Ride the New Wave of Intrusion Systems

Published: October 31, 2005

Innovation is often defined as “the implementation of a new or significantly improved idea, good, service, process or practice which is intended to be useful.”

In the world of intrusion technologies, recent activity has led us into what could be considered the beginning of the third wave of innovation.

The first wave was an era leading up to and including the 1970s. Every alarm system had its own direct wire, which often filed highly populated cities with a canopy of aerial cabling. Burglars were thwarted by a maze of virtual hidden trip wires and concealed mechanical door contacts or lacing. Alarm controls consisted of relays, and systems were typically controlled from a key switch placed at the perimeter entrance to a building.

The second wave can be thought of as the modern era of intrusion technology. This was the period of the solid-state electronic security system. Perimeter door key shunt switches were replaced with entrance/exit delay keypads. For the most part, older mechanical bells were replaced with modern ear-piercing electronic sirens.

SSI Newsletter

The second wave also saw the maturing of new technology such as wireless alarm systems, and the dawn of system integration. Everyone chased the pan-acea that someday all security equipment such as CCTV and access control would work together seamlessly. The foundation for the third wave of intrusion technology started somewhere around the security wake-up call of 9/11 and the end of the 20th century.

Because of new threats on both personal and national security, many have seen the development and implementation of these newer technologies accelerated to almost a fever pitch. The results for those in the electronic security industry are that product innovation is now at an all-time high and not expected to slow down in the near future. Let us explore what new technologies are available and evolving as we move forward in this innovative third wave of security technology.

Lower-Cost Sensors Give Biometrics to Everyone
Up until now, the use of biometric readers such as fingerprint, hand geometry, retinal and facial have typically been reserved for larger commercial and government systems. This is usually due to the cost of the equipment, such as the specialized sensors used in fingerprint identification.

Thanks to a new innovative technology, low-cost and reliable fingerprint biometric readers will start to replace many residential key and keypad applications. The ultimate goal for the homeowner is to have their finger as the only key they need.

One innovative approach to fingerprint technology is to reduce considerably the size of the expensive fingerprint sensor array. The approach here is to have a fingerprint recorded as the finger quickly scans across a small sensor stripe, rather than capturing the entire fingerprint image on a more expensive, large sensor array.

The smaller sensor strip was developed by a company called Atmel and senses the body heat of each unique fingerprint ridge as it crosses the sensing bar. It is impossible to move the finger across the reader bar too fast, as it can read up to 2,000 scans per second.

Kevin Heher, business development manager of biometrics at Atmel, says the temperature sensor delivers a “perfect image.”

Technology innovation is only as good as its practical application. Now, the residential customer can have the Atmel-based fingerprint technology in their home with easy-to-use, cost-effective control systems such as the TOCA® Access Light+ from ekeyUSA Systems.

The TOCA system can handle up to 99 people and is easy to update. The plus (+) system can activate up to three relays, each identified from a unique finger. This allows for one finger to open a door and another finger to open a gate or garage door. Another finger could be used to activate an alarm or disarm an alarm system. Options also include an RS-232 PC interface and system software.

VoIP Can Strengthen Link to Central Station if Done Right
One of the fastest places that technology is moving forward is with homes having access to the Internet.

Existing “plain old telephone service” (POTS) customers on a daily basis are being enticed by voice over Internet protocol (VoIP) services and its considerable savings in operating costs.

However, many customers do not realize their existing monitored alarm system will, at best, work intermittently with the new service. The only time they may find this out is when a panel alarms but their central station never receives it. This has raised much concern in the alarm industry.

An innovative approach to this communication problem is an interface device known as a universal “dialer capture” module. One device in particular is the Bosch C900V2 dialer capture module that can be used to upgrade existing alarm panels to communicate over high-speed Internet (IP) connections.

There are many positives to Internet monitoring once a reliable connection has been established. At the central station, new head-end, receiver/gateway communication systems such as the Bosch D6600 with NetCom can provide secured Internet communications via an 128-bit Rijndael encryption protocol.

Systems like the C900V2 have built-in supervision or “heartbeat” signals provided to make sure Internet VoIP connections are intact.

Battle Brewing Concerning Wireless Technologies
When the alarm dealer had to present new alarm technologies to customers in the past, it was often difficult for the customer to understand these technologies.

Today, new technologies — like new forms of wireless communications — are easier for customers to understand since many already use wireless Wi-Fi and Bluetooth PC computer devices in their homes.

Wireless alarm systems in the past had typically consisted of two devices: a receiver at the alarm control, as well as door, window, motion and smoke detector transmitters throughout the dwelling. A major outcome of the second wave of technology was transmitter batteries lasted longer, devices became smaller and polling of supervisory signals was available.

However, many devices still had trouble with signal interference and transmission distance. Right now, there is a battle for use of the radio frequency (RF) spectrum, with the main conflict lying between the 900MHz and 2.4GHz range. Innovation in RF technology lies with who can make the most reliable product group.

One of the best advances in recent years was the use of military-proven “spread spectrum” radio technology, which allows many similar signals to be sent in case some may not make it through (see sidebar on page 50 of November issue).

One company that is leading the way in this technology is Inovonics Wireless Corp. This company is represented by the Wireless Guardian and Vision Plus product lines and is additionally designed to integrate with Bosch, DMP, and Verex security systems.

There is also a growing popularity for the “Z” technologies. The platform for these technologies lies in what is known as the “mesh” radio network.

Simply put, mesh technology does not have any central control device. Each device in the system can act as a sensor, transmitter or repeater. A signal that travels from a sensor to the alarm control receiver can travel many paths. If one path is blocked or the RF signal is attenuated, the control chip sets can sense other safe paths within the mesh network of security sensors. Power consumption is kept to a minimum since the devices only need to communicate a short distance. This allows for longer battery life.

One of the “Z” technologies is ZigBee. This RF mesh technology operates in the 2.4GHz range along with other technologies such as Bluetooth and Wi-Fi.

As this technology unfolds, many are attracted to it for its low cost and high-performance features. Security manufacturers such as
Elk Products are incorporating ZigBee into its M-1 Gold controls.

While ZigBee technology is starting in the home automation market, it will move quickly to the residential security market. A low-cost, reliable RF technology platform is what everyone is looking for.

The other competing “Z” technology is Z-Wave, and it is hoped that this healthy competition will help position the best of “Z” technology.

Z-Wave works in the unlicensed radio range at around 800MHz. One of the advantages of this spectrum is that it is not becoming as crowded at the 2.4GHz area with other modern technologies such as Bluetooth, Wi-Fi and cell phone traffic. The technology is proprietary to a company called Zensys.

Research firm Strategy Analytics predicts the market for wireless meshnetworking chips, including ZigBee and Z-Wave, will reach tens of millions of units per year by 2008. Whichever technology wins this battle, the use of self-healing RF networks for security will be a big application.

Motion Sensor Technology Evolves With Video

Major progress is being made in the evolution of motion sensor technology.

In the second wave, PIR technology became more reliable, but was still a passive on/off alarm sensor that would trigger other devices such as a control panel.

In the emerging third wave, motion detection is evolving with the ever-increasing intelligent technology of video motion detection. This is being made possible by the ever-decreasing cost of today’s CCTV cameras.

Some of these devices, such as the new Aleph CMC-30, include a PIR that internally triggers a CCTV camera when motion is detected. The video signal can then be sent back to the alarm control via a normal pair of wires.

This mating of motion sensor and video technology has been in high demand as an important tool in the fight to substantially reduce the rate of false alarms through video verification.

Security Labs’ new video/infraredmotion camera – the VIR-100 – intelligently analyzes PIR technology along with a grid of 132 programmable detection video motion detection (VMD) zones.

These types of intelligent sensors allow for the programming of velocity and sizes of alarm targets. Built-in power detection monitoring also helps eliminate false alarms from power fluctuations.

New Devices Aim at Demand for Video Motion Detection

A question posted in September on Security Sales & Integration’s Security Scanner survey at www.security sales.com asked, “What do you believe has been the most significant recent innovation in burglary/intrusion alarm systems?” The leading answer was “Video for Alarm Verification,” with a response of 30 percent.

Longtime innovators, such as NAPCO Security Systems, now offers its Vcam-i/24 network/IP video camera or VIP-Gateway 4 camera IP module as a solution to video verification for alarm dealers. NAPCO provides a video alert host service where video can be stored. Additionally, customers can be notified of an alarm via E-mail.

Among the third wave of standalone, digital VMD cameras is the cost-effective and versatile ePic IMOS. These cameras are designed for connection to POTS phone lines with its internal 56kbps modem. This gives the device plenty of applications where high-speed Internet connections are not easily available.

All programming is done through the ePic Web site (www.epicworld.com). Programming options are: motion detection, timed monitoring and alarm tie-ins. There is an external connection for a door contact or other device, and output for activation of an alarm panel or other device. Alarm messages, along with video frames, can be sent to cell phones, E-mail addresses and PDAs.

These types of low-cost, highly versatile VMD devices are perfect for the increasing demands of alarm verification.

Active Security Means Serious Business

What if the homeowner or small business owner wants to take their security system to the next level? They may have experienced slow (or no) police response, lie in a rural location or have extra valuable property to protect. The answer is “active security.”

Most of the electronic security world is made up of two types of security systems: passive and active security systems.

Passive security systems are those that electronically observe an area and report when an unauthorized person has entered the area.

An active security system is a system that not only detects an unauthorized person in the area, but also makes an attempt to deter that person from staying in the area. It has to abruptly influence the senses of the burglar.

The most common type of active security is the audible alarm. Loud sirens will often deter a burglar from entering a premise further and leave as quickly as possible. One innovative way to improve audible security is to have several devices in different locations at different frequencies going off simultaneously.

Still, audible alarms are so common that a technology-savvy burglar can quickly compromise them. This calls for new active security innovations like fog or smoke generating systems.

Systems such as the Smoke Cannon ® by Protect, can fill a room with a fine smoke mist in 20 seconds. The nonlethal smoke will be so thick that you cannot see your hand in front of your face. The visual effect of having the room filling up quickly with this smoke is enough to make most burglars run for the hills.

Another active security system is the automated tear gas systems by Revel Technologies. Devices, such as the Repulsar products, are designed to interface with alarm systems.

When activated from an alarm system, small aerosol canisters drop down from a concealed ceiling enclosure and automatically dispense a fine tear gas mist in the area. Active security devices are an innovative way to provide that extra layer or ring of security. They are designed to complement other security measures and to provide that final layer of deterrence.

Strategy & Planning Series
Strategy & Planning Series
Strategy & Planning Series
Strategy & Planning Series