Prison RFID roll call system solution

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

1 System overview

In order to prevent detainees from escaping, traditional prison supervision units generally adopt regional entry and exit reports and call management. That is to say, when detainees need to move across regions, they need to report the number of persons on the move, whereabouts, and police officers and other information to the prison command center, and they can move only after obtaining the approval of the command center. In the labor process, it is also necessary to count the number of detainees in the plant regularly and report it to the command center. However, under the traditional management model, people counting, reporting, and statistics are all done manually, which has caused problems such as long management process, heavy workload of police officers, low management efficiency, and labor impact. Therefore, breaking through traditional management shortcomings through technical means is the solution Important directions for these issues.

The RFID roll call system deploys RFID identification equipment at the entrances and exits of the prisons and workshops to read the radio frequency tags worn by the prisoners and judge the status of the prisoners entering and exiting the access control point to achieve rapid batch entry and exit attendance; in the production workshop, the police officers are automatically identified by the RFID handheld machine The radio frequency tag worn by the prisoner displays the name of the prisoner to realize quick roll call; roll call data is automatically uploaded to the backstage of the command center, and the roll call information is displayed in the command center and on-site display screens.

2 Application scenario description

1) Automatic roll call when entering and leaving the prison area

When prisoners enter and leave the prison in batches, they will be automatically read and judged, and the roll call data will be automatically transmitted to the system background. The LED screen outside shows the number of people, and the police computer in the monitoring room also displays it.

Automatic reminder of abnormalities, such as when the actual number of people on call does not match the number of people who should be called. After the police lead the team to confirm the correctness, swipe the card to confirm. If the team is not led by the police, the police will not be allowed to pass.

2) Enter the production workshop to automatically roll the call

When prisoners line up and enter the gate of the production workshop, they will automatically read the roll call in batches.

Real-time upload of roll call data to the back-end system

Workshop display screen shows the number of prisoners entering the workshop

3) Roll call every 1 hour during working hours

The police officer walks on an RFID tablet. The coverage radius of the RFID tablet is controlled within the range of 0.5-2.5M (configurable). The RFID tablet automatically reads the prisoner’s electronic tag, broadcasts the prisoner’s name, and the police officer verifies the identity of the prisoner, thereby realizing a quick roll call.

Route positioning labels can be set in the production workshop to realize the management of the police call-in route.

The roll call data went to the system backstage last time in real time and was displayed on the large screen of the workshop at the same time. The prison leaders can dynamically understand the roll call situation of each workshop staff in real time.

4) Management of sporadic personnel entering and exiting the workshop during working hours

Deploy an invisible access control system at the gate of the production workshop.

When sporadic personnel enter and exit the gate, they need to read their RFID tags to identify their identity, and only allow them to go out when the system is authorized.

The identity system alarm was not read.

When a prisoner goes out from an abnormal exit without carrying an electronic tag, and enters through the workshop gate, the system cannot recognize his RFID tag and automatically warns.

5) Sporadic personnel flow path management

When sporadic personnel enter and exit, set a safe route. The personnel must pass the path identification point within the specified time and arrive at the set location, and the roll call identification is completed and confirmed.

Within the specified time, the system automatically alarms when the personnel pass the RFID path identification point.

6) Personnel identification management in sensitive areas

In the sensitive area, the RFID identification device is linked with the camera to read the identity of the entering personnel found by the intelligent analysis of the camera.

If the RFID identity of the person is not recognized or the identity of the unauthorized person is not recognized, the system alarms.

7) RFID patrol

Deploy RFID identification equipment on the floor.

Patrol personnel pass through the area covered by RFID identification equipment, automatically read their identities, and record patrol information.

Patrol information is automatically uploaded to the background.

8) RFID patrol naming of prisoners in prison (extended)

Install RFID electronic tags in each cell

Patrol personnel enter each cell with an RFID tablet and automatically read the cell label and prisoner’s label.

After the patrol is over, the data is automatically uploaded.

9) Location of RFID personnel in workshop (optional)

Deploy the RFID calibrator in the production workshop to achieve full coverage of the signal.

Real-time location information of prisoners

Real-time statistics of the number of prisoners in the production workshop.

3 System structure

The system structure diagram is as follows. A set of RFID identification point equipment is configured at the key entry and exit points of the prison area and the floor entry and exit points (the key areas can be equipped with face recognition cameras). Each RFID entry and exit identification point device consists of 2 calibration readers and a communication gateway. The calibration reader includes a 125K trigger unit and a 2.45G communication unit. The communication gateway is connected to the calibration reader to realize the card access judgment. The access judgment data is sent to the business system platform through the Ethernet interface, and the business system platform processes and presents the data .Real-time display of personnel statistics at the gate of the prison area and the large screen of the workshop

4 System software logical structure diagram

The logical structure diagram of the system software is shown in the figure below:

The system software adopts a hierarchical and sub-module framework design. The presentation layer is exchanged with users for interface display, data entry, display, etc., the business logic layer is responsible for business process processing, and the data access layer provides a unified interface for data access. B/S three-tier structure, a multi-tier business software system based on WEB applications. The use of middleware technology to separate the central database and applications provides an easy-to-expandable business architecture, which can better and more rationally plan business and data flows, improve the security and reliability of the system, and have superior real-time data performance. Strong maintainability.

5 Basic business process

5.1 The automatic roll call process for entering and leaving the prison or workshop

The personnel wear the RFID personnel card to pass through the entrance and exit, and the entrance and exit calibration reader sends a calibration reading signal. The RFID personnel card receives the low-frequency calibration signal, and sends the corresponding data to the calibration reader through the 2.45G channel.

The calibration reader sends the data to the communication gateway, and the communication gateway judges the entry and exit behavior of the read personnel card information, and sends the judgment result to the backend of the business system.

The background of the business system displays the attendance status of each access control point in real time, and provides automatic alarm prompts for abnormal attendance data (such as the number of people entering and leaving the prison does not match the system data).

5.2 The automatic roll call process for handhelds in the production workshop

Deploy roll-call route identification point labels in the workshop.

The police officer holds an RFID handheld, downloads the roll call list on the handheld, and clicks the personnel roll call button.

The police officer walks along the roll call path specified by the roll call path identification tag. The prisoner information (name, photo, etc.) corresponding to the RFID card within a radius of 1.5m-2.5m from the police officer is displayed on the RFID handset, and the RFID handset automatically broadcasts voice at the same time The name of the identified prisoner.

After the roll call is over, the RFID handheld will automatically display statistical information such as roll call, actual arrival, and non-arrival, and upload it to the business system platform.

5.3 Real-time roll call management

Prison leaders can view the distribution of personnel in each workshop or prison in real time through the business platform.

5.4 Night patrol of prisoners in the cell

Install RFID electronic tags in each cell

Patrol personnel enter each cell with an RFID tablet and automatically read the cell label and prisoner’s label.

After the patrol is over, the data is automatically uploaded.

6 System function

System management: realize system configuration management, including authority management, role management, user management, etc.

Equipment management: realize configuration management and real-time status monitoring of all equipment

Regional management: Realize regional data, building data configuration and regional authority management, and can realize hierarchical and sub-authority management.

Personnel management: realize personnel information synchronization and personnel information management

Label management: realize label warehousing management, label and personnel binding, label loss report, card replacement and cancellation management, etc.

Entry and exit management: real-time monitoring of real-time entry and exit personnel data of various entry and exit points, statistical records of personnel entry and exit, and personnel activity trajectory within a period of time.

Sensitive area management: set up a list of persons who can enter and exit sensitive areas, display information about personnel entering and exiting sensitive areas, and display alarm information about unauthorized entry and exit

Roll call management: configure roll call plan, including roll call period, roll call staff group, etc.; statistics roll call results, etc.

The screenshots of the main system interface are as follows:

Personnel trajectory

real time monitoring

7 System expansion (prison officer police force distribution management system)

7.1 Overview

Through the deployment of RFID identification equipment in the police channel, duty room, and prison channel, the automatic location and recognition of the police officers carrying RFID cards is realized, and the police location information is uploaded to the system background in real time. The system page dynamically displays the police location and the police force configuration in each area. .

RFID card is combined with 13.56M national secret CPU chip and long-distance RFID chip. Police officers use the same card to realize access control, consumption and RFID positioning functions.

7.2 Application function

RFID Police Positioning: Automatically identify the entrance and exit of the main door of the police, and locate the police in the duty room in real time, so as to dynamically grasp the police force distribution in each prison area.

RFID patrol: automatic identification when police officers pass the patrol point, no need to swipe card

7.3 Application hint

8 System expansion (RFID tool management)

8.1 Overview

The production tools in the prison workshop are registered and issued every day before going to work; after get off work, they are taken back and inspected, and the offenders are allowed to leave after confirming that they are correct.

RFID tool management realizes the automatic management of tool issuance, withdrawal, and inventory by installing RFID electronic tags on the tools.

8.2 RFID electronic label selection

For tools that only need to be issued, retrieved, and inventoried, 900M UHF passive electronic tags are used, which is more cost-effective.

For tools that require positioning and access management, active electronic tags are used.

8.3 Application process

8.3.1 Tool issuance process

Paste or attach RFID electronic tags to tools

The prisoner swipes the RFID wristband to display his identity. The administrator places the tool in the RFID reading area of ​​the desktop. The tool information is automatically read, and the system binds the tool to the person. Complete the tool release process.

8.3.2 Tool withdrawal process

Prisoners line up to return tools

The administrator places the tools in the desktop RFID reading area, automatically reads the tool information, and automatically completes the tool recovery process.

The system prompts that the tool information has not been returned.

8.4 Example of electronic label installation

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare