Prison Wristband – RFID Smart Prison Management System

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

The first part of the development background of RFID intelligent prison management system

With the gradual improvement of the prison management system and the continuous renewal of prison administration facilities, the ability of prisons to prevent and control various security incidents has been greatly enhanced. However, as the types of crimes and the composition of detainees become more and more complex, criminals are more revengeful, brutal and cunning, and their impetuous mentality and sense of restlessness increase. , suicide, murder, and trouble with prisons, which have extremely adverse effects on the personal safety of the police and the continuous stability of the place. Based on these facts and years of painstaking research on prison work, the RFID intelligent prison management system developed by our company, It can realize intelligent monitoring and management, prisoner information management, cross-border alarm, positioning and tracking of detainees and prisoners. It greatly improves the internal security and management efficiency of the prison, and reduces the work intensity of prison managers. At the same time, the system also has various expansion functions, such as combining and integrating with video surveillance, so that RFID technology and popular video surveillance technology are organically integrated. integrate. In addition, it can also be integrated with security monitoring systems such as face recognition, which not only enriches the functions of the entire monitoring management system, but also effectively enhances the security of the system.

The second part of RFID technology introduction

1. Introduction to RFID Technology
RFID (Radio Frequency Identification Technology) is a non-contact automatic identification technology that automatically identifies target objects and obtains relevant data through radio frequency signals. Conceptually, RFID is similar to barcode scanning. The barcode scanning technology attaches the encoded barcode to the target and uses a dedicated scanning reader to transmit the information from the bar magnetic to the scanning reader using photoelectric signals; while RFID Then use a special RFID reader and a special RFID unit that can be attached to the target, and use RF signals to transmit information from the RFID unit to the RFID reader.

2. Features and advantages of RFID technology
RFID is a flexible application technology that is easy to control, simple and practical, and especially suitable for automatic control. The identification work does not require manual intervention. It can support both read-only working mode and read-write working mode without touching or aiming; It can work freely in various harsh environments: short-range radio frequency products are not afraid of harsh environments such as oil stains and dust pollution, and can replace barcodes, such as tracking objects on the assembly line of factories; long-range radio frequency products are mostly used in traffic, and the identification distance can be adjusted. Up to tens of meters, such as automatic charging or identification of vehicles. Its unique advantages are beyond the reach of other identification technologies, mainly in the following aspects:

Easy and fast reading: The reading of data does not require a light source, and can even be carried out through the outer packaging. The effective recognition distance is larger, and the effective recognition distance can reach more than 30 meters;
Fast recognition speed: as soon as the terminal enters the magnetic field, the reader can read the information in it immediately, and can process multiple terminals at the same time to realize batch recognition;
Large data capacity: The two-dimensional barcode (PDF417) with the largest data capacity can only store up to 2725 numbers; if it contains letters, the storage capacity will be less; the RFID terminal can be expanded to dozens of K according to the needs of users;
Long service life and wide range of applications: its radio communication method makes it possible for staff to work in high pollution and radioactive environments such as dust and oil pollution. The closed packaging of the terminal greatly exceeds the life of the printed barcode;
Tag data can be changed dynamically: data can be written using a programmer, giving RFID tags the function of interactive portable data files, and writing time is less than printing barcodes;
Better security: Not only can it be embedded or attached to products of different shapes and types, but also password protection can be set for the reading and writing of terminal data, so it has higher security;
Dynamic real-time communication: The terminal communicates with the reader at a frequency of 50 to 100 times per second, so as long as the object attached to the RFID terminal appears within the effective recognition range of the reader, its position can be dynamically tracked and monitored.

The third part RFID intelligent prison management system hardware description

The RFID intelligent prison management system uses active RFID hardware devices. The equipment mainly includes: Receiver, Activator and Active Tag.

Receiver: A device for reading tag information, which can be designed to be hand-held or fixed.
receiver
Frequency band: 433MHz
Anti-collision: 200 tags (bracelets) can be identified simultaneously
Activator: activates the tag device, and can also write the ID number to the tag
Frequency: 125 KHz

Tag (Tag): The electronic tag generally stores electronic data in a predetermined format. In practical applications, the electronic tag is attached to the surface of the object to be identified. The reader can read and identify the electronic data stored in the electronic tag without contact, so as to achieve the purpose of automatic identification. Tags are divided into passive tags and active tags. Active tags are powered by batteries and have a longer read/write distance. They are also called active tags and generally have a longer reading distance. After receiving the microwave signal from the reader (reading device), the passive electronic tag converts part of the microwave energy into DC power for its own work. Generally, it can be maintenance-free, with low cost and long service life. Active tags are small, light, and have a relatively short read and write distance, also known as passive tags.

Active (active/active) technology Passive (passive/passive) technology
Automatically detect prisoners from a distance and swipe their cards at close range
Automatically send the prisoner to swipe the card at close range
Self-test damage alarm can not self-test damage alarm
Prison Guard SOS Device No Guard SOS Device
Set up a warning line, if the prisoner crosses the border, the police will not be alarmed if the prisoner crosses the border
Penetrates the human body while accurately identifying multiple people without penetration

According to whether the stored information is rewritten, terminals are also divided into read-only terminals (read only) and read-write terminals (read and write). RFID prison management systems use read-write terminals. The information in the read-only terminal is written when the integrated circuit is produced, and it cannot be modified later, but can only be read by special equipment; It can be erased and written with special programming or writing equipment. Generally, the time taken to write information into the electronic terminal is much longer than the time taken to read the information of the electronic terminal. The time taken for writing is in seconds, and the time taken for reading is in milliseconds. The tag is composed of a coupling element and a chip. Each tag has a unique electronic code, which is attached to the object to identify the target object; each terminal has a globally unique ID number – UID, which is placed in the ROM when the chip is made. , cannot be modified. The user data area (DATA) is for users to store data, and can perform read, write, overwrite, and operations.

prisoner label
Frequency band: 433 MHz
Wireless data rate: 256kps
Battery life: 4+ years
When the person or object wearing the electronic tag (bracelet) passes through the activation range of the activator (the red man in the picture), the electronic tag (bracelet) worn by the person or object will be activated and send out information. This information includes the ID of the activator. When the receiver receives the information from the electronic tag and transmits it through the network, according to the electronic tag ID number, the activator ID number and the receiver’s IP address, it can be compared with the equipment placement information on site, and it can be concluded that “someone/someone” The record of objects passing through a monitoring area at a certain time can realize the tracking and monitoring of people or objects.

2. Advanced features of hardware products
1. The electronic chip has a long service life and can work in harsh environments;
2. The reading range is larger, and the terminal can be read and written within a range of 40-50m from the reader;
3. Real-time tracking and positioning, automatic monitoring;
4. The outdoor hardware is equipped with high-quality lightning protection, and the equipment is equipped with a backup power supply for ten minutes of power failure.
5. The terminal equipment can be designed with different appearances as needed, such as wrist type or ankle type, and one-time design or recycling type can be selected.
6. Waterproof and replaceable battery make the label life longer and have damage alarm function;
7. A variety of different colors can be provided on the software to facilitate the classification of personnel

The fourth part introduces the software function of RFID intelligent prison management system

1. File module
Establish a digital file of each person, record various information of each person in detail, and establish a multi-dimensional query system, which can easily and quickly query various information. The original personnel information system can be integrated to realize information sharing. The daily behavior of the managed personnel can be recorded, and their behavior patterns can be comprehensively analyzed.

Automatically collect prisoner’s physical information, fully realize informatization, establish a multi-dimensional database retrieval system for each prisoner’s detailed digital files, and provide managers with comprehensive, fast and multi-dimensional query tools.
It consists of five parts:
? Prisoner data management
? Police officer information management
? Monitoring equipment management
? Electronic map management
? Monitoring area management

2. Prisoner data management
The prisoner information can be added, modified, deleted, and inquired.
Prisoner information mainly includes the following categories:
1) Prisoner’s basic information system: Prisoner’s unique system ID, electronic label ID number, personnel number, name, gender, certificate name, certificate number, certificate address, certificate address zip code, contact address, contact address zip code, contact phone number, Identity level, permission group ID, actual permission string, state of controlled objects (in the team, seeking medical treatment outside the institute, construction outside the institute, execution outside the institute, suicide death, other deaths, collective escape, escape alone),
2) Prisoner image file recording system: the name of the person who created the image file, and the number of the person who created the image file.
3) Prisoner’s RTLS location recording system: serial number, wristband tag ID number, prisoner’s unique system ID.
4) Prisoner’s entry and exit record system: serial number, prisoner’s unique system ID, type: (exit, entry), occurrence time, event.
5) Prisoner scoring and assessment record system: serial number, prisoner system ID, prisoner number, prisoner’s name, prisoner’s certificate number, prisoner’s scoring and assessment information record.
6) Criminal record system for criminals: serial number, wristband tag ID number, crime type, and crime method.
7) Prisoner transfer record: system: serial number, prisoner’s unique system ID, prisoner number,
8) Prisoner reward and punishment record system: serial number, wristband label ID number, reward and punishment type, reward and punishment details, remarks
9) Prisoner’s work record system: serial number prisoner’s unique system ID, prisoner number, prisoner’s name, prisoner’s certificate number, prisoner’s labor conduct record event.

3. Police officer data management
Police officer information: including police tag ID, personnel number, name, gender, certificate name, certificate number, certificate address, zip code, contact number, personnel level, personnel category, status, remarks, photo, resume, and characteristics;

4. Supervision equipment management
Basic information: including device ID, device number, device name, device IP, category, location, status, remarks;

Five, wristband label data management
Maintain, manage, add, delete and modify wristband labels. The activation and termination of wristband tags can be set.

6. Electronic map management
Maintain, manage, add, delete and modify electronic maps. Refinement to the monitoring center of each brigade.
Note: The electronic map part is made by both parties together.

7. Regional management
Maintain, manage, add, delete and modify areas.
An area has independent locator IDs, receiver IDs and repeater IDs, and has a maximum capacity.

Eight, alarm policy settings
It can realize the overall on-site monitoring and local on-site monitoring, and realize the alarm linkage interface function, which can realize the linkage function.
There are six types of alarm policies:
Alarm Type Trigger Condition
1 Wristband tag destruction alarm Active alarm 03 Judgment ‘event = 03’
2 Police label alarm Active alarm 04 Judgment ‘event = 04’
3 Out-of-bounds alarm identification alarm AA judgment ‘Locator ID IN pre-set electronic label forbidden area’
4 Disappearance alarm identification alarm judgment ‘The specified receiver has no signal reception beyond the time limit’
5 Authorized access management identification alarm 1. When the authorized person goes out for more than the predetermined time and does not return;
2. When people go out, judge the total number of outgoing personnel!=Total number of authorized outgoing personnel or outgoing personnel!= Authorized outgoing personnel;
3. When a person enters, go out to enter the person! = Authorize the outgoing person;
6 Exceeded volume alarm identification and alarm judgment ‘total number of people in the area > maximum number of people in the area’
illustrate:
03 Alarm: When the wristband tag worn by the prisoner is damaged, the receiver will continuously send disconnection information, and the system will alarm immediately after accepting it
04 Alarm: When the policeman presses the button on the police label to alarm, the receiver will send the alarm information continuously, and the system will alarm after accepting it.
Boundary alarm: When the wristband tag breaks into the unauthorized area, the receiver will continuously send illegal break-in information, and the system will alarm after accepting it.
Disappearance alarm: when the wristband tag is on the designated receiver, and no signal is received after the time limit, the system will alarm after accepting it
Exceeded capacity alarm: When the total number of people in the designated area is greater than the maximum number of people in the area, the system will alarm after accepting it
Authorized access management: can manage the access of a specific managed person, such as the access management of prisoners going out to work, can define in advance the event type, scheduled access personnel, scheduled access area, checkpoint area, scheduled exit time, scheduled entry and exit time. There are three types of alarms as follows:
When the personnel go out, the system will automatically alarm when the authorized personnel and the number of outgoing personnel do not match.
When a person enters, the system automatically alarms when it is inconsistent with the authorized person to go out.
When the authorized personnel go out for more than the predetermined time and do not return, the system will automatically alarm.

9. Real-time monitoring module (screen for daily management)
In daily management, circles represent prisoners and squares represent police officers. Displayed in different colors according to different levels.

The monitoring screen adopts multi-screen real-time monitoring screen
1. general layout.
2. According to the prisoner level, the circle is displayed in different colors, and the total number of people is displayed at the same time.
3. When there is alarm information, the alarm area turns red.Screen 2: Area Monitoring

1. After selecting an area on the screen 1 master plan, the area map is displayed on screen 2. You can switch between different areas.
2. According to the prisoner’s grade, the circle is displayed in different colors, and the actual electronic tag ID is displayed at the same time.
Screen 3: Object Information

1. After selecting an electronic tag ID on the screen 2, the personal information of the object and the current location are displayed on the screen 3.
2. If there is any alarm information, the current area turns red.
3. 1-3 video real-time monitoring windows can be activated.Screen 4: Device Monitoring and Alarm Monitoring

1. The device monitoring map is always on the screen as a base map.

10. Real-time positioning object historical record query report
Historical access records can be queried by personnel, by area, and by time period.

11. Group history query report
Historical access records can be queried by personnel, by region, and by time period. Total number of people.

12. Alarm log
Alarm logs can be queried by personnel, by area, and by time period.

13. Entry and exit record query report
Access records can be queried by personnel, by area (brigade gate or prison gate) and by time period.

14. Monitoring linkage module
It can realize the function of linked video monitoring interface, and reserve the video playback interface.

15. System management authority module

Tel: 010-52867852, 88494100
Business support: 15611398461
Contact: [email protected]
QQ: 1476385659, 13023544
MSN:[email protected]

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare