POS / Surveillance Integration Tutorial

Author: Brian Rhodes, Published on Jun 03, 2012

Integrating Point of Sales Systems with video surveillance is critical for many retailers but doing so can be challenging. A number of integration methods exist, each with unique advantages and disadvantages. In this note, we examine the three most common approaches, contrast their advantages and disadvantages, and describe where each method is best used.

Overview

***** ** ***** (***) *******, **** ****** '**** *********', *** ****** ** **** ***** ***** ****** **********. ****** systems ********** *** **** **** **** ******* **** ********* *** calculating ******. *** ******* **** ** ******** '*******' **** ******* net **** ************, ********* ********, *** ******* ********** ********* *** handling ** **** **** ** ******* *** **** ******, *******, or ***** *********.

*********** ***** ************ **** *** *** ****** ** ******, ******* it ******* ***** ** ** ******** **** *** ********'* '*******'. This ***** ** **** ** ******* ******** ****** **** ***** evidence. *** **** **** **** *********** *** ******** *************, ** also *********** ********* **** ******** ** **** ** ****** ******** like '*************'.

***** ****** ******* *** **** ** ********* *** *********** **** the ***** ******:

  • **** *******
  • ***** *** *********
  • *********** *** ***********

** ******** ***** ******* ***** *** ******** *** ********** ***** they *** **** ****.

Text *******:POS data is overlayed on top of the video stream much like time/data stamps are done on cameras. This method is the most basic, because it simply 'injects' an image of register information onto what the camera is recording. Finding unique register events is difficult because the text itself is not searchable; it is a combined part of the video image. Most often, this function is a separate box installed between the DVR, a camera, and the POS station printer/ pole display. Here is an example screenshot of this type of integration:

**** *********/****** ******* ** ******** **** *** ***** ***********, ***** only * *** ********* *** ******* *** **** ****** ************ takes *****. **** ** *** ***** ********* ****** ** ***********, costing **** **** $*** *** ********. ******* *********, ** *** be **** **** *** ********, ********** ** *** ******* *** a ********** *** ******. ** ********, **** ** ***** **** with ****** ******* *** ****** ***** **** ** ** ** easy *** ****** ** ******* **** ** ** *******.

Local *** *********:  **** **** ********, *** **** ** ********* ** *** onsite ******** *** ******** **** *** ***'* ********. *********, **** integration ** **** ** *********** ****** **** *** *** ******. These ******** ***** *** *********** **** *** ***** ** ** seen ****-**-****. ********* *** ******** **** ** ******** ****** **** return ********** *****. **** ***** ** *********** ** **** ******, but ****** ** *** ******** **** ****** '**** *******'. ***** variations ** **** ****** *** ******, **** **** ***** *** providers ********** *** ** **** ** *** *********:

  • ****** ******: * ****** ****** ****** ** **** ** * ******** ******, directly ********** *** *** ****** **** *** *** ******. ******* flows ******** **** *** *** ****** ** *** ***. ******* each ******** **** **** * ****** ****** *********, *** ****** integrations *** ******* **** ***** ** ** *********. **** *** be ******* ** ***** *** **********. ***** ** ** ********** used ******* ** ***** **** **** *******, ** ** ********* disliked.
  • **** ********:*** *** ****** **** * ******** ** ******** ***** **** sniffer ** **** *** **** **** *** ****** ** ******* traffic. *** **** ******* *** ********** ** ****** *********** *** intercepted **** *** *** *** ***. *** ******* ** *** sniffing ******/******** *** ******* ******* ******* ********* *** ************* ** this ******. *********** *** *** ****** ** ************ *********** **** the ***.
  • ****** *********:** **** *****, *** *** ****** *** ******* * ****** side ********** *** ****** * ******* ********** ******* *** *** register *** *** *** ******. *** **** ** ******** ****** into *** *** ********

**** ** * ********** ******* ** **** **** ** ***********:

Centralized *** ***********: The VMS connects to a centralized POS server to download or access transaction data across the retailer. Large retailers having many locations and thousands of POS stations use this method because they need a custom solution and already have infrastructure in place to support it. The resulting integration is often a real-time, searchable database. The full scope of POS is available for this integration rather than simplified 'reciept-only' data. Customer alerts (e.g. Management receives an email each time a cashier hits the 'refund' button.) and exception report integrations (e.g. Video records all large refund transactions) are common.

*****, **** *********** ** * ******** ******** *********** *******, *** the **** *** ****** ***** **** ** ********* ** *******. However, ***** ************ *** ***** ** ***** *** ****** ******** of ********* ** ************ ** **** ****.

Verifying ************ *** *******

***** ****** *** ************* '*******' ***, *** ***** ** ******* can **** ************:

  • ****** ** *** ********* ***** *** **** *** *** **** support *********** **** * *** ** ****. **** **** ** check ** **** *** ****** ** ********** *********.
  • *** ************* *** ******** ***** ** ********* **** *** *******, depending ** *** *** ********. * *** *** **** ******* serial ******* *** *** **** ** *** *** ****** ****** integration **** *******. **** ** * *** ******** **** ***, verify *** **** ** *********** ** ********** *** **** *** complexity ** **********.

Challenges **** ****** *** *******

**********, ***'* ********* *** *** *** ********* **** ***'* ******** PoS ********. ****** **** *********** ****** *** ** ***********. *****, PoS ********* ********* **** ***** ******** * * ******** *** will ********* ****** *** ****** ***********. ********, *** ********* ***** have ***** *** ***/*** ************ ** ***** **** *** **** them ********* ** *** ******* *** ***** *****.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

2Gig Intrusion Megatest (GC2 & GC3 Panels Tested) on Mar 28, 2017
2Gig is one of the most widely used intrusion systems, with two product lines that are the main offering of many alarm companies, huge national...
Burglar Alarm Sirens Guide on Mar 27, 2017
Sirens are used to alert users to an alarm condition. In this note, we examine how to choose, locate, and install alarm sirens, including Siren...
Axis Camera Vulnerabilities From Google Researcher Analyzed on Mar 23, 2017
A Google security researcher has reported 6 vulnerabilities for Axis cameras, affecting multiple models and firmware versions. In this report, we...
OpenEye Takes Aim At Exacq on Mar 23, 2017
First Milestone targeted Exacq with a takeover offer, and now OpenEye is gunning for them with an offer to swap out Exacq for their cloud-managed...
Glass Break Sensor Tutorial on Mar 21, 2017
Burglars often break glass windows to get into a house. Using glass break detectors in conjunction with alarm contacts is a good way to protect the...
VMS Update Automation Compared on Mar 20, 2017
Updating VMS software can be a tedious and time consuming processing, which historically has required users to access each machine, download update...
Alarm Panic Switches Tutorial on Mar 16, 2017
Panic switches allow silently triggering an alarm system when it is otherwise disarmed. In this tutorial we explain and contrast the 7 most common...
Environmental Sensors For Burglar Alarm Tutorials on Mar 15, 2017
Intrusion detection systems can be used to alert users to environmental issues. By connecting sensors that monitor the heat, humidity, and...
Alarm Contacts Tutorial on Mar 07, 2017
Contacts are the devices that tell an alarm panel when an entryway is open or closed. The act of opening or closing an entryway, such as a door or...
Alarm Motion Detector Tutorial on Mar 06, 2017
Sensors designed to detect movement are a good way to protect large, open areas. In this tutorial, we examine motion detectors,...

Most Recent Industry Reports

Chinese Government Spies on Churches With Video Surveillance on Mar 27, 2017
The Chinese government is using video surveillance to spy on churches in China, reports UCANews, explaining: The [Chinese government]...
Burglar Alarm Sirens Guide on Mar 27, 2017
Sirens are used to alert users to an alarm condition. In this note, we examine how to choose, locate, and install alarm sirens, including Siren...
Dahua Distributor Bad Breakup on Mar 27, 2017
A Dahua distributor in Europe claims that Dahua took over his top customers, revoked his distributorship status, and left him with a large amount...
Everbridge Mass Notification Service Examined on Mar 24, 2017
Everbridge is expanding in the security space. In January 2017 Everbridge acquired PSIM platform IDV, and have also begun integrating with other...
Hikvision Removing Auto 'Phone Home' on Mar 24, 2017
Facing pressure over their cameras auto phoning home and their Chinese government ownership, Hikvision has begun quietly removing automatic...
Axis Camera Vulnerabilities From Google Researcher Analyzed on Mar 23, 2017
A Google security researcher has reported 6 vulnerabilities for Axis cameras, affecting multiple models and firmware versions. In this report, we...
OpenEye Takes Aim At Exacq on Mar 23, 2017
First Milestone targeted Exacq with a takeover offer, and now OpenEye is gunning for them with an offer to swap out Exacq for their cloud-managed...
Lock Keyways For Access Control Guide on Mar 23, 2017
Lock keyways can be the difference between a lock working or not. Understanding keyways is important for access control. Indeed, a member recently...
Broken Browser Support for Video Surveillance on Mar 22, 2017
Modern web browsers have left the security industry behind. Current Chrome, Firefox, and Microsoft Edge browsers do not support NPAPI plugins,...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact