Security Integrated Platform Technology Foundation
The systems currently widely used in the security industry include the following major categories: video surveillance subsystems; alarm defense subsystems; access guard patrol subsystems; voice intercom subsystems; audio-visual broadcasting subsystems; intelligent analysis subsystems; Prevention subsystem; positioning tracking subsystem; dynamic environment monitoring subsystem.
For the above different types of security subsystems, the integration technology is diversified. Divided from the integrated communication technology, it can be divided into two categories: local integration and network integration. Typical examples of local integration are: Monitoring the LED screen of the command center. When the bank monitoring center receives a networked alarm signal, alarm information such as the location and type of the alarm and the contact information of the responsible person is displayed on the LED screen, which can greatly improve the alertness. Processing speed. Because geographically close to the platform server, and LED screen controller devices mostly use serial communication; network integration is mostly using the mainstream TCP / IP communication protocol for communication, with no geographical restrictions, low transmission costs and other advantages, the most widely used Such as: alarm, access control, voice intercom and other systems are widely used network integration.
Divided from the integrated technology used, it can be divided into three categories: device protocol, SDK interface, and database integration.
The device agreement can be further subdivided into proprietary proprietary protocols and industry standard protocols. In the field of video surveillance, the industry standard protocol represented by ONVIF has gradually been accepted by the market. Whether the platform is compatible with the standard protocol is an important indicator of the openness of the platform. The use of public protocols can also avoid the problem of compatibility between the platform and the manufacturer. From the user's point of view, it is generally expected that an industry-standard agreement can be adopted. In the fields of alarm, access control, intercom, etc., there is no industry norm. This is an objective reason. Because these systems do not require large-scale networking after the project was completed in the early stages of the project, they are building a complete system independently based on the customer's organizational unit. In this case, the integration platform can only be networked through private protocols. With the increasing importance of networking platforms, when the market appears influential platform manufacturers, the platform manufacturers to determine the agreement or interface will become another trend, which will be explained below.
When the device protocol is very complex and contains a lot of content and communication data, in order to reduce the complexity of programming development of the integrated platform, the manufacturer has once packaged the protocol to form the SDK. At the same time, another benefit is that the developer does not Then you need to care about any device details, just call the SDK interface to complete the corresponding function.
The third type of database integration is another form of integrated platform technology that applies to those who only need to obtain system state, data integration, typical access control system integration. The integrated content of the access control system removes users, rights allocation, etc., 90% of the daily time only needs to pay attention to open-door linkage video pop-up, door open warning, open-door record query and other status information. And many network access control systems can only support single connection. The platform is the best way to integrate information through database integration.
Security Integrated Platform Application Framework
The integration of the security system is not a goal. The purpose is to form a unified human-computer interaction mode for the user through a comprehensive security integration platform, and realize the management effect of 1+1>2. Therefore, after solving the technical problems, it is more necessary to consider the design framework and the application of the upper layer.
The security platform provides multi-service management and operation and maintenance services to meet static business requirements. However, a good platform must also have a good design architecture to adapt to the user's evolving business needs. The service-oriented SOA system architecture is a relatively mature technology and an important reference factor for measuring the advanced nature of today's system architecture. The use of an SOA-based integrated platform to achieve system robustness and feature richness while maintaining loose coupling between functional modules and high cohesion within the module can make the integration platform more flexible to quickly adapt to changing environments and become increasingly complex. System requirements. The SOA-based platform also separates the basic platform from the business development, and enables modern and popular commercial cooperation models such as application software outsourcing and application development partner programs to become possible and efficient, so that companies familiar with business development and companies familiar with the technology platform can Form mutual cooperation and learn from each other. Associated with the complex diversity of business is the flexibility of the process. The IT industry provides advanced security solutions for the security industry. Today's IT security is also a major technology trend. This technology trend must first appear in the platform software innovation. on. The workflow engine technology, which was originally widely used in ERP systems, was introduced to the integrated platform's alarm management and business process customization applications, which will greatly enhance the platform's business process customization capabilities.
