CN103049949B - Personnel security management system and method in mining areas - Google Patents

Personnel security management system and method in mining areas Download PDF

Info

Publication number
CN103049949B
CN103049949B CN201210528918.4A CN201210528918A CN103049949B CN 103049949 B CN103049949 B CN 103049949B CN 201210528918 A CN201210528918 A CN 201210528918A CN 103049949 B CN103049949 B CN 103049949B
Authority
CN
China
Prior art keywords
user
information
authority
pass
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201210528918.4A
Other languages
Chinese (zh)
Other versions
CN103049949A (en
Inventor
郝家胜
徐红兵
邹见效
潘宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201210528918.4A priority Critical patent/CN103049949B/en
Publication of CN103049949A publication Critical patent/CN103049949A/en
Application granted granted Critical
Publication of CN103049949B publication Critical patent/CN103049949B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a personnel security management system and method in mining areas. According to special environments and conditions of the mining areas, security factors are detected. The system is internally provided with a face recognition device and alcohol detecting device, wherein the face recognition device is used for detecting whether face images are matched, whether security helmets are worn, and whether workers are fatigue; and the alcohol detecting device is used for detecting whether the alcohol content in oral cavities of the workers is qualified, thereby preventing dangerous operation of the workers in the mining areas; and multiple audit modes of holiday control, week control and time section control are adopted for user right verification. The personnel security management system of the mining areas can cover each gate entry and other important areas of the mining areas, improves the entry and working safety of the workers in the mining areas through security verification and right verification which are matched with each other, and is beneficial to safety production of the mining areas.

