CN103049949A - Personnel security management system and method in mining areas - Google Patents

Personnel security management system and method in mining areas Download PDF

Info

Publication number
CN103049949A
CN103049949A CN2012105289184A CN201210528918A CN103049949A CN 103049949 A CN103049949 A CN 103049949A CN 2012105289184 A CN2012105289184 A CN 2012105289184A CN 201210528918 A CN201210528918 A CN 201210528918A CN 103049949 A CN103049949 A CN 103049949A
Authority
CN
China
Prior art keywords
user
information
authority
pass
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012105289184A
Other languages
Chinese (zh)
Other versions
CN103049949B (en
Inventor
郝家胜
徐红兵
邹见效
潘宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201210528918.4A priority Critical patent/CN103049949B/en
Publication of CN103049949A publication Critical patent/CN103049949A/en
Application granted granted Critical
Publication of CN103049949B publication Critical patent/CN103049949B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a personnel security management system and method in mining areas. According to special environments and conditions of the mining areas, security factors are detected. The system is internally provided with a face recognition device and alcohol detecting device, wherein the face recognition device is used for detecting whether face images are matched, whether security helmets are worn, and whether workers are fatigue; and the alcohol detecting device is used for detecting whether the alcohol content in oral cavities of the workers is qualified, thereby preventing dangerous operation of the workers in the mining areas; and multiple audit modes of holiday control, week control and time section control are adopted for user right verification. The personnel security management system of the mining areas can cover each gate entry and other important areas of the mining areas, improves the entry and working safety of the workers in the mining areas through security verification and right verification which are matched with each other, and is beneficial to safety production of the mining areas.

Description

A kind of mining area personal security management system and method
Technical field
The invention belongs to the mining area safety-security area, more specifically say, relate to a kind of mining area personal security management system and method.
Background technology
China is in the process of industrialization, and is huge to the demand amplification of mineral resources.The safety in production in mining area also becomes the important step of mining area daily management, and mining area personnel's safety management is one of them importance.Early stage mining area adopts artificial registration and inspection that staff's security is monitored, and along with development in science and technology, the mining area is introduced access control system safety management is carried out in mining area personnel's discrepancy.Existing access control system generally comprises server, management end, access card card sender, access control equipment, data acquisition equipment, mainly carries out Authority Verification when the staff passes in and out mining area or gate sentry.
But in the management of the personal security in mining area, have some distinctive problems: at first, the mining area personnel are often with non-security state, enter the mining area operation such as excessive drinking, the tired and state such as do not wear a safety helmet; Secondly, the personnel identity unauthorized person that causes not easy to identify in mining area acts as fraudulent substitute for a person to enter the mining area; In addition, the mining area personnel overstep the authority that self authority carries out can only be by some specific people, the activity of carrying out such as managerial personnel.Yet, existing adopt manually of mining area safety management registered, simply swiped the card more, even adopt access control system also can only carry out general Authority Verification, major part is to adopt artificial mode that mining area personal security state is judged, such management is the wasting manpower and material resources not only, and there are many potential safety hazards, increased many non-safety factors to mining area production.
Summary of the invention
The object of the invention is to overcome the deficiencies in the prior art, a kind of mining area personal security management system and method are provided, for the special environment and condition in mining area, carrying out safety factor detects, and in conjunction with multiple authority audit, improve mining area personnel turnover and the safety precaution of working, be beneficial to the safety in production in mining area.
For realizing above goal of the invention, mining area of the present invention personal security management system by the following technical solutions:
Comprise:
Card reader reads the user right card information;
Gate, control gate sentry gate inhibition;
Face identification device, gather user people's face section image information, with people's face section image information of this locality storage carry out that facial images match detects, safety helmet wears that situation detects, fatigue detecting, and with user's face-image whether mate, whether the safe wearing cap, whether tired testing result sends data acquisition controller to;
Whether alcohol detecting device presets overproof threshold value, gathers user's oral cavity alcohol content information, detect user's oral cavity alcohol content and exceed standard, and the testing result whether alcohol content is exceeded standard sends data acquisition controller to;
Data acquisition controller, gather user's face that face identification device and alcohol detecting device upload whether mate, whether the safe wearing cap, the testing result that whether exceeds standard of tired testing result and user's oral cavity alcohol content forms user security information, the user right card information that reads together with card reader sends the embedded ethernet pass to; Receive the safety verification result that embedded ethernet closes passback, the control gate is opened gate inhibition or warning;
Embedded ethernet closes, the user security information that the receive data acquisition controller transmits and user right card information, and encode, then convert the data layout that is fit to the Ethernet transmission to, send security server to; Receive the safety verification result of security server passback, and be transmitted to data acquisition controller;
Database server, storage security information and authority information;
Security server, receive data user's security information and user right card information that embedded ethernet closes, extract user right information from database, security information and authority information according to the database storage carry out safety verification and Authority Verification, the safety verification result who whether is allowed the user to pass through, and return to the embedded ethernet pass, be sent to simultaneously management end;
Management end, write the card device with one respectively, people's face section image collecting device is connected, the security information of leading subscriber authority card information and database server and authority information: user right information is set and deposits database server in, the user right message code is write the user right card by writing the card device, gather validated user people's face section's image information and be sent to the face identification device storage by people's face section image device, the safety verification result who receives simultaneously security server stores and real-time demonstration.
Further, management end is provided with inquiry, RCI.
Mining area personal security management method may further comprise the steps:
(1), face identification device gathers user people's face section image information, searches the face-image whether local data base has coupling, carries out the tired identification of people's face, whether identification has the safe wearing cap, and testing result is sent to data acquisition controller;
(2), alcohol detecting device gathers user's oral cavity alcohol content, detect whether surpass reservation threshold, and the oral cavity alcohol testing result be sent to data acquisition controller;
(3), user card punching, card reader reads the user right card information, and sends data acquisition controller to;
(4), whether data acquisition controller user's face-image that face identification device and alcohol detecting device are uploaded mate, whether the safe wearing cap, the testing result that whether exceeds standard of tired testing result and user's oral cavity alcohol content forms user security information, the authority information of uploading together with card reader sends embedded ethernet to and closes;
(5), embedded ethernet closes user security information and authority card information that data acquisition controller is transmitted and converts Ethernet data to, and sends security server to;
(6), security server extracts user security information and authority card information from the data that receive, extract user right information from database, security information and authority information according to the database storage carry out safety verification and Authority Verification, if safety verification and Authority Verification all pass through, then enter step (7); If there is any one not pass through, then enter step (8);
(7), security server send to allow current instruction, closes by embedded ethernet and sends data acquisition controller to, the control gate is opened the gate sentry gate inhibition, makes the user pass through gate sentry; Enter step (9);
(8), the security server instruction that sends that no through traffic, close by embedded ethernet and to send data acquisition controller to, forbid that gate opens the gate sentry gate inhibition, forbid that the user is current and report to the police, enter step (9);
(9), security server sends this information processing result to the management end storage and shows in real time; This pass authentication finishes.
Wherein, safety verification may further comprise the steps:
1), security server extracts embedded ethernet and closes the user security information of uploading;
2), check user's facial images match result, if coupling, then safety verification does not pass through, checking finishes; If coupling then enters step 3);
3), check the human fatigue testing result, if human fatigue, then safety verification does not pass through, checking finishes; If fatigue phenomenon do not occur, then enter step 4);
4), check user's safe wearing cap testing result, if safe wearing cap not, then safety verification does not pass through, checking finishes; If the user has worn safety helmet, then enter step 5);
5), check user's oral cavity alcohol content detection result, if alcohol content is defective, then safety verification does not pass through, checking finishes; If alcohol content is qualified, safety verification passes through, and checking finishes.
Wherein, Authority Verification may further comprise the steps:
1), security server is obtained the user right card information, analysis authority mark information;
2), whether Query Database exist this user, if there is no, Authority Verification does not pass through, checking finishes; If exist, enter step 3);
3), from database, obtain the individual subscriber authority as authority to be verified;
4), check that the user is in the authority to be verified when the Qianmen district;
5), check that user's authority to be verified whether having control festivals or holidays information when the Qianmen district, if do not have, enters step 8); If have control festivals or holidays information, enter step 6);
6), check whether the user can pass through when the Qianmen district in current date festivals or holidays section, if energy enters step 12); If can not, enter step 7);
7), check whether the user can pass through in whole mining area in current date festivals or holidays section, if energy enters step 12); If can not, enter step 8);
8), check that user's authority to be verified whether having all control information when the Qianmen district, if do not have, enters step 11); If have all control information, then enter step 9);
9), check whether the user can pass through when the Qianmen district within current week, if energy enters step 12); If can not, enter step 10);
10), check whether the user can pass through in whole mining area within current week, if energy enters step 12); If can not, enter step 11);
11), check that the user at the current permitted hours when the Qianmen district, enters step 12);
12), check that can the user pass through in current slot, if can pass through, Authority Verification passes through, and verifies end; If can not pass through, enter step 13);
13), user's group at user place in the Query Database, check whether there is not user's group of verifying authorization, if do not have, Authority Verification does not pass through, checking finishes; If have, the user is organized authority as authority to be verified, enter step 4).
The mining area personal security management system and the method that adopt above technical scheme to make up, can realize following beneficial effect:
1. face identification device and alcohol detecting device are set, make mining area personal security management system can whether assume another's name to the turnover personnel, whether the safe wearing cap, whether tired, whether four emphasis security factors of drinking too much detect, and avoid mining area staff's dangerous operation.
2. user right adopts the dual authority Audit Mechanism based on role and gate sentry, and role succession combines with individual the mandate, and the gate sentry zone combines with individuality, and combine with control holiday working day, can realize flexible, meticulous user right audit.
3. the whole safety record of management end storage by software supervision interfaces such as open inquiry, Long-distance Control, can realize being beneficial to remote monitoring based on the monitor terminal of the various ways such as PC, Android, iOS.
Mining area of the present invention personal security management system can cover each gate sentry of mining area and other important areas, cooperatively interacts by safety verification and Authority Verification, realizes the safety management of mining area personnel turnover is beneficial to the safety in production in mining area.
Description of drawings
Fig. 1 is a kind of embodiment structural drawing of mining area of the present invention personal security management system;
Fig. 2 is a kind of embodiment process flow diagram of mining area of the present invention personal security management method;
Fig. 3 is a kind of embodiment process flow diagram of safe verification method in the mining area personal security management method among Fig. 2;
Fig. 4 is a kind of embodiment process flow diagram of method for verifying authority in the mining area personal security management method among Fig. 2;
Embodiment
Below in conjunction with accompanying drawing the specific embodiment of the present invention is described, so that those skilled in the art understands the present invention better.What need to point out especially is that in the following description, when perhaps the detailed description of known function and design can desalinate main contents of the present invention, these were described in here and will be left in the basket.
Fig. 1 is a kind of embodiment structural drawing of mining area of the present invention personal security management system.As shown in Figure 1, personal security management system in mining area comprises card reader, gate, face identification device, alcohol detecting device, data acquisition controller, embedded ethernet pass, database server, security server, management end.
Wherein, security server, database server, management end, embedded ethernet close by Ethernet interconnected.Hang one under the management end and write the card device, people's face section image collecting device, people's face section image collecting device is connected in the Ethernet.Data acquisition controller closes interconnected by CAN bus and embedded ethernet.Hang a card reader under each data acquisition controller, adopt RS232 to connect; A gate; A face identification device connects by Wiegand, and this person's face recognition device is convenient to receive the validated user people face section image information from the collection of management end by being connected in the Ethernet simultaneously; An alcohol detecting device connects by RS232.Only draw lineup's face recognition device and the alcohol detecting device that is connected with data acquisition controller 2, other omissions among Fig. 1.Mining area personal security management system is installed on gate sentry in this embodiment, and other need to carry out the place of safety inspection or Authority Verification also can be installed in the mining area in actual use.
The below is described in detail each ingredient:
Card reader reads the user right card information, sends the user right card information to data acquisition controller.
Gate, the order of receive data acquisition controller, control gate sentry gate inhibition.
Face identification device, gather user people's face section image information, with people's face section image information of this locality storage carry out that facial images match detects, safety helmet wears that situation detects, fatigue detecting, and with user's face-image whether mate, whether the safe wearing cap, whether tired testing result sends data acquisition controller to.
Whether alcohol detecting device presets overproof threshold value, gathers user's oral cavity alcohol content information, detect user's oral cavity alcohol content and exceed standard, and the testing result whether alcohol content is exceeded standard sends data acquisition controller to.
Data acquisition controller, gather user's face-image that face identification device and alcohol detecting device upload whether mate, whether the safe wearing cap, the testing result that whether exceeds standard of tired testing result and user's oral cavity alcohol content forms user security information, the user right card information that reads together with card reader sends the embedded ethernet pass to; Receive the safety verification result that embedded ethernet closes passback, the control gate is opened gate inhibition or warning.
Embedded ethernet closes, the user security information that the receive data acquisition controller transmits and user right card information, and encode, then convert the data layout that is fit to the Ethernet transmission to, send security server to; Receive the safety verification result of security server passback, and be transmitted to data acquisition controller.
Database server is equipped with database software, storage security information and authority information.
Security server is equipped with the safety management service software, mainly comprises secure verification module and Authority Verification module.Send data when embedded ethernet closes, security server is to decoding data.Secure verification module verifies user security information, comprises mainly whether the turnover personnel drink, tired, safe wearing cap and whether act as fraudulent substitute for a person etc. to verify.The Authority Verification module is extracted user right information according to the user right message code in the user right card information from database, and authority information is verified.
Management end is equipped with and is integrated into that the user provides work authority card function, database server database management function and to the safety management management end software of mining area personal security condition monitoring Presentation Function.Management end is each mining area personnel assignment authority and with in the authority information write into Databasce server, and by writing the card device user right message code is write the user right card.Management end connects people's face section image collecting device, absorb in advance validated user people face section image information and give the face identification device link to each other with data acquisition controller and the local data base that is stored to face identification device with this communication, be used for carrying out the judgement of user's facial information.Simultaneously, the information when management end monitoring display mining area personnel pass in and out the mining area comprises whether drinking, tired, safe wearing cap and whether acting as fraudulent substitute for a person and the information such as the authority of overstepping the authority own.Management end also can arrange inquiry, RCI is used for system extension.
The present invention is by arranging face identification device and alcohol detecting device, make mining area personal security management system can whether assume another's name to the turnover personnel, whether the safe wearing cap, whether tired, whether four emphasis security factors of drinking too much detect, and avoid mining area staff's dangerous operation.The safety record that the management end storage is whole by software supervision interfaces such as open inquiry, Long-distance Control, can realize being beneficial to remote monitoring based on the monitor terminal of the various ways such as PC, Android, iOS.
Fig. 2 is a kind of embodiment process flow diagram of mining area of the present invention personal security management method.As shown in Figure 2, personal security management method in mining area may further comprise the steps:
S201: face identification device gathers user's facial information, and carries out following detection:
● search the face-image whether coupling is arranged in the local data base;
● the face-image that gathers is carried out the tired identification of people's face;
● whether the face-image that gathers is carried out discriminance analysis the safe wearing cap.
Face identification device with user's face-image whether mate, whether the safe wearing cap, whether tired testing result sends data acquisition controller to.
S202: alcohol detecting device gathers user's oral cavity alcohol content, detects whether surpass reservation threshold, and sends oral cavity alcohol content detection result to data acquisition controller.
S203: user card punching, card reader read the user right card information, and send data acquisition controller to.
S204: data acquisition controller with user's face-image that face identification device and alcohol detecting device collect whether mate, whether the safe wearing cap, the testing result that whether exceeds standard of tired testing result and user's oral cavity alcohol content forms user security information, the authority card information of uploading together with card reader sends embedded ethernet to and closes.
S205: embedded ethernet closes user security information and authority card information that data acquisition controller is transmitted and converts Ethernet data to, and sends security server to.
S206: security server extracts user security information and the authority card information that receives, and carries out the user security inspection.
S207: security server carries out safety verification according to user security information, does not pass through such as safety verification, then enters step S210; Pass through such as safety verification, then enter step S207.
S208: security server extracts user right information and carries out Authority Verification from database according to the user right message code in the authority card information, does not pass through such as Authority Verification, then enters step S210; Pass through such as Authority Verification, then carry out step S209.
S209: security server sends and allows current instruction, closes by embedded ethernet and sends data acquisition controller to, and the control gate is opened the gate sentry gate inhibition, makes the user pass through gate sentry, enters step S211.
S210: instruction that security server sends that no through traffic, close by embedded ethernet and to send data acquisition controller to, forbid that gate opens the gate sentry gate inhibition, forbid that the user is current and report to the police, enter step S211.
S211: security server sends this information processing result to the management end storage and shows in real time.This pass authentication finishes.
Mining area of the present invention personal security management method cooperatively interacts by safety verification and Authority Verification, detects by safety factor, avoids mining area personnel unsafe factor aborning, realizes the safety management to mining area personnel turnover.
Fig. 3 is a kind of embodiment process flow diagram of safe verification method in the mining area personal security management method among Fig. 2.As shown in Figure 3, safe verification method may further comprise the steps:
S301: security server extracts embedded ethernet and closes the user security information of uploading.
S302: check user's facial images match result, if do not mate, then safety verification does not pass through, and checking finishes; If coupling then enters S303.
S303: check the human fatigue testing result, if human fatigue, then safety verification does not pass through, and checking finishes; If fatigue phenomenon do not occur, then enter S304.
S304: check user's safe wearing cap testing result, if safe wearing cap not, then safety verification does not pass through, and checking finishes; If the user has worn safety helmet, then enter S305.
S305: check user's oral cavity alcohol content, if alcohol content is defective, then safety verification does not pass through, and checking finishes; If alcohol content is qualified, safety verification passes through, and checking finishes.
Fig. 4 is a kind of embodiment process flow diagram of method for verifying authority in the mining area personal security management method among Fig. 2.As shown in Figure 4, method for verifying authority may further comprise the steps:
S401: security server is obtained the user right card information, the authority mark information in the analysis user authorization code.
S402: whether have this user in the Query Database, namely check whether validated user of this user, if there is no, then Authority Verification does not pass through, and checking finishes; If exist, enter S403.
S403: from database, obtain the individual subscriber authority as authority to be verified.
S405: check that the user is in the authority to be verified when the Qianmen district.
S406: check that user's authority to be verified whether having control festivals or holidays information when the Qianmen district, if do not have, enters step S411; If have control festivals or holidays information, then enter step S407.
S407: check that the user is in the local control festivals or holidays information when the Qianmen district.
S408: check whether current date and user partial control festivals or holidays information mate, if coupling enters step S417; If do not mate, then enter step S409.
S409: check that the user is in the overall control festivals or holidays information in whole mining area.
S410: check whether current date and user overall situation control festivals or holidays information mates, if coupling enters step S417; If do not mate, then enter step S411.
S411: check that user's authority to be verified whether having all control information when the Qianmen district, if do not have, enters S416; If have all control information, then enter step S412;
S412: check that the user is in the local all control information when the Qianmen district.
S413: check whether current number of weeks and user partial week control information mates, if coupling enters step S417; If do not mate, enter step S414;
S414: check that the user is in overall all control information in whole mining area.
S415: check whether all control information of current number of weeks and the user overall situation mates, if coupling enters step S417; If do not mate, enter step S416;
S416: check that the user at the current permitted hours when the Qianmen district, enters step S417.
S417: check that can the user pass through in current slot, if can pass through, Authority Verification passes through, and checking finishes; If can not pass through, enter S418.
S418: inquiring user place user group.
S419: whether have not user's group of verifying authorization in user's group at inspection user place, if do not have, Authority Verification does not pass through, and checking finishes; If have, enter step S420.
S420: the user is organized authority as authority to be verified, enter step S405.
Because the user may belong to a plurality of user's groups, therefore when the individual subscriber authority can't be passed through Authority Verification, the user is organized authority as the authority to be verified checking that circulates, when having a user to organize the authority P Passable, this user right checking is passed through, and checking finishes; When the personal authority of user group and user's group only for all impassable, or the user organizes that personal authority is impassable and when not belonging to any user and organizing, this user right checking is not passed through, checking finishes.
User right adopts the dual authority Audit Mechanism based on role and gate sentry, and role succession combines with individual the mandate, and the gate sentry zone combines with individuality, and combine with control holiday working day, can realize flexible, meticulous user right audit.
Embodiment
Mine management person is that user " Zhang San " distributes authority by management end: " Zhang San " is under the jurisdiction of " common group ", the personal authority information of " Zhang San " does not have gate sentry 2 right of access any time, but the gate sentry 2 that the user of " common group " can be in the current mining area of 8:00-10:00 on October 1st, 2012.Management end deposits this authority in database server, by card reader, and according to the authority mark issued rights card in the database server, and with the corresponding personal information of this authority information coding and write in the authority card.Management end utilizes people's face section image information of face identification device collection " Zhang San ", and sends to the face identification device of gate sentry 2 by Ethernet." Zhang San " will on October 1st, 2012 8:30 by gate sentry 2, this moment he do not drink, in accordance with regulations the safe wearing cap, do not have weariness working." Zhang San " this time current process is as follows:
1) people's face section image information of the face identification device collection " Zhang San " of gate sentry 2, after testing, face-image is legal, worn safety helmet and do not had fatigue, and face identification device sends testing result to data acquisition controller.
The oral cavity alcohol content information of 2) alcohol detecting device collection " Zhang San ", oral cavity alcohol content is in the default qualified threshold value of alcohol content after testing, and alcohol detecting device sends testing result to data acquisition controller.
3) " Zhang San " swipes the card, the authority card information of card reader collection " Zhang San ", and send data acquisition controller to.
4) data acquisition controller face-image is legal, wear by safety helmet, do not have fatigue, alcohol content to detect qualified user security information and the authority card information of forming to encode together and send embedded ethernet to and close.
5) embedded ethernet closes the receive data acquisition controller by the data that the CAN bus transmits, and encodes and converts Ethernet data to and report, and then is sent to security server by Ethernet.
6) secure verification module of the safety management service software in the security server is carried out safety verification to the user, " Zhang San " facial images match, does not have fatigue, admires that safety helmet and oral cavity alcohol content are arranged is qualified, and checking is passed through.
7) the Authority Verification module of the safety management service software in the security server is carried out Authority Verification to the user.Personal user's authority of " Zhang San " does not have gate sentry 2 right of access any time, therefore can't pass through through Authority Verification.When Query Database as can be known " Zhang San " belong to " common group ", therefore with the authority of " common group " as authority to be verified.The user of " common group " can be in the current mining area of 8:00-10:00 on October 1st, 2012 gate sentry 2, be 8:30 on October 1st, 2012 this moment, October 1 was National Day, therefore when checking local control festivals or holidays information, can find the current date coupling, and can pass through in current slot, so Authority Verification passes through.
8) after safety verification and Authority Verification all passed through, security server was made the judgement of " allowing current " to this time passing through of " Zhang San ", and this result is returned to data acquisition controller by the embedded ethernet pass.
9) data acquisition controller receives that security server gives the result of " allowing current " to " Zhang San ", and the control gate is opened the gate inhibition, and " Zhang San " let pass.
10) security server sends this information processing result to management end, management end is preserved result and is shown in real time, the keeper can watch this " Zhang San " successfully current gate sentry 2 by management end, facial images match, do not have fatigue, admire that safety helmet and oral cavity alcohol content are arranged is qualified, employing be the authority of " common group ".
Although the above is described the illustrative embodiment of the present invention; so that those skilled in the art understand the present invention; but should be clear; the invention is not restricted to the scope of embodiment; to those skilled in the art; as long as various variations appended claim limit and the spirit and scope of the present invention determined in, these variations are apparent, all utilize innovation and creation that the present invention conceives all at the row of protection.

Claims (5)

1. mining area personal security management system comprises:
Card reader reads the user right card information;
Gate, control gate sentry gate inhibition;
It is characterized in that, also comprise:
Face identification device, gather user people's face section image information, with people's face section image information of this locality storage carry out that facial images match detects, safety helmet wears that situation detects, fatigue detecting, and with user's face-image whether mate, whether the safe wearing cap, whether tired testing result sends data acquisition controller to;
Whether alcohol detecting device presets overproof threshold value, gathers user's oral cavity alcohol content information, detect user's oral cavity alcohol content and exceed standard, and the testing result whether alcohol content is exceeded standard sends data acquisition controller to;
Data acquisition controller, gather user's face-image that face identification device and alcohol detecting device upload whether mate, whether the safe wearing cap, the testing result that whether exceeds standard of tired testing result and user's oral cavity alcohol content forms user security information, the user right card information that reads together with card reader sends the embedded ethernet pass to; Receive the safety verification result that embedded ethernet closes passback, the control gate is opened gate inhibition or warning;
Embedded ethernet closes, the user security information that the receive data acquisition controller transmits and user right card information, and encode, then convert the data layout that is fit to the Ethernet transmission to, send security server to; Receive the safety verification result of security server passback, and be transmitted to data acquisition controller;
Database server, storage security information and authority information;
Security server, receive data user's security information and user right card information that embedded ethernet closes, security information and authority information according to the database storage carry out safety verification and Authority Verification, the safety verification result who whether is allowed the user to pass through, and return to the embedded ethernet pass, be sent to simultaneously management end;
Management end, write the card device with one respectively, people's face section image collecting device is connected, the user security information of leading subscriber authority card information and database server and user right information: user right information is set and deposits database server in, user management user right message code is write the user right card by writing the card device, gather validated user people's face section's image information and be sent to the face identification device storage by people's face section image device, the safety verification result who receives simultaneously security server stores and real-time demonstration.
2. safety management system according to claim 1 is characterized in that, described management end is provided with inquiry, RCI.
3. a mining area personal security management method is characterized in that, may further comprise the steps:
(1), face identification device gathers user people's face section image information, searches the face-image whether local data base has coupling, carries out the tired identification of people's face, whether identification has the safe wearing cap, and testing result is sent to data acquisition controller;
(2), alcohol detecting device gathers user's oral cavity alcohol content, detect whether surpass reservation threshold, and the oral cavity alcohol testing result be sent to data acquisition controller;
(3), user card punching, card reader reads the user right card information, and sends data acquisition controller to;
(4), whether data acquisition controller user's face-image that face identification device and alcohol detecting device are uploaded that face identification device and alcohol detecting device are uploaded mate, whether the safe wearing cap, the testing result that whether exceeds standard of tired testing result and user's oral cavity alcohol content forms user security information, the authority information of uploading together with card reader sends embedded ethernet to and closes;
(5), embedded ethernet closes user security information and authority card information that data acquisition controller is transmitted and converts Ethernet data to, and sends security server to;
(6), security server extracts user security information and authority card information from the data that receive, extract user right information from database, security information and authority information according to the database storage carry out safety verification and Authority Verification, if safety verification and Authority Verification all pass through, then enter step (7); If there is any one not pass through, then enter step (8);
(7), security server send to allow current instruction, closes by embedded ethernet and sends data acquisition controller to, the control gate is opened the gate sentry gate inhibition, makes the user pass through gate sentry; Enter step (9);
(8), the security server instruction that sends that no through traffic, close by embedded ethernet and to send data acquisition controller to, forbid that gate opens the gate sentry gate inhibition, forbid that the user is current and report to the police, enter step (9);
(9), security server sends this information processing result to the management end storage and shows in real time; This pass authentication finishes.
4. mining area according to claim 3 personal security management method is characterized in that, described safety verification may further comprise the steps:
1), security server extracts embedded ethernet and closes the user security information of uploading;
2), check user's facial images match result, if coupling, then safety verification does not pass through, checking finishes; If coupling then enters step 3);
3), check the human fatigue testing result, if human fatigue, then safety verification does not pass through, checking finishes; If fatigue phenomenon do not occur, then enter step 4);
4), check user's safe wearing cap testing result, if safe wearing cap not, then safety verification does not pass through, checking finishes; If the user has worn safety helmet, then enter step 5);
5), check user's oral cavity alcohol content detection result, if alcohol content is defective, then safety verification does not pass through, checking finishes; If alcohol content is qualified, safety verification passes through, and checking finishes.
5. mining area according to claim 4 personal security management method is characterized in that, described Authority Verification may further comprise the steps:
1), security server is obtained the user right card information, analysis authority mark information;
2), whether Query Database exist this user, if there is no, Authority Verification does not pass through, checking finishes; If exist, enter step 3);
3), from database, obtain the individual subscriber authority as authority to be verified;
4), check that the user is in the authority to be verified when the Qianmen district;
5), check that user's authority to be verified whether having control festivals or holidays information when the Qianmen district, if do not have, enters step 8); If have control festivals or holidays information, enter step 6);
6), check whether the user can pass through when the Qianmen district in current date festivals or holidays section, if energy enters step 12); If can not, enter step 7);
7), check whether the user can pass through in whole mining area in current date festivals or holidays section, if energy enters step 12); If can not, enter step 8);
8), check that user's authority to be verified whether having all control information when the Qianmen district, if do not have, enters step 11); If have all control information, then enter step 9);
9), check whether the user can pass through when the Qianmen district within current week, if energy enters step 12); If can not, enter step 10);
10), check whether the user can pass through in whole mining area within current week, if energy enters step 12); If can not, enter step 11);
11), check that the user at the current permitted hours when the Qianmen district, enters step 12);
12), check that can the user pass through in current slot, if can pass through, Authority Verification passes through, and verifies end; If can not pass through, enter step 13);
13), user's group at user place in the Query Database, check whether there is not user's group of verifying authorization, if do not have, Authority Verification does not pass through, checking finishes; If have, the user is organized authority as authority to be verified, enter step 4).
CN201210528918.4A 2012-12-10 2012-12-10 Personnel security management system and method in mining areas Expired - Fee Related CN103049949B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210528918.4A CN103049949B (en) 2012-12-10 2012-12-10 Personnel security management system and method in mining areas

