Electronic wristband prison information system plan

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

one. Background overview:

As the tasks of public security and judicial organs to maintain social order and combat criminal crimes become more and more serious, the number of illegal criminals such as detention, education, and compulsory drug rehabilitation in various supervision places continues unabated. The call for information sharing is getting louder and louder, and the backward management model can no longer meet the needs of real struggles. In order to improve the level of management work, leaders at all levels have reached a broad consensus on the importance of establishing an information system for supervisory sites, and it has become an inevitable trend to plan and build an information system for supervisory sites at all levels in a unified manner.

At present, the information systems of supervision sites in various provinces are in the process of preparation or construction. In particular, the public security organs have achieved initial results in some pilot provinces according to the “General Design Plan of the Ministry of Public Security “Golden Shield Project” and the “General Construction Plan of the National Public Security Supervision Information System”. , But at present, the information systems of the public security or judicial departments are only limited to information processing, and information collection is still purely relying on hand input, and it is impossible to truly associate the information system with the detainees.

In a special environment such as a surveillance site, a safe and reliable information collection system is used to distinguish and identify detainees, and to truly connect everyone’s information in the information system with everyone in reality. Give full play to the role of the information system of supervision sites, realize the informatization of prison management in a real sense, and realize the way of “requesting police force from science and technology”.

two.System composition: Adopt two special equipments of MC9500 and MC2008

The system is composed of two-level network of host and data acquisition terminal system: (as shown in the figure below)

3. Main functions:

1 Introduction

The criminal/suspect identification wristband is the professional product of choice for the public security and judicial systems. It is now widely used in legal enforcement agencies in developed countries in Europe and the United States.

The criminal/suspect identity belt has been proved to be a very convenient and reliable tool in the long-term use process, which can accurately and effectively identify and categorize criminals, eliminate human errors and unnecessary confusion, and greatly reduce The workload of the guards improves work efficiency.

2. Purpose

a. Identification

Recognition is the basic function of the prisoner’s identity belt. Cooperating with information management software is extremely important for places with a large number of management objects and greater mobility.

Unlike traditional prisoner registration cards or registration cards, professional prisoner identification belts are worn by prisoners personally, and photos and other related materials can be attached to the built-in chip of the identification belt. Therefore, it is very convenient to check and verify the information of prisoners at any place and in any processing process in the prison, and can correspond to more detailed information in the information management software to ensure that each prisoner is accurately identified and processed.

The criminal/suspect identity belt is made of high-strength materials, which is very strong and durable. At the same time, a special design is adopted to prevent criminals from exchanging or damaging the identity belt. Deliberate damaging of the identity belt will be immediately detected and stopped and punished. When the identity belt is tied to the prisoner’s wrist and locked with a metal or hard plastic lock, it cannot be removed unless it is completely destroyed, and it is impossible to transfer it to others.

b. Classification

Classification is a supplement to the recognition function. The criminal/suspect identity belt provides a variety of color options, and different types of criminals can be classified using different color identity belts.

a) Distinguish according to the nature of the crime, for example, use different colors to distinguish death row prisoners, felon prisoners and other prisoners.

b) Classified according to the status of the criminal suspect in the whole litigation process, such as distinguishing between criminal detention, arrest and sentenced prisoner.

c) According to the characteristics of prisoners, such as high-risk prisoners and other prisoners, or prisoners with infectious diseases and ordinary prisoners.

After using different colored identity tapes for prisoners, you can quickly distinguish various types of criminals or criminal suspects based on this, and improve the efficiency of management. It can visualize the distinction between criminals and criminal suspects in the corresponding information management software.

c. Strengthen management

Strengthening management is the ultimate goal of using identity bands, because identification and classification are all for improving the efficiency of prisoner management and achieving better management results.

On the following occasions:

When prisoners go out or work collectively, when prisoners meet with lawyers or family members, when the investigating unit interrogates the prisoner or even takes the prisoner out of the prison for investigation, and when the prisoner is in court for interrogation, the identity belt can be used to accurately identify the identity of the prisoner. To prevent mistakes, the identity belt can also effectively prevent prisoners from being exchanged in places outside the prison’s control.

Equipped with a handheld device, the guards can retrieve the prisoner’s detailed information based on the chip attached to the identity belt without having to look through the files. The handheld device can also automatically register and transfer the time of a certain prisoner’s exit and entry to the computer. Keep it forever.

3. Advanced features

* Data can be stored in the chip, and data can also be repeatedly written and modified;

* No light is required for chip operation, and data can even be read through external packaging materials;

* The electronic chip has a long service life and can work in harsh environments;

* The reading range is farther, and it can read and write within 5-10cm of the chip;

* Real-time tracking and positioning, automatic monitoring can be achieved;

* The data stored in the chip is encrypted and protected, and the security is higher;

* The identity belt can be worn very conveniently on the prisoner’s wrist while ensuring maximum safety;

* Provide up to 9 different colors for easy classification of prisoners;

* Special design makes the identity belt difficult to be damaged, even if it is damaged, it can be detected quickly, ensuring the uniqueness and correctness of the identification object.

4. System software module:

Detention center management information system: including personnel entry, information maintenance, management system, financial management, medical management, exit registration, query statistics, and system management.

(1) Personnel entry: personnel entry registration, suspect photo entry, criminal suspect information entry, re-entry registration, transfer and return, temporary leave and return, detention for sentence, link change, judgment registration.

(2) Information maintenance: information modification, accomplice registration, criminal health status, social relationship registration, photo maintenance.

(3) Correction system: prison adjustment, lawyer meeting, family meeting, ears and eyes, reward and punishment registration, conversation education, accident, restraint, arraignment registration, collective education, safety inspection registration, civilized prison, key personnel, secret personnel , Inspect the situation.

(4) Financial management: item acceptance, item collection, cash income registration, cash expenditure registration, financial statistics registration, property destruction.

(5) Medical management: seek medical treatment outside the clinic and inside the clinic.

(6) Exit registration: processing the office, temporary leave, change of office, death registration, escape registration, and recovery of personnel who have left the office by mistake.

(7) Inquiry statistics: related inquiries, related statistics, overdue custody inquiries, report reports, related reports, photo inquiries, online pursuit of escape, and exit inquiries.

(8) System management: user maintenance, monitoring area setting, dictionary maintenance, log query, data import, data export, data backup, data upload.

Five system application process:

(1) Personnel entry registration: criminal suspect photo entry, criminal suspect information entry, re-entry registration, transfer and return, temporary leave and return, detention for sentence, link change, judgment registration.

First, enter the suspect’s personal data (including photos), and then print the relevant content on the required specifications of paper, and then embed the paper strips and electronic tags into the plastic wristband, and use a laminator to seal it. Then, the electronic identification wristband can be worn on the suspect’s wrist with the buckle.

(2) Information maintenance: information modification, accomplice registration, criminal health status, social relationship registration, photo maintenance. This part of the function is operated on the computer by personnel designated by the public security detention center.

(3) Correction system: prison adjustment, lawyer meeting, family meeting, ears and eyes, reward and punishment registration, conversation education, accident, restraint, arraignment registration, collective education, safety inspection registration, civilized prison, key personnel, secret personnel , Inspect the situation.

This part is operated by the instructor on the handheld terminal to complete the above-mentioned functions, and then upload the statistical data to the management computer, and the data is collected through the electronic wristband reader through the electronic wristband reader, and then transmitted to the management computer through the 485 bus, and the prisoner is required to enter and exit the prison. Inductive reading must be carried out on the reader during the zone.

(4) Financial management: item acceptance, item collection, cash income registration, cash expenditure registration, financial statistics registration, property destruction.

This part is operated by the instructor on the handheld terminal to complete the above functions, and then upload the statistical data to the management computer.

(5) Medical management: seek medical treatment outside the clinic and inside the clinic.

This part is operated by the instructor on the handheld terminal to complete the above functions, and then upload the statistical data to the management computer.

(6) Exit registration: processing the office, temporary leave, change of office, death registration, escape registration, and recovery of personnel who have left the office by mistake.

This part is operated by the instructor on the handheld terminal to complete the above functions, and then upload the statistical data to the management computer.

(7) Inquiry statistics: related inquiries, related statistics, overdue custody inquiries, report reports, related reports, photo inquiries, online pursuit of escape, and exit inquiries.

This part of the function is operated on the computer by personnel designated by the public security detention center.

(8) System management: user maintenance, monitoring area setting, dictionary maintenance, log query, data import, data export, data backup, data upload.

This part of the function is operated on the computer by personnel designated by the public security detention center.

(9) Patrol: guard patrol personnel, hold electronic ID cards, and swipe the card after arriving at the designated place. This data is collected to the management computer through the 485 bus for statistics and assessment.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare