National judicial organs use RFID technology to solve prison management problems

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

1 project overview

1.1 Project background

Prisons are an important part of the national judicial organs, and they are responsible for the important mission of executing penalties and educating and reforming prisoners. At present, various prison units have adopted information technology to construct a prison security system, and gradually established a security system with video surveillance as the core and integrated linkage, and realized the monitoring and management of points, lines, and areas based on the physical environment.

In accordance with the prison’s requirements for the supervision and safety of prisoners, which is a specific management object, it is necessary to ensure that prisoners carry out specified activities (including labor, study, recreation and rest) at specified times and locations, and establish relevant management system regulations and regulations. Under the premise of standardized management and control process responsibilities, the supervision and management of the police on the spot is mainly used to maintain a standardized supervision and transformation order, and restrict the individual behavior activities of inmates, such as dividing the scope of activities and restricted areas, counting the number of people at regular intervals, recording and assessing labor Or learning results, etc. These management and control services are under a management environment with dynamic management areas, individual management target objects, and continuous management time. They are completed by manual means, which brings management risks and management blind spots, which are reflected in the following aspects:

1. Lack of management tools

The management of individual prisoners, such as the “manual” method of counting the number of people, is prone to errors and omissions, unclear records, and time-consuming work of counting the number of people. The lower-level data cannot be uploaded in real time, and the upper-level supervision cannot be in place in real time.

2. Lack of management content

After the management target object is absent, whereabouts are unknown, etc., it is impossible to grasp the trajectory of its activities in real time and to analyze the situation to provide help for follow-up treatment.

3. Absence of management system

In the existing security system of prisons with video surveillance as the core, there is a weak link in the management of individual activities of prisoners. In an emergency, there is a lack of information support such as rapid and effective personnel positioning and qualitative identification required by the handling mechanism.

Based on the above analysis, establish a set of inmates and their related items (labor tools, etc.) as management objects, focus on the trajectory of inmates and the status of related items, a process-based intelligent identification management and control system, with the help of a centralized supervision environment The three-dimensional security management system of prisons integrated with the supervision individuals, to realize the management execution environment of prison supervision safety, has become an urgent requirement for management upgrades.

Based on the current digital construction situation of various prisons in the province and comprehensive consideration of various factors, the Provincial Prison Administration decided to adopt the construction principle of “pilot first, then promote” in this project, and gradually promote the application. The party committee and leaders of Shayang Prison With the great attention and strong support of the People’s Republic of China, Shayang Prison was selected as the application pilot unit.

1.2 Project goals

In accordance with the management and control objectives and management norms determined by the prison supervision and security system, for the specific management objects-inmates and their related items, intelligent identification technology and computer network technology are used to establish the track of activities such as the inventory and positioning of inmates and the entry and exit records of the supervision activity area. The management and control platform system for management and related item affairs management realizes business management and control of data sharing and business collaboration.

According to the business content and business scope of this project and combined with the related technologies used in this project, the name of this project is: Prison RFID Intelligent Identification Management Platform, for ease of description, hereinafter referred to as iPZBS system (Intranet Prison ZigBee System).

2 business solutions

2.1 Design principles

Based on the norms of prison supervision and transformation management process, with the focus on improving the informatization level of prison management, with low investment, high efficiency, practicality, and scalability as the construction goals, the system will be implemented within the overall framework of prison informatization construction. Business design. In the next step of deepening the design phase, it will include the following:

1. Determine the business boundary of the application system and the logical relationship between the application system and other systems.

2. Analyze the internal structure of the application system and determine the division of system modules.

3. Analyze the logical relationship between the modules in the application system.

2.2 Business content and boundaries

The iPZBS system is mainly aimed at the inventory and positioning of prisoners and related items in the supervision area and the tracking and management of their activity tracks; the supervision area refers to the area where prison inmates can be involved in life, labor and learning, and the management target objects can be expanded to prison police, prison assets and prisons in the future Enterprise products, materials, etc. Mainly include the following business and management methods.

2.2.1 Inventory and location management of prisoners

Inventory positioning (commonly known as roll call) management refers to the management behavior of the prison duty police in accordance with the supervision regulations to count the number of inmates within a specified time interval, quickly confirm the actual number of people in the current supervision area, and perform abnormal handling. Generally, prisoners must wear identification marks (badges/clothing colors or marks) as required, and carry out activities based on the prison administrative organization as the basic unit.

There are two types of roll call management: manual roll call and automatic roll call

Manual roll call: in production workshops, inmates’ activity places, prisons and other supervision places, the police on duty will hold collection equipment to collect the inmates in the current supervision area one by one (scan the signs they wear), and transfer the collection results to the background management In the system, the back-end management system completes roll call recording, comparison analysis, and pre-alarm operations.

Automatic roll call: when prisoners enter and leave each building’s floor access door and building entrance door, the collection equipment installed at the floor access door and building entrance door automatically records the entry and exit of the prisoner, and uploads the data to the background management in real time The system realizes real-time roll call.

The roll call management of prison inmates adopts a combination of manual roll call and automatic roll call to realize the management of different areas. Manual roll call is mainly used in labor and other places within a specified time interval to count the number of prisoners; automatic roll call is mainly used in all floors and building entrances and exits to record the entry and exit of prisoners and determine their activity tracks.

Manual roll call business process:

620)this.style.width=620;” border=0 alt=National judicial organs use RFID technology to solve prison management problems src=”http://images.rfidworld.com.cn/FileUpLoadSavePath/2016-02/170714a88bc52ade4b9.jpg “width=560>

RFID Prison System Intelligent Identification Management Platform Project Proposal

Flow Description:

1. The police on duty use the collection equipment to collect the prisoners in the current supervision area one by one (scan the signs they wear);

2. The collection equipment obtains the identification information and stores it locally;

3. The police on duty connect the collection equipment to the network and perform data upload operations;

4. The background application server receives the data uploaded by the collection device, executes business logic processing (such as recording the number of people counted this time, performing check and comparison), and executes alarm prompts for abnormal roll call information;

5. The background application server downloads the result of this roll call after business processing to the handheld terminal device;

Automatic roll call business process:

620)this.style.width=620;” border=0 alt=National judicial organs use RFID technology to solve prison management problems src=”http://images.rfidworld.com.cn/FileUpLoadSavePath/2016-02/4009de96d2652e6a118.jpg “>

RFID Prison System Intelligent Identification Management Platform Project Proposal

Flow Description:

1. When a prisoner enters and exits each building floor, entrance gate, the acquisition device reads the identification information worn by the prisoner in real time, and uploads it to the back-end server;

2. The background application server receives the data uploaded by the identification device, executes business logic processing according to the roll call business rules and combines the manual roll call results, and executes alarm prompts for abnormal roll call information;

The difference between manual roll call and automatic roll call:

Manual roll call automatic roll call

Application equipmentMobile collection equipmentFixed collection equipment

Data reading method manual operation automatic reading

Data transmission mode offline reading, manual uploading, real-time online transmission

Application location Building access doors and entrance doors in buildings

2.2.2 Management of the trajectory of prisoners’ activities

Activity trajectory management refers to the use of hand-held collection equipment and fixed collection equipment installed at the entrances and exits of various buildings and the entrances and exits of buildings to automatically read the identification equipment information worn by prisoners, and record the information on each floor and building in the supervision area. According to the information of the location of each collection device, and in accordance with the time sequence, the trajectory of its activities in the supervision area is formed.

RFID Prison System Intelligent Identification Management Platform Project Proposal

Business Process:

1. When the inmate enters and exits each building floor and the building entrance and exit gates, the collection equipment installed at the entrance and exit collects electronic tag data and uploads it to the background management system;

2. The background management system receives the data uploaded by the collection device, and determines the entry and exit location of the prisoner based on the installation location information of the collection device and the corresponding information between the identification device and the prisoner

3. The back-end management system takes prisoner information, collection point information, and time (sequence) as its elements, and based on the entry and exit conditions of each building, outlines its activity trajectory in the supervision area, using a map (illustration) or a list Way performance.