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210528918.4A CN103049949B (en) 2012-12-10 2012-12-10 Personnel security management system and method in mining areas

Publications (2)

Publication Number Publication Date
CN103049949A true CN103049949A (en) 2013-04-17
CN103049949B CN103049949B (en) 2015-04-08

Family

ID=48062574

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210528918.4A Expired - Fee Related CN103049949B (en) 2012-12-10 2012-12-10 Personnel security management system and method in mining areas

Country Status (1)

Country Link
CN (1) CN103049949B (en)

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104021648A (en) * 2014-06-22 2014-09-03 朱明增 Intelligent monitoring and early warning system for safety helmet wearing on transformer substation site
CN104077581A (en) * 2014-07-21 2014-10-01 国家电网公司 Smart video identification method for wearing safety helmet rightly
CN104110271A (en) * 2013-04-22 2014-10-22 开封市测控技术有限公司 Under-mine equipment monitoring alarm system based on face recognition technology
CN104392582A (en) * 2014-11-17 2015-03-04 南通大学 Remote monitor and alarm system for ship welder based on multi-sensor information integration
CN105672849A (en) * 2016-01-07 2016-06-15 江苏苏南万科物业服务有限公司 Intelligent door and control method thereof
CN105956549A (en) * 2016-04-28 2016-09-21 江苏大学 Worker pre-job safety equipment and behavior capability inspection system and method
CN106296949A (en) * 2016-09-13 2017-01-04 成都创慧科达科技有限公司 A kind of gate control system based on H264 video decoding techniques and method
CN106454734A (en) * 2016-11-04 2017-02-22 成都希盟泰克科技发展有限公司 Method for detecting safety state of builder
CN107239773A (en) * 2017-06-30 2017-10-10 合肥贺财工程项目管理有限公司 A kind of engineering project place personal security supervisory systems
WO2018014350A1 (en) * 2016-07-22 2018-01-25 深圳中兴力维技术有限公司 Equipment control method, terminal, and control device
RU2643898C1 (en) * 2016-11-18 2018-02-06 Трифон Юрьевич Шейкин Access management and control system by using mobile telecommunication device
CN107977802A (en) * 2017-12-29 2018-05-01 天河智慧产业科技(北京)有限公司 A kind of wisdom site staff's management system with testimony of a witness comparing function
CN108288033A (en) * 2018-01-05 2018-07-17 电子科技大学 A kind of safety cap detection method merging multiple features based on random fern
CN108391885A (en) * 2018-05-17 2018-08-14 姚俊安 A kind of device and method that detectable jockey goes on a journey safely
CN108734374A (en) * 2018-03-26 2018-11-02 中国神华能源股份有限公司 Information processing method, device, system, storage medium and processor
CN108881858A (en) * 2018-08-03 2018-11-23 四川民工加网络科技有限公司 Construction site nonnative personnel's monitoring method, device and electronic equipment
CN109003367A (en) * 2018-07-18 2018-12-14 上海小蚁科技有限公司 Control method and device, storage medium, the terminal of gate inhibition
CN109110595A (en) * 2018-09-18 2019-01-01 中国建筑第八工程局有限公司 Power supply for construction ladder intelligent access control system and method
CN109116445A (en) * 2018-08-30 2019-01-01 Oppo广东移动通信有限公司 Weather prompting method, apparatus, storage medium and terminal
CN109147204A (en) * 2018-08-16 2019-01-04 青海华职康健康科技有限公司 A kind of automatic distribution method of personal protective equipment and system
CN109920098A (en) * 2019-01-29 2019-06-21 迅捷安消防及救援科技(深圳)有限公司 Removable module wisdom fire-fighting Support Equipment on duty and Related product
CN110503749A (en) * 2018-05-18 2019-11-26 黄暐皓 Door lock assembly
CN110570545A (en) * 2018-06-05 2019-12-13 宁波欧依安盾安全科技有限公司 entrance guard's IC-card intelligent management system
CN111080875A (en) * 2019-11-01 2020-04-28 广州博湖安全科技有限公司 Multifunctional intelligent security entrance guard management system
CN111259682A (en) * 2018-11-30 2020-06-09 百度在线网络技术(北京)有限公司 Method and device for monitoring the safety of a construction site
CN113158713A (en) * 2020-10-22 2021-07-23 西安天和防务技术股份有限公司 Valley management system
CN114627504A (en) * 2022-03-17 2022-06-14 盐城笃诚建设有限公司 Building engineering labor service personnel management system and management method
US20230281290A1 (en) * 2013-03-13 2023-09-07 Lookout, Inc. Methods for managing user access to computing devices based on evaluation of authentication and maintenance of user control

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107680220A (en) * 2017-09-28 2018-02-09 朱明增 A kind of operation unlawful practice intelligent identification Method based on machine vision technique

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4495496A (en) * 1981-12-15 1985-01-22 Johnson Engineering Corp. Personnel monitoring and locating system
JPH01194096A (en) * 1988-01-29 1989-08-04 Fujita Corp Mine entry management device
DE3832375A1 (en) * 1988-09-23 1990-03-29 Ruhrkohle Ag Method and arrangement for detecting objects passing a call-up signal barrier in mine operations
CN201278161Y (en) * 2008-10-17 2009-07-22 王宏志 Gate inhibition control system based on second generation ID card
CN101521805A (en) * 2009-02-27 2009-09-02 镇江石鼓文智能化系统开发有限公司 Helmet-site detecting system on construction field and detecting method thereof
CN101739549A (en) * 2009-02-11 2010-06-16 北京智安邦科技有限公司 Face detection method and system
CN202093650U (en) * 2011-05-27 2011-12-28 北京中矿华沃电子科技有限公司 Security early warning system for open pit transportation
CN202134021U (en) * 2011-07-21 2012-02-01 北京九鼎安泰矿业科技有限责任公司 Safety inspection device for wellhead
CN102708606A (en) * 2012-03-26 2012-10-03 北京普惠恒丰科技有限公司 System for monitoring person entering and exiting presence area of prison by recognizing faces of person

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4495496A (en) * 1981-12-15 1985-01-22 Johnson Engineering Corp. Personnel monitoring and locating system
JPH01194096A (en) * 1988-01-29 1989-08-04 Fujita Corp Mine entry management device
DE3832375A1 (en) * 1988-09-23 1990-03-29 Ruhrkohle Ag Method and arrangement for detecting objects passing a call-up signal barrier in mine operations
CN201278161Y (en) * 2008-10-17 2009-07-22 王宏志 Gate inhibition control system based on second generation ID card
CN101739549A (en) * 2009-02-11 2010-06-16 北京智安邦科技有限公司 Face detection method and system
CN101521805A (en) * 2009-02-27 2009-09-02 镇江石鼓文智能化系统开发有限公司 Helmet-site detecting system on construction field and detecting method thereof
CN202093650U (en) * 2011-05-27 2011-12-28 北京中矿华沃电子科技有限公司 Security early warning system for open pit transportation
CN202134021U (en) * 2011-07-21 2012-02-01 北京九鼎安泰矿业科技有限责任公司 Safety inspection device for wellhead
CN102708606A (en) * 2012-03-26 2012-10-03 北京普惠恒丰科技有限公司 System for monitoring person entering and exiting presence area of prison by recognizing faces of person

