Cases of Security Management Implementation of Komi Yizhitong Prison

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

Cases of Security Management Implementation of Komi Yizhitong Prison

As we all know, judicial units such as prisons, detention centers, and labor camps have always had high security requirements. To this end, the Comet Card provides targeted “one-finger communication” and “one-card” solutions for the special requirements of prison management to meet the security management needs of prisons. This article mainly combines the actual implementation of the case to elaborate on Comet’s “One Finger in Prison”.

Prison One Finger Communication project requirements generally include system modules such as access control, consumption, patrol, and visitors. Part of it will also involve system modules such as family message, touch screen query, and medical treatment.

1. Central Management System

In order to facilitate the implementation and management of Yizhitong’s overall solution, we will independently integrate all the operational functions including department personnel, authority and fingerprint management into the management center subsystem, as the back-end management center of Comet Yizhitong, which is managed by the system administrator Responsible for management and operation.

1. Department and user settings

1) N-level department setting with unlimited levels;

2) User settings have the functions of adding, modifying, deleting, changing department, adding photos, etc.;

3) Realize the sharing of information between various subsystems and users through “account enable/disable”;

2. Fingerprint management

1) The fingerprints of all personnel can be purchased continuously in batches, and the fingerprint pictures of all personnel can be stored in a centralized manner;

2) Fingerprint template data can be obtained from existing fingerprint images;

3) Can import/export fingerprint templates;

3. Operator management

1) Provide the system administrator to set the operators and related permissions of each subsystem module in the Comet One Finger Communication overall solution;

2) The operator can be set to perform specific operation permissions for a certain function module (including the department to which the user object is limited when executing a certain function module), completely solving the limitations of the so-called “second-level permissions” and “third-level permissions”;

2. Fingerprint access control management system module

The fingerprint access control management system supports two communication protocols: RS485 and TCP/IP, and realizes the functional requirements of multiple access control applications including: permissions, time periods, passwords, anti-passback, multi-fingerprint door opening, alarms, real-time monitoring, real-time uploading, task settings, etc. , Applicable to places such as prison administrative office buildings, floor passage gates in the prison area, etc.

1. Features:

1) The combination of time period and authority makes security control more in line with user needs;

2) Set permissions in two ways: “Setting by door” and “Setting by user”;

3) The task setting can start the door regularly. The control modes are: normally open, normally closed and online;

4) Support multi-fingerprint door opening and anti-passback function;

5) Support multiple security authentication functions such as card swiping + password input, fingerprint + password input, etc., and multiple super passwords can be set;

6) Through the master console, all control operations with the access controller can be realized, including: remote door opening, downloading time period, authority and other control parameters, synchronizing clock, extracting log records and real-time monitoring of the status of each door;

7) Support alarm output and linkage with fire protection;

8) Remote control can be connected;

3. Fingerprint A/B two-door access control system.

The two important security gates (also called Erdaogang) outside the prison area need to be installed with A/B door access control system (also called Erdaogang) in accordance with relevant safety management regulations. Door B can be opened only after door A is closed; correspondingly, door A can be opened after door B is closed. At the same time, both doors must realize fingerprint verification for entry/exit, and follow-up entry is strictly prevented.

Comet’s new self-developed prison fingerprint A/B two-door access control also provides real-time monitoring server software. The armed police on duty can monitor the video of the personnel preparing to enter/exit the prison area according to their fingerprints in real time. If their identity is found to be illegal, they can be restricted from entering/exiting through software. The server software can monitor the four fingerprint terminals of A/B Erdaomen at the same time, and respectively access the full-color video signals of four miniature cameras.

4. Online/offline fingerprint inspection system

For prisons, detention centers, labor camps and other judicial high-security units, it is necessary for police officers to strengthen the security management of the prison areas, and there are any hidden safety hazards or blind spots in the imprisonment areas. In this regard, each unit has formed a complete set of security inspection responsibility systems for fixed cycles and personnel to regulate different inspection tasks including: general police officers, co-police officers, prison/detention center leaders, and public security bureau security inspectors.

The traditional electronic patrol system is generally an offline smart card patrol system. The working principle of the system is: install passive patrol points at the main inspection points in the prison area. When the police patrol, bring a patrol stick with them, according to regulations To each patrol point, move the patrol stick close to or collide with the patrol point to complete the patrol task. Months) Take the patrol stick to the management computer and upload the records on the patrol stick to the software. This kind of electronic patrol system has problems such as being able to patrol on behalf of the system and failing to clarify safety responsibilities. The patrol record only provides a simple review after the fact, there is no inspection task to be checked, and there is no necessary and timely reminder for missed inspections.

Prisons, detention centers, labor camps and other judicial high-security units can configure fingerprint offline inspection (patrol) systems and fingerprint online patrol systems according to their own security management needs. The fingerprint offline inspection (patrol) system adopts a brand-new system design and implementation mode, which can fundamentally solve the technical problem of “checking in on behalf of the card”, and truly implement the responsibility to the individual.

The fingerprint online patrol system uses a general fingerprint terminal as the patrol device. The attendance machine and the background server upload fingerprint verification records in real time through the RS485 industrial control network or the TCP/IP high-speed local area network.

We suggest that the fingerprint offline inspection (patrol) system can be installed for prisons. For detention centers, an online fingerprint patrol system needs to be installed.

5. The management system for prisoners entering and leaving prison

The A/B two-door security management system for prisoners entering and leaving the prison area is an extended function of the A/B two-door access control system. When the prisoner/detainee enters and exits the prison area A/B, the picking/sending police officer shall verify their fingerprints respectively, and then the prisoner/detainee will be allowed to pass after verifying their identities by fingerprints in turn.

Sixth, fingerprint visitor system

The so-called prison fingerprint visitor management system is to perform security registration, access safety supervision for prison detainees’ relative visits, social group reference, and outside prison construction/service personnel, effectively preventing outsiders from cooperating with detainees to escape from the prison area.

System integration: The second-generation card recognition technology, fingerprint recognition technology, video surveillance and capture technology are integrated. It is strengthened that when outsiders enter and exit the prison, they must be accompanied by relevant responsible police officers to avoid the existence of safety corners. The functional characteristics of its fingerprint visitor system are:

1) When foreigners need to register for visits, they must first select the responsible police officers, and then continuously read the second-generation ID cards of the visitors, collect fingerprints and capture their digital photos;

2) At the same time, it is necessary to select a limited time range for visitors to enter and exit the prison area, and confirm whether they can enter repeatedly (for construction personnel, they can be allowed to enter repeatedly);

3) Finally, it is necessary to register the information such as the items carried by the visitors and the unit they belong to;

4) After all the information is registered, click “Registration Complete” and print the visit receipt (multiple people who visit together will be printed in a visit form);

5) At the same time, the registration terminal can view the list of people who have entered the prison area in real time;

6) The registration terminal can set someone as a blacklist to restrict their entry into the prison area (it can also directly import the wanted person record EXCEL file issued by the Ministry of Public Security);

Seven, consumer system module

Realize the function of counting consumption registration for police officers on duty in the prison area. If IC cards are allotted to inmates, the police canteens and canteens can also provide inmates with mobile sales and credit card charging functions.

In addition, Komi Prison Yizhitong can also expand some system modules according to the actual needs of users. include:

1) Family SMS system:

Realize the sending of text messages for some well-behaved prisoners to report safety to their relatives and exchange family affection, and to promote the serious transformation of prisoners with a more humane management method and return to society as soon as possible.

2) Medical treatment system:

Realize the medical registration, inspection, and billing/charge for taking medicines in the prison area of ​​prisoners, and promote the serious transformation of prisoners and return to society as soon as possible with a more scientific and humane prison medical and health protection mechanism.

3) Touch screen query system:

Provide a window information platform for visitors to inquire and understand the prison area. Visitors can view the recent activities of prisoners in the prison area, the display of activists, and the management and production of the prison area, so as to be as open and transparent as possible to the security management of the prison area. In addition, Comet One Finger Communication’s overall solution also supports personalized modification of functions. Technicians or system administrators can, according to the actual needs of users, complete including: modify the menu information, modify the column and title, width to be displayed in the data table, modify the report title, data item attributes and statistical items, completely customize the statistical report and other personalities Modification.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare