Advanced Search:

Contact us

联系我们

Telephone:(852) 2838 3620

Email:sales@silverwing.com.hk

Address: Unit 2, 4/F, Kwai Cheong Centre, 50 Kwai Cheong Road, Kwai Chung, New Territories, Hong Kong

Application and Development Trend of Bank Security Intelligent

Source: Time:2017-11-28 16:11:37 views:

        In recent years, from the public security organs to bank operators and even ordinary bank clients, they have set ever higher and higher demands on the banking security technology prevention facilities and deterrent crime deterrence methods. Especially at this stage, in-depth application of bank security intelligence is particularly urgent.

        In recent years, with the rapid development of technology and emerging technologies, emerging technologies such as 4K, H.265, big data, cloud technology and intelligent analysis are gradually applied in financial security and security to further speed up the pace of financial security and high-definition and intelligent development. With the deepening of intelligent technology, many important applications such as advance warning, automated information processing and biometric identification promote the safe and efficient management of bank security systems and make up for the existing security system's application of intelligent video alarm and monitoring technologies Shortcomings and shortcomings, while solving security system over-reliance on human control and management of the work problems. Based on the application of PBC security system, this paper makes some exploration and suggestions from several aspects such as improving the ability of early warning and automated information processing of security system and applying biometrics, for reference and reference.

一、the People's Bank security system main technology status quo

        At present, the PBC Head Office is gradually implementing a four-tiered network of distribution security systems. Most of the existing PSB security systems have established a comprehensive security management platform in the area, integrating integrated alarm, monitoring and access control Large main functions, the jurisdiction of the three levels of networking, the implementation of the alarm system uploading level, and to carry out remote off-site business inspection, access control at all levels gradually apply biological access control library. Specific technical application status as follows:

        First, pay attention to the application of physical alarm equipment and technology. Specifically, relevant key alarming devices are deployed at the front of key areas in the distribution area. For example, the distribution depot is equipped with infrared and vibration alarm devices and other indoor key areas are equipped with infrared alarm devices. The perimeter is mainly electronic fencing and infrared shooting. And then access the back-end bus system alarm control host, and finally through the alarm service software on the front-end equipment and zone cloth, disarm and other control management, which play a pre-warning function in advance.

        Second, gradually promote the use of network high-definition video technology. With the continuous development of the application of network high-definition video cameras, the price-performance ratio is higher than that of traditional analog video cameras, and the trend of replacing analog video cameras with the application and promotion of network high-definition video technologies has become a trend. Take the author's unit's key issue library security system to be built as an example, all the network HD cameras with the specifications of 1080P and above are planned and even the 4K ultra-high definition camera is started to be used. The quality effect is several times that of the traditional analog video, This is more conducive to real-time business monitoring and post-acquisition video playback evidence.

        Third, access control personnel access to gradually use biological intelligence recognition technology. Traditional access control methods such as credit card and password opening methods have the disadvantages such as easy loss of cards, lack of identity and low security, and are gradually replaced by biometrics such as fingerprints, face recognition, palm prints and finger veins . The grassroots units where the author is located have already implemented a variety of access control methods such as face recognition and fingerprinting in the key parts of the distribution base, ensuring to a certain degree the uniqueness of access to staff.

二、 the current lack of technical applications

        At present, many units run security systems to improve work efficiency, standardize business workflow, reduce business risks and hidden dangers, and further strengthen the early warning mechanism, there are also many problems and deficiencies.

1、 intelligent video alarm and monitoring technology combined with the presence of short board

        First, heavy physical alarm equipment and technology applications, light intelligent video alarm technology. Although the distribution area is equipped with a variety of alarm equipment and constitute a tight early warning zone, but if the alarm hardware, service software and network connections in any one of the three failure will affect the actual effect. Therefore, the intelligent video alarm technology includes the advantages of cross-border intrusion alarm, item loss alarm and so on, thus forming a powerful complementarity.

        The second is the importance of video surveillance quality, light intelligent monitoring technology. Take the complex point area in the banknote handling area of the reservoir area as an example. Now it is fully equipped with a 1080P network high-definition video camera. The video surveillance quality of all operators is extremely clear and can play an important supervisory role. However, it lacks intelligent analysis of human behavior, Potential violations of the lack of intelligent means of analysis can not play a preventive role in advance.

2、 a large proportion of human control and management, lack of application of intelligent technology

        First, security systems and equipment routine routine inspection completely manual mode of operation, by the guard on duty every shift to conduct regular inspections, both man-made operation consumes a lot of workload, but also due to different aspects of human quality inspection results and the actual situation There is deviation, affecting the normal system maintenance and equipment maintenance. Second, the handling of alarm information is not intelligent enough. After the alarm occurs, the subject that triggers the alarm lacks intelligent tracking and only the video triggered by the linkage is monitored by the passive. If it is necessary to actively track the target, you must rely on human control and positioning and tracking operations There is a certain degree of difficulty. Third, after the video retrieval access to evidence relies entirely on manual repeat operations for the retrieval of a large span of time, large flow of people generated massive video recording to tracing the source is extremely difficult.


三、the future application of intelligent technology focus and direction of development

        In view of these existing problems, the People's Bank of China will mainly strengthen the application of the following aspects in the development of security and intelligence in the future:

        1, pay attention to the actual application of intelligent analysis technology, strengthen the security system in advance warning and automated information processing capabilities

        First, to set up a dedicated intelligent analysis server or an intelligent analysis server based on an NVR-based storage server for the distribution library security system, the invention has the advantages of high processing and analysis performance, fast response time, combined with technologies including transboundary intrusion detection, automatic tracking of behavioral objects and human behavior analysis, Item loss detection, wandering detection and other intelligent video analysis technologies, which provide a powerful supplement to the existing alarm modes and enhance the advance warning and handling of issues in the security management of the distribution library. Specific application can refer to the following:

         ① intrusion detection and zone alarm. For the surveillance cameras provided in the perimeter of the reservoir area and in key areas within the reservoir area (such as handover area, security gate, door of the warehouse, etc.), the alarm area or boundary line is delineated. If the alarm occurs during normal working hours, the alarm will be activated. When monitoring a camera in the same zone fails, it can automatically alarm and link with other surveillance cameras (PTZ control) in the zone to locate and rotate and make a backup recording to prevent the video from being lost due to human damage. For example, in the more important handover venue, issue warehouse Internal and other key areas can be set accordingly.

        ② automatic tracking of behavioral objects. First of all, a three-dimensional digital reconstruction (modeling) of the reservoir area is required. The surveillance video in different locations is displayed in the form of a label in a three-dimensional scene model. According to the actual situation in the reservoir area, the video resources are integrated and monitored by means of video tags, and the movement track of the personnel in the reservoir area is visually displayed through the associated video tags. Change the operation mode of the existing motion track mainly based on human-controlled tracking behavior object, and automatically associate the tracking camera with the surveillance camera in the key area of the distribution area, especially the PTZ control mode camera, and supplement the fixed camera in the video-related label area, When the automatic tracking of blind spots exist, the fixed camera to take over, to ensure that the tracking object is not lost within the video surveillance.

        ③ human behavior analysis. Focus on the banknote handling business manual operation of targeted human behavior intelligent monitoring and analysis, such as the banknote complex point, the more frequent violations will automatically trigger the alarm, which can be controlled in advance and timely intervention.

        ④ personnel or items left behind analysis. In sensitive areas such as the issuance of library security doorway, important access points and other locations, should be related to the video surveillance configuration intelligent legacy analysis and monitoring functions, especially for non-normal working hours and remain in these areas or objects automatically trigger the alarm, and Timely disposal.

        ⑤ wandering detection. Release of library security doorway, important access points and other non-detention area configuration of people or vehicles hovering detection and analysis functions and automatically trigger the alarm.

        Second, to strengthen the automation information processing function of security system, especially the application of automated inspection technology, instead of the traditional manual inspection operation mode, intelligently analyze and test the operational status indicators of the security system and equipment of the distribution library, including the integrity of the video, the storage of video Time, camera video quality status, network equipment network status, server and various PC equipment work status, hard disk status, UPS and mains status, temperature and humidity, etc., automatically generate the relevant report data. Taking video quality status diagnosis as an example, the video quality diagnosis function is introduced to simulate video brightness abnormalities, snow interference, fringe interference, freeze, noise, occlusion, signal loss, brightness and sharpness of the analog camera and the IP camera. , Color cast, picture movement and other video quality parameters for testing. When detecting abnormal video quality, automatic operation and maintenance system issued early warning information, and after confirming by guardian of the monitoring center, a maintenance order can be automatically formed and assigned to the corresponding system operation and maintenance personnel. Harvatek system can track the whole process of maintenance, operation and maintenance services, response speed, maintenance results, quality of service management evaluation.

        Thirdly, with the increasing application of security monitoring equipment, it analyzes and extracts valuable information such as audio and video, picture and alarm data, for example, after accident accidents, such as retrieving and retrieving evidence through post-interview videos, etc., Data mining and analysis technology is essential. At present, the more mature technologies include video summarization and video recording technology, which not only can realize long-time original video compression, form brief summary video, improve the efficiency of playback clues collection, but also create event tags , In the video playback, you can use the event tag for quick retrieval, saving time and labor costs.

2、biometrics intelligent technology in-depth application

        Biometrics will be more widely used in access control of financial institutions. The existing application of more fingerprints, face recognition technology has its drawbacks, such as some people fingerprint characteristics are not obvious, such as fingerprint fake, face recognition by the light environment and so on. The finger veins, irises and other identification with its high accuracy, fast, large storage capacity, easy to operate and other advantages of the future will be more applied to the access control management, of which, in particular, the development of iris recognition technology is the most promising in the key Some banks in the financial sector have begun to put into use and promote. As an advanced biometrics technology, the error rate of iris recognition is as low as one millionth, which is an application technology with high security so far. The development prospect of the future is worth looking forward to.


                                          Home |  About us |  Product  |  Solution Provider  |   News |  Contact us  粤ICP备17091917号-1

                              HK Address: Unit 2, 4/F, Kwai Cheong Centre, 50 Kwai Cheong Road, Kwai Chung, New Territories, Hong Kong


Top