Analysis: Technical Requirements for the Future Development of China's Security Industry

With the continuous changes in the application requirements of the security market and the advent of the era of security, security products have evolved from the previous simulation era, single-product and small-scale system applications to today's city-level large-scale systems, regardless of the use of the occasion, application range, system scale And the complexity has undergone qualitative changes. The rapid development of this market demand has led to a large number of new technologies being applied to security products and promoting the development of security products.
On the whole, the development of product technology in the security industry has a tendency of digitization, networking, high-definition, integration, specialization, intelligence, standardization, and mobility. At the same time, at the stage of major changes in such technologies, products, and applications, it also poses new challenges to the management of security companies' own markets, products, and technologies. In the traditional sense, video surveillance (CCTV), burglar alarm, and entrance and exit control are several major categories of security products, and they are representative of security product technology development. Since the beginning of 2009, the 'Internet of Things' has rapidly swept the world and is more sought after by the country and companies in China. The security system is a comprehensive application system involving multiple disciplines and multiple technologies. The current hotspot technologies in the industry include:
Image Intelligent Analysis Technology Image intelligent video analysis technology, also called intelligent video technology, is one of the most cutting-edge applications in the field of video surveillance, reflecting the trend of future digital video surveillance systems to become digital, intelligent, and diversified. Image intelligent video analysis is the next important development direction of the surveillance system. There are two problems to be solved: One is to free the security operations personnel from the complicated and boring “eye-screen” task, and the machine completes this part of the work. Real-time intelligent image analysis and active discovery of problems; the other is to quickly search for the desired image in massive video data, that is, fast massive video data search for intelligent image search.
The background of video analytics is very simple. One is when on-duty personnel face hundreds of thousands of cameras and cannot really prevent or intervene when risk arises. Most of them depend on the playback of relevant images afterwards; the second user has value-added services. Requirements, such as statistics on business flow, prevention of plagiarism, etc. The analysis and identification of risk is transferred to a computer or a chip, which frees the operator from the work of the monitor. When the computer finds a problem, an alarm is generated and the operator responds. In general, the operator will miss 90% of the video information after staring at the TV screen wall for more than 10 minutes, so intelligent image analysis is very useful.
Mass storage technology Due to the emergence of large-scale security application systems, users have placed high demands on mass storage of image data, and data centers with hundreds of thousands of T have emerged. Mass storage of video images has special characteristics compared with common application systems, such as dispersion of front-end information points, large amount of transmitted data, high reliability requirements, and large differences in read/write operation. These are the characteristics of large-scale video surveillance systems. . Video surveillance system design usually involves DAS, NAS, SAN and other large-capacity storage technologies.
Adaptive multi-stream transmission technology Network multimedia communication has gradually become a convenient and concise technique for people's life, work, and other applications. Network audio and video data has a larger amount of data than traditional information (such as text, pictures, etc.), and network transmission may be unstable due to network hardware or other factors. In order to ensure real-time and reliable data transmission, based on the experience of long-distance pronunciation and video communication, a real-time and reliable transmission method that combines data from acquisition, encoding, decoding, and network transmission is adopted, which is called adaptive multi-streaming. Transmission technology.
Currently, there are numerous technical software applications for audio and video media on the Internet, such as QQ video chat, MSN video conferencing, Windows Media streaming media publishing, and Flash streaming network audio and video plug-ins. It is precisely because audio and video media give people an intuitive sense of information, it can be predicted that in the future network information dissemination, audio and video data will account for a large proportion. Audio and video information is different from other media information, and has the characteristics of real-time and fault-tolerance. Therefore, the non-connection-oriented UDP/IP protocol becomes the first choice in network transmission. However, due to the inherent unreliability of the UDP/IP protocol and the limitations of current network communication conditions, audio and video are not synchronized, video is not smooth, video display, and audio noise (such as regular 'beep') often occurs in practical applications. To solve these problems, the application of multi-streaming combined with network buffering and adaptive negative feedback adjustment can basically solve the above problems, including smoother transmission of audio and video data over a 64 kb/s modem with poor network conditions.
Human biometric identification technology The biometric identification technology is a technology that collects and processes the intrinsic physical or behavioral characteristics of the human body through a computer, thereby performing personal identification. At present, the biological characteristics studied and used include the natural physiological features such as face, iris, retina, fingerprints, palm lines, and hand shape, as well as behavior characteristics such as speech, signature, and gait. The biometric identity authentication technology contains two aspects of identity verification and identification. The identity verification is to determine whether the user is the person he claims. The identity identification is to determine whether the user is the target person. The two are in the implementation method and the authentication system. There are great differences in complexity.
In the broad sense of the Internet of Things, the Internet of Things refers to the connection of any item to the Internet through information-sensing devices, and the exchange of information and communications through intelligent communication to achieve intelligent identification, positioning, tracking, monitoring, and management. A network is known as the third information technology revolution after computers and the Internet. The Internet of Things is a supplement to the Internet in terms of things, that is, everything in the world is connected to the Internet, and their data is queried through the Internet, enabling interaction between objects and things and people.
Specific to the security industry, IoT technologies and concepts will also bring about many changes to their development. First of all, 'open' is the general trend. At present, the mainstream solution in the security industry is still dominated by closed-network solutions, which form an 'information island'. One view is that openness means insecurity. Security is the first requirement in the security industry. Therefore, a closed network solution is an inevitable choice and security cannot be open. In fact, openness does not mean insecurity. Nowadays, the Internet has been able to carry various services with high security requirements, such as e-commerce, online banking, and corporate VPN. It can provide users with adequate security on open network architectures through certain technical means. Therefore, safety is only an engineering factor, not an obstacle. On the other hand, the benefits of openness are obvious. The open architecture will attract more enterprises to participate in the security industry chain and promote the rapid development of the industry chain. As a result, open solutions will become mainstream and information islands will become less and less. . In fact, operators launched projects such as China Telecom’s 'Global Eye' and China Unicom’s (600050, stocks’) “Visions”; vendor-driven projects such as Stargate’s StarSight Network and the mutual trust network, etc. They are typical representatives of open security solutions.
Second, 'standardization' will be a major battlefield for security companies in the next five to ten years. To be open, you must standardize. Lack of standards has become a core issue that seriously hinders the development of the security industry and limits the expansion of high-quality companies. The Internet of Things is precisely a great opportunity to promote the security industry to standardize. Prospective companies in the industry will participate in the standardization process of security equipment access to the Internet of Things, and strive to occupy a favorable position; do not attach importance to standardized enterprises, its market share will gradually shrink.
Finally, wireless will gradually replace cable. With the promotion of the Internet of Things, WSN technology and 3G networks will become more and more mature, and the cost of single nodes will become lower and lower. In this context, various security devices using WSN or 3G will gradually replace traditional wired devices. For example, erecting a camera in the field is a very complicated project in the past. Now, with a 3G network camera, it becomes extremely convenient and easy to use.
The camera in the video surveillance is the perception of the image sensor. This is also a typical application of the Internet of Things. If we can also implement the embedded intelligent identification technology, video surveillance is the main application line of the Internet of Things in security. Recently, a series of high-definition network cameras and smart monitoring products launched by Hikvision (002415) have been digitalized and intelligentized, further enriching the content of the Internet of Things in security applications.
The Internet of Things is finally connected to the Internet through perception and ultimately to a comprehensive data application. At this point, data becomes the subject. Data and intelligence are closely related. The deeper the calculation and application of data, the higher the degree of intelligence, and the most direct feelings for users, such as the intelligent recognition of images and the trajectory of objects. Automatic monitoring and so on. Therefore, intelligence will become the core of every security company that we should pay attention to for a long time in the future. Whoever can grasp the intelligent application in the Internet of Things era will be able to gain broad development prospects in the security industry. Who can Based on the intension of smart service injection, the influence of who is in this industry will be greater. The Internet of Things makes security companies more and more like Internet companies. Companies that stand out in this transformation will have excellent genes in both the security and Internet industries. Using Internet thinking to do security, this is also a new challenge for talent in the security industry.
Release Date:2012/3/21 9:58:49

Stamping

Gate Valve Handwheel,Handwheel for Valve,Valve Handwheel

New Densen Casting And Forging I & E Co., Ltd. , http://www.yassiancast.com