620)this.style.width=620;” border=0 alt=National judicial organs use RFID technology to solve prison management problems src=”http://images.rfidworld.com.cn/FileUpLoadSavePath/2016-02/62800177aa61b806389.jpg “>

2.2.3 Management of related items of prisoners

Related items of prisoners include labor tools, learning utensils, and living utensils touched or used by prisoners. The management content is mainly for the handling of related items such as the receipt, return, and use of related items, and the state management and management of items in accordance with relevant regulations. Alarm disposal. Take labor tools as an example:

1. Use of tools

Record the use process of the tool, record its use person, time and other elements.

Business Process:

1) The police on duty scans the electronic tags of labor tools with collection equipment, collects data to identify the tools used this time, and stores them locally;

2) The police on duty scans the identification equipment worn by the prisoner with the collection device, collects data to confirm the applicant, and stores it locally;

3) The police on duty connect the collection equipment to the prison LAN and upload the collected data to the background management system;

4) The back-end management system analyzes the uploaded data and generates requisition records;

2. Return of tools

For labor tools that have been used up, the relationship of obtaining them shall be cancelled and the time of return shall be recorded.

The business process is the same as the application process.

3. Tool exchange

For reasons such as damage, unavailability, etc., to exchange a tool that has already been used, a tool exchange operation is required.

Its business process consists of two steps: “tool return” and “tool acquisition”. For the specific business process, please refer to the above description.

4. Tool activity track

The collection equipment installed at the entrances and exits of all floors and the entrances and exits of the gates of all buildings records the movement trajectory of labor tools in the supervision area and carries out illegal carrying alarm treatment.

The process can be found in the management of the trajectory of prisoners’ activities.

3 technical solutions

3.1 Overview of Intelligent Recognition Technology

Intelligent recognition technology is a technology that uses the recognition device to automatically obtain the relevant information of the recognized target object through the proximity activity between the recognized target object and the recognition device, and provide it to the background computer processing system to complete related subsequent processing. . Intelligent identification technology includes biometric identification (such as fingerprint identification, iris identification, vein identification, etc.), barcode technology, RFID technology, etc. Various identification technologies have their different scopes and application methods, mainly including target object identification and identification devices , Communication protocol, data and business logic processing, etc. Let’s take barcode technology and RFID technology as examples to introduce.

3.1.1 Barcode technology principle

Bar code is abbreviated as bar code. Bar code is a group of bars and empty symbols arranged according to certain coding rules to represent certain characters; bar code technology uses bar codes as identification marks, scanning equipment as identification tools, and identification by the reflected light of the bar codes Object technology. Bar code technology mainly includes bar code rules and bar code recognition technology.

Barcode encoding rules: The barcode encoding is uniformly formulated by the International Article Numbering Association, which is unique and permanent.

Bar code recognition technology: Bar code recognition is completed by a bar code scanner. The scanner uses its own light source to illuminate the bar code, and then uses a photoelectric converter to receive the reflected light, and convert the light and shade of the reflected light into a digital signal to obtain the bar code information.

3.1.2 Principles of RFID technology

RFID technology: the radio frequency identification technology (RFID is the abbreviation of Radio Frequency Identification), is a non-contact automatic identification technology, which automatically recognizes the target object and obtains related data through radio frequency signals. The identification work does not require human intervention and can work In a variety of harsh environments. RFID technology can identify high-speed moving target objects and can identify multiple tags (signs) at the same time, and the operation is quick and convenient. It is mainly composed of electronic tags, readers (divided into fixed and hand-held), antennas and other components. Usually, data transmission networks can be used to realize real-time data processing and analysis and information sharing.

Tag: consists of coupling components and chips, each tag has a unique electronic code, attached to the object to identify the target object

Reader (Reader): a device that reads (and sometimes writes) tag information, which can be designed as a handheld or fixed type;

Antenna: Transmit radio frequency signals between the tag and the reader.

The working principle of RFID technology is: the electronic tag receives the radio frequency signal sent by the reader, and uses the energy obtained by the induced current to send out the information stored in the chip; after reading and decoding the information, it is sent to the background information system for relevant data processing .

3.1.3 Comparison of barcode technology and RFID technology

As an identification technology, barcode technology and RFID technology have certain functional similarities, such as unique identification of objects, fast and non-contact identification, etc., but there are big differences between these two technologies:

Barcode technology RFID technology

Number of reads one at a time, multiple at a time

The reading method looks directly at the label, and light is needed when reading, no specific direction and light are required

Reading distance is about 10 to 50 cm, 1 to 10 meters or more (depending on frequency and power)

The data capacity is small, and only numbers can be used to indicate the large capacity of stored data

Reading and writing ability Bar code data cannot be updated, electronic data can be overwritten repeatedly

Convenience of reading When reading, the label must be visible before it can be read. The label is hidden in the package and is also readable

Data correctness can be read manually, which increases the chance of negligence and can automatically read data

Anti-fouling barcode pollution, the information cannot be read. Surface contamination does not affect data reading

Improper copying is convenient, easy, and very difficult

3.2 Technical route

3.2.1 Equipment technical route

The particularity of prison management requires that the identification carrier has a certain anti-sabotage ability, and at the same time, it is required to be able to handle multiple identification objects (persons in prison) at the same time. It is also necessary to consider that the reading device can adapt to the application of different places (activity area, entrance and exit), according to this A series of management requirements combined with the above-mentioned comparative analysis of barcode technology and RFID, we choose RFID technology as the equipment technology route of this project.

At present, the working frequencies of RFID products are defined as low-frequency, high-frequency, and ultra-high-frequency range of different products that meet different standards, and RFID products of different frequency bands have different characteristics. Among them, the sensor (electronic tag) has two methods, passive and active. Passive sensors have different characteristics and main applications at different operating frequencies.

Ultra-high frequency system (working frequency between 860MHz and 960MHz), transmits energy through electric field. The energy of the electric field does not decrease quickly, but the read area is not well defined. The reading distance of this frequency band is relatively long, and the passive range can reach about 10m. It is mainly realized by way of capacitive coupling.

This system uses an ultra-high frequency system, and the application deployment method is shown in the figure.

620)this.style.width=620;” border=0 alt=National judicial organs use RFID technology to solve prison management problems src=”http://images.rfidworld.com.cn/FileUpLoadSavePath/2016-02/441f7ece0457a5c86b.jpg “>

3.2.2 Communication technology route

The iPZBS system collects, transmits and exchanges data information, which can be collected offline first, then connected to upload and download processing, and online real-time collection and processing. At the same time, the mobile identification device (handheld reader) supports WiFi, GPRS, AP wireless LAN, etc. Access mode. Therefore, according to the actual situation of the prison, this system can be divided into different places and adopt a combined mode to establish a data information communication mechanism. For example, when the police and the target are in the same activity area, an offline handheld identification device can be used to complete the identification and collection, and then the handheld identification device can be connected The nearest networked computer can upload and download data; channels and doors can be set up with fixed identification devices and connected to the network to collect real-time data transmission; in places where the target object is alone, such as prisons and warehouses, fixed identification devices can be used to automatically collect or set up wireless AP points in real time Receive collected data and data download from handheld identification devices.

Generally speaking, the communication networking mode can be deployed flexibly or adjusted according to the situation, and the software system will meet the data logic processing under different communication modes.

3.2.3 Software technical route

Taking .NET as the platform, using C# development language, applying middleware technology and unified resource model, using Asp.Net technology, using C/S, B/S mixed mode as the presentation style, and constructing the iPZBS system

620)this.style.width=620;” border=0 alt=National judicial organs use RFID technology to solve prison management problems src=”http://images.rfidworld.com.cn/FileUpLoadSavePath/2016-02/51601d21790af360274.jpg “>

3.2.3.1 Development Technology

This software uses object-oriented analysis and design technology (00A/D) to deal with business needs. OOA/D technology analyzes software problems in the way of looking at the objective world, divides the content involved in business requirements into multiple objects, describes its properties through the attributes of the objects, describes its behavior through the method of the objects, and passes between the objects and the objects. The relationship describes the business process.

1 .Net platform.NET Framework V3.5 English version

2 Development language C# V2008

3 The interface shows Asp.net V3.5

4 Service depends on Spring.NET V2.0

5 Data persistence NHibernate V1.2

3.2.3.2 Development Tools

In the project, many development tools are involved, listed as follows:

Serial Number Type Software Level Application Technology and Tool Version Number Language Version

1 Development tool code editing Visual Studio V2008

2 Version Control Visual SourceSafe V2005

3 Business design EA V7.0 Chinese version

4 Database database system SQL Server V2000 Chinese version

5 The third-party control interface shows the English version of RadControl V2010

3.2.3.3 Software mode

The iPZBS system is divided into two parts: front-end application and back-end management, which are used to complete different logical functions of business processing.

Front-end applications: Deployed in front-end devices such as handheld readers and fixed readers, through the SDK programming interface provided by the device manufacturer, complete the collection of electronic label information and manually upload the collected data to the back-end management application. To achieve business logic processing.

Background management: deployed on the application server of the prison intranet, used to receive data information uploaded online by a fixed reader and data information manually uploaded by a handheld reader, and execute the received data according to the system settings and business processing logic Business calculations, and the calculation results for persistence processing, and save in the application server.

Front-end application background management

Installation location mobile reader application server

Operating system environment WinCE5.0 embedded operating system Win2003 Enterprise Server

Data storage method File relational database (Sql Server)

Operating environment. Net .Net

Main functions: data collection, upload parameter setting, business logic calculation, query function

3.3 Management system composition

The prison RFID management system is mainly composed of four parts: front-end identification, data collection and access, data transmission, and back-end application management, as shown in the following figure:

620)this.style.width=620;” border=0 alt=National judicial organs use RFID technology to solve prison management problems src=”http://images.rfidworld.com.cn/FileUpLoadSavePath/2016-02/659a5adee1ead041539.jpg “width=560>

Front-end identification: use passive electronic tags worn by prisoners as their identification marks, receive radio frequency signals emitted by readers, and send electronic tag information;

Data collection: use a handheld, fixed reader to receive information generated by the front-end identification device-electronic tags;

Data transmission: Transmit the electronic tag information collected by the data collection device-reader to the background management system through the prison local area network;

Background application management: receive the electronic label data transmitted by the local area network, and execute the background business processing according to the business logic;

3.3.1 Management system equipment composition

The system equipment is composed of three parts: identification (electronic label) equipment, acquisition equipment (reader), transmission equipment (wireless AP, LAN switch, etc.), which realizes the use of acquisition equipment to collect identification equipment information and transmission equipment to upload data to the background Management system functions.

620)this.style.width=620;” border=0 alt=National judicial organs use RFID technology to solve prison management problems src=”http://images.rfidworld.com.cn/FileUpLoadSavePath/2016-02/99b7b40f87edbf9f34.jpg “width=560>

Identification device (electronic tag): used to identify the identified target-the prisoner. In this system, the personnel target object adopts the badge type identification, and the object target object adopts the anti-metal tag identification.

Collection equipment (handheld, fixed reader): used to collect the information in the electronic tag worn by the target object. In this system, a mix of handheld and fixed equipment is used.

Transmission equipment (wireless AP, switch): Provides a communication link to realize the upload of collected data and the download of business data between the collection device and the background system.

3.3.2 Management system software composition

The iPZBS system is built on a unified and mature basic component, taking prisoners and related items as management objects, and using their activities in the supervision area as links to establish a business management information system based on business processes.

The overall software structure diagram is as follows:

620)this.style.width=620;” border=0 alt=National judicial organs use RFID technology to solve prison management problems src=”http://images.rfidworld.com.cn/FileUpLoadSavePath/2016-02/509da9fb3ef8b721112.jpg “width=560>

This management system is composed of foreground applications (information collection and transmission), background management (business logic), and underlying transaction processing (infrastructure, resource definition, data interface), etc., which respectively implement different business functions in the system.

3.3.2.1 Front-end application

Front-end applications are mainly deployed on handheld mobile readers and fixed readers, and are mainly used for operations such as data collection and data upload.

1. Data collection

Read the electronic tag worn by the prisoner, and store the result locally on the front-end device.

