Shen An Group video network alarm platform features selling point 1. Multiple access methods:
Deep Security platform can receive 9 categories and dozens of different transmission methods. For the current global access method and the most complete manufacturer platform. Including PSTN telephone line, No. 1 or No. 7 signaling trunk, TCP/IP network transmission, GSM/CDMA security dialing protocol dialing, GPRS\CDMA1X/EDGE/wireless network transmission, SMS/MMS SMS, color information transmission, 3G Transmission, IoT RFID protocol transmission and high-power FM transmission,
2. Protocol compatibility super strong:
Shenzhen Security Platform is compatible with Deep Security Protocol, CONTACT ID/4+2 Protocol, SA1 Protocol (compatible with C&K, Ph.D., Maple Leaf, Honeywell, GE, etc.), and the security platform can handle various DTMF code information of PSTN, and FSK Caller ID is zero. Call processing, patrolling and zero credit analysis. In the network transmission part (including 2G/3G), compatible access can be made according to various standard HTTP API interfaces or products providing SDK.
The platforms offered by most merchants are only compatible with the specified one product, resulting in a huge loss after the manufacturer's service fails or the quality is not qualified in the later period. The dilemma: if it is removed, the customer in front can not explain; if not, follow-up cooperation is due to quality and Services, technologies and other factors simply cannot cooperate. Deep Security platform is exactly the opposite. Can be compatible with almost all domestic alarm manufacturers' products. All security companies currently working with Shenzhen Security Co., Ltd. almost all faced this problem. Changed the platform and moved all the original customer base databases to the Deep Security Platform Management. This not only solved the dilemma in one step, but also drastically changed the promotion situation. The reason was the product. Features and platform service features are fully in line with user's tastes. Terminal prices are less than half of the past, self-service features are developed, and feature packages embody customer supremacy, saving the user the idea of ​​saving every penny. The security company understands that to save the user, he only has room to earn. Shen An Group promised that when the platform was changed, past machines were all connected to the Shen An platform3. Video linkage alarm + storage + forwarding:
This feature is currently the world's most advanced technology. When the alarm is triggered, the alarm is triggered synchronously and stored in sync. The alarm condition is automatically forwarded or manually forwarded. At present, some businesses add a video cat to the original IPC to solve the video upload problem. The video confirmation after the alarm is transmitted to the platform via video synchronization. The owner can completely solve the problem by watching the video on the mobile phone or online. If a cat is added to the IPC, the ordinary people would not see it if they wanted to see it or not. The culprit had not seen it since he committed the crime. The cat is not expecting anything.
4. Server clusters cover almost all solutions in the security industry:
Database server, alarm software server, video server, data backup server, domain name management server, P2P video management server, 3G video server, GPS data server, etc., Security Security Management Center of Shenzhen Security Group basically integrates all the current alarms on the market. The model includes almost all application solutions in the security industry, ranging from large-scale operators, security companies, safe cities, armed escort solutions, subdivision wells, mine-specific industry security, prison security, and call for help system management centers. Power, base stations, tower anti-theft monitoring, campus riot management, etc., all kinds of industry applications, everything.
5. Powerful modular optimization combination:
Shen An Security Smart Alarm Management Center has the following optional matching modules, standardized combination. It is convenient for customers to select business portfolios in a targeted manner and at the same time facilitate the direct upgrade of the business platform in the future. (1) Voice module, related alarm event recording module, police intelligence reading module (2) TTS module, reminder fee system module, extension module (3) network short message module, MMS module (4) GPRS/CDMA1X module (5) video Receiving processing module (6) Inspection analysis/DTMF code analysis module (7) Heartbeat packet detection module (8) TCP/IP network transmission management module (9) Video round tour management module (10) Patrol management module (11) NVR subsidiary application module (12) Real-time video monitoring storage control module (13) Software matrix patrol module (14) API interface module (15) SDK interface module 6 Remote upgrade, installation and maintenance:
In the actual promotion of the security company, some special customers have complicated requirements for functional packages. The security company requires Shen An Group to do remote upgrades to meet the different needs of the Group's customers. If the platform manufacturer engineers upgrade to the security company every time, and frequently make planes to come to China from abroad, the cost and time loss of the optical travel can not be overcharged. The remotely installed engineers can save on road tolls, and the Shen An voice card is the same as the computer graphics cards. Plug in the slot on the computer to use, is a perfect embodiment of high technology.
7. The platform can extend the child platform for free:
Do you need to buy a platform to expand business in your subordinate area? No need. This is one of the biggest selling points of the Digital Platform in Shenzhen. Equivalent to say that a platform packs the world! You only need to install a computer with Internet access in the newly-developed business area. The total platform can be set up with unlimited number of free clients. Customers can log in with the client's password to perform hierarchical management. The cost savings are innumerable. A city often has several districts, and often even a township or a large-scaled community requires more than 3,000 households to install, and a district has 10 or so counties. One of the deep security platforms can solve all problems, and there is no need to buy one county for each county. The savings can not be calculated, especially the convenience of management, saving operating management costs. The platform and terminal are best to buy a company, otherwise two skins will suffer from an infinity of 8. System, information, data security:
System security: Use internal and external network isolation: such as network isolation or USB firewall and serial port isolation can increase isolation to expand the database for self-check user information and alarm information (this place needs Wang Weigang to modify)
Information Security: Using hierarchical operator rights management, you can hide the user's password in the user data to prevent information leakage data security:. Supports user data import tools for upgrades, supports the expansion of large databases, supports powerful data backup and data maintenance functions, and supports dual-system hot backup redundancy. Highest cost performance:
Industry-leading price/performance ratio. There are no platforms on the market for manufacturers, or to find factory OEM terminals, each host sold to the security company about 600 yuan, can only do some mandatory government projects. There is no price advantage and basis for large-scale promotion. Some terminals have no platform, and the terminal functions are completely inconsistent with the features promoted by the security company. The text is not correct.
10. Delivery cycle:
Shen An platform shipped the same day, the terminal shipped 3 days. Because the market platform can not be sold for several years, there is a single procurement, resulting in very slow shipments, security companies receiving goods are often troublesome, frequent failure of compatibility issues, deep security platform terminal has a lot of inventory, almost Multiple sets of platforms are shipped every day.
11. Expansion and convenience.
Most of the security companies that cooperated with Shenzhen Security are not designed for the county's 1000-800 units, but are intended to be extended to the entire city. This involves the issue of expanding for half a year or one year later. When the Shenzhen Security Platform is completed at one time, there is no secondary platform fee, and it is an unlimited use of the machine, which is not only convenient for management, but also not profitable. It is more suitable for the development of the city's channel operations and rapid expansion of business development12. The improvement in technology leads to a particularly significant price/performance advantage.
The deep-end terminal function is so powerful that the price is so low is the result of high-tech integration. For example: The voice system is completed by the platform, omitting the cost of doing a voice system in each host. Assuming that the platform to do a set of TTS voice system is 1000 yuan, all terminals do not need to do to omit the voice system. However, the market platform does not have this function. In fact, the cost of each terminal voice system is 20 yuan. Then, 10,000 sets of terminal voice systems are 200,000 yuan. If you promote 10,000 sets of terminals, the Shenzhen Security Platform will save you 200,000 yuan. Terminal costs, not to mention, the platform's voice capacity and subtle hints are hundreds of times more powerful than the terminal's stand-alone recording reminder. One-stop solution to the platform terminal.
Shen An not only has a powerful platform, but also has a more personalized terminal function. The Shenzhen Security Terminal fully cooperates with the platform to complement each other and significantly reduce the cost of the cost. The security company is well-equipped to promote it. Marketers will always say that the platform and the terminal are their own, but you can't complete the process of modifying characters in a software for a few days because the original code is not in your hands. Who can modify the data in the database in front of you to prove that the platform is his own intellectual property. There is no platform for the terminal, there is no platform for the terminal, and the cooperation will leave trouble and trouble.
14. Market segments.
All-inclusive. Shenan platform can be compatible with safe city, power, base station, tower system anti-theft, transformer anti-theft, DVR video unified management, traditional analog monitoring upgrade, video security, monitoring, cooperation with the civil community, call for help, safe city / township, and fire departments Cooperate strongly in the prevention of fire alarms, and cooperate with gas companies to create a joint gas leakage system and close the pipeline linkage system. Cooperate with the Public Security Bureau to ensure the safety of one party. Cooperate with the Comprehensive Management Office, the Public Security Bureau and the local government to cooperate with ten rural households in the joint defense system. House security, etc. 15. After-sale service.
A little mouse, remotely get. The mouse can always run faster than a plane train at any time, not to mention the cost of boarding and returning a plane ticket. After the modification, the engineer has to look at the operating results for a few more days. Deep Security completely avoids the above troubles, remote mouse solution. Almost a service equals one platform in the province.
16. Upgrade modification.
Generally free of charge. Shen An promises that all the upgrade procedures will be done remotely, and the general procedures will not be resolved within 2 hours. Modify the man-machine interface 15 minutes to complete, modify the characteristics of the client is equal to 10 minutes to open a new platform, personalization characteristics of the charge database software database changes do not exceed 30 minutes upload is complete, change the timing inspection / timing arming / timing disarming personalized custom The service does not exceed 25 minutes. It usually takes no more than 5 minutes for the security company to handle the terminal services, and all of the Internet is remote and free of charge. Most of the security companies that have demolished the old platform and used the new security platform have the same reason: services are often time consuming, and the size of things is irrelevant for a long time. Customers are impatient, and their hearts are already cold for a long time. The slaughter also paid money only because he was a foreigner and he met with security and hatred for the night. 17. Perfect platform subsidiary management functions:
The platform of Shenzhen Security is not only reflected in its powerful function, but also in many details.
(1) Insurance Claims Linkage Record Management Subsystem: Since the insurance claims issue is the life of the project promotion, if the database does not have such an automatic linkage system, then the claims involved will easily result in the customer lacking trust and disassemble the machine, which may lead to the installation of the system. Customer abortion.
(2) User Package Management System: Similar to China Mobile's GSM package, M-Zone, and Shenzhou Line's package management mode. Different users use different terminals. The monthly fee is different, and the Shen'an platform has different users. Package management system.
(3) Installation of work orders and confirmation of the opening of the system: After the system functions similar to the appointment of China Telecom's ADSL telephone, there is a dedicated person on-site installation, and then the dedicated person is responsible for the opening, the platform records are saved, and concurrently a package management system. Prevent users from sending installers and managers without system ERP management.
(4) reminder/pre-paid fee system: The system automatically prompts payment in advance and avoids charges in rural areas.
(5) TTS personalized voice settings: After receiving home alarm homeowners worry anxiously outside, eager to know what the home where the problem is whether the window into the people or the fire, the garage was stolen or the store shutter was bedding, platform There must be clear voice prompts to facilitate the owner to remotely take emergency measures.
(6) Illegal disarming detection time: Measures taken during the specified period of time to guard against theft (7) Management center police read-ahead: The security guard on duty cannot stare at the screen 24 hours a day, once the police trigger, management The center operating the client's speakers will accurately read the alarm situation and issue an alarm sound at the same time. (8) The internal module access, on-site and center interactive intercom: In the case of police intelligence, the center can use intimidation to scare off criminals. , If it is a false alarm, through communication and understanding, to avoid the police waste of energy, this intercom is not the center to pick up the phone to call the user's phone, but the alarm automatically when connected with the center intercom.
(9) Delinquent query: The system has detailed records of the alarm time and processing time after the alarm. Even if it is a false alarm, there are also remarks on the intercom. If there is an on-duty or alarm personnel who are not on-site or after the alarm, the system will not be heard. There is a function that does not answer the police automatically when the time-out is 1 minute. At the same time, there are also interviews with all historical records. Any records that exceed the specified range are displayed in red.
(10) Multiple interfaces, multiple login methods, multiple usage styles, and multiple login channels. Meet users who use a variety of different functional subplatforms. The platform interface LOGO source code can be freely changed to the customer's company name and ID.
(11) The answering phone can be used for simultaneous/cyclical broadcast. The powerful voice module function, for example, the user has 15 calls to answer the police, can be done once the alert situation, the 15 phones ring at the same time. Instead of dialing in turn.
(12) SMS Disarming Notice: Some chain store owners may not go to the shops for a month, but they also want to know whether employees are working normally and whether employees will use the remote control to disarm and enter the shops to guard against theft. He requested that each time the shop disarmed, he would receive a disarming message. Although the shop uses a telephone host for the transmission of the telephone line, the Shenzhen Security Platform can do the same with the SMS cat module.
(13) Level 2 inspections and reverse inspections: At present, most of the product inspections on the market are Level 1 inspections. The Shenzhen Security Group's products have two-stage inspections (including host to accessories), and the platform has front-end hosts. There is also the function of regular reverse inspections, using handshaking protocol to achieve the ultimate inspection.
(14) E-map template design, Shen'an Group provides electronic maps of the region to users in various regions, and at least three levels of electronic maps (cities, counties, towns), electronic maps can be added and modified, such as There are no shops on the site, and users can customize and add. At the same time, they can automatically generate basic space structure maps, allowing them to add custom defense zones twice.
(15) The Shenan Group Ableton Alarm Management Center platform has C/S and B/S structures and other methods.
(16) Dispatch anti-free upload, inspection upload free (17) heartbeat packet protocol, support (18) own interface in GPRS/CDMA1X 2G state and either TCP/IP or 3G network, can be with 110 command center, The BOSS system of the large-scale operator is connected to the account and billing system. (19) Police code customization: The customer can make police code customization and use it for alarm reporting on special occasions. (20) The platform reverses arming and disarming, for example, if It was the master who forgot, and the attendant guarded him.
Deep Security platform can receive 9 categories and dozens of different transmission methods. For the current global access method and the most complete manufacturer platform. Including PSTN telephone line, No. 1 or No. 7 signaling trunk, TCP/IP network transmission, GSM/CDMA security dialing protocol dialing, GPRS\CDMA1X/EDGE/wireless network transmission, SMS/MMS SMS, color information transmission, 3G Transmission, IoT RFID protocol transmission and high-power FM transmission,
2. Protocol compatibility super strong:
Shenzhen Security Platform is compatible with Deep Security Protocol, CONTACT ID/4+2 Protocol, SA1 Protocol (compatible with C&K, Ph.D., Maple Leaf, Honeywell, GE, etc.), and the security platform can handle various DTMF code information of PSTN, and FSK Caller ID is zero. Call processing, patrolling and zero credit analysis. In the network transmission part (including 2G/3G), compatible access can be made according to various standard HTTP API interfaces or products providing SDK.
The platforms offered by most merchants are only compatible with the specified one product, resulting in a huge loss after the manufacturer's service fails or the quality is not qualified in the later period. The dilemma: if it is removed, the customer in front can not explain; if not, follow-up cooperation is due to quality and Services, technologies and other factors simply cannot cooperate. Deep Security platform is exactly the opposite. Can be compatible with almost all domestic alarm manufacturers' products. All security companies currently working with Shenzhen Security Co., Ltd. almost all faced this problem. Changed the platform and moved all the original customer base databases to the Deep Security Platform Management. This not only solved the dilemma in one step, but also drastically changed the promotion situation. The reason was the product. Features and platform service features are fully in line with user's tastes. Terminal prices are less than half of the past, self-service features are developed, and feature packages embody customer supremacy, saving the user the idea of ​​saving every penny. The security company understands that to save the user, he only has room to earn. Shen An Group promised that when the platform was changed, past machines were all connected to the Shen An platform3. Video linkage alarm + storage + forwarding:
This feature is currently the world's most advanced technology. When the alarm is triggered, the alarm is triggered synchronously and stored in sync. The alarm condition is automatically forwarded or manually forwarded. At present, some businesses add a video cat to the original IPC to solve the video upload problem. The video confirmation after the alarm is transmitted to the platform via video synchronization. The owner can completely solve the problem by watching the video on the mobile phone or online. If a cat is added to the IPC, the ordinary people would not see it if they wanted to see it or not. The culprit had not seen it since he committed the crime. The cat is not expecting anything.
