2016/04/15
Ultra-high 4K resolution and Wide-angle Cameras provide more details
Although the improvement to 4K resolution seems very natural in consumer electronics and security technologies, 4K-resolution, ultra-high HD security cameras https://www.gwsecu.com/products/h.265-ip-camera-series.html still captured the limelight at major security shows this year.
Whenever 4K starts to become the mainstream in the industry, security cameras can be expected to provide more detailed and clearer video images of the environment, events, and subjects than the past. More importantly, 4K resolution cameras can largely reduce the total cost of ownership of a project by doing more with less, compared to low resolution cameras.
Companies such as Axis Communications, Arecont Vision, Bosch Security Systems, Hikvison Digital Technology, IQinVision, and Sony Electronics all pre-announced 4K cameras last month. Performing at 30 frames per second makes 4K cameras stand out. “Arecont Vision 4K camera produces high-quality image at 30 frames per second and delivers about 8.3 megapixels. Arecont Vision‘s10-megapixel camera delivers 7 frames per second. When it was released in 2010, it was the first dual mode 10-megapixel and 1080p camera in the industry,” said Scott Schafer, Executive VP of Sales, Marketing, and Service at Arecont Vision. It can be predicted that all these companies should have their 4K cameras ready for the market later this year.
However, some experts still warn that 4K camera users need to pay extra attention to selecting compatible 4K NVRs https://www.gwsecu.com/products/poe-series-nvr.html and monitors. Without using a 4K monitor, the video quality might be compromised.
Pelco is focusing on a different approach to provide more details to situational awareness video with their latest 360-degree camera, which is a joint.
2016/04/09
Wireless Alarm Kits | Guowei Security
Home security cameras and alarm systems are two pillars of smart home security https://www.secuexpress.com/smart-home. The residential intruder alarm market is predicted to have a mild growth in the coming years. The report of IMS Research, an IHS company, revealed that the residential sector accounted for 40.7% of the $2.7 billion global intruder alarm market, and is forecasted to be one of the fastest-growing verticals with a five-year CAGR of 5.3% from 2012 to 2017. From interviews of Asian manufacturers like Jing Hualong (JHL), 20 to 30 percent of annual growth can be expected. The connected home features are predicted to push the whole market upward.
For smart home consumers, especially DIY users, the wireless alarm kits feature easy installation with minimal hassle and installation expense. The wireless intruder alarm kit for the smart home generally consists of a central control unit, PIR motion detectors, door/window contact sensors and remotes, available with WiFi/PSTN, WiFi/GSM and GSM/SMS alarm systems. Sirens and panic buttons are important add-ons. Smoke, gas leak, flood, glassbreak detectors are optional accessories.
At present, major wireless standards for home alarm kits are composed of RF proprietary systems based on 315MHz, 433MHz and 868MHz radio frequencies in addition to WiFi,Z-Wave and ZigBee. The proprietary systems ensure signal transmissions in a stable and interference-free way.
To avoid false alarms, it is a trend to integrate network cameras for visual verification. Visual verification is believed to prevent false alarms bringing about constant annoyance from traditional alarm systems. It enables more effective police response, and reduces false alarm fines. The current solutions include motion sensors with built-in camera modules or the alarm systems connecting with external network cameras.
For smart home consumers, especially DIY users, the wireless alarm kits feature easy installation with minimal hassle and installation expense. The wireless intruder alarm kit for the smart home generally consists of a central control unit, PIR motion detectors, door/window contact sensors and remotes, available with WiFi/PSTN, WiFi/GSM and GSM/SMS alarm systems. Sirens and panic buttons are important add-ons. Smoke, gas leak, flood, glassbreak detectors are optional accessories.
At present, major wireless standards for home alarm kits are composed of RF proprietary systems based on 315MHz, 433MHz and 868MHz radio frequencies in addition to WiFi,Z-Wave and ZigBee. The proprietary systems ensure signal transmissions in a stable and interference-free way.
To avoid false alarms, it is a trend to integrate network cameras for visual verification. Visual verification is believed to prevent false alarms bringing about constant annoyance from traditional alarm systems. It enables more effective police response, and reduces false alarm fines. The current solutions include motion sensors with built-in camera modules or the alarm systems connecting with external network cameras.
