Top Banner
Electronic Security System Created by: Atharva Chavan Welcome to the Seminar of
27

Electronic security system

Jun 09, 2015

Download

Technology

Atharva Chavan

just an overview of Electronic security systems. sources: Wikipedia and Google.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Electronic security system

Electronic Security System

Created by:Atharva Chavan

Welcome to the Seminar of

Page 2: Electronic security system

The Evolution of Electronic Security System

Technology has made security systems more affordable, more competent, and more accessible to every one. Early security systems were awkward devices that were hard to install and were very limited in abilities.

Basically, there was only one thing an early security system could do, emit an ear-piercing wail and perhaps turn on a light or two.

As technology advanced, security systems became smarter and more reliable. Home security technology has made it virtually impossible for any danger to approach or make it in your home without you and the proper emergency response teams knowing about it.

Page 3: Electronic security system

The Evolution of Electronic Security System

Without you being home or without you having to press one button, the control panels can be programmed to alert you and the police or medical or fire units, as well as activate various response methods such as sprinkler systems or lights and alarms.

Security cameras and recorders, environment sensors, motion detectors, and advanced control panels allow you and local emergency units to have the immediate knowledge of an intrusion or danger to health and happiness. In fact, newer systems not only supply the knowledge of danger, but also allow you to control the response.

Page 4: Electronic security system

The Evolution of Electronic Security System

Security systems are putting security more and more into the hands of the homeowner. The most basic way is through the progression and simplification of the home security systems. No longer is a professional needed to install the system. Because technology has simplified the system, any homeowner can easily and quickly install a security unit and control the unit from home or away.

Modern adjustments to security technology provide owners with more access and flexibility with their systems. you can gain access to your unit through the Internet or cell phone. You can control your system at home or from anywhere in the world.

Page 5: Electronic security system

Modern Electronic Security Devices

1. Surveillance cameras, 2. Fire alarm systems, 3. Intruder/Burglar alarms, 4. Electronic article surveillance, 5. Electronic lock,

are some of the Electronic security devices which have been invented and developed these

days.

Page 6: Electronic security system

Surveillance cameras are video cameras also called as Closed Circuit Television (CCTV) camera used for the purpose of observing an area. They are often connected to a recording device or IP network, and may be watched by a security guard or law enforcement officer.

Surveillance Cameras

Page 7: Electronic security system

Surveillance Cameras Cameras and recording equipment used to

be relatively expensive and required human personnel to monitor camera footage, but analysis of footage has been made easier by automated software that organizes digital video footage into a searchable database, and by video analysis software (such as VIRAT and HumanID). The amount of footage is also drastically reduced by motion sensors which only record when motion is detected.

Page 8: Electronic security system

Surveillance Cameras

The amount of footage is also drastically reduced by motion sensors which only record when motion is detected. With cheaper production techniques, surveillance cameras are simple and inexpensive enough to be used in home security systems, and for everyday surveillance.

Page 9: Electronic security system

Fire Alarm System

An automatic fire alarm system is designed to detect the unwanted presence of fire by monitoring environmental changes associated with combustion.

In general, a fire alarm system is classified as either automatically actuated, manually actuated, or both.

Automatic fire alarm systems are intended to notify the building occupants to evacuate in the event of a fire or other emergency, report the event to an off-premises location in order to summon emergency services, and to prepare the structure and associated systems to control the spread of fire and smoke.

Page 10: Electronic security system

Fundamental configuration of Fire Alarm System

Fire alarm control panel (FACP): This component, the hub of the system, monitors inputs and system integrity, controls outputs and relays information.

Primary Power supply: Commonly the non-switched 120 or 240 Volt Alternating Current source supplied from a commercial power utility.

Secondary (backup) Power supplies: This component, commonly consisting of sealed lead-acid storage batteries or other emergency sources including generators, is used to supply energy in the event of a primary power failure.

Page 11: Electronic security system

Fundamental configuration of Fire Alarm System

Initiating Devices: This component acts as an input to the fire alarm control unit and are either manually or automatically actuated.

