Professional Documents
Culture Documents
Retail Chain Integrated Security Solution V1.4 PDF
Retail Chain Integrated Security Solution V1.4 PDF
Retail Chain Integrated Security Solution V1.4 PDF
1 Requirement Analysis
2 System Architecture
3 Solution Introduction
4 Representative Cases
Vertical Requirement - Current Situation
Traditional retail industry is facing unprecedented difficulties: the decline of offline
customer flow, the difficulty of customer transformation, the decline of profit, etc. with
the rapid development of Internet, accelerating reversed transmission with entity retail
enterprise started in the true sense of innovation, business model innovation of the
formats.
Loss Prevention E-commerce Challenge High Manpower Cost Customer Experience Business Operation
Vertical Requirement - Market Analysis
The critical success factor for any system is in proving to senior executives (i.e. key decision makers) that a
physical security solution will provide a return on investment (ROI). This could be through:
• Protecting the value of stock
• Providing business intelligence
• Improving efficiency
The retail market has become data-driven in its analysis and choice of physical security equipment. For retailers,
the “prosecution” element of any system is the least likely to provide a measurable return on investment, yet the
most likely to change criminal’s behavior.
All aspects of the physical security solution are becoming more centralized, including the decision-making
process.
Contents
1 Requirement Analysis
2 System Architecture
3 Solution Introduction
4 Representative Cases
Solution Architecture - Key Stakeholders
Business intelligence reports
Marketing Manager and Central Management
Teams that may have a mutual interest in aspects
of the security system, for example in using
analytics for business intelligence
Chief HR Manager
Employees access and attendance
Store Manager
Store managers consider security as only one part
of their overall role.
How to reduce loss?
Solution Architecture - Business Architecture
Retail Solution
Loss Prevention
Stakeholders Manager
Marketing Manager HR Manager IT Manager
Solution Architecture - System Architecture
Central Management
Network Cable
Other RS 485
Decoder Control Client HikCentral
Servers
Connection Cable
LAN
NVR Switch
POS NVR DeepinMind NVR
Alarm Panel
1 Requirement Analysis
2 System Architecture
3 Solution Introduction
4 Representative Cases
Security and Loss Prevention - Business Architecture
0 5 10 15 20 25 30 35 40
x
Security and Loss Prevention - Warehouse - Thermal Detection
Worried about the safety of the stored goods?
Warehouses and storage areas are often sought out by
thieves, and even by employees on occasion. Besides,
warehouse will likely have a higher sensitivity to fire safety.
Hikvision Thermal cameras with advanced algorithm. The fire
can be detected by temperature before it is too late.
Thermal Camera
Live View
VMS Platform
Alarm Notification
Fire detection Detection area
Event Detection alarm
Security and Loss Prevention - Cashier Desk - POS Text Overlay
Reduce fraud, identify employee theft and solve dispute efficiently.
The video records with POS text overlaid provide more details of each transaction and it is easy for footage
searching. This technology can be easily applied for solving clients dispute problems and preventing inside jobs.
Now it supports video POS text overlay and platform keywords search.
Three ways to connect POS-NVR and RS-232 POS machine:
1. Connect by RS-232 directly;
2. Connect through IO server(MOXA), it will turn 232 signals into network signals;
3. Connect by using IP address.
TCP/IP
PC Client iVMS RS232
LAN
2. IO Server to switch
RS232 to IP
IO Server
3.IP Connection
NVR/DVR
Fraud and Dispute at cash desk POS Text Overlay 1.POS NVR - RS232 Connection
Security and Loss Prevention - Exit - EAS Linkage with IPC
No conclusive evidence to convict a shoplifter?
Retailers report that shoplifting has a significant effect on their bottom line, stating that about 6% of
all inventory disappears to shoplifters.
Electronic article surveillance (EAS) is an effective method of inventory protection. By integrating it
with Hikvision cameras, an image or video clip of the incident can be captured or recorded for
retails to use it as the conclusive evidence and lower the shrinkage.
Linkage Capture Picture or Event
Recording
Light-Fighter
Camera Video Clip
!
Alarm IO Input
VMS Platform
Capture
EAS
Security and Loss Prevention - Shopping Area - Intrusion detection
Alarm panel is the useful device to protect the store by the application of various detectors in the store. The
linkage between video and intrusion can be configured to record the event pictures and video.
Monitoring Center
RVV2*1.5
Connection Cable
Siren
HQ Security Engineers
Center:
Device Management
Parameters Configuration/Strategy Making
Arm/Disarm
Alarm Handle/Verification/Acknowledge
Remote Control
Etc.
LAN/VPN
Branch Security Manager
Keypad
Remote HikCentral App:
Receive Alarm
…
Branch Security Engineer
Break-glass Detector
Local:
Arm/Disarm
Emergency
Magnetic Contact
Retail, Branch, ATM, Store, Building… Remote Control
Security and Loss Prevention - Shopping Area - VCA Detection
Smart detection and provide the security at night
Alarm Push
VMS Platform
Notification
Event Detection
Detection area
Motion Detection Configuration
Precision Marketing - Business Architecture
Precision Marketing
The critical success factors have been split into five categories:
•ROI - Stock saved from theft
•ROI - Additional benefits
•Total cost of ownership
•Operational efficiency and reliability
•Technology issues
Business intelligence (BI) is a broad category of applications and technologies for gathering, storing,
analyzing, and providing access to data to help enterprise users make better business decisions.
Store managers use BI to
Optimize Their Shelf Products
Improve Employee Performance
Forecast sale data, etc.
Precision Marketing - Customer Recognition - Device Deployment
Entrance
VIP Recognition
/High Frequency Recognition
Commodity Sale Area
DS-2CD7X26G0 iDS-96XXNXI
Precision Marketing - Customer Flow Analysis - People Counting
Customer Traffic Data Analysis
A precise customer flow is the key to evaluate sales performance, and moreover help you optimize
management strategy such as staff working schedule and promotion activity planning.
Check the peak time of every day/week/Month
Arrange the employees scientifically
Judge the reasonability of store rent
Check the result of the marketing activity Indoor Outdoor
People Counting - System Architecture
People Counting Camera
Control Client HikCentral Other Servers
RJ-45 Cable
SD Card
Switch
Queue Detection
Cashier Desk
Commodity Shelfs
Main Entrance & Exit
Conversion Rate
Potential Shop Star Shop
Few customers Large number of customers
High conversion rate High conversion rate
Short queuing time Short queuing time
By comprehensive analysis of the data of Evenly distributed customers Evenly distributed customers
Strategy: Put on more Strategy: A successful shop that
people counting, heat mapping, queue advertisement of attract more needs to be replicated.
customers.
detection, together with the transaction data
Customer Flow
available from retailer’s ERP system, it helps
Failure Shop Potential Shop
managers to get an overall idea of the
Few customers Large number of customers
operation status of the shops so as to make wise Low conversion rate Low conversion rate
Long queuing time Long queuing time
decisions. Unevenly distributed customers Unevenly distributed customers
Strategy: An unsuccessful shop Strategy: Improve customer
that needs to be closed. experience to raise conversion
rate.
People Counting
HikCentral
Queue
Detection HikCentral can meet the basic
Video People Heat requirments of SMB customers
Counting Mapping such as People Counting、Heat
Mapping etc.
SMB
Employee Management - Overview
Employee Management
Control Room
all employees.
VPN
Access Controller
System Functions Type
Access Control - Open Gate
Attendance for Employees
Card Reader Magnetic Lock Button Access Terminal Access Terminal Face Recognition Face Recognition Terminal
Terminal
Branch 1 Branch 2 Branch 3 Branch 4
Employee Management - Access Control & Attendance - Personnel & Authentication Management
Access Assign
Level
+ Assign
Access
……
Group
Remove
Remove
Door + Permitted Access
Period = Access Level Level
HikCentral can support: Two steps for authentication The authentication mode can
Max. 10000 person(Face); management of the personnel: support:
Create person one by one or by
Step 1: select a door and define its Card;
group import;
Active Directory integration, permitted period to form an Access Fingerprint;
automatically synchronize the Level; Password;
information from AD domain system Step 2: adding person group into Face;
,include name, profile, and email the access level, becoming an Any combination of the
address;
access control group. authentication.
Output all person’s list.
Employee Management - Access Control & Attendance - Attendance
In HQ, all the access card(face) swiping record will be uploaded and stored in database to
create the employee attendance reports. In the retail, the attendance record comes from the
access control devices and dedicated attendance devices based on the retail habit.
Control Room
Network Cable
RS 485
Connection Cable
VPN
Access Controller
After 3rd party system integration with Hikvision iVMS, the 3rd party system(HR system or salary system) can get all
the access control data and attendance data from Hikvision system to do the deep analysis to be as the
reference of KPI and salary . Then 3rd party system doesn’t need to integrate detailed hikvison devices.
Hikvision Platform
Central Management - Overview
Central Management
Store
Store Centralized Business Data Analysis
Store
HQ
Overall System Maintenance
Store
Store
VPN/LAN
Surveillance Center
RAID RAID
VPN/LAN VPN/LAN
records locally.
NVR NVR
Nighttime: Network resources released for video central backup.
Local Storage
Central Storage
Go through SMS
VPN
Client in store
Get stream directly
System Features:
Devices C/S Devices C/S 1. Support to automatically Judge the network;
2. Support to configure the client to direct connection;
Store1(VLAN1) Store 2(VLAN 2) 3. Support to configure the client to go through the SMS.
Central Management - Network Design - Bandwidth Design - Smooth Stream
Smooth Stream: A stream which can detect the network status and adjust the bitrate
automatically and dynamically to take full advantage of the network to adapt the low
bandwidth and unstable connectivity condition.
Best performance: Capable to live view from IP Camera Best performance: Capable to live view/play back from
one channel @4CIF 25FPS in the network status of 512Kbps, DVR/NVR one channel @4CIF 25FPS in the network status
200ms latency, 10% package loss. of 400Kbps, 50ms latency, 5%package loss.
Note:
1. Smooth stream cannot be used for storage.
2. SMS can copy and dispatch smooth stream but cannot transfer standard stream into smooth stream.
Central Management - Network Design - Bandwidth Design - Transcoding & Frame Extracting Playback
Optimization for playback on low bandwidth but need playback scenarios.
1. Transcoding Playback
Principle: IP Camera stores main stream in
Transcoding Playback the NVR. While playback, NVR transcodes
High Bitrate Low Bitrate it to be lower bitrate as user desired.
Performance: User defined performance.
The bitrate can be decreased to extremely
NVR HikCentral low.
NVR DVR
NVR DVR
Thumbnail for quick incident locating Lock video to protect it from being overwritten
Add tag at suspicious points Download video to local storage for backup
Note: video lock function is based on files, so doesn’t support manual definition of lock period.
Note:
1. Both NVR (Firmware 4.1.60 or above) and pStor supports this function. DVR and Hybrid SAN does not support this function.
2. Playback through SMS does not support this function.
Central Management - Monitoring Center - Evidence Post-search - VCA Search
Motion Analysis
Line Crossing Detection
Intrusion Detection
Supported Hardware:
NVR: V3.2.0 or above
DVR: V3.4.0 or above
IPC: V5.3.0 or above
Network Adaption and Optimization- Multiple Device Adding Methods
Different device communication methods according to the network condition.
Headquarters
Scenario 1: Fixed IP Network
Solution: SDK + NAT port mapping on GW.
Scenario 2: Floating IP Network
Router NAT (Optional)
Solution 1: Establish VPN from HQ to site and
Gateway
then apply same as fixed network.
Solution 2: HikConnect + NAT port mapping
Internet
on GW.
Solution 3: Apply DDNS service and add
devices by Domain Name.
Router
NAT Solution 4: EHome solution
Gateway
Scenario 3: 3G/4G Network
Solution 1: Establish VPN from HQ to site and
then apply same as fixed network.
Site Solution 2: EHome solution.
Network Adaption and Optimization- Ehome Solution
Traditional Mode Ehome Mode
VMS search for Devices, so every device
need a independent fixed IP. Devices actively register to VMS, so do
In most cases, it is applied to the LAN not need pubic network fixed IP.
because the public fixed IP is very expensive.
Fixed IP Fixed IP
HikCentral HikCentral
LAN WAN/4G/3G
Note: 1.Supports only EHome v5.0 or above; 2.Supports only NVR, and the firmware should be v4.2.1 or above.
Central Management - Monitoring Center - Alarm Handling
6. etc. statistics
Alarm Demonstration Unconfirmed alarms
1. Trigger pop-up windows keep staying in the
2. Display on video wall alarm center
3. Alarm Escalation
4. etc.
Central Management - Monitoring Center - Alarm Demonstration
In control room, all the resource and alarm can be managed centrally. By the video wall, the key channels, the
important alarms and the E-map or health-monitoring module can be displayed in the screen to highlight it.
Display the important alarm on the video wall, will remind the security team in control room to check it immediately.
Video Wall
Smart Wall Client Video Display Alarm Linkage pop-up E-map Projection
To live view and playback channels on Alarm linkage view pops up onto the To project local PC screen to the Smart
the big Smart Wall with a better view. Smart Wall. Wall. Typically used to show the E-Map.
Central Management - Monitoring Center - Maintenance
How to get awareness of status to the devices in the network and take quick reaction ?
High
HDD Full
Memory
Camera offline Signal status HDD Full Video Tampering Server Notice Record Exceptions
exception
Step 1. Overall checking Step 2. Detailed Status/Error checking Step 3. Fix the problems
• Network accessible?
• Power on?
• Centralized display of health • List of the abnormal items with • User name & password correct?
• HDD normal?
• Quickly identify problems detailed information
• Recording schedule correct?
• Running too many applications?
• ……
Contents
1 Requirement Analysis
2 System Architecture
3 Solution Introduction
4 Representative Cases
Representative Case
Somerset Mall, South Africa
Hikvision provides security for the entire chain stores with iVMS
software to connect individual stores to corporate headquarters.
total have 12,000 shops , and every year need build new 1,000 shops and replaced 800
shops CCTV. now we already work with seven-evelen on video surveillance and AI field.
In this project, HIKVISION products are mainly used to indoor and outdoor video surveillance,
warehouse, shopping area and cash counter monitoring. HIKVISION provides over 2800
channels camera and NVRs, as well as people counting cameras. This project hikvison
amount is more than 320,000 USD, and help building more 360 stores all over the Thailand.
efficiency. People counting camera also helps to provide potential business date for analysis.
Representative Case
J&T Express Chain Stores Project in Indonesia
J&T Express is top three logistics company in Indonesia. J&T Express is
center. Total project cameras are around 13000 pcs. Hikvision system
also integrate the third party cameras nearly around 2000 stores.
Customer Value: Hikvision covers all the hardware to get the real time
authority to get the right video. This system can make sure of video