RFID prison intelligent alarm system
[ad_1]
1. System overview
With the gradual improvement of the prison management system and the continuous updating of prison administration facilities, the ability of prisons to prevent and control various security incidents has been greatly enhanced. However, as the types of crimes and the composition of detainees become more and more complex, criminals’ retaliation and cunningness, impetuous psychology and restlessness have increased. If they are not careful, they will take risks, waiting for opportunities to take hostages, escape, commit suicide, and harass prisoners. Prison has an extremely negative impact on the safety of the police and the continued stability of the premises. The use of RFID technology can realize intelligent monitoring and management of prisons, criminal information management, cross-border alarms, etc., which can greatly improve the security and management efficiency of the prison, and reduce the work intensity of prison managers. The system also has many aspects. The extended functions of RFID, such as combining and integrating with video surveillance, make RFID technology and popular video surveillance technology organically combined.
2. System composition and principle
The RFID prison management alarm system integrates radio frequency identification technology, computer communication technology, and automatic control technology. The surveillance area is an important place for detaining criminals, so the surveillance area alarm system is an extremely important part of the prison security system. The system uses advanced technology and methods to change the passive security methods of the past security products such as closed-circuit monitoring and anti-theft alarms. Active identity verification control replaces the passive monitoring method. Through the control of the main channel, it greatly prevents criminals and other unauthorized personnel from entering and exiting from the normal channel, which effectively improves the work efficiency of the manager and the degree of security in the management area. RFID readers and alarms can be installed in each corridor, area or room; each alarm point has certain access rights, and only authorized personnel can enter. If unauthorized personnel enter the monitoring point (restricted area), it will be triggered Illegal entry into the alarm, rebound the detailed information of the intruder, and start the video to capture the alarm area.
2.1 Implementation effect diagram
(1) The system can be divided into several areas, and the system can count the number of prisoners in each area, the total number of people, and the number of police officers on duty.
Figure 1 Implementation effect diagram
(2) The system can set up a virtual guard area. When a prisoner leaves his labor area, the system will issue an alarm.
2.2 Police officers enter the supervision area for management
(1) In order to strengthen the safety and precautions of the supervision area, when the police officer is located within 1m in front of a certain area or room, the system RFID reader will automatically read the electronic tag carried by the police officer and flash the indicator light to indicate that the card has been read and the system will automatically record Swipe time.
(2) The system automatically performs identity verification. If the read card number is a valid card number, the LED display next to the RFID reader will display the last four siren sirens, and the entry personnel will be displayed on the management PC at the exit registration office of the supervision area. Related information, such as the siren number, name, and vice versa, the alarm will be triggered.
(3) In order to increase the traffic flow and speed up the traffic, RFID readers allow batch entry, that is, multiple people are allowed to pass at the same time. If the system verifies that the card number read in this batch contains a valid card number, the LED will display the batch The last four sirens of all police officers with valid card numbers will also display the relevant information of the personnel entering Door A on the management PC at the exit registration office of the supervision area, such as the siren number and name, and automatically open door A. Otherwise, the alarm will be triggered.
2.3 Management of temporary cards entering the supervision area
(1) Temporary entry and exit personnel (such as factory masters, technicians, etc.) who enter the prison will be issued with temporary electronic tags after the approval of relevant prison departments. The temporary electronic tags can enter and exit the supervision area, but they must have a police belt to enter and exit.
(2) Outsiders must enter the supervision area, according to the original management method, apply for registration at the Prison Administration Department, and receive the “temporary card for outsiders” after approval, and the card is valid within the validity period (the temporary card corresponds to the system management center information such as: someone , ID number: XXX, apply at 9:30 on X, X, X, X year, valid until 17:30, X, X, X, X year). After receiving the temporary card, outsiders will enter the supervision area with the temporary card under the leadership of police officers.
(3) The electronic tags held by temporary entry and exit personnel and police officers pass in a certain area; when swiping the card, the system automatically performs identity verification, and the system verifies that the card number is valid, then the system will automatically record the entry time of the relevant personnel, otherwise, the alarm will be triggered. .
2.4 Management of Temporary Cards Out of Supervision Zone
(1) When the personnel on duty at the exit registration office of the supervision zone observe through the video surveillance system that there are temporary police officers who are going to leave the supervision zone, the system will automatically perform identity verification after the RFID reader reads the electronic tag, and when the electronic tag card number verification is valid Then it is allowed to pass, otherwise, the alarm is triggered.
(2) The temporary card is automatically disabled after the authorization time has passed, and the card can be recycled and reused by the relevant prison department (such as the prison administration department).
Management of special personnel entering and exiting the supervision area:
(1) Special personnel do not need to hold a card, and are accompanied by relevant prison personnel to enter and exit the surveillance area.
(2) The RFID reader reads the card number of the prison escort. After the system is verified, the system automatically records the entry time of the relevant personnel; it can also be observed by the on-duty personnel at the exit registration office of the supervision zone through the video monitoring system that there are special personnel preparing to enter. Manual release.
Three, system analysis
Because the prison covers a large area and is scattered in different areas, it adopts TIC/IP network structure or optical fiber access. In each building, workstations can be installed according to management needs, and the central control center authorized workstation management is implemented. The workstations upload data to Central control center, the system supports multi-level management mode, workstations and workstations do not affect each other; each subsystem adopts the same database, and the systems are interconnected and managed. The equipment of each system can be managed on the same management platform. The center can manage and control all the access control, alarm, monitoring, patrol, and vehicle management subsystems, and the workstation can be authorized by the center to manage the local subsystems.
[ad_2]