Active RFID prison personnel management application program

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

  
Overview


As the judicial organs’ tasks of maintaining social order and combating criminal crimes become more and more serious, the number of detention, education, and labor reforms of criminals in various supervision places continues unabated. How to improve prisons with technological innovations in new forms The new management model is becoming a new urgent need. At present, many scientific and technological means are used in the prison for monitoring, such as video, intercom, infrared, access control, power grid, etc., which have been comprehensively managed. However, these information systems are limited to information processing, and information collection is still only dependent on handwriting input. The information system is truly associated with the detainees, and video recognition relies on manual labor, and some automatic alarms also rely on manual recognition.

Use a safe and reliable automatic identification system to distinguish, identify, track and locate detainees in a special environment such as a supervision site, protect internal staff and manage visitors, and integrate the information and reality of each person in the information system. The dynamic connection of each person in the system, active identification and automatic alarm according to the setting are the main characteristics of radio frequency technology in the supervision of places. The combination of the radio frequency system and the existing modern monitoring system in the supervision site can truly realize the informatization of prison management and realize the way of “requiring police force from science and technology”.

Taking into account the importance and urgency of the management of out-of-office prisoners and the complexity of the implementation of the system, the design principle of this plan is to start with the out-of-office management of prisoners, and then carry out internal prison personnel management, and internal and out-of-office management Combined, and finally combined with the prison’s existing video surveillance system and fingerprint system to form a complete and effective all-round prison management system, improve management efficiency, reduce accidental and malignant accidents, and effectively protect prison management personnel.

The main function

Regional population statistics-real-time display of the number of people and personnel information in a certain area.
Real-time location-real-time display of the location of people in a certain area.
Location tracking-one or more persons can be located and tracked.
Alarm management-display border alarm, area alarm, disassembly wristband alarm, equipment alarm, prison guard call for help, etc.
Historical query-query and print historical tracks, historical data reports, etc.

 
Scheme principle


The program uses RFID radio frequency identification technology to achieve the functions of identification, tracking and positioning and trajectory query through the information transmission between the reader and the electronic tag.

In the rooms, floors, squares, walls, passages, etc. inside and outside the prison, base stations are arranged as required to achieve signal coverage, and corresponding electronic tags are assigned to prisoners to be monitored and prison guards and objects to be protected. Wear RFID inmate wristbands for prison inmates, and install base stations in prisons, factories, and hospitals, so that you can know the number of detainees in real time. When detainees leave or enter an illegal area without authorization, the system will alarm, facilitating timely deal with. A non-dismountable wristband is used for prisoners. If the prisoner’s wristband has a signal or is damaged, it will automatically alarm and record the historical action trajectory of each prisoner.

Prison guards and staff wear a special RFID prison guard wristband with an alarm button. Once an emergency occurs, press the help button to send a help signal to notify the monitoring center, and the alarm location will be displayed on the map of the command center in time. In this way, the back-end can provide timely support to ensure the safety of the police.

 
1. The key hardware of the system

Hardware equipment performance advantages

Can reliably identify fast-moving targets
With anti-collision performance, can identify multiple criminals at the same time
The system works in the 2.4G public frequency band
Using direct sequence spread spectrum technology, strong anti-interference ability, small interference to other devices in the same frequency band
Use AES encryption technology to encrypt the transmitted data to ensure the reliability and safety of data transmission
Compatible with international standards for wireless sensors
The positioning radio frequency card is small in size, easy to carry, install and hide
Low cost of positioning radio frequency card, convenient for large-scale application
The positioning radio frequency card has extremely low power consumption, and the battery life can reach 1 to 3 years
The transmitter power of the positioning radio frequency card is extremely low, which is safe for the human body
The base station integrates RS485, Ethernet, GPRS, CDMA1X, WiFi and other communication modules for easy application and expansion
The low cost of base station reduces the cost of the entire system
The base station is small in size, easy to install and maintain
Strong signal penetration and diffraction ability, high integration, good compatibility, simple and fast communication
High information security and confidentiality
The radio frequency card can adapt to various environments of -35℃~+60℃, and can be repeatedly disassembled and used
The special design makes the wristband difficult to be damaged, even if it is damaged, it can be quickly detected and alarmed to ensure the uniqueness and correctness of the identification object.
The specially designed wrist strap can give a system alarm when it is loosened, stopped working or is covered and shielded.

2. Software Management System

The software management system mainly includes the following menus: entry management, information maintenance, labor education management, personal fund management, exit registration, query statistics, and system management.

1. Entry management: criminal entry registration, criminal photo entry, criminal basic information entry, re-entry registration, transfer and return, temporary leave and return, detention for sentence, link change, judgment registration.
2. Information maintenance: information modification, accomplice registration, criminal health status, social relationship registration, photo maintenance.
3. Reeducation through labor management: prison adjustment, lawyer meeting, family meeting, reward and punishment registration, conversation education, accidents, registration for review, collective education, safety inspection registration, key personnel, secret personnel, and inspections.
4. Personal fund management: item acceptance, item collection, cash income registration, cash expenditure registration, financial statistics registration, property destruction.
5. Exit registration: handle the exit, temporary leave, change of office, registration of death, registration of escape, and recovery of personnel who have left the office by mistake.
6. Inquiry and statistics: related inquiries, related statistics, report reports, related reports, photo inquiries, online tracing, and exit inquiries.
7. System management: user maintenance, monitoring area setting, log query, data import, data export, data backup, data upload.
8. The prison area management system is seamlessly integrated with the prison administration management system.
9. Positioning, tracking, and alarm management: The number, location, distribution and movement status of target personnel can be displayed in two-dimensional or three-dimensional diagrams, and the list status can be selected according to grouping requirements (such as searching by prisoner, police officer, and regional location) And output reports, real-time roll call. In case of situations, the location and personnel of the alarm can be displayed.
10. Set the prohibited area for personnel to enter and exit, and carry out related personnel location monitoring and abnormal alarms.
11. Query and playback personnel distribution and movement tracks.
12. Linkage with video surveillance, fingerprint and access control systems.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare