If you have been to any of the many security industry tradeshows this year you will undoubtedly have seen and heard the phrase ‘next generation video analytics’. Is it just a catchy marketing phrase or is there more substance behind it? Video analytics as a technology has been with us for many years, but there has always been an air of confusion and mystery around it, in large part created by Hollywood movies, where every camera is connected, an operator can search the network and locate the villain in a matter of seconds.

In many ways, I am pleased to say that in many respects fact has caught up with fiction, with the newest video analytics solutions that are now on the market focusing on search and specifically real-time search. These solutions have been tried, tested and proven to help reduce search time from hours to minutes and even seconds.

Real-time Search Analytics

Real-time search analytics addresses one of the most important control room tasks - locating a person of interest. Put simply, by reducing the search time you significantly improve the chances of a favourable outcome. Whether it is working in real-time to reunite a lost child with their parents, aiding in the apprehension of a terror suspect, or working with the authorities following a major incident, every second counts.

Knowing where a person of interest
is at the current moment is vital, but
in certain situations you may also
want to know when and where
they entered the estate

However, the technology goes one-step further than pinpointing where on the CCTV network that person currently is. Yes, knowing where a person of interest is at the current moment is vital, but in certain situations you may also want to know when and where they entered the estate, the precise route they took, who they were with and what they did before arriving at their current location.

FAQ Of Real-time Search Analytics

With the introduction of any new technology there will always be some confusion around what it is, what it can do and whether you have the infrastructure in place to consider deploying it. With that in mind here are the top ten questions I have been asked many times about real-time search analytics…

  1. Who can I search for? Any person of interest
  2. What is the search based on? Full body image, textures, colours and unique characteristics
  3. What can I use as a reference? Upload photo, video image or human composite
  4. Does it require mega-pixel cameras? Suspect Search is camera type agnostic. Images need to be in colour CIF-Full HD resolution and a frame rate of QRT or higher
  5. How does it help me reduce my search time? It filters out 95% of irrelevant images
  6. How can I learn the suspect’s locations and movements? The suspect’s route is displayed on a map
  7. What is the recommended environment? The technology can be used indoor or outdoor
  8. Does it work in real-time? Yes, real-time search can be initiated in seconds
  9. What are the common use cases? Intruder search, lost child, unattended bag owner, locating a witness
  10. Where is the technology currently in use? Transport hubs, airports, city centres, hospitals, government facilities and sporting events
    The movie-makers of tomorrow are going to have to up their game in a big way, if they want to impress or maybe even inspire the security industry
    Next-generation video analytics is very much in the here and now

Practical Application

So, how can it be used in day-to-day security operations? To best explain how it works in practice here is an example…

It is a Saturday afternoon and a family are attending a sporting event. The stadium holds 60,000 people and the concourses surrounding the entry gates are getting very crowded, with 30 minutes before the match is due to start. The family queue to go through the turnstiles and upon entering the stadium they soon get separated from their six-year-old son. Panicked, they ask the nearest steward for help, who arranges for an announcement to be made over the public-address system and, also notifies the control room.

The steward gives the control room operator a description of the young boy (short blonde hair, a light blue jacket and a small yellow backpack). He quickly enters this information in to the system by creating a human composite (otherwise known as an avatar) and in less than five seconds he is looking at a series of images where a person matching the description appeared on a surveillance camera. The rapid speed of the search is made possible because the system is capturing, indexing and storing data in real-time, from every camera located in and around the stadium complex.

The rapid speed of the search
is made possible because the
system is capturing, indexing
and storing data in real-time

Upon confirming that it is the boy in question the operator selects the camera feed of his last known location and the real-time feed shows him clearly at concession stands looking distressed. The nearest steward is notified and he waits with the boy until he is reunited with his parents. All of the information relating to this incident and others is logged both for training and to help the stadium staff make improvements to reduce the likelihood of incidents recurring.

This is a common scenario at a sporting event or shopping complex, but the same process can be applied to estates with hundreds or thousands of cameras across single or multiple sites, such as a sea or airport transportation hub or medical facility. What is more, the sports stadium in this example did not require any expensive camera upgrades in order to deploy real-time search analytics, as it worked with the infrastructure already in place.

Next-generation Video Analytics At Present

Next-generation video analytics is very much in the here and now - in fact it is in real-time! What is more, it isn’t just for handling rare incidents but also daily occurrences that can absorb a lot of the control room operators’ time, and I make the point again that time is the number one critical factor when handling any incident.

The movie-makers of tomorrow are going to have to up their game in a big way, if they want to impress or maybe even inspire the security industry.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version

Author profile

Erez Goldstein Marketing Director, Qognify

In case you missed it

What Are The New Trends And Opportunities For Biometrics?
What Are The New Trends And Opportunities For Biometrics?

A shift toward touchless devices during the coronavirus pandemic has been a boon to the biometrics sector. Another factor in the recent increase in use of biometrics is lower prices, which are a symptom of a maturing market and of new technology capabilities. Increasingly, integration of biometrics with access control and other security systems is expanding use cases and sales numbers. For additional insights, we asked this week’s Expert Panel Roundtable: What are the new trends and opportunities with biometrics (facial, fingerprint, iris and/or voice)?

