CN202472770U - Visitor monitoring system - Google Patents

Visitor monitoring system Download PDF

Info

Publication number
CN202472770U
CN202472770U CN2011204514415U CN201120451441U CN202472770U CN 202472770 U CN202472770 U CN 202472770U CN 2011204514415 U CN2011204514415 U CN 2011204514415U CN 201120451441 U CN201120451441 U CN 201120451441U CN 202472770 U CN202472770 U CN 202472770U
Authority
CN
China
Prior art keywords
visitor
supervisory
information
security
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2011204514415U
Other languages
Chinese (zh)
Inventor
徐军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI WELLSTONEWAY WEAK CURRENT EQUIPMENT SERVICE CENTRAL CO Ltd
Original Assignee
SHANGHAI WELLSTONEWAY WEAK CURRENT EQUIPMENT SERVICE CENTRAL CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI WELLSTONEWAY WEAK CURRENT EQUIPMENT SERVICE CENTRAL CO Ltd filed Critical SHANGHAI WELLSTONEWAY WEAK CURRENT EQUIPMENT SERVICE CENTRAL CO Ltd
Priority to CN2011204514415U priority Critical patent/CN202472770U/en
Application granted granted Critical
Publication of CN202472770U publication Critical patent/CN202472770U/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Abstract

The utility model relates to the field of security monitoring, in particular to a visitor monitoring system. The visitor monitoring system has the advantages that entering and exiting management of visitors are enhanced by information-based means, the safeguarding level places such as enterprises, public institutions and schools can be improved, and the system is an important security measure under the situation of increasingly severe security environments in the current society.

Description

A kind of visitor's supervisory system
Technical field
The utility model relates to protection and monitor field, relates in particular to a kind of visitor's supervisory system.
Background technology
Pernicious campus safety case to primary school, the student of kindergarten has taken place in domestic indivedual places in the recent period; In the time of a short wheat harvesting period; Even supervention is given birth to five campus cutting incidents, cause the tens place children to die and tens children injured, cause very big influence to social safety.Post-survey shows that in current middle and primary schools and campus, kindergarten, lacking effective safety monitoring is the major reason that this type of malignant event takes place.And the safety-protection system of some enterprises and institutions is barely satisfactory especially, and the external personnel phenomenon of at will coming in and going out is general, brings very serious potential safety hazard for the safety of enterprises and institutions.
But; Safety defense monitoring system in the market much all is to monitor through camera, and imaging is comparatively fuzzy when light is bad; Can not confirm visitor's identity and whether leave normally; If occur can not in time finding assailant's information after the incident of endangering safety, and its operating system is generally all comparatively complicated, all brings some inconvenience for security protection and turnover personnel.
The utility model content
The utility model discloses a kind of visitor's supervisory system, wherein, comprising:
One database, and the authentication typing module that is connected with this database communication respectively and the affirmation module of going out;
Wherein, this database comprises memory storage, and is equipped with information input operating device and display device outward.
Above-mentioned visitor's supervisory system wherein, also comprises the print module and the data center that are connected with database communication.
Above-mentioned visitor's supervisory system, wherein, said authentication typing module includes identity card reader, Certificate scanner and filming apparatus.
Above-mentioned visitor's supervisory system, wherein, said database is communicated by letter with data center through network and is connected, and realizes data sharing.
Above-mentioned visitor's supervisory system, wherein, said going out confirms that module includes scanner.
In sum; Owing to adopted technique scheme; The utility model proposes a kind of visitor's supervisory system; Having strengthened the turnover management to the visitor through information-based means, helped to improve local security protection level such as enterprises and institutions and school, is the important security measure under the increasingly serious situation of current social security context.
Description of drawings
Fig. 1 is the structural representation of the utility model visitor supervisory system;
Fig. 2 is the operation interface figure of the utility model visitor supervisory system.
Embodiment
Be further described below in conjunction with the embodiment of accompanying drawing the utility model:
Fig. 1 is the structural representation of the utility model visitor supervisory system.As shown in Figure 1, a kind of visitor's supervisory system of the utility model comprises database 1, and communicates with authentication typing module 2, print module 3, the data center 4 of connection and go out affirmation module 5.Wherein, database 1 includes memory storage 11, and is equipped with information input operating device 6 and display device 7 outward; And pass through network and realize that with data center 4 communication is connected; Realizing that through multisystem networking data in real time shares, and with the information back-up in the database 1 in data center 4, thereby guarantee information is not lost, is not revealed; Can also carry out online statistics, derive functions such as form.
When the visitor visits,, be generally mouse, keyboard or touch screen displays etc. and operate, and show through display device 7 (being generally LCD) through information input operating device 6; At first, carry out visitor's information record through the identity card reader 21 in the authentication typing module 2, Certificate scanner 22 or filming apparatus 23; Because identity card reader 21 adopts through Ministry of Public Security's licensed-type production and through Ministry of Public Security's safety and the alert identity card reader that is up to the standards with the qualified center of electronics product quality inspection; Can identity verification the true and false of card; And can the personal information on visitor's I.D. be stored to memory storage 11 like name, sex and home address etc.; If the visitor can not scanned through other certificates that 22 couples of visitors of Certificate scanner carry and its personal information of typing and being stored in the memory storage 11 with I.D. yet; If carrying any certificate, the visitor then can not carry out visitor's information record through filming apparatus 23; Because the high-pixel camera head that filming apparatus 23 adopts can be recorded in visitor's portrait in the memory storage 11 clearly; Other information such as visitor's name, belongings then can manually input in the memory storage 11 through information input operating device 6; And it is single to print the visitor through print module 3; And print module 3 adopts is high-speed printer (HSP), thereby guarantees that convenient to print the visitor timely single.
When guest access finishes, require it on visitor's list, to sign, and confirm that through the scanner scanning back in the affirmation module 5 of going out it leaves, and in the input memory storage 11.
Because the utility model visitor supervisory system can also realize a plurality of systems connection Real-Time Sharing data; So when there are a plurality of gate in enterprises and institutions or school; Can be timely visitor's information of each entering is gathered shared, and the visitor also can confirm this visitor's the state that leaves during turnover from different gates; Can also compare through the visitor's information and the visitor of memory storage 11 storages,, can in time it be kept outside of the door if find a suspect; If security incident occurs, can also confirm suspect's scope and information thereof through the query history record timely, and system operation is simple, the Security Personnel need not train can be on duty.
Fig. 2 is the operation interface figure of the utility model visitor supervisory system.Concrete; As shown in Figure 2; The operation interface of the utility model visitor supervisory system is provided with " I.D. registration ", " certificate scanning registration ", " scene take pictures registration " and options such as " the inquiry of historical data "; And the position that shows this system is " main entrance "; Time and date is " 2011-10-25 15:18:48 "; Visitor's total number of persons and state thereof also demonstrate each visitor's odd numbers, name, entry time and state thereof simultaneously for " this day, totally getting into 5 people left 2 people "; " " expression visitor does not leave, and " " visitor leaves.As when not leaving visitor A and holding the visitor who is visited people's signature and singly need leave; After only needing the Security Personnel to confirm signature; The Access status that can confirm visitor A through the bar code on this visitor's list of scanner scanning is for leaving " ", and state and the information such as time departure, position thereof of visitor A in the storehouse that Updates Information.
When if the visitor carries I.D.; The Security Personnel clicks " I.D. registration " option and visitor's I.D. is placed on the identity card reader; System can generate visitor's list of this visitor automatically or upgrade visitor's list of existing this visitor; In its information automatic input system, and print through high-speed printer (HSP) have odd numbers, visiting people's name and unit, the origin of an incident, entering ground, visiting time and visited the visiting list of information such as people; When if the visitor does not carry I.D. and has only other certificates; The Security Personnel clicks " certificate scanning registration " option and visitor's certificate is placed on the Certificate scanner; System can generate visitor's list of this visitor automatically with the picture of scanning or upgrade in visitor's list of existing this visitor, and prints above-mentioned identical visiting list through high-speed printer (HSP); When if the visitor does not carry any certificate; The Security Personnel only need click " scene take pictures registration " option and the high-pixel camera head aimed at visitor's face take pictures; System can with picture shot generate visitor's list of this visitor automatically or upgrade existing this visitor's visitor single in, and print above-mentioned identical visiting list through high-speed printer (HSP) equally; If can also not carrying out the manual of visitor's information entirely through external input tools such as keyboard, the information record do not import under above-mentioned three kinds of situation; Like this with regard to no matter guaranteed which kind of situation all can be effectively with the personnel's of coming to visit information carry out quick, simple and direct, note accurately; The personnel that nourish bad motivation are played certain deterrent effect, can pass through the information of " the inquiry of historical data " options query timely when security incident occurring to the suspicion personnel.
In sum, owing to adopted technique scheme, the utility model to propose a kind of visitor's supervisory system; Through devices such as data sharing and authentications, can visitor's information and state thereof in time be verified and consult, thereby can in time a suspect be kept outside of the door; Occur in time to inquire about relevant visitor's information after the security incident, thereby strengthened turnover personnel's management, help to improve the safety precaution level of enterprises and institutions and school; And operation is simple, especially for the relatively poor Security Personnel of computation level, and can be on duty through simple training; Thereby improved Security Personnel's work efficiency greatly, and then improved the security level, and equipment is installed simple and fast; Easy to use, be prone to promote.
Through explanation and accompanying drawing, provided the exemplary embodiments of the ad hoc structure of embodiment, based on the utility model spirit, also can do other conversion.Although above-mentioned utility model has proposed existing preferred embodiment, yet these contents are not as limitation.
For a person skilled in the art, read above-mentioned explanation after, various variations and revise undoubtedly will be obvious.Therefore, appending claims should be regarded the true intention that contains the utility model and the whole variations and the correction of scope as.Any and all scope of equal value and contents all should be thought still to belong in the intention and scope of the utility model in claims scope.

