Integrated Perimeter Protection Solution
Integrated Perimeter
Protection Solution
• Operational Capabilities
• Activities & Functions
• Intrusion Detection
• Site Access Control
• Data Fusion- Recognition
• Command & Control Center
• Special Security Subsystem
CONTENTS
Operational Capabilities
Integrated Perimeter
Protection Solution
Operational Capabilities
Integrated Perimeter
Protection Solution
Starting from the objectives and through the application of proven methodology, a set of
micro capabilities have been defined.
Operational
Cpabilities
Intrusion Detection
Site Access Control
Local Area Surveillance
Data Collection & Fusion
Real-time Command & Control
Activities & Functions
Integrated Perimeter
Protection Solution
Activities & Functions
Integrated Perimeter
Protection Solution
Intrusion Detection
Integrated Perimeter
Protection Solution
Intrusion Detection
Integrated Perimeter
Protection Solution
Protected
Area
Site Access Control
Active Barriers +
Intelligent CCTV
Perimeter
Fencing
Leakage Cable Intrusion Probe
E-fence
CCTV with intelligent video analysis
Other sensors
The system comprises:
Intrusion Detection
Integrated Perimeter
Protection Solution
03 04
02
01
Perimeter Control Subsystem
• Function:
• Early detecting suspicious behavior or individuals about the border
• Forestalling and averting the damage or threat in advance
• Deterring illegal entry
 Product:
• Video monitoring system
• Leakage cable intrusion
• probe
• E-fence
• Infrared sensor
• Other sensor
Intrusion Detection
Integrated Perimeter
Protection Solution
Leakage Cable
Intrusion Probe
Intrusion Detection
Integrated Perimeter
Protection Solution
E-Fence System
Intrusion Detection
Integrated Perimeter
Protection Solution
No. Features of intelligent analysis
1 Enter the area
2 Place and pick up items
3 Leave the area
4 hang about
5 Regional invasion
6 Staff gathering
7 Parking
8 Fast moving
9 Counting people
10 Auto tracking
11 Recognition of the car plate
Intelligent Video Analysis Application
Intrusion Detection
Intelligent Video Analysis Application
Into Region Suspicious objects People gathering ILLEGAL PARKING
Integrated Perimeter
Protection Solution
Intrusion Detection
Integrated Perimeter
Protection Solution
Intelligent Video Analysis Application
Target HOVERING Counting people Regional invasion Intelligent
tracking
Site Access Control
Integrated Perimeter
Protection Solution
Site Access Control
Integrated Perimeter
Protection Solution
People scanning
Article scanning
Identity recognition
Barriers
The system comprises:
Site Access Control improves security
filtering people and goods
entering and leaving a site.
Site Access Control
Integrated Perimeter
Protection Solution
Smart Card Fingerprint Scanner
Function:
• Generating alarm automatically
• Displaying alarm information
• Generating time and attendance report
• Identifying authorized/authorized person
• Realizing classification management
• Tracking the very important person
Facial recognition System
CCTV Surveillance System Security Checking Equipment
Site Access Control
Integrated Perimeter
Protection Solution
* Architecture Schematic Diagram
Card Reader
Access Control Server
Entrance N
electro-
mechanical lock
Access
Controller
Card Reader
electro-
mechanical lock
Access
Controller
Switch Switch
Entrance Management
Computer
Entrance 1
Management Center
On-site
management
computer
LAN
Entrance Control Subsystem
Site Access Control
Integrated Perimeter
Protection Solution
Entrance Control Subsystem
Products
Fix focus video camera
Double-inspect detector
Access card reader
Emergency button
Site Access Control
Integrated Perimeter
Protection Solution
CCTV Subsystem
* Architecture Schematic Diagram:
Site Access Control
Integrated Perimeter
Protection Solution
Outdoor Speed Dome Semi Dome IP Camera Auto Focusing Camera Indoor Speed Dome
01 02 03 04 05 06
Outdoor Speed Dome
CCTV Subsystem
Products
Data Fusion-Recognition
Integrated Perimeter
Protection Solution
In a high complexity environments, the ability to correctly interpret collected data is determinant to
effectively face threats maximizing potential alarm detection.
Data Fusion-Recognition
Integrated Perimeter
Protection Solution
Information coming from a single source is sometimes incomplete, uncertain and ambiguous. Correlation
techniques enable to minimize the probability of lacked threat detection and false alarms.
