Smart Prison Defense Management System-Personnel Positioning Management System
[ad_1]
Chapter One System Overview
On March 1, 2009, two detainees in Hanzhong Prison in Shaanxi escaped after sawing off the sewer isolation net in the workshop.
On May 23, 2009, three detainees in the Detention Center of Jieshou City, Anhui escaped.
On October 17, 2009, four prisoners in Hohhot Prison escaped after killing a guard.
On November 15, 2009, Liu Hong, a serious prisoner in Deshan Prison, Changde, Hunan, escaped.
On January 6, 2010, a suspect in Qinzhou, Guangxi escaped during treatment.
On October 25, 2011, the prison escape incident in Henan North Yubei Prison 2011
On September 11, 2011, Hebei Shenzhou Prison Escape Incident 2011
In 2014, three detainees from the Yanshou County Detention Center in Heilongjiang “escaped from prison” after killing a policeman and fled.
Due to the relatively lagging behind the construction of prison management informatization, a series of vicious incidents similar to the above cases have continued to occur throughout the country, which has brought great harm to the country and the people. In order to prevent the recurrence of assaults and escape incidents, and to prevent detention Personnel endanger society again, and the intelligent construction of prisons brooks no delay.
Starting from the actual urgent needs of prison management detainees, Beijing Haotian Technology uses the latest RFID technology to propose a smart prison defense management system. This system aims to improve the informatization of prison area management and promote the management of prison detainees. To ensure the security of prison defense and maintain social stability and harmony.
Chapter 2 System Overall Scheme Design
2.1 The guiding ideology of the smart prison defense system
The construction of the smart prison defense system aims to improve the information level of prison management, ensure the safety of prison staff, and prevent the occurrence of escape incidents. It takes the promotion and full application of the Internet of Things as the core, and aims at high quality, low investment, and streamlined processes. , Carry out system design and overall planning within the overall framework of the construction of digital information prisons, and comprehensively promote the management and administrative management of prison personnel in my country in accordance with the overall construction idea of “scientific overall planning, prominent focus, gradual improvement, and perfection” Informatization and modernization process. The system construction aims to improve the informatization level of prison management work and prevent the occurrence of jailbreak incidents. It focuses on real-time, efficient, and scientific prison management work, takes the promotion and full application of information systems as the core, and takes low investment and high Benefit and focus on quality as the goal, carry out system design and overall planning within the overall framework of the construction of the digital informatization supervision area, and comprehensively promote supervision in accordance with the overall construction idea of “planning, step-by-step construction, construction while using, and gradual improvement”. The process of informatization and modernization of the management and administration of detainees in the district.
The system development and construction follow the following principles:
2.1.1 Overall planning, independent innovation
The smart prison defense management system is mainly composed of seven subsystems, including basic personnel information management system, card reader electronic label management system, electronic map positioning management system, monitoring system, access control system, medical bailout system and personnel attendance evaluation system. On the basis of the existing supervision system, deepen the application of functions, integrate the personnel positioning system, and realize the security and defense all-in-one card.
Haotian Technology focuses on the promotion of the Internet of Things technology and the application of ZigBee technology. It has independently developed and created a smart prison defense management system. It uses the market’s common 2.4G frequency band communication and establishes its own unique communication protocol and algorithm encryption mechanism to protect data security, Ensure communication stability and customer satisfaction.
2.1.2 Standardize the system and look to the future
The development and resource construction of the smart prison defense management system conform to a unified technical specification and characterization system, pay attention to the continuity and sharing of development work, and pay attention to leaving standardized data and control interfaces for subsequent system development and promotion. Unified development of technical indicators such as application technology, data storage format, signal transmission format, interconnection interface mode, etc.; in terms of overall system architecture, service equipment selection, card reader electronic tag type, basic data collection, etc., fully consider the realization of subsequent functions , Taking into account the compatibility of equipment, system scalability, functional scalability and application diversity.
2.2 System principle
The smart prison defense management system uses the application of advanced ZigBee and RFID technology to make the smart supervision wristband with the unique ID number worldwide as the identification device for detainees. It is anti-disassembly, long communication distance, waterproof, reliable data, long service life, etc. Features, to effectively meet the business needs of prison management, management personnel through the back-end server visual display to know the state of the entire prison.
The IoT network directional monitor is used at the door of the prison to assist in positioning and judging the entry and exit management of detainees; the Internet of Things wireless node is used in the prison and corridor area to achieve full coverage of the prison area; the Internet of Things repeater is the key point of data transmission , The data received from the IoT network directional monitor and the IoT wireless node are transmitted to the background server through the network cable or the 485 line.
2.2.1 The working principle of electronic tags
Electronic tag (RFID) technology is a wireless radio frequency automatic identification technology that uses radio frequency signals and their spatial coupling and transmission characteristics to realize automatic machine identification of stationary or moving items to be identified. The system is developed through electronic label technology , Produced two products, electronic wristband and prison guard card.
The radio frequency identification system generally consists of three parts, namely, electronic tags, readers, and background management software. In the application, the electronic tag is attached to the object, equipment, or person to be identified. When the object, equipment, or person attached to the electronic tag enters the reading range of the reader, the reader will automatically wirelessly send the agreement in the electronic tag The identification information receives or writes specific information, so as to realize the function of automatically identifying items or automatically collecting item identification information.
2.2.2 Principles of RFID automatic identification technology
The system composed of RFID and short-range communication equipment mainly includes two parts: smart RFID and RFID read-write units (RWU). The wireless communication between the read-write equipment RWU and RFID realizes the communication between the information management system and RFID. Information exchange.
The read-write device RWU is an RFID read-write controller, which is composed of a microprocessor, a security module, a microwave communication controller and communication interfaces such as RS232, 485, TCP/IP, etc. It uses short-range communication protocols and microwave wireless transmission methods to realize RWU For the purpose of safe and reliable information exchange with RFID, RWU connects to the host computer through RS232, 485, WIFI, GPRS, TCP/IP, etc., receives control commands and data from the host computer and returns data.
3.1 System overall design drawings
Prison system overall design drawings
Remarks: The design of the entire prison includes three parts: the perimeter area of the prison wall, the production workshop and the living area and other internal areas, and the non-indoor area within the wall. The three parts are independent and closely related to each other, forming three prison security precautions. system.
3.2 Software system architecture
Software system architecture
Chapter III Overview of System Solutions
The overall plan is the top priority of the prison’s intelligent management and security system construction. Our company has conducted detailed investigations on the escape incidents in recent years, and according to the work process of prison guards and the law of activities of prison detainees, the intelligent management of the prison is carried out. And the construction of the security protection system is divided into three parts: the intelligent management system of the prison area, the intelligent management system of the activity area outside the prison, and the intelligent management system of parole medical treatment. The three parts complement each other and jointly build the prison intelligent management and security protection system. .
Below we will explain in detail the three components of the prison’s intelligent management and security system:
5.1 Intelligent management system for prison area
The construction of an intelligent management system for prison areas mainly includes the following parts: 1. Perimeter management systems such as prison walls, production areas, and living areas; 2. Real-time positioning systems for access control and area of living areas, production areas, restaurants, prisons, etc.; 3. Gun management system for guard posts and armed police;
1) Perimeter management system for prison walls, production areas, living areas, etc.
Prison wall
The prison fence is the last security guarantee of the prison’s intelligent management and security system, which prevents the prison from being detained.
The most important checkpoint for personnel to escape from prison plays a decisive role in the security of the entire prison system. Therefore, the requirements for the stability, timeliness, and anti-interference of the equipment are extremely high. In order to ensure the stable operation of the system, we will design the plan Fang gave thorough consideration.
The prison wall perimeter management system is composed of: electronic fence or leaking cables, and the alarm host communication is transmitted to the monitoring center through the personnel positioning management system.
Prison perimeter function: prevent detainees from breaking out of prison; when detainees are close to the electronic fence about 3 meters (with an error of not more than 50 cm), the alarm device will automatically start the alarm, and the large screen will display the scene of the incident-breaking into the restricted area and being in custody Personnel identity information, location information and online viewing of the scene through the video linkage function;
Prison perimeter installation method: along the middle of the fence or 30 cm from the fence shallowly buried underground (the perimeter cable antenna needs to be covered with PVC pipes to prevent the antenna from bending and deforming, being corroded by water, etc.), install a perimeter IoT every 50 meters Orientation monitor and a waterproof test electronic label (when the IoT orientation monitor is damaged, it can be detected in the background to ensure the stable operation of the IoT orientation monitor), and a directional reader is installed as a signal receiver every 80 meters .
Production area, living area, etc.