4. Server clusters cover almost all solutions in the security industry:
Database server, alarm software server, video server, data backup server, domain name management server, P2P video management server, 3G video server, GPS data server, etc., Security Security Management Center of Shenzhen Security Group basically integrates all the current alarms on the market. The model includes almost all application solutions in the security industry, ranging from large-scale operators, security companies, safe cities, armed escort solutions, subdivision wells, mine-specific industry security, prison security, and call for help system management centers. Power, base stations, tower anti-theft monitoring, campus riot management, etc., all kinds of industry applications, everything.
5. Powerful modular optimization combination:
Shen An Security Smart Alarm Management Center has the following optional matching modules, standardized combination. It is convenient for customers to select business portfolios in a targeted manner and at the same time facilitate the direct upgrade of the business platform in the future. (1) Voice module, related alarm event recording module, police intelligence reading module (2) TTS module, reminder fee system module, extension module (3) network short message module, MMS module (4) GPRS/CDMA1X module (5) video Receiving processing module (6) Inspection analysis/DTMF code analysis module (7) Heartbeat packet detection module (8) TCP/IP network transmission management module (9) Video round tour management module (10) Patrol management module (11) NVR subsidiary application module (12) Real-time video monitoring storage control module (13) Software matrix patrol module (14) API interface module (15) SDK interface module 6 Remote upgrade, installation and maintenance:
In the actual promotion of the security company, some special customers have complicated requirements for functional packages. The security company requires Shen An Group to do remote upgrades to meet the different needs of the Group's customers. If the platform manufacturer engineers upgrade to the security company every time, and frequently make planes to come to China from abroad, the cost and time loss of the optical travel can not be overcharged. The remotely installed engineers can save on road tolls, and the Shen An voice card is the same as the computer graphics cards. Plug in the slot on the computer to use, is a perfect embodiment of high technology.
7. The platform can extend the child platform for free:
Do you need to buy a platform to expand business in your subordinate area? No need. This is one of the biggest selling points of the Digital Platform in Shenzhen. Equivalent to say that a platform packs the world! You only need to install a computer with Internet access in the newly-developed business area. The total platform can be set up with unlimited number of free clients. Customers can log in with the client's password to perform hierarchical management. The cost savings are innumerable. A city often has several districts, and often even a township or a large-scaled community requires more than 3,000 households to install, and a district has 10 or so counties. One of the deep security platforms can solve all problems, and there is no need to buy one county for each county. The savings can not be calculated, especially the convenience of management, saving operating management costs. The platform and terminal are best to buy a company, otherwise two skins will suffer from an infinity of 8. System, information, data security:
System security: Use internal and external network isolation: such as network isolation or USB firewall and serial port isolation can increase isolation to expand the database for self-check user information and alarm information (this place needs Wang Weigang to modify)
Information Security: Using hierarchical operator rights management, you can hide the user's password in the user data to prevent information leakage data security:. Supports user data import tools for upgrades, supports the expansion of large databases, supports powerful data backup and data maintenance functions, and supports dual-system hot backup redundancy. Highest cost performance:
Industry-leading price/performance ratio. There are no platforms on the market for manufacturers, or to find factory OEM terminals, each host sold to the security company about 600 yuan, can only do some mandatory government projects. There is no price advantage and basis for large-scale promotion. Some terminals have no platform, and the terminal functions are completely inconsistent with the features promoted by the security company. The text is not correct.
10. Delivery cycle:
Shen An platform shipped the same day, the terminal shipped 3 days. Because the market platform can not be sold for several years, there is a single procurement, resulting in very slow shipments, security companies receiving goods are often troublesome, frequent failure of compatibility issues, deep security platform terminal has a lot of inventory, almost Multiple sets of platforms are shipped every day.
