CN205177118U - Dangerous molecule fixed point supervisory systems - Google Patents

Dangerous molecule fixed point supervisory systems Download PDF

Info

Publication number
CN205177118U
CN205177118U CN201520845365.4U CN201520845365U CN205177118U CN 205177118 U CN205177118 U CN 205177118U CN 201520845365 U CN201520845365 U CN 201520845365U CN 205177118 U CN205177118 U CN 205177118U
Authority
CN
China
Prior art keywords
wireless
data storage
control
storage server
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201520845365.4U
Other languages
Chinese (zh)
Inventor
杨慧泉
罗双
赵福辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201520845365.4U priority Critical patent/CN205177118U/en
Application granted granted Critical
Publication of CN205177118U publication Critical patent/CN205177118U/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Alarm Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The utility model discloses a dangerous molecule fixed point supervisory systems, including gathering the point, deploying to ensure effective monitoring and control of illegal activities a little and the control point, gather a little including carrying a handheld identification code collection equipment and a wireless transmitting module, deploy to ensure effective monitoring and control of illegal activities a little including large -scale identification code collection equipment, the 2nd wireless transmitting module, camera and the 3rd wireless transmitting module, the control point includes a wireless receiving module, data storage server, the 2nd wireless receiving module, secondary data storage server, long number value comparator, audible -visual annunciator, the 3rd wireless receiving module, video monitoring display screen and a data storage server. Can utilize collection equipment to these suspicion personnel's handset identity code collection, utilize the database on backstage to save, gathered then once more in the region of deploying to ensure effective monitoring and control of illegal activities when the handset identity code of these storages, can send the warning to inform police on the scene, the development of the effective control state of affair prevents the emergence of public security incident.