Sensors Information
Leakage cable
E-fence
CCTV
Other sensors
Nothing
Nothing
Target detected
Video information
Data
Fusion
Collection
Correlation
Alarm
Use case:
Step 1: a site to protect (e.g. a base) is provided
of several types of sensors.
Step 2: every sensor collects different type of
information.
Step 3: information are elaborated by Data
Fusion.
Step 4: information are correlated
Step 5: the correlation of the different
information enables to identify correctly a
potential threat (alarm).
2 3
4
5
Command & Control Center
Integrated Perimeter
Protection Solution
C2 design and implementation is critical to guarantee effective and efficiency of any security
and defense solution.
Command & Control Center
Integrated Perimeter
Protection Solution
The Command & Control Center (C2) enables the real-time monitoring of all systems sites
and the management of the system resources in order to guarantee security and safety.
The Command & Control Center is the logical central
point of a distributed security and defense
architecture.
Information is collected and correlated to enable total
control of the target system and the management of
all the available resource to face any crisis or
emergency.
Special Security Subsystem
Integrated Perimeter
Protection Solution
Special Security Subsystem
Integrated Perimeter
Protection Solution
Text here
Special
Security
Subsystem
Portable video
transmission system
Moored balloon
monitoring system
Guard tour system
Security check device
Guard Tour Subsystem
Integrated Perimeter
Protection Solution
• Function:
• Recording the information of guard tour time/person and some
common issues
• Evaluating the performance of security person
• Management of safe guard tour and polling
 Product:
• Guard tour machine
• Personnel card
• Information button
Guard Tour Subsystem
Integrated Perimeter
Protection Solution
Using the guard tour machine
to collect the information
Receive the information from
information button
Mobile High-definition Video Transmission
Integrated Perimeter
Protection Solution
• Mobile High-definition Video Transmission System (Portable) :
• Adopting several advanced technology of 3G and B3G
mobile communication system
• Realizing real-time collection
– and transmission of
– high-definition video
– image and sound
Ballon Monitoring and Surveillance
Integrated Perimeter
Protection Solution
Night Time Balloon Day Time
Wide Coverage
Better low altitude performance
Camera
Radar
More waning and reaction time
High mobility payload
SECURITY
Integrated security & defends system
Please contact us
for more detail
The Art Of Innovation.
www.hermesys.it

Integrated-perimeter-protection-solution.pdf

  • 1.
  • 2.
    Integrated Perimeter Protection Solution •Operational Capabilities • Activities & Functions • Intrusion Detection • Site Access Control • Data Fusion- Recognition • Command & Control Center • Special Security Subsystem CONTENTS
  • 3.
  • 4.
    Operational Capabilities Integrated Perimeter ProtectionSolution Starting from the objectives and through the application of proven methodology, a set of micro capabilities have been defined. Operational Cpabilities Intrusion Detection Site Access Control Local Area Surveillance Data Collection & Fusion Real-time Command & Control
  • 5.
    Activities & Functions IntegratedPerimeter Protection Solution
  • 6.
    Activities & Functions IntegratedPerimeter Protection Solution
  • 7.
  • 8.
    Intrusion Detection Integrated Perimeter ProtectionSolution Protected Area Site Access Control Active Barriers + Intelligent CCTV Perimeter Fencing Leakage Cable Intrusion Probe E-fence CCTV with intelligent video analysis Other sensors The system comprises:
  • 9.
    Intrusion Detection Integrated Perimeter ProtectionSolution 03 04 02 01 Perimeter Control Subsystem • Function: • Early detecting suspicious behavior or individuals about the border • Forestalling and averting the damage or threat in advance • Deterring illegal entry  Product: • Video monitoring system • Leakage cable intrusion • probe • E-fence • Infrared sensor • Other sensor
  • 10.
    Intrusion Detection Integrated Perimeter ProtectionSolution Leakage Cable Intrusion Probe
  • 11.
  • 12.
    Intrusion Detection Integrated Perimeter ProtectionSolution No. Features of intelligent analysis 1 Enter the area 2 Place and pick up items 3 Leave the area 4 hang about 5 Regional invasion 6 Staff gathering 7 Parking 8 Fast moving 9 Counting people 10 Auto tracking 11 Recognition of the car plate Intelligent Video Analysis Application
  • 13.
    Intrusion Detection Intelligent VideoAnalysis Application Into Region Suspicious objects People gathering ILLEGAL PARKING Integrated Perimeter Protection Solution
  • 14.
    Intrusion Detection Integrated Perimeter ProtectionSolution Intelligent Video Analysis Application Target HOVERING Counting people Regional invasion Intelligent tracking
  • 15.
    Site Access Control IntegratedPerimeter Protection Solution
  • 16.
    Site Access Control IntegratedPerimeter Protection Solution People scanning Article scanning Identity recognition Barriers The system comprises: Site Access Control improves security filtering people and goods entering and leaving a site.
  • 17.
    Site Access Control IntegratedPerimeter Protection Solution Smart Card Fingerprint Scanner Function: • Generating alarm automatically • Displaying alarm information • Generating time and attendance report • Identifying authorized/authorized person • Realizing classification management • Tracking the very important person Facial recognition System CCTV Surveillance System Security Checking Equipment
  • 18.
    Site Access Control IntegratedPerimeter Protection Solution * Architecture Schematic Diagram Card Reader Access Control Server Entrance N electro- mechanical lock Access Controller Card Reader electro- mechanical lock Access Controller Switch Switch Entrance Management Computer Entrance 1 Management Center On-site management computer LAN Entrance Control Subsystem
  • 19.
    Site Access Control IntegratedPerimeter Protection Solution Entrance Control Subsystem Products Fix focus video camera Double-inspect detector Access card reader Emergency button
  • 20.
    Site Access Control IntegratedPerimeter Protection Solution CCTV Subsystem * Architecture Schematic Diagram:
  • 21.
    Site Access Control IntegratedPerimeter Protection Solution Outdoor Speed Dome Semi Dome IP Camera Auto Focusing Camera Indoor Speed Dome 01 02 03 04 05 06 Outdoor Speed Dome CCTV Subsystem Products
  • 22.
  • 23.
    In a highcomplexity environments, the ability to correctly interpret collected data is determinant to effectively face threats maximizing potential alarm detection. Data Fusion-Recognition Integrated Perimeter Protection Solution Information coming from a single source is sometimes incomplete, uncertain and ambiguous. Correlation techniques enable to minimize the probability of lacked threat detection and false alarms. Sensors Information Leakage cable E-fence CCTV Other sensors Nothing Nothing Target detected Video information Data Fusion Collection Correlation Alarm Use case: Step 1: a site to protect (e.g. a base) is provided of several types of sensors. Step 2: every sensor collects different type of information. Step 3: information are elaborated by Data Fusion. Step 4: information are correlated Step 5: the correlation of the different information enables to identify correctly a potential threat (alarm). 2 3 4 5
  • 24.
    Command & ControlCenter Integrated Perimeter Protection Solution
  • 25.
    C2 design andimplementation is critical to guarantee effective and efficiency of any security and defense solution. Command & Control Center Integrated Perimeter Protection Solution The Command & Control Center (C2) enables the real-time monitoring of all systems sites and the management of the system resources in order to guarantee security and safety. The Command & Control Center is the logical central point of a distributed security and defense architecture. Information is collected and correlated to enable total control of the target system and the management of all the available resource to face any crisis or emergency.
  • 26.
    Special Security Subsystem IntegratedPerimeter Protection Solution
  • 27.
    Special Security Subsystem IntegratedPerimeter Protection Solution Text here Special Security Subsystem Portable video transmission system Moored balloon monitoring system Guard tour system Security check device
  • 28.
    Guard Tour Subsystem IntegratedPerimeter Protection Solution • Function: • Recording the information of guard tour time/person and some common issues • Evaluating the performance of security person • Management of safe guard tour and polling  Product: • Guard tour machine • Personnel card • Information button
  • 29.
    Guard Tour Subsystem IntegratedPerimeter Protection Solution Using the guard tour machine to collect the information Receive the information from information button
  • 30.
    Mobile High-definition VideoTransmission Integrated Perimeter Protection Solution • Mobile High-definition Video Transmission System (Portable) : • Adopting several advanced technology of 3G and B3G mobile communication system • Realizing real-time collection – and transmission of – high-definition video – image and sound
  • 31.
    Ballon Monitoring andSurveillance Integrated Perimeter Protection Solution Night Time Balloon Day Time Wide Coverage Better low altitude performance Camera Radar More waning and reaction time High mobility payload
  • 32.
    SECURITY Integrated security &defends system Please contact us for more detail
  • 33.
    The Art OfInnovation. www.hermesys.it