Prison inmate management plan
[ad_1]
The first part of the development background of RFID smart prison management system
With the gradual improvement of the prison management system and the continuous updating of prison administration facilities, the ability of prisons to prevent and control various security incidents has been greatly enhanced. However, as the types of crimes and the composition of detainees have become more and more complex, criminals have become more vindictive, cruel and cunning, and have increased impetuous psychology and restlessness. If they are not careful, they will take risks and wait for opportunities to take hostages and escape. , Suicide, homicide, and jailbreaking, which have extremely adverse effects on the personal safety of the police and the continued stability of the premises. Based on these facts and years of painstaking research on prison work, the RFID intelligent prison management system developed by our company, It can realize intelligent monitoring and management, prisoner information management, cross-border alarm, detainee location, tracking and other functions. Significantly improve the security and management efficiency inside the prison, and reduce the work intensity of prison managers. At the same time, the system also has various extended functions, such as combining and integrating with video surveillance, so that RFID technology and popular video surveillance technology are organically integrated. integrate. In addition, it can also be integrated with security monitoring systems such as face recognition, which not only enriches the functions of the entire monitoring management system, but also effectively enhances the security of the system.
Part Two Introduction to RFID Technology
1. Introduction to RFID technology
RFID (Radio Frequency Identification Technology) is a non-contact automatic identification technology that automatically recognizes target objects and obtains related data through radio frequency signals. Conceptually, RFID is similar to barcode scanning. The barcode scanning technology attaches the encoded barcode to the target and uses a dedicated scanning reader to use photoelectric signals to transmit information from the bar magnet to the scanning reader; and RFID Use a dedicated RFID reader and a dedicated RFID unit that can be attached to the target, and use RF signals to transmit information from the RFID unit to the RFID reader.
2. Features and advantages of RFID technology
RFID is a flexible application technology that is easy to control, simple and practical, and especially suitable for automatic control. The identification work does not require manual intervention. It can support both read-only working mode and read-write working mode without contact or aiming; Can work freely in a variety of harsh environments: short-distance radio frequency products are not afraid of oil stains, dust pollution and other harsh environments, and can replace bar codes, such as tracking objects on the assembly line of a factory; long-distance radio frequency products are mostly used in traffic, and the identification distance can be Up to tens of meters, such as automatic toll collection or vehicle identification. Its unique advantages are beyond the reach of other identification technologies.
620)this.style.width=620;” border=0>
There are mainly the following aspects:
Convenient and fast reading: Data reading does not require a light source, and can even be carried out through the outer packaging. The effective recognition distance is larger, and the effective recognition distance can reach more than 30 meters;
Fast recognition speed: as soon as the terminal enters the magnetic field, the reader can read the information in it instantly, and it can process multiple terminals at the same time to realize batch recognition;
Large data capacity: The two-dimensional barcode (PDF417) with the largest data capacity can only store up to 2725 numbers; if it contains letters, the storage capacity will be less; RFID terminals can be expanded to dozens of K according to user needs;
Long service life and wide range of applications: its radio communication method enables it to work in highly polluted and radioactive environments such as dust and oil. The closed packaging of the terminal makes the service life much longer than the printed bar code;
The label data can be changed dynamically: the data can be written by the programmer, which gives the RFID label interactive portable data file function, and the writing time is less than that of printing a barcode;
Better security: not only can be embedded or attached to products of different shapes and types, but also password protection can be set for the reading and writing of terminal data, thus having higher security;
Dynamic real-time communication: The terminal communicates with the reader at a frequency of 50-100 times per second, so as long as the object attached to the RFID terminal appears within the effective recognition range of the reader, its position can be dynamically tracked and monitored.
The third part of the hardware description of the RFID smart prison management system
The RFID smart prison management system uses active RFID hardware devices. The equipment mainly includes: Receiver, Activator and Active Tag.
