With the increase of people's economic income and the decrease of mobile phone prices, the number of mobile phone users in China has reached 360 million, and the penetration rate of mobile phones has reached 28 per 100 people. Mobile phones have gone from being a luxury to an everyday consumer product that everyone owns.
Competition in the mobile phone market is becoming increasingly fierce, but product homogeneity is very serious. Take the Chinese mobile phone market as an example. There are currently more than 600 products on the market, most of which have similar configurations and application functions. In addition to the most basic communication functions, various mobile phone manufacturers are also competing for more advanced performance and more refined appearance: color screens with a minimum of 176×208 pixels; new designs and keyboard layouts; digital cameras; advanced phone features; text messages; Internet browsing; music playback; personal information management (PIM) software (such as calendars); media support; video recording, sound recording... The competition in the mobile phone market seems to be fierce, so how can we break through the siege?
“When you reach the end of the water, sit and watch the clouds rise.” When mobile phones are fully utilized as communication tools, it becomes a trend to combine with new technologies to expand into broader application areas. When the safety of people’s production and life is put on a more important agenda, it is natural for mobile phones to recruit troops into the security field.
Mobile phone monitoring
Embedded technology combines video surveillance, network and communication technologies to achieve remote monitoring. As network video surveillance systems become more and more mature, people have higher requirements for video surveillance. With the emergence of concepts such as "Any Time, Any Where, Any Device", mobile phone monitoring systems with portability have become a highlight.
"Mobile video monitoring" actually uses the mobile phone as a computer monitoring terminal receiver. You only need to install a camera and a server the size of a telephone at home, and then install the corresponding software on the mobile phone. The server uses the INTERNET (wired network) and PLMN (wireless network) and the mobile communication network to realize real-time dynamic image monitoring and real-time alarm of private residences and office areas anytime and anywhere with the mobile phone.
As soon as the image in the monitored area changes, the mobile phone user will receive an alert immediately and can see the "live broadcast" image. Once theft, fire and other abnormal situations occur in the monitored area, the system will actively alert the mobile phone user.
The Japanese have used special devices to turn ordinary camera phones into security monitoring devices. As long as you put your 3GFOMA phone into a special socket and turn on the camera, the phone can send sound and images to another phone that the user is carrying through the network. This camera and monitoring system is very simple to install and use, and it can be remotely controlled to swing up and down or left and right according to the user's requirements. |
According to market research data from ICInsights, camera phones have huge market potential, with an estimated shipment of 475 million camera phones in 2006, 600 million in 2007, and 780 million in 2008. In 2009, global camera phone shipments are expected to increase to 910 million, accounting for about 75% of the overall mobile phone market. It is not difficult to imagine that the strong demand for camera phones will promote the further popularization of camera phones.
Fingerprint recognition
As mobile phones gradually become a universal digital toolkit, carrying more and more personal information, they are no longer just a communication tool. Mobile phones need to be better protected or prevented from being illegally accessed when lost or stolen. The initial security measure was to add a password lock, but this operation is very inconvenient and can easily cause a crash. As an effective personal identity recognition system, fingerprint recognition has begun to expand its scope of application as its cost decreases. Mobile phone manufacturers have launched fingerprint encryption systems.
This system is to install a metal sheet fingerprint sensor on the mobile phone, which serves as the key to activate the mobile phone's security system. The fingerprint sensor is as small as a SIM card and can recognize fingerprints at a speed of one hundredth of a millimeter per second. The owner of the phone records his fingerprint in advance, and then before making a call, he puts his finger on the metal sheet for identity confirmation, and then he can successfully make a call. If the phone is stolen, the fingerprint recognition fails and the phone cannot be started.
At present, the price of fingerprint recognition mobile phones is relatively high. However, as fingerprint recognition technology matures and costs decrease, it will surely promote changes in the mobile phone field. At present, the prices of many fingerprint recognition products such as fingerprint USB flash drives and fingerprint mice have been reduced, and the fingerprint product market is likely to enter a period of explosive growth.
