As the third wave of information industry, the Internet of Things (IoT) technology has become a hot spot for global scientific and technical personnel and government policy departments in recent years. Related industry research and academic exchanges are in full swing. From "Smart Earth" to "Perceive China", all countries are actively deploying the Internet of Things (IoT) industry and trying to grasp the strategic opportunity of Internet of Things (IoT) to promote industry upgrading. Since Premier Wen Jiabao inspected Wuxi in August 2009 and put forward “Perceive China†to this year's government work report, he proposed to speed up the R&D of Internet of Things and increase input and policy support for relevant industries. The development of China’s Internet of Things has entered a new period of rapid development. .
1. Development status of Internet of Things technology in China As a new concept of information development, the Internet of Things (IoT) has brought about major changes in the methods and coverage of information acquisition. The United States, the European Union, Japan, South Korea, Singapore, China Taiwan and other countries and regions are A plan for the development of the Internet of Things has been formulated. In the wave of informatization, China has kept pace with the development of the world. The country actively supports the research and industrial development of the Internet of Things technology and quickly promotes the Internet of Things to a national strategic position. At the Third Session of the 11th National People's Congress, Premier Wen Jiabao stated in his report on the work of the government: “Strive to cultivate strategic emerging industries, actively promote the substantial progress of the integration of the 'Three Networks' and accelerate the R&D and application of the Internet of Things. Investment in emerging industries and policy support." In fact, China has already made a strategic plan for related technologies for the Internet of Things. The National “Eleventh Five-Year Plan for the Information Industry Science and Technology Development and the Outline of the Medium- to Long-Term Plan for the Information Industry in the Eleventh Five-Year Plan†clearly stated that “There is no place to study RFID and sensor networks. The network technology that is not in existence, studies the seamless integration and application of RFID, sensor networks and information and communication networks." The Ministry of Science and Technology and the Ministry of Industry and Information Technology successively set up topics to support the research and industrialization of the Internet of Things technology in a number of major national science and technology projects. The Chinese Academy of Sciences and the Wuxi Municipal Government jointly established the Wuxi Institute of Internet of Things Industry, and Wuxi launched the “Perception The construction of China Center, China Mobile, China Unicom, China Telecom and other three major operators, as well as Southeast University, Beijing University of Posts and Telecommunications, have established the Institute of Internet of Things in Wuxi, Wuxi, Beijing and other cities have developed Internet of Things for 5 years. development plan.
In the new industry of Internet of Things, China's technology research and development level is in the forefront of the world and has significant influence. As early as in 1999, China started the research of sensor networks, and has the advantage of co-development compared with other countries. It has invested hundreds of millions of dollars and has made significant achievements in wireless smart sensor network communication technology, micro-sensors, sensor terminals, and mobile base stations. Progress, now has a complete industrial chain from materials, technology, devices, systems to the network. In the world of sensor networks, China, along with Germany, the United States, and South Korea, has become one of the leading countries in the formulation of international standards. Unlike computers and the Internet industry, China enjoys the right to speak internationally in the "Internet of Things" field.
Wuxi, Beijing, Shanghai, Shenzhen, Chengdu and other places all regard the Internet of Things as the key point for the development of the information industry, and the application hotspots are mainly distributed in industries that are covered by concepts such as safe cities, smart power, safe home, and smart medical care.
2. The Internet of Things Technology is Increasing the Level of Informatization of Public Security Work At present, Beijing, Shanghai, Wuxi, Shenzhen, and Chongqing all regard the Internet of Things as the focal point for the development of the information industry. Especially in the field of social public safety, given the importance and urgency of its application requirements, the Internet of Things has taken the lead in this field. The Internet of Things (Public Security Internet of Things) for social and public safety is based on the “people, vehicles, objects, and events†as the object of perception, and based on the network architecture of the existing public security informatization, it realizes the comprehensive perception of multi-dimensional information of sensing objects across regions. , Highly shared, through the integration, excavation and processing of perceptual information, to enhance the actual combat capability and service level of modern policing, and to construct an innovative “perceived policing†mechanism to achieve policing from “post-event passive processing†to “beforehand The leap-forward reforms of effective prevention, rapid response in events, and comprehensive retrospection afterwards reflect the technical support of the Internet of things technology for policing mechanism innovation.
