The document discusses the evolution and capabilities of modern security systems. It notes that early security systems were basic and difficult to install, but that technology has made systems smarter, more reliable and put more control in the hands of homeowners. Modern systems can detect intrusions and dangers, alert homeowners and emergency services, and be controlled remotely through internet or cell phone. The document outlines some common electronic security devices like surveillance cameras, fire alarms, intruder alarms, and electronic locks. It provides details on how these systems work and have advanced with technology.
2. Technology has made security systems more
affordable, more competent, and more accessible to
every one. Early security systems were awkward devices
that were hard to install and were very limited in abilities.
Basically, there was only one thing an early security
system could do, emit an ear-piercing wail and perhaps
turn on a light or two.
As technology advanced, security systems became
smarter and more reliable. Home security technology has
made it virtually impossible for any danger to approach
or make it in your home without you and the proper
emergency response teams knowing about it.
3. Without you being home or without you having to press
one button, the control panels can be programmed to
alert you and the police or medical or fire units, as well as
activate various response methods such as sprinkler
systems or lights and alarms.
Security cameras and recorders, environment
sensors, motion detectors, and advanced control panels
allow you and local emergency units to have the
immediate knowledge of an intrusion or danger to health
and happiness. In fact, newer systems not only supply the
knowledge of danger, but also allow you to control the
response.
4. Security systems are putting security more and more into
the hands of the homeowner. The most basic way is
through the progression and simplification of the home
security systems. No longer is a professional needed to
install the system. Because technology has simplified the
system, any homeowner can easily and quickly install a
security unit and control the unit from home or away.
Modern adjustments to security technology provide
owners with more access and flexibility with their systems.
you can gain access to your unit through the Internet or
cell phone. You can control your system at home or from
anywhere in the world.
5. 1. Surveillance cameras,
2. Fire alarm systems,
3. Intruder/Burglar alarms,
4. Electronic article surveillance,
5. Electronic lock,
are some of the Electronic security devices
which have been invented and developed these
days.
6. Surveillance cameras are video cameras
also called as Closed Circuit Television
(CCTV) camera used for the purpose of
observing an area. They are often
connected to a recording device or IP
network, and may be watched by
a security guard or law enforcement
officer.
7. Cameras and recording equipment used to
be relatively expensive and required human
personnel to monitor camera footage, but
analysis of footage has been made easier by
automated software that organizes digital
video footage into a
searchable database, and by video analysis
software (such as VIRAT and HumanID). The
amount of footage is also drastically reduced
by motion sensors which only record when
motion is detected.
8. The amount of footage is also drastically
reduced by motion sensors which only record
when motion is detected. With cheaper
production techniques, surveillance cameras
are simple and inexpensive enough to be
used in home security systems, and for
everyday surveillance.
9. An automatic fire alarm system is designed to detect
the unwanted presence of fire by monitoring
environmental changes associated with combustion.
In general, a fire alarm system is classified as either
automatically actuated, manually actuated, or
both.
Automatic fire alarm systems are intended to notify
the building occupants to evacuate in the event of
a fire or other emergency, report the event to an off-
premises location in order to summon emergency
services, and to prepare the structure and
associated systems to control the spread of fire and
smoke.
10. Fire alarm control panel (FACP): This
component, the hub of the system, monitors
inputs and system integrity, controls outputs and
relays information.
Primary Power supply: Commonly the non-
switched 120 or 240 Volt Alternating Current
source supplied from a commercial power utility.
Secondary (backup) Power supplies: This
component, commonly consisting of sealed
lead-acid storage batteries or other emergency
sources including generators, is used to supply
energy in the event of a primary power failure.
11. Initiating Devices: This component acts as an input to the
fire alarm control unit and are either manually or
automatically actuated.
Notification appliances: This component uses energy
supplied from the fire alarm system or other stored energy
source, to inform the proximate persons of the need to
take action, usually to evacuate.
Building Safety Interfaces: This interface allows the fire
alarm system to control aspects of the built environment
and to prepare the building for fire, and to control the
spread of smoke fumes and fire by influencing air
movement, lighting, process control, human transport
and exit.
12. A burglar alarm is a system designed to
detect intrusion –unauthorized entry– into a
building or area. They are also called security
alarms, security systems, alarm
systems, intrusion detection systems, perimeter
detection systems, and similar terms.
13. Burglar alarms are used in
residential, commercial, industrial, and
military properties for protection
against burglary (theft) or property
damage, as well as personal protection
against intruders. Car alarms likewise
protect vehicles and their
contents. Prisons also use security systems
for control of inmates.
14. Some alarm systems serve a single purpose of
burglary protection; combination systems
provide both fire and intrusion protection.
Intrusion alarm systems may also be combined
with closed-circuit television surveillance systems
to automatically record the activities of
intruders, and may interface to access control
systems for electrically locked doors. Systems
range from small, self-contained noisemakers, to
complicated, multi-area systems with computer
monitoring and control.
15. The most basic alarm consists of one or more sensors to detect
intruders, and an alerting device to indicate the intrusion.
However, a typical premises security alarm employs the
following components:
Premises control unit (PCU), or panel: The "brain" of the
system, it reads sensor inputs, tracks arm/disarm status, and
signals intrusions. In modern systems, this is typically one or
more computer circuit boards inside a metal
enclosure, along with a power supply.
Sensors: Devices which detect intrusions. Sensors may
placed at the perimeter of the protected area, within it, or
both. Sensors can detect intruders by a variety of
methods, such as monitoring doors and windows for
opening, or by monitoring unoccupied interiors for
motions, sound, vibration, or other disturbances.
Alerting devices: These indicate an alarm condition. Most
commonly, these are bells, sirens, and/or flashing lights.
Alerting devices serve the dual purposes of warning
occupants of intrusion, and potentially scaring off burglars.
16. Keypads: Small devices, typically wall-
mounted, which function as the human-
machine interface to the system. In addition to
buttons, keypads typically feature indicator
lights, a small mulch-character display, or both.
Interconnections between components. This
may consist of direct wiring to the control unit, or
wireless links with local power supplies.
Security devices: Devices to detect thieves such
as spotlights, cameras & lasers.
17. 1. Passive infrared detectors
2. Ultrasonic detectors
3. Microwave detectors
4. Glass break detection
5. Smoke, heat, and carbon monoxide detectors
6. Vibration (shaker) or inertia sensors
7. Passive magnetic field detection
8. E-field
9. Microwave barriers
10. Microphonic systems
11. Taut wire fence systems
12. Fibre optic cable
13. H-field
18. Electronic article surveillance (EAS) is a technological method for
preventing shoplifting from retail stores or pilferage of books from
libraries. Special tags are fixed to merchandise or books. These tags
are removed or deactivated by the clerks when the item is properly
bought or checked out. At the exits of the store, a detection system
sounds an alarm or otherwise alerts the staff when it senses active
tags.
Some stores also have detection systems at the entrance to the
bathrooms that sound an alarm if someone tries to take unpaid
merchandise with them into the bathroom.
Some stores with EAS have keypads by the detection systems with
monitors that beep showing the response time on the screen when
the alarm sounds to ensure that employees respond to the alarm.
The keypad keeps beeping until an employee responds to it.
For high-value goods that are to be manipulated by the
patrons, wired alarm clips may be used instead of tags.
19. There are several major types of electronic article
surveillance systems:
Magnetic, also known as magneto-harmonic
Acousto-magnetic, also known as
magnetostrictive
Radio frequency
Microwave
Video surveillance systems (to some extent)
20. These tags are made of a strip of amorphous
metal (metglas) which has a very low magnetic
saturation value. Except for permanent tags, this
strip is also lined with a strip of ferromagnetic
material with a moderate coercive
field (magnetic "hardness").
Detection is achieved by sensing harmonics and
sum or difference signals generated by the non-
linear magnetic response of the material under a
mixture of low-frequency (in the 10 Hz to 1000 Hz
range) magnetic fields.
21. These are similar to magnetic tags in that they
are made of two strips, a strip
of magnetostrictive, ferromagnetic amorphous
metal and a strip of a magnetically semi-hard
metallic strip, which is used as a biasing magnet
(to increase signal strength) and to allow
deactivation. These strips are not bound together
but free to oscillate mechanically.
These tags are thicker than magnetic tags and
are thus seldom used for books. However they
are relatively inexpensive and have better
detection rates than magnetic tags.
22. These tags are essentially an LC tank circuit that has
a resonance peak anywhere from 1.75 MHz to
9.5 MHz. The most popular frequency is 8.2 MHz.
Sensing is achieved by sweeping around the
resonant frequency and detecting the dip.
Deactivation for 8.2 MHz label tags is achieved by
detuning the circuit by partially destroying
the capacitor. This is done by submitting the tag to a
strong electromagnetic field at the resonant
frequency which will induce voltages exceeding the
capacitor's breakdown voltage, which is artificially
reduced by puncturing the tags.
23. These permanent tags are made of a non-
linear element (a diode) coupled to one
microwave and one electrostatic antenna. At
the exit, one antenna emits a low-frequency
(about 100 kHz) field, and another one emits
a microwave field. The tag acts as a mixer
reemitting a combination of signals from both
fields. This modulated signal triggers the
alarm. These tags are permanent and
somewhat costly. They are mostly used in
clothing stores.
24. An electronic lock (or electric lock) is a locking
device which operates by means of electric current.
Electric locks are sometimes stand-alone with an
electronic control assembly mounted directly to the
lock.
More often electric locks are connected to
an access control system.
The advantages of an electric lock connected to an
access control system include: key control, where
keys can be added and removed without re-keying
the lock cylinder; fine access control, where time
and place are factors; and transaction
logging, where activity is recorded.
25. Electronic locks offer a variety of means of authentication;
those described below are not considered exhaustive.
Numerical codes, passwords and passphrases
Perhaps the most prevalent form of electronic lock is that using a
numerical code for authentication; the correct code must be
entered in order for the lock to deactivate. Such locks typically
provide a keypad, and some feature an audible response to each
press. Combination lengths are usually between 4 and 6 digits long.
A variation on this design involves the user entering the
correct password or passphrase.
Security tokens
Another means of authenticating users is to require them to scan or
"swipe" a security token such as a smart card or similar, or to interact
a token with the lock. For example, some locks can access stored
credentials on a personal digital assistant (PDA) using infrared data
transfer methods.
26. Biometrics
As biometrics become more and more prominent as a
recognized means of positive identification, their use in
security systems increases. Some new electronic locks
take advantage of technologies such as fingerprint
scanning, retinal scanning and iris
scanning, and voiceprint identification to authenticate
users.
RFID
Radio-frequency identification (RFID) is the use of an
object (typically referred to as an RFID tag) applied to or
incorporated into a product, animal, or person for the
purpose of identification and tracking using radio waves.
Some tags can be read from several meters away and
beyond the line of sight of the reader. This technology is
also used in modern electronic locks.
27. Thank you for your Attention !
We Hope this Seminar made you aware about
the Electronic Security System