INTEGRATED HARDWARE AND SOFTWARE SECURITY COMPLEX «T-REX SKY SECURITY»
The international practice of creating security systems and complexes in especially complicated objects has proven the advantage of integrating separate security systems and means into one complex. Such integration, which is done at the stage of building the software and designing the complex, enables us to:
• considerably increase its information capacity, dependability, speed of information provision to an operator, and decision making;
• computerize the reaction of security means in case of unauthorized entry into the object;
• provide information about the events to all departments and units concerned, taking account for the access hierarchy;
• create unique algorithms of mutual work between different integrated systems of the security complex;
• considerably decrease the purchase price, the installation and maintenance costs of the security means due to the usage of common information transfer lines, of a common energy saving system, of common databases, of common management and display devices;
• create an objective control system over the actions of the object’s security services, recording all remote control and video surveillance operator’s actions.
![]() |
Integrating security systems and means into one complex provides complete informational support of each system’s operation to other systems. For example: the security video surveillance system allows us to:
• identify alarm situations of the perimeter alarm system;
• identify persons that enter the object’s territory with the control and access management system;
• identify vehicles that enter the object’s territory by their license plates;
• control the technological process of aircraft fueling, luggage loading and safeguarding, etc.
![]() |
The integrated security complex «T-Rex Sky Security» is designed to ensure safety in the perimeter and territory of international airports and other especially important objects.
The complex includes the following security systems and means:
• outer physical fencing – welded wire mesh fencing with anti-climb shields enforced by concertina razor wire and anti-digging wire mesh elements of perimeter protection;
• perimeter alarm system of the vibration type T-Rex;
• security system of heat-vision and video monitoring over the object’s perimeter;
• security system of video monitoring over the object’s territory and special control zones;
• security lighting system of the object’s perimeter;
• system that controls and manages the personnel access to the object;
• gateway zones of vehicle inspection and access;
• security system of separate objects in the airport’s or adjusting territory;
• technical means for the inspection of entering vehicles in places not equipped with gateway zones of vehicle access;
• gates with an electromechanical drive (of rolling and swinging types), boom barriers and other facilities that block the passage and are installed on the road base;
• control system of patrol vehicles that move on the patrol road along the object’s perimeter and pass through the entry/exit terminals.
![]() |
The integration of the systems of the complex is performed on a software level as the highest and most effective level of system integration in order to resolve the only issue – ensure the object’s security. Such an integration level is available for a work performer only in case of close partner cooperation with all the suppliers of parts for the complex (the supplier, having the utmost trust in the partner, opens his protocols of informational-logical connection), or in case when the work performer develops his own software for all the systems of the complex.
![]() |
COMPONENTS OF THE COMPUTER APPLIANCE «TSS»
Security system of video control over the status of the object’s perimeter
Designing video surveillance systems, we use the open platform Xprotect – the product of the world famous company Milestone Systems, a powerful video surveillance tool, easy to deal with, reliable and tested on thousands of customer installations in the whole world.
The security video surveillance system on the basis on Xprotect cay be built with cameras of different producers, using different network and server equipment – to the customer’s liking.
The system is designed with regard to the major requirement: thorough surveillance of the whole closed perimeter contour, with the possibility of identifying any alarm information that arises in the perimeter of the object or is obtained from the perimeter security technical means (T-Rex alarm system, control system of patrol vehicles, or control system of patrol wards).
The integration of the video surveillance system with the T-Rex alarm system enables us to use, while applying the video analytics algorithms, the video surveillance system as an independent unit of technical means to detect a trespasser in the object’s perimeter which detection zone begins yet before the perimeter. The identification of an alarm situation with an alarm from the T-Rex system proceeds automatically with displaying the image of the alarm area on the monitor screen of an operator and recording the video information in the database, with reference to the time and the T-Rex alarm signal.
In order to properly identify a trespasser, the distance between the stationary cameras set in the perimeter should be about 50-60 meters. In case of using imaging IR cameras, the distance between them may be as much as 400 meters (depending on the type of the thermal camera lens).
Security system of video surveillance over the object’s territory and special control zones
The security system of video monitoring over the object’s territory and special control zones is designed with the same software and used to ensure video surveillance over separate objects in the airport’s territory or objects located outside the territory in the adjoining area. It can be areas with navigation lights, radio navigation devices, fuel storages, buildings and structures belonging to the airport’s technical or security service, etc.
Should an alarm system be already available on the premises mentioned above, it can be integrated into this system of video surveillance.
A distinctive feature of this system is that its video information can be used by different services of the airport. Its cameras can observe an aircraft in the stand, the technological process of its fueling, luggage loading, repair works being done by the technical personnel, etc.
Cameras placed on high points can also provide informational support to the perimeter surveillance system in case of absence of cut-off angles and shadow zones.
Security system for separate objects in the airport’s or adjusting territory
The advanced option of the T-Rex perimeter alarm system can be used to protect inner objects in the adjusting territory (both from the inner and from the outer side). To achieve this, the data buses must be branched off at the nearest to the object control cabinet. Any signaling device (magnetic contact alarm, infrared alarm, ultrasound alarm, microwave alarm, glass break sensor, etc.) can be connected to the security lines.
An advanced graphic plan of the object with the location of the sensors is added to the special software of the T-Rex system graphic station. During the system installation, the security lines of the system are reprogrammed to work with output contact relays. Information about incurring alarms on a separate object can be sent to both the main system monitor and the separate workplace of an operator responsible for the object’s security. The arming and disarming of the object is done centrally from the operator’s remote control.
Access control and management system
To implement the control and management system of personnel access to the object, our company uses the platform Xprotect – a software product of the world famous company Milestone Systems – as well as equipment from major world producers. The system is designed according to up-to-date requirements and has an entire set of functions to ensure object security.
The integration of this system with other systems of the integrated complex allows us to use the general channels to transfer information to the central remote control, and to identify and search for personnel in the zone under control using the images taken from the access control and management system and the video surveillance algorithms of facial detection.
Gateway zones of vehicle inspection and access
To inspect and control vehicles entering the object’s territory, special gateway zones are designed, which are separated on the outer and inner side of the airport. A gateway zone is equipped with two video cameras that control the entry from the inner and outer side. On the basis of the Milestone Systems software, an electronic database is created – of vehicles that have an access right for entry/exit. The camera images are analyzed to read the vehicle number plates and compare them with those vehicles that have the access right. At the request of the customer, the system can be calibrated to detect the driver of a vehicle.
As a vehicle is entering the gateway zone, the bottom scanner is inspecting its bottom to detect any forbidden items. The image of the bottom is compared with the earlier images of the same vehicle from the database. Should there be no changes in the images, the vehicle is granted access to the zone under control.
Vehicle bottom scanner, boom barriers and road blockers
At vehicle checkpoints that are not equipped with gateway zones, at the request of the customer gates boom barriers, blocking devices, vehicle bottom scanners can be installed on the road base, as well as other equipment necessary to ensure the object security according to the developed concept.
Equipment can be chosen in accordance with a necessary security level, transport intensity and the speed of vehicles at the checkpoint. The operator’s workplace at the checkpoint is equipped on the basis of the same software product as in gateway zones, and is connected with the general database of vehicles.
The vehicle bottom scanner can also be installed in railways to inspect the carriages and the locomotive entering the object.