Description

A bad actor fixes a point supervisory systems
Technical field
The utility model relates to urban public security and supervision area, particularly relates to a kind of a bad actor and to fix a point supervisory systems.
Background technology
At present, along with the generation of the event of complaining to the higher authorities about an injustice and request fair settlement, event of hurting sb.'s feelings, how better to safeguard urban public security environment, ensure the safety of government sector in cities normal operation and public life environment, become public security department's urgent problem.Owing to can not determine whether suspect is real offender, therefore can not control before suspect's crime, so, need a kind of supervisory systems, real-time follow-up determines the trend of suspect, while suspect arrives specific region, notify that police carry out prevention work, avoid unexpected generation.
Mobile phone, as people's primary communications instrument, almost staff mobile phone.Mobile communication needs by operator's base station access network network, and this intrinsic access way provides the position of mobile phone indirectly, can extract the positional information of mobile phone in the operator network.If cellphone information or the Mobile phone card information of suspect is known by technological means in public security organ, just can by the position of these information acquisitions suspect, for quick position suspect, clear up a criminal case provide valuable and information accurately.
Utility model content
In order to better safeguard urban public security environment, the utility model provides a kind of a bad actor and to fix a point supervisory systems, by the handset identity code utilizing harvester to obtain suspect, and the position of this mobile phone is monitored and locates, when this suspicion mobile phone arrive easily cause danger deploy to ensure effective monitoring and control of illegal activities region time send warning, remind police properly protect in advance.
For solving the problems of the technologies described above, the utility model scheme comprises: a bad actor fixes a point supervisory systems, it is characterized in that, comprise collection point, deploy to ensure effective monitoring and control of illegal activities a little and control point, described collection point is the people's police carrying hand-held identification code collecting device and the first wireless transmitter module, and hand-held identification code collecting device is connected with the first wireless transmitter module, described deploying to ensure effective monitoring and control of illegal activities a little comprises large-scale identification code collecting device, the second wireless transmitter module, camera and the 3rd wireless transmitter module, and large-scale identification code collecting device is connected with the second wireless transmitter module, and camera is connected with the 3rd wireless transmitter module, described control point comprises the first wireless receiving module, a data storage server, second wireless receiving module, secondary data storage server, multidigit digital comparator, audible-visual annunciator, 3rd wireless receiving module, video monitoring display screen and data storage server, the input end of a data storage server connects the first wireless receiving module, the output terminal of a data storage server connects the input end of multidigit digital comparator, the input end of secondary data storage server connects the second wireless receiving module output terminal, the output terminal of secondary data storage server connects multidigit numerical value comparator input terminal, multidigit numerical value comparator output terminal connects audible-visual annunciator, the output terminal of the 3rd wireless receiving module connects video monitoring display screen, video monitoring display screen connection data storage server, first wireless transmitter module of collection point and the first wireless receiving module of control point carry out data communication by wireless network, the second wireless receiving module of the second wireless transmitter module a little and control point of deploying to ensure effective monitoring and control of illegal activities carries out data communication by wireless network, and the 3rd wireless receiving module of deploy to ensure effective monitoring and control of illegal activities the 3rd wireless transmitter module a little and control point carries out data communication by wireless network.
Further, described hand-held identification code collecting device and large-scale identification code collecting device adopt in following technology one or more: virtual base station, wireless shielding, CDMA module, LTE acquisition module.
Further, described hand-held identification code collecting device and large-scale identification code collecting device are equipped with power amplification circuit.
Further, described camera is arranged on The Cloud Terrace, and described The Cloud Terrace realizes rotating by the tripod head controlling device of control point.
Further, described control point is provided with GPS locating module, realizes the locating and monitoring to suspicious mobile phone.
The beneficial effects of the utility model are:
The hotel that police and hand-held identification code collecting device 1, can be utilized to enter suspect assemble, hotel, community check, the handset identity code of these suspicion personnel is gathered simultaneously, the database on backstage is utilized to store, when the handset identity code that these store is when deploying to ensure effective monitoring and control of illegal activities in region again collected, warning can be sent after comparison is determined, the dynamic of suspect can be observed from monitoring display screen in control point, and notify police on the scene, effective control impact development, prevents the generation of public order incident.
2, be provided with power amplifier module, effectively can amplify the collection signal of identification equipment, adjust suitable sample range, when not affecting call and the privacy of the normal common people as far as possible, do not let slip any one a suspect.
3, the technological means such as virtual base station, wireless shielding, CDMA module, LTE acquisition module and equipment is utilized to carry out phone number, the particularly collection of handset identity code, the communication network signal that 2G, 3G, 4G etc. are different can be covered, ensure that the signal gathered is comprehensive, accurate.
4, be provided with The Cloud Terrace, utilize the function software that The Cloud Terrace carries, the camera controlling The Cloud Terrace is installed moves, and real-time follow-up monitoring suspect's is dynamic, determines the position of suspect.
5, be provided with GPS module, if suspect escapes from point range of deploying to ensure effective monitoring and control of illegal activities, monitor staff can utilize the base station of existing communication network and GPS to position, and arrests suspect.
Accompanying drawing explanation
Fig. 1 is principle schematic of the present utility model.
Embodiment
Below in conjunction with accompanying drawing, concrete enforcement of the present utility model is described, should be appreciated that exemplifying embodiment described herein is only for instruction and explanation of the utility model, and be not used in restriction the utility model.