Rule Triggering ‘Blacklist’ Provision of NDAA Ready to Take Effect
Rule Triggering ‘Blacklist’ Provision of NDAA Ready to Take Effect

Within days, a rule will take effect that bans from U.S. government contracts any companies that “use” video products from Chinese companies Hikvision and Dahua. The Federal Acquisition Regulation (FAR) rule implements the “blacklist” (or “Part B”) provision of the National Defense Authorization Act (NDAA), which is understood in the security industry as prohibiting dealers and integrators that do business with the federal government from selling Chinese-made video products to any of their customers (even for non-government projects). The rule, which is officially still interim, states: “On or after August 13, 2020, [federal] agencies are prohibited from entering into a contract, or extending or renewing a contract, with an entity that uses any equipment, system, or service that uses covered telecommunications equipment or services as a substantial or essential component of any system, or as critical technology as part of any system.” Federal rules  Within days, a rule will take effect that bans U.S. government contracts any companies that “use” video products from Chinese companies Hikvision and DahuaFederal agencies issuing the rule are the Department of Defense (DoD), the General Services Administration (GSA) and the National Aeronautics and Space Administration (NASA). GSA provides centralized procurement for the federal government. Because the COVID-13 crisis delayed issuance of the rule, the usual 60 days will not be allowed for public comment before the rule is implemented. However, public comments are welcome and will be addressed in subsequent rulemaking. “Telecommunications equipment” refers to equipment or services provided by Huawei Technology or ZTE Corp, both Chinese telecommunications giants. The rule also specifies that it applies to “certain video surveillance products or telecommunications equipment and services produced or provided by Hytera Communications Corp., Hangzhou Hikvision Digital Technology Company, or Dahua Technology Company (or any subsidiary or affiliate of those entities).” Hytera is a Chinese manufacturer of radio systems. Hikvision and Dahua are major international manufacturers of video surveillance equipment. Limits and prohibitions  The rule states: “This prohibition applies to the use of … equipment or services, regardless of whether that use is in performance of work under a Federal contract.” In the industry, this clause is taken to mean that integrators that “use” any of the covered equipment are prohibited from selling to the government. “Use” presumably covers an integrator deploying the equipment in their own facilities and/or selling it to other customers. The rule also prohibits “service … related to item maintenance,” which in the case of a security integrator would include providing service contracts on previously installed systems. Security Industry Association (SIA) The Security Industry Association (SIA) comments: “Due to applicability [of the rule] to uses by entities with federal contracts even unrelated to their federal work, this broad interpretation is expected to have widespread impact on the contracting community across many sectors, as covered video surveillance equipment is some of the most commonly used in the commercial sector in the United States.” Security integrators that do business with the federal government have largely anticipated the new rule and already switched their Chinese camera lines for NDAA-compliant competitors. However, as SIA points out, extensive common uses of the Chinese equipment in various commercial sectors raises additional concerns.   Easing compliance burdens The interim rule adopts a “reasonable inquiry” standard when an offeror (government contractor) represents whether it uses covered equipment. “A reasonable As SIA points out, extensive common uses of the Chinese equipment in various commercial sectors raises additional concerns. inquiry is an inquiry designed to uncover any information in the entity’s possession about the identity of the producer or provider of covered telecommunications equipment or services used by the entity. A reasonable inquiry need not include an internal or third-party audit.” SIA notes that this provision may be aimed at easing the compliance burden by suggesting that contractors only need to inquire based on what information they already possess. The 'blacklist' The new rule covers Paragraph (a)(1)(B), which has informally been referred to as the “blacklist” provision of the NDAA, the John S. McCain National Defense Authorization Act for fiscal year 2019. However, the “Chinese ban” provision [Paragraph (a)(1)(A)] already went into effect a year after the law was signed by President Trump (August 13, 2018). “Part A” covers use of Chinese-made products in fulfilling government contracts. A growing threat Seeking to justify the new restrictions, the FAR rule states: “Foreign intelligence actors are employing innovative combinations of traditional spying, economic espionage, and supply chain and cyber operations to gain access to critical infrastructure and steal sensitive information and industrial secrets. The exploitation of “Telecommunications equipment” refers to equipment or services provided by Huawei Technology or ZTE Corp, both Chinese telecommunications giantskey supply chains by foreign adversaries represents a complex and growing threat to strategically important U.S. economic sectors and critical infrastructure.” SIA has urged a delay in implementing the “Part B” provision, stating: “The federal government estimates that it will cost contractors well over $80 billion to fully implement this prohibition on the use of certain Chinese telecommunications and video surveillance equipment, yet endless delays in publishing the rule now mean that federal suppliers have just weeks to understand and comply with the new rule, which raises as many questions as it answers.” SIA continues: “Federal suppliers across a wide range of industries have increasingly concluded that Part B is unworkable without clarification of the scope and meaning of key terms in the provision, which the rule does not do enough to define. For example, Part B bans agencies from contracting with a provider that “uses” any covered equipment or service. This term is not clearly defined in law or regulation, yet contractors must certify compliance beginning Aug. 13, 2020.” The Part B rule, which only applies to prime contractors, enables agency heads to grant a one-time waiver on a case-by-case basis, expiring before Aug. 13, 2022.

Why Biometrics is Key for the New Era of Convenient Workplace Security
Why Biometrics is Key for the New Era of Convenient Workplace Security

The modern working world has evolved dramatically over the last few decades - from how and when we work, to the places we work from. Widespread internet connection advances, alongside the growth of cloud-based shared working platforms, have not only created the possibility for increasingly flexible working arrangements, but also fueled a desire to do so – particularly among millennials. The preference for flexible working has now created a widespread need for more agile workforces, saddling IT departments around the world with the task to maintain ‘business as usual’ without compromising corporate privacy. With flexible working forecasted to stay for the long haul and passwords increasingly under scrutiny, evaluating alternative secure authentication methods to keep companies’ data and networks safe is important to protect these ‘new normal’ ways of working.   The end of the humble password? A recent report by Raconteur found that the most common method of authentication for securing the digital aspects of workplaces is passwords. Unfortunately, however, between phishing, hacking and simple guesswork, passwords are easily compromised – a problem that is only getting worse, with IT professionals reporting an increase in phishing attacks in the last few years. Once compromised, passwords can be used to enter untrusted apps or websites and, worst and most commonly of all, give rise to even greater data breaches. Between phishing, hacking and simple guesswork, passwords are easily compromised Alongside security concerns, 6 in 10 people worry about forgetting their passwords and, according to a recent Balbix study, 99% of people reuse the same password across different work accounts. This, undoubtedly, is a side effect of the increasingly complex character requirements implemented by many enterprises. This stress and effort leads to frustrated employees, but, more worryingly, forgotten passwords can also cost IT departments millions of dollars a year. In our flexible, hyper-connected world, it is clear then that the humble password is no longer effective. Additional or alternative layers of authentication are needed to help enterprises maintain their workplace security in a more convenient and cost-effective way.   Smarter workplace authentication with biometrics Often, hacking incidents involve the use of stolen credentials. One authentication solution that could bring an end to these large-scale hacking attacks is biometrics, as unique biological traits are extremely hard to steal and spoof. In addition to being a more secure method to authenticate users and prevent fraud in companies’ networks, it is also possible to layer biometric modalities to create a highly convenient and secure multi-modal authentication solution for sensitive areas or information. Spoofing two biometric modalities, such as fingerprint and iris, in the same attack is virtually impossible, but that doesn’t mean this level of security needs to impair the UX. After all, you can put your finger on a touch sensor, while at the same time glancing at a sensor. For businesses, biometrics can be used in a wide variety of use cases, from securing laptops and applications to authenticating employees at secured access and entry points. It can also be used to add frictionless layers of additional security to any aspect of current security systems, such as key fobs or USB sticks, or to access personalized settings or employee accounts when using shared devices, such as a printer system. This way, beyond playing a role in securing the modern workplace, biometrics can also give employees greater flexibility and convenience over how, when and where they work. Privacy and biometrics - explained Many employers and employees worry about safeguarding privacy in the workplace. Considering biometric data is highly personal, it is no wonder, then, that many are concerned about collecting this data for the purpose of workplace security and what liabilities this may expose them to. For businesses, biometrics can be used in a wide variety of use cases, from securing laptops and applications to authenticating employees Employers must adhere to the relevant workplace privacy laws, such Europe’s GDPR, and this duty extends to biometrics, of course. But, providing biometrics is implemented in line with best practice, it can actually protect employees’ privacy far more effectively than its predecessor, passwords. When employers use an on-device approach, their employees can rest assured no one will be able to access or steal their biometric data, as all biometric data is stored and processed on the device - whether that is a laptop, smartphone, USB stick or key fob. Removing the need for data to ever enter the cloud, this also removes the technical and legal complexities of managing a biometric database and, if a key fob is lost for example, all parties can rest assured there is no chance of anyone else being able to use it. A win-win. Precisely because biometric data is so difficult to steal and spoof, adding biometric authentication to end-point devices can considerably reduce data breaches to keep both sensitive employee and corporate data safe and secure. Reimagining workplace security As people work more flexibly, systems are shared more frequently, and attacks get smarter, it is clear to see that passwords alone are no longer enough to secure the modern-day workplace. Adding biometric authentication to end-point devices can considerably reduce data breaches Now is the time to reassess the physical and logical access control infrastructure. To keep personal and corporate data safe, it is crucial to add new and additional authentication methods to the security infrastructure. Luckily, the benefits of biometrics are often far simpler to realize than many enterprises imagine. The beauty of biometrics is its combination of both security and convenience. Compared to other forms of authentication, biometrics offers considerably stronger protection and an enhanced UX that can easily be integrated into existing enterprise security infrastructure – without the need for huge biometric databases to manage or fear. So, whether to replace outdated passwords or as part of a multi-modal authentication system, biometrics can play an important role in pushing workplace security into a new era for both physical and logical access control.