Bringing Wireless Tech to CCTV & Perimeter Security

October 16, 2014

Blurry black and white security footage recorded on a video cassette is going the way of the dinosaur, extinct and receding into our collective memory. While we still regard installation of security cameras and perimeter sensor technology as a professional practice, market-ready options are available now that use the digital domain. To clarify, we're talking about no cables and no grainy video where you're unsure of the identity of a potential security risk. Digital technology records video onto compressed video formats, takes advantage of motion-activated recording, and automatically backs-up the footage to a secure location. The cameras use IP addressing, the internet addressing protocols used to assign computers their wireless identities, to create a network of cable-free cameras capable of recording footage in multiple resolutions. The output from each camera is transferred over the air to a central computer or to a concealed router. This piece of hi-tech computer hardware then recodes the digital data for transferal to the internet.

Internet and WiFi connectivity opens up security systems to interesting applications. A qualified smartphone can download a manufacturer App that partners with the internet aspect to allow a user to watch security footage from any remote location. The system is easily upgradeable. Add another camera, assign a new IP address, and the system is ready to go. The cameras are small but packed with technology. They send alerts via email or texts when motion is detected. Configuration options send a warning alert when the WiFi battery runs low, and the system can be quickly repurposed for other applications, for entryway security or as a nanny-cam to keep watch over the kids.

The blurring of lines between digital security and household electronics has created new terms and labels, principles of operation where technology is scurrying to catch up. One such term is the cutting-edge Smart Home. Skeptics view this technology as yet another example of civilization giving control over to the computer, but there are some fascinating applications on the horizon. Entrance security is particularly highlighted by this so-called Smart Home movement. New options for keyless entry are either cutting keyed locks from consumer catalogs altogether or creating hybrid forms of locks that still require user interaction. The keyless variant uses Bluetooth connectivity to read a virtual key stored on a mobile device and open the door if the key is recognized. This means a homeowner can email temporary virtual keys to guests and retract those keys at a whim.

We'll finish off with outlines of a future that's already taking shape. GPS wearables are being fitted to young kids so that a parent always knows their whereabouts. Intrusion detection science is gaining the smarts to pair with facial recognition. Biometrics is the next logical step in what promises to be a rewarding and safe future. Be aware, we always recommend professional installations because every smart solution has a smart hack adversary waiting. It's a bright future, but it's also a time where we're connecting our private domains to public networks.

Connor Pincus Group. Consulting Engineers.

Address: 1196 Toorak Road, CAMBERWELL, VIC 3124

Phone: (03) 9835 5000
Fax: (03) 9835 5050

Optimized by