and person info edit
• Mobile HD apps function and features improve (Maps, playback thumb
• Improve smart wall function and features
• Improve database backup and HDD space usage
• Improve UX, remove client windows division, 4K auto-adaption etc
• Improve AD import (access control person management)
• Improve facial related applications
• Enhance log search and improve problem shooting user experience
New devices compatible and related application develop:
• Ehome 5.0 device (Body worn camera, mobile recorder)
• Support mobile surveillance application (GIS enhance)
• Alarm panel (not confirm yet)
New features & function:
• HikCentral customer/user feedback response (Global)
• Support new SMS cyber security certification
• Support device patch upgrade
• Improve BI features (people counting, heat map etc.)
• Smart wall module support PC display card
• RSM module support access control
• Improve UX, release Visual 2.0
HikCentral V1.4