Mobile phone monitoring fingerprint recognition to achieve new breakthroughs in security monitoring

With the increase in people's economic income and the price reduction of mobile phones, China's mobile phone users have reached 360 million, and the mobile phone penetration rate has reached 28/100. Mobile phones have become a daily consumer product owned by everyone from a luxury product.

The competition in the mobile phone market is increasingly fierce, but the homogeneity of products is very serious. Taking the Chinese mobile phone market as an example, there are a total of about 600 products on the market today, and most of them have similar product configurations and similar application functions. In addition to the most basic communication functions, various cell phone manufacturers also competed for more advanced performance and a more sophisticated appearance: a color display with a minimum of 176×208 pixels; a new design and keyboard layout; a digital camera; advanced telephone features; Browsing; music playback; personal information management (PIM) software (such as calendars); Media support; video recording, voice recording... The competition in the mobile phone market seems to be intensifying, but how do you break through?

"When you go to the poor, sit and watch the cloud rise." When the use of mobile phones as a communication tool is fully utilized, the combination of new technologies and the development of a wider range of applications becomes a trend. When people's production and life safety issues are mentioned on more important agendas, mobile phones are The recruitment of troops in the field of security can be described as a matter of course.

Mobile phone monitoring embedded technology combines video surveillance, network and communication technologies to realize remote monitoring. When the network video surveillance system becomes more and more mature, people put forward higher requirements for video surveillance. Under the birth of "AnyTime, AnyWhere, AnyDevice" (anytime, any place, any device) and other concepts, the mobile phone monitoring system with portability becomes a major highlight.

"Mobile Video Surveillance" is actually using the mobile phone as a computer monitor terminal receiver. Just install a camera, a phone-sized server at home, and then install the appropriate software on the phone. Through INTERNET (wired network) and PLMN (wireless network), the server realizes dynamic image real-time monitoring and real-time alarming of private houses and office areas using mobile phones anywhere and anytime.

As soon as the screen of the monitored area has changed, the mobile phone user will receive an alert the first time, and can see the “live broadcast” screen. Once an abnormal situation such as theft or fire occurs in the surveillance area, the system will take the initiative to alert the mobile phone user.

Japanese people turn ordinary camera phones into security monitors through special devices. Just put your own 3GFOMA phone into a dedicated socket and turn on the camera, the phone can send voice and images over the network to another phone that the user is carrying. This camera and monitoring system is very simple to install and use, and can be remotely controlled to swing up and down according to user requirements. |

According to market research data from ICInsights, camera phones contain huge market potential. It is estimated that the number of camera phones shipped will reach 475 million in 2006, 600 million in 2007, and 780 million in 2008, compared with 2009. Global camera phone shipments are expected to increase to 910 million, which will account for about 75% of the overall mobile phone market. It is not difficult to imagine that the demand for camera phones will boost the further popularity of camera phones.

Fingerprint Recognition When the mobile phone gradually becomes a digital universal tool kit and carries more and more personal information, it is not only used as a communication tool. The mobile phone needs to be better protected or cannot be lost when it is lost or stolen. Unauthorized access. The initial security measure was the addition of a password lock, but this operation was inconvenient and could easily cause crashes. Fingerprint recognition, as an effective personal identification system, has begun to expand its application scope as costs have decreased.

Mobile phone manufacturers have introduced a fingerprint encryption system.

This kind of system is to install the metal sheet-type fingerprint sensor on the mobile phone as the security system open key of the mobile phone. The fingerprint sensor is small, such as a SIM card, which recognizes fingerprints at a speed of one-hundredth of a millimeter per second. The owner records his fingerprints beforehand, then puts his finger on the metal plate for identity confirmation before making a call, and can successfully dial the phone. If the phone is stolen, fingerprint identification fails, and the phone cannot start.

At present, the price of fingerprint recognition handsets is relatively high. However, as the fingerprint recognition technology matures and costs drop, it will certainly promote the revolution in the mobile phone field. At present, fingerprint U disk, fingerprint mouse and many other fingerprint recognition product prices, the fingerprint product market will most likely enter an explosive growth period.

Mobile phone security software Mobile phones and Internet connections are no longer fashionable. High-speed Internet access and permanent online are the trend. A Chinese input method with a miniature computer keyboard, windows smartphone, can reach 40-50 words per minute. Not only can you use MSM or QQ at any time, you can also use GOOGLE's various materials. However, with the development of mobile phone technology, there will be many new insecurity factors, either hidden in the past or transferred from other areas of life, or may be created with new things. Experts pointed out that if we do not pay enough attention to the issue of mobile phone security, then we will face an era of “crisis” that is more serious and more rampant than computer viruses. In June 2000, the world’s first cell phone virus “VBS. Timof-onica” was discovered in Spain. Subsequently, the virus "Kabil" spread through Bluetooth devices, the "mosquito Trojans" for mobile phone operating systems, the "mobile hackers" against mobile phone bugs, and the mobiles using SMS or MMS. SMSDOS virus also appeared one after another. According to security firm McAfee, the threat from mobile malware will rise significantly in 2006 as smartphones become more popular.