2. Data upload

Upload the roll call data stored locally to the back-end management server through the prison LAN.

3. Data download

Download the calculated roll call data on the server to the local reader.

3.3.2.2 Background management

The background management software mainly performs operations such as data reception, data calculation, file data maintenance, and system configuration.

1. Basic files

Maintain the basic archive data involved in the system:

Electronic label file: describe its unique number, current holder, status and other information

Reader file: describe its number, installation location and other information

2. System settings

Set the time interval for roll call, the number of people in each supervision area, etc.

3. Tool management

Process management of related business links involving production tools in resource definitions. Specifically, the following business links are involved:

Tool Requisition

Tool return

Tool swap

Tool storage

4. Electronic label management

Realize the management of status changes such as the issuance, recycling, and replacement of electronic tags, and track and record the status change process.

5. Roll call management

Realize the collection of roll call data uploaded by the front-end reader, and perform data analysis on the collected data to form the roll call result and save it persistently.

6. Activity track management

According to the statistical analysis of the collected data uploaded by the fixed reader, the trajectory of the inmates’ activity in multiple buildings in the supervision area and the movement trajectory of labor tools in the supervision area are tracked, forming a visual activity trajectory based on electronic dot maps Show.

7. Query statistics

Provide tabular query statistics for various business data formed in the system.

10. Data analysis

Provides graphical data analysis in the form of histograms, pie charts and other display methods based on monthly, quarterly, and yearly, etc., and business data such as the rollover of prisoners, the use and return of production tools, and other business data as the data source

3.3.2.3 Infrastructure

Basic components include the general design part of the system framework, including transaction management applied to data persistence, superclass definition of business objects, and system authority management.

1.Session management

Using AOP implementation principle, based on third-party persistence components, using a database connection pool mechanism to manage the connection with the database, to ensure that any database interaction operation can be opened and closed normally, and abnormal information is fed back when the connection is abnormal To the front desk.

2. Transaction Management

Using the AOP implementation principle, based on the ACID mechanism of database transactions, it ensures normal writes involving the correct operation of the database, and data rollback under abnormal operations to ensure the consistency of business data in the database.

3. Tree Mode

Based on the design idea of ​​inheritance and polymorphism, it realizes the superclass definition of business objects, the addition, deletion, modification, and checking of business functions of tree nodes under the classification tree mode.

4. Form mode

Based on the design concept of inheritance and polymorphism, it realizes the super-class definition and the realization of addition, deletion, modification, and checking business functions of different business objects such as single sheet form, master-slave form, and batch basic data.

5. Menu management

Based on the principle of self-definition, realize the self-defined settings of software system function modules and operation interfaces, such as defining the module display name, interface title name, menu display order, etc.

6. Rights Management

Combined with the menu definition function, it realizes custom configuration of permissions based on business organizations and business roles to protect system data security.

To sum up, the basic components realize the common business logic and processing procedures in the software system, realize the highly reusable code, and greatly reduce the amount of coding during specific application development.

3.3.2.4 Resource Definition

The resource definition implementation system adopts the idea of ​​unified resource management to uniformly describe the resources related to people, things, and the environment in the software to provide data support for business applications.

1. People and Organization

Administrative organization: Describe the existing bureaucratic tower organization of the prison, which is used to determine the administrative ownership of personnel.

Business organization: Taking the business execution process as the constraint, define the execution organization that undertakes the specific business content in the business process.

Business position: Define the position that performs specific matters under the virtual business organization in the process of business execution.

Personnel file: Define the relevant information belonging to the existing civilian police in the prison unit under the administrative organization.

Detainee Organization: Define the administrative organization used to execute the detention of prisoners.

Prisoner files: Define the relevant information of the prisoners currently in custody that belong to the prison organization.

2. Production resources

Define the production tools, machinery and equipment involved in the production labor process, and match them with electronic tags to identify related resources.

3. Environmental Resources

Define the distribution of buildings and floors in the prison supervision area, which is used to combine and match with a fixed card reader to determine the trajectory of prisoners.

