CN103049949B - Personnel security management system and method in mining areas - Google Patents
Personnel security management system and method in mining areas Download PDFInfo
- Publication number
- CN103049949B CN103049949B CN201210528918.4A CN201210528918A CN103049949B CN 103049949 B CN103049949 B CN 103049949B CN 201210528918 A CN201210528918 A CN 201210528918A CN 103049949 B CN103049949 B CN 103049949B
- Authority
- CN
- China
- Prior art keywords
- user
- information
- authority
- pass
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Alarm Systems (AREA)
Abstract
The invention discloses a personnel security management system and method in mining areas. According to special environments and conditions of the mining areas, security factors are detected. The system is internally provided with a face recognition device and alcohol detecting device, wherein the face recognition device is used for detecting whether face images are matched, whether security helmets are worn, and whether workers are fatigue; and the alcohol detecting device is used for detecting whether the alcohol content in oral cavities of the workers is qualified, thereby preventing dangerous operation of the workers in the mining areas; and multiple audit modes of holiday control, week control and time section control are adopted for user right verification. The personnel security management system of the mining areas can cover each gate entry and other important areas of the mining areas, improves the entry and working safety of the workers in the mining areas through security verification and right verification which are matched with each other, and is beneficial to safety production of the mining areas.
Description
Technical field
The invention belongs to mining area safety-security area, more specifically say, relate to a kind of mining area personnel security management system and method.
Background technology
China is in process of industrialization, huge to the demand amplification of mineral resources.The safety in production in mining area also becomes the important step of mining area daily management, and the safety management of mining area personnel is one of them importance.The many employings in early stage mining area are manually registered and to be monitored worker safety's property with patrolling, and along with development in science and technology, mining area is introduced access control system and carried out safety management to the discrepancy of mining area personnel.Existing access control system generally comprises server, management end, access card card sender, access control equipment, data acquisition equipment, mainly carries out Authority Verification when staff passes in and out mining area or gate sentry.
But, in the management of personal security in mining area, there are some distinctive problems: first, mining area personnel often with non-security state, as excessive drinking, the tired and state such as not wear a safety helmet enter mining area operation; Secondly, the personnel identity unauthorized person that causes not easy to identify in mining area is acted as fraudulent substitute for a person to enter mining area; In addition, mining area personnel overstep the authority that its own right carries out can only by some specific people, as the activity that managerial personnel carry out.But, the existing many employings of mining area safety management are manually registered, are simply swiped the card, even if adopt access control system also can only carry out general Authority Verification, major part adopts artificial mode to judge mining area personal security state, such management not only wasting manpower and material resources, and there is many potential safety hazards, produce to mining area and add many non-safety factors.
Summary of the invention
The object of the invention is to overcome the deficiencies in the prior art, a kind of mining area personnel security management system and method are provided, for the environment and condition that mining area is special, carry out safety factor detection, and in conjunction with multiple authority audit, improve mining area personnel turnover and the safety precaution of work, be beneficial to the safety in production in mining area.
For realizing above goal of the invention, mining area of the present invention personnel security management system by the following technical solutions:
Comprise:
Card reader, reads user right card information;
Gate, controls gate sentry gate inhibition;
Face identification device, gather user's face facial image information, the face facial image information stored with this locality carry out facial images match detection, safety helmet wear condition detects, fatigue detecting, and whether user's face image is mated, whether safe wearing cap, whether tired testing result sends data acquisition controller to;
Whether alcohol detecting device, presets overproof threshold value, gathers user's oral cavity alcohol content information, detect user's oral cavity alcohol content and exceed standard, and send the testing result whether alcohol content exceeds standard to data acquisition controller;
Data acquisition controller, gather the testing result that whether face identification device mates with the user's face that alcohol detecting device is uploaded, whether whether safe wearing cap, whether tired testing result and user's oral cavity alcohol content exceed standard and form user security information, the user right card information together with card reader reading sends embedded ethernet pass to; Receive the safety verification result that embedded ethernet closes passback, control gate and open gate inhibition or warning;
Embedded ethernet closes, the user security information that reception data acquisition controller transmits and user right card information, and encodes, and then converts the data layout of applicable Ethernet transmission to, sends security server to; Receive the safety verification result of security server passback, and be transmitted to data acquisition controller;
Database server, storage security information and authority information;
Security server, receive data user's security information and the user right card information of embedded ethernet pass, user right information is extracted from database, safety verification and Authority Verification is carried out according to the security information of database purchase and authority information, whether allowed the safety verification result that user passes through, and return to embedded ethernet pass, be sent to management end simultaneously;
Management end, be connected with a writer, face facial image acquisition device respectively, the security information of leading subscriber authority card information and database server and authority information: user right information is set and stored in database server, by user right message code by writer write user right card, gather validated user face facial image information by face face-image device and be sent to face identification device and store, the safety verification result simultaneously receiving security server is carried out storage and is shown in real time.
Further, management end is provided with inquiry, RCI.
Mining area personal security management method comprises the following steps:
(1), face identification device gathers user face facial image information, searches the face-image whether local data base has coupling, carries out face fatigue and identify, identified whether safe wearing cap, and testing result is sent to data acquisition controller;
(2), alcohol detecting device gathers user oral cavity alcohol content, detects whether exceed reservation threshold, and oral cavity alcohol testing result is sent to data acquisition controller;
(3), user card punching, card reader reads user right card information, and sends data acquisition controller to;
(4), whether the user's face image face identification device and alcohol detecting device uploaded of data acquisition controller mate, whether whether safe wearing cap, tired testing result and user's oral cavity alcohol content exceed standard testing result form user security information, and the authority information uploaded together with card reader sends embedded ethernet pass to;
(5), embedded ethernet closes and converts the user security information of data acquisition controller transmission and authority card information to Ethernet data, and sends security server to;
(6), security server extracts user security information and authority card information from the data received, user right information is extracted from database, safety verification and Authority Verification is carried out according to the security information of database purchase and authority information, if safety verification and Authority Verification all pass through, then enter step (7); If there is any one not pass through, then enter step (8);
(7), security server send allow pass-through command, by embedded ethernet close send data acquisition controller to, control gate open gate sentry gate inhibition, make user pass through gate sentry; Enter step (9);
(8), security server sends no through traffic instruction, closed and sends data acquisition controller to, forbid that gate opens gate sentry gate inhibition, forbid that user passes through and reports to the police, enter step (9) by embedded ethernet;
(9), this information processing result is sent to management end and stores also display in real time by security server; This pass authentication terminates.
Wherein, safety verification comprises the following steps:
1), security server extracts embedded ethernet and closes the user security information uploaded;
2), check user's face images match result, if do not mated, then safety verification does not pass through, and checking terminates; If coupling, then enter step 3);
3), check human fatigue testing result, if human fatigue, then safety verification does not pass through, and checking terminates; If there is not fatigue phenomenon, then enter step 4);
4), check user's safe wearing cap testing result, if non-safe wearing cap, then safety verification does not pass through, and checking terminates; If user has worn safety helmet, then enter step 5);
5), check user's oral cavity alcohol content detection result, if alcohol content is defective, then safety verification does not pass through, and checking terminates; If alcohol content is qualified, safety verification passes through, and checking terminates.
Wherein, Authority Verification comprises the following steps:
1), security server obtains user right card information, analysis authority mark information;
2), whether Query Database exist this user, and if there is no, Authority Verification does not pass through, and checking terminates; If existed, enter step 3);
3) from database, individual subscriber authority, is obtained as authority to be verified;
4), check that user is in the authority to be verified when Qianmen district;
5), check that whether user's authority to be verified is having control festivals or holidays information when Qianmen district, if do not had, enters step 8); If there is control festivals or holidays information, enter step 6);
6), check whether user can pass through when Qianmen district in current date festivals or holidays section, if can, enter step 12); If can not, enter step 7);
7), check whether user can pass through in whole mining area in current date festivals or holidays section, if can, enter step 12); If can not, enter step 8);
8), check that whether user's authority to be verified is having all control information when Qianmen district, if do not had, enters step 11); If have all control information, then enter step 9);
9), check whether user can pass through when Qianmen district within current week, if can, enter step 12); If can not, enter step 10);
10), check whether user can pass through in whole mining area within current week, if can, enter step 12); If can not, enter step 11);
11), check that user is at the current permitted hours when Qianmen district, enters step 12);
12), check that can user pass through in current slot, if can pass through, Authority Verification passes through, and checking terminates; If can not pass through, enter step 13);
13), user's group at user place in Query Database, check whether the user's group that there is non-verifying authorization, if do not had, Authority Verification does not pass through, and checking terminates; If had, user is organized authority as authority to be verified, enter step 4).
The mining area personnel security management system adopting above technical scheme to build and method, can realize following beneficial effect:
1. face identification device and alcohol detecting device are set, whether mining area personnel security management system is assumed another's name to turnover personnel, whether safe wearing cap, whether tired, whether drinking too much four emphasis security factors detect, and avoid mining area staff's dangerous operation.
2. user right adopts the dual authority Audit Mechanism of based role and gate sentry, and role succession is authorized with individuality and combined, and gate sentry region combines with individuality, and working day combines with control holiday, can realize flexible, meticulous user right audit.
3. management end stores whole safety records, by software supervision interfaces such as open inquiry, Long-distance Control, can realize the monitor terminal of the various ways such as Based PC, Android, iOS, be beneficial to remote monitoring.
Mining area of the present invention personnel security management system can cover each gate sentry in mining area and other important areas, is cooperatively interacted by safety verification and Authority Verification, realizes, to the safety management of mining area personnel turnover, being beneficial to the safety in production in mining area.
Accompanying drawing explanation
Fig. 1 is a kind of embodiment structural drawing of mining area of the present invention personnel security management system;
Fig. 2 is a kind of embodiment process flow diagram of mining area of the present invention personal security management method;
Fig. 3 is a kind of embodiment process flow diagram of safe verification method in mining area personal security management method in Fig. 2;
Fig. 4 is a kind of embodiment process flow diagram of method for verifying authority in mining area personal security management method in Fig. 2;
Embodiment
Below in conjunction with accompanying drawing, the specific embodiment of the present invention is described, so that those skilled in the art understands the present invention better.Requiring particular attention is that, in the following description, when perhaps the detailed description of known function and design can desalinate main contents of the present invention, these are described in and will be left in the basket here.
Fig. 1 is a kind of embodiment structural drawing of mining area of the present invention personnel security management system.As shown in Figure 1, mining area personnel security management system comprises card reader, gate, face identification device, alcohol detecting device, data acquisition controller, embedded ethernet pass, database server, security server, management end.
Wherein, security server, database server, management end, embedded ethernet close interconnected by Ethernet.Hang a writer under management end, people's face portion image collecting device, face facial image acquisition device is connected in Ethernet.Data acquisition controller closes interconnected by CAN and embedded ethernet.Hang a card reader under each data acquisition controller, adopt RS232 to connect; A gate; A face identification device, is connected by Wiegand, and this face identification device is by being connected in Ethernet simultaneously, is convenient to receive the validated user face facial image information from the collection of management end; An alcohol detecting device, is connected by RS232.Only draw the lineup's face recognition device be connected with data acquisition controller 2 and alcohol detecting device in Fig. 1, other omit.In this embodiment, mining area personnel security management system is installed on gate sentry, and other need to carry out the place of safety inspection or Authority Verification also can be arranged on mining area in actual use.
Below each ingredient is described in detail:
Card reader, reads user right card information, sends user right card information to data acquisition controller.
Gate, receives data acquisition controller order, controls gate sentry gate inhibition.
Face identification device, gather user's face facial image information, the face facial image information stored with this locality carry out facial images match detection, safety helmet wear condition detects, fatigue detecting, and whether user's face image is mated, whether safe wearing cap, whether tired testing result sends data acquisition controller to.
Whether alcohol detecting device, presets overproof threshold value, gathers user's oral cavity alcohol content information, detect user's oral cavity alcohol content and exceed standard, and send the testing result whether alcohol content exceeds standard to data acquisition controller.
Data acquisition controller, gather the testing result that whether face identification device mates with the user's face image that alcohol detecting device is uploaded, whether whether safe wearing cap, whether tired testing result and user's oral cavity alcohol content exceed standard and form user security information, the user right card information together with card reader reading sends embedded ethernet pass to; Receive the safety verification result that embedded ethernet closes passback, control gate and open gate inhibition or warning.
Embedded ethernet closes, the user security information that reception data acquisition controller transmits and user right card information, and encodes, and then converts the data layout of applicable Ethernet transmission to, sends security server to; Receive the safety verification result of security server passback, and be transmitted to data acquisition controller.
Database server, is provided with database software, storage security information and authority information.
Security server, is provided with security management services software, mainly comprises secure verification module and Authority Verification module.Send data when embedded ethernet closes, security server is to decoding data.Secure verification module is verified user security information, mainly comprises whether turnover personnel drink, tired, safe wearing cap and whether to act as fraudulent substitute for a person etc. to verify.Authority Verification module extracts user right information according to the user right message code in user right card information from database, and verifies authority information.
Management end, is provided with and is integrated into user and provides work authority card function, database server database management function and the safety management management end software to mining area personal security condition monitoring Presentation Function.Management end is each mining area personnel assignment authority and by authority information write into Databasce server, and by writer by user right message code write user right card.Management end connects face facial image acquisition device, absorb validated user face facial image information in advance and this information transmission is stored to the local data base of face identification device, for carrying out the judgement of user's face information to the face identification device that is connected with data acquisition controller.Meanwhile, management end monitoring display mining area personnel pass in and out information during mining area, comprise whether drink, tired, safe wearing cap and whether acting as fraudulent substitute for a person and the information such as own authority of overstepping the authority.Management end also can arrange inquiry, RCI for system extension.
The present invention is by arranging face identification device and alcohol detecting device, whether mining area personnel security management system is assumed another's name to turnover personnel, whether safe wearing cap, whether tired, whether drinking too much four emphasis security factors detect, and avoid mining area staff's dangerous operation.Management end stores whole safety records, by software supervision interfaces such as open inquiry, Long-distance Control, can realize the monitor terminal of the various ways such as Based PC, Android, iOS, be beneficial to remote monitoring.
Fig. 2 is a kind of embodiment process flow diagram of mining area of the present invention personal security management method.As shown in Figure 2, personal security management method in mining area comprises the following steps:
S201: face identification device gathers user's face information, and detects as follows:
● search the face-image whether having coupling in local data base;
● face fatigue is carried out to the face-image gathered and identifies;
● whether carry out discriminance analysis to the face-image gathered has safe wearing cap.
Whether user's face image mates by face identification device, whether safe wearing cap, whether tired testing result sends data acquisition controller to.
