1.Network alarm system
The network alarm system is to use the telephone line ( PSTN) , the Internet ( TCP / IP , wireless ( GSM) and other communication networks to connect the client's modern electronic anti-theft alarm equipment with the company's alarm center alarm network information control and management platform. All kinds of status reports and police reports of all control communication hosts within the company, remote programming of front-end equipment, monitoring of system operation and communication line working conditions, etc. The 24- hour reception center and crisis handling team will deal with the police situation in a timely manner and effectively combat crime To avoid loss of customer property.
Specifically, after the front-end detector installed in the customer unit and the designated area alarms, the alarm information is encoded into digital signals by controlling the communication host and transmitted to the receiver of the alarm center via the communication network. Time and place, after receiving detailed user information, the police officer reports or relays police information through the network or other equipment. Depending on the severity of the police situation, the area where it is located, and the deployment of security forces at the scene, the commander of the reception center or the crisis management team decides the distribution level and direction of the police situation, and directs the patrol and security personnel to handle the situation. When encountering major police information, the crisis team will promptly notify the relevant management personnel, work out an effective solution in a short time, and notify the relevant departments to implement it immediately.
2.Remote monitoring system
The remote monitoring system is a remote video monitoring system, which consists of three parts: front-end equipment, image processing and transmission equipment, and network client. The front-end equipment is composed of cameras, gimbals, alarm detectors, pickups, etc., and is responsible for the collection of video signals, audio signals, and alarm signals; the image processing and transmission equipment is a network video server, which is responsible for passing audio and video signals and alarm signals through a local area network or The WAN is transmitted to the remote client, and at the same time, it can receive the PTZ control signal and audio intercom signal sent by the client; the network client refers to the user terminal that needs remote monitoring of the network. The computer (common office computer or laptop) and the client Software. The client is mainly responsible for image display, video recording, playback and PTZ control. When the client performs remote monitoring, the user name and password need to be entered for identity verification, and remote monitoring can be achieved after authentication.
3.Smart home system
Smart home system is the use of advanced computer technology, network communication technology, integrated wiring technology, in accordance with ergonomic principles, the integration of individual needs, organically related to each subsystem related to home life, integrated intelligent control and management through the network , To achieve a " people-oriented " new home life experience.
The smart home system controls the intrusion alarm, smoke control, emergency buttons, light control, curtain control, gas valve control, information appliances, Various subsystems such as scene linkage are centralized and partitioned to various control terminals, including scene mode operation panel field control, mobile tablet computer touch screen control, remote control, mobile phone and remote network control, etc. Home, meeting guests, entertainment, good night " six scenarios, reflecting the all-round, humane design concept. For example, when the home mode is set, the porch lights are automatically turned on, the bedroom lights are turned on at 50% brightness, the TV area lights are 70% bright , curtains, air conditioners, and TVs are automatically turned on, and the security system is automatically turned off; when set to leave home mode, the room All lights and curtains are automatically closed, air-conditioning, audio and video, television, gas valves and other equipment are closed, and the security system is automatically opened. In this mode, if someone opens the doors and windows, an automatic alarm system will be triggered. The TV horn will sound an alarm. The user's mobile phone will prompt the doors and windows to be opened illegally. The company's alarm center will also receive an alarm signal. The duty staff will confirm the truth of the alarm through video images. It will inform the user by phone if the real situation is true. At the same time, the nearest security officer will be rushed to deal with it in time to realize the three-way linkage between the scene of the alarm, the user and the monitoring center.
4. Intelligent transportation system
Intelligent traffic management uses a front-end high-definition camera, detection equipment, and processing host to detect video images and processing systems. It is connected to an optical fiber network and transmits image information to a monitoring center for processing in real time. The traffic bayonet system, electronic police system, speed measurement The subsystems such as the system are integrated into an intelligent traffic management platform that can be used independently and can be controlled as a whole. Through the real-time road surface analysis of multiple channels such as electronic distribution maps and real-time images, the information display of each road section is displayed. Multi-channel command and information release, such as on-board radio broadcasts, effectively divert and divert traffic on urban roads, highways, and specific roads, etc., to improve the rate and utilization of urban road traffic, reduce the losses caused by traffic accidents, and improve The effect of urban traffic management. This system is mainly used for traffic management on urban roads, highways, and specific areas.
5.Intelligent security inspection system
Apply aisle management systems and security inspection systems to security inspection equipment in airports, nuclear power stations, subway stations and other important places to realize the shunting of people, cars, and objects and the safety management of objects. The aisle management system divides people and cars organically to realize shunt management; the security inspection system realizes the safe detection of people and things (metals, gases, explosives, suspicious objects, etc.). At the same time, adding image recognition equipment at the entrance and exit to perform image recognition of people and objects entering the security inspection area can play a good role in identification, judgment, early warning and retrospection. The intelligent security inspection system can be linked with the alarm center through a dedicated network or the Internet to achieve maximum security in the region. The system is mainly used in airports, nuclear power, immigration, border defense, finance, exhibitions and other places.
6 , building intelligent engineering
Building intelligent engineering is to adopt modern information network technology to carry out precise design, optimized combination, and careful construction, and set up a physical intelligent space in the building. Based on the building entity, it integrates advanced intelligent technology, Internet technology and comprehensive information Technology, automation control technology, and digital and intelligent technologies are flexibly applied to all aspects of the building, reflecting the high degree of self-control and convenience of the building. Specifically include : network system, security system, building equipment automation control, fire protection system, office automation system, integrated wiring system, etc., as well as access control, attendance, consumption, intercom, computer room (air conditioning, monitoring, UPS , lightning protection grounding, etc.) , Conference, parking lot, information release, multimedia query and other subsystems.
7. Enterprise Information Security Management System
The enterprise information security management system is embedded in the computer through the development of advanced security software, which can encrypt computer files, prevent computer screen recording operations, monitor and manage QQ chat records, U disk storage, and mail sending and receiving. Computer games and movies are prohibited.
8.Parking lot management system
The parking lot management system is a set of network systems that manages the entry and exit of parking lot vehicles, on-site traffic flow guidance, and collection of parking fees through computers, network equipment, and lane management equipment. It is an indispensable tool for professional garage management companies. It collects and records vehicle entry and exit records and on-site locations, and implements dynamic and static comprehensive management of vehicle entry and exit and on-site vehicles. The system generally uses a radio frequency induction card as a carrier, records the vehicle's entry and exit information through the induction card, implements the charging strategy through management software, toll accounting management, lane equipment control and other functions.