The breakthrough of the Internet of Things technology in public security science and technology work is more reflected in the extension of the Internet of Things technology's awareness of existing public security information networks, and the promotion of “people and thingsâ€, “things and thingsâ€, “people and caseâ€, and “thingsâ€. The level of information interconnection between the case, case and case, breaking the shaft-type application mode, reversing the situation in which each type of police is at war with each other, emphasizing the construction of a common service support platform and service platform, emphasizing terminal intelligence and on-site Wisdom handling, emphasizing the in-depth excavation of policing data, activating applications, and sharing of intelligence, emphasizing the visual invocation of equipment and personnel, real-time high-precision positioning technology, and the resulting policing work mechanism innovation.
The Public Security Internet of Things improves and enhances the level of police informationization through more thorough perception, more comprehensive interconnection and interoperability, and more in-depth intelligentization, which further improves the effectiveness of police services and strengthens the ability and level of public security agencies to fight crimes and manage society. . The relevant business units also pay close attention to the application of the Internet of Things in the social public safety field. Some related Internet of Things technologies have already been used in policing work. For example, the Shanghai World Expo vehicle safety supervision system has been checked and entered at the entrance and exit of the Expo Park. More than 5.9 million vehicles were used; based on RFID and video recognition technology, the specific vehicle and public security prevention and control system in Nanjing solved the problem of fake cards and decks of vehicles, and achieved effective command and dispatch and traffic safety management functions for specific vehicles in Nanjing; The application of Internet of Things technology in the field of social public safety was the first demonstration application, which promoted the innovation of the policing mechanism and comprehensively raised the ability and level of public security agencies to crack down on crimes and serve the society.
3. The main development direction of the Internet of Things in the “Twelfth Five-Year Plan†of the public security science and technology work The Public Internet of Things emphasizes the use of video surveillance, satellite positioning, radio frequency identification, and other sensor devices to dynamically collect information on specific "people, vehicles, objects, and events", highlighting The comprehensive perception of the information of the concerned objects, on the basis of high sharing, through the integration and intelligent analysis of multi-source information, realizes the dynamic control and linkage application of the concerned persons, vehicles and events, and builds an innovative intelligent policing model and improves Control and rapid emergency response capabilities.
Combining the existing public security informatization foundation and construction achievements, proceeding under the principle of overall consideration, integration and compatibility, and appropriate forward-looking principle, the comprehensive service application system for cross-policies will be implemented, and common service platforms and network support platforms will be established to serve as the public security intelligence system. Services, improve public security capabilities and serve social capabilities, public security Internet of things from the following four aspects:
(1) Increase information acquisition means and obtain social dynamic information in real time. Policing involving public security, traffic, fire and other multi-faceted areas, and information-acquisition-based information collection methods cannot meet the requirements for comprehensive information access and real-time requirements. Some information acquisition methods and the coverage of sensor nodes can not meet the requirements of social public security incidents such as timely perception, intelligent judgment and active warning. In view of the actual needs of social and public security, the forward-looking vision is to consider the expansion of the public security system. It is necessary to increase the types of sensors, expand the coverage of the sensor network, and achieve information collection through a large increase in information acquisition methods. All-weather, full-time, and automation. Considering the complexity of the on-site environment in the event of social public safety emergencies, the robustness, redundancy, and certain structural redundancy of the sensor network must be enhanced so that perceptual information can still be ensured when the public network information is blocked or destroyed. The correct acquisition and timely delivery.
(2) Strengthen the construction of network facilities to meet the large-capacity data transmission The use of high-definition video sensors is increasingly used for the monitoring of public and public security incidents, which has led to increasingly severe transmission of large-capacity data. The current network architecture and bandwidth cannot carry deep applications based on high-definition video, and it is necessary to further strengthen the construction of video private networks to meet the needs of the high-definition surveillance era. On the other hand, under the background of "triple play", secure access and data sharing between heterogeneous networks also need to be further promoted in terms of security gateway construction and trusted border access technologies. The large-scale use of wireless sensors also raises higher data transmission and data security requirements for the construction of wireless transmission networks.
(3) Integration of industry data resources to achieve a high degree of sharing of information resources Social public safety involves multiple industries. Fire protection, transportation, public security, meteorology, environmental protection and other departments have established corresponding business management systems and emergency response systems, but these systems In the absence of data and intelligence sharing mechanisms, many information cannot be opened to other industries. Therefore, it is necessary to conduct overall planning on the platform construction from the overall perspective, integrate industry data resources, ensure the sharing requirements of data intelligence through appropriate data filtering and cleaning mechanisms, and build an inter-departmental multi-departmental integrated service infrastructure platform.
(4) Excavate the value of information resources, improve the intelligence level of business systems, improve the level of public security science and technology support, and provide efficient, accurate, and powerful data and intelligence support for government decision-making management. On the one hand, comprehensive information acquisition methods and reliable and timely information transmission are required. Protection, on the other hand, needs to be greatly improved in the depth of information mining and intelligent processing capabilities.
The immense number of smart sensors in the era of the Internet of Things is the replacement and promotion of human sensory functions, and they are used to realize the extension of the perception range and perceived accuracy of the physical world. Using the heterogeneous data generated by multi-source data collection, the mathematical model of public safety events is analyzed, and an event judgment model is constructed to realize the scientific inference of the event development situation. Relying on the intelligent disposal technology and simulation technology of the Internet of Things platform, it plays a major auxiliary decision-making role in the rapid response drill of public safety events, workflow simulation training, event early warning, deployment of police force control, and retroactive restoration of public security cases. It is a public security Internet of Things. Important needs.
4. Opportunities and Challenges Faced by the Security Industry in the Era of Internet of Things Security is one of the earliest industries in China's IoT applications. Security information collection, sensing technologies, intelligent analysis, and network technologies all have the features of Internet of Things applications. At present, application technologies such as video, GPS, and sensing have been initially applied in the security industry. In the Era of Internet of Things, security terminal products are intelligent and integrated. They can run independently from the host computer and can connect multiple wireless sensors (such as smoke, water, temperature, magnetic, gas, infrared, etc.) to the surrounding environment. Comprehensively aware of the ability to transmit alarm images and information over the Internet, as well as a security system with network platform monitoring alarm service functions.
In the Internet of Things era, the security industry has some new features, including the full transition to the “Smart Security†and “Intensive Security†era, from single-function products to multi-sensor terminal integration, from single-variable monitoring to full awareness of the surrounding environment. From passive defense to active defense based on model research and situation analysis, the security industry will achieve a comprehensive upgrade from products to services. This is an opportunity as well as a challenge.
Different from traditional security products, which are mainly produced and sold, the security industry in the Internet of Things era has added the colors of modern services, and is based on video surveillance hosting services (in the elderly, infants, children, special places, schools, video surveillance). In recent years, there has been a rising tide. Security products in the Internet of Things era will more and more embody its role as a terminal node on the ubiquitous network. Remote real-time access can be achieved through handheld terminals. Network monitoring based on IPV6 and ONS (Object Name Resolution) will become the mainstream of security products. Operating mode. The security problems existing in the application of the Internet of Things in other fields are also important issues that cannot be avoided in the field of security. Unauthorized access and control of security equipment is not only a matter of data security for security objects, but also poses potential risks to the human body, the environment, etc. Severe consequences are difficult to predict.
As the most mainstream method in the security market, video surveillance has a huge market share and a wide range of applications. According to relevant statistics, in 2010, the domestic market for video surveillance reached nearly 2 billion U.S. dollars. Faced with such a large market, the development of high-definition technology has become an important topic for domestic mainstream manufacturers, which directly led to the application of intelligent identification technology in video surveillance. It can be foreseen that the market for high-definition intelligent surveillance will become larger, and video surveillance will also transform from "passive defense" to "active defense." Current intelligent video surveillance is more based on technologies such as virtual perimeter and motion recognition. It lacks a panoramic description of the characteristics of the event's subject and surrounding environmental elements. The text-based video structuring technology can realize the intelligent analysis of the scene video content. After the event model is introduced, it can be used to implement the active push of the alarm information in the form of text, which is convenient for automatic analysis and review of massive video surveillance information. The mainstream technology trends in video surveillance development in the industry. The development of high-definition intelligent monitoring systems based on video structured description technology will prompt active prevention to become a reality.
With the construction of the safe city, the application of network video surveillance technology has become more and more popular, especially China Telecom's global eye business, has maintained a good momentum of development. High-definition, wireless, and long-tail markets will become the direction of future business development in the field of video surveillance. With the development of wireless broadband networks, 3G-based wireless video applications are also drawing attention. These are also the development directions of surveillance video in the Internet of Things.
All in all, the security industry in the Internet of Things era faces a huge market demand, with both opportunities and challenges. The development of Internet of Things technology and the improvement of 3G wireless communication network facilities have brought opportunities for the development of large-scale network monitoring and application standards for the security industry. The adoption of high-definition video surveillance is conducive to the overall technological upgrading of the industry, and the development of an independent video and audio smart chip provides a market space. Through in-depth cooperation with operators, the security industry will gain channel support in the civil markets such as community security, smart homes and smart buildings, which will help expand the application business and provide services from providing products to cooperation.
5. Enterprises in the security industry should adopt a positive attitude to meet the development of the Internet of Things in the era of IoT security. Security companies will face competition with more IT companies, including but not limited to: Informatization software companies, communication operators, and broadcasting Operators and various types of electronic related companies. The relatively small scale of the security industry, the shortage of technical talents, and the severe technical impact of the IT industry have determined that the road to independent intellectual property rights in the security industry has taken a long time.
Security companies in the Internet of Things era are the challenges and opportunities for coexistence. In order to take advantage of the Internet of Things and realize its own growth and expansion, security companies must have an active attitude in participating in competition, identify market entry points and their own technological advantages, in 3G network security terminal, embedded applications Major breakthroughs have taken place in mainstream technologies such as software systems and intelligent video analytics. They have actively participated in the formulation of domestic industry application standards to gain the right to speak and market space. Facts have proved that companies in the security industry with independent intellectual property rights and participation in standard setting have achieved better development.
Security industry has a small space for product expansion at the product application level, and as products mature, the profits of industry product manufacturers have become thinner and thinner. Therefore, security companies should actively explore the development of the civilian market, and in-depth cooperation with operators, in-depth mining smart community and smart home market; through close cooperation with the construction industry, early intervention in the planning phase of intelligent building design; expansion and civil affairs departments The cooperation of medical institutions and the development of video surveillance services.
In short, the development of security companies in the era of the Internet of Things, on the one hand, must be based on the market demand, to dig deeper into market segments; on the other hand, it is necessary to grasp the direction of mainstream technologies and develop autonomous core technologies in terms of digitization, high-definition, and intelligence. Apply the standard system to strengthen its own technical advantages and service features. In the Internet of Things era, the security industry has broad prospects for development. Security companies should face up to challenges, seize opportunities, and achieve rapid growth.
1. Development status of Internet of Things technology in China As a new concept of information development, the Internet of Things (IoT) has brought about major changes in the methods and coverage of information acquisition. The United States, the European Union, Japan, South Korea, Singapore, China Taiwan and other countries and regions are A plan for the development of the Internet of Things has been formulated. In the wave of informatization, China has kept pace with the development of the world. The country actively supports the research and industrial development of the Internet of Things technology and quickly promotes the Internet of Things to a national strategic position. At the Third Session of the 11th National People's Congress, Premier Wen Jiabao stated in his report on the work of the government: “Strive to cultivate strategic emerging industries, actively promote the substantial progress of the integration of the 'Three Networks' and accelerate the R&D and application of the Internet of Things. Investment in emerging industries and policy support." In fact, China has already made a strategic plan for related technologies for the Internet of Things. The National “Eleventh Five-Year Plan for the Information Industry Science and Technology Development and the Outline of the Medium- to Long-Term Plan for the Information Industry in the Eleventh Five-Year Plan†clearly stated that “There is no place to study RFID and sensor networks. The network technology that is not in existence, studies the seamless integration and application of RFID, sensor networks and information and communication networks." The Ministry of Science and Technology and the Ministry of Industry and Information Technology successively set up topics to support the research and industrialization of the Internet of Things technology in a number of major national science and technology projects. The Chinese Academy of Sciences and the Wuxi Municipal Government jointly established the Wuxi Institute of Internet of Things Industry, and Wuxi launched the “Perception The construction of China Center, China Mobile, China Unicom, China Telecom and other three major operators, as well as Southeast University, Beijing University of Posts and Telecommunications, have established the Institute of Internet of Things in Wuxi, Wuxi, Beijing and other cities have developed Internet of Things for 5 years. development plan.
In the new industry of Internet of Things, China's technology research and development level is in the forefront of the world and has significant influence. As early as in 1999, China started the research of sensor networks, and has the advantage of co-development compared with other countries. It has invested hundreds of millions of dollars and has made significant achievements in wireless smart sensor network communication technology, micro-sensors, sensor terminals, and mobile base stations. Progress, now has a complete industrial chain from materials, technology, devices, systems to the network. In the world of sensor networks, China, along with Germany, the United States, and South Korea, has become one of the leading countries in the formulation of international standards. Unlike computers and the Internet industry, China enjoys the right to speak internationally in the "Internet of Things" field.
Wuxi, Beijing, Shanghai, Shenzhen, Chengdu and other places all regard the Internet of Things as the key point for the development of the information industry, and the application hotspots are mainly distributed in industries that are covered by concepts such as safe cities, smart power, safe home, and smart medical care.
2. The Internet of Things Technology is Increasing the Level of Informatization of Public Security Work At present, Beijing, Shanghai, Wuxi, Shenzhen, and Chongqing all regard the Internet of Things as the focal point for the development of the information industry. Especially in the field of social public safety, given the importance and urgency of its application requirements, the Internet of Things has taken the lead in this field. The Internet of Things (Public Security Internet of Things) for social and public safety is based on the “people, vehicles, objects, and events†as the object of perception, and based on the network architecture of the existing public security informatization, it realizes the comprehensive perception of multi-dimensional information of sensing objects across regions. , Highly shared, through the integration, excavation and processing of perceptual information, to enhance the actual combat capability and service level of modern policing, and to construct an innovative “perceived policing†mechanism to achieve policing from “post-event passive processing†to “beforehand The leap-forward reforms of effective prevention, rapid response in events, and comprehensive retrospection afterwards reflect the technical support of the Internet of things technology for policing mechanism innovation.
The breakthrough of the Internet of Things technology in public security science and technology work is more reflected in the extension of the Internet of Things technology's awareness of existing public security information networks, and the promotion of “people and thingsâ€, “things and thingsâ€, “people and caseâ€, and “thingsâ€. The level of information interconnection between the case, case and case, breaking the shaft-type application mode, reversing the situation in which each type of police is at war with each other, emphasizing the construction of a common service support platform and service platform, emphasizing terminal intelligence and on-site Wisdom handling, emphasizing the in-depth excavation of policing data, activating applications, and sharing of intelligence, emphasizing the visual invocation of equipment and personnel, real-time high-precision positioning technology, and the resulting policing work mechanism innovation.
The Public Security Internet of Things improves and enhances the level of police informationization through more thorough perception, more comprehensive interconnection and interoperability, and more in-depth intelligentization, which further improves the effectiveness of police services and strengthens the ability and level of public security agencies to fight crimes and manage society. . The relevant business units also pay close attention to the application of the Internet of Things in the social public safety field. Some related Internet of Things technologies have already been used in policing work. For example, the Shanghai World Expo vehicle safety supervision system has been checked and entered at the entrance and exit of the Expo Park. More than 5.9 million vehicles were used; based on RFID and video recognition technology, the specific vehicle and public security prevention and control system in Nanjing solved the problem of fake cards and decks of vehicles, and achieved effective command and dispatch and traffic safety management functions for specific vehicles in Nanjing; The application of Internet of Things technology in the field of social public safety was the first demonstration application, which promoted the innovation of the policing mechanism and comprehensively raised the ability and level of public security agencies to crack down on crimes and serve the society.
3. The main development direction of the Internet of Things in the “Twelfth Five-Year Plan†of the public security science and technology work The Public Internet of Things emphasizes the use of video surveillance, satellite positioning, radio frequency identification, and other sensor devices to dynamically collect information on specific "people, vehicles, objects, and events", highlighting The comprehensive perception of the information of the concerned objects, on the basis of high sharing, through the integration and intelligent analysis of multi-source information, realizes the dynamic control and linkage application of the concerned persons, vehicles and events, and builds an innovative intelligent policing model and improves Control and rapid emergency response capabilities.