2016/04/07
A business that values added value
Numbers of the ASEAN middle class are increasing fast. They are not just a lot in quantity but also optimistic. Fast food empire, McDonald's, just opened its first restaurant in HCM City, Vietnam. Philippine Seven Corp, local franchisor of 7-Elevenis doubling its current store network of 1,000 in Philippines by 2015. Swedish furniture giant IKEA is soon to open outlet in Penang, let along Ace Hardware Indonesia, a home furniture and appliances retailer, just spent $25 million to finance the expansion of its network.
These staggering numbers of stores have shown that ASEAN continues to be a key market for retail and this region will continue to gain importance to Asia and the global economy. The question is, are your solution ready to cater to the unique needs of retail stores beyond security as bonuses?
Network solutions is changing how the security business is done, it is becoming more and more service-oriented, just like retail and hospitality. From planning to after sales, solution providers need to be involved every step of the way, as users have varying needs and degrees of technical understanding. One of the key differentiators for players is, therefore, their ability to provide what others cannot, have not thought of, or not fast-executing.
Our cover story this month brings you Chuango's new dynamics to the modern home. Market Dynamics focuses on Indonesia and sizable opportunities. As for other popular columns, this issue's Product Exploration features how 360°IP Fisheye Camera https://www.gwsecu.com/products/1155.html change security perspective and revolutionize retails, and Vertical Solutions on not-your-tradition school applications.
These staggering numbers of stores have shown that ASEAN continues to be a key market for retail and this region will continue to gain importance to Asia and the global economy. The question is, are your solution ready to cater to the unique needs of retail stores beyond security as bonuses?
Network solutions is changing how the security business is done, it is becoming more and more service-oriented, just like retail and hospitality. From planning to after sales, solution providers need to be involved every step of the way, as users have varying needs and degrees of technical understanding. One of the key differentiators for players is, therefore, their ability to provide what others cannot, have not thought of, or not fast-executing.
Our cover story this month brings you Chuango's new dynamics to the modern home. Market Dynamics focuses on Indonesia and sizable opportunities. As for other popular columns, this issue's Product Exploration features how 360°IP Fisheye Camera https://www.gwsecu.com/products/1155.html change security perspective and revolutionize retails, and Vertical Solutions on not-your-tradition school applications.
2016/04/06
Malaysian University Pioneers the First e-Scroll with Thales
Business is booming for bogus degree certificates. As this lucrative black market produces increasingly "high quality" counterfeit documents - with exceptional attention to detail and remarkable similarity to the genuine article - academic institutions across the world are faced with a major challenge. How can they safeguard their reputation by ensuring the credibility and authenticity of the certificates awarded to their students?
The majority of universities worldwide currently issue paper certificates, which are relatively simple to forge, and can be near impossible for the employer to verify – a deadly combination for education fraud. The University of Malaya has taken a proactive and innovative approach to tackling this problem, working with Thales to pioneer the e-Scroll. This digital degree is digitally signed and timestamped, allowing it to be authenticated online.
The concept of a signature as a means to establish the authenticity of documents has been with us for centuries. However, as paper is steadily replaced by electronic documents,
new types of controls are needed. A digital signature serves as the virtual equivalent of a wet ink signature, verifying not only that the information originated with the signer, but also that it has not since been altered.
The security of the e-Scroll depends on Public Key Infrastructure (PKI) – a technology that is already widely used across many areas. Governments across the world depend on it to protect documents such as the e-passport, while financial institutions use it to secure financial transactions and online banking. It underpins the security of the consumer technology world, supporting authentication of smart phones, tablets and games, and is the very foundation of secure e-commerce. PKI stretches far beyond user IDs and passwords, and indeed electronic versions of traditional signatures. A digital signature is generated and authenticated by public key encryption, creating unique credentials that can be validated beyond reasonable doubt and
crucially, on a mass scale.
Using a special purpose software program, the university converts each student’s particulars and credentials into an Adobe PDF e-Scroll certificate. Each approved e-Scroll is then signed by two parties – the Registrar and the Vice President – using GlobalSign Digital IDs in an automated batch signing process. Time stamping technology adds an additional layer of security, allowing the organisation to record when (day and time) the certificate was signed. The secured time stamps are issued against the Malaysian National clock by a Thales Time Stamp Server.