The boundaries of production areas and living areas also need to install IoT directional monitors + perimeter IoT directional monitors + perimeter cable antennas to prevent detainees from entering illegal areas without permission and prevent accidents; The prison guards of the monitoring center and senior prison leaders can set the boundaries according to actual needs, such as: how far away the detainees are from the boundary and call the police, detainees are not allowed to enter a certain area during a certain period of time, and detainees can Enter the perimeter to clean the lawn, etc.;
2) Gun management system for sentries and armed police
The construction of the guard post and armed police gun management system includes two parts: first, the intelligent monitoring subsystem of guard post and armed police guns; second: real-time tracking and positioning management subsystem for perimeter prison guards;
◇ Intelligent monitoring subsystem for sentry and armed police guns
The construction plan of the intelligent monitoring subsystem for the sentry and armed police guns
A signal receiver and an IoT directional monitor are installed inside or on top of each sentry post, which is responsible for receiving the electronic tags of armed police firearms and emergency help signals issued by the armed police (detainees snatching firearms, detainees fighting, detainees having abnormal behaviors, etc. ) And is responsible for transmitting the information to the back-end monitoring center through the RJ45 network; the armed police’s gun butt is equipped with a special electronic tag, and the electronic tag will send the electronic tag signal to the signal receiver in real time. Etc.) If the information sent by the electronic tag is not detected, the alarm system of the monitoring center and the security monitoring system will automatically start. At this time, the LCD display will display the current sentry situation, the identity information of the armed police on duty, the position information of the armed police on duty, etc. The monitoring center can follow The actual situation dispatched nearby armed police to assist in handling emergencies to prevent serious situations from occurring.
◇ Perimeter armed police patrol real-time tracking and positioning management subsystem
Perimeter armed police patrol real-time tracking system functions:
1) Regional positioning, through the IoT directional monitors and signal receivers installed on the fence, regional non-precision positioning can be achieved
2) Alarm for firearms and armed police when they leave their positions
3) The armed police failed to patrol the scheduled route with guns, and the system called the police
4) When the armed police encounter an emergency, they call the police for help
5) Armed police and gun track playback
3) Real-time positioning system for access control areas such as living areas, production areas, restaurants, prisons, etc.
The real-time positioning system for access control areas such as living areas, production areas, restaurants, prisons, etc. includes two parts: first, the regional access control management system; second, the regional real-time positioning system;
◇ Regional access control management system
Investigation on the status quo of access control management: Detainees from the living area to the production area to work, eat in the restaurant or return from the production area to the living area, are led by the team leader and registered in and out through the only channel inside and outside the gate. At present, manual registration and counting of the number of people are used, and the work intensity of prison guards is very high. Through the regional access control management system, the data of the roll call can be directly transmitted to the prison guard’s PDA or background monitoring center through the local area network or WIFI, GPRS, etc., thereby reducing the work intensity of the prison guard.
Regional access control management system function: real-time roll call and specific authority settings for detainees from the prison living area to work and production areas, restaurants, cells, etc., when they pass the gate (gate) (a detainee can only pass the access control within a specified time, Otherwise, an alarm will be triggered) to strengthen the standardization and safety of prison management;
Install IoT directional monitors and signal receivers in the living area and production area channels (determined by the on-site environment), because this channel is the only channel for all detainees to enter the production area or return to the living area, and there is a large daily flow of people for the reliability of the system Higher performance, place IoT wireless nodes in the channel;
The system will automatically record the entry and exit information of all detainees (personal information, quantity, entry and exit time of detainees), and can automatically match the rules of the background system. When detainees who do not meet the passing rules pass, the duty room immediately performs sound and light Call the police and record violations.
◇ Regional real-time positioning system
The regional real-time positioning system mainly monitors personnel in large areas such as prison living area, work area, and activity area, through the Internet of Things omnidirectional monitor, the Internet of Things directional monitor, the Internet of Things wireless node, and the Internet of Things network. With the combination of relays, a full-scale position monitoring of production areas, activity areas, etc. can be performed to understand the details of detainees and prison guards in real time. You can intuitively understand the actual number of personnel in the area, personnel information, etc., which can be clear through the software. It greatly reduces the workload of prison guards and realizes the way to demand police force from science and technology.
