Automobile repair combination tools, household combination tools, telecommunication combination tools, electric combination tools, sleeve combination tools. Multi-combination tool set, household tool box, hardware tool set, 44 pieces, 25 pieces, 16 pieces, custom engineering models (7 pieces of tool set) Combination Tools,Combination Socket Tool,Combination Tool For Hand,Telecommunication Combination Tool Rugao Yaou Import & Export Trade Co., Ltd , https://www.ntyaous.com Security Product Analysis Report 1. Security Product Classification Introduction 1. DVR Introduction DVR is a Digital Video Recorder (also called: Personal video recorder, PVR) - a digital video recorder or a digital hard disk recorder. We are familiar with it as a hard disk recorder.
It is a computer system for image storage processing. It has the functions of long-term recording, recording, remote monitoring and control of images/voices. DVR integrates video recorders, picture splitters, pan/tilt lens control, alarm control, and network transmission. With five functions in one, one device can replace the functions of a large number of devices in an analog surveillance system, and it will gradually gain an advantage in terms of price.
DVR adopts digital recording technology and is far superior to analog monitoring equipment in image processing, image storage, retrieval, backup, network transmission, and remote control. DVR represents the development direction of TV monitoring system and is currently on the market. The preferred product for television monitoring systems.
Popular products on the market include PC platform DVRs and embedded DVRs. Embedded DVRs have the advantage of being "specialized" in terms of stability, reliability, and ease of use, and embedded DVRs will gradually invade the DVR market of PC platforms. PC platform DVR has advantages in terms of versatility and expandability. It still can afford to manage the role of the host in the network video surveillance system, and still has its own market share.
Due to price, performance, and other reasons, DVR products in the domestic market are dominated by products in Greater China and South Korea, including Taiwan. Mainland companies have the advantage of “Made in Chinaâ€, but they are almost entirely dependent on technology. Foreign technology development has not mastered key technologies for the development of core chips and embedded motherboards. The company's technological innovation capability is relatively poor. Taiwan and its neighboring countries, South Korea, are stronger than mainland companies in this respect.
At present, many companies in foreign countries have invested funds to develop multi-channel MPEG-II, MPEG-4 compression chips, and wavelet image compression chips. The emergence and application of new compression chips will enable digital network video surveillance to a new era.
At the same time, as the capacity of storage devices continues to increase, prices continue to decrease, new storage technologies develop, and all-digital and high-definition cameras continue to improve. High-quality image standard products will be put into the market and become digital network video surveillance. The new darling.
In addition, during the development of new products, companies should also pay attention to establishing a unified standard through industry associations so that products of different companies can truly share data through the network, and should be connected as seamlessly as possible with other subsystems in the building intelligent system. Realize unified management and control of building systems.
The hardware of the DVR system is mainly composed of a CPU, a memory, a motherboard, a video card, a video capture card, a chassis, a power supply, a hard disk, and a connection cable. Let us analyze the stability and reliability of these components from the viewpoint of systems science.
2. Introduction of CCTV Camera CCTV=Closed Circuit Television CCTV is an image communication system. Its signal is only transmitted from the source to a prearranged special TV set that is connected to the source. Widely used in a large number of different types of surveillance work, education, video conferencing and so on.
Closed-circuit television is relative to TV open-circuit television broadcasting.
There are two types of radio broadcasting, wireless broadcasting and cable broadcasting. The open broadcasting of a television station is equivalent to wireless broadcasting (where the user obtains television signals from an antenna), and the closed circuit television is equivalent to cable broadcasting. (Cable mode: The television signal is transmitted from the satellite transmission end to the cable. Designated user). It transmits the television signal through the wire. It mainly transforms audio and video signals into a certain radio frequency signal (ie, a certain channel) so that it can be transmitted in a closed-circuit television system.
Closed-circuit television generally refers to televisions used for broadcasting, such as industrial television, military television, medical television, and underwater television.
The simplest closed-circuit television is to use a video camera to send the shooting signal to the monitor through the TV cable, and the shooting signal can also be sent to multiple monitors through the demultiplexing amplifier.
CCTV has a wide range of applications and is expanding at an unprecedented rate. It can be said that in all sectors of the national economy, wherever modern technologies are used, CCTV is indispensable.
Closed-circuit television monitoring system (example) is an important part of the security technology protection system, and it is an advanced comprehensive system with strong prevention capability. It can be used for remote control cameras and their auxiliary equipment (lenses, heads, etc.) Directly watching all the conditions of the site being monitored, it can also be operated in conjunction with other security technology prevention systems such as anti-theft alarm systems to make it more capable of prevention. The technical requirements of the CCTV surveillance system are mainly: the definition of the camera, the transmission bandwidth of the system, the signal-to-noise ratio of the video signal, the format of the television signal, and the camera.
3, IR Camera Introduction IR is the meaning of infrared commonly used is the IR interface full name is: infrared is the infrared interface Charge Coupled Device (CCD) charge coupled device. CCD is a semiconductor device that can convert optical images into digital signals. The tiny photosensitive substance implanted on the CCD is called a pixel. The more pixels a CCD contains, the higher the screen resolution it provides. The CCD acts like a film, but it converts image pixels into digital signals. CCD is widely used in cameras, digital cameras and scanners, except that the camera uses a dot-matrix CCD, which includes both x and y directions for taking a planar image, and the scanner uses a linear CCD. It has only x One direction, scanning in y direction is done by the scanner's mechanical device.
4, CCD Camera Introduction CCD, English Charge Coupled Device is the abbreviation of the charge-coupled device, it is a special semiconductor device, there are many above the same photosensitive element, each photosensitive element called a pixel. The CCD is an extremely important component in the camera. It functions to convert light into electrical signals, similar to human eyes, so its performance will directly affect the performance of the camera.
There are many indicators to measure the quality of CCD, such as the number of pixels, CCD size, sensitivity, signal to noise ratio, etc. Among them, the number of pixels and the size of CCD are important indicators. The number of pixels refers to the number of photosensitive elements on the CCD. The picture taken by the camera can be understood to consist of many small points, each of which is a pixel. Obviously, the larger the number of pixels, the clearer the picture will be. If the CCD does not have enough pixels, the sharpness of the captured picture will be greatly affected. Therefore, theoretically, the number of CCD pixels should be as large as possible. However, the increase in the number of CCD pixels will reduce the manufacturing cost and the yield, and under the current television standard, after the number of pixels is increased to a certain number, the effect of increasing the sharpness of the captured screen becomes insignificant. Therefore, the general one Millions of pixels are enough for general use.
A single CCD camera means that there is only one CCD in the camera and uses it for the photoelectric conversion of the luminance signal and the color signal, wherein the chrominance signal is completed by using specific color mask devices on the CCD in combination with the following circuits. Because a CCD finishes the conversion of the luminance signal and the chroma signal at the same time, it is hard to avoid the need of both, so that the photographed image can not meet the requirements of professional level in color reproduction. To solve this problem, a 3CCD camera appeared. 3CCD, as its name implies, is a camera that uses 3 CCDs. We know that if light passes through a special prism, it will be divided into three colors: red, green and blue. These three colors are used by our TV. Three primary colors, through these three primary colors, can generate all television signals including luminance signals. If you use a CCD to accept each color and convert it into an electrical signal, and then process the image to produce an image signal, a 3CCD system is constructed.
Compared with single CCD, because 3CCD converts red, green and blue signals respectively with 3 CCDs, the image taken from the color reproduction is more natural than the single CCD, and the brightness and sharpness are better than that of a single CCD. However, due to the use of three CCDs, 3CCD cameras are much more expensive than single CCDs.
The CCD column in the digital camera specification sheet often reads "1/2.7 inch CCD". The "1/2.7 inch" here is the size of the CCD, which is actually the length of the CCD diagonal.
Existing digital cameras generally use 1/2.7 inch, 1/2.5 inch, and 1/1.8 inch CCDs. The CCD is a collection of light receiving elements (pixels) that receive light transmitted through the lens and convert it into electrical signals. . With the same number of pixels, the larger the CCD size, the larger the unit pixel. In this way, the unit pixel can collect more light, so in theory it can be said to help improve the picture quality.
However, the quality of the digital camera is not only determined by the CCD. The performance of the camera and the circuit for forming an image by the electrical signal output by the CCD can also affect the image quality of the camera. The so-called "large size CCD = high quality" is incorrect. For example, although the 1/2.7 inch is smaller than the 1/1.8 inch size, a digital camera equipped with a 1/2.7 inch CCD is not criticized for its poor picture quality.
Nowadays, compact digital cameras have become smaller and lighter. For design considerations, most of them use small 1/2.7-inch CCDs.
The 1/2.7-inch "type" is sometimes written as "inch", but it is not the ordinary "1 inch = 25.4mm" here. Due to the combination of the camera tube and the display mode used on the CCD before the camera is unveiled, it is customary to use a special size. 1/2.7 inches is 6.6mm, 1/1.8 inches is about 9mm.
Second, security monitoring knowledge For more than 20 years, video surveillance systems have gone from the first generation of 100% analog systems (VCR) to the second generation of partially digitized systems (DVR/NVR) to third generation fully digital systems ( Network Cameras and Video Servers) Three stages of evolution. In this process, although the video surveillance system and equipment have been greatly improved in function and performance, it is still limited by some inherent factors, including human beings as the monitor's own physical weakness, it also contains Video surveillance system configuration and video surveillance equipment limitations in terms of functionality and performance. These limiting factors make all types of video surveillance systems more or less flawed in the accuracy of the alarm, many false positives and false negatives, long alarm response time, difficulty in analysis of video data, etc., resulting in the security and practicality of the entire system. Reduced sex.
In recent years, with the rapid increase of network bandwidth, computer processing capacity and storage capacity, and the emergence of various video information processing technologies, the advantages of full-scale digital and networked video surveillance systems have become more and more obvious. Their high degree of openness and integration The flexibility creates the necessary conditions for the overall performance improvement of video surveillance systems and equipment, and also provides a broader space for the development of the entire security industry. New application models and market opportunities are emerging, while intelligent video surveillance is It is one of the most advanced application modes in the field of network video surveillance.
The concept of intelligent video Intelligent video (IV, Intelligent Video) originated from computer vision (CV, Computer Vision) technology. Computer vision technology is one of the branches of artificial intelligence (AI) research. It can establish a mapping relationship between images and image descriptions, so that computing can understand the content of video images through digital image processing and analysis. The intelligent video technology mentioned in video surveillance mainly refers to: “Automatic analysis and extraction of key information in video sources.†If the camera is seen as the human eye, and the intelligent video system or device can be seen as human Brain. Intelligent video technology uses computer's powerful data processing functions to perform high-speed analysis on massive data in video frames, filter out information that users don't care about, and only provide useful key information for the monitor.
Intelligent video surveillance is based on digital and networked video surveillance, but it is different from general network video surveillance. It is a higher-end video surveillance application. The intelligent video surveillance system can identify different objects, detect abnormal conditions in the surveillance picture, and can provide alarms and provide useful information in the fastest and best way possible, thereby more effectively assisting security personnel in handling crisis and maximizing Reduce false positives and false negatives. In today’s increasingly tough world fight against terrorism, intelligent video surveillance can clearly become a powerful tool to respond to terrorist attacks and handle emergencies. In addition, intelligent video surveillance can also be applied to a variety of non-security related scenarios such as traffic management, customer behavior analysis, customer service, etc. to improve the return on investment of users.
Advantages of intelligent video Intelligent video surveillance is based on common network video surveillance. In addition to the well-known advantages of network video surveillance, intelligent video surveillance systems can also bring greater benefits to users:
24x7 All-weather reliable monitoring: Thoroughly change the previous mode of monitoring and analysis of surveillance screens by security personnel, and perform continuous analysis on monitored images through intelligent video modules embedded in front-end devices (web cameras or video servers).
Greatly improve alarm accuracy: Front-end devices (webcams and video servers) integrate powerful image processing capabilities and run advanced intelligent algorithms that allow users to more accurately define the characteristics of security threats, effectively reducing false positives and false negatives, and reducing Useless data volume.
Significantly increase the response speed: identify suspicious activities (such as someone leaving a suspicious object in a public place, or someone staying in a sensitive area for too long), and before the occurrence of a security threat, the security personnel can be alerted to relevant monitoring screens to prepare in advance It can also enable users to more precisely define the actions that should be taken when specific security threats occur, and the monitoring system itself ensures that the crisis processing steps can be accurately performed according to the predetermined plan, effectively preventing human factors in the confusion. Delayed.
Effectively expand the use of video resources: Apply video resources to non-security areas, such as using the monitoring system of the mall lobby to automatically identify the characteristics of VIP users, and notify customer service personnel to perform service work in a timely manner; when someone in the crowd is found to have accidentally fallen, timely Inform the staff of the nearby mall to help. In addition, the intelligent video system can also help the owner of the retail store to count the number of customers patronized on the day to analyze sales and so on.
The main potential application of intelligent video The application of intelligent video can be roughly divided into two categories: safety-related applications and non-security-related applications. Security-related applications are the main smart video applications currently on the market, especially after the September 11 terrorist attacks, the Madrid bombings, and the London bombings. The demand for such applications in the market continues to grow. The main purpose of these applications is to assist the security department of the government or other agencies to improve the security of outdoor large-scale public environments. Such applications mainly include: Advanced VMD, Motion Tracking, Facial Detection, Vehicle Identification, and Object Persistence.
In addition to security-related applications, smart video can also be applied to non-safety-related applications. These applications are mainly targeted at retail, service and other industries, and can be seen as an aid to management and services to improve service levels and turnover. Such applications mainly include: People Counting, Flow Control, Attention Control, and Traffic Flow.
Domestic and international intelligent video market overview From the perspective of market demand, as counter-terrorism continues to be severe, smart video surveillance systems are attracting more and more attention and demand is rising. On the whole, the overseas smart video application market is transforming from the "concept verification" stage to the "scale application" stage, and intelligent video has slowly begun to form an industry.
Shortly after the conceptual model of smart video applications emerged, some foreign companies have already started to develop related software and hardware products. For example, Axis Network Communications Ltd., a global leader in the network video market, has launched its smart video products, including the AXIS 242S IV video server and the AXIS IVM 120 people statistics smart video application module. The AXIS 242S IV integrates a dedicated DSP chip (TI DM 642) with powerful image processing capabilities and supports the operation and development of third-party application software modules. AXIS IVM 120 people statistics intelligent video application module can make video monitoring equipment automatically calculate the number of people entering/exiting a specific area through the analysis of monitoring screens, which can effectively help managers in service, retail and other industries analyze business conditions or improve service quality. . Axis also plans to launch more intelligent video application modules in the near future, including license plate number identification, illegal detention, and so on.
Compared with foreign countries, there is still a big gap in the domestic smart video market, which is basically still blank. The "smart video surveillance" generally mentioned in the surveillance system actually stays on the concept of ordinary network video surveillance (IP surveillance, digital surveillance). However, with the market began to appear similar to foreign demand for intelligent video applications, some domestic manufacturers have begun to introduce smart video hardware and software products and technologies from well-known foreign manufacturers, plans to use the form of OEM launched in the country.
Conclusion Intelligence, digitalization, and networking are inevitable trends in the development of video surveillance. The emergence of intelligent video surveillance is a direct reflection of this trend. Intelligent video surveillance equipment has more powerful image processing capabilities and intelligent factors than ordinary network video surveillance equipment, so it can provide users with more advanced video analysis capabilities, which can greatly improve the capabilities of video surveillance systems and make video Resources can play a greater role. In order to promote the development of the intelligent video industry and achieve a multi-win-win situation, it is necessary to properly organize the monitoring equipment hardware suppliers, intelligent video software vendors, distributors and distributors, and system integrators to enable them to fully Give full play to their respective advantages and create a comprehensive solution that meets the needs of end users.
Third, the status quo of security monitoring and development 1.1 The status quo of security companies and the direction of change in business models 1.1.1 The status quo of security companies Security status of most companies is worrying. The video surveillance industry has low technical and financial barriers, the business model is easy to replicate, and many companies are highly competitive. The vicious circle of arrears of projects has been pushed forward from the engineering firms, manufacturers, and board merchants, which has reduced the profits of various types of businesses. Low-cost vicious competition, low cost of small businesses can accept lower profits, making large enterprises difficult to survive; domestic companies with strong capabilities are mostly located in the mid-end, and have technical distances with foreign high-end products and prices of domestic low-end products. , so it is not easy to survive.
Multinational corporations enter China's security market. Their product lines are abundant, their brand awareness is high, and they are well-funded. They can provide an integrated security system integration platform to meet the complete needs of users. Domestic small-scale workshop enterprises and smuggling illegal merchants carry out vicious price competition to make profits. Thinning.
1.1.2 The direction of change in the business model of security enterprises There are few domestic security companies with multiple perspectives and sufficient resources for integration. Faced with the pressure from large foreign companies on offensive and domestic small businesses, the cooperation is more important than competition.
Fine manufacturing and excellence are the way out for domestic security companies. Because from a global perspective, the trend is to shift from large-scale production to large-scale custom-made customizations, so doing well in the market segmentation and doing it exclusively is the way out.
Taking the road of group development is a shortcut for domestic security companies to become bigger and stronger as soon as possible. Horizontal integration of different related product manufacturers to form a complete product chain. Vertical alliances with upstream suppliers, downstream distributors, and engineering firms can be loose, shareholdings, or mergers and acquisitions. Enterprises cooperate to set up loose organizations (such as membership), operate together, coordinate development, share benefits and risks.
1.2 The export of security monitoring equipment is the only way to develop 1.2.1 Development process of security monitoring equipment in foreign trade From the perspective of overall development, the export of security monitoring equipment “10th Five-Year Plan†is the initial stage, and “Eleventh Five-Year Plan†is the development stage, and will be heavy and have large breakthrough. According to the "Eleventh Five-Year Plan" of the security industry, the export value of security export in 2010 will account for more than 20% of the total sales of the industry.
1.2.2 Foreign Trade Competition Currently, the export market is dominated by Europe and North America. Taiwan and South Korea are our main competitors. Taiwan has many low-end products, and the short delivery time is its advantage. Korea is better than the national product in terms of technology and functions. , More in the local production, exports more, the domestic mostly low-end products, the chip is constrained, so the development is limited.
1.2.3 Status Quo of Foreign Trade Development At present, foreign trade is mainly based on branding, and there are a small number of independent brands. It is the direction to vigorously develop independent brands, but it takes a long process. OEM is still in the run-in period, but not far from the rapid development stage.
1.2.4 Problems with Export Development There are no suitable channels or partners for those who want to export equipment, and most of them do not understand foreign markets. There are also some manufacturers that are not very clear about the standards of foreign products.
1.2.5 Development Ideas for the Export of Security Monitoring Devices 1. The OEM is still the mainstream at present. The sales volume of self-owned brands and OEMs is estimated to be 9:1. First, the OEM profits are higher (about twice as high as domestic sales), and the second is through stickers. The production process of the domestic manufacturers of the brand and the needs of the foreign consigner are continuously in close contact with each other, so that their manufacturing capabilities, technical strength, and the degree of product internationalization have been greatly improved; in addition, the OEM can also make full use of the advantages of the social division of labor and improve Production volume, cost reduction, upgrading of technology, speeding up of product entry into the market, shortening reaction time with market demand, management level and manufacturing process.
2. The development of self-owned brands is an intangible asset that can improve the brand through the direction of its own brand. The existing independent brands sell more through agents, and localization services are very important. Our competitive advantage is still cost, but the cost of export, especially the labor cost of the Pearl River Delta, is gradually rising, and its advantage is declining.
3. Parallel development of the two approaches For OEMs and private brands, companies at different stages of development should adopt different strategies. Well-developed companies should have their own brands. Enterprises with poorer conditions should improve their technology and gain profits through OEMs. Enterprises in the middle position must develop in parallel in both ways. Enterprises can solve technical and financial problems through OEMs, and establish channels to solve capital and market problems through well-known brand agents.
1.2.6 The specific improvement measures for the export of security monitoring equipment Recommendations 1. In terms of market development, use foreign large-scale security exhibitions, seminars and influential security technology periodicals to intensify publicity efforts, and at the same time deepen the cooperation with foreign private industry organizations and large-scale security companies. The contact, to attract foreign customers to take the initiative to come to inquire, and promote further cooperation.
2. Strengthen channel construction and coordinate channel conflicts between OEMs and their own brands. For OEMs, try to avoid cooperation with informal and unreliable merchants, so as not to affect the image of self-owned brands; for private brand building, the number and level of agents should be reduced at the initial stage to strive for powerful ones. Professional distribution, agents, to prevent confusion of channels, product trading prices are unclear.
3, in the product positioning, should not be low-cost appeal, the product should be located in the mid-range or mid-range high cost performance moderate. In terms of price positioning, reference can be made to a certain price point between domestic products and foreign products in the same file. Product appearance design, packaging, practicality and international qualification certification should be specialized and user-friendly in accordance with the specific needs of local users.
4. In terms of market positioning, different products and business strategies can be adopted for markets in different regions. For example, with the mid-range products entering the Southeast Asian market, the European and American markets are dominated by OEMs, and the Middle East, Africa, and South America markets can be accessed at low prices.
5. In terms of business management, it is necessary to pay attention to foreign counterparts to learn advanced management experience, especially the professional manager system, and pay close attention to and timely absorb relevant international professionals.
1.3 Security Financing Status and Recommendations for Security Enterprises 1.3.1 Current status of security corporate financing How to solve the normal operation of corporate cash flow is a major issue facing security companies. Because the security industry’s payment is serious, it has been profitable in the early years and the project hours are still acceptable. Now it directly threatens the life of the company. The engineering company’s payment will be passed by the manufacturers and card readers, which will make the entire enterprise chain sluggish. On the other hand, most domestic security companies started from small private enterprises and are now reaching a stage of rapid development. At this stage, the funds for maintaining corporate growth have increased significantly, so much higher than the company's own original accumulation of funds, but due to bank loans. Difficult. Therefore, there is a long-term conflict between the long-term development of enterprises and financial support.
Listing and capital operations (acquisition, mergers, financing, venture capital) are both opportunities and risks for security companies. They should be treated with caution. If they are not properly handled, they can easily lead to abnormal development or be subject to control. The channel for obtaining funds should not only concentrate on the external environment, but also more importantly, it must do a good job in the management of the enterprise. Naturally, the enterprise will take the initiative to find a good investment (such as national science and technology funds, foreign venture capital, foreign large enterprises in joint ventures in cooperation Etc.) Several companies in Hangzhou demonstrated this.
1.3.2 Security Enterprise Fund Management and Financing Recommendations Manufacturers gradually recognize the seriousness of the pressure problem and begin to control the funds. Such control will be gradually transmitted to dealers, engineering firms and users. This will gradually improve the financial status of various companies in the chain.
Selecting investment or partners to choose long-term development awareness of corporate investment or cooperation, such as collaborators eager for quick success and immediate attention only to the immediate interests of the daily operation and management is very unfavorable.
Promote the internal communication within the industry, and it is more likely that the industry will seek capital cooperation (such as financing) because of mutual understanding of the operation process and business background.
With regard to funding issues, the general management of internal investment is more confusing and attracting foreign investment is better because foreign parties generally operate in a formal manner and are not easy to intervene in management, and they are concerned about long-term development rather than blindly pursuing immediate interests.
Establish a joint guarantee system and establish related organizations to help solve corporate loan issues.
In the aspect of enterprises guiding government investment (such as science and technology funds), the association should play a greater role and the energy of the enterprise alone is not enough. The association should provide enterprises with financing, joint venture, and cooperation services, and establish internal and external funding channels (inside the industry, foreign companies, and other industries).
1.4 Strengthen the brand building of the roadmap for the development of the security brand 1.4.1 The history of the development of the domestic security industry brand The history of the brand development of the domestic security industry has gone through the period of brand ignorance (79-83 years) and the brand's infancy (84-96 years). Now it has entered Brand development stage (after 1997). The brand development stage can be further divided into the brand awareness period (97−02) and the brand competition period (after 2002).
1.4.2 Strengthen brand building to allow users to receive your product Brand building is generally a process of creating a brand - promoting a brand - brand expansion and extension - developing a brand - protecting a brand.
At the current stage of focusing on brand competition, the competition means of the merchants are quite different from those in the past. At this time, companies should not only improve their own competitiveness by improving equipment productivity, technological R&D capabilities, labor productivity, and price cuts, but should also rely on the system optimization of talents, knowledge, and management to compete with the brand's advantages. Enterprises must achieve a strategic shift from "product management" to "brand management."
2.1 Development status of the security industry The security industry has developed rapidly and has begun to take shape. As of the end of 2004, the security industry has a market size of more than 400 billion yuan. Among them, 45% of the security equipment market, 55% of the security engineering market, 8% of exports, and about half of the monitoring. Small enterprises with annual sales of less than 10 million yuan account for more than 90%, and it is estimated that the production value will reach 150 billion yuan in 2010. The average annual growth rate of the security industry is 25%, with 15,000 employees and 1 million employees. The security industry is moving from the start-up period to the development period and is now in the development phase, but it is still far from the mature period. The industry industrial chain has basically taken shape, and the management chain is gradually being established. The lack of a superior method has led to a vacuum in some areas of industry management.
The development potential of the security industry is huge, the market will continue to expand, and demand will be even stronger. The current security market has low access thresholds and fierce competition. The market order is very irregular. The industry initially formed three major security industry clusters in the Pearl River Delta, the Yangtze River Delta, and the Beijing-Tianjin region. The security industry has formed more than a dozen or more than 8,000 products based on video surveillance, entrance and exit control, intrusion alarm, and explosion-proof security inspection. The scope of security applications has become increasingly widespread, and security applications have become increasingly in-depth. However, some "vacuum" zones have emerged in the management of the security industry. This constitutes opportunities and threats for the development of the security industry.
2.2 Opportunities and Threats for the Development of the Security Industry The international anti-terrorism situation, the development of the western region and the revitalization of the northeast, the 2008 Olympics and the Shanghai World Expo, domestic urbanization and rapid urban construction, the construction of safe cities, and the frequent occurrence of security incidents in some application fields constitute the security industry. The main positive factors for development; and security and other conditions for internal and external environmental impacts are mostly positive and negative, such as accession to the WTO, multi-industry companies entering the security market, domestic security products export situation, and the impact of the security market order is mainly It is negative.
At present, industry associations are taking the lead in establishing five major security systems to solve existing problems: national and industry technical specifications and standards systems; industry certification system, industry training system, system security assessment and evaluation system for security project construction, and industry credit system.
2.3 Problems and Trends in the Development of Security Technology The main problems in the development of domestic security technologies are: 1. Low research and development capabilities of high-tech security products, new products and core technologies rely heavily on imports, fail to form an orderly technological innovation system; Existing security technology systems do not meet the requirements for integration, digitization, networking, and intelligence; 3, poor technical support environment for security management, lagging standards, low product detection, certification assessment methods; 4, security management system or network operation management is not Normative, alert mechanism is not perfect; 5, security basic theory research is weak, restricting the effectiveness of security technology.
The development trend of security technology is mainly manifested as follows: 1. Digitalization, networking, intelligence, and integration are the directions; 2. Step-by-step establishment and improvement of security technology innovation system; 3. Development of 4C technology (communication/computer/control/multimedia display technology ), Intelligent Building 5A System and Intelligent Transportation ITS System; 4. Network Technology and Multiple Security Technology Implementation Integrated R&D; 5. Created and improved comprehensive security service network at all levels. Social security dynamic monitoring system, city early warning system and safe city construction are new opportunities in the domestic security industry.
2.4 Problems existing in security companies and markets The main problems in domestic security companies include: 1. The qualifications of construction companies are not well-defined, and there are fewer capable system integrators; 2. The lack of enterprise management capabilities, and the inability to adapt to and resist risks; Lack of corporate brand awareness, unbalanced development of various types of products, and the improvement of personnel quality; 4. Insufficient market development of enterprises; insufficient promotion of product application and popularization; 5. Large number of enterprises, production lines, small average production scale, low profits, multiple identities Severe cross.
The main problems in the domestic security market include: 1. Regional and industry monopolies, unbalanced development of regional markets, severe fragmentation, 2. Infringement of counterfeit and infrequent parts in some areas, exaggerated problems with agents, severe smuggling, and weak market supervision; 3 , disorderly competition, competing prices, causing market confusion; 4, rapid development, but the overall size of the company is small, the threshold is not high.