According to the latest report, a total of 226 kinds of virus software that was transmitted between mobile phones were discovered in 2005. As more and more users begin to use e-mail and other Internet services on their mobile phones, mobile Internet access has a great potential for security. Security software experts said that companies are starting to invest in mobile security software, mobile security software business will bring profits between 2006 and 2008, when mobile security software will become F-Secure's mainstream business. But in the consumer sector, it will take one year for the large-scale growth of mobile security software investment.

In recent years, gas accidents in various regions have emerged in an endless stream. Such frequent mine accidents have led people to consider adopting more effective safety measures. In order to reduce the gas accidents in coal mines and enhance the awareness of preventing gas accidents in enterprises, the General Administration of Safety Supervision requires that all low-gas coal mines be equipped with gas monitoring and control systems from 2006 onwards. The coal mine gas monitoring wireless SMS alarm system is to make full use of the current advanced communication network and information technology, and closely integrate with the monitoring and monitoring system. SMS real-time information will be sent to the relevant responsible person mobile phones at all levels to effectively prevent coal mine gas. Accidents provide assistance. First, the gas concentration data collected by the underground gas data collector is transmitted to the ground, and then the pre-configured short message is sent to the relevant person's mobile phone through the information platform supporting the mobile phone short message.

The KJ75 safety information monitoring system installed in Yankuang District has added a mobile phone alarm function. When the instantaneous value of the gas concentration in a certain production area reaches 1%, the monitoring system will automatically send an alarm message to the ventilation zone chief and the mobile phone of the dispatching staff of the Yankuang Group Company. After 30 minutes, if the gas concentration does not decrease, the monitoring system will automatically Send one; when the gas concentration reaches 1.5%, the monitoring system will send a warning message to the chief engineer, the safety mine manager, the mine chief, and the vice minister in charge of the ventilation of the production technology department of the Yankuang Group Company; if the gas concentration continues to rise, the system will Higher level of leadership report. So that leaders at all levels can find problems in the shortest possible time, make timely handling opinions, and further improve the level of mine safety and security.

In addition to the coal mine department's use of mobile phone alarm systems, GSM24-hour mobile phone network transmission home burglar alarms also appeared.

When the owner is not at home, the mobile phone alarm can remotely monitor the scene, and can also be equipped with various wireless anti-theft detectors, infrared on the radio fence, smoke, gas, emergency buttons, etc., and can be controlled by the wireless remote control, Disarm or emergency alarm.

GPS positioning system From October 2006 onwards, Finnish prisons will be equipped with a cell phone equipped with a Global Positioning System (GPS) function for each prisoner who has obtained a parole and will be required to bring it with him at any time. The monitoring personnel can use the method of talking with the prisoner to understand the location of the prisoner, confirm whether the prisoner carries the mobile phone with him or not, and whether he is in the designated place.

As early as the 1990s, the Federal Communications Commission (FCC) of the United States introduced an E911 regulation requiring that in the United States, when using a mobile phone to dial 911 emergency calls, the operator must display the user's current location. Some experts believe that for mobile phones, implementing GPS will be a killer application. Kanwar Chadha, founder of SiRF Technologies, the world's largest manufacturer of GPS (Global Positioning System) chipset, said that by 2011, the majority of handsets sold will be equipped with chipsets that support global positioning, compared with only 10% last year. The phone is equipped with this chipset. Chadha said: "The next five years, except for those very low-end mobile phones that are only used for talking, the GPS chipset will be a necessary part of most mobile phones."

Functional integration integrates certain functions with the mobile phone, making the phone more functional. Whether or not students go to school on time is a concern for parents. Combining mobile phones with access control can solve this problem. After the student enters the school, he swipes the card on the terminal swipe card reader. The system will automatically send a text message to the parent to inform the parents that the child has arrived safely. When the student leaves the school, the system will automatically send a text message to the parent to inform the parent that the child has already leave school. The integration of RFID into mobile phones can be replaced by mobile phones to pay fares and become a more convenient means of public transportation.

In addition, mobile phones can also be a safety precaution. For example, at present, most bank cards use password anti-theft technology. Entering a personal password can make the transaction successful. However, many criminals also use various methods to steal account passwords. Once passwords are stolen, they will cause irreversible losses. The adoption of the "Mobile Phone Confirmation of Secure Payment Technology" has created a security barrier for bank cards. The technology uses the DNA bank card patent system to bind the bank card with the designated number of mobile phones. If the user wants to use the bank card to withdraw or consume, in addition to entering the password, it must be confirmed by the mobile phone before the system can pass.

When an industry develops to a certain stage, it will encounter growth bottlenecks, and the difficulty facing enterprises is how to find new profit growth points. An important factor to consider at this time is how to stand at the forefront of the times and make products and technologies. R&D is both suitable for life needs and forward-looking. The use of mobile phone alarms, monitoring, mobile phone built-in GPS, mobile phone payment confirmation, etc., make the application of mobile phones more extensive, but also more conducive to public safety. It can be imagined that the combination of mobile phones and security will become a strong lineup in the smoke-filled market.