Receiver: A device that reads tag information. It can be designed as a handheld or fixed type.
receiver
Frequency band: 2.45GHz
Anti-collision: 200 tags (bracelets) can be identified at the same time
Activator: activates the tag device, and can also write the ID number to the tag
Frequency: 125 KHz
Tag: An electronic tag generally stores electronic data in an agreed format. In practical applications, the electronic tag is attached to the surface of the object to be identified. The reader can read and identify the electronic data stored in the electronic tag without contact, so as to achieve the purpose of automatic identification. Tags are divided into passive tags (Passive tags) and active tags (Active tags). Active tags are powered by batteries and have a longer reading/writing distance. They are also called active tags and generally have a longer reading distance. After receiving the microwave signal from the reader (reading device), the passive electronic tag converts part of the microwave energy into direct current for its own work. Generally, it can be maintenance-free, has a low cost and a long service life. Active tags are small and light, and have a shorter reading and writing distance. They are also called passive tags.
Active (active/active) technology Passive (passive/passive) technology
Long-distance automatic detection, inmates swiping cards close
Automatically send the prisoner’s card at close range
Self-checking damage alarm Not self-checking damage alarm
Prison Guard Help Device No Prison Guard Help Device
Set up a cordon, the prisoner crosses the border to report to the police, no cross-border alarm
Penetrate the human body and accurately identify multiple people at the same time, no penetration
According to whether the stored information is rewritten, the terminal is also divided into a read-only terminal and a read and write terminal. The RFID prison management system adopts a read-write terminal. The information in the read-only terminal is about to be written during the production of the integrated circuit, and cannot be modified later, and can only be read by special equipment; the read-write terminal writes the saved information into its internal storage area, and also when it needs to be rewritten You can use special programming or writing equipment to erase and write. Generally, it takes much longer to write information into an electronic terminal than it takes to read information from an electronic terminal. The time spent writing is on the order of seconds, and the time spent reading is on the order of milliseconds. The tags are composed of coupling elements and chips. Each tag has a unique electronic code and is attached to the object to identify the target object; each terminal has a globally unique ID number-UID, which is placed in the ROM when the chip is made , Cannot be modified. The user data area (DATA) is for users to store data, which can be read, written, overwritten, and operated.
Prisoner label
Frequency band: 2.45GHz
Wireless data rate: 256kps
Battery life: more than 2 years
When a person or object wearing an electronic tag (bracelet) passes through the activation range of the activator (as the celebrity in the picture), the electronic tag (bracelet) worn by the person or object will be activated and send a message. The ID of the activator is included in this information. When the receiver receives the information sent by the electronic tag and transmits it through the network, according to the electronic tag ID number, the activator ID number and the receiver’s IP address to compare the on-site equipment placement data, you can get “someone/someone The record of “things passing through a certain monitoring area at a certain time” realizes the tracking and monitoring of people or objects.
2. Advanced features of hardware products
1. The electronic chip has a long service life and can work in harsh environments;
2. The reading range is larger, and it can be read and written within the range of 40-50m from the terminal to the reader;
3. It can realize real-time tracking and positioning, and automatic monitoring;
4. Outdoor hardware is equipped with high-quality lightning protection, and the equipment has a 10-minute power outage backup power supply
5. The terminal equipment can be designed with different appearances such as wrist type or ankle type as required, and one-time design or recycling type can be selected.
6. Waterproof and replaceable batteries make the label longer life and have damage alarm function;
7. A variety of different colors can be provided on the software to facilitate classification of personnel
Part 4 Introduction to the software functions of the RFID smart prison management system
1. File module
Establish a digital file of each person, record various information of each person in detail, and establish a multi-dimensional query system, which can query various information simply and quickly. The original personnel information system can be integrated to realize information sharing. Recording the daily behavior of the managed personnel can comprehensively analyze their behavior patterns.
Automatically collect criminal information, fully realize informatization, establish a multi-dimensional database retrieval system for detailed digital files of each prisoner, and provide management personnel with comprehensive, fast and multi-dimensional query tools.
It includes five parts:
Prisoner information management
Police officer information management
Monitoring equipment management
Electronic map management
Monitoring area management
2. Prisoner information management
You can add, modify, delete, and query the prisoner’s information.
The prisoner’s information mainly includes the following categories:
1) Prisoner’s basic information system: Prisoner’s unique system ID, electronic tag ID number, personnel number, name, gender, document name, document number, document address, document address postal code, contact address, contact address postal code, contact phone number, Identity level, authorization group ID, actual authorization string, controlled object status (in the team, seek medical treatment outside the office, construction outside the office, execution outside the office, suicide death, other deaths, collective escape, escape alone),
2) Prisoner’s image document recording system: the name of the person who created the image file, and the number of the person who created the image file.
3) Prisoner’s RTLS location recording system: serial number, wristband tag ID number, prisoner’s unique system ID.
4) Prisoner entry and exit record system: serial number, prisoner’s unique system ID, type: (entry and exit), time of occurrence, and event.
5) Prisoner scoring assessment record system: serial number, prisoner system ID, prisoner number, prisoner’s name, prisoner’s certificate number, prisoner scoring assessment information record.
6) Prisoner’s criminal record system: serial number, wristband tag ID number, type of crime, and method of crime.
7) Prisoner transfer record: System: serial number, prisoner’s unique system ID, prisoner number,
8) Prisoner’s reward and punishment record system: serial number, wristband tag ID number, reward and punishment type, reward and punishment details, remarks
9) Prisoner’s work record system: serial number, the unique system ID of the prisoner, the prisoner’s number, the prisoner’s name, the prisoner’s ID number, and the prisoner’s labor conduct record events.
3. Police officer information management
Police officer information: including police tag ID, personnel number, name, gender, certificate name, certificate number, certificate address, postal code, contact number, personnel level, personnel category, status, remarks, photos, resume, characteristics;
4. Supervision equipment management
Basic information: including device ID, device number, device name, device IP, category, location, status, remarks;
5. Wristband label data management
Maintain and manage wristband tags, add, delete and modify. The activation and termination of the wristband tag can be set.
Six, electronic map management
Maintain and manage the electronic map, add, delete and modify. Refine to the monitoring center of each brigade.
Note: The electronic map part is produced by both parties together.
Seven, area management
Maintain and manage the area, add, delete and modify.
An area has independent locator ID, receiver ID and repeater ID, and has a maximum capacity.
8. Alarm policy setting
It can realize overall on-site monitoring and partial on-site monitoring, and realize the alarm linkage interface function, which can realize the linkage function.
9. Real-time monitoring module (screen for daily management)
In daily management, circles indicate prisoners and squares indicate police officers. It is displayed in different colors according to different grades.
The monitoring screen adopts multi-screen real-time monitoring screen
1. general layout.
2. According to the level of prisoners, the circle is displayed in different colors, and the total number of people is displayed at the same time.
3. When there is an alarm message, the alarm area turns red.Screen 2: Area monitoring
1. After selecting an area on the general plan of screen 1, a map of the area is displayed on screen 2. Can switch between different areas.
2. According to the level of the prisoner, the circle is displayed in different colors, and the actual electronic tag ID is displayed at the same time.
Screen 3: Object information
1. After selecting a certain electronic tag ID on screen 2, the personal information of the object and the current area are displayed on screen 3.
2. If there is an alarm message, its current area will turn red.
3. Can start 1-3 video real-time monitoring windows.Screen 4: Equipment monitoring and alarm monitoring
1. The equipment monitoring picture is always on the screen as the base picture.
10. Real-time positioning object historical record query report
The historical access records can be queried by personnel, by region, and by time period.
11. Group history query report
The historical access records can be queried by personnel, by region, and by time period. There is a total of personnel.
12. Alarm log
The alarm log can be queried by personnel, area, and time period.
13. Access record query report
The entry and exit records can be inquired by personnel, by region (brigade gate or prison gate) and time period.
14. Monitoring Linkage Module
It can realize the function of interlocking video monitoring interface, and reserve the video playback interface.
15. System management authority module
Mr. Wu/Mr. Lee
010-86018871, 88494100
13901166579
E-mail:[email protected]
qq:13023544
msn:[email protected]
[ad_2]