Page tree

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The Public security monitoring system "Kipod" is a platform for remote monitoring of objects. The implemented functions include: 

  • capture automatically abnormal situations, based on the analysis of video and audio streams in accordance with specified rules;
  • classify, prioritize, group events coming from remote sites; 
  • recognize faces and number plates of vehicles in real time, as well as search through the given databases to make a decision about the threat;
  • ensure the simultaneous operation of many users in various departments and organizations.

The characteristics and functionality of the System allow the user to monitor state and socially significant objects to ensure public order. Timely detection of abnormal situations helps to quickly make decisions and prevent emergencies.

In addition to improving the effectiveness of security monitoring at sites, the use of the Public safety monitoring system “Kipod” allows operators to process a large amount of data in real time. The system implements an intuitive web-interface, through which the user can:

  • form databases for individuals and license plates; 
  • receive and process events in the alarm monitor mode;
  • carry out advanced search for events; 
  • view live and archive video without installing additional software.

The operation order in the System

Step 1. Loging into the System

The authorized specialist enters the URL of the Public Security Monitoring System "Kipod" in the address bar of the browser. To enter the System, the provided service login and password are used. This user is assigned the role of the System manager (see Section section 4.1).

Step 2. Changing the service password

The user with the System manager role must change the default password provided for the first login to the System in accordance with the security requirements. To create a new password, it is recommended to follow these rules:

  • The password must be at least 8 characters in length.
  • The password should consist of numbers and Latin letters in different registers; it is desirable to include in the password other characters available on the keyboard (for example, the symbols??! <> [] {}, etc.).
  • The password should not be a dictionary word or a set of characters located next to each other on the keyboard. Ideally, the password should consist of a meaningless set of characters.

Step 3. Performing system settings

The user with the System manager role performs system settings (see Chapter chapter 2), sets the date and time.

Step 4. Adding key users

The user with the System manager role invites users to System and assigns them necessary roles (see Chapter chapter 4). It is recommended to assign the roles of the Camera manager (see Section section 4.2) and the Group manager in the root group (see section 4.3) so that these users can participate in introducing other users (see Chapter chapter 7) and resources to the System.

Step 5. Adding cameras and setting the video analytics

The user with the Camera manager role introduces cameras into the System (see Chapter chapter 9) and sets the video analytics (see Chapter 10). This will automatically create basic entity groups (see Chapter chapter 8).

Step 6. Introducing users

The user with the Group manager role creates a tree of user groups (see Chapter chapter 6), populates them with users and assigns them roles.

Step 7. Introducing resources

The user with the Group manager role adds plans (see   chapter 11  chapter 11) into the System, creates lists of persons (see   chapter 12  chapter 12 ) and lists of numbers (see  chapter 13   chapter 13), assigns them to user groups or users individually for security missions.

Step 8. Checking

The user with the Group manager role checks that the selected user group has access to all the necessary entity groups, cameras, plans, lists of persons and numbers to perform security tasks on the assigned security site, creates an alarm monitor (see Chapter chapter 15). The alarm monitor for this user group can also be created by other users of the group who have the necessary permissions (see Chapter chapter 5).

Step 9. Processing security tasks

The user group can function independently and ensure safety on the entrusted security site.