Your current location:News > Industry dynamics
I have seen of high-end digital security system characteristics
Publishing Time:2004-8-6 09:36  No.of Visits:2177

The author puts forward "high-end" digital security system

1. The need of large scale system, operating the market needs

Metropolitan area network construction, has for the construction of large public and private network security system provides a good foundation, but this kind of application needs to be distributed multi-server architecture, a failover, redundancy backup and complex network management, so as to adapt to the operating level of the large capacity always online service.

2. Meet the demand of constantly improve the user application

Mainly displays in the multi-channel video real-time demand, higher resolution, higher ability of data mining and comprehensive analysis, and higher automation level of linkage.

3. To adapt to the situation of market segmentation

On demand and change, the application is king, has become an important standard to security market is one of the most popular. New products and solutions to make more depth in the field of application of vertical understanding, more accurate, close to the user management patterns, as well as senior network equipment and software closer integration of high-end goods.

In conclusion, the author of "high" view is: high verticality, high reliability, high performance, high compacter and realizability. Of course not high price.

Characteristics: extensive and comprehensive ability of information collection

"High-end" digital security system is one of the characteristics of more extensive and comprehensive information collection, including:

1. More ways of collection

(LAN/WAN can through a variety of means of communication, Internet, E-mail, wi-fi, CDMA, PDA) to obtain information, in order to meet the application area is large, in need to wireless and mobile monitoring requirements.

2. More collection content

In addition to the video and alarm information, audio information, job information network platform, the operation of the auxiliary equipment information is as a high-end system running. Even video content, also need to the content of the image, behavior characteristics and change rules provide a richer collection, such as figure 2 count for a moving target, target characteristics distinguish, etc.

3. The breakthrough of traditional security concept, digital security to a new level

, all kinds of voice and data capture and analysis: through a variety of network type, such as telephone and cable network, wireless telephone and network, VoIP network, NGN softswitch network, the data packets, etc., to collect and analyze voice, fax, text messages, network data, the information such as email, chat, Internet browsing;

, based on the data protection rules within the enterprise network traffic real-time monitoring and records, as well as within the enterprise network protection rules, to all send, copy, modify, and delete operations such as record;

Record, analyze, and track, the call center.

Character 2: and the fusion of high-end products

To be able to do the digital security industry, one of the most important is to be able to provide under the network environment in the level of operation and support. At the same time, digital security products often undertake the task of traditional security system upgrade, which requires the high-end products should have:

, and the combination of high-end monitoring products, can support many famous CCTV products on the international communication protocols;

, and the combination of high-end IT hardware products, such as IBM, CISCO, SIEMENS, HP and so on platform integration. In this case, the fusion is not can run on the system platform, but with these products constitute a superior system solutions;

, and the combination of high-end software products, such as and ORANCLE, MS SQL database, such as product integration, and a large IT company integration middleware;

And production control system products such as: bar code, PLC and MES and ERP integration, etc.;

Through the system design and public network operating system integration, provide similar via "number one" and so unified billing function.

Feature 3: data mining and analysis function based on intelligent model

Refers to on the depth of data mining based on intelligent model and improve the analysis of the function, to improve the utilization of information. In the current record and retrieve the playback of audio and video information, on the basis of providing more abundant ability of data mining, such as: video based on the target activity of the statistics and analysis for a long time (as shown in figure 3), the density of the target activity for a long time for a specific area, etc. (as shown in figure 4).

Characteristics of 4: higher levels of ability

Display ability refers to both improve the actual image clarity, also refers to read the images through the virtual matrix, complex retrieval read the image, all kinds of alarm immediately read the image, etc.

, support for multiple high-resolution real-time transmission, such as support for 4 road 4 cif / 25 PFS;

Virtual matrix, using PC and software instead of part of the physical matrix function;

, to provide more complex search screen playback at the same time;

, based on the instant replay function of alarm (as shown in figure 5).

Features five: the higher reliability of the hardware and software system

Embedded systems and complex environment adaptability: hardware need to be able to adapt to all kinds of bad environment, such as temperature range, the outdoor environment, electromagnetic radiation, the power and lightning shock, etc.;

Software watchdog monitoring functions: software's ability to adapt to the system hardware, monitoring all monitoring equipment, servers and network equipment, provide the interrupt resending, to adapt to the unstable communication network;

Server failover and redundancy backup function, the most important equipment to have double machine hot backup function (as shown in figure 6).

Highly stable development characteristics of six: industry chain, source of high-speed new technologies, new products

With deep communication, IT architecture, IP solutions, streaming media, such as knowledge and experience as the background of the company, will no doubt become the digital security industry one of the most important force, can provide flexible configuration for engineering company of middleware is to improve the progress and customer satisfaction, reduce costs, increase the critical path of software sales proportion.

Furthermore, the modern enterprise has a complete, efficient, stable industry chain, namely each enterprise focus on their own expertise and professional, has assigned market share, only in this way can allow users to enjoy high reliability product guarantee.

conclusion

As the fast development of wired and wireless communication operation platform, and gradually lowered, the cost of the digital era of security is making big into the system. In recent years, however, network security situation seems to be no obvious progress, brought hidden trouble for security big projects implementation. To provide customers with comprehensive, multi-level digital security system of network security, is our each manufacturer and integrated companies need to confront and solve new topic.