CN103049949A - Personnel security management system and method in mining areas - Google Patents
Personnel security management system and method in mining areas Download PDFInfo
- Publication number
- CN103049949A CN103049949A CN2012105289184A CN201210528918A CN103049949A CN 103049949 A CN103049949 A CN 103049949A CN 2012105289184 A CN2012105289184 A CN 2012105289184A CN 201210528918 A CN201210528918 A CN 201210528918A CN 103049949 A CN103049949 A CN 103049949A
- Authority
- CN
- China
- Prior art keywords
- user
- information
- authority
- pass
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Abstract
The invention discloses a personnel security management system and method in mining areas. According to special environments and conditions of the mining areas, security factors are detected. The system is internally provided with a face recognition device and alcohol detecting device, wherein the face recognition device is used for detecting whether face images are matched, whether security helmets are worn, and whether workers are fatigue; and the alcohol detecting device is used for detecting whether the alcohol content in oral cavities of the workers is qualified, thereby preventing dangerous operation of the workers in the mining areas; and multiple audit modes of holiday control, week control and time section control are adopted for user right verification. The personnel security management system of the mining areas can cover each gate entry and other important areas of the mining areas, improves the entry and working safety of the workers in the mining areas through security verification and right verification which are matched with each other, and is beneficial to safety production of the mining areas.
Description
Technical field
The invention belongs to the mining area safety-security area, more specifically say, relate to a kind of mining area personal security management system and method.
Background technology
China is in the process of industrialization, and is huge to the demand amplification of mineral resources.The safety in production in mining area also becomes the important step of mining area daily management, and mining area personnel's safety management is one of them importance.Early stage mining area adopts artificial registration and inspection that staff's security is monitored, and along with development in science and technology, the mining area is introduced access control system safety management is carried out in mining area personnel's discrepancy.Existing access control system generally comprises server, management end, access card card sender, access control equipment, data acquisition equipment, mainly carries out Authority Verification when the staff passes in and out mining area or gate sentry.
But in the management of the personal security in mining area, have some distinctive problems: at first, the mining area personnel are often with non-security state, enter the mining area operation such as excessive drinking, the tired and state such as do not wear a safety helmet; Secondly, the personnel identity unauthorized person that causes not easy to identify in mining area acts as fraudulent substitute for a person to enter the mining area; In addition, the mining area personnel overstep the authority that self authority carries out can only be by some specific people, the activity of carrying out such as managerial personnel.Yet, existing adopt manually of mining area safety management registered, simply swiped the card more, even adopt access control system also can only carry out general Authority Verification, major part is to adopt artificial mode that mining area personal security state is judged, such management is the wasting manpower and material resources not only, and there are many potential safety hazards, increased many non-safety factors to mining area production.
Summary of the invention
The object of the invention is to overcome the deficiencies in the prior art, a kind of mining area personal security management system and method are provided, for the special environment and condition in mining area, carrying out safety factor detects, and in conjunction with multiple authority audit, improve mining area personnel turnover and the safety precaution of working, be beneficial to the safety in production in mining area.
For realizing above goal of the invention, mining area of the present invention personal security management system by the following technical solutions:
Comprise:
Card reader reads the user right card information;
Gate, control gate sentry gate inhibition;
Face identification device, gather user people's face section image information, with people's face section image information of this locality storage carry out that facial images match detects, safety helmet wears that situation detects, fatigue detecting, and with user's face-image whether mate, whether the safe wearing cap, whether tired testing result sends data acquisition controller to;
Whether alcohol detecting device presets overproof threshold value, gathers user's oral cavity alcohol content information, detect user's oral cavity alcohol content and exceed standard, and the testing result whether alcohol content is exceeded standard sends data acquisition controller to;
Data acquisition controller, gather user's face that face identification device and alcohol detecting device upload whether mate, whether the safe wearing cap, the testing result that whether exceeds standard of tired testing result and user's oral cavity alcohol content forms user security information, the user right card information that reads together with card reader sends the embedded ethernet pass to; Receive the safety verification result that embedded ethernet closes passback, the control gate is opened gate inhibition or warning;
Embedded ethernet closes, the user security information that the receive data acquisition controller transmits and user right card information, and encode, then convert the data layout that is fit to the Ethernet transmission to, send security server to; Receive the safety verification result of security server passback, and be transmitted to data acquisition controller;
Database server, storage security information and authority information;
Security server, receive data user's security information and user right card information that embedded ethernet closes, extract user right information from database, security information and authority information according to the database storage carry out safety verification and Authority Verification, the safety verification result who whether is allowed the user to pass through, and return to the embedded ethernet pass, be sent to simultaneously management end;
Management end, write the card device with one respectively, people's face section image collecting device is connected, the security information of leading subscriber authority card information and database server and authority information: user right information is set and deposits database server in, the user right message code is write the user right card by writing the card device, gather validated user people's face section's image information and be sent to the face identification device storage by people's face section image device, the safety verification result who receives simultaneously security server stores and real-time demonstration.
Further, management end is provided with inquiry, RCI.
Mining area personal security management method may further comprise the steps:
(1), face identification device gathers user people's face section image information, searches the face-image whether local data base has coupling, carries out the tired identification of people's face, whether identification has the safe wearing cap, and testing result is sent to data acquisition controller;
(2), alcohol detecting device gathers user's oral cavity alcohol content, detect whether surpass reservation threshold, and the oral cavity alcohol testing result be sent to data acquisition controller;
(3), user card punching, card reader reads the user right card information, and sends data acquisition controller to;
(4), whether data acquisition controller user's face-image that face identification device and alcohol detecting device are uploaded mate, whether the safe wearing cap, the testing result that whether exceeds standard of tired testing result and user's oral cavity alcohol content forms user security information, the authority information of uploading together with card reader sends embedded ethernet to and closes;
(5), embedded ethernet closes user security information and authority card information that data acquisition controller is transmitted and converts Ethernet data to, and sends security server to;
(6), security server extracts user security information and authority card information from the data that receive, extract user right information from database, security information and authority information according to the database storage carry out safety verification and Authority Verification, if safety verification and Authority Verification all pass through, then enter step (7); If there is any one not pass through, then enter step (8);
(7), security server send to allow current instruction, closes by embedded ethernet and sends data acquisition controller to, the control gate is opened the gate sentry gate inhibition, makes the user pass through gate sentry; Enter step (9);
(8), the security server instruction that sends that no through traffic, close by embedded ethernet and to send data acquisition controller to, forbid that gate opens the gate sentry gate inhibition, forbid that the user is current and report to the police, enter step (9);
(9), security server sends this information processing result to the management end storage and shows in real time; This pass authentication finishes.
Wherein, safety verification may further comprise the steps:
1), security server extracts embedded ethernet and closes the user security information of uploading;
2), check user's facial images match result, if coupling, then safety verification does not pass through, checking finishes; If coupling then enters step 3);
3), check the human fatigue testing result, if human fatigue, then safety verification does not pass through, checking finishes; If fatigue phenomenon do not occur, then enter step 4);
4), check user's safe wearing cap testing result, if safe wearing cap not, then safety verification does not pass through, checking finishes; If the user has worn safety helmet, then enter step 5);
5), check user's oral cavity alcohol content detection result, if alcohol content is defective, then safety verification does not pass through, checking finishes; If alcohol content is qualified, safety verification passes through, and checking finishes.
Wherein, Authority Verification may further comprise the steps:
1), security server is obtained the user right card information, analysis authority mark information;
2), whether Query Database exist this user, if there is no, Authority Verification does not pass through, checking finishes; If exist, enter step 3);
3), from database, obtain the individual subscriber authority as authority to be verified;
4), check that the user is in the authority to be verified when the Qianmen district;
5), check that user's authority to be verified whether having control festivals or holidays information when the Qianmen district, if do not have, enters step 8); If have control festivals or holidays information, enter step 6);
6), check whether the user can pass through when the Qianmen district in current date festivals or holidays section, if energy enters step 12); If can not, enter step 7);
7), check whether the user can pass through in whole mining area in current date festivals or holidays section, if energy enters step 12); If can not, enter step 8);
8), check that user's authority to be verified whether having all control information when the Qianmen district, if do not have, enters step 11); If have all control information, then enter step 9);
9), check whether the user can pass through when the Qianmen district within current week, if energy enters step 12); If can not, enter step 10);
10), check whether the user can pass through in whole mining area within current week, if energy enters step 12); If can not, enter step 11);
11), check that the user at the current permitted hours when the Qianmen district, enters step 12);
12), check that can the user pass through in current slot, if can pass through, Authority Verification passes through, and verifies end; If can not pass through, enter step 13);
13), user's group at user place in the Query Database, check whether there is not user's group of verifying authorization, if do not have, Authority Verification does not pass through, checking finishes; If have, the user is organized authority as authority to be verified, enter step 4).
The mining area personal security management system and the method that adopt above technical scheme to make up, can realize following beneficial effect:
1. face identification device and alcohol detecting device are set, make mining area personal security management system can whether assume another's name to the turnover personnel, whether the safe wearing cap, whether tired, whether four emphasis security factors of drinking too much detect, and avoid mining area staff's dangerous operation.
2. user right adopts the dual authority Audit Mechanism based on role and gate sentry, and role succession combines with individual the mandate, and the gate sentry zone combines with individuality, and combine with control holiday working day, can realize flexible, meticulous user right audit.
3. the whole safety record of management end storage by software supervision interfaces such as open inquiry, Long-distance Control, can realize being beneficial to remote monitoring based on the monitor terminal of the various ways such as PC, Android, iOS.
Mining area of the present invention personal security management system can cover each gate sentry of mining area and other important areas, cooperatively interacts by safety verification and Authority Verification, realizes the safety management of mining area personnel turnover is beneficial to the safety in production in mining area.
Description of drawings
Fig. 1 is a kind of embodiment structural drawing of mining area of the present invention personal security management system;
Fig. 2 is a kind of embodiment process flow diagram of mining area of the present invention personal security management method;
Fig. 3 is a kind of embodiment process flow diagram of safe verification method in the mining area personal security management method among Fig. 2;
Fig. 4 is a kind of embodiment process flow diagram of method for verifying authority in the mining area personal security management method among Fig. 2;
Embodiment
Below in conjunction with accompanying drawing the specific embodiment of the present invention is described, so that those skilled in the art understands the present invention better.What need to point out especially is that in the following description, when perhaps the detailed description of known function and design can desalinate main contents of the present invention, these were described in here and will be left in the basket.
Fig. 1 is a kind of embodiment structural drawing of mining area of the present invention personal security management system.As shown in Figure 1, personal security management system in mining area comprises card reader, gate, face identification device, alcohol detecting device, data acquisition controller, embedded ethernet pass, database server, security server, management end.
Wherein, security server, database server, management end, embedded ethernet close by Ethernet interconnected.Hang one under the management end and write the card device, people's face section image collecting device, people's face section image collecting device is connected in the Ethernet.Data acquisition controller closes interconnected by CAN bus and embedded ethernet.Hang a card reader under each data acquisition controller, adopt RS232 to connect; A gate; A face identification device connects by Wiegand, and this person's face recognition device is convenient to receive the validated user people face section image information from the collection of management end by being connected in the Ethernet simultaneously; An alcohol detecting device connects by RS232.Only draw lineup's face recognition device and the alcohol detecting device that is connected with data acquisition controller 2, other omissions among Fig. 1.Mining area personal security management system is installed on gate sentry in this embodiment, and other need to carry out the place of safety inspection or Authority Verification also can be installed in the mining area in actual use.
The below is described in detail each ingredient:
Card reader reads the user right card information, sends the user right card information to data acquisition controller.
Gate, the order of receive data acquisition controller, control gate sentry gate inhibition.
Face identification device, gather user people's face section image information, with people's face section image information of this locality storage carry out that facial images match detects, safety helmet wears that situation detects, fatigue detecting, and with user's face-image whether mate, whether the safe wearing cap, whether tired testing result sends data acquisition controller to.
Whether alcohol detecting device presets overproof threshold value, gathers user's oral cavity alcohol content information, detect user's oral cavity alcohol content and exceed standard, and the testing result whether alcohol content is exceeded standard sends data acquisition controller to.
Data acquisition controller, gather user's face-image that face identification device and alcohol detecting device upload whether mate, whether the safe wearing cap, the testing result that whether exceeds standard of tired testing result and user's oral cavity alcohol content forms user security information, the user right card information that reads together with card reader sends the embedded ethernet pass to; Receive the safety verification result that embedded ethernet closes passback, the control gate is opened gate inhibition or warning.
Embedded ethernet closes, the user security information that the receive data acquisition controller transmits and user right card information, and encode, then convert the data layout that is fit to the Ethernet transmission to, send security server to; Receive the safety verification result of security server passback, and be transmitted to data acquisition controller.
Database server is equipped with database software, storage security information and authority information.
Security server is equipped with the safety management service software, mainly comprises secure verification module and Authority Verification module.Send data when embedded ethernet closes, security server is to decoding data.Secure verification module verifies user security information, comprises mainly whether the turnover personnel drink, tired, safe wearing cap and whether act as fraudulent substitute for a person etc. to verify.The Authority Verification module is extracted user right information according to the user right message code in the user right card information from database, and authority information is verified.
Management end is equipped with and is integrated into that the user provides work authority card function, database server database management function and to the safety management management end software of mining area personal security condition monitoring Presentation Function.Management end is each mining area personnel assignment authority and with in the authority information write into Databasce server, and by writing the card device user right message code is write the user right card.Management end connects people's face section image collecting device, absorb in advance validated user people face section image information and give the face identification device link to each other with data acquisition controller and the local data base that is stored to face identification device with this communication, be used for carrying out the judgement of user's facial information.Simultaneously, the information when management end monitoring display mining area personnel pass in and out the mining area comprises whether drinking, tired, safe wearing cap and whether acting as fraudulent substitute for a person and the information such as the authority of overstepping the authority own.Management end also can arrange inquiry, RCI is used for system extension.
The present invention is by arranging face identification device and alcohol detecting device, make mining area personal security management system can whether assume another's name to the turnover personnel, whether the safe wearing cap, whether tired, whether four emphasis security factors of drinking too much detect, and avoid mining area staff's dangerous operation.The safety record that the management end storage is whole by software supervision interfaces such as open inquiry, Long-distance Control, can realize being beneficial to remote monitoring based on the monitor terminal of the various ways such as PC, Android, iOS.
Fig. 2 is a kind of embodiment process flow diagram of mining area of the present invention personal security management method.As shown in Figure 2, personal security management method in mining area may further comprise the steps:
S201: face identification device gathers user's facial information, and carries out following detection:
● search the face-image whether coupling is arranged in the local data base;
● the face-image that gathers is carried out the tired identification of people's face;
● whether the face-image that gathers is carried out discriminance analysis the safe wearing cap.
Face identification device with user's face-image whether mate, whether the safe wearing cap, whether tired testing result sends data acquisition controller to.
S202: alcohol detecting device gathers user's oral cavity alcohol content, detects whether surpass reservation threshold, and sends oral cavity alcohol content detection result to data acquisition controller.
S203: user card punching, card reader read the user right card information, and send data acquisition controller to.
S204: data acquisition controller with user's face-image that face identification device and alcohol detecting device collect whether mate, whether the safe wearing cap, the testing result that whether exceeds standard of tired testing result and user's oral cavity alcohol content forms user security information, the authority card information of uploading together with card reader sends embedded ethernet to and closes.
S205: embedded ethernet closes user security information and authority card information that data acquisition controller is transmitted and converts Ethernet data to, and sends security server to.
S206: security server extracts user security information and the authority card information that receives, and carries out the user security inspection.
S207: security server carries out safety verification according to user security information, does not pass through such as safety verification, then enters step S210; Pass through such as safety verification, then enter step S207.
S208: security server extracts user right information and carries out Authority Verification from database according to the user right message code in the authority card information, does not pass through such as Authority Verification, then enters step S210; Pass through such as Authority Verification, then carry out step S209.
S209: security server sends and allows current instruction, closes by embedded ethernet and sends data acquisition controller to, and the control gate is opened the gate sentry gate inhibition, makes the user pass through gate sentry, enters step S211.
S210: instruction that security server sends that no through traffic, close by embedded ethernet and to send data acquisition controller to, forbid that gate opens the gate sentry gate inhibition, forbid that the user is current and report to the police, enter step S211.
S211: security server sends this information processing result to the management end storage and shows in real time.This pass authentication finishes.
Mining area of the present invention personal security management method cooperatively interacts by safety verification and Authority Verification, detects by safety factor, avoids mining area personnel unsafe factor aborning, realizes the safety management to mining area personnel turnover.
Fig. 3 is a kind of embodiment process flow diagram of safe verification method in the mining area personal security management method among Fig. 2.As shown in Figure 3, safe verification method may further comprise the steps:
S301: security server extracts embedded ethernet and closes the user security information of uploading.
S302: check user's facial images match result, if do not mate, then safety verification does not pass through, and checking finishes; If coupling then enters S303.
S303: check the human fatigue testing result, if human fatigue, then safety verification does not pass through, and checking finishes; If fatigue phenomenon do not occur, then enter S304.
S304: check user's safe wearing cap testing result, if safe wearing cap not, then safety verification does not pass through, and checking finishes; If the user has worn safety helmet, then enter S305.
S305: check user's oral cavity alcohol content, if alcohol content is defective, then safety verification does not pass through, and checking finishes; If alcohol content is qualified, safety verification passes through, and checking finishes.
Fig. 4 is a kind of embodiment process flow diagram of method for verifying authority in the mining area personal security management method among Fig. 2.As shown in Figure 4, method for verifying authority may further comprise the steps:
S401: security server is obtained the user right card information, the authority mark information in the analysis user authorization code.
S402: whether have this user in the Query Database, namely check whether validated user of this user, if there is no, then Authority Verification does not pass through, and checking finishes; If exist, enter S403.
S403: from database, obtain the individual subscriber authority as authority to be verified.
S405: check that the user is in the authority to be verified when the Qianmen district.
S406: check that user's authority to be verified whether having control festivals or holidays information when the Qianmen district, if do not have, enters step S411; If have control festivals or holidays information, then enter step S407.
S407: check that the user is in the local control festivals or holidays information when the Qianmen district.
S408: check whether current date and user partial control festivals or holidays information mate, if coupling enters step S417; If do not mate, then enter step S409.
S409: check that the user is in the overall control festivals or holidays information in whole mining area.
S410: check whether current date and user overall situation control festivals or holidays information mates, if coupling enters step S417; If do not mate, then enter step S411.
S411: check that user's authority to be verified whether having all control information when the Qianmen district, if do not have, enters S416; If have all control information, then enter step S412;
S412: check that the user is in the local all control information when the Qianmen district.
S413: check whether current number of weeks and user partial week control information mates, if coupling enters step S417; If do not mate, enter step S414;
S414: check that the user is in overall all control information in whole mining area.
S415: check whether all control information of current number of weeks and the user overall situation mates, if coupling enters step S417; If do not mate, enter step S416;
S416: check that the user at the current permitted hours when the Qianmen district, enters step S417.
S417: check that can the user pass through in current slot, if can pass through, Authority Verification passes through, and checking finishes; If can not pass through, enter S418.
S418: inquiring user place user group.
S419: whether have not user's group of verifying authorization in user's group at inspection user place, if do not have, Authority Verification does not pass through, and checking finishes; If have, enter step S420.
S420: the user is organized authority as authority to be verified, enter step S405.
Because the user may belong to a plurality of user's groups, therefore when the individual subscriber authority can't be passed through Authority Verification, the user is organized authority as the authority to be verified checking that circulates, when having a user to organize the authority P Passable, this user right checking is passed through, and checking finishes; When the personal authority of user group and user's group only for all impassable, or the user organizes that personal authority is impassable and when not belonging to any user and organizing, this user right checking is not passed through, checking finishes.
User right adopts the dual authority Audit Mechanism based on role and gate sentry, and role succession combines with individual the mandate, and the gate sentry zone combines with individuality, and combine with control holiday working day, can realize flexible, meticulous user right audit.
Embodiment
Mine management person is that user " Zhang San " distributes authority by management end: " Zhang San " is under the jurisdiction of " common group ", the personal authority information of " Zhang San " does not have gate sentry 2 right of access any time, but the gate sentry 2 that the user of " common group " can be in the current mining area of 8:00-10:00 on October 1st, 2012.Management end deposits this authority in database server, by card reader, and according to the authority mark issued rights card in the database server, and with the corresponding personal information of this authority information coding and write in the authority card.Management end utilizes people's face section image information of face identification device collection " Zhang San ", and sends to the face identification device of gate sentry 2 by Ethernet." Zhang San " will on October 1st, 2012 8:30 by gate sentry 2, this moment he do not drink, in accordance with regulations the safe wearing cap, do not have weariness working." Zhang San " this time current process is as follows:
1) people's face section image information of the face identification device collection " Zhang San " of gate sentry 2, after testing, face-image is legal, worn safety helmet and do not had fatigue, and face identification device sends testing result to data acquisition controller.
The oral cavity alcohol content information of 2) alcohol detecting device collection " Zhang San ", oral cavity alcohol content is in the default qualified threshold value of alcohol content after testing, and alcohol detecting device sends testing result to data acquisition controller.
3) " Zhang San " swipes the card, the authority card information of card reader collection " Zhang San ", and send data acquisition controller to.
4) data acquisition controller face-image is legal, wear by safety helmet, do not have fatigue, alcohol content to detect qualified user security information and the authority card information of forming to encode together and send embedded ethernet to and close.
5) embedded ethernet closes the receive data acquisition controller by the data that the CAN bus transmits, and encodes and converts Ethernet data to and report, and then is sent to security server by Ethernet.
6) secure verification module of the safety management service software in the security server is carried out safety verification to the user, " Zhang San " facial images match, does not have fatigue, admires that safety helmet and oral cavity alcohol content are arranged is qualified, and checking is passed through.
7) the Authority Verification module of the safety management service software in the security server is carried out Authority Verification to the user.Personal user's authority of " Zhang San " does not have gate sentry 2 right of access any time, therefore can't pass through through Authority Verification.When Query Database as can be known " Zhang San " belong to " common group ", therefore with the authority of " common group " as authority to be verified.The user of " common group " can be in the current mining area of 8:00-10:00 on October 1st, 2012 gate sentry 2, be 8:30 on October 1st, 2012 this moment, October 1 was National Day, therefore when checking local control festivals or holidays information, can find the current date coupling, and can pass through in current slot, so Authority Verification passes through.
8) after safety verification and Authority Verification all passed through, security server was made the judgement of " allowing current " to this time passing through of " Zhang San ", and this result is returned to data acquisition controller by the embedded ethernet pass.