The security integration platform integrates and manages the various subsystems to realize the four basic functions of “monitoring, control, investigation, and managementâ€. “Supervisor†refers to the integrated platform adopting the streaming media forwarding technology, which not only realizes unified centralized monitoring of multiple sites and multiple devices. , But also for multiple users to request the same video only occupy one network transmission bandwidth, but also for the video on the wall polling, alarm linkage video, and other system video linkage to provide a unified data source. "Control" refers to the user of the integrated platform, in addition to passively accepting data uploaded by each system, it must also satisfy the ability to interact with the front-end systems. For example, in the financial industry, the treasury long-distance warehouse keeping service, the integrated platform of the monitoring center not only realizes remote monitoring of video images and remotely receives alarm signals, but also implements remote control of the vault access control through the voice system, including access control switches and emergency plans. Linkage control. “Cha†means that the integrated platform must facilitate the query and review of the system state, and the user quickly and accurately understand the state of the relevant system in the relevant place and present it in a graph, report, etc. in a friendly manner. The integrated platform's video query function, equipment inspection function, record query and statistics functions are the specific applications of “checkâ€. "Management" refers to the system's management capabilities, including the ability to manage various security subsystems, as well as the management capabilities of the integration platform itself. The former is like device remote configuration, device network management, and networked device automatic calibration. The latter is like the distributed deployment of function services, automatic system protection, system operation logs, etc., which are the specific application forms of the management.
The integrated subsystems of the security integration platform are becoming larger and more complex. In order for the system to be able to achieve the above functions stably, there must be an independent operation and maintenance management module. The large integrated platform often refers to the telecommunication system architecture and adopts the operation and maintenance management service to realize the “alarm and police†function of all networked systems. This includes the systematic management of tangible assets such as equipment and assets, and systematic management of intangible assets such as data and drawings. Including asset input, troubleshooting, equipment warranty, processing log records and other asset maintenance work and operational status monitoring, equipment retirement reminder and classification statistics.
The greatest significance of the security integrated platform construction lies in the emergency command function. The emergency command not only refers to the rapid processing after the occurrence of the police situation, but also includes four aspects of “preliminary, fast, pass, and adjustmentâ€, and as a modern technology and defense system, more emphasis on “pre-†The role. The system captures various types of early warning information, and reminds on-duty personnel attention by linking videos on the video wall, automatic voice prompting, and electronic map flashing. This can prevent accidents and effectively protect personal and social and economic security. Such as the use of graphic image intelligence analysis technology, to achieve a specific scene of behavior analysis, number of statistics and many other features, the use of RFID technology, object tracking tracking system, can achieve the focus of monitoring the scope of activities of the object monitoring and playback of the trajectory. When the command center receives the warning signal, after verification by the on-duty personnel, it can quickly call and comprehensively apply all kinds of air defense, technical defense, and physical defense measures.
Future Trends 1. Integration with Business Applications
The current security integration platform is basically built around system integration. The main objectives of the design are that each system can communicate data, interact with each other, and manage in a unified manner. One of the future development trends is to integrate more with the business. For example, the alarm monitoring network system in the financial industry, the realization of alarm, monitoring and networking, and the traditional integrated management function of access control and intercom related video are just a foundation, and the future-oriented system. It will further integrate such functions as teller supervision and remote authorization into existing systems. Through digital high-definition transformation of business outlets, and through electronic amplification and data sampling technologies, this integrated solution for business applications will be a Improve the level of information management and operational efficiency, while reducing economic costs.
2, data statistics, data mining
After the large-scale networking of the system, the construction of the entire technical defense system will shift from local defense and deterrence strategies to prevention and early warning strategies. The integrated networking platform collects a large number of alarm signals and other data through a large number of networked sensing devices. The Pareto 80/20 efficiency rule tells us that 80% of the problems are in 20% of the prevention goals, through further data mining, The data analysis technology can discover the regular information in the technical protection system, find the 20% prevention focus, and can effectively improve the system's security protection level.
3, technological innovation leads the future
Technological innovation is the primary productive force. The progress of security technology cannot be separated from the development of technological innovation. In the future, technological innovation will increase the level of security at a faster pace and in more diversified forms. The electronic industry touch technology, four-dimensional image acquisition and display technology are evolving at a rapid pace, and soon integrated application display, four-dimensional scene display, and soft fusion control center solutions centered on touch-enabled electronic sandboxes are likely to be applied to integration. Platform technology, the ultimate customer will be the biggest beneficiary.
The systems currently widely used in the security industry include the following major categories: video surveillance subsystems; alarm defense subsystems; access guard patrol subsystems; voice intercom subsystems; audio-visual broadcasting subsystems; intelligent analysis subsystems; Prevention subsystem; positioning tracking subsystem; dynamic environment monitoring subsystem.
For the above different types of security subsystems, the integration technology is diversified. Divided from the integrated communication technology, it can be divided into two categories: local integration and network integration. Typical examples of local integration are: Monitoring the LED screen of the command center. When the bank monitoring center receives a networked alarm signal, alarm information such as the location and type of the alarm and the contact information of the responsible person is displayed on the LED screen, which can greatly improve the alertness. Processing speed. Because geographically close to the platform server, and LED screen controller devices mostly use serial communication; network integration is mostly using the mainstream TCP / IP communication protocol for communication, with no geographical restrictions, low transmission costs and other advantages, the most widely used Such as: alarm, access control, voice intercom and other systems are widely used network integration.
Divided from the integrated technology used, it can be divided into three categories: device protocol, SDK interface, and database integration.
The device agreement can be further subdivided into proprietary proprietary protocols and industry standard protocols. In the field of video surveillance, the industry standard protocol represented by ONVIF has gradually been accepted by the market. Whether the platform is compatible with the standard protocol is an important indicator of the openness of the platform. The use of public protocols can also avoid the problem of compatibility between the platform and the manufacturer. From the user's point of view, it is generally expected that an industry-standard agreement can be adopted. In the fields of alarm, access control, intercom, etc., there is no industry norm. This is an objective reason. Because these systems do not require large-scale networking after the project was completed in the early stages of the project, they are building a complete system independently based on the customer's organizational unit. In this case, the integration platform can only be networked through private protocols. With the increasing importance of networking platforms, when the market appears influential platform manufacturers, the platform manufacturers to determine the agreement or interface will become another trend, which will be explained below.
When the device protocol is very complex and contains a lot of content and communication data, in order to reduce the complexity of programming development of the integrated platform, the manufacturer has once packaged the protocol to form the SDK. At the same time, another benefit is that the developer does not Then you need to care about any device details, just call the SDK interface to complete the corresponding function.
The third type of database integration is another form of integrated platform technology that applies to those who only need to obtain system state, data integration, typical access control system integration. The integrated content of the access control system removes users, rights allocation, etc., 90% of the daily time only needs to pay attention to open-door linkage video pop-up, door open warning, open-door record query and other status information. And many network access control systems can only support single connection. The platform is the best way to integrate information through database integration.
Security Integrated Platform Application Framework
The integration of the security system is not a goal. The purpose is to form a unified human-computer interaction mode for the user through a comprehensive security integration platform, and realize the management effect of 1+1>2. Therefore, after solving the technical problems, it is more necessary to consider the design framework and the application of the upper layer.
The security platform provides multi-service management and operation and maintenance services to meet static business requirements. However, a good platform must also have a good design architecture to adapt to the user's evolving business needs. The service-oriented SOA system architecture is a relatively mature technology and an important reference factor for measuring the advanced nature of today's system architecture. The use of an SOA-based integrated platform to achieve system robustness and feature richness while maintaining loose coupling between functional modules and high cohesion within the module can make the integration platform more flexible to quickly adapt to changing environments and become increasingly complex. System requirements. The SOA-based platform also separates the basic platform from the business development, and enables modern and popular commercial cooperation models such as application software outsourcing and application development partner programs to become possible and efficient, so that companies familiar with business development and companies familiar with the technology platform can Form mutual cooperation and learn from each other. Associated with the complex diversity of business is the flexibility of the process. The IT industry provides advanced security solutions for the security industry. Today's IT security is also a major technology trend. This technology trend must first appear in the platform software innovation. on. The workflow engine technology, which was originally widely used in ERP systems, was introduced to the integrated platform's alarm management and business process customization applications, which will greatly enhance the platform's business process customization capabilities.
