Technical development forecast of security industry in 2019
time:2019-01-10
In order to find a new way out for development, security companies have crossed the border to UAVs, robots, smart locks, etc., while Internet companies, IT companies, and artificial intelligence companies have also placed security defenses. Huawei and Tencent are pointing to the integrated and inclusive circle. The passive security of the real estate developer Guardian and the upstream supply chain, Nvidia, the more the security circle is played. Unconsciously, the security industry has entered a fierce competition and murder. Faced with the strong entry of the Internet, AI, and IT companies, the company has achieved a major "cleansing" of the security market, and washed away the products and enterprises with low competitiveness, so that enterprises with real qualifications, technology, and accumulation can turn to IT. / Internet companies learn to make rapid product changes and technological innovations. At the same time, with the rapid iterative update of products, it provides users with better services, and also obtains more channel resources and communication resources for enterprises, which promotes the sound development of the entire security industry.
Face recognition technology is standard for security products
Face recognition is non-contact and non-intrusive. It can be directly recognized by the camera within a certain distance without touching the human body, thus achieving a wider range and more information collection without the need of being collected by the collector. accept. For applications in an open public environment, face recognition technology has incomparable advantages. At the same time, the face application mode is more mature with the cloud computing technology, and the cost is also greatly reduced.
From the camera to the NVR, the face recognition function is undoubtedly applied in video surveillance. It has become a standard configuration, enabling a wide range of applications such as face control, face search, and face comparison. At the same time, the application of face recognition in access control products is also basically popular. Face recognition functions such as face opening, face visitor, and human witness verification are all configured with face recognition function. In theory, the hands are basically liberated. In practical applications, smart buildings, smart communities, smart cities, road monitoring and other places have begun to lay out large-scale products with face recognition functions.
Today's face recognition technology is mature enough to ensure that it has reached a steady state. In addition, the face recognition function is not limited to edge applications, and the cloud face recognition comparison is favored by large-scale smart projects because of low cost. This emerging technology has brought about a turn for traditional business upgrades and expansions, as well as opportunities for new ventures to disrupt existing landscapes.
The
proliferation of smart chip manufacturers lays the foundation for the application of artificial intelligence in the security industry With the rapid development of artificial intelligence, as the top priority of the artificial intelligence industry, AI chips have become the most popular investment field, and various AI chips emerge one after another. In the field of artificial intelligence chips, foreign chip giants occupy most of the market share, both in terms of talent pooling and company mergers. Domestic artificial intelligence companies also present a situation in which hundreds of schools contend. According to statistics, at least a dozen AI chips were available in China last year, and the upgrade period of chip products was generally 12-24 months. Nowadays, such a hot and intensive market bombardment is like a collective carnival of AI chips.
AI chip makers rushed into the 2018 AMB conference, and 16 chip manufacturers participated in the exhibition. Among them, except for Cambrian, Shenzhen, Bitian, Horizon and other startups, the security chip leader Hess also showed four. New products of AI chips, from the perspective of products on display, smart chips can be described as highly competitive.
Depending on the application scenario, artificial intelligence chips can be applied to the cloud and device edge. At present, the cloud chip market has been exhausted by the giants, and the overall pattern has not changed much. The survival space of startup companies is small. However, the variable at the edge is undecided. After the edge calculation was submitted by Hikvision in 2017, most of the manufacturers follow up the layout this year. The attention continues to rise, and the edge-end chip market is growing, attracting more and more chip manufacturers to join. At present, the edge-end chip market can be said to be a group of talents, and opportunities still exist.
The main role
of video surveillance is unwavering. With the video surveillance becoming more and more high-definition and ultra-high definition, the data scale is exponentially increasing exponentially. The data generated by the video surveillance service is mostly unstructured data, which gives the traditional Data management and usage mechanisms pose significant challenges.The application point of artificial intelligence is video intelligent analysis. Based on the huge amount of video data in the security industry, it has certain advantages in developing big data, deep learning, cloud computing and other technologies. At the same time, it expands and accumulates related software and hardware technologies through video intelligence analysis. Business area.
The video cloud and big data layout are basically completed
. The charm of big data is not “big” but “useful”. Value content and mining costs are more important than quantity.Therefore, for the security industry, the transformation of unstructured data into structured data, and the in-depth exploration and effective use of these large-scale data is the inevitable direction of the layout. Ali built the city brain, Huawei's high-profile video cloud, Haikang proposed AI Cloud, Dahua released the heart of HOC city, who will dominate the SDT security big data industry to the basic characterization.