A bad actor as shown in Figure 1 fixes a point supervisory systems, it is characterized in that, comprise collection point, deploy to ensure effective monitoring and control of illegal activities a little and control point, described collection point is the people's police carrying hand-held identification code collecting device and the first wireless transmitter module, and hand-held identification code collecting device is connected with the first wireless transmitter module, described deploying to ensure effective monitoring and control of illegal activities a little comprises large-scale identification code collecting device, the second wireless transmitter module, camera and the 3rd wireless transmitter module, and large-scale identification code collecting device is connected with the second wireless transmitter module, and camera is connected with the 3rd wireless transmitter module, described control point comprises the first wireless receiving module, a data storage server, second wireless receiving module, secondary data storage server, multidigit digital comparator, audible-visual annunciator, 3rd wireless receiving module, video monitoring display screen and data storage server, the input end of a data storage server connects the first wireless receiving module, the output terminal of a data storage server connects the input end of multidigit digital comparator, the input end of secondary data storage server connects the second wireless receiving module output terminal, the output terminal of secondary data storage server connects multidigit numerical value comparator input terminal, multidigit numerical value comparator output terminal connects audible-visual annunciator, the output terminal of the 3rd wireless receiving module connects video monitoring display screen, video monitoring display screen connection data storage server, first wireless transmitter module of collection point and the first wireless receiving module of control point carry out data communication by wireless network, the second wireless receiving module of the second wireless transmitter module a little and control point of deploying to ensure effective monitoring and control of illegal activities carries out data communication by wireless network, and the 3rd wireless receiving module of deploy to ensure effective monitoring and control of illegal activities the 3rd wireless transmitter module a little and control point carries out data communication by wireless network.
Described hand-held identification code collecting device and large-scale identification code collecting device adopt different technology and equipments to realize:
1) virtual base station: be applicable to 2G network that is mobile and UNICOM, do not affect telex network.
2) wireless shielding: the cost of the program is lower, in overlay area, 3G subscription logs in 2G network automatically, converses unaffected, but GPRS can only be adopted to surf the Net.In some specific occasion, as user is very sensitive to 3G online, also can matches 3G virtual base station module and realize Gather Number, user can normally 3G online.
3) CDMA module: can Gather Number be realized, but user can not normally revert to connection carrier network, therefore, does not advise gathering telecommunication user number.If some site-specific does not have house and office building, user in some region, position is personnel or the vehicle of flowing, can consider to install CDMA module, although user can not communicate in this region, but user can leave this " black hole " region very soon, not easily causes customer complaint.
4) LTE acquisition module: be applicable to 4G network.
Further, described hand-held identification code collecting device and large-scale identification code collecting device are equipped with power amplification circuit, be used for adjust mobile phone signal gather scope, particularly for the suspicion personnel of collection point, need to adjust according to the scope of room or floor, so just can be accurate to individual, not affect the normal common people again simultaneously.
In order to convenient control suspect is in position a little of deploying to ensure effective monitoring and control of illegal activities, described camera is arranged on The Cloud Terrace, and described The Cloud Terrace realizes rotating by the tripod head controlling device of control point.
In order to position the Xinyi people escaping from the scope of deploying to ensure effective monitoring and control of illegal activities, described control point is provided with GPS locating module, realizes the locating and monitoring to suspicious mobile phone.
This system, for the supervision of the external a suspect in city, prevents the generation of public order incident, and specific works process is as follows:
Collection point is the police carrying hand-held identification code collector one by one, police carry out conventional investigation to hotel, hotel, picked-up, if run into questionable person person, or be subject to informants' hot-line telephone, police, at normal inspection identity document, link up in checking process with monitor staff, open hand-held identification code collecting device, gather the cellphone information of a suspect, and upload and be saved in a data storage server, as data for subsequent use.
Deploy to ensure effective monitoring and control of illegal activities Dian Shi government bodies, hold the place of the important or gathering of people in movable square, traffic main artery etc., in the scope that this place allows, camera is set, large-scale identification code collecting device is placed in the central area of scope, this equipment not timing is opened, gather and enter the cellphone information of deploying to ensure effective monitoring and control of illegal activities a little, and information is uploaded be stored in secondary data storage server.
In control point, identification code in a data storage server and secondary data storage server enters multidigit digital comparator and compares, when the every numeric ratio of appearance sends signal to time consistent, audible-visual annunciator receives signal, sends warning, and the monitor staff of control point transfers the picture of monitoring display screen, clear picture is obtained by cradle head control camera, determine the action form of a suspect, notice is deployed to ensure effective monitoring and control of illegal activities a little and neighbouring police on duty enhance your vigilance, and intervenes in advance.
If a suspect implements crime or affects public order, when carrying out a suspect and arresting, monitor staff can determine the position of suspect by monitoring display screen, and suspect escape from deploy to ensure effective monitoring and control of illegal activities region time, start GPS locating module, tracking is positioned to suspect.
Should be understood that; the above-mentioned description for preferred embodiment is comparatively detailed; therefore the restriction to the utility model scope of patent protection can not be thought; those of ordinary skill in the art is under enlightenment of the present utility model; do not departing under the ambit that the utility model claim protects; can also make the various deformation such as replacement, simple combination, these all fall within protection domain of the present utility model, and request protection domain of the present utility model should be as the criterion with claims.