Mobile security software
It is no longer fashionable to connect mobile phones to the Internet. High-speed Internet access and permanent online connection have become the trend. A Chinese input method for a Windows smartphone with a miniature computer keyboard can reach 40-50 words per minute. Not only can you use MSM or QQ at any time, but you can also Google various materials. However, with the development of mobile phone technology, many new unsafe factors will emerge, which may be hidden in the past, transferred from other areas of life, or generated with new things. Relevant experts pointed out that if we do not pay enough attention to mobile phone security issues now, then we will face a "crisis" era that is more serious and rampant than computer viruses in the future. In June 2000, the world's first mobile phone virus "VBS.Timof-onica" was discovered in Spain. Subsequently, the virus "Kabir" spread through Bluetooth devices, the virus "Mosquito Trojan" targeting mobile phone operating systems, the virus "Mobile Hacker" targeting mobile phone bugs, and the Mobile.SMSDOS virus that attacks using SMS or MMS also appeared one after another. According to the security company McAfee, as smart phones become more popular, the threat from mobile malware will increase significantly in 2006.
[page]
According to a recent report, a total of 226 types of virus software that spread between mobile phones were found in 2005. As more and more users begin to use Internet services such as email on their mobile phones, there are great security risks in mobile Internet access. Security software experts said that companies are beginning to invest in mobile security software, and the mobile security software business will bring profits between 2006 and 2008, when mobile security software will become F-Secure's mainstream business. However, in the consumer field, it will take another year for large-scale growth in investment in mobile security software.
In recent years, gas accidents have emerged in various regions. Such frequent mining accidents have made people consider taking more effective safety measures. In order to reduce coal mine gas accidents and enhance the awareness of gas accident prevention in enterprises, the State Administration of Work Safety requires that all low-gas coal mines must install gas monitoring and surveillance systems from 2006. The coal mine gas monitoring wireless SMS alarm system makes full use of the current advanced communication network and information technology, closely combines with the monitoring and surveillance system, and sends real-time gas information to the mobile phones of relevant responsible persons at all levels through SMS text messages, providing auxiliary means for effectively preventing coal mine gas accidents. First, the gas data collector underground collects the gas concentration change data, transmits it to the ground, and then sends the pre-set text messages to the mobile phones of relevant personnel through the information platform that supports mobile phone text messages.
The KJ75 safety information monitoring system installed in Handan Mining Area has added a mobile phone alarm function. When the instantaneous value of gas concentration in a production area reaches 1%, the monitoring system will automatically send an alarm text message to the ventilation area director and the on-duty personnel in the dispatching room of Handan Mining Group Company; after 30 minutes, if the gas concentration still does not decrease, another message will be sent; when the gas concentration reaches 1.5%, the monitoring system will send an alarm text message to the chief engineer, the safety mine director, the mine director and the deputy director of the production and technology department of Handan Mining Group Company in charge of ventilation; if the gas concentration continues to rise, the system will report to a higher level of leadership. This will enable leaders at all levels to discover problems in the shortest time and make timely handling opinions, further improving the safety level of mines.
In addition to the mobile phone alarm system used by the coal mining sector, there is also a GSM 24-hour mobile phone network transmission home burglar alarm.
When the owner is not at home, the mobile phone alarm can monitor the scene remotely. It can also be equipped with various wireless anti-theft detectors, infrared fences, smoke detectors, gas detectors, emergency buttons, etc., and the system can be controlled to be deployed, disarmed or alarmed in an emergency through a wireless remote control.
GPS Positioning System
Starting from October 2006, Finnish prisons will equip every prisoner on parole with a mobile phone with a global satellite positioning system function and require them to carry it with them at all times. Monitoring personnel can use methods such as talking to prisoners to understand the location of the prisoners, confirm whether the prisoners carry their mobile phones with them and whether they are in designated places.
As early as the 1990s, the Federal Communications Commission (FCC) of the United States introduced an E911 regulation requiring that in the United States, when a mobile phone is used to call 911 emergency calls, the operator must display the user's location at the time. Some experts believe that for mobile phones, the implementation of GPS will be a killer application. Kanwar Chadha, founder of SiRF Technology, the world's largest manufacturer of GPS (Global Positioning System) chipsets, said that by 2011, most mobile phones sold will be equipped with chipsets that support global positioning functions. In contrast, only 10% of mobile phones were equipped with such chipsets last year. Chadha said: "In the next five years, except for very low-end mobile phones that are only used for calls, GPS chipsets will be a necessary component for most mobile phones."
Functional integration
Integrating certain functions with mobile phones gives mobile phones more functions. Whether students go to school and leave school on time is a concern for parents, and combining mobile phones with access control can solve this problem. After entering the school, students swipe their cards on the terminal card reader, and the system will automatically send a text message to the parents to inform them that their children have arrived safely at school; and when students swipe their cards when leaving school, the system will also automatically send a text message to the parents to inform them that their children have left school. By integrating RFID into mobile phones, you can pay for fares with mobile phones, which becomes a more convenient way to pay for public transportation.
In addition, mobile phones can also be a means of security prevention. For example, most bank cards currently use password anti-theft technology, and transactions can only be successful if personal passwords are entered. However, many criminals also use various means to steal account passwords. Once the password is stolen, it will cause irreparable losses. The use of "mobile phone confirmation security payment technology" adds an extra security barrier to bank cards. This technology uses the patented DNA bank card system to bind the bank card to a designated number mobile phone. If the user wants to use the bank card to withdraw money or make a purchase, in addition to entering the password, the user must also confirm it through the mobile phone before the system can pass.
When an industry develops to a certain stage, it will encounter growth bottlenecks, and the difficulty faced by enterprises is how to find new profit growth points. At this time, an important factor that needs to be considered is how to stand at the forefront of the times and make the research and development of products and technologies both suitable for life needs and forward-looking. Using mobile phone alarms, monitoring, built-in GPS, mobile phone payment confirmation, etc., makes the application of mobile phones more extensive and more conducive to public safety. It can be imagined that the combination of mobile phones and security will become a powerful corps in the smoke-filled market.
Previous article:New direction of security: the development market of automatic tracking technology
Next article:Subway Video Surveillance System Solution
- Popular Resources
- Popular amplifiers
- Mir T527 series core board, high-performance vehicle video surveillance, departmental standard all-in-one solution
- Akamai Expands Control Over Media Platforms with New Video Workflow Capabilities
- Tsinghua Unigroup launches the world's first open architecture security chip E450R, which has obtained the National Security Level 2 Certification
- Pickering exhibits a variety of modular signal switches and simulation solutions at the Defense Electronics Show
- Parker Hannifin Launches Service Master COMPACT Measuring Device for Field Monitoring and Diagnostics
- Connection and distance: A new trend in security cameras - Wi-Fi HaLow brings longer transmission distance and lower power consumption
- Smartway made a strong appearance at the 2023 CPSE Expo with a number of blockbuster products
- Dual-wheel drive, Intellifusion launches 12TOPS edge vision SoC
- Toyota receives Japanese administrative guidance due to information leakage case involving 2.41 million pieces of user data
- Innolux's intelligent steer-by-wire solution makes cars smarter and safer
- 8051 MCU - Parity Check
- How to efficiently balance the sensitivity of tactile sensing interfaces
- What should I do if the servo motor shakes? What causes the servo motor to shake quickly?
- 【Brushless Motor】Analysis of three-phase BLDC motor and sharing of two popular development boards
- Midea Industrial Technology's subsidiaries Clou Electronics and Hekang New Energy jointly appeared at the Munich Battery Energy Storage Exhibition and Solar Energy Exhibition
- Guoxin Sichen | Application of ferroelectric memory PB85RS2MC in power battery management, with a capacity of 2M
- Analysis of common faults of frequency converter
- In a head-on competition with Qualcomm, what kind of cockpit products has Intel come up with?
- Dalian Rongke's all-vanadium liquid flow battery energy storage equipment industrialization project has entered the sprint stage before production
- Allegro MicroSystems Introduces Advanced Magnetic and Inductive Position Sensing Solutions at Electronica 2024
- Car key in the left hand, liveness detection radar in the right hand, UWB is imperative for cars!
- After a decade of rapid development, domestic CIS has entered the market
- Aegis Dagger Battery + Thor EM-i Super Hybrid, Geely New Energy has thrown out two "king bombs"
- A brief discussion on functional safety - fault, error, and failure
- In the smart car 2.0 cycle, these core industry chains are facing major opportunities!
- The United States and Japan are developing new batteries. CATL faces challenges? How should China's new energy battery industry respond?
- Murata launches high-precision 6-axis inertial sensor for automobiles
- Ford patents pre-charge alarm to help save costs and respond to emergencies
- New real-time microcontroller system from Texas Instruments enables smarter processing in automotive and industrial applications
- TI Three-Phase Motor Drive BoosterPack Evaluation Module
- What does this runtime warning mean and how to deal with it?
- ESP32 configures WIFI via Bluetooth
- LT5400AIMS8E-4#PBF If you need help with replacement, or provide this material directly, thank you!
- NI Exclusive: All kinds of difficult testing problems are over!
- 【AT32F421 Review】+ Environment Construction and Hello World
- Calculations on the LM317 charging circuit
- Analysis of the design of real-time embedded digital processing system based on c2000
- [Today at 10:00] Focus on the core technology of speech recognition: Microchip Timberwolf audio processor online seminar
- Digital Circuit and Logic Design Study Guide