【Function description】
In indoor and outdoor labor places, key prisons, toilets, squares and other areas, signal coverage is achieved through the combination of IoT omnidirectional monitors and directional positioning receivers;
The system will roll the names of detainees in the area every 5-10 seconds (settable). When the detainees leave the designated area, the system will immediately alarm and display the alarm location and information of the detainees in violation of the rules.
The system can also control and restrict each area according to the event segment. If a person enters the area during the controlled time period, the system will immediately sound and light alarm and notify the nearest prison guard to deal with it in time, which greatly avoids accidents. , The setting of controlled time can be flexibly changed with the prison regulations.
5.2 Intelligent construction of medical service institutions outside prison
The overall construction of the prison’s intelligent management and safety protection system needs to take into account the intelligent construction of medical service institutions for detainees to seek medical treatment. In recent years, prisoners have used the assistance of medical treatment to escape from prison from time to time. The painful lessons remind us that we must not ignore the detainees. Take care of all aspects.
Taking into account the cost of intelligent construction of the entire prison staff and the particularity of medical service institutions outside the prison area, the intelligent construction of medical service institutions outside the prison area can adopt a policy of focusing on deployment and control, focusing on the future, and gradually improving, such as: entrance and exit of the building, Install positioning equipment for inter-floor passages, electronic fences, and hospital entrances and exits to prevent accidents;
5.3 Intelligent construction of out-of-office location monitoring
The intelligent construction of out-of-office location monitoring is mainly for the detainees to go out to work and seek medical treatment outside, and for the temporary out-of-work area and the internal area of the driving vehicle, a remote RFID monitoring, positioning and tracking method is adopted to realize the mode of requesting police force from science and technology.
Install a set of omnidirectional readers or PDA handsets on the roof of the police car or inside the police car to monitor the overlapped area in real time through a combined method, and at the same time transmit the monitoring information back to the prison information center through the GPRS network in real time.
【Function description】
When visiting a doctor on bail or working in other areas, the reader will transmit information about the number of detainees, identity information, and prison guard information to the prison information center in real time, so that the information center can keep track of the detainees’ movements;
When working outside, you must first design the boundary through the police car. When the reformed labor personnel approach the perimeter, the system will give an alarm and display it on the terminal in the car at the same time, and send relevant information back to the prison information center;
Rehabilitation personnel need to work in the set area, and the system regularly reports location information;
When the prison guards encounter an emergency, they send a signal for help in time, and the signal is transmitted to the background through the GPRS network to prevent accidents;
The system is equipped with locators according to the interval area. The locators are battery-powered and can be moved and configured flexibly.
Chapter 4 Features
The smart prison defense management system is the most advanced prison management system at present. The functions involved can effectively meet the business needs of the prison and facilitate the daily management of the management personnel, such as real-time positioning, cross-border alarm, unauthorized departure alarm, and wristband removal Alarm, video linkage, etc., as follows:
3.1.1 Real-time monitoring of personnel
The location of all detainees and police officers is displayed on the electronic map in real time. The monitoring personnel can dynamically grasp the number of personnel and real-time distribution. Move the mouse to the personnel icon to view the detailed information of the personnel.
3.1.2 Personnel search and location
Enter the name or number of the personnel to quickly locate the location of the prisoner or police officer you are looking for.
3.1.3 Illegal assembly alarm
In the designated area, the system can set the maximum allowable number of personnel. Once the number of people exceeds the preset number, an alarm message will be sent out immediately.
3.1.4 Forbidden zone intrusion alarm
Detainees trespassing in the restricted area backstage will automatically call the police. Some areas are restricted areas (wall guard area, dangerous goods source area, etc.). Unauthorized detainees illegally break into the background system to automatically alarm and pop up the video window of the incident; at important prison gates, you can set the pass permissions and Within the time period authority, the entry and exit of unauthorized personnel will automatically trigger an alarm.
3.1.5 Unauthorized departure alarm
It is stipulated that certain prisoners cannot leave a certain area, or cannot leave a designated place within a certain period of time, and an alarm will be issued once they leave.
3.1.6 Activity track record
The system records the location and time of all personnel passing through all the time, and can track and replay the personnel’s movement route, and master its detailed activity route and time.
3.1.7 Automatic ward rounds and roll call
It can automatically count the number of personnel in each prison at a fixed time, showing the number of people who should have arrived, the number of people who have arrived, and the number of people who have not arrived. If the personnel have not arrived, an alarm will be issued in time to remind the prison guards to find and locate the missing personnel in time to prevent accidents. The prisoner has set the room number in the system. Once the prisoner enters the wrong room or leaves the room during an irregular time, an alarm message will also be sent.
3.1.8 Out of care alarm
Bind the prisoner location tag with the police location tag, which can be bound one-to-one or many-to-many. When the walking trajectory of the prisoner and the police are inconsistent for more than the allowed time, the system will send an alarm message. Or limit the distance between the prisoner and the police. When the distance between the two is more than the specified distance, the system will send an alarm message.
3.1.9 Emergency call
Prison guards and prisoners locate tags with alarm buttons. Once an emergency occurs, you can press the alarm button. The monitoring center can receive the alarm information in time, know the location of the alarm, and provide support quickly.
3.1.10 All-in-one card function
One card function, the prison electronic wristband has a built-in non-contact one card chip. The prison guard card can realize access control, electronic door lock, inspection, attendance and internal consumption functions, and the electronic wristband of detainees can realize functions such as dining and internal consumption;
3.1.11 Powerful statistics and report functions
With query statistics and report functions, the management system can automatically generate various charts that meet the daily management of managers, including: bar charts, pie charts, graphs, lists, etc.These charts can conveniently help prison managers analyze a period of statistics
The working conditions and activities of all types of personnel over the period, as well as the occurrence, frequency, location, and cause of various alarm events, and other factors necessary for prison management.
3.1.12 Armed police and their off-position report
Police and armed police and their out-of-position alarm. For armed police and firearms that are not authorized by the leader, if they are forcibly taken out of the sentry monitoring area, the alarm will be triggered immediately;
3.1.13 Video linkage
Video linkage, on-site real-time online; monitoring probes are installed in sentries, prisons, production areas, living areas, leisure areas, etc., the probes work around the clock, and the information is stored in the hard disk memory in real time. When the reader receives a special ID (the prison guard has illegally left with a gun, the detainee breaks into an unauthorized area, the prison guard is surrounded, etc.), it sends an instruction to the background service manager to pop up a video box on the software, and the manager can Instantly check the location of the abnormal situation and the on-site situation to avoid dangerous situations;
3.1.14 Remote monitoring and inspection
The system can be operated through the Internet to realize remote management and monitoring, and managers can check the prison situation at any time even if they are not in the prison.
3.2 Regional prison guards management system
Each prison guard in the area is issued an active tag, and the relevant information of the person is recorded on the tag, such as the person’s name, gender, date of birth, department, level, image, history record of entering and exiting the specified area, access authority, etc.; in the area A fixed card reader is placed at the gate to monitor the entry and exit of prison guards. When someone approaches the gate, the card reader will give an alarm first to remind the guard that the guard is about to leave the surveillance area. Then the card reader recognizes the tag and transmits the data to the upper computer of the terminal in the guard room, and the upper computer will display the specific information of the person, such as name and picture. If necessary, you can send relevant data to the general control center; install a certain number of fixed card readers in the area to realize the area positioning of prison guards. The number of card readers installed is based on the on-site measurement area. The card readers are arranged (each reader has a certain recognition range and can only identify the surrounding area):
3.2.1 Accurate regional positioning
The system can realize area positioning, and in a controlled area, personnel can be positioned within an area. Since there are readers everywhere in the area, each area is within the signal range of the fixed reader, so all the electronic tags in the area can be covered by the information of the reader, so as to achieve regional positioning;
3.2.2 Strict access control
At the gate of the area, a fixed card reader is installed. Personnel want to leave the area, and the guard can only let him out after receiving the approval of two specific leaders. Otherwise, personnel are prohibited from leaving the area. When the person goes out, the reader records the time when the person goes out, and records and informs the time when the person returns. If the card reader fails to read the return information of the person within the specified return time, the system will alarm the guard and related personnel.
3.2.3 Judgment of persons near the gate
The system can judge the people close to the gate. When a person approaches the card reader at the door, the reader can send the read tag information to the system host computer at the door guard, and the system host computer can quickly call up the person’s basic information from the system database and display it on the host On the plane, such as name, department, photo, etc., so that the guard can better judge the person approaching;
3.2.4 Monitoring integration
The system can be integrated with the monitoring system of the area. After the area is located, the monitoring screen of a certain monitor in the area can be viewed;
3.2.5 PDA leader inspection
The system is equipped with a handheld PDA in case the leader wants to check the situation of the personnel in a certain area.
[ad_2]