Introduction, Product overview – Milestone XProtect Transact User Manual

Page 7

Advertising
background image

Milestone XProtect

®

Transact

Administrator's Guide

www.milestonesys.com

7

Introduction

Introduction

Product overview

XProtect Transact is a powerful tool for tracking transactions linked with video recordings of the
transactions taking place.

XProtect Transact is an add-on to Milestone's IP video surveillance solutions XProtect Basis+,
XProtect Professional, XProtect Enterprise and XProtect Corporate. Milestone XProtect XProtect
Transact can combine your digital video monitoring with transaction data from many kinds of
transaction data sources and for many purposes. You get a 1-to-1 correspondence of images to
transactions and the transaction data is time-linked with simultaneous display of transactions and
camera recordings.

Common transaction data sources are PoS (Point of Sale) or ATM (Automated Teller Machine) which
enables you to easy investigate and prove fraud. But actually any transaction data source that you
would like to time-link with digital video monitoring can be combined through XProtect Transact. A few
examples of other transaction data sources and purposes are: number plate recognition for collection
of road taxes, access control for combined visual identification for higher security

—but the only limit is

your imagination. Note, that some solutions might require additional programs and/or customizations.

The examples used in this manual show typical retail situations and transactions data from PoS (Point
of Sale) or ATM (Automated Teller Machine). For these purposes, XProtect Transact speeds up
investigations into fraud by integrating digital video surveillance images with PoS (Point of Sale) or
ATM (Automated Teller Machine) transaction data: 1-to-1 correspondence of images to transactions.
transaction data is time-linked with video images of cash registers/ATMs for simultaneous display of
transactions and camera recordings. Whether the problem is internal or external perpetrators, it is
easy to find suspicious transactions with XProtect Transact's features for searching transactions by
cash register/ATM, camera, data, time or free text.

See also

Viewing transactions (see "View transactions" on page 49)

Interaction with Sources and Surveillance Solutions (on page 7)

Interaction with sources and surveillance solutions

There are several components in the XProtect Transact communication flow. XProtect Transact
consists of a Transact Server and a Transact Database.

The XProtect Transact Server has a service that listens for transactions from sources. Five different
kinds of source exist: Serial ports, TCP clients, TCP XML, Troy boxes and an Analytics XProtect
Transact provider (more types may be available in customized XProtect Transact installations).
Sources, in turn, are connected to the actual devices on which the transaction data is generated (cash
registers, ATMs, etc.).

When the XProtect Transact Server receives transaction data from a source, it stores the data in the
XProtect Transact Database.

Advertising