Description

A kind of mining area personnel security management system and method
Technical field
The invention belongs to mining area safety-security area, more specifically say, relate to a kind of mining area personnel security management system and method.
Background technology
China is in process of industrialization, huge to the demand amplification of mineral resources.The safety in production in mining area also becomes the important step of mining area daily management, and the safety management of mining area personnel is one of them importance.The many employings in early stage mining area are manually registered and to be monitored worker safety's property with patrolling, and along with development in science and technology, mining area is introduced access control system and carried out safety management to the discrepancy of mining area personnel.Existing access control system generally comprises server, management end, access card card sender, access control equipment, data acquisition equipment, mainly carries out Authority Verification when staff passes in and out mining area or gate sentry.
But, in the management of personal security in mining area, there are some distinctive problems: first, mining area personnel often with non-security state, as excessive drinking, the tired and state such as not wear a safety helmet enter mining area operation; Secondly, the personnel identity unauthorized person that causes not easy to identify in mining area is acted as fraudulent substitute for a person to enter mining area; In addition, mining area personnel overstep the authority that its own right carries out can only by some specific people, as the activity that managerial personnel carry out.But, the existing many employings of mining area safety management are manually registered, are simply swiped the card, even if adopt access control system also can only carry out general Authority Verification, major part adopts artificial mode to judge mining area personal security state, such management not only wasting manpower and material resources, and there is many potential safety hazards, produce to mining area and add many non-safety factors.
Summary of the invention
The object of the invention is to overcome the deficiencies in the prior art, a kind of mining area personnel security management system and method are provided, for the environment and condition that mining area is special, carry out safety factor detection, and in conjunction with multiple authority audit, improve mining area personnel turnover and the safety precaution of work, be beneficial to the safety in production in mining area.
For realizing above goal of the invention, mining area of the present invention personnel security management system by the following technical solutions:
Comprise:
Card reader, reads user right card information;
Gate, controls gate sentry gate inhibition;
Face identification device, gather user's face facial image information, the face facial image information stored with this locality carry out facial images match detection, safety helmet wear condition detects, fatigue detecting, and whether user's face image is mated, whether safe wearing cap, whether tired testing result sends data acquisition controller to;
Whether alcohol detecting device, presets overproof threshold value, gathers user's oral cavity alcohol content information, detect user's oral cavity alcohol content and exceed standard, and send the testing result whether alcohol content exceeds standard to data acquisition controller;
Data acquisition controller, gather the testing result that whether face identification device mates with the user's face that alcohol detecting device is uploaded, whether whether safe wearing cap, whether tired testing result and user's oral cavity alcohol content exceed standard and form user security information, the user right card information together with card reader reading sends embedded ethernet pass to; Receive the safety verification result that embedded ethernet closes passback, control gate and open gate inhibition or warning;
Embedded ethernet closes, the user security information that reception data acquisition controller transmits and user right card information, and encodes, and then converts the data layout of applicable Ethernet transmission to, sends security server to; Receive the safety verification result of security server passback, and be transmitted to data acquisition controller;
Database server, storage security information and authority information;
Security server, receive data user's security information and the user right card information of embedded ethernet pass, user right information is extracted from database, safety verification and Authority Verification is carried out according to the security information of database purchase and authority information, whether allowed the safety verification result that user passes through, and return to embedded ethernet pass, be sent to management end simultaneously;
Management end, be connected with a writer, face facial image acquisition device respectively, the security information of leading subscriber authority card information and database server and authority information: user right information is set and stored in database server, by user right message code by writer write user right card, gather validated user face facial image information by face face-image device and be sent to face identification device and store, the safety verification result simultaneously receiving security server is carried out storage and is shown in real time.
Further, management end is provided with inquiry, RCI.
Mining area personal security management method comprises the following steps:
(1), face identification device gathers user face facial image information, searches the face-image whether local data base has coupling, carries out face fatigue and identify, identified whether safe wearing cap, and testing result is sent to data acquisition controller;
(2), alcohol detecting device gathers user oral cavity alcohol content, detects whether exceed reservation threshold, and oral cavity alcohol testing result is sent to data acquisition controller;
(3), user card punching, card reader reads user right card information, and sends data acquisition controller to;
(4), whether the user's face image face identification device and alcohol detecting device uploaded of data acquisition controller mate, whether whether safe wearing cap, tired testing result and user's oral cavity alcohol content exceed standard testing result form user security information, and the authority information uploaded together with card reader sends embedded ethernet pass to;
(5), embedded ethernet closes and converts the user security information of data acquisition controller transmission and authority card information to Ethernet data, and sends security server to;
(6), security server extracts user security information and authority card information from the data received, user right information is extracted from database, safety verification and Authority Verification is carried out according to the security information of database purchase and authority information, if safety verification and Authority Verification all pass through, then enter step (7); If there is any one not pass through, then enter step (8);
(7), security server send allow pass-through command, by embedded ethernet close send data acquisition controller to, control gate open gate sentry gate inhibition, make user pass through gate sentry; Enter step (9);
(8), security server sends no through traffic instruction, closed and sends data acquisition controller to, forbid that gate opens gate sentry gate inhibition, forbid that user passes through and reports to the police, enter step (9) by embedded ethernet;
(9), this information processing result is sent to management end and stores also display in real time by security server; This pass authentication terminates.
Wherein, safety verification comprises the following steps:
1), security server extracts embedded ethernet and closes the user security information uploaded;
2), check user's face images match result, if do not mated, then safety verification does not pass through, and checking terminates; If coupling, then enter step 3);
3), check human fatigue testing result, if human fatigue, then safety verification does not pass through, and checking terminates; If there is not fatigue phenomenon, then enter step 4);
4), check user's safe wearing cap testing result, if non-safe wearing cap, then safety verification does not pass through, and checking terminates; If user has worn safety helmet, then enter step 5);
5), check user's oral cavity alcohol content detection result, if alcohol content is defective, then safety verification does not pass through, and checking terminates; If alcohol content is qualified, safety verification passes through, and checking terminates.
Wherein, Authority Verification comprises the following steps:
1), security server obtains user right card information, analysis authority mark information;
2), whether Query Database exist this user, and if there is no, Authority Verification does not pass through, and checking terminates; If existed, enter step 3);
3) from database, individual subscriber authority, is obtained as authority to be verified;
4), check that user is in the authority to be verified when Qianmen district;
5), check that whether user's authority to be verified is having control festivals or holidays information when Qianmen district, if do not had, enters step 8); If there is control festivals or holidays information, enter step 6);
6), check whether user can pass through when Qianmen district in current date festivals or holidays section, if can, enter step 12); If can not, enter step 7);
7), check whether user can pass through in whole mining area in current date festivals or holidays section, if can, enter step 12); If can not, enter step 8);
8), check that whether user's authority to be verified is having all control information when Qianmen district, if do not had, enters step 11); If have all control information, then enter step 9);
9), check whether user can pass through when Qianmen district within current week, if can, enter step 12); If can not, enter step 10);
10), check whether user can pass through in whole mining area within current week, if can, enter step 12); If can not, enter step 11);
11), check that user is at the current permitted hours when Qianmen district, enters step 12);
12), check that can user pass through in current slot, if can pass through, Authority Verification passes through, and checking terminates; If can not pass through, enter step 13);
13), user's group at user place in Query Database, check whether the user's group that there is non-verifying authorization, if do not had, Authority Verification does not pass through, and checking terminates; If had, user is organized authority as authority to be verified, enter step 4).
The mining area personnel security management system adopting above technical scheme to build and method, can realize following beneficial effect:
1. face identification device and alcohol detecting device are set, whether mining area personnel security management system is assumed another's name to turnover personnel, whether safe wearing cap, whether tired, whether drinking too much four emphasis security factors detect, and avoid mining area staff's dangerous operation.
2. user right adopts the dual authority Audit Mechanism of based role and gate sentry, and role succession is authorized with individuality and combined, and gate sentry region combines with individuality, and working day combines with control holiday, can realize flexible, meticulous user right audit.
3. management end stores whole safety records, by software supervision interfaces such as open inquiry, Long-distance Control, can realize the monitor terminal of the various ways such as Based PC, Android, iOS, be beneficial to remote monitoring.
Mining area of the present invention personnel security management system can cover each gate sentry in mining area and other important areas, is cooperatively interacted by safety verification and Authority Verification, realizes, to the safety management of mining area personnel turnover, being beneficial to the safety in production in mining area.
Accompanying drawing explanation
Fig. 1 is a kind of embodiment structural drawing of mining area of the present invention personnel security management system;
Fig. 2 is a kind of embodiment process flow diagram of mining area of the present invention personal security management method;
Fig. 3 is a kind of embodiment process flow diagram of safe verification method in mining area personal security management method in Fig. 2;
Fig. 4 is a kind of embodiment process flow diagram of method for verifying authority in mining area personal security management method in Fig. 2;
Embodiment
Below in conjunction with accompanying drawing, the specific embodiment of the present invention is described, so that those skilled in the art understands the present invention better.Requiring particular attention is that, in the following description, when perhaps the detailed description of known function and design can desalinate main contents of the present invention, these are described in and will be left in the basket here.
Fig. 1 is a kind of embodiment structural drawing of mining area of the present invention personnel security management system.As shown in Figure 1, mining area personnel security management system comprises card reader, gate, face identification device, alcohol detecting device, data acquisition controller, embedded ethernet pass, database server, security server, management end.
Wherein, security server, database server, management end, embedded ethernet close interconnected by Ethernet.Hang a writer under management end, people's face portion image collecting device, face facial image acquisition device is connected in Ethernet.Data acquisition controller closes interconnected by CAN and embedded ethernet.Hang a card reader under each data acquisition controller, adopt RS232 to connect; A gate; A face identification device, is connected by Wiegand, and this face identification device is by being connected in Ethernet simultaneously, is convenient to receive the validated user face facial image information from the collection of management end; An alcohol detecting device, is connected by RS232.Only draw the lineup's face recognition device be connected with data acquisition controller 2 and alcohol detecting device in Fig. 1, other omit.In this embodiment, mining area personnel security management system is installed on gate sentry, and other need to carry out the place of safety inspection or Authority Verification also can be arranged on mining area in actual use.
Below each ingredient is described in detail:
Card reader, reads user right card information, sends user right card information to data acquisition controller.
Gate, receives data acquisition controller order, controls gate sentry gate inhibition.
Face identification device, gather user's face facial image information, the face facial image information stored with this locality carry out facial images match detection, safety helmet wear condition detects, fatigue detecting, and whether user's face image is mated, whether safe wearing cap, whether tired testing result sends data acquisition controller to.
Whether alcohol detecting device, presets overproof threshold value, gathers user's oral cavity alcohol content information, detect user's oral cavity alcohol content and exceed standard, and send the testing result whether alcohol content exceeds standard to data acquisition controller.
Data acquisition controller, gather the testing result that whether face identification device mates with the user's face image that alcohol detecting device is uploaded, whether whether safe wearing cap, whether tired testing result and user's oral cavity alcohol content exceed standard and form user security information, the user right card information together with card reader reading sends embedded ethernet pass to; Receive the safety verification result that embedded ethernet closes passback, control gate and open gate inhibition or warning.
Embedded ethernet closes, the user security information that reception data acquisition controller transmits and user right card information, and encodes, and then converts the data layout of applicable Ethernet transmission to, sends security server to; Receive the safety verification result of security server passback, and be transmitted to data acquisition controller.
Database server, is provided with database software, storage security information and authority information.
Security server, is provided with security management services software, mainly comprises secure verification module and Authority Verification module.Send data when embedded ethernet closes, security server is to decoding data.Secure verification module is verified user security information, mainly comprises whether turnover personnel drink, tired, safe wearing cap and whether to act as fraudulent substitute for a person etc. to verify.Authority Verification module extracts user right information according to the user right message code in user right card information from database, and verifies authority information.
Management end, is provided with and is integrated into user and provides work authority card function, database server database management function and the safety management management end software to mining area personal security condition monitoring Presentation Function.Management end is each mining area personnel assignment authority and by authority information write into Databasce server, and by writer by user right message code write user right card.Management end connects face facial image acquisition device, absorb validated user face facial image information in advance and this information transmission is stored to the local data base of face identification device, for carrying out the judgement of user's face information to the face identification device that is connected with data acquisition controller.Meanwhile, management end monitoring display mining area personnel pass in and out information during mining area, comprise whether drink, tired, safe wearing cap and whether acting as fraudulent substitute for a person and the information such as own authority of overstepping the authority.Management end also can arrange inquiry, RCI for system extension.
The present invention is by arranging face identification device and alcohol detecting device, whether mining area personnel security management system is assumed another's name to turnover personnel, whether safe wearing cap, whether tired, whether drinking too much four emphasis security factors detect, and avoid mining area staff's dangerous operation.Management end stores whole safety records, by software supervision interfaces such as open inquiry, Long-distance Control, can realize the monitor terminal of the various ways such as Based PC, Android, iOS, be beneficial to remote monitoring.
Fig. 2 is a kind of embodiment process flow diagram of mining area of the present invention personal security management method.As shown in Figure 2, personal security management method in mining area comprises the following steps:
S201: face identification device gathers user's face information, and detects as follows:
● search the face-image whether having coupling in local data base;
● face fatigue is carried out to the face-image gathered and identifies;
● whether carry out discriminance analysis to the face-image gathered has safe wearing cap.
Whether user's face image mates by face identification device, whether safe wearing cap, whether tired testing result sends data acquisition controller to.
S202: alcohol detecting device gathers user's oral cavity alcohol content, detects whether exceed reservation threshold, and sends oral cavity alcohol content detection result to data acquisition controller.
S203: user card punching, card reader reads user right card information, and sends data acquisition controller to.
S204: the testing result that whether the user's face image that face identification device and alcohol detecting device collect by data acquisition controller mates, whether whether safe wearing cap, tired testing result and user's oral cavity alcohol content exceed standard form user security information, and the authority card information uploaded together with card reader sends embedded ethernet pass to.
S205: embedded ethernet closes and converts the user security information of data acquisition controller transmission and authority card information to Ethernet data, and sends security server to.
S206: security server extracts the user security information and authority card information that receive, carries out user security inspection.
S207: security server carries out safety verification according to user security information, as safety verification does not pass through, then enters step S210; As safety verification passes through, then enter step S207.
S208: security server extracts user right information carry out Authority Verification according to the user right message code in authority card information from database, as Authority Verification does not pass through, then enters step S210; As Authority Verification passes through, then carry out step S209.
S209: security server sends and allows pass-through command, is closed by embedded ethernet and sends data acquisition controller to, controls gate and opens gate sentry gate inhibition, make user by gate sentry, enter step S211.
S210: security server sends no through traffic instruction, is closed by embedded ethernet and sends data acquisition controller to, forbid that gate opens gate sentry gate inhibition, forbid that user passes through and reports to the police, enter step S211.
S211: this information processing result is sent to management end and stores and display in real time by security server.This pass authentication terminates.
Mining area of the present invention personal security management method is cooperatively interacted by safety verification and Authority Verification, is detected by safety factor, avoids mining area personnel unsafe factor aborning, realizes the safety management to mining area personnel turnover.
Fig. 3 is a kind of embodiment process flow diagram of safe verification method in mining area personal security management method in Fig. 2.As shown in Figure 3, safe verification method comprises the following steps:
S301: security server extracts embedded ethernet and closes the user security information uploaded.
S302: check user's face images match result, if do not mated, then safety verification does not pass through, and checking terminates; If coupling, then enter S303.
S303: check human fatigue testing result, if human fatigue, then safety verification does not pass through, checking terminates; If there is not fatigue phenomenon, then enter S304.
S304: check user's safe wearing cap testing result, if non-safe wearing cap, then safety verification does not pass through, and checking terminates; If user has worn safety helmet, then enter S305.
S305: check user's oral cavity alcohol content, if alcohol content is defective, then safety verification does not pass through, and checking terminates; If alcohol content is qualified, safety verification passes through, and checking terminates.
Fig. 4 is a kind of embodiment process flow diagram of method for verifying authority in mining area personal security management method in Fig. 2.As shown in Figure 4, method for verifying authority comprises the following steps:
S401: security server obtains user right card information, analyzes the authority mark information in user right code.
S402: whether there is this user in Query Database, namely checks whether this user is validated user, and if there is no, then Authority Verification does not pass through, and checking terminates; If existed, enter S403.
S403: obtain individual subscriber authority as authority to be verified from database.
S405: check that user is in the authority to be verified when Qianmen district.
S406: check that whether user's authority to be verified is having control festivals or holidays information when Qianmen district, if do not had, enters step S411; If there is control festivals or holidays information, then enter step S407.
S407: check that user is in the local control festivals or holidays information when Qianmen district.
S408: check whether current date mates with user partial control festivals or holidays information, if coupling, enter step S417; If do not mated, then enter step S409.
S409: check the overall festivals or holidays control information of user in whole mining area.
S410: check whether current date mates with user's overall situation control festivals or holidays information, if coupling, enters step S417; If do not mated, then enter step S411.
S411: check that whether user's authority to be verified is having all control information when Qianmen district, if do not had, enters S416; If have all control information, then enter step S412;
S412: check that user is in the local week control information when Qianmen district.
S413: check whether current week number mates with user partial week control information, if coupling, enters step S417; If do not mated, enter step S414;
S414: check the overall situation week control information of user in whole mining area.
S415: check whether current week number mates with all control information of user's overall situation, if coupling, enters step S417; If do not mated, enter step S416;
S416: check that user is at the current permitted hours when Qianmen district, enters step S417.
S417: check that can user pass through in current slot, if can pass through, Authority Verification passes through, and checking terminates; If can not pass through, enter S418.
S418: inquiring user place user's group.
S419: check the user's group that whether there is non-verifying authorization in user's group at user place, if do not had, Authority Verification does not pass through, checking terminates; If had, enter step S420.
S420: user is organized authority as authority to be verified, enter step S405.
Because user may belong to multiple user's group, therefore, when individual subscriber authority cannot pass through Authority Verification, user is organized authority and carry out circulation checking, when there being a user to organize authority P Passable as authority to be verified, this user right is verified, and checking terminates; When the personal authority of user's group and user's group are only for all impassable, or user to organize personal authority impassable and do not belong to any user when organizing, the checking of this user right is not passed through, and checking terminates.
User right adopts the dual authority Audit Mechanism of based role and gate sentry, and role succession is authorized with individuality and combined, and gate sentry region combines with individuality, and working day combines with control holiday, can realize flexible, meticulous user right audit.
Embodiment
Mine management person is that user " Zhang San " distributes authority by management end: " Zhang San " is under the jurisdiction of " common group ", the personal authority information of " Zhang San " does not have gate sentry 2 right of access any time, but the user of " common group " can October 1,8:00-10:00 passed through in mining area in 2012 gate sentry 2.Personal information corresponding to this authority information stored in database server, by card reader, according to the authority mark issued rights card in database server, and is encoded and writes in authority card by management end by this authority.Management end utilizes the face facial image information of face identification device collection " Zhang San ", and is sent to the face identification device of gate sentry 2 by Ethernet." Zhang San " will pass through gate sentry 2 at 8:30 on October 1st, 2012, and now he does not drink, by regulation safe wearing cap, does not have weariness working." Zhang San " this time current process is as follows:
1) the face facial image information of the face identification device collection " Zhang San " of gate sentry 2, after testing, face-image is legal, worn safety helmet and do not had fatigue, and face identification device sends testing result to data acquisition controller.
2) the oral cavity alcohol content information of alcohol detecting device collection " Zhang San ", oral cavity alcohol content is in the qualified threshold value of alcohol content preset after testing, and alcohol detecting device sends testing result to data acquisition controller.
3) " Zhang San " swipes the card, the authority card information of card reader collection " Zhang San ", and sends data acquisition controller to.
4) data acquisition controller face-image is legal, wear by safety helmet, there is no fatigue, alcohol content detects the qualified user security information that forms and encodes together with authority card information and send embedded ethernet to and close.
5) embedded ethernet closes the data receiving data acquisition controller and transmitted by CAN, encodes and converts Ethernet data report to, being then sent to security server by Ethernet.
6) secure verification module of the security management services software in security server carries out safety verification to user, " Zhang San " facial images match, does not have fatigue, admires there is safety helmet and oral cavity alcohol content is qualified, is verified.
7) the Authority Verification module of the security management services software in security server carries out Authority Verification to user.Personal user's authority of " Zhang San " does not have gate sentry 2 right of access any time, therefore cannot pass through through Authority Verification.When Query Database known " Zhang San " belongs to " common group ", therefore use the authority of " common group " as authority to be verified.The user of " common group " can October 1,8:00-10:00 passed through in mining area in 2012 gate sentry 2, be now 8:30 on October 1st, 2012, October 1 was National Day, therefore can find that current date mates when checking local control information festivals or holidays, and can pass through in current slot, therefore Authority Verification passes through.
8), after safety verification and Authority Verification all pass through, this result to this time current judgement making " allowing current " of " Zhang San ", and is returned to data acquisition controller by embedded ethernet pass by security server.
9) data acquisition controller receives security server gives " allowing current " the result to " Zhang San ", controls gate and opens gate inhibition, let pass to " Zhang San ".
10) security server sends this information processing result to management end, result is preserved and is shown in real time by management end, keeper watches this " Zhang San " successfully current gate sentry 2 by management end, facial images match, there is no fatigue, admire there is safety helmet and oral cavity alcohol content is qualified, employing be the authority of " common group ".
Although be described the illustrative embodiment of the present invention above; so that those skilled in the art understand the present invention; but should be clear; the invention is not restricted to the scope of embodiment; to those skilled in the art; as long as various change to limit and in the spirit and scope of the present invention determined, these changes are apparent, and all innovation and creation utilizing the present invention to conceive are all at the row of protection in appended claim.

Claims (5)

1. a mining area personnel security management system, comprising:
Card reader, reads user right card information;
Gate, controls gate sentry gate inhibition;
It is characterized in that, also comprise:
Face identification device, gather user's face facial image information, the face facial image information stored with this locality carries out facial images match detection, safety helmet wear condition detects, fatigue detecting, and whether user's face image is mated, whether safe wearing cap, whether tired testing result sends data acquisition controller to;
Whether alcohol detecting device, presets overproof threshold value, gathers user's oral cavity alcohol content information, detect user's oral cavity alcohol content and exceed standard, and send the testing result whether alcohol content exceeds standard to data acquisition controller;
Data acquisition controller, gather the testing result that whether face identification device mates with the user's face image that alcohol detecting device is uploaded, whether whether safe wearing cap, whether tired testing result and user's oral cavity alcohol content exceed standard and form user security information, the user right card information together with card reader reading sends embedded ethernet pass to; Receive the safety verification result that embedded ethernet closes passback, control gate and open gate inhibition or warning;
Embedded ethernet closes, the user security information that reception data acquisition controller transmits and user right card information, and encodes, and then converts the data layout of applicable Ethernet transmission to, sends security server to; Receive the safety verification result of security server passback, and be transmitted to data acquisition controller;
Database server, storage security information and authority information;
Security server, receive user security information and the user right card information of embedded ethernet pass, user right information is extracted from database, safety verification and Authority Verification is carried out according to the security information of database purchase and authority information, whether allowed the safety verification result that user passes through, and return to embedded ethernet pass, be sent to management end simultaneously;
Management end, be connected with a writer, face facial image acquisition device respectively, the user security information of leading subscriber authority card information and database server and user right information: user right information is set and stored in database server, by user right message code by writer write user right card, gather validated user face facial image information by face face-image device and be sent to face identification device and store, the safety verification result simultaneously receiving security server is carried out storage and is shown in real time.
2. mining area according to claim 1 personnel security management system, is characterized in that, described management end is provided with inquiry, RCI.
3. a mining area personal security management method, is characterized in that, comprises the following steps:
(1), face identification device gathers user face facial image information, searches the face-image whether local data base has coupling, carries out face fatigue and identify, identified whether safe wearing cap, and testing result is sent to data acquisition controller;
(2), alcohol detecting device gathers user oral cavity alcohol content, detects whether exceed reservation threshold, and oral cavity alcohol testing result is sent to data acquisition controller;
(3), user card punching, card reader reads user right card information, and sends data acquisition controller to;
(4), whether the user's face image face identification device and alcohol detecting device uploaded of data acquisition controller mate, whether whether safe wearing cap, tired testing result and user's oral cavity alcohol content exceed standard testing result form user security information, and the authority information uploaded together with card reader sends embedded ethernet pass to;
(5), embedded ethernet closes and converts the user security information of data acquisition controller transmission and authority card information to Ethernet data, and sends security server to;
(6), security server extracts user security information and authority card information from the data received, user right information is extracted from database, safety verification and Authority Verification is carried out according to the security information of database purchase and authority information, if safety verification and Authority Verification all pass through, then enter step (7); If there is any one not pass through, then enter step (8);
(7), security server send allow pass-through command, by embedded ethernet close send data acquisition controller to, control gate open gate sentry gate inhibition, make user pass through gate sentry; Enter step (9);
(8), security server sends no through traffic instruction, closed and sends data acquisition controller to, forbid that gate opens gate sentry gate inhibition, forbid that user passes through and reports to the police, enter step (9) by embedded ethernet;
(9), this information processing result is sent to management end and stores also display in real time by security server; This pass authentication terminates.
4. mining area according to claim 3 personal security management method, it is characterized in that, described safety verification comprises the following steps:
1), security server extracts embedded ethernet and closes the user security information uploaded;
2), check user's face images match result, if do not mated, then safety verification does not pass through, and checking terminates; If coupling, then enter step 3);
3), check human fatigue testing result, if human fatigue, then safety verification does not pass through, and checking terminates; If there is not fatigue phenomenon, then enter step 4);
4), check user's safe wearing cap testing result, if non-safe wearing cap, then safety verification does not pass through, and checking terminates; If user has worn safety helmet, then enter step 5);
5), check user's oral cavity alcohol content detection result, if alcohol content is defective, then safety verification does not pass through, and checking terminates; If alcohol content is qualified, safety verification passes through, and checking terminates.
5. mining area according to claim 4 personal security management method, it is characterized in that, described Authority Verification comprises the following steps:
1), security server obtains user right card information, analysis authority mark information;
2), whether Query Database exist this user, and if there is no, Authority Verification does not pass through, and checking terminates; If existed, enter step 3);
3) from database, individual subscriber authority, is obtained as authority to be verified;
4), check that user is in the authority to be verified when Qianmen district;
5), check that whether user's authority to be verified is having control festivals or holidays information when Qianmen district, if do not had, enters step 8); If there is control festivals or holidays information, enter step 6);
6), check whether user can pass through when Qianmen district in current date festivals or holidays section, if can, enter step 12); If can not, enter step 7);
7), check whether user can pass through in whole mining area in current date festivals or holidays section, if can, enter step 12); If can not, enter step 8);
8), check that whether user's authority to be verified is having all control information when Qianmen district, if do not had, enters step 11); If have all control information, then enter step 9);
9), check whether user can pass through when Qianmen district within current week, if can, enter step 12); If can not, enter step 10);
10), check whether user can pass through in whole mining area within current week, if can, enter step 12); If can not, enter step 11);
11), check that user is at the current permitted hours when Qianmen district, enters step 12);
12), check that can user pass through in current slot, if can pass through, Authority Verification passes through, and checking terminates; If can not pass through, enter step 13);
13), user's group at user place in Query Database, check whether the user's group that there is non-verifying authorization, if do not had, Authority Verification does not pass through, and checking terminates; If had, user is organized authority as authority to be verified, enter step 4).
CN201210528918.4A 2012-12-10 2012-12-10 Personnel security management system and method in mining areas Expired - Fee Related CN103049949B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210528918.4A CN103049949B (en) 2012-12-10 2012-12-10 Personnel security management system and method in mining areas

