secam systems product presentation secam systems © 2010

23
SECAM Systems Product Presentation SECAM Systems © 2010

Upload: yessenia-makins

Post on 15-Dec-2015

222 views

Category:

Documents


1 download

TRANSCRIPT

SECAM Systems

Product Presentation

SECAM Systems © 2010

Team Members

• Caleb Shortt• Tubego Phamphang• Vikram Sandhu• David Cheperdak• Moffat Sehudi

SECAM Systems © 2010

Problem

The 2009 academic year at the University of Victoria saw rampant theft throughout the campus. Particularly targeted was the ECS. Offices and labs were broken into, and thousands of dollars worth of equipment was either destroyed or stolen.

SECAM Systems © 2010

Problem

The problem comprises of the following items:1. There are thefts in the ECS building

1. Student’s inability to work in the labs after hours due to this

2. Video camera monitoring system deemed too expensive

1. Lacks desired functionality

SECAM Systems © 2010

Problem

Domain knowledge:Unauthorized intrusion in to ECS facilities during the day-especially after

hours• Web Camera activated to record and save the video to the database• Campus Security personnel observe web interface

Requirement: Security personnel must be notified if there is an unauthorized intrusion

SECAM Systems © 2010

SECAM has developed a solution

SECAM Systems © 2010

Solution

SECAM has developed a web-based monitoring system where users may utilize their own web cameras to secure their office spaces and labs.

The only hardware the user would need is a basic web camera and a computer.

SECAM Systems © 2010

Solution: General Idea

A client application must be installed on the user’s computer to secure the video feed and provide motion and sound detection.

The client activates the system through the client application.

If there is motion, the system starts recording and notifies the user. If the setting is selected, the system will also notify security personnel.

The user can access their webcam feed via the web controls interface. There they can change settings and capture images of the video stream.

SECAM Systems © 2010

Solution: General Idea

All video recorded is stored in SECAM’s SECURE database and can NOT be modified.

This provides tamper-proof evidence for police and security.

SECAM Systems © 2010

Solution: Cost

The SECAM Solution reduces the cost of securing office spaces and labs exponentially by only requiring the user to provide a relatively cheap web camera and a computer for the camera to connect to.

Most offices and labs already have computers which reduces the cost even further.

SECAM Systems © 2010

Solution: Components

The SECAM Solution consists of three main components:

1. SECAM SECURE: A secure database to which all video is sent and stored. Once video data is in the database the data is only available in a read only format.

2. WebControls: Allows the user to view and modify the current video stream.

3. SysControls: An application that is installed on the user’s computer to manage the webcam and it’s connection to the SECURE database.

SECAM Systems © 2010

Functionality

SECAM Systems © 2010

Who can use the SECAM system

• Users of the system Anyone who installs the SECAM client in their office,

laboratory etc. i.e. people needing a secure environment

1. Log into the application2. Customize camera settings

1. Video quality resolution of Camera2. Activate Motion Capture from remote location3. Digital zoom4. Record Time5. Transmit video or images6. Choose a sound threshold7. Notify Security?

Who can use the SECAM system

Security Personnel: Security Personnel can access the video feed from any camera and take required action

1.Log into the system2.Choose room to view from available list3.View the feed

Who can use the SECAM system

• System AdministratorsResponsible for creating new accounts

1.Click Create Account on website2.Enter required information on form3.Save information4.Edit Account5.Delete Account6.Renew Account

SECAM SysControls

SECAM WebControls

SECAM WebServer

SECAM SECURE DatabaseSECAM WebServe

Database API

System API

Windows Process

Database Interface

Camera Interface

Local Camera Device

SECAM SyServe

WebControls

Web Interface

Local Computer

SysControls

The diagram to the right depictsa component overview of the SECAM System

The system is comprised in to fourmajor components:•SECAM SysControls•SECAM WebControls•SECAM SyServe

The system operates off of four majorfunctional information nodes:•SECAM WebServer•SECAM SECURE•Local Computer•Local Camera Device

The following slide will go into greater detail.

SECAM Systems © 2010

A registered local computerto the SECAM SECUREdatabase

A video camera deviceattached to a local computer

Primary web server forSECAM WebControls

Black Box database solutionto protect sensitive recordeddata

SECAM Systems © 2010

•Locally installed application•That facilitates camera operation•Encrypts video feed•Facilitates video transmission•Monitors system status•Obtains and implements system settings

•SysControls web based monitoring solution•Facilitates modification of SysControl settings•Allows user control over the SysControls application•Facilitates the viewing of a video stream

•SysControls connection and video streaming facilitator•Functions as a server and handles incoming connection requests from SysControls installations•Authenticates SysControls

SECAM Systems © 2010

During the planning of this project the SECAM team encountered severalchallenging problems:

•Defining the functionality of a SECAM SECURE database•Defining the user procedures to maintain high system security•Defining account management and user access levels to maintain security

Problem definitions are in greater detail and the following slides.

SECAM Systems © 2010

Issues

• Maintaining the integrity of sensitive data• Facilitation and maintenance of sensitive data without human interference• Systems to prevent external exploitation of secure connections• Efficiently maintain size of data store (Video Compression, etc)• Ensure performance meets system wide criteria and parallel processing

requirements

SECAM Systems © 2010

Defining the functionality of a SECAM SECURE database

• Ensure validity of registered SECAM Systems and users• Ensure appropriate permission levels are granted• Ensure privacy of account information and resources• Ensure a secure and unobtrusive account recovery process• Ensure a secure and unobtrusive account creation process

SECAM Systems © 2010

Defining account management and user access levels to maintain security

• Maintaining an intuitive system with desired features• Prevent data tampering and ensuring appropriate privacy measures• Allowing security personnel to respond to an incident at discretion

SECAM Systems © 2010

Defining the uses processes to maintain high system security

Conclusion

The SECAM Solution is a cheap, accurate, and fast-response system that solves the ECS theft problem. The owners of the offices and labs will have the means to secure their own spaces, and the correct security personnel will be automatically notified when a breach does occur.

SECAM Systems © 2010