Home' RTCA Documents for Review : DO-230H FRAC Contents 119
©2017 RTCA, Inc.
A few modern systems feature digital video cameras with a mutual authentication process based on PKI
cryptography. This effectively prevents unauthorized component substitution and ensures the devices are
indeed the same as originally installed and configured with the system.
Best practice includes placing cameras so that they may provide cover for each other. This means that if
one camera is disconnected, another camera is positioned to provide a view of the malfunctioning unit. This
provides the SOC staff a chance to see if there is an intruder manipulating the victimized camera, or if the
lack of image is simply a technical malfunction. A pan-tilt-zoom (PTZ) camera may be useful for this
Video Analytic Examples
Other examples include a specific area, or object that is in the covered view of a camera. A video system
may be configured to react to changes such as motion within a specific area, or by a specific object, while
allowing motion in the surrounding areas.
Some video manufacturers have developed capabilities to within a defined area of coverage allow certain
types of motion, but trigger alarm messages on other types of motion. Motion may be allowed in one
direction only. Motion in other directions triggers an alarm message. The direction and speed of a moving
object are the parameters that are used in configuration of these types of video generated alarms.
A video analytics application that is increasingly popular is a single object that splits into two, or more.
Common deployments of these are in public areas where a person may carry a container such as a briefcase.
This is detected by the video equipment and triggers no action. However, should the person and the carried
object separate from each other, the system reacts with an alarm message and instant live video is then
displayed in the SOC. The video system may be integrated with the PACS for alarm annunciation, or be
integrated to a separate situational awareness annunciation system.
It is worth noting that the best of breed systems of each type may be used for PACS, Intrusion detection
and video. This may not automatically mean that when combined and integrated into one system the result
is as required based on the site-specific policies.
The best video system and best PACS and the latest state-of-the-art intrusion detection system may perform
their native functions better than anything else on the market in their respective market segment. However,
when combined, they may not provide the functionality required on site.
Successful integration may be defined as the detail level of integration made possible with each subsystem.
A PACS that cannot trigger and transmit the required messages to a video system may not be useful in these
deployments, but may be excellent when used by itself. A video system that is not able to receive and
process data from a PACS or IDS may be an excellent system when used in a stand-alone mode.
Most manufacturers offer some level of integration to their own product. These integration tools are of
various level of detail and expose different functions within their products. These products are referred to
as Software Development Kits, (SDKs), or Integration Development Kits, (IDKs). These may be the
components that determine the level of compliance with the requirement of the specific site.
Best practice is for the system integrator to evaluate the SDK capabilities of the considered systems to make
certain that the completed system indeed is capable of per forming the required functions.
Physical Access Control System (PACS) Checklist
□ Review local Concept of Operations, Con Ops.
Links Archive Navigation Previous Page Next Page