April 19, 2022
Discussion on the application of security platform in various scenarios
Security platform, that is, to achieve centralized management and control of different subsystems in the same platform, to achieve distributed deployment and centralized management of each subsystem, to collect and detect the sensing data and operating status of each subsystem in real time, and to Relevant information and status are analyzed together, and the corresponding subsystems are mobilized to realize system linkage for various events, and complete the functions of resource sharing, information interaction, and alert linkage handling between each subsystem and the security platform, and apply according to the industry. It has formed a comprehensive information fusion intelligent management and control platform that is effective and has an industry background.
Ⅰ. Analysis of the status of security platforms
In recent years, with the rapid development of artificial intelligence, big data, Internet of Things and other technologies, traditional security has rapidly changed to smart security. The boundaries of the security industry and the types of security equipment continue to expand. Smart campuses, smart communities, smart cultural tourism, etc. New industry application demands continue to emerge, and various multi-dimensional sensing devices such as smart access control, smart meters, and RFID collectors have also entered practical application scenarios. The security industry has entered the era of smart security, which also puts forward higher requirements for security platforms.
1. Ubiquitous data access capability
With the development of artificial intelligence and the demand for in-depth business applications, a wide variety of IoT sensing devices have emerged in practical applications. The types of data accessed by the security platform are not only video data, access control data, alarm data, etc., but also views Structured data, business application data, etc., so as to realize the comprehensive perception and collection of "people, vehicles, places, things, things, organizations" and other elements, which puts forward higher requirements for the data access integration capabilities of the security platform.
2. Efficient big data governance analysis capabilities
With the access of a large amount of data, the massive data in the security platform needs to be efficiently and agilely managed and analyzed, and big data analysis technology needs to be used to process and analyze in real time to mine the effective or regular information in the data to improve the actual combat capability of the security platform .
3. Integration with business applications
With the rapid development of technology in the security industry, people’s requirements for business applications have become increasingly complex. The design goals of security platforms are no longer limited to achieving data communication, mutual linkage, and unified management between various subsystems. On the basis of sub-system integration, it meets actual business needs, develops various professional and special applications, builds overall industry information solutions, solves actual business application problems, and effectively improves customer information management.
Ⅱ.Security platform system architecture
1. Resource layer
The resource layer is mainly the front-end information collection equipment of each subsystem, which provides various data resources for the security platform, which are mainly divided into four categories: video surveillance resources, intelligent surveillance resources, Internet of Things perception resources, and business application data in various industries.
2. Convergence layer
The convergence layer is mainly composed of various connected subsystems, including video networking systems, access control systems, various sensing detection systems, alarm systems, etc. The security platform realizes the docking with each subsystem through SDK, API and various transmission protocols, and realizes the independence of each subsystem through the component isolation technology for the interface components of various subsystems. When a subsystem fails, it will not affect The normal operation of other subsystems ensures the overall stability of the security platform.
3. Computing layer
Use artificial intelligence and big data analysis technology to realize the real-time analysis of the access data of each subsystem, extract the attribute information and characteristic information from the unstructured and semi-structured data through artificial intelligence algorithms, and realize the matching through the big data analysis platform The secondary processing and management of all kinds of data, mining and analyzing the value data in it, so as to provide powerful computing power support for upper-level applications.
4. Common application layer
This layer mainly implements the abstraction of the main common applications in each subsystem based on the unified management of each subsystem, and provides services to various business applications of the upper layer through the service bus, mainly for "monitoring, control, reporting, inspection, Management” five basic common applications.
"Monitoring" realizes centralized monitoring of multiple locations and devices, and provides a unified data source for video display on the wall, video patrol, etc.
"Control", the security platform realizes active control of various subsystems in addition to passively receiving data. Various front-ends can be controlled through the security platform, such as camera PTZ control, access control switches, and arming and disarming operations of alarm zones.
"Check" realizes the query of various front-end equipment and various data. The equipment query mainly realizes initial query, fuzzy query, and map circle selection query. Data query includes fast retrieval of collected data and equipment log data.
"Report" mainly realizes the access and display of various alarm data.
"Management" realizes the management of various subsystems and ensures the real-time and stability of the platform.
5. Industry application layer
Combining the business scenarios and business needs of various industries to achieve in-depth industry-based comprehensive applications, relying on the powerful computing capabilities of artificial intelligence and big data in the computing layer, to provide precise and differentiated services, such as smart campus security platforms, smart business circle security platforms, Smart hospital security platforms, etc., so as to effectively improve the information management level of various industries and various places.
Ⅲ. Analysis of the application of security platforms in various industry scenarios
1. Smart community security platform
In the community scenario, the smart community security platform needs to realize the collection and aggregation of basic data on the actual population, actual houses, actual units, and actual security facilities in the jurisdiction for users such as public security and comprehensive management, and integrate video surveillance in the community , Face capture, bayonet passing, access control card swiping, fire-fighting equipment and other types of dynamic perception data, focusing on fighting, prevention, management, and control services to achieve community registration population management, floating population management, key personnel management, pedestrian and vehicle trajectory research and judgment, Business applications such as abnormal alarm analysis.
At the same time, the smart community security platform needs to use a unified standard address library to dynamically display the actual population, actual houses, actual units, public security forces, security facilities, location and information of police incidents in the community on the map. When events such as situation and fire alarms are displayed, real-time linkage alarms can be displayed at corresponding locations on the map, and real-time data can be obtained and displayed dynamically through various sensing sources such as face, passing, door opening, fire, video, etc., so that users can understand the community in real time. status.
2. Smart business district security platform
In the business circle scenario, the smart business circle security platform needs to rely on advanced technologies such as the Internet of Things, artificial intelligence, and video intelligent analysis to collect multi-dimensional data from various sensing devices in real time, so as to realize the "people, cars, shops, units, and power in the business circle". , Equipment, facilities and equipment, events" and other information for comprehensive dynamic perception. Through the unified planning of the business district, it realizes the functional coverage of face capture comparison, crowd density, intelligent monitoring, parking management, road condition analysis, and fire protection perception, ensuring that there are no blind spots for monitoring, and promoting users in business districts, streets, public security, comprehensive management, etc. Integrated prevention and control, creating a better business environment for all-round applications, and promoting business model innovation.
3. Smart campus security platform
In campus scenarios, the smart campus security platform needs to build a safe and harmonious campus as its core goal, and build a security platform that integrates campus monitoring, campus face recognition, intelligent analysis and judgment, smart security perception, campus management and other functions to prevent campus Abnormal events, focusing on key personnel, realize the visualized, flat and intelligent security early warning command and control of the campus. Through the establishment of dynamic monitoring and data collection and analysis mechanisms, schools are provided with safety risk reminders in a timely manner and guide schools to improve their risk assessment and prevention systems.
4. Smart rail transit security platform
In the rail transit scene, it is necessary to build a smart rail transit security platform by integrating various subsystems such as security detection, video surveillance, electronic access control, alarm linkage, and electronic patrol, which is the rail transit command center, operation control center, and various stations/vehicles. Provide safe, stable and efficient protective measures for various users such as depots/parking lots, trains, and personnel. Through the use of technologies such as the Internet of Things, artificial intelligence, video intelligent analysis, and various multi-dimensional sensing devices such as face capture machines, video surveillance, crowd density analysis equipment, electronic fences, smoke detection and fire protection, etc., realizing no blind spots in scenes such as rail transit and subway stations Monitoring and full situational awareness, real-time detection of abnormal personnel and abnormal events, and construction of safe rail transit.
5. Smart medical security platform
In health care scenarios, smart medical security platforms need to be supported by technologies such as Internet of Things information, artificial intelligence, and big data analysis to build hospital information that covers the entire hospital for network interconnection, information resource sharing, unified standards and specifications, and complete application functions Chemical technology defense system, improve the level of comprehensive development and utilization of hospital information resources, form an informatization work pattern of full application and resource sharing, and realize real-time monitoring and precise positioning of medical personnel, vehicles, visitors, and important materials and places in the hospital area , Trajectory tracking, information recording, etc., to intuitively understand every move on the spot, prevent serious malignant incidents such as scalper registration, medical disputes, proliferation of medical care, theft of newborns, and improve the rapid response capability of the hospital security department and emergencies Responding ability, forming a new mechanism of scientific management and efficient supervision of hospitals, ensuring the continuous safety and stability of the medical environment.
With the development of various technologies such as artificial intelligence and big data, the current security platform construction has reached a new starting point. In the actual construction of the security platform, it is necessary to dig deeper and understand the actual needs of first-line customers. Relying on the powerful computing and service capabilities of artificial intelligence and big data, combined with the actual business needs of various industries, build a one-stop closed-loop management security platform to maintain users Stickiness, recognized by the market.