9) data acquisition controller receives that security server gives the result of " allowing current " to " Zhang San ", and the control gate is opened the gate inhibition, and " Zhang San " let pass.
10) security server sends this information processing result to management end, management end is preserved result and is shown in real time, the keeper can watch this " Zhang San " successfully current gate sentry 2 by management end, facial images match, do not have fatigue, admire that safety helmet and oral cavity alcohol content are arranged is qualified, employing be the authority of " common group ".
Although the above is described the illustrative embodiment of the present invention; so that those skilled in the art understand the present invention; but should be clear; the invention is not restricted to the scope of embodiment; to those skilled in the art; as long as various variations appended claim limit and the spirit and scope of the present invention determined in, these variations are apparent, all utilize innovation and creation that the present invention conceives all at the row of protection.
Claims (5)
1. mining area personal security management system comprises:
Card reader reads the user right card information;
Gate, control gate sentry gate inhibition;
It is characterized in that, also comprise:
Face identification device, gather user people's face section image information, with people's face section image information of this locality storage carry out that facial images match detects, safety helmet wears that situation detects, fatigue detecting, and with user's face-image whether mate, whether the safe wearing cap, whether tired testing result sends data acquisition controller to;
Whether alcohol detecting device presets overproof threshold value, gathers user's oral cavity alcohol content information, detect user's oral cavity alcohol content and exceed standard, and the testing result whether alcohol content is exceeded standard sends data acquisition controller to;
Data acquisition controller, gather user's face-image that face identification device and alcohol detecting device upload whether mate, whether the safe wearing cap, the testing result that whether exceeds standard of tired testing result and user's oral cavity alcohol content forms user security information, the user right card information that reads together with card reader sends the embedded ethernet pass to; Receive the safety verification result that embedded ethernet closes passback, the control gate is opened gate inhibition or warning;
Embedded ethernet closes, the user security information that the receive data acquisition controller transmits and user right card information, and encode, then convert the data layout that is fit to the Ethernet transmission to, send security server to; Receive the safety verification result of security server passback, and be transmitted to data acquisition controller;
Database server, storage security information and authority information;
Security server, receive data user's security information and user right card information that embedded ethernet closes, security information and authority information according to the database storage carry out safety verification and Authority Verification, the safety verification result who whether is allowed the user to pass through, and return to the embedded ethernet pass, be sent to simultaneously management end;
Management end, write the card device with one respectively, people's face section image collecting device is connected, the user security information of leading subscriber authority card information and database server and user right information: user right information is set and deposits database server in, user management user right message code is write the user right card by writing the card device, gather validated user people's face section's image information and be sent to the face identification device storage by people's face section image device, the safety verification result who receives simultaneously security server stores and real-time demonstration.
2. safety management system according to claim 1 is characterized in that, described management end is provided with inquiry, RCI.
3. a mining area personal security management method is characterized in that, may further comprise the steps:
(1), face identification device gathers user people's face section image information, searches the face-image whether local data base has coupling, carries out the tired identification of people's face, whether identification has the safe wearing cap, and testing result is sent to data acquisition controller;
(2), alcohol detecting device gathers user's oral cavity alcohol content, detect whether surpass reservation threshold, and the oral cavity alcohol testing result be sent to data acquisition controller;
(3), user card punching, card reader reads the user right card information, and sends data acquisition controller to;
(4), whether data acquisition controller user's face-image that face identification device and alcohol detecting device are uploaded that face identification device and alcohol detecting device are uploaded mate, whether the safe wearing cap, the testing result that whether exceeds standard of tired testing result and user's oral cavity alcohol content forms user security information, the authority information of uploading together with card reader sends embedded ethernet to and closes;
(5), embedded ethernet closes user security information and authority card information that data acquisition controller is transmitted and converts Ethernet data to, and sends security server to;
(6), security server extracts user security information and authority card information from the data that receive, extract user right information from database, security information and authority information according to the database storage carry out safety verification and Authority Verification, if safety verification and Authority Verification all pass through, then enter step (7); If there is any one not pass through, then enter step (8);
(7), security server send to allow current instruction, closes by embedded ethernet and sends data acquisition controller to, the control gate is opened the gate sentry gate inhibition, makes the user pass through gate sentry; Enter step (9);
(8), the security server instruction that sends that no through traffic, close by embedded ethernet and to send data acquisition controller to, forbid that gate opens the gate sentry gate inhibition, forbid that the user is current and report to the police, enter step (9);
(9), security server sends this information processing result to the management end storage and shows in real time; This pass authentication finishes.
4. mining area according to claim 3 personal security management method is characterized in that, described safety verification may further comprise the steps:
1), security server extracts embedded ethernet and closes the user security information of uploading;
2), check user's facial images match result, if coupling, then safety verification does not pass through, checking finishes; If coupling then enters step 3);
3), check the human fatigue testing result, if human fatigue, then safety verification does not pass through, checking finishes; If fatigue phenomenon do not occur, then enter step 4);
4), check user's safe wearing cap testing result, if safe wearing cap not, then safety verification does not pass through, checking finishes; If the user has worn safety helmet, then enter step 5);
5), check user's oral cavity alcohol content detection result, if alcohol content is defective, then safety verification does not pass through, checking finishes; If alcohol content is qualified, safety verification passes through, and checking finishes.
