With the increasing use and discussion of video surveillance systems, more and more CSOs are beginning to discover that it is necessary to incorporate video into overall IT security. Mr. CTOEricEaton of BRS Labs provided us with five criteria for evaluating video surveillance solutions.
This article refers to the address: http://
Video surveillance used to be the only part of physical security. The operator sits in front of multiple video recorder screens, each of which displays the field of view of a camera, which is used to detect the presence of a security incident in a particular area. But as time goes by, more and more people have indicated that in order to better protect a collective security, more cameras need to be installed, and video information must have more observation angles.
When people add more cameras to the video surveillance system, finding potential threats from countless video recordings requires IT analysis tools. With this in mind, CSOs have found that they need to integrate an important physical security solution and incorporate video surveillance systems into overall IT security. People need to understand what the video surveillance system can do and what it can't do. At the same time, some problems have been exposed. People need to understand the evaluation criteria for video surveillance solutions, and what can be done to help improve existing systems.
Abandon the algorithm and start learning
Now, the advent of video analytics software makes it possible for the user to read the camera's output information, and automatically warn when an abnormal behavior is detected. The earliest systems often had 10 to 12 cameras. The operation time is 6 months. Once installed, it means that it cannot be upgraded and expanded. Therefore, it makes no sense to invest more money in this because they exist only as a tool for alerting specific behaviors. For example, an organization deployed a system to detect whether a parking lot has been stolen at night. Within 18 months, the system notified that there was a car theft (the police officer stopped to check the parking lot). If so, is it too expensive for people to provide a system with only one or two valuable information in 18 months?
If a specification is to be made for a single anomalous activity, such a system has to face challenges as a video surveillance system. In general, in this case, organizations will look to operate similarly to existing products, and with the help of IT departments, they can use network video streams to detect anomalous behavior. A variety of tools are available on the market today. In terms of function, they not only support better viewing of video, but also support analysis of the digital output information of the camera, so as to understand and judge abnormal behavior in real time, and detect all abnormal activities without any human input. alarm.
Unconsciously, people have seen the transition from algorithms and regulatory systems to this, which helps improve video surveillance systems. The key to a good monitoring system is that they can behave normally, so they can detect suspicious behavior and help predict and prevent future threats. By filtering the daily activities, you can reduce the burden on security personnel and focus all of their energy on the detection of abnormal activities. This can help raise awareness of threats in relevant organizations while reducing response time to potential threats.
Scalability is key
Video analytics technology has the ability to learn, depending on computing power. This requires organizations to ensure that the system can meet the needs of larger video surveillance business development. Therefore, scalability is critical. It's amazing to deploy a fair amount of video surveillance systems in a city. In June 2007, it was estimated that there were 4.2 million CCTV cameras in the entire city of London.
Manual operation is not only expensive, but also limits the effective scalability of the system. If the video surveillance system does not perform a certain function, it may be necessary to manually calibrate each camera when determining the detection area. Systems that support expansion will allow video surveillance systems to increase the number of cameras and expand the field of view of video recorders as development evolves. Therefore, as the size of an organization grows, the corresponding video surveillance system can be upgraded. Increasingly, in order to detect larger areas, organizations have expanded video surveillance equipment, and they hope to provide self-adjusting solutions as opposed to manual operations. Deploying a video surveillance system also requires an enterprise-level architecture to better accommodate all hardware and server extensions when analyzing video.
From cameras to video hub devices or to network video storage, vendors can send all types of digital video streams multiple times. Most solutions provide recording and centralized control to limit most of the electronic real estate used by video surveillance equipment.
Compatible with multiple video technologies
But what happens once the video stream is concentrated or stored? If video streaming is required to be streamed to the analytics engine, compatibility becomes especially necessary to ensure that different types of applications can be used. To process the video. Video surveillance systems that perform better on scalability should also meet open, non-patent video standards (such as Real-Time Streaming Protocol, RTSP) to facilitate the release of video information to as many people as possible.
It is not easy to distribute video streams through open standards. Every camera manufacturer has the right to format or draft an agreement for mobile data. This is not a problem for traditional closed video surveillance systems because only one vendor is involved in the entire process. Today, with the advent of analytics-based solutions, surveillance systems are moving in a more open direction, enabling the IT industry to choose the best analytics. And perhaps facing the need to run analytics across multiple manufacturers' products to meet growing business needs. At the same time, video processing devices may need to be used simultaneously with video browsing devices and video storage devices. Therefore, if there is no long-term plan before, it can lead to duplication of equipment purchase. So it is necessary to purchase video processing equipment that meets open standards, so that they can operate in parallel on one device.
As video surveillance systems become more complex, it is more important to choose compatible products from manufacturers. Even if some video surveillance vendors try to do one-stop services, the user's need for scalability and compatibility will drive manufacturers to abandon the production of dedicated cameras and turn to open standards-compliant solutions. As a result, the revolution in the video analytics industry is about to happen, and innovation becomes critical. With so many innovations and demands for video surveillance, implementing open standards is also beneficial for maximum compatibility.
Digital video and security
Today, a versatile video device includes cameras, viewing points, video storage and playback, video analysis and analysis processing. People may encounter situations such as remote monitoring of video, posting local video information to remote locations, and even encrypting video streams. Video is no longer a purely video, it has become a type of IT data type. Like all other types of data, digital video needs to be analyzed, shared, transferred, archived, searched, and more. Since video surveillance systems are a necessary tool to get the most value from the data, it is even more important to comply with open standards.
Since video surveillance can be used as a data technology, security personnel have to deal with video data like other data. Video data must also be integrated into data security devices and electronic signature technology used to ensure that data has not been tampered with. Existing authentication and security systems excel in controlling who has the right to view data and coded transmissions. Event management will be an important aspect of handling security incidents. In special cases, in the case of government agencies, when the video surveillance system issues an alert, security personnel need to enter relevant notes describing what actions they took to resolve the crisis or resolve the security incident and provide audit trails. . It is a matter of course that video data must comply with industry standards if it is to be integrated into a secure facility.
Working together on the "standard"
Today, efforts in video data standards are still in their infancy. Manufacturers spontaneously organized standard associations. Manufacturers themselves have also begun to develop strategies to bring together different parts of different technologies: how data is transmitted, how video streams are encoded, and so on. However, efforts in this area are relatively fragmented.
In fact, to make the video surveillance system achieve interoperability, it is impossible to achieve it by the manufacturer alone. Video surveillance system solutions with interoperability and scalability are only possible with the participation of end users. Constant exploration of standards and compliance with industry rules can drive the transition to video surveillance solutions, which will be valuable and accessible to CSOs and larger security situations.
When it comes to video surveillance, most people will think of such a picture that often appears on TV. Interpols look up on the surveillance video of the bank ATM deposit machine or bank business hall to investigate financial fraud crimes; or Traffic police use the video surveillance screen to process or report traffic accidents or blocked traffic on urban road traffic on the big screen. Over the years, video surveillance systems have moved from the little-known behind the scenes to the front desk and into the lives of ordinary people. Community entrances and exits, road monitoring (electronic police), etc. have become the experience of sensory video surveillance that people can reach at home.
Network video surveillance in various fields
With the development of China's economy and the speed of urban construction, the scale of the city is expanding, and the population is densely populated and the floating population is increasing. This has led to urban management problems such as transportation, social security, key areas and industry prevention in urban construction, and public security police. The increase in speed that is far from meeting actual demand has brought great pressure on urban public security supervision. The “Safe City†project started in China in recent years is very important.
In fact, video surveillance has been applied as an important tool in various industries, and it has been extended from the original financial, commercial, transportation, residential, and community industries to all walks of life. For example, various large-scale sports events, the 2008 Olympic Games in Beijing, the 2010 World Expo to be held in Shanghai, the Asian Games in Guangzhou in China, etc., in these major sports events and venue construction, video surveillance The application is the most basic condition to ensure the success of these events. In the urban heating system, the life of urban residents and the safety of various heating facilities are guaranteed; the application of urban port monitoring, in addition to ensuring safety, monitoring the port goods, preventing the entry and exit of unsafe items such as e-waste; The application of large pharmaceutical factories in the industry and so on.
It is precisely because of the demand of market applications that the size of the security market and the market prospects are widely optimistic. According to the data, since 2000, this market in the network camera terminal products has grown rapidly from US$42 million in 2000 to US$421 million in 2005, with an annual growth rate of 58.6%. Starting from 2006 It is also the market for network camera terminal products, with an annual growth rate of 70%. By 2008, the global network camera terminal market will reach US$2.068 billion. According to market research firm Frost & Sullivan, the global video surveillance equipment market is expected to rise to $8.6 billion in 2010, with a compound annual growth rate of 11%. With the deepening of China's safe city construction and application in important industries; the upgrading of network digitalization and intelligent network video surveillance applications, the development of China's carrier-grade video surveillance market will be more rapid, and China will occupy as an important market. Very large part.
Development of network video security monitoring technology
With the development of optoelectronic information, microelectronics, network communication, digital video, multimedia technology and sensing technology, security monitoring technology has moved from traditional simulation to highly integrated digital, networked and intelligent. Since digital signals have the advantages of strong anti-interference ability, small distortion, transmission-free distance limitation, and convenient storage and query, various digital video technologies have been rapidly developed. The traditional security system has gradually transitioned to a digital video surveillance system that integrates network, sensing and communication technologies with image processing as the core.
The development of the monitoring system has experienced the development of the first generation of full-simulation systems, the second-generation part of the digital system, and the third-generation fully digital system (network camera and video server). The four-generation all-IP era is advancing.
The evolving network technology provides an increasingly perfect physical platform for the monitoring system. With the continuous expansion of the digital monitoring application field, the network monitoring application system becomes more complex and huge, and the monitoring network process also exposes many problems. Due to the complexity of the implementation process of the network video surveillance project, the capture of the front-end video, the transmission of the mid-end network, and the intelligent monitoring of the back-end, etc., due to the rapid development of security applications, the system standards of various vendors are not uniform, in the network. When interoperability management, the compatibility between the system and the equipment is serious; the upgrade of the old analog system and the current network digital intelligent system, and the success of the integration of various devices, systems and networks; The interconnection of carrier-class network operators and proprietary networks, the access coordination of various departments, etc.; for now, relevant standards are already being formulated, and network video monitoring middleware for security fields to solve related problems and applications is also beginning to appear. Our special issue also introduces relevant experts to the security middleware.
The Computer World Program Evaluation Laboratory has been paying attention to the development of network video surveillance and the application of the security industry for many years. This program evaluates the application and development of the security industry and security, including users, vendors, experts in the security field, etc. I have done a very detailed investigation and selected two areas that are relatively mature and meaningful in the current application. The main application of network video security monitoring in the "safe city" and banking and financial fields is to the mainstream applications in the security industry. Vendors collect solutions or cases.
Because the security industry and applications not only include a variety of complex technologies, equipment and products, but also require very high system and engineering experience, this group of computer world program evaluation laboratory invited experts, they not only in China security standards The committee and the China Security Association Expert Committee hold important positions and have many years of experience in the industry, including experts who have been engaged in the construction of practical projects for security applications for many years, so that they can evaluate solutions or cases more accurately from different angles.
Pos With Pda,Pda With Built In Thermal Printer,Pda With Printer,Handheld Android Pda
Shenzhen Qunsuo Technology Co., Ltd , https://www.qsprinter.com