Combining the existing public security informatization foundation and construction achievements, proceeding under the principle of overall consideration, integration and compatibility, and appropriate forward-looking principle, the comprehensive service application system for cross-policies will be implemented, and common service platforms and network support platforms will be established to serve as the public security intelligence system. Services, improve public security capabilities and serve social capabilities, public security Internet of things from the following four aspects:
(1) Increase information acquisition means and obtain social dynamic information in real time. Policing involving public security, traffic, fire and other multi-faceted areas, and information-acquisition-based information collection methods cannot meet the requirements for comprehensive information access and real-time requirements. Some information acquisition methods and the coverage of sensor nodes can not meet the requirements of social public security incidents such as timely perception, intelligent judgment and active warning. In view of the actual needs of social and public security, the forward-looking vision is to consider the expansion of the public security system. It is necessary to increase the types of sensors, expand the coverage of the sensor network, and achieve information collection through a large increase in information acquisition methods. All-weather, full-time, and automation. Considering the complexity of the on-site environment in the event of social public safety emergencies, the robustness, redundancy, and certain structural redundancy of the sensor network must be enhanced so that perceptual information can still be ensured when the public network information is blocked or destroyed. The correct acquisition and timely delivery.
(2) Strengthen the construction of network facilities to meet the large-capacity data transmission The use of high-definition video sensors is increasingly used for the monitoring of public and public security incidents, which has led to increasingly severe transmission of large-capacity data. The current network architecture and bandwidth cannot carry deep applications based on high-definition video, and it is necessary to further strengthen the construction of video private networks to meet the needs of the high-definition surveillance era. On the other hand, under the background of "triple play", secure access and data sharing between heterogeneous networks also need to be further promoted in terms of security gateway construction and trusted border access technologies. The large-scale use of wireless sensors also raises higher data transmission and data security requirements for the construction of wireless transmission networks.
(3) Integration of industry data resources to achieve a high degree of sharing of information resources Social public safety involves multiple industries. Fire protection, transportation, public security, meteorology, environmental protection and other departments have established corresponding business management systems and emergency response systems, but these systems In the absence of data and intelligence sharing mechanisms, many information cannot be opened to other industries. Therefore, it is necessary to conduct overall planning on the platform construction from the overall perspective, integrate industry data resources, ensure the sharing requirements of data intelligence through appropriate data filtering and cleaning mechanisms, and build an inter-departmental multi-departmental integrated service infrastructure platform.
(4) Excavate the value of information resources, improve the intelligence level of business systems, improve the level of public security science and technology support, and provide efficient, accurate, and powerful data and intelligence support for government decision-making management. On the one hand, comprehensive information acquisition methods and reliable and timely information transmission are required. Protection, on the other hand, needs to be greatly improved in the depth of information mining and intelligent processing capabilities.
The immense number of smart sensors in the era of the Internet of Things is the replacement and promotion of human sensory functions, and they are used to realize the extension of the perception range and perceived accuracy of the physical world. Using the heterogeneous data generated by multi-source data collection, the mathematical model of public safety events is analyzed, and an event judgment model is constructed to realize the scientific inference of the event development situation. Relying on the intelligent disposal technology and simulation technology of the Internet of Things platform, it plays a major auxiliary decision-making role in the rapid response drill of public safety events, workflow simulation training, event early warning, deployment of police force control, and retroactive restoration of public security cases. It is a public security Internet of Things. Important needs.
4. Opportunities and Challenges Faced by the Security Industry in the Era of Internet of Things Security is one of the earliest industries in China's IoT applications. Security information collection, sensing technologies, intelligent analysis, and network technologies all have the features of Internet of Things applications. At present, application technologies such as video, GPS, and sensing have been initially applied in the security industry. In the Era of Internet of Things, security terminal products are intelligent and integrated. They can run independently from the host computer and can connect multiple wireless sensors (such as smoke, water, temperature, magnetic, gas, infrared, etc.) to the surrounding environment. Comprehensively aware of the ability to transmit alarm images and information over the Internet, as well as a security system with network platform monitoring alarm service functions.
In the Internet of Things era, the security industry has some new features, including the full transition to the “Smart Security†and “Intensive Security†era, from single-function products to multi-sensor terminal integration, from single-variable monitoring to full awareness of the surrounding environment. From passive defense to active defense based on model research and situation analysis, the security industry will achieve a comprehensive upgrade from products to services. This is an opportunity as well as a challenge.
Different from traditional security products, which are mainly produced and sold, the security industry in the Internet of Things era has added the colors of modern services, and is based on video surveillance hosting services (in the elderly, infants, children, special places, schools, video surveillance). In recent years, there has been a rising tide. Security products in the Internet of Things era will more and more embody its role as a terminal node on the ubiquitous network. Remote real-time access can be achieved through handheld terminals. Network monitoring based on IPV6 and ONS (Object Name Resolution) will become the mainstream of security products. Operating mode. The security problems existing in the application of the Internet of Things in other fields are also important issues that cannot be avoided in the field of security. Unauthorized access and control of security equipment is not only a matter of data security for security objects, but also poses potential risks to the human body, the environment, etc. Severe consequences are difficult to predict.
As the most mainstream method in the security market, video surveillance has a huge market share and a wide range of applications. According to relevant statistics, in 2010, the domestic market for video surveillance reached nearly 2 billion U.S. dollars. Faced with such a large market, the development of high-definition technology has become an important topic for domestic mainstream manufacturers, which directly led to the application of intelligent identification technology in video surveillance. It can be foreseen that the market for high-definition intelligent surveillance will become larger, and video surveillance will also transform from "passive defense" to "active defense." Current intelligent video surveillance is more based on technologies such as virtual perimeter and motion recognition. It lacks a panoramic description of the characteristics of the event's subject and surrounding environmental elements. The text-based video structuring technology can realize the intelligent analysis of the scene video content. After the event model is introduced, it can be used to implement the active push of the alarm information in the form of text, which is convenient for automatic analysis and review of massive video surveillance information. The mainstream technology trends in video surveillance development in the industry. The development of high-definition intelligent monitoring systems based on video structured description technology will prompt active prevention to become a reality.
With the construction of the safe city, the application of network video surveillance technology has become more and more popular, especially China Telecom's global eye business, has maintained a good momentum of development. High-definition, wireless, and long-tail markets will become the direction of future business development in the field of video surveillance. With the development of wireless broadband networks, 3G-based wireless video applications are also drawing attention. These are also the development directions of surveillance video in the Internet of Things.
All in all, the security industry in the Internet of Things era faces a huge market demand, with both opportunities and challenges. The development of Internet of Things technology and the improvement of 3G wireless communication network facilities have brought opportunities for the development of large-scale network monitoring and application standards for the security industry. The adoption of high-definition video surveillance is conducive to the overall technological upgrading of the industry, and the development of an independent video and audio smart chip provides a market space. Through in-depth cooperation with operators, the security industry will gain channel support in the civil markets such as community security, smart homes and smart buildings, which will help expand the application business and provide services from providing products to cooperation.
5. Enterprises in the security industry should adopt a positive attitude to meet the development of the Internet of Things in the era of IoT security. Security companies will face competition with more IT companies, including but not limited to: Informatization software companies, communication operators, and broadcasting Operators and various types of electronic related companies. The relatively small scale of the security industry, the shortage of technical talents, and the severe technical impact of the IT industry have determined that the road to independent intellectual property rights in the security industry has taken a long time.
Security companies in the Internet of Things era are the challenges and opportunities for coexistence. In order to take advantage of the Internet of Things and realize its own growth and expansion, security companies must have an active attitude in participating in competition, identify market entry points and their own technological advantages, in 3G network security terminal, embedded applications Major breakthroughs have taken place in mainstream technologies such as software systems and intelligent video analytics. They have actively participated in the formulation of domestic industry application standards to gain the right to speak and market space. Facts have proved that companies in the security industry with independent intellectual property rights and participation in standard setting have achieved better development.
Security industry has a small space for product expansion at the product application level, and as products mature, the profits of industry product manufacturers have become thinner and thinner. Therefore, security companies should actively explore the development of the civilian market, and in-depth cooperation with operators, in-depth mining smart community and smart home market; through close cooperation with the construction industry, early intervention in the planning phase of intelligent building design; expansion and civil affairs departments The cooperation of medical institutions and the development of video surveillance services.
In short, the development of security companies in the era of the Internet of Things, on the one hand, must be based on the market demand, to dig deeper into market segments; on the other hand, it is necessary to grasp the direction of mainstream technologies and develop autonomous core technologies in terms of digitization, high-definition, and intelligence. Apply the standard system to strengthen its own technical advantages and service features. In the Internet of Things era, the security industry has broad prospects for development. Security companies should face up to challenges, seize opportunities, and achieve rapid growth.
P20*P20 Transparent LED Screen
P20*P20 Transparent Led Screen,P20 Led Transparent Display Screen,P20 Transparent Led Screen,Transparent Led Display
Shenzhen YuGuang New Material Co.,Ltd , https://www.ygsmartfilm.com