AI, Cloud, and Internet of Things technology engines drive industrial transformation Security moves from solution to ecological construction

Looking back at the development of the security industry in the past year, driven by the powerful horsepower of technology engines such as artificial intelligence, cloud, and Internet of Things, with intelligent video as the axis, the industry has undergone great changes in both depth and depth. The original relatively linear industry extended a diversified tree structure and continued to expand new industrial boundaries. Foreword: Jubilee 2017 is gradually drawing to a close, standing on the node of time, reviewing the development of the security industry in the past year. Driven by the powerful horsepower of technology engines such as artificial intelligence, cloud, and Internet of Things, it is based on intelligent video. Industry has undergone great changes in both depth and depth, making the original relatively linear industry extend its diversified tree structure and continuing to expand new industrial boundaries. In the past year, the security industry in artificial intelligence outlets is in the process of taking off. The 2017 China International Public Security Expo (hereinafter referred to as “AMB”) held in Shenzhen, China in late October revolved around artificial intelligence. Collective imagination allows us to see the unprecedented grand event of this industry. According to the "China's Security Industry Development Plan for the Thirteenth Five-Year Plan (2016-2020)" issued by the China Association for Security and Cooperation, it is pointed out that during the "Thirteenth Five-Year Plan" period, the security industry will upgrade to scale, automation, and intelligence, and by 2020, The total revenue of security companies has reached 800 billion yuan, and the annual growth rate has reached more than 10%. AI, Cloud and Internet of Things Technology Engine Drive Industry Transformation AI is the most popular tag in the security industry since 2016. Based on the characteristics of the industry with the largest amount of video data and the most abundant data layers, security has become the first field of artificial intelligence applications. If 2016 is said, the industry is focusing on artificial intelligence. In the front-end intelligent hardware product research and development, then in 2017, we can clearly see that after the catalysis of the time, the mainstream companies in the industry are gradually completing applications from front-end smart cameras to back-end smart servers to upper-layer access industries. The complete solution layout process. With the gradual maturity of AI technology, the multi-featured structural analysis of people and vehicles under complex scenarios has now reached a higher level. In the past two years, a number of approved star products have emerged in the industry, such as Hikvision's "Falcon" and "Blade" structured servers, and Dahua's "Smart" series of video structured servers. The "Falcon" and "Haiyan" structural analysis systems, Yushi's "Kunlun II" and so on are all representative of the productization of video structuring technology. Under AI blessing, the structural analysis of people and cars has changed a lot compared to before. In the past, only simple recognition and simple analysis were used. After adopting deep learning algorithms, the system can collect a large number of samples to extract feature databases for in-depth analysis. Faster processing speed (second-level retrieval of multi-billion data), higher recognition accuracy (accuracy of face and license plate recognition can reach 99.5%+ in the industry). Now, richer identification content (face, Identification of the human body, license plates, and complex environments. In order to better grasp the actual needs of the public security frontline, in the past few years, we have also seen more and more security companies have begun to actively cooperate with the public security department to build a policing and actual combat laboratory. The police and enterprises cooperate and use artificial intelligence, big data, etc. Leading-edge technologies help refine the complex operations of business units. With the help of targeted applications such as video and video networking, video big data, video combat, video surveillance, and portrait intelligence analysis, the public security industry has achieved an unprecedented level of business response and policing efficiency. . 2017 was also the year that the security industry migrated to the cloud. In the face of cloud and big data applications and complex and ever-changing challenges, some companies in the industry have actively launched cloud services in the past two years. The first is to solve massive data. Analyze and deal with the storage and computational pressure brought about by the data center. Second, after the cloud, the cloud platform's high scalability and unified control application advantages. At this point, at the 2017 Expo, Cloud Edge has become a new system architecture model. The collective preaching of leading security companies heralds the concept of "all computing" in the age of intelligent security! The arrival of the Internet of Things era has also left a deep imprint on the security industry in the past year. Based on the tremendous potential of the Internet of Things and the relationship between security and the Internet of Things, many domestic listed companies have passed mergers and acquisitions to expand the Internet of Things field. business. Including Orient Power, Gao Xinxing, Suzhou Keda and other enterprises, the Internet of Things is a complex system that integrates sensing, communication, networking, computing, and control technologies. It is playing an increasingly important role in the security field. There is a more realistic significance for security companies to expand the Internet of Things business, and the concept of “Great Security” is further constructed by combining the close relationship between security and the Internet of Things. For example, in the construction of smart cities, through the placement of sensor-based equipment at key locations and locations in key cities, comprehensive evaluation of the concentration, distribution, and flow of people at a certain time, place, and related occasions can be given and feedback can be given in a timely manner. The centralized back office uses the analysis function of big data to predict in advance the possible vehicle congestion and the distribution of people flow, avoiding the occurrence of various security incidents. In addition, the Internet of Things technology can also be widely used in environmental monitoring, urban management, and emergency disaster prevention to build a new barrier for urban security. The emergence of new forces in CV companies The first two years in the Internet + trend has also attracted a group of Internet companies involved in the field of security, such as 360, Xiaomi, etc. However, they all choose to use their own brand of home video cameras into the consumer security market, using the consistent The Internet marketing model has circled the "fans" between home and small and medium sized business users, but it still has no great penetration in the professional security market. After entering the age of artificial intelligence, the new players still exist. However, with the new appearance, with the help of artificial intelligence, this time a successful group of professionals who have successfully entered the security area has come from computer vision. Known as the face of the four dragons of the business Shang Tang, the world, according to plans and cloud from. The collective appearance of the high-profile four small dragons at the Yashang Fair in 2017 made many old security guards vigilant. Traditional security intellectualized video technology barriers that were carefully constructed over the years have come alongside the CV companies with the advent of the artificial intelligence era. Situation, and this coincidence lies in the structuring of video images. The more focused argument is face recognition. In the artificial intelligence track, face recognition is one of the more mature applications. In many international face recognition authoritative test contests, the performance of the four dragons is among the best. Of course, laboratory data can not explain anything. Traditional security companies and CV companies understand that even the best algorithm level can only be applied to practical applications. Only in the scene can it reflect its value. While the old security in the industry is deepening the application of public security and transportation services, CV companies are also actively using the advantages of face recognition algorithms to attack cities and cities, such as safe cities and smart cities. Let's briefly experience the "records" of CV companies in the security market in the past two years. Based on science and technology, it has established the largest portrait matching library in the country and even in the world. As of now, according to the map, in the provincial and municipal public security applications, it has helped nearly 20 public security departments to establish a provincial portrait platform and participated in more than 100 cities. The establishment of the public security portrait platform system; contempt for cooperation with the Ministry of Public Security, as of September of this year, contempt of the face recognition system has been landing in the Ministry of Public Security and dozens of provinces and cities across the country, accumulating assistance to public security agencies around to capture criminal suspects more than 3000 people; cloud from the technology in the field of security, promote the Chinese Academy of Sciences and the Ministry of Public Security to cooperate fully, through the Ministry of Public Security major issues research and development of the fire eye face big data platform and other intelligent systems, the product has been on the line in 23 provinces and actual combat; finally Shangtang Technology, Shang Tang has the ability to return results at the millionth-level database in the public security real-time map detection (search for maps) business, quickly realizing the identity identification and identity of the people involved in the case, and thus helping front-line police officers to accurately and timely Detection of cases to improve the efficiency of routine case detection... These are just simple mentions of CV companies in public security projects. From the perspective of their business coverage, smart cities, transportation, finance, public security laws, etc. have all become areas of their face recognition projects, based on artificial intelligence innovations. The business model of security applications and traditional security vendors is highly coincident. Although the application of artificial intelligence in the security field is at an initial stage of development at the present stage, CV companies are not yet able to leverage the status of traditional security companies, but with the deepening of security and AI. In the future, these two forces are bound to conduct higher-level contests. The deep accumulation of both parties in the security industry market, as well as the technical advantages in artificial intelligence algorithms, competition or cooperation, also requires rational thinking among enterprises. Back to the market development level, in the security industry, the most used artificial intelligence algorithms are still in the field of video images, because the products of traditional security companies are related to video images. However, for public security and other business applications, video images are only a small part. Public security applications also require network information, communication information, social information, and so on. In the future, the security industry will also need to base on video and image information to open up various heterogeneous information. On the basis of massive heterogeneous information, the advantages of various artificial intelligence algorithms such as machine learning, data analysis, and mining will be fully exploited to create a security industry. More value. Security moves from solution to ecological construction Ecology is also a high frequency word frequently mentioned by manufacturers in 2017. In the past few years, we have seen that in the industries, the phenomenon of cross-industry integration has become more and more obvious. Whether it is the extension of new businesses by security companies, or the involvement of non-security companies in the security industry, it is between the intelligent industries. The gap has become smaller and smaller, and the market outlook for ecological structures is gradually being formed. Security industry from the solution to the ecological construction is an inevitable trend in the development of the industry to a certain stage, abb Lin Jian, product marketing manager of China Electric Products Division, said that the future of the security market demand will become more and more complex. It is difficult for a hardware supplier to provide it all, and only a weak installation company can integrate the integration solution. Therefore, the development and integration of product solutions are very important, both on the hardware side and in the cloud. Fu Liquan, chairman of Dahua, also stated that “security is itself a part of large commercial technology and environment. The original industry’s upstream and downstream industry chain has its business model of delivery and re-construction. In this process, manufacturers Can contact their own customers. But in the future development, the business environment is no longer the industrial chain, but the ecology, it is a mode of interdependence, coexistence, mutual development, and jointly create value." The security industry has developed into a relatively mature industrial system. With the advancement of the industry towards intelligence, the subsystems involved have become more and more abundant, from the upstream chip algorithm to the middle reaches of hardware and software vendors, system integrators, and then Downstream to end-users, as more and more manufacturers move toward an overall solution, and convergence in the application of large-scale intelligent systems in the industry, in the future, the intersection between upstream and downstream will become closer and closer. It is a business overlap, but only a handful of companies can cover the whole industry. Ecological cooperation will become the new normal of the security industry.