Digital signatures offer a host of potential benefits in addition to document security, including greater efficiencies and cost reduction through automation of manual processes. For the University of Malaya, it will also reduce the need to print expensive specialised paper-based certificates. However, this system’s reliance on public key cryptography means that protection of private keys is paramount. If the digital signing process is not adequately secured, attackers can create seemingly legitimate signatures over forged data, compromising the system and the organisation’s reputation. Thales
high assurance, tamper-resistant HSMs provide strong protection for the digital identities of the two signatories, storing their private keys and preventing unauthorised access.
Of course, security of digital credentials relies not just on the fact that they are hard-to-forge, but also that they are easy-to-authenticate. This is certainly true of the e-Scroll. The growing number of graduates applying for jobs online will now be able to attach this digital certificate to an online job submission, allowing prospective employers to quickly and easily validate its authenticity. This authentication can be done anywhere, anytime, and via any mobile device.
These high-strength cryptographic techniques are a powerful weapon against highly sophisticated forgers, who have been making a great deal of money selling counterfeit certificates. As of 2013, the 7,000 students that graduate from the University each year will receive an e-Scroll along with a printed certificate at their graduation ceremony – assurance of the strong credibility of their qualification, as well as something to frame.
The majority of universities worldwide currently issue paper certificates, which are relatively simple to forge, and can be near impossible for the employer to verify – a deadly combination for education fraud. The University of Malaya has taken a proactive and innovative approach to tackling this problem, working with Thales to pioneer the e-Scroll. This digital degree is digitally signed and timestamped, allowing it to be authenticated online.
The concept of a signature as a means to establish the authenticity of documents has been with us for centuries. However, as paper is steadily replaced by electronic documents,
new types of controls are needed. A digital signature serves as the virtual equivalent of a wet ink signature, verifying not only that the information originated with the signer, but also that it has not since been altered.
The security of the e-Scroll depends on Public Key Infrastructure (PKI) – a technology that is already widely used across many areas. Governments across the world depend on it to protect documents such as the e-passport, while financial institutions use it to secure financial transactions and online banking. It underpins the security of the consumer technology world, supporting authentication of smart phones, tablets and games, and is the very foundation of secure e-commerce. PKI stretches far beyond user IDs and passwords, and indeed electronic versions of traditional signatures. A digital signature is generated and authenticated by public key encryption, creating unique credentials that can be validated beyond reasonable doubt and
crucially, on a mass scale.
Using a special purpose software program, the university converts each student’s particulars and credentials into an Adobe PDF e-Scroll certificate. Each approved e-Scroll is then signed by two parties – the Registrar and the Vice President – using GlobalSign Digital IDs in an automated batch signing process. Time stamping technology adds an additional layer of security, allowing the organisation to record when (day and time) the certificate was signed. The secured time stamps are issued against the Malaysian National clock by a Thales Time Stamp Server.
Digital signatures offer a host of potential benefits in addition to document security, including greater efficiencies and cost reduction through automation of manual processes. For the University of Malaya, it will also reduce the need to print expensive specialised paper-based certificates. However, this system’s reliance on public key cryptography means that protection of private keys is paramount. If the digital signing process is not adequately secured, attackers can create seemingly legitimate signatures over forged data, compromising the system and the organisation’s reputation. Thales
high assurance, tamper-resistant HSMs provide strong protection for the digital identities of the two signatories, storing their private keys and preventing unauthorised access.
Of course, security of digital credentials relies not just on the fact that they are hard-to-forge, but also that they are easy-to-authenticate. This is certainly true of the e-Scroll. The growing number of graduates applying for jobs online will now be able to attach this digital certificate to an online job submission, allowing prospective employers to quickly and easily validate its authenticity. This authentication can be done anywhere, anytime, and via any mobile device.
These high-strength cryptographic techniques are a powerful weapon against highly sophisticated forgers, who have been making a great deal of money selling counterfeit certificates. As of 2013, the 7,000 students that graduate from the University each year will receive an e-Scroll along with a printed certificate at their graduation ceremony – assurance of the strong credibility of their qualification, as well as something to frame.
Subscribe to:
Posts (Atom)