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210528918.4A CN103049949B (en) 2012-12-10 2012-12-10 Personnel security management system and method in mining areas

Publications (2)

Publication Number Publication Date
CN103049949A CN103049949A (en) 2013-04-17
CN103049949B true CN103049949B (en) 2015-04-08

Family

ID=48062574

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210528918.4A Expired - Fee Related CN103049949B (en) 2012-12-10 2012-12-10 Personnel security management system and method in mining areas

Country Status (1)

Country Link
CN (1) CN103049949B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107680220A (en) * 2017-09-28 2018-02-09 朱明增 A kind of operation unlawful practice intelligent identification Method based on machine vision technique

Families Citing this family (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11017069B2 (en) * 2013-03-13 2021-05-25 Lookout, Inc. Method for changing mobile communications device functionality based upon receipt of a second code and the location of a key device
CN104110271A (en) * 2013-04-22 2014-10-22 开封市测控技术有限公司 Under-mine equipment monitoring alarm system based on face recognition technology
CN104021648A (en) * 2014-06-22 2014-09-03 朱明增 Intelligent monitoring and early warning system for safety helmet wearing on transformer substation site
CN104077581A (en) * 2014-07-21 2014-10-01 国家电网公司 Smart video identification method for wearing safety helmet rightly
CN104392582B (en) * 2014-11-17 2016-08-24 南通大学 The Ship Welding long-range monitor and alarm system of personnel based on multi-sensor information fusion
CN105672849A (en) * 2016-01-07 2016-06-15 江苏苏南万科物业服务有限公司 Intelligent door and control method thereof
CN105956549A (en) * 2016-04-28 2016-09-21 江苏大学 Worker pre-job safety equipment and behavior capability inspection system and method
WO2018014350A1 (en) * 2016-07-22 2018-01-25 深圳中兴力维技术有限公司 Equipment control method, terminal, and control device
CN106296949B (en) * 2016-09-13 2018-11-27 成都创慧科达科技有限公司 A kind of access control system and method based on H264 video decoding techniques
CN106454734A (en) * 2016-11-04 2017-02-22 成都希盟泰克科技发展有限公司 Method for detecting safety state of builder
RU2643898C1 (en) * 2016-11-18 2018-02-06 Трифон Юрьевич Шейкин Access management and control system by using mobile telecommunication device
CN107239773A (en) * 2017-06-30 2017-10-10 合肥贺财工程项目管理有限公司 A kind of engineering project place personal security supervisory systems
CN107977802A (en) * 2017-12-29 2018-05-01 天河智慧产业科技(北京)有限公司 A kind of wisdom site staff's management system with testimony of a witness comparing function
CN108288033B (en) * 2018-01-05 2019-09-24 电子科技大学 A kind of safety cap detection method based on random fern fusion multiple features
CN108734374A (en) * 2018-03-26 2018-11-02 中国神华能源股份有限公司 Information processing method, device, system, storage medium and processor
CN108391885A (en) * 2018-05-17 2018-08-14 姚俊安 A kind of device and method that detectable jockey goes on a journey safely
CN110503749A (en) * 2018-05-18 2019-11-26 黄暐皓 Door lock assembly
CN110570545A (en) * 2018-06-05 2019-12-13 宁波欧依安盾安全科技有限公司 entrance guard's IC-card intelligent management system
CN109003367B (en) * 2018-07-18 2021-10-08 上海小蚁科技有限公司 Access control method and device, storage medium and terminal
CN108881858B (en) * 2018-08-03 2020-06-23 四川亚东世纪科技有限公司 Method and device for monitoring external personnel on construction site and electronic equipment
CN109147204B (en) * 2018-08-16 2020-10-23 青海华职康健康科技有限公司 Automatic personal protective product issuing method and system
CN109116445A (en) * 2018-08-30 2019-01-01 Oppo广东移动通信有限公司 Weather prompting method, apparatus, storage medium and terminal
CN109110595A (en) * 2018-09-18 2019-01-01 中国建筑第八工程局有限公司 Power supply for construction ladder intelligent access control system and method
CN111259682B (en) * 2018-11-30 2023-12-29 百度在线网络技术(北京)有限公司 Method and device for monitoring safety of construction site
CN109920098A (en) * 2019-01-29 2019-06-21 迅捷安消防及救援科技(深圳)有限公司 Removable module wisdom fire-fighting Support Equipment on duty and Related product
CN111080875A (en) * 2019-11-01 2020-04-28 广州博湖安全科技有限公司 Multifunctional intelligent security entrance guard management system
CN113158713A (en) * 2020-10-22 2021-07-23 西安天和防务技术股份有限公司 Valley management system
CN114627504B (en) * 2022-03-17 2023-01-10 盐城笃诚建设有限公司 Building engineering labor personnel management system and management method