5. mining area according to claim 4 personal security management method is characterized in that, described Authority Verification may further comprise the steps:
1), security server is obtained the user right card information, analysis authority mark information;
2), whether Query Database exist this user, if there is no, Authority Verification does not pass through, checking finishes; If exist, enter step 3);
3), from database, obtain the individual subscriber authority as authority to be verified;
4), check that the user is in the authority to be verified when the Qianmen district;
5), check that user's authority to be verified whether having control festivals or holidays information when the Qianmen district, if do not have, enters step 8); If have control festivals or holidays information, enter step 6);
6), check whether the user can pass through when the Qianmen district in current date festivals or holidays section, if energy enters step 12); If can not, enter step 7);
7), check whether the user can pass through in whole mining area in current date festivals or holidays section, if energy enters step 12); If can not, enter step 8);
8), check that user's authority to be verified whether having all control information when the Qianmen district, if do not have, enters step 11); If have all control information, then enter step 9);
9), check whether the user can pass through when the Qianmen district within current week, if energy enters step 12); If can not, enter step 10);
10), check whether the user can pass through in whole mining area within current week, if energy enters step 12); If can not, enter step 11);
11), check that the user at the current permitted hours when the Qianmen district, enters step 12);
12), check that can the user pass through in current slot, if can pass through, Authority Verification passes through, and verifies end; If can not pass through, enter step 13);
13), user's group at user place in the Query Database, check whether there is not user's group of verifying authorization, if do not have, Authority Verification does not pass through, checking finishes; If have, the user is organized authority as authority to be verified, enter step 4).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210528918.4A CN103049949B (en) | 2012-12-10 | 2012-12-10 | Personnel security management system and method in mining areas |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210528918.4A CN103049949B (en) | 2012-12-10 | 2012-12-10 | Personnel security management system and method in mining areas |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103049949A true CN103049949A (en) | 2013-04-17 |
CN103049949B CN103049949B (en) | 2015-04-08 |
Family
ID=48062574
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210528918.4A Expired - Fee Related CN103049949B (en) | 2012-12-10 | 2012-12-10 | Personnel security management system and method in mining areas |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103049949B (en) |
Cited By (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104021648A (en) * | 2014-06-22 | 2014-09-03 | 朱明增 | Intelligent monitoring and early warning system for safety helmet wearing on transformer substation site |
CN104077581A (en) * | 2014-07-21 | 2014-10-01 | 国家电网公司 | Smart video identification method for wearing safety helmet rightly |
CN104110271A (en) * | 2013-04-22 | 2014-10-22 | 开封市测控技术有限公司 | Under-mine equipment monitoring alarm system based on face recognition technology |
CN104392582A (en) * | 2014-11-17 | 2015-03-04 | 南通大学 | Remote monitor and alarm system for ship welder based on multi-sensor information integration |
CN105672849A (en) * | 2016-01-07 | 2016-06-15 | 江苏苏南万科物业服务有限公司 | Intelligent door and control method thereof |
CN105956549A (en) * | 2016-04-28 | 2016-09-21 | 江苏大学 | Worker pre-job safety equipment and behavior capability inspection system and method |
CN106296949A (en) * | 2016-09-13 | 2017-01-04 | 成都创慧科达科技有限公司 | A kind of gate control system based on H264 video decoding techniques and method |
CN106454734A (en) * | 2016-11-04 | 2017-02-22 | 成都希盟泰克科技发展有限公司 | Method for detecting safety state of builder |
CN107239773A (en) * | 2017-06-30 | 2017-10-10 | 合肥贺财工程项目管理有限公司 | A kind of engineering project place personal security supervisory systems |
WO2018014350A1 (en) * | 2016-07-22 | 2018-01-25 | 深圳中兴力维技术有限公司 | Equipment control method, terminal, and control device |
RU2643898C1 (en) * | 2016-11-18 | 2018-02-06 | Трифон Юрьевич Шейкин | Access management and control system by using mobile telecommunication device |
CN107977802A (en) * | 2017-12-29 | 2018-05-01 | 天河智慧产业科技(北京)有限公司 | A kind of wisdom site staff's management system with testimony of a witness comparing function |
CN108288033A (en) * | 2018-01-05 | 2018-07-17 | 电子科技大学 | A kind of safety cap detection method merging multiple features based on random fern |
CN108391885A (en) * | 2018-05-17 | 2018-08-14 | 姚俊安 | A kind of device and method that detectable jockey goes on a journey safely |
CN108734374A (en) * | 2018-03-26 | 2018-11-02 | 中国神华能源股份有限公司 | Information processing method, device, system, storage medium and processor |
CN108881858A (en) * | 2018-08-03 | 2018-11-23 | 四川民工加网络科技有限公司 | Construction site nonnative personnel's monitoring method, device and electronic equipment |
CN109003367A (en) * | 2018-07-18 | 2018-12-14 | 上海小蚁科技有限公司 | Control method and device, storage medium, the terminal of gate inhibition |
CN109110595A (en) * | 2018-09-18 | 2019-01-01 | 中国建筑第八工程局有限公司 | Power supply for construction ladder intelligent access control system and method |
CN109116445A (en) * | 2018-08-30 | 2019-01-01 | Oppo广东移动通信有限公司 | Weather prompting method, apparatus, storage medium and terminal |
CN109147204A (en) * | 2018-08-16 | 2019-01-04 | 青海华职康健康科技有限公司 | A kind of automatic distribution method of personal protective equipment and system |
CN109920098A (en) * | 2019-01-29 | 2019-06-21 | 迅捷安消防及救援科技(深圳)有限公司 | Removable module wisdom fire-fighting Support Equipment on duty and Related product |
CN110503749A (en) * | 2018-05-18 | 2019-11-26 | 黄暐皓 | Door lock assembly |
CN110570545A (en) * | 2018-06-05 | 2019-12-13 | 宁波欧依安盾安全科技有限公司 | entrance guard's IC-card intelligent management system |
CN111080875A (en) * | 2019-11-01 | 2020-04-28 | 广州博湖安全科技有限公司 | Multifunctional intelligent security entrance guard management system |
CN111259682A (en) * | 2018-11-30 | 2020-06-09 | 百度在线网络技术(北京)有限公司 | Method and device for monitoring the safety of a construction site |
CN113158713A (en) * | 2020-10-22 | 2021-07-23 | 西安天和防务技术股份有限公司 | Valley management system |
CN114627504A (en) * | 2022-03-17 | 2022-06-14 | 盐城笃诚建设有限公司 | Building engineering labor service personnel management system and management method |
US20230281290A1 (en) * | 2013-03-13 | 2023-09-07 | Lookout, Inc. | Methods for managing user access to computing devices based on evaluation of authentication and maintenance of user control |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107680220A (en) * | 2017-09-28 | 2018-02-09 | 朱明增 | A kind of operation unlawful practice intelligent identification Method based on machine vision technique |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4495496A (en) * | 1981-12-15 | 1985-01-22 | Johnson Engineering Corp. | Personnel monitoring and locating system |
JPH01194096A (en) * | 1988-01-29 | 1989-08-04 | Fujita Corp | Mine entry management device |
DE3832375A1 (en) * | 1988-09-23 | 1990-03-29 | Ruhrkohle Ag | Method and arrangement for detecting objects passing a call-up signal barrier in mine operations |
CN201278161Y (en) * | 2008-10-17 | 2009-07-22 | 王宏志 | Gate inhibition control system based on second generation ID card |
CN101521805A (en) * | 2009-02-27 | 2009-09-02 | 镇江石鼓文智能化系统开发有限公司 | Helmet-site detecting system on construction field and detecting method thereof |
CN101739549A (en) * | 2009-02-11 | 2010-06-16 | 北京智安邦科技有限公司 | Face detection method and system |
CN202093650U (en) * | 2011-05-27 | 2011-12-28 | 北京中矿华沃电子科技有限公司 | Security early warning system for open pit transportation |
CN202134021U (en) * | 2011-07-21 | 2012-02-01 | 北京九鼎安泰矿业科技有限责任公司 | Safety inspection device for wellhead |
CN102708606A (en) * | 2012-03-26 | 2012-10-03 | 北京普惠恒丰科技有限公司 | System for monitoring person entering and exiting presence area of prison by recognizing faces of person |
-
2012
- 2012-12-10 CN CN201210528918.4A patent/CN103049949B/en not_active Expired - Fee Related
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4495496A (en) * | 1981-12-15 | 1985-01-22 | Johnson Engineering Corp. | Personnel monitoring and locating system |
JPH01194096A (en) * | 1988-01-29 | 1989-08-04 | Fujita Corp | Mine entry management device |
DE3832375A1 (en) * | 1988-09-23 | 1990-03-29 | Ruhrkohle Ag | Method and arrangement for detecting objects passing a call-up signal barrier in mine operations |
CN201278161Y (en) * | 2008-10-17 | 2009-07-22 | 王宏志 | Gate inhibition control system based on second generation ID card |
CN101739549A (en) * | 2009-02-11 | 2010-06-16 | 北京智安邦科技有限公司 | Face detection method and system |
CN101521805A (en) * | 2009-02-27 | 2009-09-02 | 镇江石鼓文智能化系统开发有限公司 | Helmet-site detecting system on construction field and detecting method thereof |
CN202093650U (en) * | 2011-05-27 | 2011-12-28 | 北京中矿华沃电子科技有限公司 | Security early warning system for open pit transportation |
CN202134021U (en) * | 2011-07-21 | 2012-02-01 | 北京九鼎安泰矿业科技有限责任公司 | Safety inspection device for wellhead |
CN102708606A (en) * | 2012-03-26 | 2012-10-03 | 北京普惠恒丰科技有限公司 | System for monitoring person entering and exiting presence area of prison by recognizing faces of person |
Cited By (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20230281290A1 (en) * | 2013-03-13 | 2023-09-07 | Lookout, Inc. | Methods for managing user access to computing devices based on evaluation of authentication and maintenance of user control |
CN104110271A (en) * | 2013-04-22 | 2014-10-22 | 开封市测控技术有限公司 | Under-mine equipment monitoring alarm system based on face recognition technology |
CN104021648A (en) * | 2014-06-22 | 2014-09-03 | 朱明增 | Intelligent monitoring and early warning system for safety helmet wearing on transformer substation site |
CN104077581A (en) * | 2014-07-21 | 2014-10-01 | 国家电网公司 | Smart video identification method for wearing safety helmet rightly |
CN104392582A (en) * | 2014-11-17 | 2015-03-04 | 南通大学 | Remote monitor and alarm system for ship welder based on multi-sensor information integration |
CN105701968A (en) * | 2014-11-17 | 2016-06-22 | 南通大学 | Wireless monitoring alarm system for welding operation |
CN105701968B (en) * | 2014-11-17 | 2018-01-23 | 南通大学 | Weld job wireless monitoring-alarming system |
CN105672849A (en) * | 2016-01-07 | 2016-06-15 | 江苏苏南万科物业服务有限公司 | Intelligent door and control method thereof |
CN105956549A (en) * | 2016-04-28 | 2016-09-21 | 江苏大学 | Worker pre-job safety equipment and behavior capability inspection system and method |
WO2018014350A1 (en) * | 2016-07-22 | 2018-01-25 | 深圳中兴力维技术有限公司 | Equipment control method, terminal, and control device |
CN106296949A (en) * | 2016-09-13 | 2017-01-04 | 成都创慧科达科技有限公司 | A kind of gate control system based on H264 video decoding techniques and method |
CN106296949B (en) * | 2016-09-13 | 2018-11-27 | 成都创慧科达科技有限公司 | A kind of access control system and method based on H264 video decoding techniques |
CN106454734A (en) * | 2016-11-04 | 2017-02-22 | 成都希盟泰克科技发展有限公司 | Method for detecting safety state of builder |
RU2643898C1 (en) * | 2016-11-18 | 2018-02-06 | Трифон Юрьевич Шейкин | Access management and control system by using mobile telecommunication device |
CN107239773A (en) * | 2017-06-30 | 2017-10-10 | 合肥贺财工程项目管理有限公司 | A kind of engineering project place personal security supervisory systems |
CN107977802A (en) * | 2017-12-29 | 2018-05-01 | 天河智慧产业科技(北京)有限公司 | A kind of wisdom site staff's management system with testimony of a witness comparing function |
CN108288033B (en) * | 2018-01-05 | 2019-09-24 | 电子科技大学 | A kind of safety cap detection method based on random fern fusion multiple features |
CN108288033A (en) * | 2018-01-05 | 2018-07-17 | 电子科技大学 | A kind of safety cap detection method merging multiple features based on random fern |
CN108734374A (en) * | 2018-03-26 | 2018-11-02 | 中国神华能源股份有限公司 | Information processing method, device, system, storage medium and processor |
CN108391885A (en) * | 2018-05-17 | 2018-08-14 | 姚俊安 | A kind of device and method that detectable jockey goes on a journey safely |
CN110503749A (en) * | 2018-05-18 | 2019-11-26 | 黄暐皓 | Door lock assembly |
CN110570545A (en) * | 2018-06-05 | 2019-12-13 | 宁波欧依安盾安全科技有限公司 | entrance guard's IC-card intelligent management system |
CN109003367A (en) * | 2018-07-18 | 2018-12-14 | 上海小蚁科技有限公司 | Control method and device, storage medium, the terminal of gate inhibition |
CN109003367B (en) * | 2018-07-18 | 2021-10-08 | 上海小蚁科技有限公司 | Access control method and device, storage medium and terminal |
CN108881858A (en) * | 2018-08-03 | 2018-11-23 | 四川民工加网络科技有限公司 | Construction site nonnative personnel's monitoring method, device and electronic equipment |
CN108881858B (en) * | 2018-08-03 | 2020-06-23 | 四川亚东世纪科技有限公司 | Method and device for monitoring external personnel on construction site and electronic equipment |
CN109147204A (en) * | 2018-08-16 | 2019-01-04 | 青海华职康健康科技有限公司 | A kind of automatic distribution method of personal protective equipment and system |
CN109116445A (en) * | 2018-08-30 | 2019-01-01 | Oppo广东移动通信有限公司 | Weather prompting method, apparatus, storage medium and terminal |
CN109110595A (en) * | 2018-09-18 | 2019-01-01 | 中国建筑第八工程局有限公司 | Power supply for construction ladder intelligent access control system and method |
CN111259682A (en) * | 2018-11-30 | 2020-06-09 | 百度在线网络技术(北京)有限公司 | Method and device for monitoring the safety of a construction site |
CN111259682B (en) * | 2018-11-30 | 2023-12-29 | 百度在线网络技术(北京)有限公司 | Method and device for monitoring safety of construction site |
CN109920098A (en) * | 2019-01-29 | 2019-06-21 | 迅捷安消防及救援科技(深圳)有限公司 | Removable module wisdom fire-fighting Support Equipment on duty and Related product |
CN111080875A (en) * | 2019-11-01 | 2020-04-28 | 广州博湖安全科技有限公司 | Multifunctional intelligent security entrance guard management system |
CN113158713A (en) * | 2020-10-22 | 2021-07-23 | 西安天和防务技术股份有限公司 | Valley management system |
CN114627504A (en) * | 2022-03-17 | 2022-06-14 | 盐城笃诚建设有限公司 | Building engineering labor service personnel management system and management method |
CN114627504B (en) * | 2022-03-17 | 2023-01-10 | 盐城笃诚建设有限公司 | Building engineering labor personnel management system and management method |
Also Published As
Publication number | Publication date |
---|---|
CN103049949B (en) | 2015-04-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103049949B (en) | Personnel security management system and method in mining areas | |
CN205879007U (en) | Intelligence pistol | |
CN203720889U (en) | Handheld polling terminal | |
CN203720890U (en) | Wearable polling terminal | |
CN205845137U (en) | Intelligent gate | |
CN109598661A (en) | Intelligence community security system and detection method based on recognition of face | |
CN102497531A (en) | Human face recognition wireless video monitoring system based on cloud computing platform | |
CN104318732A (en) | Transformer substation field worker monitoring and management system and method based on video analysis and RFID | |
CN102867350B (en) | Prison AB door safety management method based on face recognition technology | |
CN208569727U (en) | A kind of building site gate access control system | |
CN204256821U (en) | A kind of high intelligent gate | |
CN102956107A (en) | Parking lot vehicle parking information acquisition and false license, slip license and illegal vehicle recognition system and method | |
CN203054575U (en) | Pollution source on-line monitoring system | |
CN107939447A (en) | A kind of safety of coal mines risk stratification early warning management-control method and system | |
CN104281836A (en) | Biometric feature recognition system and method | |
CN109599782A (en) | Intelligent substation management system based on Internet of Things and intelligent recognition | |
CN107563634A (en) | A kind of method of explosion supervisory systems and explosion supervision based on dipper system | |
CN111404874A (en) | Taxi suspect vehicle discrimination analysis system architecture | |
CN103258222A (en) | Cell intelligent logistic management system | |
CN106097489A (en) | A kind of intelligent vision big data gate access control system | |
CN202268047U (en) | Enterprise and institution modernized management monitoring alarm system | |
CN201765619U (en) | Stranger portrait early warning system based on portrait biometric identification technology | |
CN207020684U (en) | Portable police individual soldier's suit based on recognition of face | |
CN210052214U (en) | Device for identifying personnel identity information in oil field operation area | |
CN207895517U (en) | A kind of access control system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20150408 Termination date: 20171210 |
|
CF01 | Termination of patent right due to non-payment of annual fee |