RFID Prisoner Attendance Tracking and Positioning Security Management System Based on RFID Identification Technology

RFID Prisoner Attendance Tracking and Positioning Security Management System Based on RFID Identification Technology

One: System Overview

System background:

Prisoner automatic positioning management system is a special case of automatic attendance, mainly using RFID radio frequency technology and computer technology.

Prison is a place for criminals to correct mistakes and carry out labor reforms. However, the prisoners themselves may not be able to recognize this point, and thus have conflicting ideas on the management of the prison. They will not obey the management of the management personnel and often do not take the initiative to swipe their attendance. In order to solve the problems of management and management of prisons, it has brought difficulties to the management of prisons. For example, the inside attendance system is an assessment of the prisoners on a daily basis and can also reflect the performance of the prisoners during this period of time, because the performance will affect the length of time they stay in. If you don't obey the management, you don't consciously go for a credit card, but you can't brush it, which will hinder the management work.

Moreover, with the gradual improvement of the prison management system and the continuous updating of monitoring facilities, the capacity of the detention center to prevent and control various security incidents has been greatly enhanced. However, as the types of crimes and the composition of detainees have become increasingly complex, detainees have become more revengeful, vicious, and fraudulent. They have increased their skepticism and sense of restlessness. When they are careless, they will take the risk of taking hostages, escape and commit suicide. The murder, gang collusion, and the police's personal safety and the continued stability of the site have a very adverse impact.

In this regard, our company utilizes the most advanced RFID smart card technology to provide a complete set of software and hardware combined prison application systems for the needs of criminals and prisoners to manage the flow of sub-regional management and monitoring. The system enables management officers to know in real time the number and information of prisoners in each controlled area of ​​the prison, as well as the surrounding police officers on duty. It can provide alarm functions for all kinds of suspicious events and various emergencies, and can quickly Locate relevant personnel and officers on duty, and be able to quickly find out the historical trajectory of personnel within the institution.

Implementation significance:

Improve prison management and realize intelligent management

Changed the traditional management mode and reduced manpower loss

Reduced the probability of criminals fighting the party and fighting and fighting

Making the management of prisons a step further will be conducive to the reform of prisoners and conducive to the construction of a harmonious society.

Second, system design:

2.1 The components of the system

Electronic tags:

The ML-T120 wristband produced by Mulan is equipped with a source electronic tag for use by prisoners. The recognition distance range is 2-80M. Advanced collision avoidance technology can identify more than 200 tags per second. The shape of the wrist is carried on the prisoner's wrist and is made tamper-proof. If the prisoner wants to dismantle it, it will call the police. The identity information of the re-education personnel can also be recorded in the electronic tag, including name, age, gender, height and physical characteristics, and crimes committed, etc.

Magnolia's ML-T100 bi-directional active electronic tag is used by the police. We have a button on the tag. When the police detect an emergency, they can press the button at any time to call the police.

Reader:

Magnolia's ML-M5000 dual read heads accurately position the card reader, which has a strong waterproof function and can be used to automatically read RF card information. Can identify 200 cards at the same time, the distance can be read 5-80M and the distance can be adjusted. Using channel isolation technology, multiple devices do not interfere with each other, and advanced anti-collision technology supports multi-tag reading and writing. Installed in the attendance area of ​​the prisoner's room, corridors, and restrooms to read tag information. Installed outdoors where inmates often ventilate, as a regional positioning effect.

Handheld attendance machine:

The R&D of the ML-M4000P reader is based on Mulan's completely autonomous ML-RFID innovations. It is a reader designed specifically for mobile identification and is a handheld PDA reader. .

As a computer-integrated product, the ML-M4000P reader is equipped with a WINDOWS CE system. The operation is simple and convenient. At the same time, it integrates advanced technologies in the field of RFID and can complete high-rate data transmission and large-capacity data processing, ensuring readability. Writer's excellent quality

The reader is lightweight, small in size, portable, easy to use, stable in performance and reliable in operation. Using anti-interference and anti-collision technology, the signal transmission capability is strong and the service life is as long as 15 years.

The composition of the reader includes: wireless receiving unit, data processing module, DC stabilized power supply, and antenna. Can realize attendance at any time, real-time attendance, field attendance, and easy to use.

3.2 Working principle

Figure 1 The working principle of the system

The criminals enter the time and attendance zone with their wrist-type tag cards every day. Because they are active electronic tags, they work in an active manner, that is, they continuously emit ID number information. When they go to the attendance area, they are read in the attendance area. The card reader will read the tag ID number information, and the card reader will transmit the signal to the computer via RS485 or RS232 (the optical fiber transmission can be used when the distance is greater than 600 meters), and the prisoner can be seen by comparing the ID number database. details. The system uses time for attendance checking. Every morning attendance is based on the time of one reading. Night attendance is based on the time of the last reading. When the specific design is set to a time period, such as the time from the beginning of the morning attendance, the end of the time from the end of the attendance in the afternoon. There is also a more convenient way of checking on attendance. With hand-held attendance machines, police officers only need to accurately implement attendance. When positioning, the information is extracted in the same way. The above figure reflects the overall working principle of the entire system and is based on the Mulan RFID technology.

3.3 System Solution Introduction

a Introduction to the overall prison plan:

Each prisoner was given a tamper-evident wristband label developed by our company. The label recorded the personal information of the relevant prisoner and was tamper-proof. When the prisoner tried to tear it down, an alarm would occur.

In the interior, the remoter readers developed by our company are installed in places where prisoners live activities, ie every room, toilets, aisles and other inmates may often be active, and there are also gate access control channels for each building in the prison area. Related remote readers are used for attendance monitoring.

In outdoor criminal activities or production workshops, the readers are arranged according to specific conditions so that the signal covers the entire activity area. In this way, the prisoners' actions are under surveillance. There are related facilities installed in different workshops, and you can also set up permissions to implement the regional alarm function. In some areas, only authorized personnel can stay, otherwise an alarm will occur. There are also some migrants who need to flow from different workshops frequently. However, there are time limits. There will be no problem with the system at the specified time. Otherwise, the system will issue a warning or an alarm.

The most important thing is to arrange special readers around the fences of the entire region to cooperate with the software and set up some authority. When the prisoner appears in the restricted area, the system will send an alarm signal or the prisoner will try to escape around the fence. The system prompts to generate an alarm.

Of course, in the workshop and other occasions, the application of handheld attendance is more concise and convenient, and the police officers can realize automatic attendance only by walking around easily. And the handset can get communication with the host computer by WIFI at any time.

ML-M4000P handheld

In this figure, the reader reads the electronic tag information worn by the prisoner, and then transmits the information to the management center in a wired manner or in the form of optical fibers at regular intervals. The management center cooperates with the relevant software to process the information and passes the permission when necessary. Set to generate an alarm. Also, if the installation software developed by our company is installed, the prison personnel can be observed at any time in any place where there is a network.

Card readers are installed in every room, rest room, aisle and other places to monitor the movement of prisoners in real time. For example, there are several people in a room, information about the people of these people, etc.

In the figure, SHAPE \* MERGEFORMAT Indicates card readers installed at entrances and exits of important buildings, more for personnel attendance, SHAPE \* MERGEFORMAT The card reader installed in the open area of ​​the area where the prisoner's activity area is located is generally used for regional positioning management.

In addition, each prison police officer is equipped with a two-way tag of Mulan RFID's independent property rights. There is a button on it. When managers discover that there is an incident that requires an alarm, they can press the button at any time to call the police. At this point, the monitoring center can see which police officer is alerting when and where, and the monitoring center can make related decisions in a timely manner.

Prison floor equipment installation diagram

a. When the number of base stations installed in the prison is relatively small (RS485+ fiber)

1) The prisoner wears an active electronic tag card (the card is worn on the prisoner’s wrist and is a tamper-evident label. If the prisoner removes it by force, the police will report an alarm), and the active e-tag pupil wearing continuously emits a 2.4G radio. The signal, the wireless signal is encoded, and the encoding of each identification card is unique.

2) The base station is connected through the RS485 bus, and the distance over 1000 meters is transmitted through the optical fiber.

3) Optical fiber converter: It appears in pairs. At the transmitting end, RS485 signals are converted into optical signals. At the receiving end, the signals are converted into RS485 signals.