The security integration platform integrates and manages the various subsystems to realize the four basic functions of “monitoring, control, investigation, and managementâ€. “Supervisor†refers to the integrated platform adopting the streaming media forwarding technology, which not only realizes unified centralized monitoring of multiple sites and multiple devices. , But also for multiple users to request the same video only occupy one network transmission bandwidth, but also for the video on the wall polling, alarm linkage video, and other system video linkage to provide a unified data source. "Control" refers to the user of the integrated platform, in addition to passively accepting data uploaded by each system, it must also satisfy the ability to interact with the front-end systems. For example, in the financial industry, the treasury long-distance warehouse keeping service, the integrated platform of the monitoring center not only realizes remote monitoring of video images and remotely receives alarm signals, but also implements remote control of the vault access control through the voice system, including access control switches and emergency plans. Linkage control. “Cha†means that the integrated platform must facilitate the query and review of the system state, and the user quickly and accurately understand the state of the relevant system in the relevant place and present it in a graph, report, etc. in a friendly manner. The integrated platform's video query function, equipment inspection function, record query and statistics functions are the specific applications of “checkâ€. "Management" refers to the system's management capabilities, including the ability to manage various security subsystems, as well as the management capabilities of the integration platform itself. The former is like device remote configuration, device network management, and networked device automatic calibration. The latter is like the distributed deployment of function services, automatic system protection, system operation logs, etc., which are the specific application forms of the management.
The integrated subsystems of the security integration platform are becoming larger and more complex. In order for the system to be able to achieve the above functions stably, there must be an independent operation and maintenance management module. The large integrated platform often refers to the telecommunication system architecture and adopts the operation and maintenance management service to realize the “alarm and police†function of all networked systems. This includes the systematic management of tangible assets such as equipment and assets, and systematic management of intangible assets such as data and drawings. Including asset input, troubleshooting, equipment warranty, processing log records and other asset maintenance work and operational status monitoring, equipment retirement reminder and classification statistics.
The greatest significance of the security integrated platform construction lies in the emergency command function. The emergency command not only refers to the rapid processing after the occurrence of the police situation, but also includes four aspects of “preliminary, fast, pass, and adjustmentâ€, and as a modern technology and defense system, more emphasis on “pre-†The role. The system captures various types of early warning information, and reminds on-duty personnel attention by linking videos on the video wall, automatic voice prompting, and electronic map flashing. This can prevent accidents and effectively protect personal and social and economic security. Such as the use of graphic image intelligence analysis technology, to achieve a specific scene of behavior analysis, number of statistics and many other features, the use of RFID technology, object tracking tracking system, can achieve the focus of monitoring the scope of activities of the object monitoring and playback of the trajectory. When the command center receives the warning signal, after verification by the on-duty personnel, it can quickly call and comprehensively apply all kinds of air defense, technical defense, and physical defense measures.
Future Trends 1. Integration with Business Applications
The current security integration platform is basically built around system integration. The main objectives of the design are that each system can communicate data, interact with each other, and manage in a unified manner. One of the future development trends is to integrate more with the business. For example, the alarm monitoring network system in the financial industry, the realization of alarm, monitoring and networking, and the traditional integrated management function of access control and intercom related video are just a foundation, and the future-oriented system. It will further integrate such functions as teller supervision and remote authorization into existing systems. Through digital high-definition transformation of business outlets, and through electronic amplification and data sampling technologies, this integrated solution for business applications will be a Improve the level of information management and operational efficiency, while reducing economic costs.
2, data statistics, data mining
After the large-scale networking of the system, the construction of the entire technical defense system will shift from local defense and deterrence strategies to prevention and early warning strategies. The integrated networking platform collects a large number of alarm signals and other data through a large number of networked sensing devices. The Pareto 80/20 efficiency rule tells us that 80% of the problems are in 20% of the prevention goals, through further data mining, The data analysis technology can discover the regular information in the technical protection system, find the 20% prevention focus, and can effectively improve the system's security protection level.
3, technological innovation leads the future
Technological innovation is the primary productive force. The progress of security technology cannot be separated from the development of technological innovation. In the future, technological innovation will increase the level of security at a faster pace and in more diversified forms. The electronic industry touch technology, four-dimensional image acquisition and display technology are evolving at a rapid pace, and soon integrated application display, four-dimensional scene display, and soft fusion control center solutions centered on touch-enabled electronic sandboxes are likely to be applied to integration. Platform technology, the ultimate customer will be the biggest beneficiary.
Basin Faucet,Wall Mounted Taps,Brass Bidet Faucet,Toliet Basin Faucet
Zhejiang minmetals huitong import and export Co., Ltd , https://www.zjminmetals.com