S202: alcohol detecting device gathers user's oral cavity alcohol content, detects whether exceed reservation threshold, and sends oral cavity alcohol content detection result to data acquisition controller.
S203: user card punching, card reader reads user right card information, and sends data acquisition controller to.
S204: the testing result that whether the user's face image that face identification device and alcohol detecting device collect by data acquisition controller mates, whether whether safe wearing cap, tired testing result and user's oral cavity alcohol content exceed standard form user security information, and the authority card information uploaded together with card reader sends embedded ethernet pass to.
S205: embedded ethernet closes and converts the user security information of data acquisition controller transmission and authority card information to Ethernet data, and sends security server to.
S206: security server extracts the user security information and authority card information that receive, carries out user security inspection.
S207: security server carries out safety verification according to user security information, as safety verification does not pass through, then enters step S210; As safety verification passes through, then enter step S207.
S208: security server extracts user right information carry out Authority Verification according to the user right message code in authority card information from database, as Authority Verification does not pass through, then enters step S210; As Authority Verification passes through, then carry out step S209.
S209: security server sends and allows pass-through command, is closed by embedded ethernet and sends data acquisition controller to, controls gate and opens gate sentry gate inhibition, make user by gate sentry, enter step S211.
S210: security server sends no through traffic instruction, is closed by embedded ethernet and sends data acquisition controller to, forbid that gate opens gate sentry gate inhibition, forbid that user passes through and reports to the police, enter step S211.
S211: this information processing result is sent to management end and stores and display in real time by security server.This pass authentication terminates.
Mining area of the present invention personal security management method is cooperatively interacted by safety verification and Authority Verification, is detected by safety factor, avoids mining area personnel unsafe factor aborning, realizes the safety management to mining area personnel turnover.
Fig. 3 is a kind of embodiment process flow diagram of safe verification method in mining area personal security management method in Fig. 2.As shown in Figure 3, safe verification method comprises the following steps:
S301: security server extracts embedded ethernet and closes the user security information uploaded.
S302: check user's face images match result, if do not mated, then safety verification does not pass through, and checking terminates; If coupling, then enter S303.
S303: check human fatigue testing result, if human fatigue, then safety verification does not pass through, checking terminates; If there is not fatigue phenomenon, then enter S304.
S304: check user's safe wearing cap testing result, if non-safe wearing cap, then safety verification does not pass through, and checking terminates; If user has worn safety helmet, then enter S305.
S305: check user's oral cavity alcohol content, if alcohol content is defective, then safety verification does not pass through, and checking terminates; If alcohol content is qualified, safety verification passes through, and checking terminates.
Fig. 4 is a kind of embodiment process flow diagram of method for verifying authority in mining area personal security management method in Fig. 2.As shown in Figure 4, method for verifying authority comprises the following steps:
S401: security server obtains user right card information, analyzes the authority mark information in user right code.
S402: whether there is this user in Query Database, namely checks whether this user is validated user, and if there is no, then Authority Verification does not pass through, and checking terminates; If existed, enter S403.
S403: obtain individual subscriber authority as authority to be verified from database.
S405: check that user is in the authority to be verified when Qianmen district.
S406: check that whether user's authority to be verified is having control festivals or holidays information when Qianmen district, if do not had, enters step S411; If there is control festivals or holidays information, then enter step S407.
S407: check that user is in the local control festivals or holidays information when Qianmen district.
S408: check whether current date mates with user partial control festivals or holidays information, if coupling, enter step S417; If do not mated, then enter step S409.
S409: check the overall festivals or holidays control information of user in whole mining area.
S410: check whether current date mates with user's overall situation control festivals or holidays information, if coupling, enters step S417; If do not mated, then enter step S411.
S411: check that whether user's authority to be verified is having all control information when Qianmen district, if do not had, enters S416; If have all control information, then enter step S412;
S412: check that user is in the local week control information when Qianmen district.
S413: check whether current week number mates with user partial week control information, if coupling, enters step S417; If do not mated, enter step S414;
S414: check the overall situation week control information of user in whole mining area.
S415: check whether current week number mates with all control information of user's overall situation, if coupling, enters step S417; If do not mated, enter step S416;
S416: check that user is at the current permitted hours when Qianmen district, enters step S417.
S417: check that can user pass through in current slot, if can pass through, Authority Verification passes through, and checking terminates; If can not pass through, enter S418.
S418: inquiring user place user's group.
S419: check the user's group that whether there is non-verifying authorization in user's group at user place, if do not had, Authority Verification does not pass through, checking terminates; If had, enter step S420.
S420: user is organized authority as authority to be verified, enter step S405.
Because user may belong to multiple user's group, therefore, when individual subscriber authority cannot pass through Authority Verification, user is organized authority and carry out circulation checking, when there being a user to organize authority P Passable as authority to be verified, this user right is verified, and checking terminates; When the personal authority of user's group and user's group are only for all impassable, or user to organize personal authority impassable and do not belong to any user when organizing, the checking of this user right is not passed through, and checking terminates.
User right adopts the dual authority Audit Mechanism of based role and gate sentry, and role succession is authorized with individuality and combined, and gate sentry region combines with individuality, and working day combines with control holiday, can realize flexible, meticulous user right audit.
Embodiment
Mine management person is that user " Zhang San " distributes authority by management end: " Zhang San " is under the jurisdiction of " common group ", the personal authority information of " Zhang San " does not have gate sentry 2 right of access any time, but the user of " common group " can October 1,8:00-10:00 passed through in mining area in 2012 gate sentry 2.Personal information corresponding to this authority information stored in database server, by card reader, according to the authority mark issued rights card in database server, and is encoded and writes in authority card by management end by this authority.Management end utilizes the face facial image information of face identification device collection " Zhang San ", and is sent to the face identification device of gate sentry 2 by Ethernet." Zhang San " will pass through gate sentry 2 at 8:30 on October 1st, 2012, and now he does not drink, by regulation safe wearing cap, does not have weariness working." Zhang San " this time current process is as follows:
1) the face facial image information of the face identification device collection " Zhang San " of gate sentry 2, after testing, face-image is legal, worn safety helmet and do not had fatigue, and face identification device sends testing result to data acquisition controller.
2) the oral cavity alcohol content information of alcohol detecting device collection " Zhang San ", oral cavity alcohol content is in the qualified threshold value of alcohol content preset after testing, and alcohol detecting device sends testing result to data acquisition controller.
3) " Zhang San " swipes the card, the authority card information of card reader collection " Zhang San ", and sends data acquisition controller to.
4) data acquisition controller face-image is legal, wear by safety helmet, there is no fatigue, alcohol content detects the qualified user security information that forms and encodes together with authority card information and send embedded ethernet to and close.
5) embedded ethernet closes the data receiving data acquisition controller and transmitted by CAN, encodes and converts Ethernet data report to, being then sent to security server by Ethernet.
6) secure verification module of the security management services software in security server carries out safety verification to user, " Zhang San " facial images match, does not have fatigue, admires there is safety helmet and oral cavity alcohol content is qualified, is verified.
7) the Authority Verification module of the security management services software in security server carries out Authority Verification to user.Personal user's authority of " Zhang San " does not have gate sentry 2 right of access any time, therefore cannot pass through through Authority Verification.When Query Database known " Zhang San " belongs to " common group ", therefore use the authority of " common group " as authority to be verified.The user of " common group " can October 1,8:00-10:00 passed through in mining area in 2012 gate sentry 2, be now 8:30 on October 1st, 2012, October 1 was National Day, therefore can find that current date mates when checking local control information festivals or holidays, and can pass through in current slot, therefore Authority Verification passes through.
8), after safety verification and Authority Verification all pass through, this result to this time current judgement making " allowing current " of " Zhang San ", and is returned to data acquisition controller by embedded ethernet pass by security server.
9) data acquisition controller receives security server gives " allowing current " the result to " Zhang San ", controls gate and opens gate inhibition, let pass to " Zhang San ".
10) security server sends this information processing result to management end, result is preserved and is shown in real time by management end, keeper watches this " Zhang San " successfully current gate sentry 2 by management end, facial images match, there is no fatigue, admire there is safety helmet and oral cavity alcohol content is qualified, employing be the authority of " common group ".
Although be described the illustrative embodiment of the present invention above; so that those skilled in the art understand the present invention; but should be clear; the invention is not restricted to the scope of embodiment; to those skilled in the art; as long as various change to limit and in the spirit and scope of the present invention determined, these changes are apparent, and all innovation and creation utilizing the present invention to conceive are all at the row of protection in appended claim.
Claims (5)
1. a mining area personnel security management system, comprising:
Card reader, reads user right card information;
Gate, controls gate sentry gate inhibition;
It is characterized in that, also comprise:
Face identification device, gather user's face facial image information, the face facial image information stored with this locality carries out facial images match detection, safety helmet wear condition detects, fatigue detecting, and whether user's face image is mated, whether safe wearing cap, whether tired testing result sends data acquisition controller to;
Whether alcohol detecting device, presets overproof threshold value, gathers user's oral cavity alcohol content information, detect user's oral cavity alcohol content and exceed standard, and send the testing result whether alcohol content exceeds standard to data acquisition controller;
Data acquisition controller, gather the testing result that whether face identification device mates with the user's face image that alcohol detecting device is uploaded, whether whether safe wearing cap, whether tired testing result and user's oral cavity alcohol content exceed standard and form user security information, the user right card information together with card reader reading sends embedded ethernet pass to; Receive the safety verification result that embedded ethernet closes passback, control gate and open gate inhibition or warning;
Embedded ethernet closes, the user security information that reception data acquisition controller transmits and user right card information, and encodes, and then converts the data layout of applicable Ethernet transmission to, sends security server to; Receive the safety verification result of security server passback, and be transmitted to data acquisition controller;
Database server, storage security information and authority information;
Security server, receive user security information and the user right card information of embedded ethernet pass, user right information is extracted from database, safety verification and Authority Verification is carried out according to the security information of database purchase and authority information, whether allowed the safety verification result that user passes through, and return to embedded ethernet pass, be sent to management end simultaneously;
Management end, be connected with a writer, face facial image acquisition device respectively, the user security information of leading subscriber authority card information and database server and user right information: user right information is set and stored in database server, by user right message code by writer write user right card, gather validated user face facial image information by face face-image device and be sent to face identification device and store, the safety verification result simultaneously receiving security server is carried out storage and is shown in real time.
2. mining area according to claim 1 personnel security management system, is characterized in that, described management end is provided with inquiry, RCI.
3. a mining area personal security management method, is characterized in that, comprises the following steps:
(1), face identification device gathers user face facial image information, searches the face-image whether local data base has coupling, carries out face fatigue and identify, identified whether safe wearing cap, and testing result is sent to data acquisition controller;
(2), alcohol detecting device gathers user oral cavity alcohol content, detects whether exceed reservation threshold, and oral cavity alcohol testing result is sent to data acquisition controller;
(3), user card punching, card reader reads user right card information, and sends data acquisition controller to;
(4), whether the user's face image face identification device and alcohol detecting device uploaded of data acquisition controller mate, whether whether safe wearing cap, tired testing result and user's oral cavity alcohol content exceed standard testing result form user security information, and the authority information uploaded together with card reader sends embedded ethernet pass to;
(5), embedded ethernet closes and converts the user security information of data acquisition controller transmission and authority card information to Ethernet data, and sends security server to;
(6), security server extracts user security information and authority card information from the data received, user right information is extracted from database, safety verification and Authority Verification is carried out according to the security information of database purchase and authority information, if safety verification and Authority Verification all pass through, then enter step (7); If there is any one not pass through, then enter step (8);
(7), security server send allow pass-through command, by embedded ethernet close send data acquisition controller to, control gate open gate sentry gate inhibition, make user pass through gate sentry; Enter step (9);
(8), security server sends no through traffic instruction, closed and sends data acquisition controller to, forbid that gate opens gate sentry gate inhibition, forbid that user passes through and reports to the police, enter step (9) by embedded ethernet;
(9), this information processing result is sent to management end and stores also display in real time by security server; This pass authentication terminates.
4. mining area according to claim 3 personal security management method, it is characterized in that, described safety verification comprises the following steps:
1), security server extracts embedded ethernet and closes the user security information uploaded;
2), check user's face images match result, if do not mated, then safety verification does not pass through, and checking terminates; If coupling, then enter step 3);
3), check human fatigue testing result, if human fatigue, then safety verification does not pass through, and checking terminates; If there is not fatigue phenomenon, then enter step 4);
4), check user's safe wearing cap testing result, if non-safe wearing cap, then safety verification does not pass through, and checking terminates; If user has worn safety helmet, then enter step 5);
5), check user's oral cavity alcohol content detection result, if alcohol content is defective, then safety verification does not pass through, and checking terminates; If alcohol content is qualified, safety verification passes through, and checking terminates.
5. mining area according to claim 4 personal security management method, it is characterized in that, described Authority Verification comprises the following steps:
1), security server obtains user right card information, analysis authority mark information;
2), whether Query Database exist this user, and if there is no, Authority Verification does not pass through, and checking terminates; If existed, enter step 3);
3) from database, individual subscriber authority, is obtained as authority to be verified;
4), check that user is in the authority to be verified when Qianmen district;
5), check that whether user's authority to be verified is having control festivals or holidays information when Qianmen district, if do not had, enters step 8); If there is control festivals or holidays information, enter step 6);
6), check whether user can pass through when Qianmen district in current date festivals or holidays section, if can, enter step 12); If can not, enter step 7);
7), check whether user can pass through in whole mining area in current date festivals or holidays section, if can, enter step 12); If can not, enter step 8);
8), check that whether user's authority to be verified is having all control information when Qianmen district, if do not had, enters step 11); If have all control information, then enter step 9);
9), check whether user can pass through when Qianmen district within current week, if can, enter step 12); If can not, enter step 10);
10), check whether user can pass through in whole mining area within current week, if can, enter step 12); If can not, enter step 11);
11), check that user is at the current permitted hours when Qianmen district, enters step 12);
12), check that can user pass through in current slot, if can pass through, Authority Verification passes through, and checking terminates; If can not pass through, enter step 13);
13), user's group at user place in Query Database, check whether the user's group that there is non-verifying authorization, if do not had, Authority Verification does not pass through, and checking terminates; If had, user is organized authority as authority to be verified, enter step 4).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210528918.4A CN103049949B (en) | 2012-12-10 | 2012-12-10 | Personnel security management system and method in mining areas |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210528918.4A CN103049949B (en) | 2012-12-10 | 2012-12-10 | Personnel security management system and method in mining areas |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103049949A CN103049949A (en) | 2013-04-17 |
CN103049949B true CN103049949B (en) | 2015-04-08 |
Family
ID=48062574
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210528918.4A Expired - Fee Related CN103049949B (en) | 2012-12-10 | 2012-12-10 | Personnel security management system and method in mining areas |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103049949B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107680220A (en) * | 2017-09-28 | 2018-02-09 | 朱明增 | A kind of operation unlawful practice intelligent identification Method based on machine vision technique |
Families Citing this family (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11017069B2 (en) * | 2013-03-13 | 2021-05-25 | Lookout, Inc. | Method for changing mobile communications device functionality based upon receipt of a second code and the location of a key device |
CN104110271A (en) * | 2013-04-22 | 2014-10-22 | 开封市测控技术有限公司 | Under-mine equipment monitoring alarm system based on face recognition technology |
CN104021648A (en) * | 2014-06-22 | 2014-09-03 | 朱明增 | Intelligent monitoring and early warning system for safety helmet wearing on transformer substation site |
CN104077581A (en) * | 2014-07-21 | 2014-10-01 | 国家电网公司 | Smart video identification method for wearing safety helmet rightly |
CN104392582B (en) * | 2014-11-17 | 2016-08-24 | 南通大学 | The Ship Welding long-range monitor and alarm system of personnel based on multi-sensor information fusion |
CN105672849A (en) * | 2016-01-07 | 2016-06-15 | 江苏苏南万科物业服务有限公司 | Intelligent door and control method thereof |
CN105956549A (en) * | 2016-04-28 | 2016-09-21 | 江苏大学 | Worker pre-job safety equipment and behavior capability inspection system and method |
WO2018014350A1 (en) * | 2016-07-22 | 2018-01-25 | 深圳中兴力维技术有限公司 | Equipment control method, terminal, and control device |
CN106296949B (en) * | 2016-09-13 | 2018-11-27 | 成都创慧科达科技有限公司 | A kind of access control system and method based on H264 video decoding techniques |
CN106454734A (en) * | 2016-11-04 | 2017-02-22 | 成都希盟泰克科技发展有限公司 | Method for detecting safety state of builder |
RU2643898C1 (en) * | 2016-11-18 | 2018-02-06 | Трифон Юрьевич Шейкин | Access management and control system by using mobile telecommunication device |
CN107239773A (en) * | 2017-06-30 | 2017-10-10 | 合肥贺财工程项目管理有限公司 | A kind of engineering project place personal security supervisory systems |
CN107977802A (en) * | 2017-12-29 | 2018-05-01 | 天河智慧产业科技(北京)有限公司 | A kind of wisdom site staff's management system with testimony of a witness comparing function |
CN108288033B (en) * | 2018-01-05 | 2019-09-24 | 电子科技大学 | A kind of safety cap detection method based on random fern fusion multiple features |
CN108734374A (en) * | 2018-03-26 | 2018-11-02 | 中国神华能源股份有限公司 | Information processing method, device, system, storage medium and processor |
CN108391885A (en) * | 2018-05-17 | 2018-08-14 | 姚俊安 | A kind of device and method that detectable jockey goes on a journey safely |
CN110503749A (en) * | 2018-05-18 | 2019-11-26 | 黄暐皓 | Door lock assembly |
CN110570545A (en) * | 2018-06-05 | 2019-12-13 | 宁波欧依安盾安全科技有限公司 | entrance guard's IC-card intelligent management system |
CN109003367B (en) * | 2018-07-18 | 2021-10-08 | 上海小蚁科技有限公司 | Access control method and device, storage medium and terminal |
CN108881858B (en) * | 2018-08-03 | 2020-06-23 | 四川亚东世纪科技有限公司 | Method and device for monitoring external personnel on construction site and electronic equipment |
CN109147204B (en) * | 2018-08-16 | 2020-10-23 | 青海华职康健康科技有限公司 | Automatic personal protective product issuing method and system |
CN109116445A (en) * | 2018-08-30 | 2019-01-01 | Oppo广东移动通信有限公司 | Weather prompting method, apparatus, storage medium and terminal |
CN109110595A (en) * | 2018-09-18 | 2019-01-01 | 中国建筑第八工程局有限公司 | Power supply for construction ladder intelligent access control system and method |
CN111259682B (en) * | 2018-11-30 | 2023-12-29 | 百度在线网络技术(北京)有限公司 | Method and device for monitoring safety of construction site |
CN109920098A (en) * | 2019-01-29 | 2019-06-21 | 迅捷安消防及救援科技(深圳)有限公司 | Removable module wisdom fire-fighting Support Equipment on duty and Related product |
CN111080875A (en) * | 2019-11-01 | 2020-04-28 | 广州博湖安全科技有限公司 | Multifunctional intelligent security entrance guard management system |
CN113158713A (en) * | 2020-10-22 | 2021-07-23 | 西安天和防务技术股份有限公司 | Valley management system |
CN114157664B (en) * | 2021-12-07 | 2024-05-24 | 广联达科技股份有限公司 | Work card terminal and information processing method thereof and information processing method based on cloud platform |
CN114627504B (en) * | 2022-03-17 | 2023-01-10 | 盐城笃诚建设有限公司 | Building engineering labor personnel management system and management method |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4495496A (en) * | 1981-12-15 | 1985-01-22 | Johnson Engineering Corp. | Personnel monitoring and locating system |
DE3832375A1 (en) * | 1988-09-23 | 1990-03-29 | Ruhrkohle Ag | Method and arrangement for detecting objects passing a call-up signal barrier in mine operations |
CN201278161Y (en) * | 2008-10-17 | 2009-07-22 | 王宏志 | Gate inhibition control system based on second generation ID card |
CN101521805A (en) * | 2009-02-27 | 2009-09-02 | 镇江石鼓文智能化系统开发有限公司 | Helmet-site detecting system on construction field and detecting method thereof |
CN101739549A (en) * | 2009-02-11 | 2010-06-16 | 北京智安邦科技有限公司 | Face detection method and system |
CN202093650U (en) * | 2011-05-27 | 2011-12-28 | 北京中矿华沃电子科技有限公司 | Security early warning system for open pit transportation |
CN202134021U (en) * | 2011-07-21 | 2012-02-01 | 北京九鼎安泰矿业科技有限责任公司 | Safety inspection device for wellhead |
CN102708606A (en) * | 2012-03-26 | 2012-10-03 | 北京普惠恒丰科技有限公司 | System for monitoring person entering and exiting presence area of prison by recognizing faces of person |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH01194096A (en) * | 1988-01-29 | 1989-08-04 | Fujita Corp | Mine entry management device |
-
2012
- 2012-12-10 CN CN201210528918.4A patent/CN103049949B/en not_active Expired - Fee Related
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4495496A (en) * | 1981-12-15 | 1985-01-22 | Johnson Engineering Corp. | Personnel monitoring and locating system |
DE3832375A1 (en) * | 1988-09-23 | 1990-03-29 | Ruhrkohle Ag | Method and arrangement for detecting objects passing a call-up signal barrier in mine operations |
CN201278161Y (en) * | 2008-10-17 | 2009-07-22 | 王宏志 | Gate inhibition control system based on second generation ID card |
CN101739549A (en) * | 2009-02-11 | 2010-06-16 | 北京智安邦科技有限公司 | Face detection method and system |
CN101521805A (en) * | 2009-02-27 | 2009-09-02 | 镇江石鼓文智能化系统开发有限公司 | Helmet-site detecting system on construction field and detecting method thereof |
CN202093650U (en) * | 2011-05-27 | 2011-12-28 | 北京中矿华沃电子科技有限公司 | Security early warning system for open pit transportation |
CN202134021U (en) * | 2011-07-21 | 2012-02-01 | 北京九鼎安泰矿业科技有限责任公司 | Safety inspection device for wellhead |
CN102708606A (en) * | 2012-03-26 | 2012-10-03 | 北京普惠恒丰科技有限公司 | System for monitoring person entering and exiting presence area of prison by recognizing faces of person |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107680220A (en) * | 2017-09-28 | 2018-02-09 | 朱明增 | A kind of operation unlawful practice intelligent identification Method based on machine vision technique |
Also Published As
Publication number | Publication date |
---|---|
CN103049949A (en) | 2013-04-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103049949B (en) | Personnel security management system and method in mining areas | |
CN205879007U (en) | Intelligence pistol | |
CN109598661A (en) | Intelligence community security system and detection method based on recognition of face | |
CN102497531A (en) | Human face recognition wireless video monitoring system based on cloud computing platform | |
CN203720890U (en) | Wearable polling terminal | |
CN205845137U (en) | Intelligent gate | |
CN204256821U (en) | A kind of high intelligent gate | |
CN205788364U (en) | A kind of Smart Home security alarm gate control system | |
CN208569727U (en) | A kind of building site gate access control system | |
CN104766393A (en) | Intelligent access control system | |
CN105550924A (en) | Security management system for rented house | |
CN102760318A (en) | Identity authentication device and authentication method for staffs entering mine well | |
CN203054575U (en) | Pollution source on-line monitoring system | |
CN104281836A (en) | Biometric feature recognition system and method | |
CN101937586A (en) | Access control system of residential community | |
CN111404874A (en) | Taxi suspect vehicle discrimination analysis system architecture | |
CN201927095U (en) | Entrance guard system based on palm vein authentication | |
CN202523129U (en) | Face recognition door control system based on RFID (radio frequency identification) | |
CN109599782A (en) | Intelligent substation management system based on Internet of Things and intelligent recognition | |
CN201955856U (en) | Device for monitoring and recognizing personnel validity of important site | |
CN102063604A (en) | Monitoring and identification device for validity of personnel in important place | |
CN210052214U (en) | Device for identifying personnel identity information in oil field operation area | |
CN205405554U (en) | Personnel management device that combines RFID location and personnel feature recognition technique | |
CN106097489A (en) | A kind of intelligent vision big data gate access control system | |
CN109854302A (en) | A kind of colliery downhole personnel management system and control method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20150408 Termination date: 20171210 |
|
CF01 | Termination of patent right due to non-payment of annual fee |