Korea infra Co., Ltd.

SEECLID ST

SEECLID ST

  1. Personal video information leakage and misuse internal control system
  2. In order to monitor CCTV video information for personal misuse, it is necessary to create and manage an operation log in a CCTV video system(CCTV, NVR, VMS)
  3. Insufficient management of operation log in most CCTV video systems
  4. SEEDLID ST is omnidirectional operation that does not depend on CCTV video system - LOG creation, management, analysis, and control
  5. Main screen
  6. Real-time analysis of video information misuse and status to detect risks in advance of video information misuse
  7. Analysis status of specific cameras, analysis of TOP5 misuse & abuse, analysis of abusing trend, abuse status by time
  8. Product Features
  9. Create video log
    • Creation of log operation for each equipment of CCTV video system(CCTV,NVR,VMS)
    • Creation of log operation for operation, storage, deletion, and provision of video data
  10. Rule Engine
    •Rule engine that can detect violation of regulations for the video information internal control system
    •Ruleset’s easy to apply new, edit, and delete functions
    •Violation of regulations and risk ratings according to the define Rule Set are displayed on the dashboard in real time
  11. Create direct camera connection log
    •Create a PTZ access LOG by directly connecting to an IP camera
  12. Differences from existing product
  13. Compared Features Our product Third-party products Details
    Video Equipment Operation Log Creation O X  
    Third-party products rely on VMS-generated logs, in most VMS misuse analysis is impossible since it only generate simple log
     
    IP Camera Direct Access Log Creation O X  
    Since it is possible to operate the camera by directly connecting to the IP camera, it is necessary to generate an operation log for this, and third-party products do not have a log generation function.
     
    Ruleset Management by Rule Engine O X  
    Third-party products can only show simple Ruleset
     
  14. Expected Effects
  15. • Compliance with Personal Information Protection Act
    • Compliance with Enforcement Decree of the Personal Information Protection Act
    • Compliance with the measures to secure personal video information safety
    • Compliance with public institution video information processing equipment installation & operation guidelines