With the introduction of a series of policies, the big data national strategy is accelerating, and “digging out gold mines” from big data is the stage to truly test the core hard technology of enterprises. Enterprises need to down-to-earth, step by step to iterate out products that meet the needs of the times, and on the basis of maintaining independent research and development and innovation, tap the market potential, take root in the vertical field in specific applications, and solve the practical problems encountered by users in big data management. Start with the actual application to drive the industrial chain and improve market competitiveness.
SVAC standard set off a small spray
The SVAC 2.0 standard has been officially implemented for more than a year. The SVAC standard does have many improvements for monitoring applications, especially compared to SVAC1.0, SVAC2.0 in digital signal processing algorithms, operational efficiency, and stability. Other aspects are more mature. In particular, SVAC 2.0 has greater security in terms of data security, image coding efficiency is further improved, and information security level is also higher. However, due to technical maturity, cost and other issues, the popularity of the SVAC standard cannot be achieved overnight. Although the SVAC industry alliance lineup continues to expand and expand, some leading companies in the industry and many foreign companies still hold a wait-and-see attitude.
Before the 2.0 standard came out, Qianmu Juyun had fallen. At present, Zhongxing Technology is unique in the field of SVAC, from chip to product, solution, and complete product line. In addition, Xinbo Electronics' first low-power SVAC2.0 codec chip was exhibited in China. No other manufacturers exhibited SVAC-related products at the 2018 Beijing Expo. However, with the appeal of the Ministry of Public Security to domestic security monitoring vendors, it is inevitable that the players will be gathered together. With the strong support of the national policy, the road ahead will be looming.
Internet access control
From this year's AMB meeting, face recognition, NFC, QR code and other methods of opening the door formally integrated into the access control, access control, video surveillance, intercom has been mature. Among the products and solutions exhibited at AMB, the most widely used is face recognition technology. Most manufacturers have installed face recognition modules for gates and door machines. However, for the access control project, the realization of face recognition has a large cost pressure, and the recognition technology of card, NFC and two-dimensional code is relatively low in cost. Therefore, while face recognition captures the access control, NFC and II The application of the dimension code also meets the needs of different levels of the market.
In the author's interview, there is even a saying that the access control industry is about to “disappear”. Of course, this “disappearance” is not the disappearance of the true meaning, but is completely integrated into the video surveillance to form a comprehensive solution. The solution can be dominated by the access control system or the video surveillance system, depending on the customer's needs.
The AI vent is blowing into the access control industry, and wisdom has become the key to the development of the access control industry. It can also be seen at the 2018 AMB meeting that many enterprises use the "smart access control" as the entry point to lay out the community O2O. Most of the old-fashioned access control enterprises have the real estate resource base, combined with artificial intelligence technology and access control Internet and intelligent development trend. Give the access control market a huge new business opportunity.
IoT integrates burglar alarms
With the rapid rise of technologies such as the Internet of Things, cloud computing and artificial intelligence, the burglar alarm industry has also shown a new look. The burglar alarm enterprise began to approach the direction of the object-sensing sensor, and based on the advantages of sensor technology, it expanded the vertical industry market such as smart home, smart hotel and smart pension. The common system architecture in the vertical industry market is to flexibly combine various types of sensors to deploy targeted system solutions according to specific scenarios. With the advancement of technology, the development of anti-theft alarm technology is changing with each passing day. The integration of various innovative technologies has also provided great convenience for them, speeding up the rapid development of the anti-theft alarm industry.In the AMB meeting, the author was fortunate to see the alarm system composed of PoE technology and wireless transmission technology. It is convenient to deploy, install and debug freely. It is a benchmark for the technical progress of the alarm industry.
In recent years, due to various reasons, the alarm industry has shrunk. In order to achieve long-term development, the alarm enterprises must strengthen the introduction and application of various new technologies and new products, and build a comprehensive alarm service platform to meet market demand. Through technology and product changes, we will provide security services to our customers, thereby enhancing market competitiveness and opening up new horizons in the alarm service market to promote the long-term development of enterprises.
Summary After
the artificial intelligence landed in the optimal industry, the security industry has become the entry point for smart city layout. In the domestic security market, on the one hand, product homogeneity is serious, price war is getting worse, and single hardware profit is almost very difficult; on the other hand, the demand for smart city and smart transportation construction led by the government is growing, and the entire security industry is showing huge Development space.
In the future, with the support of national policies such as “Internet +”, “smart manufacturing” and “artificial intelligence”, information technologies such as the Internet, biometrics, artificial intelligence, cloud computing, and big data will be accelerated into the security industry and eventually formed. A huge security circle guards the people to live and work in peace.