安全防范技術系統經歷了由簡單到復張、由分散到組合與集成的發展變化,它從早期的單一的電子防盜報警系統,發展到與視頻監控聯動的報警系統,再到與視出/入口控制連的綜合防范系統,直到社區管理以至現在的平安城市的集防盜防火控、視頻監控、出/制、訪客查詢、保安巡更、停車場及加油站管理、智能交通、電子報、入融、電力、石化、軍事、公安與黨政部門等)的監控管理及系統綜合的情票、重要單位(如控與管理的安防技術體系等。
智能化的監大家知道,一個完整的安防系統應具有如下3個基本要素。
1)入侵探測
即能及時發現防范區域內的各種異?,F象。安防系統探測的對象主要是人及其行為。非法的行為稱為入侵,所以安防系統的探測又稱入侵探測。實現探測的設備為報警(探測)器,紅外探測和微波探測是最常用的探測技術。早期探測器設計得很簡單,如被動紅外探測器與門控用和節水用的紅外傳感器沒有什么差別,因此誤報警率很高。其他一些報警器也是如此,所以誤報警率高成了困擾早期安防系統的一大難題。
2)視頻監控
安防系統要能對探測的結果做出評價(判斷其真偽),能控制事件發展的過程,了解事件處置的結果,必須具備監控的手段。在早期安防系統中用聲音來進行監控較多,成本也比較低廉。隨著電視技術的成熟和普及,圖像監控成了主要的監控手段。由于圖像信息量大、實時性好,并具有主動探測的能力,逐漸成了安防系統的核心技術,在安防系統中占有很大的比重。目前只要有安防,就必有視頻監控,這已成了定式。
3)周界管理和出/入口控制
周(邊)界是安防系統需要明確的防范區域,即通過各種物理的、技術的手段,組成一個封閉的周界,并通過與周界結合的出/入口,對人、物的出/入進行管理和控制。安防系統應保證合法出入防范區域的人和物的出入通暢,有效發現和阻止非法的出/入。顯然,門禁是出/入控制的常用設備。高強度的門配備高安全的(防盜)鎖是最古老的門禁設備,電子控制、采用特征識別技術的系統是現代門禁的典型方式。但兩者的構成要素是相同的。
The security technology system has experienced the development and changes from simple to complex, from decentralized to combination and integration. It has developed from the early single electronic anti-theft alarm system to the alarm system linked with video monitoring, and then to the comprehensive prevention system connected with visual access / entrance control, until community management and the integrated anti-theft and fire control, video monitoring, access / control Visitor inquiry, security patrol, parking lot and gas station management, intelligent transportation, electronic newspaper, financial services, electric power, petrochemical, military, public security and party and government departments, etc.) and system integrated information tickets, important units (such as security technology system for control and management, etc.).
As we all know, a complete security system should have the following three basic elements.
1) Intrusion detection
That is, various abnormal phenomena in the prevention area can be found in time. The objects detected by the security system are mainly people and their behavior. Illegal behavior is called intrusion, so the detection of security system is also called intrusion detection. The equipment to realize detection is alarm (detector). Infrared detection and microwave detection are the most commonly used detection technologies. The design of early detectors was very simple. For example, there was no difference between passive infrared detectors and infrared sensors for gating and water saving, so the false alarm rate was very high. Other alarms are the same, so the high false alarm rate has become a major problem perplexing the early security system.
2) Video surveillance
The security system must be able to evaluate the detection results (judge their authenticity), control the development process of events and understand the results of event disposal. It must have monitoring means. In the early security system, it is more to monitor with sound, and the cost is relatively low. With the maturity and popularization of television technology, image monitoring has become the main monitoring means. Due to the large amount of image information, good real-time performance and the ability of active detection, it has gradually become the core technology of the security system and occupies a large proportion in the security system. At present, as long as there is security, there must be video surveillance, which has become a fixed pattern.
3) Perimeter management and access control
Perimeter (edge) is a clear prevention area for the security system, that is, a closed perimeter is formed through various physical and technical means, and the access / entry of people and things is managed and controlled through the access / entry combined with the perimeter. The security system shall ensure the smooth access of people and objects legally entering and leaving the prevention area, and effectively detect and prevent illegal entry / exit. Obviously, access control is a common equipment for access control. High strength doors equipped with high security (anti-theft) locks are the oldest access control equipment. Electronic control and system using feature recognition technology are typical ways of modern access control. However, the constituent elements of the two are the same.