Call Log 2 - PowerPoint PPT Presentation

1 / 16
About This Presentation
Title:

Call Log 2

Description:

Emergency response to Staff duress ... Assign up to 10 ACNs to duress response. ... The cell phone has become a customised duress response system. ... – PowerPoint PPT presentation

Number of Views:42
Avg rating:3.0/5.0
Slides: 17
Provided by: silversol
Category:
Tags: call | duress | log

less

Transcript and Presenter's Notes

Title: Call Log 2


1
Call Log 2
Call Log Corporate Logic
  • Call Log 2
  • A New Approach to Security, Monitoring and
    Control.
  • Recognition and Effective Use of Tomorrows
    Technologies

2
Overview
  • Call Log 2 leverages GSM and Internet
    technology. The key components are servers that
    support thousands of users. These servers replace
    costly hardware and can provide instantly
    configurable security coverage.
  • The Web is extended to facilitate a meaningful
    physical action from a GSM event. It configures
    and reports.

3
Directions
  • Company and Client personel will accept the
    Internet and cell phones as part of everyday life
    - the standard way of doing things.
  • Security is not a set of isolated islands. It
    extends from the place of work, to the home, to
    schools, to the shopping centres and to the
    highways. Systems will adjust accordingly.
  • Security events will need to generate live
    reports and audit trails.
  • Systems will provide more functionality.
  • Embeded systems will be replaced by net
    objects.
  • Existing radio technology units will be replaced
    with GSM products.

4
Features Benefits
  • Integration. All modules share a common
    technology.
  • Powerful systems offer powerful features.
  • Servers are cost effective and flexible.
  • Functionality (programs) can be radically
    updated, managed and serviced easily and
    remotely.
  • Customised, country-wide, sophisticated systems
    can be set up in a few hours with little or no
    capital expenditure.
  • GSM units have coverage and security. They handle
    voice, data, pictures, messaging and the
    Internet. They can be traced. If a cell phone is
    lost or stolen, the identity is retained.

5
Call Log Servers
  • GSM Device Handlers
  • SQL Database / Private Gateway and Server
  • HTTP Public Web Server
  • Required Support Services Internet and Fax
    Connections, UPS, Delegated Servers, Backup
    Servers .

6
GSM Channels
  • Alarm
  • Validation
  • 10 Action Channels (typical)
  • Utility

7
Operation
  • Three tiers of software accessed by a standard
    browser Administration, Company and Client.
  • Look and feel of all pages is driven by the
    database using CSS (Cascading Style Sheets).
  • Company and Client access their own configuration
    and audit trail following authentication.
  • Apart from administration, the system handles GSM
    events. These can be either unexpected events
    (e.g.alarms), or the absence of expected events
    (e.g. missed patrol points).

8
Applications
  • Case Study Site Security
  • Access Control of Site and/or Buildings
  • Emergency response to Staff duress
  • Site Patrol
  • Alarms

9
Access Control of Site and/or Buildings
  1. Enter names and cell phone numbers of staff into
    the Call Log database. As appropriate restrict
    times/dates of entry and exit.
  2. Assign a Call Log Action Channel Number (ACN) to
    each entry and exit gate.
  3. For entry or exit, the staff member calls the
    displayed gate ACN with his/her cell. If their
    number (CLI) is present in the database and the
    time/date valid, Call Log instructs the gate to
    open by sending a message to the gate which
    includes the staff members identity and vehicle
    registration.
  4. Selected staff may grant visitors equivalent
    access, and be notified by SMS when the visitor
    arrives and leaves.
  5. Audit information includes grantor identity.

10
Emergency response to Staff duress
  1. Enter names and cell phone numbers of staff into
    the Call Log database.
  2. Assign up to 10 ACNs to duress response.
  3. Ask each staff member to identify a personal risk
    area for each ACN allocated.
  4. Enter a description of these personal risk areas
    into the database against each ACN for each staff
    member.
  5. Ask each staff member to enter the ACNs as speed
    dial or voice tag entries on their cell phone.
  6. The cell phone has become a customised duress
    response system. When Call Log identifies the
    incoming CLI on a specific ACN, a duress alarm is
    raised in the Control Room complete with staff
    identity and the associated personal risk area.

11
Site Patrol
  1. Assign 8 ACNs to site patrol.
  2. Deploy Patrol Clock Points (PCPs) around the site
    as required. (Note Each PCP displays a unique
    sequence of ACNs, which change at 5 minute
    intervals.)
  3. Enter each Guards details including their cell
    phone number into the database.
  4. Enter the serial number and location of each PCP
    deployed into the database.
  5. Generate a roster detailing when each Guard must
    clock in at specified PCPs and enter it into the
    database.
  6. When a Guard clocks in at a PCP, he dials the
    random ACN displayed. If he dials the wrong ACN
    or misses the time window, an exception is raised
    in the Control Room.

12
Alarms
  1. Call Log offers two units to interface to
    exisiting alarm systems, CAM and PAM, which
    generate GSM and Telkom CLIs respectively. Each
    unit has built-in ACNs. Units are installed as
    required at the site.
  2. Register the location, CLI and zone details in
    the database for each unit deployed.
  3. When an alarm is activated, the CAM/PAM unit maps
    the zone which raised the alarm to one of the
    built-in ACNs and contacts Call Log. The system
    looks up the registered zone details for that
    CLI/ACN combination and sends the alarm through
    to the Control Room.

13
CLS
  • Call Log Servers. The heart of the system.
  • The servers, and the software that runs on them,
    give the system its functionality and
    flexibility. They provide the means for users at
    both company and client level to enter and view
    their information, principally via the Internet
    but also in some cases via their cell phone.
  • Clients can set access control rules, personal
    risk areas, alarm configurations, view access and
    alarm logs and issue automated commands.
    Companies can do all their clients can plus
    administer their clients and view more detailed
    log information. They can also keep client
    contact and contract information. Companies have
    a virtual Control Room which can be monitored
    anywhere in the world.

14
Modules
  • CAM - Cell Alarm Module
  • Up to 12 zones, GSM, Speakerphone and remote
    control interfaces.
  • ISM Intercom/Speakerphone Module
  • RE3 Relay Expansion unit 3 channel
  • PAM Phone Alarm Module
  • Up to 4 zones plus AC fail, zone fault and test.
    POTS interface, 12V battery charger

15
Clocks
  • PCP - Patrol Clock Point
  • Microcontroller driven LCD display. Displays ACN
    (cell number) which changes every 5 minutes.
    Sequence of ACNs is unique and repeats every 150
    years.
  • SCP Software Clock Point
  • Functionality as above, but a program which runs
    on a Windows PC.

16
Availability
  • CLS Immediate
  • CAM 1st quarter 2003
  • ISM 1st quarter 2003
  • RE3 1st quarter 2003
  • PAM Immediate
  • PCP Immediate
  • SCP - Immediate
  • Contact Trevor Want 082 442 9708
Write a Comment
User Comments (0)
About PowerShow.com