Brief introduction of intelligent security

With the development of science and technology and the rapid development of information technology in 2 1 century, intelligent security technology has entered a brand-new field. The boundary between intelligent security technology and computer is gradually disappearing. Without safety technology, society will be restless and the progress and development of science and technology in the world will be affected.

With the popularization and application of Internet of Things technology, urban security has developed from a simple security protection system to a comprehensive urban system. Urban safety projects cover many fields, including street communities, buildings, banks and post offices, road monitoring, motor vehicles, police, moving objects and ships. Especially for important places, such as airports, docks, hydropower plants, bridges and dams, rivers, subways and other places, after the introduction of Internet of Things technology, all-round three-dimensional protection can be established by means of wireless movement, tracking and positioning. It takes into account the integrated system of urban overall management system, environmental monitoring system, traffic management system and emergency command system. Especially with the rise of the Internet of Vehicles, it can track and locate vehicles more quickly and accurately in public transportation management, vehicle accident handling, vehicle theft prevention and so on. You can also obtain more accurate information sources such as disaster accident information, road flow information, vehicle location information, public facilities safety information, meteorological information and so on through vehicles at any time and anywhere. The development of intelligent security technology has made remarkable achievements. With the outstanding demand of enterprises and residential quarters, digital intelligent security is facing new development opportunities. Due to the particularity of the digital intelligent security industry, the state has been giving policy encouragement to the development of the intelligent security industry. In order to solve the security problems of enterprises and residential quarters, the Ministry of Construction and the Ministry of Public Security have successively signed and issued various related documents to strengthen the construction of intelligent security facilities in enterprises and residential quarters.

Since the beginning of the new century, China has begun to implement the "Xing 'an through Science and Technology" project, the most important content of which is to create "peace and security" for enterprises and residential quarters, and to strengthen the construction of intelligent security facilities for enterprises and residential quarters by means of science and technology. In 2003, a sudden SARS hit China. In order to reduce the probability of infection due to contact, government departments appeal to people not to go out as much as possible. At this time, digital information has helped people a lot. At home, people can watch news, shop online, study online, and even have meetings and work online. On the basis of the original security facilities, the relevant communities established the wireless city security network to defend against SARS. And can basically find, handle and alarm in time. Most importantly, the SARS epidemic has strengthened people's deep understanding of intelligent security information, which is undoubtedly of great significance to the development of intelligent security.

The 2008 Beijing Olympic Games undoubtedly provided people with an excellent opportunity. The Beijing Municipal Government has put forward the slogan of "Green Olympics, High-tech Olympics and People's Olympics", in which science and technology is an important connotation. In the intelligent environment of stadiums and athletes' houses, intelligent security is bound to be a key link. The main connotation of intelligent security technology is the informatization of its related contents and services, the transmission and storage of images, the storage and processing of data, etc. As far as intelligent security is concerned, a complete intelligent security system mainly includes three parts: access control, alarm and monitoring.

From the product point of view, it should be equipped with anti-theft alarm system, video surveillance alarm system, entrance guard alarm system, security patrol alarm system, GPS vehicle alarm management system and 1 10 alarm network transmission system and so on. These subsystems can be independently set up and operated, and monitored by the central control room, or integrated and monitored with other integrated systems.

Anti-theft alarm system is divided into perimeter defense, building area defense, unit enterprise open area defense, unit enterprise physical equipment defense and so on. The front-end equipment of the system is various alarm sensors or detectors; The terminal of the system is a display/control/communication device, which can be controlled by an independent alarm controller or alarm center console. No matter what control method is adopted, it is necessary to detect and alarm the illegal intrusion in the fortified area in real time, reliably and correctly. Missing alarm is absolutely not allowed, and false alarm should be reduced to an acceptable limit. Considering that the personnel on duty are easily threatened and robbed by the perpetrators, the system should set up an emergency alarm button and leave an interface with the 1 10 alarm center.

Video monitoring and alarm system is often used for real-time monitoring, video recording and image checking when alarming in major public places and important parts in buildings. The front end of the video monitoring alarm system is all kinds of cameras, video detection alarms and related ancillary equipment; The terminal equipment of the system is display/recording/control equipment, and generally an independent video monitoring center console or monitoring alarm center console is adopted. The security video monitoring and alarm system should be linked with the anti-theft alarm system and access control system, and centralized management and monitoring should be carried out by the central control room. Independent video monitoring and alarm system, the picture display can be programmed at will, and can be switched automatically or manually. The picture must be displayed with camera number, address, time, date and other information, and the scene picture can be automatically switched to the designated monitor for display. Important monitoring pictures should be recorded for a long time. This system should have emergency alarm button and communication interface with 1 10 alarm center.

The entrance control alarm system is an automatic system which uses modern electronic information technology to issue, reject, record and alarm people (or things) at the entrance and exit of buildings. This operating system usually consists of three parts: entrance target recognition system, entrance information management system and entrance control actuator. The front-end equipment of the system is various entrance and exit target recognition devices and door lock opening and closing actuators; The transmission mode is dedicated line or network transmission; The terminal equipment of the system is display/control/communication equipment, usually using independent access controllers, or centralized monitoring of each access controller through computer network. The entrance and exit control alarm system is usually linked with anti-theft alarm system, closed-circuit video monitoring alarm system and fire fighting system to effectively realize safety prevention. The entrance and exit target recognition system can be divided into the recognition of people and the recognition of objects. Taking human body recognition as an example, it can be divided into two categories: biometric system and code recognition system.

Complete intelligent video surveillance security system, including security patrol alarm system, visitor alarm system and other intelligent security systems. Patrol alarm system uses pre-programmed security patrol software and card reader to monitor and record the movement state (punctuality, order, etc.). ) security, call the police in time in case of emergency. The visitor alarm system enables people living in the building to make two-way or visual calls with visitors. People living in the building can remotely open or close the entrance door or unit door in the building, and call the security center in time when an accident occurs.

Other intelligent security systems are set according to the needs of special security management. Such as GPS vehicle alarm management system, 1 10 alarm network transmission system, etc., it is also necessary to implement comprehensive management of vehicle access in the garage (or parking lot, etc.), such as access control, monitoring, traffic signal indication, parking billing, etc. ); In addition, for example, the security system of important warehouses must carry out effective entrance and exit control, anti-theft, monitoring and management of important warehouses in buildings. With the development and progress of science and technology, information technology has developed rapidly in 2 1 century, and intelligent security technology has entered a brand-new field. The boundary between intelligent security technology and computer is gradually disappearing. Without safety technology, society will be restless and the progress and development of science and technology in the world will be affected. The measurement of intelligent security technology must be carried out correctly according to the national security standards and relevant specifications, and based on the limit parameters of relevant standards.

With the development of intelligent security technology, the workload of intelligent security information technology is getting bigger and bigger and more complicated. At the same time, the resulting automatic test system has brought the development of digital security technology to a new height. Automatic test system technology is a new technology that organically combines computer technology, communication technology and detection technology. In the past half century, the combination of automatic test system technology and intelligent security technology has gone through three periods:

(1) Assembly period: Assemble a variety of program controllers with different functions and input and output circuits with different functions into an intelligent security control test system. The development, design and manufacturing cost of this intelligent security control test system is high, and it is difficult to maintain, which has certain limitations in the application of intelligent security technology.

(b) Standardized interface test period: This kind of safety test system uses special interfaces and changes the test function as needed. It is not only convenient to set up, but also flexible to use and excellent in performance, so it has been widely used.

(3) PC (personal computer based instrument) microcomputer testing period: The application of "virtual instrument" safety testing technology, which combines microcomputer and communication technology, has made the safety system take off to a brand-new height and had a great impact on the theory and application method of safety testing technology.

Therefore, we can clearly see that virtual instrument security testing technology will eventually become the development direction and inevitable trend of intelligent security technology. When building an intelligent security system, it is necessary to adopt the international common bus and interface, and the software and hardware must also adopt an open modular structure, so that the whole intelligent security system has good interchangeability and interoperability, and the system has a high degree of standardization, which is compatible with various virtual instrument related components and convenient for modification, update and upgrade. Software design must meet the following requirements:

1, software design should have high quality reliability;

2. Software design should have high quality and high efficiency;

3. The software should maintain the portability between different platforms and different operating systems, the maximum compatibility and interchangeability between different test interfaces, and the universality between different test systems.

The design of the above software is not only demanding, but also the following key technologies must be applied in the design:

(1), in order to ensure the portability between different platforms and different operating systems, VPP(VXI plug & amp; Play) standardizes the software development environment.

(2) The structured technology of VISA software, a virtual instrument software, is adopted to ensure the maximum compatibility and interchangeability between different test interfaces.

③ VPP (VXI plug &; Play) standardizes the driving structure of the software to ensure that the instrument driver has good compatibility and universality.

(4) The open database ODBC interconnection technology and SQL database query language are adopted to ensure the universality of the software.

(5) The design method of modular software structure is applied to improve the flexibility, portability and maintainability of the system software, thus reducing the complex performance of the system.

- .

With the sustained growth of China's economy and the continuous improvement of people's living standards, especially the improvement of material living standards, people are no longer satisfied with the traditional living environment. People pay more and more attention to their personal safety and property safety, and put forward higher requirements for the safety of people, families and residential quarters. At the same time, with the rapid development of economy and the rapid increase of urban floating population, new problems have been added to urban social security. To ensure the safety of the community and prevent theft and robbery, we must have our own security system. The security mode of civil air defense is difficult to meet our requirements, and intelligent security has become the current development trend. With the continuous progress of science and technology, the application of cutting-edge science and technology is becoming more and more common. Advanced technology and experience at home and abroad have been widely used in all walks of life, and security work is no exception.