Zhong Yun Wisdom li: Innovative Practice of industrial Internet in the field of public security

Source: Internet
Author: User
Keywords Mobile Internet Yahoo private cloud Cloud Oracle day-run facility Yahoo
Tags .mall access airport analysis based business business innovation cloud

December 12, the world's first large-scale conference to explore the industry Internet, 2014 CVW. The industry Internet conference was held in Beijing and was synchronized through the big screen of New York Times Square. The conference was made by the Asia Letter Group, the cloud base and the Chuang-Zhuang economic and Technological Development zone jointly hosted more than 5,000 global it and traditional industry leaders and elites who are concerned about the development of Internet and traditional industries, and explored the evolution of "Internet access to traditional industries", "traditional industry internet" and the technological model and business innovation of industrial Internet.

In the afternoon of the "Internet Security @ Internet" Theme Forum, Li CEO of Cloud brings the keynote address of "Industry Internet innovation practice in the field of public security."

The following is the full text of his speech:

Li: It was all about information security, our company based on cloud computing and large data to do public security applications and solutions. At present, in the field of industrial Internet, information security class is relatively complete industrial chain, in the field of public security is still in a primary stage, based on the current consumer Internet, all of its data information is public, a lot of information is in the form of islands exist. Whether it's public security or information security, this is a huge market for information security, what do we think about public security? Police, cars, guns, cameras, Beijing, a district may be more than 9,000 cameras, detection doors, such equipment in the traditional field of very much, this is still in the early stage of industrial Internet, so many are isolated equipment. This is more familiar to you, this is the 3D print pistol, last May 13, British journalists took the pistol apart, boarded the so-called world's most stringent security system, is the European star, they assembled in the car and photographed, indicating that any security protection may have loopholes, which leak from the new technology, new materials, New trends, whatever.

Everybody look, this is the traditional gun in the subway image, of course 3D pistol, this is the 3D pistol overall, this is the gun tow, has more than 30 parts. The 3D metal pistol probably launches 70 rounds, some good can launch 200 rounds. Traditional people can see the pistol, but this device he may be mistaken for water or plastic toys, China's security forms and foreign countries, the United States, guns can be transported, the Chinese side is basically smuggling mode, the public security and customs seized the model is basically the case. Such a situation is difficult to systematically analyze to this thing, can be detected. So this is another sense of security vulnerabilities, prompted a Japanese university staff had printed a 3D pistol, was arrested by the Japanese police. I don't know much about the local laws, I just want to give you a hint.

In other safe form, this is a common chemical raw material. When we were in high school, we used to talk about the use of this material in terrorist attacks in some parts of Xinjiang, which is easy to buy in a chemical plant, and you just have to mix some of the ingredients to make simple explosives, and it's not that powerful. This reliance on our traditional networks, relying on a single technological tradition, may be difficult to prevent. This is what we faced last year, from May to September, all the incidents of the explosion of the bus, because its explosive can be tens of thousands of times times in fraction seconds, so many people either burned or suffocated, this is a huge threat to us. Beijing probably before the APEC meeting, launched the inspection of oil dogs, living in the sky Tong Yuan to know the characters with the test, the character of the same inspection needs 40 minutes. The need for security forms is becoming more and more severe, and the form of security is becoming more and more severe. Back to what I said just now, the entire security system in China after the connection between the various equipment is lack of unified standards, unlike information connectivity, network connection has agreements, in the past, the field of physical security is the initial status quo.

Second, why is it that the information island is serious? In China there is a lot of security information for people or things. such as identity, image and other data, including location, or cell phone number this is multidimensional. For example, our industry in the Internet, its connection is no standard without standards, the current state is not. Because the information islands lead to a long time to deal with problems, so the work of solving the problem may be very long. For instance, a week ago in Cologne case, 3,000 policemen in the video, in fact, spent two months, the suspect in the last kilometer outside the mall to see the film, so this in the industrial Internet contains a huge opportunity, is a lot of things of relevance and intelligence. How can we connect people, data, and equipment organically, in small micro-enterprises, in the industry's internet opportunities? The first one is clear, the current from the consumer internet era to the industrial internet era of transformation, BAT's core competitiveness may be many or in the personal business capabilities, such as QQ, also did some entrepreneurial business and government business, but the volume of business is not very large.

For SMEs, if they are familiar with this, the government or the business model, may also understand. Now from the small C era to the Big B era or to the era of G, I think this to small micro-enterprises or innovative enterprises, basically there are some opportunities. We now have traditional devices that operate on machines, but we don't have the technology to use our current cloud computing, big data and artificial intelligence, so this is also a chance. This is what we want to build a public security ecosystem, is based on data acquisition and analysis and application of the integrated system, which is still our security data, this is called Secure data platform. Sensing layer below, is a variety of security equipment, we follow a certain standard and agreement to connect it, any manufacturer as long as willing to comply with open standards and agreements, can be connected to our network. We are based on cloud analysis storage, we can do a standard platform, can be with our private cloud or public cloud, we have a case description behind. In the upper can be applied subway, public safety, this is our company core technology, based on ATR technology, is automatic target recognition. Like this horn, a handgun inside the wire, we can find the location through the intelligent recognition of the cloud computing platform, and can be prompted.

The second, according to Aqsiq, the scope of their supervision, in and out of the fruit to test, the computer behind the fruit, including the side of the gun, simple look like a pen, such as the equipment after analysis can be analyzed, including this is the most hidden danger of civil aviation safety of rechargeable treasure, lithium batteries, this can be identified by the machine. At present, the world to do such a company has four, the valuation is hundreds of millions of U.S. to 1 billion U.S. dollars or so, China is our family. Compared with the international market, China is not like the United States gun, China is a security form, domestic and foreign different. New York 911 after the subway will not security, China on the subway to security 40 minutes. This is our company using cloud computing algorithm some depth learning, neural network algorithms and depth technology, as well as image database. There are a variety of nuclear radiation, chromatography, a variety of image library, which is our core resources core technology. We want to upgrade our traditional security ecology with the thinking of industrial Internet, the first one is to visualize security, there are many data visualization, monitoring process visualization, as well as the regulatory process of intelligence and automation, which I will say later. We are traditionally security inspectors, and he may not be able to see it if he plays with his mobile phone. We can operate the entire regulatory process intelligently, through the cloud computing platform, this saves a lot of manpower, improve security reliability;

We are now building a public safety environment that may require a unified interconnection standard, as some friends have said, information security is also mentioned. Now more and more bandwidth, as well as computing costs and storage costs, cloud-based storage costs. At the same time, we hope to establish a government security consumer service awareness, is the mode of service outsourcing, we for the government to do some security services for enterprises, this may be our direction. In view of our current public security field with the industry of the Internet, we have done the benchmark of industry users, but also analyzed their customer characteristics. For example, customs exit quarantine in the port area, we have some cooperation with the customs. Their main problem, the first is to rely on people, the second is the establishment of less, less personnel, the other international port some flights, special plane 34 to nine points to all the goods sent to the car, so the staff is very tense. So we want to build a user-centric, to provide close to the user needs of security solutions, of course, this data is our core. Through collection, matching, association, intelligent decomposition to do data mining to achieve demand. We are in the Beijing subway system, with the network of industrial Internet thinking, we after any one platform authorization, point any place can know it each machine image, once history, through such data association we call the human package card, this liquid object in Beijing subway to check, package shape, The person who put the bag and the card holder, and the data of the bus. Beijing Bus card data is not registered, but according to reliable information in the next two years to real name. We're connected by discrete data, we build structured data, we're like 360 antivirus software, we're in the background, there's nothing to keep this data in, and if you need to backtrack, I'll be able to find that data quickly. If there are such omissions in the subway station, how many color packages can I get in and out of the subway station, and what are the images? What are the people in and out? This is very popular in the public security system.

We provide this solution for the way the bus is deflagration, based on the chromatographic analysis. We use chemical or public safety means to integrate with cloud computing security, provide platform, channel security solutions that can be used as explosion-proof or counter-terrorism. We for the port block to provide the airport port Automation platform, the airport can be more than 10 sets, more than 20 sets of different systems, through the standard protocol integration, and then do data visualization, data Association, to provide users with the entire analysis, decision-making and early warning. Based on the national AQSIQ platform, we are based nationwide, point anywhere you can to this point, how many people come over, carry something, import fruit also need to do biological quarantine, this is in the Cross-border electric power business inside the application, this is in the logistics field, such as high-speed rail logistics, or some air logistics inside, need to do two times security. If this connection, his security information by the airline has been seen, to be allowed, he does not need to do a second security on this platform, the airline cost per kilogram of money, such a profit model, we can share the cost of security.

From the three elements of industrial Internet, the first is industrial ecology. Industrial ecology just said, I provide the whole based on the industrial chain, upstream and downstream enterprises to connect the platform. The second is large data, which is the tool and platform for the analysis I provide. Third, the productive service industry, we want to provide customers with Third-party services. Cloud base for security, he may not hire a few police to do, but need to find a third party, the third need to do the scene, if the use of industrial Internet thinking, may be on-site security checks do not need so many people, only need a person. This is especially on the logistics line, China last year's Logistics Express 92 trillion, this year to October is already 10.9 billion, the end of this year should be the world's first. Such a large volume of shipments requires a short time, the task is very large, the use of our cloud computing platform may be a direction. But our market advance, in fact, we do information security friends, may also be a chance. This is our civil aviation logistics inside do the security personnel analysis, as well as security personnel positioning. This is in the Express field of detection, we in Beijing airport, the capital airport has tried this system, through our cloud platform to provide unattended security automation system. Online unattended, through the remote can see the conveyor belt, if you feel that there are problems can be sent to the quarantine area, no problem back to the original place.

This daily walk 100,000 pieces, the original look at 100,000, civil aviation security, everyone can only work 20 minutes, work 20 minutes later must rest, if we use the means of cloud computing, this is very simplified human work. This is what we do based on the user side, this is our original with a logistics platform, express Company's cooperation. If you receive a courier, take a mobile phone to shoot the bar code above, know that this is not what you have to buy things. Last year there was a toxic express, buy something is not what he wants, come up with problems. This is what we provide to users of the C-Terminal Services, such devices if the traditional method is not able to detect, we put all the material into the library after the platform. We often use hundreds of thousands of kinds of things, put each thing into a library, with laser scanning to the surface can analyze its material, so can solve a lot of matter. This can be used in domestic counter-terrorism and military, which is the former Secretary-General of the United Nations we inscription, protect the national ecology and promote world security.

(Responsible editor: Mengyishan)

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.