3.4 System interface

3.4.1 Interface Principle

The application of this system is based on the front-end hardware equipment, basic archives of prisoners and other software and hardware environments, involving related interfaces with front-end equipment and third-party software products. At the same time, it can be considered to connect with the prison’s existing integrated security management platform to achieve linkage. The implementation of related interfaces follows the following principles.

The interface implementation related to the hardware adopts the method of directly calling the SDK provided by the factory.

Interfaces related to third-party software products adopt data exchange methods based on intermediate data sources.

3.4.2 Interface content

According to the functions realized by this software and the equipment used, the related interfaces involve the following two categories:

The interface provided by others

The interface we provide to others

As far as the existing or about to be installed and deployed application systems of the prison system are concerned, they have the following interfaces:

The interface provided by the other party:

1. The identification device (reader) manufacturer provides SDK packages and related drivers for reading electronic tags.

2. Information on the basic archives of prisoners provided by the Prison Affairs Open Platform includes information on the archives of prisoners.

The interface we provide to others:

Provide abnormal alarm information for target objects counted events for the integrated security management platform of prisons.

The interface provided by the other party The interface provided by the other party

Electronic label information, prisoner information, alarm information

Reading method Call SKD to read data exchange based on database technology data exchange based on database technology

Data content, electronic label information, files of inmates, prison area mobilization and call call alarm information

The relevant interface content and data diagram are as follows:

620)this.style.width=620;” border=0 alt=National judicial organs use RFID technology to solve prison management problems src=”http://images.rfidworld.com.cn/FileUpLoadSavePath/2016-02/9276b5167757bf120eb.jpg “width=560>

3.5 System List

This list takes the pilot unit-the prison’s supervision area environment and building composition as prerequisites, and follows the principle of “overall overall planning, distributed implementation”, with prisoners in the supervision area, related production tools, and two production workshops as the deployment targets Configure it. The extended application building or supervision area can be deduced by analogy.

3.5.1 Configuration principles:

1. Electronic tags: 1 piece of prisoner’s manpower and 1 piece of related items (production tools) each

2. Hand-held readers: 2 sets per floor per building/or arranged according to the supervision area

3. Fixed reader: 1 set for each floor entrance and gate entrance of each building

4. Fixed antenna: 2 pcs for each fixed reader

5. Wireless AP: optional

6. Management software: a set of front-end software is installed in each handheld reader

A set of background management software is installed on the server in the central computer room

Except for the management software, other equipment needs to be considered for standby conditions.

3.5.2 The actual situation of the prison

1. Number of prisoners: Calculated by 2000

2. Number of labor tools: 8000

3. Floors of production workshops: each production workshop has 4 floors

4. Floor entrances and gates of the production workshop: 10 per production workshop (4 on the 1st floor, 2 on the 2, 3 and 4 floors each)

4 implement the solution

4.1 Overall system deployment

The basic principle of this system is to apply RFID technology, take electronic label data through the reader, and upload the collected data to the back-end management application server to realize business management functions. Therefore, system deployment involves two major categories:

Equipment deployment

Application software deployment

620)this.style.width=620;” border=0 alt=National judicial organs use RFID technology to solve prison management problems src=”http://images.rfidworld.com.cn/FileUpLoadSavePath/2016-02/228b6e7583775ac6afd.jpg “width=560>

4.1.1 Equipment deployment

The deployment of front-end equipment includes the deployment of electronic tags, handheld mobile readers, and fixed readers (including antennas).

1. Electronic label

An electronic label is handed out to all prisoners in custody, which is worn on the left front chest in the form of a badge, and the corresponding relationship between the electronic label and the prisoner is set through the function of the management software to realize the identity of the prisoner.

2. Mobile reader

A mobile reader is installed on each floor of each prison, hospital, confinement room, inmate team, training building, production workshop, and prisoner’s canteen for roll call management in activity venues.

3. Fixed reader

Equipped with fixed readers at the entrances and exits of buildings, floors, entrances and exits of prisons, hospitals, confinement rooms, prison teams, training buildings, production workshops, prisoners, reception buildings, canteens, and used to track and record prison sentences The trajectory of personnel in the supervision area.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare