Integrated security platforms are integrated by several or more subsystems linked together, such as video, access control, security, etc. These sub-module integrated IP networking interfaces by docking the way the majority of its requirements in the design of video surveillance, access control, burglar and other systems with network capabilities, while providing an interface protocol. A core function of the security management of the data integration platform, and the second is to achieve interconnection between the subsystems. Therefore, security integration platform should have the following characteristics: integration, reliability, openness, applicability, consistency, scalability. Objectively speaking, the core security integration platform is actually a massive security monitoring system and management software, as opposed to general monitoring software, its stability is very good, because it controls the amount of equipment and data management very large. From the view of the entire integrated security integration platform, which can be roughly divided into three parts, the front / back-end modules, integrated management and client service platform. Security integration platform for various information resources needed for video, audio and alarm system will be integrated with the processing of networked devices, users, networks, security, business and other integrated management, and provides third-party applications with other business systems, etc. interface platform to achieve resource sharing and integration of information between different systems. Monitoring resources of various heterogeneous access management platform, the management platform to transmit monitoring information (including images, sounds, alarm signals and data services, etc.). Users can access the terminal management platform, sharing all kinds of information resources, processing and analysis judgments. These sub-modules are logic function modules, integrated portfolio can also be flexible configurations. Compatibility, since most integrated security platform with an open layered component-based software architecture, using unified device control interface, can not modify the upper application software, based on an increase of only some independent device driver modules , mainstream manufacturers can achieve the unity of different types of devices are compatible. Including: access control video encoder different encoding formats and access DVR, mainstream manufacturers of different types of multi-stream mode network camera access, access control matrix of different models of mainstream manufacturers, analog systems and digital systems and operation, etc., are not because of the new device is compatible with the access which led to frequent upgrades platform. In terms of security, because security integration platform used for some of the major security projects, faced a lot of device access and data transmission and storage, and how to ensure the safety of the platform, is a major issue to be studied. First, the key equipment integrated security platform, the module should have a backup or redundant measures, there should be a backup system software and maintenance support capability, and have strong fault tolerance and system recovery capabilities. Each unit has a platform with the ability to resist the intrusion of viruses, support 7 × 24 hours of continuous work. Core cell network management server or a software module should be hot standby, restart after the accident remains consistency of the file system will not cause the system fails to start; streaming media server should support redundancy and error prevention broken network reconnection; video storage server should support RAID, hot-swappable hard drives and dual redundant power supplies to ensure the safety video data, and support people while the historical image file retrieval and on-demand playback, but also support distributed deployment, ensure the security of video storage and stability. Secondly, the platform devices, networks, users, performance and security should be easy to manage and configure. Platform should provide system configuration management software, the whole network resource allocation and management functions, including system initialization, bulk data import, adjust the configuration data and the complexity of permission settings, and equipment inspection, remote setting the clock, remote reboot, device status query, the query device performance parameters, etc., have the system self-test, fault diagnosis and fault weakening function in case of failure, you should be able to quickly determine the point of failure and timely repair. The most important point in the development of the implementation process, but also pay attention to the design of standardized, integrated security platform control protocol, transport protocols, interfaces, protocols, video and audio codec, video and audio file formats in addition to complying with national industry standards, It should also be consistent with the risk level and the level of protection requirements.
|