Claims (5)

1. a bad actor fixes a point supervisory systems, and it is characterized in that, comprise collection point, deploy to ensure effective monitoring and control of illegal activities a little and control point, described collection point comprises hand-held identification code collecting device and the first wireless transmitter module, and hand-held identification code collecting device is connected with the first wireless transmitter module, described deploying to ensure effective monitoring and control of illegal activities a little comprises large-scale identification code collecting device, the second wireless transmitter module, camera and the 3rd wireless transmitter module, and large-scale identification code collecting device is connected with the second wireless transmitter module, and camera is connected with the 3rd wireless transmitter module, described control point comprises the first wireless receiving module, a data storage server, second wireless receiving module, secondary data storage server, multidigit digital comparator, audible-visual annunciator, 3rd wireless receiving module, video monitoring display screen and data storage server, the input end of a data storage server connects the first wireless receiving module, the output terminal of a data storage server connects the input end of multidigit digital comparator, the input end of secondary data storage server connects the second wireless receiving module output terminal, the output terminal of secondary data storage server connects multidigit numerical value comparator input terminal, multidigit numerical value comparator output terminal connects audible-visual annunciator, the output terminal of the 3rd wireless receiving module connects video monitoring display screen, video monitoring display screen connection data storage server, first wireless transmitter module of collection point and the first wireless receiving module of control point carry out data communication by wireless network, the second wireless receiving module of the second wireless transmitter module a little and control point of deploying to ensure effective monitoring and control of illegal activities carries out data communication by wireless network, and the 3rd wireless receiving module of deploy to ensure effective monitoring and control of illegal activities the 3rd wireless transmitter module a little and control point carries out data communication by wireless network.
2. a bad actor according to claim 1 fixes a point supervisory systems, it is characterized in that, described hand-held identification code collecting device and large-scale identification code collecting device adopt in following technology one or more: virtual base station, wireless shielding, CDMA module, LTE acquisition module.
3. a bad actor according to claim 1 and 2 fixes a point supervisory systems, and it is characterized in that, described hand-held identification code collecting device and large-scale identification code collecting device are equipped with power amplification circuit.
4. a bad actor according to claim 1 fixes a point supervisory systems, and it is characterized in that, described camera is arranged on The Cloud Terrace, and described The Cloud Terrace realizes rotating by the tripod head controlling device of control point.
5. a bad actor according to claim 1 fixes a point supervisory systems, and it is characterized in that, described control point is provided with GPS locating module, realizes the locating and monitoring to suspicious mobile phone.
CN201520845365.4U 2015-10-29 2015-10-29 Dangerous molecule fixed point supervisory systems Expired - Fee Related CN205177118U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201520845365.4U CN205177118U (en) 2015-10-29 2015-10-29 Dangerous molecule fixed point supervisory systems

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201520845365.4U CN205177118U (en) 2015-10-29 2015-10-29 Dangerous molecule fixed point supervisory systems

Publications (1)

Publication Number Publication Date
CN205177118U true CN205177118U (en) 2016-04-20

Family

ID=55741079

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201520845365.4U Expired - Fee Related CN205177118U (en) 2015-10-29 2015-10-29 Dangerous molecule fixed point supervisory systems

Country Status (1)

Country Link
CN (1) CN205177118U (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107784769A (en) * 2016-08-26 2018-03-09 杭州海康威视系统技术有限公司 A kind of alarm method, apparatus and system
CN109495978A (en) * 2017-09-13 2019-03-19 大唐移动通信设备有限公司 A kind of data transmission method and device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107784769A (en) * 2016-08-26 2018-03-09 杭州海康威视系统技术有限公司 A kind of alarm method, apparatus and system
CN107784769B (en) * 2016-08-26 2020-07-31 杭州海康威视系统技术有限公司 Alarm method, device and system
CN109495978A (en) * 2017-09-13 2019-03-19 大唐移动通信设备有限公司 A kind of data transmission method and device

Similar Documents

Publication Publication Date Title
CN103578228B (en) A kind of Storm Flood Disasters monitoring and warning and emergency response system and method
CN107018362B (en) Anti-theft hunting monitoring method and system
US20150230072A1 (en) Personal safety mobile notification system
CN106254838B (en) A kind of preventing damage to power transmission line caused by external force intelligent early-warning system
CN205230242U (en) Intelligent residential district security protection system
CN101674464A (en) Digital urban public security integrated management system
CN205263990U (en) Infrared thermal imaging forest fires on -line monitoring system
CN204066307U (en) A kind of safety-protection system based on technology of Internet of things
CN102427521A (en) Mobile supervision method based on face recognition technology
CN102496267A (en) Traffic accident alarm system and accident handling method
CN104301867A (en) Improved community correction method and system
CN106888435A (en) A kind of mobile phone managing and control system
CN106033635A (en) Monitoring method and system
CN202362931U (en) Traffic accident alarm system
CN105978657A (en) Full-format network-wide base station type shielding control conference system and shielding control method
CN107426442A (en) The information gathering of mobile phone full system type pictorial and recognition of face analyses and comparison system and application method
CN103914940A (en) Indoor antitheft monitoring system based on wireless sensor network technology and monitoring method thereof
CN205177118U (en) Dangerous molecule fixed point supervisory systems
CN203288029U (en) Alarm linkage system
CN105389962A (en) One-key alarm system based on mobile intelligent terminals
CN108366344A (en) A kind of LTE mobile phones detect a yard system
CN113947865A (en) Safety control method and system
KR101344723B1 (en) Anti-theft system of cultivated plants
CN206452478U (en) Overhead transmission line external force damage prevention high-definition monitoring device
CN103078951A (en) Environmental-protection data acquisition device based on mobile application

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160420