Talking about the development and trend of security technology

At present, information technology has entered the stage of breakthrough in cloud computing, big data, Internet applications and mobile internet interaction technology through the era of computer Internet. It clearly demonstrates the basic characteristics of the new generation of information technology openness, integration, product softening and service. Trends have created new ideas such as human intelligence to participate in sustainable innovation and service-oriented top-level design. It is obvious to all. Since the beginning of this century, under the guidance of information technology, after only a short period of more than ten years, security technology has made rapid progress and qualitative changes have taken place. This process embodies the essence of security technology as information technology. It promotes the integration of security, information technology and automation technology, and realizes the integration of security and other social management automation systems in the operational field. Security industry chain, product line, technology product form, system architecture, and function and application models have undergone tremendous changes. It can be said that the development of technology plays a major role in promoting the security industry.
First, the three stages and characteristics of the technological history of the security industry
At the moment, there is a saying in the security industry that old experts are ignorant of the new system. Now many old experts go to see some new security system construction, and find that the previously familiar equipment can't be found, and there are not many familiar technologies. The industry changes are overwhelming. The huge changes in the security industry usually divide it into three phases, which in turn accompany or support the three major practical activities of the security industry.
1. In the first stage, the industry calls it “three-way”, which is digital, intelligent and networked. At the beginning of this century, driven by high-definition television, the security industry began the process of “three-oriented”, and the core is digital. It should be emphasized that digitization is not simply a coded transmission of analog signals. It is a basic feature of the 21st century. It reflects a sublimation of human understanding and expression of objective things. As we all know, the original use of electrical signal simulation to represent objective things, using the strength and frequency of electrical signals to simulate and express the size of the sound and the level of the tone. We decompose an image or a spatial scene into an infinite number of points, called a pixel, and then use a point-by-point electrical signal to simulate the brightness of this point. This is the analog signal. At the time, the analog system did a good job of this way, and it could also be a very real and meticulous representation of the objective world that was recognized or understood.
But when people still want to understand, understand and express objective things in more detail, they find that the cost it requires is too large, the bandwidth required in technology is too wide, and the ability is limited. So people began to change the past point-by-point, time-by-time simulations and imitations, and began to analyze some rules of the objective world change between each point and every moment, which led to the concept of incremental coding. This concept actually reveals the principle of image compression. In the process of sublimation of such a concept, digital systems, especially electronic products and electronic technologies of digital compression systems, have been produced. It can be said that digital television has produced high-definition televisions, and ultra-high-definition televisions will be produced in the future, and now there are already 4K.
Digitalization is the premise of networking and intelligence. “Sanhua” has been applied and practiced in the construction of safe cities, mainly in the beginning of the application of a large number of digital video equipment. The main one is the digital hard disk recorder, which is used to realize the storage of digital video, replacing the original analog tape recording system, and using the DVR device as a network node function to realize an analog and digital hybrid mode. That is to say, the analog signal is sent to the video recorder, converted into a digital signal and stored, and then transmitted to the far end through the network port of the DVR, which is a hot digital mode hybrid mode at that time. In this process, the concept of intelligence was also mentioned, but at that time, intelligent understanding or definition was defined as a coordinated interaction from the perspective of automation. At that time, when I went to detect or evaluate a system, I often cut the image, which means that when there is an alarm signal, I hope it can pop up the corresponding image. This is the understanding and definition of the intelligence at that time.
At the same time, networked has also had a preliminary application at that stage. Networking is the conversion of analog signals into digital signals via a video server and then transmission over the information network. However, in the construction of safe cities, in the early days of “three-oriented”, most of the security systems were still simulated, and the data flow inside the system was still an analog signal.
2. The second stage of security technology refinement, called IT, also known as "new three" plus HD. Why is it called "new three"? This mainly means giving new meaning and definition to digitization, networking and intelligence at this stage. Moreover, at this stage, since the network has become a mainstream mode of the video surveillance construction system and the security system, a large number of high-definition devices have been adopted. In addition, a very important product appeared at this stage: IPC, which is a network camera, and HD camera is also a kind of IPC. At this point, the industry began to re-clarify or define the concept of intelligent monitoring. The first proposed intelligent monitoring means that image information can be interpreted by the machine or automatically interpreted. Before this, the information of the monitoring system and the security system should be converted into a visual information, which is interpreted by the human eye, which is called visual interpretation or manual interpretation. To be intelligent, the real system should actually make the system or machine smart enough to explain and understand the information, which further deepens the intelligent definition. ITization actually fully reflects the basic characteristics of information technology, and it is an important stage in the process of information technology of security technology. Information technology has the following four basic characteristics:
(1) Open. It implements system interconnection, interoperability and data exchange through hardware compatibility and software open source. Such a system can integrate and configure resources and become a service-oriented technology support platform through convergence technology. The traditional system is just a resource management system. Why is it a resource management system? For example, a system can carry 100 or 1000 cameras, and this system can only manage 100 or 1000 cameras. Now the open system can integrate all the system resources that can be interconnected and interoperated with the system. For example, the Xueliang project and the urban security dynamic monitoring system that are currently being built will integrate many social resources. This is the difference between resource management and resource integration.
(2) Convergence. Integration is actually a general trend in the development of science and technology. Technology convergence, especially the fusion of data, is a true integration. But in the past, everyone's understanding of integration was to combine various devices to achieve coordinated interaction. In the center of a system, you will find that the alarm controller, portal management server and other equipment connected to it are like a salad dish, and put a variety of vegetables on a plate to mix, which is the concept of integration at that time. Fusion is the integration of the systems and the integration of them. So what is the commonality? The first commonality is digitization. Only when the various data streams or all kinds of information in the system can be transmitted in the same network, this is a true integration when processing in the same server and in the same platform. Integration has a new definition under the concept of convergence. Technology integration will generate new technologies and new products. System integration will create new models, new applications and new formats.
(3) Softening. Softening means that the system is getting softer and thinner. It changes the system in which the original system is composed of special equipment. For example, in the previous TV monitoring and alarm system, all the equipment inside it was designed for monitoring and alarming, and it was a special product, and realized its professional service in the combination of these special products. The result of softening means that specialized services can be implemented through software on a common platform. This software is a very broad field from operation to application, or called middleware, which plays an important role in it. This is softening.
(4) Service. The service can realize the intelligence of the system through the participation of human wisdom. An application system can achieve self-generation, autonomous expansion, and free upgrade when it meets the above three characteristics. And as the business expands and deepens, new value-added features can be continuously generated. It should be emphasized that the service mentioned here is not the after-sales service in the traditional sense, not the concept of after-sales maintenance and warranty.
3. The third stage is a wonderful stage in the development of security technology. It is in the process of being clouded. Cloud is the basic form of the new generation of information foundation, then the first major performance of security cloudization is system cloud. A cloud or cloud architecture is a reasonable, concise, and secure architecture. Why is it simple? There used to be a system with many levels, and the cloud architecture is the cloud and end structure. A small device camera, an alarm sensor is a terminal, a large center with a myriad of devices and a large number of displays is also an end. In fact, the cloud system is also composed of physical devices, but it can also be seen and touched, but these physical devices may be distributed configuration. Moreover, the distributed system of these configurations becomes a large number of computing units through the virtualization process, and everyone calls it a virtual machine. These huge tens of thousands of virtual machines can provide calculations for one task at a time, or they can handle different tasks individually. Then every user does not know, in fact, it does not need to know, this is the mystery of the cloud. Therefore, the cloud of security systems is a trend. In fact, the structure of the information system at the beginning was like this, but at that time there was no such idea as mentioning the cloud, because the cloud system was not yet in the stage of social service.
The second performance is the cloud of the product. Cloud products and end products are different. The difference is that cloud products can get services from the cloud and generate new functions, while the end products are a dedicated product, while the cloud products are products and devices made up of a common product plus software. There is a very popular saying here, called software-defined technology and products. So what is software-defined technology and products? Everyone knows that cameras come in a variety of forms, such as human faces, license plates, general monitoring, and foggy, wide dynamic. Some of these devices usually have dedicated cameras to meet specific needs. In the new technology environment, the camera can be photoelectrically converted, generate image information, turn it into a universal product, and realize it by a variety of application software loaded with it, which can satisfy face recognition and license plate recognition. The requirements for fogging or wide dynamics are software-defined technologies and products.
Second, the analysis of the application and development of security technology
The above content can be embodied in engineering practice or performance in system design from the following four aspects.
1. Top-level design architecture. Architecture is also the network, but also the emerging architecture, but it is network connection, IP connection, packet exchange, which is the difference. In the network structure, the cloud architecture is better. Only the cloud architecture can realize system autonomous generation, independent growth, free expansion, free upgrade, and continuously generate value-added services and functions as the business expands and deepens. In this process, we must remind everyone that we must build a true cloud and use the cloud. Nowadays, many systems talk about cloud platforms, cloud systems, video clouds, government clouds, security clouds, civil clouds and other applications. It can be said that especially in the past few years ago, fake clouds dominated, but now there are real clouds. But now there is another phenomenon. Someone builds a real cloud and fakes it. How can the real cloud be used? It is often because of the emphasis on the security of the system that this cloud system is not open and service-oriented, which locks the core value of the cloud. This is called true cloud fake use. So why do you want to build a top-level architecture? Because the top-level design is a service-oriented design method, it is a design method of the information system. It is a program that starts from the top down and builds the system architecture, so it is called the top-level design. Traditional design is feature-oriented and is a combination of equipment and technology from the bottom up. Some people understand top-level design as a leader's design, or a high-level design, which is not true.
2. Data mining is the goal. This goal does not refer to the goal of system design, but refers to the goal that designers and builders must pursue in terms of technology. Take big data as an example to illustrate such a process. This actually requires a correct and profound understanding of the connotation of technology, rather than flowing through concepts and flowing on the surface. To build something, strive to achieve its core value, rather than gain some superficial benefits. Taking big data as an example, the data source is usually structured. This structured processing is a special term. Many data sources belong to structured data, and it has to undergo such a process. But there is still a lot of unstructured data, and in fact it can't be structured. The data source is processed accordingly, and it is stored. The stored location or stored function is called a database. The database can complete the query, retrieval and data mining. Therefore, the service chain or value chain of a data consists of three levels of storage, retrieval and mining, which can help save the data, help to retrieve, and help to do the data. Digging. The core value of these three levels is data mining. Why do you say that? Searching is to find out the surface value of individual information from a large amount of data, and mining is to treat all data together, and to find trend and predictive information from their common information, this is real big data, it is really big. The core value of the data. Nowadays, most systems build a big data and stay at the second level. They are fast, accurate, and rarely do data mining. For example, what is the core value of the Internet of Things? The core value of the early IoT was the interaction of things and objects, which is different from its usual RFID system, indicating its intelligence. Now the core value of the Internet of Things is big data systems, so now when it comes to the Internet of Things, the key is how to implement big data applications through the system.
3. Innovation highlights in the scene. A scenario is an external environment for technical applications. It is an external condition of the essential capabilities of experimental technology, or an environment in which technology can adapt. The fewer the limiting factors, the better the practicality of the technology. Environmental factors are an important factor limiting the application of technology and affecting the application effect. Therefore, when designing and applying intelligent systems, a slightly restricted environment is required. This tells us how to make the application of these new technologies innovative and bright, and where to focus.
So where is the focus? Everyone is going to solve the calculations and algorithms. In fact, this is not something that engineering companies can do. Even many domestic developers claim to have software with independent intellectual property rights. In fact, their composition of core algorithms and the entire computing power are also from abroad. Moved in. So create or choose a scenario that will realize the core value of the new technology and put it at the heart of innovation.
4. Artificial intelligence determines the effectiveness. Deep learning leads to the explosion of artificial intelligence. Many problems can be solved by using artificial intelligence, but the meaning of artificial intelligence technology must be correctly or accurately understood. The limit that can be realized and the scene environment it needs to apply, many things Not as omnipotent as propaganda. Therefore, we must return to the original intention of artificial intelligence as a basic technology of security systems or automation systems. Through this technology, the autonomy of the system function, the accuracy and efficiency of the action, and the intelligent level of decision-making are improved. To put it bluntly, the original definition of artificial intelligence is to make the system smarter or smarter.
The above process and content, as well as an important issue can be reflected or expressed. This means that the basic technology that supports security now, or the core technology has changed. The basic technologies of traditional security are sensing, feature recognition and video. Now, the basic technologies supporting security are cloud, big data, Internet of Things and artificial intelligence, which are juxtaposed as a symbol of next-generation information technology.
But in reality they are concepts at different levels. Cloud is a concept of resource allocation, which is the product of system architecture and pattern innovation; big data and Internet of Things are actually applications that are implemented or implemented in the cloud environment; and artificial intelligence is a basic supporting technology for the above system applications. They are different levels of things. However, people now find that the boundaries between them seem to be getting more and more blurred. The concept of hierarchy, or the difference between them seems to be more and more blurred, becoming a symbiotic and complementary relationship. Cloud said that big data and the Internet of Things are the services I provide. The Internet of Things says that I have adopted a cloud architecture. Artificial intelligence is more about me. Big data is symbiotic and highly coupled. The so-called deep learning is a typical big data application. In fact, many data analysis and decision-making methods in big data use artificial intelligence, so they seem to be merged together. This is indeed the case. This is the inevitable trend of technological development. Under such a trend, security technology has also begun to integrate with information technology, automation technology, and public affairs management systems. (Author: Zhong Male)

Hygroscopic Agent

Hygroscopic Agent,Hygroscopic Agent Masterbatch For Rubber,Hygroscopic Agent Calcium Oxide,Rubber Hygroscopic Agent ,Hygroscopic Agent Colloidal Particles

GuangDong DuBa New Material Technology Co.,LTD , https://www.gddubachem.com