Notification appliances: This component uses energy supplied from the fire alarm system or other stored energy source, to inform the proximate persons of the need to take action, usually to evacuate.

Building Safety Interfaces: This interface allows the fire alarm system to control aspects of the built environment and to prepare the building for fire, and to control the spread of smoke fumes and fire by influencing air movement, lighting, process control, human transport and exit.

Page 12: Electronic security system

Burglar Alarm

A burglar alarm is a system designed to detect intrusion –unauthorized entry– into a building or area. They are also called security alarms, security systems, alarm systems, intrusion detection systems, perimeter detection systems, and similar terms.

Page 13: Electronic security system

Burglar Alarm

Burglar alarms are used in residential, commercial, industrial, and military properties for protection against burglary (theft) or property damage, as well as personal protection against intruders. Car alarms likewise protect vehicles and their contents. Prisons also use security systems for control of inmates.

Page 14: Electronic security system

Burglar Alarm Some alarm systems serve a single purpose of

burglary protection; combination systems provide both fire and intrusion protection. Intrusion alarm systems may also be combined with closed-circuit television surveillance systems to automatically record the activities of intruders, and may interface to access control systems for electrically locked doors. Systems range from small, self-contained noisemakers, to complicated, multi-area systems with computer monitoring and control.

Page 15: Electronic security system

Burglar Alarm DesignThe most basic alarm consists of one or more sensors to detect

intruders, and an alerting device to indicate the intrusion. However, a typical premises security alarm employs the following

components: Premises control unit (PCU), or panel: The "brain" of the

system, it reads sensor inputs, tracks arm/disarm status, and signals intrusions. In modern systems, this is typically one or more computer circuit boards inside a metal enclosure, along with a power supply.

Sensors: Devices which detect intrusions. Sensors may placed at the perimeter of the protected area, within it, or both. Sensors can detect intruders by a variety of methods, such as monitoring doors and windows for opening, or by monitoring unoccupied interiors for motions, sound, vibration, or other disturbances.

Alerting devices: These indicate an alarm condition. Most commonly, these are bells, sirens, and/or flashing lights. Alerting devices serve the dual purposes of warning occupants of intrusion, and potentially scaring off burglars.

Page 16: Electronic security system

Burglar Alarm Design

Keypads: Small devices, typically wall-mounted, which function as the human-machine interface to the system. In addition to buttons, keypads typically feature indicator lights, a small mulch-character display, or both.

Interconnections between components. This may consist of direct wiring to the control unit, or wireless links with local power supplies.

Security devices: Devices to detect thieves such as spotlights, cameras & lasers.

Page 17: Electronic security system

Burglar Alarm Sensor Types1. Passive infrared detectors2. Ultrasonic detectors3. Microwave detectors4. Glass break detection5. Smoke, heat, and carbon monoxide detectors6. Vibration (shaker) or inertia sensors7. Passive magnetic field detection8. E-field9. Microwave barriers10. Microphonic systems11. Taut wire fence systems12. Fibre optic cable13. H-field

Page 18: Electronic security system

Electronic article surveillance (EAS) 

Electronic article surveillance (EAS) is a technological method for preventing shoplifting from retail stores or pilferage of books from libraries. Special tags are fixed to merchandise or books. These tags are removed or deactivated by the clerks when the item is properly bought or checked out. At the exits of the store, a detection system sounds an alarm or otherwise alerts the staff when it senses active tags.

Some stores also have detection systems at the entrance to the

bathrooms that sound an alarm if someone tries to take unpaid merchandise with them into the bathroom.

Some stores with EAS have keypads by the detection systems with monitors that beep showing the response time on the screen when the alarm sounds to ensure that employees respond to the alarm. The keypad keeps beeping until an employee responds to it.

For high-value goods that are to be manipulated by the patrons, wired alarm clips may be used instead of tags.

Page 19: Electronic security system

Types of EAS There are several major types of electronic

article surveillance systems: Magnetic, also known as magneto-harmonic Acousto-magnetic, also known as

magnetostrictive Radio frequency Microwave Video surveillance systems (to some extent)

Page 20: Electronic security system

Magnetic EAS systems

These tags are made of a strip of amorphous metal (metglas) which has a very low magnetic saturation value. Except for permanent tags, this strip is also lined with a strip of ferromagnetic material with a moderate coercive field (magnetic "hardness").

Detection is achieved by sensing harmonics and sum or difference signals generated by the non-linear magnetic response of the material under a mixture of low-frequency (in the 10 Hz to 1000 Hz range) magnetic fields.

Page 21: Electronic security system

Acousto-magnetic EAS systems

These are similar to magnetic tags in that they are made of two strips, a strip of magnetostrictive, ferromagnetic amorphous metal and a strip of a magnetically semi-hard metallic strip, which is used as a biasing magnet (to increase signal strength) and to allow deactivation. These strips are not bound together but free to oscillate mechanically.

These tags are thicker than magnetic tags and are thus seldom used for books. However they are relatively inexpensive and have better detection rates than magnetic tags.

Page 22: Electronic security system

Radio-frequency EAS systems

These tags are essentially an LC tank circuit that has a resonance peak anywhere from 1.75 MHz to 9.5 MHz. The most popular frequency is 8.2 MHz. Sensing is achieved by sweeping around the resonant frequency and detecting the dip. Deactivation for 8.2 MHz label tags is achieved by detuning the circuit by partially destroying the capacitor. This is done by submitting the tag to a strong electromagnetic field at the resonant frequency which will induce voltages exceeding the capacitor's breakdown voltage, which is artificially reduced by puncturing the tags.

Page 23: Electronic security system

Microwave EAS systems

These permanent tags are made of a non-linear element (a diode) coupled to one microwave and one electrostatic antenna. At the exit, one antenna emits a low-frequency (about 100 kHz) field, and another one emits a microwave field. The tag acts as a mixer reemitting a combination of signals from both fields. This modulated signal triggers the alarm. These tags are permanent and somewhat costly. They are mostly used in clothing stores.

Page 24: Electronic security system

Electronic Lock

An electronic lock (or electric lock) is a locking device which operates by means of electric current. Electric locks are sometimes stand-alone with an electronic control assembly mounted directly to the lock.

More often electric locks are connected to an access control system.

The advantages of an electric lock connected to an access control system include: key control, where keys can be added and removed without re-keying the lock cylinder; fine access control, where time and place are factors; and transaction logging, where activity is recorded.

Page 25: Electronic security system

Authentication Methods of Electronic Lock

Electronic locks offer a variety of means of authentication; those described below are not considered exhaustive.

Numerical codes, passwords and passphrasesPerhaps the most prevalent form of electronic lock is that using a numerical code for authentication; the correct code must be entered in order for the lock to deactivate. Such locks typically provide a keypad, and some feature an audible response to each press. Combination lengths are usually between 4 and 6 digits long.A variation on this design involves the user entering the correct password or passphrase. Security tokensAnother means of authenticating users is to require them to scan or "swipe" a security token such as a smart card or similar, or to interact a token with the lock. For example, some locks can access stored credentials on a personal digital assistant (PDA) using infrared data transfer methods.

Page 26: Electronic security system

Authentication Methods of Electronic Lock

BiometricsAs biometrics become more and more prominent as a recognized means of positive identification, their use in security systems increases. Some new electronic locks take advantage of technologies such as fingerprint scanning, retinal scanning and iris scanning, and voiceprint identification to authenticate users. RFIDRadio-frequency identification (RFID) is the use of an object (typically referred to as an RFID tag) applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. Some tags can be read from several meters away and beyond the line of sight of the reader. This technology is also used in modern electronic locks.

Page 27: Electronic security system

THE END

Thank you for your Attention !

We Hope this Seminar made you aware about the Electronic Security System