Embedded combination of multiple technologies to realize remote monitoring of mobile phones

With the growth of people’s economic income and the reduction of mobile phone prices, the number of mobile phone users in China has reached 360 million, and the penetration rate of mobile phones has reached 28 units per 100 people. Mobile phones have gone from a luxury item to an everyday consumer product owned by everyone.

The competition in the mobile phone market is becoming more and more intense, but the homogeneity of products is very serious. Taking the Chinese mobile phone market as an example, there are currently more than 600 products on the market, most of which have similar product configurations and similar application functions. In addition to the most basic communication functions, various mobile phone manufacturers are also competing for more advanced performance and more refined appearance: minimum 176 × 208 pixel color screen; new design and keyboard layout; digital camera; advanced telephone features; SMS; Internet Browsing; music playback; personal information management (PIM) software (such as calendar); Media support; video recording, voice recording… The competition in the mobile phone market seems to be heating up, so how to break through the siege?

“Walk to the place where the water is poor, sit and watch the clouds rise”. When the use of mobile phones as a communication tool is brought into full play, it becomes a trend to develop into a wider application field when combined with new technologies. Recruitment in the security field can be described as a matter of course.

Phone monitoring

Embedded technology combines video monitoring, network and communication technology to realize remote monitoring. When the network video monitoring system becomes more and more mature, people put forward higher requirements for video monitoring. Under the concept of “Any Time, Any Where, Any Device” (any time, any place, any device), the mobile phone monitoring system with portability has become a highlight.

“Mobile video surveillance” is actually the use of mobile phones as computer monitoring terminal receivers. Just install a camera in your home, a server the size of a phone, and install the appropriate software on your phone. Through INTERNET (wired network) and PLMN (wireless network), and with the help of mobile communication network, the server can realize real-time monitoring and real-time alarming of dynamic images of private residences and office areas with mobile phones anytime, anywhere.

As long as the screen of the monitored area changes, the mobile phone user will be alerted at the first time, and can see the “live broadcast” screen. Once an abnormal situation such as theft and fire occurs in the monitoring area, the system will actively alert the mobile phone user.

The Japanese, on the other hand, turned ordinary camera phones into security monitors through special devices. Just put your 3GFOMA mobile phone into the special socket and turn on the camera, the mobile phone can send the sound and image to another mobile phone carried by the user through the network. The installation and use of this camera and monitoring system are very simple, and it can be remotely controlled to swing up and down, left and right, according to user requirements. |

According to market research data from ICInsights, camera phones have huge market potential. It is estimated that shipments of camera phones will reach 475 million in 2006, 600 million in 2007, 780 million in 2008, and 2009 in 2009. Global camera phone shipments are expected to increase to 910 million units, accounting for about 75% of the overall mobile phone market. It is not difficult to imagine that the strong demand for camera phones will promote the further popularization of camera phones.

Fingerprint recognition

When the mobile phone gradually becomes a digital universal toolkit, carrying more and more personal information, it is not only used as a communication tool, the mobile phone needs to be better protected, or will not be illegally accessed when lost or stolen . The initial security measure is to add a password lock, but this operation is very inconvenient, and it is easy to cause a crash. As an effective personal identification system, fingerprint identification has begun to expand its application scope with the reduction of costs. Mobile phone manufacturers have introduced fingerprint encryption systems.

This system is to install a metal sheet-shaped fingerprint sensor on the mobile phone, which is used as the key to open the security system of the mobile phone. The fingerprint sensor is as small as a SIM card and can recognize fingerprints at a speed of one hundredth of a millimeter per second. The owner pre-records his fingerprint, and then puts his finger on the metal piece for identity confirmation before making a call, and the phone can be successfully dialed. If the phone is stolen, the fingerprint recognition fails, and the phone cannot be activated.

At present, the price of fingerprint recognition mobile phones is relatively high. However, as the fingerprint recognition technology becomes more mature and the cost decreases, it will definitely promote the change in the field of mobile phones. At present, the price of many fingerprint identification products such as fingerprint U disk and fingerprint mouse has been reduced, and the fingerprint product market will most likely enter a period of explosive growth.

Mobile Security Software

Mobile phones and Internet connections are no longer fashionable, and high-speed Internet access has become a trend to be permanently online. A Chinese input method for a Windows smart phone with a miniature computer keyboard can reach 40-50 words per minute. Not only can you use MSM or QQ at any time, you can also GOOGLE various materials. However, with the development of mobile phone technology, there will be many new insecurity factors, either hidden before, or transferred from other areas of life, or may be generated with new things. Relevant experts pointed out that if enough attention is not paid to the security of mobile phones now, we will face a “crisis” era that is more serious and rampant than computer viruses in the future. In June 2000, the world’s first mobile phone virus “VBS.Timof-onica” was discovered in Spain. Subsequently, the virus “Kabir” spread through Bluetooth devices, the virus “mosquito Trojan” for mobile phone operating systems, the virus “mobile hacker” for mobile phone bugs, and the Mobile.SMSDOS virus for attacking by SMS or MMS also appeared one after another. According to security firm McAfee, threats from mobile malware will rise significantly in 2006 as smartphones become more popular.

According to the latest report, in 2005, a total of 226 kinds of virus software spread among mobile phones were found. As more and more users begin to use Internet services such as e-mail on their mobile phones, there is a great security risk in mobile Internet access. Security software experts said that enterprises are starting to invest in mobile phone security software, and the mobile phone security software business will bring profits from 2006 to 2008, when mobile phone security software will become the mainstream business of F-Secure. But in the consumer space, a massive increase in investment in mobile phone security software is still a year away.

In recent years, gas accidents in various regions have emerged one after another, and such frequent mining accidents make people consider taking more effective safety measures. In order to reduce coal mine gas accidents and enhance the awareness of gas accident prevention in enterprises, the General Administration of Safety Supervision requires that all low-gas coal mines must install a gas monitoring and monitoring system from 2006. The wireless SMS alarm system for coal mine gas monitoring is to make full use of the current advanced communication network and information technology, closely integrate with the monitoring and monitoring system, and send real-time gas information to relevant responsible persons at all levels through SMS text messages. Accidents provide aids. First, the gas concentration change data is collected by the underground gas data collector, and then transmitted to the surface, and then the preset short message is sent to the mobile phone of the relevant personnel through the information platform that supports mobile phone short messages.

The KJ75 safety information monitoring system installed in the Handan mining area has added a mobile phone alarm function. When the instantaneous value of gas concentration in a certain production area reaches 1%, the monitoring system will automatically send an alarm short message to the mobile phone of the head of the ventilation district and the mobile phone of the dispatching room of Handan Mining Group; Send a message; when the gas concentration reaches 1.5%, the monitoring system will send an alarm text message to the chief engineer, the safety mine manager, the mine manager, and the deputy minister in charge of ventilation in the production technology department of Handan Group Company; if the gas concentration continues to rise, the system will send an alarm message to the Higher level leadership reports. Thereby, leaders at all levels can discover problems in the shortest time and make timely suggestions to further improve the mine safety assurance level.

In addition to the use of mobile phone alarm systems in the coal mine sector, there has also been a GSM 24-hour on-duty mobile phone network to transmit home burglar alarms.

When the owner is not at home, the mobile phone alarm can monitor the scene remotely, and can also be equipped with various wireless anti-theft detectors, infrared beam fences, smoke detectors, gas detectors, emergency buttons, etc. Disarm or panic.

GPS positioning system

From October 2006 onwards, Finnish prisons will equip every parole inmate with a GPS-enabled mobile phone and ask them to carry it with them at all times. The monitoring personnel can learn the location of the prisoner by talking with the prisoner, etc., and confirm whether the prisoner has a mobile phone with him or not and whether he is active in the specified place.

As early as the 1990s, the US Federal Communications Commission (FCC) introduced an E911 regulation, requiring that in the United States, when using a mobile phone to make a 911 emergency call, the operator must Display the location of the user at that time. Some experts believe that for mobile phones, the realization of GPS will be a killer application. Kanwar Chadha, founder of SiRF Technologies, the world’s largest maker of GPS (Global Positioning System) chipsets, said that by 2011, most mobile phones sold will be equipped with chipsets that support GPS, compared to just 10% last year. of phones are equipped with this chipset. “In the next five years, GPS chipsets will be required for most phones, except for very low-end phones that are only used for talking,” Chadha said.

Functional integration

Integrating certain functions with the mobile phone makes the mobile phone have more functions. Whether students go to school on time or not is a concern of parents, and the combination of mobile phones and access control can solve this problem. After the student enters the school and swipes the card on the terminal card reader, the system will automatically send a text message to the parents to notify the parents that the child has arrived at school safely; leave school. By integrating RFID into the mobile phone, the mobile phone can be used to pay the fare and become a more convenient means of public transportation payment.

In addition, mobile phones can also be a security precaution. For example, most bank cards currently use password anti-theft technology, and transactions can be successful only after entering a personal password. However, many criminals also use various means to steal account passwords. Once the password is stolen, it will cause irreparable losses. The adoption of “mobile phone confirmation and secure payment technology” adds a security barrier to bank cards. This technology uses the DNA bank card patent system to bind the bank card to the mobile phone with a designated number. If the user wants to use the bank card to withdraw money or consume, in addition to entering the password, the system can only be passed through the final confirmation through the mobile phone.

When an industry develops to a certain stage, it will encounter growth bottlenecks, and the difficulty faced by enterprises is how to find new profit growth points. An important factor that needs to be considered at this time is how to stand at the forefront of the times and make products and technologies. R&D is not only suitable for the needs of life, but also forward-looking. The use of mobile phone alarm, monitoring, mobile phone built-in GPS, mobile phone payment confirmation, etc., make the application of mobile phone more extensive and more conducive to public safety. It is conceivable that the combination of mobile phones and security will become a powerful corps in the smoke-filled market.

The Links:   G121SN01-V3 VI-J0V-CZ IGBT-SOURCE