Cited By (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20230281290A1 (en) * 2013-03-13 2023-09-07 Lookout, Inc. Methods for managing user access to computing devices based on evaluation of authentication and maintenance of user control
CN104110271A (en) * 2013-04-22 2014-10-22 开封市测控技术有限公司 Under-mine equipment monitoring alarm system based on face recognition technology
CN104021648A (en) * 2014-06-22 2014-09-03 朱明增 Intelligent monitoring and early warning system for safety helmet wearing on transformer substation site
CN104077581A (en) * 2014-07-21 2014-10-01 国家电网公司 Smart video identification method for wearing safety helmet rightly
CN104392582A (en) * 2014-11-17 2015-03-04 南通大学 Remote monitor and alarm system for ship welder based on multi-sensor information integration
CN105701968A (en) * 2014-11-17 2016-06-22 南通大学 Wireless monitoring alarm system for welding operation
CN105701968B (en) * 2014-11-17 2018-01-23 南通大学 Weld job wireless monitoring-alarming system
CN105672849A (en) * 2016-01-07 2016-06-15 江苏苏南万科物业服务有限公司 Intelligent door and control method thereof
CN105956549A (en) * 2016-04-28 2016-09-21 江苏大学 Worker pre-job safety equipment and behavior capability inspection system and method
WO2018014350A1 (en) * 2016-07-22 2018-01-25 深圳中兴力维技术有限公司 Equipment control method, terminal, and control device
CN106296949A (en) * 2016-09-13 2017-01-04 成都创慧科达科技有限公司 A kind of gate control system based on H264 video decoding techniques and method
CN106296949B (en) * 2016-09-13 2018-11-27 成都创慧科达科技有限公司 A kind of access control system and method based on H264 video decoding techniques
CN106454734A (en) * 2016-11-04 2017-02-22 成都希盟泰克科技发展有限公司 Method for detecting safety state of builder
RU2643898C1 (en) * 2016-11-18 2018-02-06 Трифон Юрьевич Шейкин Access management and control system by using mobile telecommunication device
CN107239773A (en) * 2017-06-30 2017-10-10 合肥贺财工程项目管理有限公司 A kind of engineering project place personal security supervisory systems
CN107977802A (en) * 2017-12-29 2018-05-01 天河智慧产业科技(北京)有限公司 A kind of wisdom site staff's management system with testimony of a witness comparing function
CN108288033B (en) * 2018-01-05 2019-09-24 电子科技大学 A kind of safety cap detection method based on random fern fusion multiple features
CN108288033A (en) * 2018-01-05 2018-07-17 电子科技大学 A kind of safety cap detection method merging multiple features based on random fern
CN108734374A (en) * 2018-03-26 2018-11-02 中国神华能源股份有限公司 Information processing method, device, system, storage medium and processor
CN108391885A (en) * 2018-05-17 2018-08-14 姚俊安 A kind of device and method that detectable jockey goes on a journey safely
CN110503749A (en) * 2018-05-18 2019-11-26 黄暐皓 Door lock assembly
CN110570545A (en) * 2018-06-05 2019-12-13 宁波欧依安盾安全科技有限公司 entrance guard's IC-card intelligent management system
CN109003367A (en) * 2018-07-18 2018-12-14 上海小蚁科技有限公司 Control method and device, storage medium, the terminal of gate inhibition
CN109003367B (en) * 2018-07-18 2021-10-08 上海小蚁科技有限公司 Access control method and device, storage medium and terminal
CN108881858A (en) * 2018-08-03 2018-11-23 四川民工加网络科技有限公司 Construction site nonnative personnel's monitoring method, device and electronic equipment
CN108881858B (en) * 2018-08-03 2020-06-23 四川亚东世纪科技有限公司 Method and device for monitoring external personnel on construction site and electronic equipment
CN109147204A (en) * 2018-08-16 2019-01-04 青海华职康健康科技有限公司 A kind of automatic distribution method of personal protective equipment and system
CN109116445A (en) * 2018-08-30 2019-01-01 Oppo广东移动通信有限公司 Weather prompting method, apparatus, storage medium and terminal
CN109110595A (en) * 2018-09-18 2019-01-01 中国建筑第八工程局有限公司 Power supply for construction ladder intelligent access control system and method
CN111259682A (en) * 2018-11-30 2020-06-09 百度在线网络技术(北京)有限公司 Method and device for monitoring the safety of a construction site
CN111259682B (en) * 2018-11-30 2023-12-29 百度在线网络技术(北京)有限公司 Method and device for monitoring safety of construction site
CN109920098A (en) * 2019-01-29 2019-06-21 迅捷安消防及救援科技(深圳)有限公司 Removable module wisdom fire-fighting Support Equipment on duty and Related product
CN111080875A (en) * 2019-11-01 2020-04-28 广州博湖安全科技有限公司 Multifunctional intelligent security entrance guard management system
CN113158713A (en) * 2020-10-22 2021-07-23 西安天和防务技术股份有限公司 Valley management system
CN114627504A (en) * 2022-03-17 2022-06-14 盐城笃诚建设有限公司 Building engineering labor service personnel management system and management method
CN114627504B (en) * 2022-03-17 2023-01-10 盐城笃诚建设有限公司 Building engineering labor personnel management system and management method

Also Published As

Publication number Publication date
CN103049949B (en) 2015-04-08

Similar Documents

Publication Publication Date Title
CN103049949B (en) Personnel security management system and method in mining areas
CN205879007U (en) Intelligence pistol
CN203720889U (en) Handheld polling terminal
CN203720890U (en) Wearable polling terminal
CN205845137U (en) Intelligent gate
CN109598661A (en) Intelligence community security system and detection method based on recognition of face
CN102497531A (en) Human face recognition wireless video monitoring system based on cloud computing platform
CN104318732A (en) Transformer substation field worker monitoring and management system and method based on video analysis and RFID
CN102867350B (en) Prison AB door safety management method based on face recognition technology
CN208569727U (en) A kind of building site gate access control system
CN204256821U (en) A kind of high intelligent gate
CN102956107A (en) Parking lot vehicle parking information acquisition and false license, slip license and illegal vehicle recognition system and method
CN203054575U (en) Pollution source on-line monitoring system
CN107939447A (en) A kind of safety of coal mines risk stratification early warning management-control method and system
CN104281836A (en) Biometric feature recognition system and method
CN109599782A (en) Intelligent substation management system based on Internet of Things and intelligent recognition
CN107563634A (en) A kind of method of explosion supervisory systems and explosion supervision based on dipper system
CN111404874A (en) Taxi suspect vehicle discrimination analysis system architecture
CN103258222A (en) Cell intelligent logistic management system
CN106097489A (en) A kind of intelligent vision big data gate access control system
CN202268047U (en) Enterprise and institution modernized management monitoring alarm system
CN201765619U (en) Stranger portrait early warning system based on portrait biometric identification technology
CN207020684U (en) Portable police individual soldier's suit based on recognition of face
CN210052214U (en) Device for identifying personnel identity information in oil field operation area
CN207895517U (en) A kind of access control system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150408

Termination date: 20171210

CF01 Termination of patent right due to non-payment of annual fee