4) Multi-serial server: It converts multiple RS485 signals to serial signals.

b. It is recommended to use (network port + fiber) when the number of base stations is relatively large (schematic diagram ibid)

3.4 System Configuration

System configuration, see the system configuration list.

In the system composition, some devices need to be determined according to the actual situation on the site.

Three system functions, features and advantages

4.1 System Features 4.1.1 Excellent Performance

★ High degree of recognition reliability: 100% front-end recognition rate. Prisoners can carry 2.4G active RF cards (unless broken) and can be read by nearby readers.

★ Recognition distance (0-50 meters): In the normal environment can reach a stable distance of 50M, in this range will read the information of the tag card.

★ High anti-collision: Each detection point can identify up to 200 people information at the same time.

High degree of identification stability (error rate is less than one in 100,000), truly no error, no leakage.

★ Fast recognition speed (up to 200 km/h recognition speed): It is also able to recognize dynamic tag cards.

★ Alarm function: If the prisoner accidentally removes the wristband, the monitoring room will call the police.

4.1.2 Wide range of applications

With the existing prison network conditions, it can provide a variety of in-tunnel-tunnel transmission methods based on optical fiber, Ethernet, and communication cables, which are highly adaptable and avoid the difficulty of implementation due to the single transmission method.

4.1.3 Security and Stability

★ With safe dust and water resistance

★High anti-jamming, no special TOC \h \z \c \"chart\" error for prison interferers, perimeter environment! No graphic item table found. Seeking for strong environmental adaptability

★ The internal circuit is highly integrated, the device failure rate is minimized, and the operation is reliable.

★ Active identification card, no electromagnetic pollution, maintenance-free, safe to use

4.1.4 Simple and convenient operation

★Import directly into the plan of the prison, the operation is simple; ensure that the displayed graphics are consistent with the proportion of the customer's original

★Software full Chinese menu with good interface

★Integrated structure design of wireless monitoring substation, no need for external antenna or ground coil, easy installation

★ Identification card built-in battery, ultra-low power consumption, no external miner's lamp power, no need to charge

4.2 System Functions 4.2.1 Positioning Management Functions

★ Query and display the identity, quantity and distribution of personnel and equipment in a certain area at any time.

★ Check the actual location and activity track of one or more people and equipment.

★ Record a series of information about the arrival/departure time and total working time of personnel and equipment at any place. You can supervise and implement whether important patrol personnel (such as prison guards inspection personnel) will conduct on-site inspections on time or on-site, or perform various tasks. The detection and processing of data items fundamentally eliminate the occurrence of inter-prisoner fights.

4.2.2 Query Statistics

★ Prisoner Inquiries: You can search the prisoner’s current area, stay time and the route of the activity according to the custom combination conditions.

★Differential query: You can query the distribution of the base stations in the prison.

★ Unreached area query: You can check whether the prison guard arrives at the designated place on time.

★ Prisoner Statistics: You can count the number of prisoners according to the date.

★ Regional population statistics: It is possible to set and manage the relevant construction areas arbitrarily, and to automatically conduct regional population statistics.

Use this system for reference comparison:

Before the implementation: Using traditional attendance measures not only consumes manpower but also management is difficult to fully place.

After implementation: Using this system can reduce the manpower consumption of management, realize intelligent management, and reduce the labor intensity of managers.

Prior to the implementation: Prisoners must take the initiative to conduct credit card attendance on a daily basis, which results in criminals’ conflict of thought and resistance and hinders the management of the prison.

After the implementation: The system uses an active RF card, the work is active, do not have to inmates take the initiative to attend every day, as long as the prisoner with a wrist electronic tag through the attendance area every day, the card reader installed in the attendance area will be able to automatically Reading tag information to achieve prisoners' attendance. This will not only reduce the prisoner's resistance but also facilitate the management of managers.

Before the implementation: The traditional prison management model requires a lot of manpower and material resources, adding to the government's financial burden.

After the implementation: The application of new technologies has led to the intelligent management of prisons, reducing the need for manpower management, and the realization of a police force for science and technology, saving manpower and financial expenses for the government.

Contact information

phone

fax

Mobile phone

E-mail:

Http:// http://

QQ:

Contact: He Lin

Address: Room 504-506, Building 1, China Venture Building, 625 Binhe Road, High-tech Zone, Suzhou, China