11. Expansion and convenience.
Most of the security companies that cooperated with Shenzhen Security are not designed for the county's 1000-800 units, but are intended to be extended to the entire city. This involves the issue of expanding for half a year or one year later. When the Shenzhen Security Platform is completed at one time, there is no secondary platform fee, and it is an unlimited use of the machine, which is not only convenient for management, but also not profitable. It is more suitable for the development of the city's channel operations and rapid expansion of business development12. The improvement in technology leads to a particularly significant price/performance advantage.
The deep-end terminal function is so powerful that the price is so low is the result of high-tech integration. For example: The voice system is completed by the platform, omitting the cost of doing a voice system in each host. Assuming that the platform to do a set of TTS voice system is 1000 yuan, all terminals do not need to do to omit the voice system. However, the market platform does not have this function. In fact, the cost of each terminal voice system is 20 yuan. Then, 10,000 sets of terminal voice systems are 200,000 yuan. If you promote 10,000 sets of terminals, the Shenzhen Security Platform will save you 200,000 yuan. Terminal costs, not to mention, the platform's voice capacity and subtle hints are hundreds of times more powerful than the terminal's stand-alone recording reminder. One-stop solution to the platform terminal.
Shen An not only has a powerful platform, but also has a more personalized terminal function. The Shenzhen Security Terminal fully cooperates with the platform to complement each other and significantly reduce the cost of the cost. The security company is well-equipped to promote it. Marketers will always say that the platform and the terminal are their own, but you can't complete the process of modifying characters in a software for a few days because the original code is not in your hands. Who can modify the data in the database in front of you to prove that the platform is his own intellectual property. There is no platform for the terminal, there is no platform for the terminal, and the cooperation will leave trouble and trouble.
14. Market segments.
All-inclusive. Shenan platform can be compatible with safe city, power, base station, tower system anti-theft, transformer anti-theft, DVR video unified management, traditional analog monitoring upgrade, video security, monitoring, cooperation with the civil community, call for help, safe city / township, and fire departments Cooperate strongly in the prevention of fire alarms, and cooperate with gas companies to create a joint gas leakage system and close the pipeline linkage system. Cooperate with the Public Security Bureau to ensure the safety of one party. Cooperate with the Comprehensive Management Office, the Public Security Bureau and the local government to cooperate with ten rural households in the joint defense system. House security, etc. 15. After-sale service.
A little mouse, remotely get. The mouse can always run faster than a plane train at any time, not to mention the cost of boarding and returning a plane ticket. After the modification, the engineer has to look at the operating results for a few more days. Deep Security completely avoids the above troubles, remote mouse solution. Almost a service equals one platform in the province.
16. Upgrade modification.
Generally free of charge. Shen An promises that all the upgrade procedures will be done remotely, and the general procedures will not be resolved within 2 hours. Modify the man-machine interface 15 minutes to complete, modify the characteristics of the client is equal to 10 minutes to open a new platform, personalization characteristics of the charge database software database changes do not exceed 30 minutes upload is complete, change the timing inspection / timing arming / timing disarming personalized custom The service does not exceed 25 minutes. It usually takes no more than 5 minutes for the security company to handle the terminal services, and all of the Internet is remote and free of charge. Most of the security companies that have demolished the old platform and used the new security platform have the same reason: services are often time consuming, and the size of things is irrelevant for a long time. Customers are impatient, and their hearts are already cold for a long time. The slaughter also paid money only because he was a foreigner and he met with security and hatred for the night. 17. Perfect platform subsidiary management functions:
The platform of Shenzhen Security is not only reflected in its powerful function, but also in many details.
(1) Insurance Claims Linkage Record Management Subsystem: Since the insurance claims issue is the life of the project promotion, if the database does not have such an automatic linkage system, then the claims involved will easily result in the customer lacking trust and disassemble the machine, which may lead to the installation of the system. Customer abortion.
(2) User Package Management System: Similar to China Mobile's GSM package, M-Zone, and Shenzhou Line's package management mode. Different users use different terminals. The monthly fee is different, and the Shen'an platform has different users. Package management system.
(3) Installation of work orders and confirmation of the opening of the system: After the system functions similar to the appointment of China Telecom's ADSL telephone, there is a dedicated person on-site installation, and then the dedicated person is responsible for the opening, the platform records are saved, and concurrently a package management system. Prevent users from sending installers and managers without system ERP management.
(4) reminder/pre-paid fee system: The system automatically prompts payment in advance and avoids charges in rural areas.
(5) TTS personalized voice settings: After receiving home alarm homeowners worry anxiously outside, eager to know what the home where the problem is whether the window into the people or the fire, the garage was stolen or the store shutter was bedding, platform There must be clear voice prompts to facilitate the owner to remotely take emergency measures.
(6) Illegal disarming detection time: Measures taken during the specified period of time to guard against theft (7) Management center police read-ahead: The security guard on duty cannot stare at the screen 24 hours a day, once the police trigger, management The center operating the client's speakers will accurately read the alarm situation and issue an alarm sound at the same time. (8) The internal module access, on-site and center interactive intercom: In the case of police intelligence, the center can use intimidation to scare off criminals. , If it is a false alarm, through communication and understanding, to avoid the police waste of energy, this intercom is not the center to pick up the phone to call the user's phone, but the alarm automatically when connected with the center intercom.
(9) Delinquent query: The system has detailed records of the alarm time and processing time after the alarm. Even if it is a false alarm, there are also remarks on the intercom. If there is an on-duty or alarm personnel who are not on-site or after the alarm, the system will not be heard. There is a function that does not answer the police automatically when the time-out is 1 minute. At the same time, there are also interviews with all historical records. Any records that exceed the specified range are displayed in red.
(10) Multiple interfaces, multiple login methods, multiple usage styles, and multiple login channels. Meet users who use a variety of different functional subplatforms. The platform interface LOGO source code can be freely changed to the customer's company name and ID.
(11) The answering phone can be used for simultaneous/cyclical broadcast. The powerful voice module function, for example, the user has 15 calls to answer the police, can be done once the alert situation, the 15 phones ring at the same time. Instead of dialing in turn.
(12) SMS Disarming Notice: Some chain store owners may not go to the shops for a month, but they also want to know whether employees are working normally and whether employees will use the remote control to disarm and enter the shops to guard against theft. He requested that each time the shop disarmed, he would receive a disarming message. Although the shop uses a telephone host for the transmission of the telephone line, the Shenzhen Security Platform can do the same with the SMS cat module.
(13) Level 2 inspections and reverse inspections: At present, most of the product inspections on the market are Level 1 inspections. The Shenzhen Security Group's products have two-stage inspections (including host to accessories), and the platform has front-end hosts. There is also the function of regular reverse inspections, using handshaking protocol to achieve the ultimate inspection.
(14) E-map template design, Shen'an Group provides electronic maps of the region to users in various regions, and at least three levels of electronic maps (cities, counties, towns), electronic maps can be added and modified, such as There are no shops on the site, and users can customize and add. At the same time, they can automatically generate basic space structure maps, allowing them to add custom defense zones twice.
(15) The Shenan Group Ableton Alarm Management Center platform has C/S and B/S structures and other methods.
(16) Dispatch anti-free upload, inspection upload free (17) heartbeat packet protocol, support (18) own interface in GPRS/CDMA1X 2G state and either TCP/IP or 3G network, can be with 110 command center, The BOSS system of the large-scale operator is connected to the account and billing system. (19) Police code customization: The customer can make police code customization and use it for alarm reporting on special occasions. (20) The platform reverses arming and disarming, for example, if It was the master who forgot, and the attendant guarded him.
Outdoor Furniture,PVC Decking ,Composite Wood Decking ,Plastic Decking Boards
Wood Plastic Composite Flooring Co., Ltd. , http://www.china-wpc-decking.com