Claims (4)

1. visitor's supervisory system is characterized in that, comprising:
One database, and the authentication typing module that is connected with this database communication respectively and the affirmation module of going out;
Wherein, this database comprises memory storage, and is equipped with information input operating device and display device outward.
2. visitor's supervisory system according to claim 1 is characterized in that, also comprises the print module and the data center that are connected with database communication.
3. visitor's supervisory system according to claim 1 is characterized in that, said authentication typing module includes identity card reader, Certificate scanner and filming apparatus.
4. visitor's supervisory system according to claim 1 is characterized in that, said going out confirms that module includes scanner.
CN2011204514415U 2011-11-15 2011-11-15 Visitor monitoring system Expired - Fee Related CN202472770U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011204514415U CN202472770U (en) 2011-11-15 2011-11-15 Visitor monitoring system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011204514415U CN202472770U (en) 2011-11-15 2011-11-15 Visitor monitoring system

Publications (1)

Publication Number Publication Date
CN202472770U true CN202472770U (en) 2012-10-03

Family

ID=46920914

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011204514415U Expired - Fee Related CN202472770U (en) 2011-11-15 2011-11-15 Visitor monitoring system

Country Status (1)

Country Link
CN (1) CN202472770U (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103310514A (en) * 2013-06-16 2013-09-18 北京北极龙科技发展有限公司 Intelligent visitor registering system
CN105469477A (en) * 2015-11-14 2016-04-06 合肥骇虫信息科技有限公司 Visitor management system
CN106427310A (en) * 2016-07-21 2017-02-22 广西柏豪家具有限公司 Office carbon pen for recording visitor information and control method
CN111325889A (en) * 2018-12-14 2020-06-23 英业达科技有限公司 Visitor access registration system and method thereof

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103310514A (en) * 2013-06-16 2013-09-18 北京北极龙科技发展有限公司 Intelligent visitor registering system
CN105469477A (en) * 2015-11-14 2016-04-06 合肥骇虫信息科技有限公司 Visitor management system
CN106427310A (en) * 2016-07-21 2017-02-22 广西柏豪家具有限公司 Office carbon pen for recording visitor information and control method
CN111325889A (en) * 2018-12-14 2020-06-23 英业达科技有限公司 Visitor access registration system and method thereof

Similar Documents

Publication Publication Date Title
US9002944B2 (en) Virtual badge, device and method
Coaffee et al. Rebordering the city for new security challenges: from counter-terrorism to community resilience
US11107296B2 (en) Intelligent parking management system and method
CN202472770U (en) Visitor monitoring system
CN204537279U (en) Guest system
CN104680622A (en) Visitor ingress-egress registration management system and method
Simon Suspicious encounters: Ordinary preemption and the securitization of photography
US20120130937A1 (en) Security at a facility
CN105160455A (en) Visitor management system
Walby et al. The new keys to the city: uploading corporate security and threat discourse into Canadian municipal governments
CN108109085A (en) A kind of system of intelligence community terminal device and the application equipment
TWM482119U (en) Intelligent image and RFID identification access control apparatus
CN107369114A (en) The children monitoring system of campus network, mobile network and guardian's network share
CN204303064U (en) A kind of self-help visitor system
US20140257848A1 (en) Participant Account Identification and Location Updating System
CN103116924A (en) Electronic lock system based on images and mobile communication network
CN103116923A (en) Security and protection method based on images and mobile communication network
CN109542723A (en) A kind of public security department's computer room management system and management method
CN107808238A (en) A kind of management method and system for equipping assets
CN107464316A (en) Intelligent caller machine and its operating system
CN110415137A (en) A kind of management and running information based on mobile Internet is quickly transmitted and sharing method
CN206672171U (en) A kind of floating population's management system with warning function
CN206533398U (en) A kind of community intelligent safety-protection system based on Internet of Things
Kumar et al. A framework for simple, secure and cost effective online voting system
Ndubuaku et al. State of Internet of Things deployment in Africa and its future: The Nigerian scenario

Legal Events

Date Code Title Description
GR01 Patent grant
C14 Grant of patent or utility model
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20121003

Termination date: 20131115

C17 Cessation of patent right