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4495496A (en) * 1981-12-15 1985-01-22 Johnson Engineering Corp. Personnel monitoring and locating system
DE3832375A1 (en) * 1988-09-23 1990-03-29 Ruhrkohle Ag Method and arrangement for detecting objects passing a call-up signal barrier in mine operations
CN201278161Y (en) * 2008-10-17 2009-07-22 王宏志 Gate inhibition control system based on second generation ID card
CN101521805A (en) * 2009-02-27 2009-09-02 镇江石鼓文智能化系统开发有限公司 Helmet-site detecting system on construction field and detecting method thereof
CN101739549A (en) * 2009-02-11 2010-06-16 北京智安邦科技有限公司 Face detection method and system
CN202093650U (en) * 2011-05-27 2011-12-28 北京中矿华沃电子科技有限公司 Security early warning system for open pit transportation
CN202134021U (en) * 2011-07-21 2012-02-01 北京九鼎安泰矿业科技有限责任公司 Safety inspection device for wellhead
CN102708606A (en) * 2012-03-26 2012-10-03 北京普惠恒丰科技有限公司 System for monitoring person entering and exiting presence area of prison by recognizing faces of person

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH01194096A (en) * 1988-01-29 1989-08-04 Fujita Corp Mine entry management device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4495496A (en) * 1981-12-15 1985-01-22 Johnson Engineering Corp. Personnel monitoring and locating system
DE3832375A1 (en) * 1988-09-23 1990-03-29 Ruhrkohle Ag Method and arrangement for detecting objects passing a call-up signal barrier in mine operations
CN201278161Y (en) * 2008-10-17 2009-07-22 王宏志 Gate inhibition control system based on second generation ID card
CN101739549A (en) * 2009-02-11 2010-06-16 北京智安邦科技有限公司 Face detection method and system
CN101521805A (en) * 2009-02-27 2009-09-02 镇江石鼓文智能化系统开发有限公司 Helmet-site detecting system on construction field and detecting method thereof
CN202093650U (en) * 2011-05-27 2011-12-28 北京中矿华沃电子科技有限公司 Security early warning system for open pit transportation
CN202134021U (en) * 2011-07-21 2012-02-01 北京九鼎安泰矿业科技有限责任公司 Safety inspection device for wellhead
CN102708606A (en) * 2012-03-26 2012-10-03 北京普惠恒丰科技有限公司 System for monitoring person entering and exiting presence area of prison by recognizing faces of person

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107680220A (en) * 2017-09-28 2018-02-09 朱明增 A kind of operation unlawful practice intelligent identification Method based on machine vision technique

Also Published As

Publication number Publication date
CN103049949A (en) 2013-04-17

Similar Documents

Publication Publication Date Title
CN103049949B (en) Personnel security management system and method in mining areas
CN205879007U (en) Intelligence pistol
CN109598661A (en) Intelligence community security system and detection method based on recognition of face
CN203720890U (en) Wearable polling terminal
CN102497531A (en) Human face recognition wireless video monitoring system based on cloud computing platform
CN205845137U (en) Intelligent gate
CN204256821U (en) A kind of high intelligent gate
CN102867350B (en) Prison AB door safety management method based on face recognition technology
CN104318732A (en) Transformer substation field worker monitoring and management system and method based on video analysis and RFID
CN104766393A (en) Intelligent access control system
CN208569727U (en) A kind of building site gate access control system
CN203054575U (en) Pollution source on-line monitoring system
CN104281836A (en) Biometric feature recognition system and method
CN101937586A (en) Access control system of residential community
CN110535895A (en) A kind of machine room monitoring system based on technology of Internet of things
CN109599782A (en) Intelligent substation management system based on Internet of Things and intelligent recognition
CN201927095U (en) Entrance guard system based on palm vein authentication
CN205827374U (en) Internet authentication trusted system and terminal
CN111404874A (en) Taxi suspect vehicle discrimination analysis system architecture
CN103258222A (en) Cell intelligent logistic management system
CN201955856U (en) Device for monitoring and recognizing personnel validity of important site
CN106097489A (en) A kind of intelligent vision big data gate access control system
CN202523129U (en) Face recognition door control system based on RFID (radio frequency identification)
CN201765619U (en) Stranger portrait early warning system based on portrait biometric identification technology
CN210052214U (en) Device for identifying personnel identity information in oil field operation area

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150408

Termination date: 20171210

CF01 Termination of patent right due to non-payment of annual fee