CN205177118U - Dangerous molecule fixed point supervisory systems - Google Patents
Dangerous molecule fixed point supervisory systems Download PDFInfo
- Publication number
- CN205177118U CN205177118U CN201520845365.4U CN201520845365U CN205177118U CN 205177118 U CN205177118 U CN 205177118U CN 201520845365 U CN201520845365 U CN 201520845365U CN 205177118 U CN205177118 U CN 205177118U
- Authority
- CN
- China
- Prior art keywords
- wireless
- data storage
- control
- storage server
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000012544 monitoring process Methods 0.000 claims abstract description 41
- 238000013500 data storage Methods 0.000 claims abstract description 31
- 230000000694 effects Effects 0.000 claims abstract description 24
- 238000004891 communication Methods 0.000 claims description 12
- 238000005516 engineering process Methods 0.000 claims description 5
- 230000003321 amplification Effects 0.000 claims description 3
- 238000003199 nucleic acid amplification method Methods 0.000 claims description 3
- 238000011161 development Methods 0.000 abstract description 2
- 230000014759 maintenance of location Effects 0.000 abstract 1
- 238000003860 storage Methods 0.000 abstract 1
- 238000000034 method Methods 0.000 description 2
- 210000001367 artery Anatomy 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 210000000056 organ Anatomy 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
Landscapes
- Alarm Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
The utility model discloses a dangerous molecule fixed point supervisory systems, including gathering the point, deploying to ensure effective monitoring and control of illegal activities a little and the control point, gather a little including carrying a handheld identification code collection equipment and a wireless transmitting module, deploy to ensure effective monitoring and control of illegal activities a little including large -scale identification code collection equipment, the 2nd wireless transmitting module, camera and the 3rd wireless transmitting module, the control point includes a wireless receiving module, data storage server, the 2nd wireless receiving module, secondary data storage server, long number value comparator, audible -visual annunciator, the 3rd wireless receiving module, video monitoring display screen and a data storage server. Can utilize collection equipment to these suspicion personnel's handset identity code collection, utilize the database on backstage to save, gathered then once more in the region of deploying to ensure effective monitoring and control of illegal activities when the handset identity code of these storages, can send the warning to inform police on the scene, the development of the effective control state of affair prevents the emergence of public security incident.
Description
Technical field
The utility model relates to urban public security and supervision area, particularly relates to a kind of a bad actor and to fix a point supervisory systems.
Background technology
At present, along with the generation of the event of complaining to the higher authorities about an injustice and request fair settlement, event of hurting sb.'s feelings, how better to safeguard urban public security environment, ensure the safety of government sector in cities normal operation and public life environment, become public security department's urgent problem.Owing to can not determine whether suspect is real offender, therefore can not control before suspect's crime, so, need a kind of supervisory systems, real-time follow-up determines the trend of suspect, while suspect arrives specific region, notify that police carry out prevention work, avoid unexpected generation.
Mobile phone, as people's primary communications instrument, almost staff mobile phone.Mobile communication needs by operator's base station access network network, and this intrinsic access way provides the position of mobile phone indirectly, can extract the positional information of mobile phone in the operator network.If cellphone information or the Mobile phone card information of suspect is known by technological means in public security organ, just can by the position of these information acquisitions suspect, for quick position suspect, clear up a criminal case provide valuable and information accurately.
Utility model content
In order to better safeguard urban public security environment, the utility model provides a kind of a bad actor and to fix a point supervisory systems, by the handset identity code utilizing harvester to obtain suspect, and the position of this mobile phone is monitored and locates, when this suspicion mobile phone arrive easily cause danger deploy to ensure effective monitoring and control of illegal activities region time send warning, remind police properly protect in advance.
For solving the problems of the technologies described above, the utility model scheme comprises: a bad actor fixes a point supervisory systems, it is characterized in that, comprise collection point, deploy to ensure effective monitoring and control of illegal activities a little and control point, described collection point is the people's police carrying hand-held identification code collecting device and the first wireless transmitter module, and hand-held identification code collecting device is connected with the first wireless transmitter module, described deploying to ensure effective monitoring and control of illegal activities a little comprises large-scale identification code collecting device, the second wireless transmitter module, camera and the 3rd wireless transmitter module, and large-scale identification code collecting device is connected with the second wireless transmitter module, and camera is connected with the 3rd wireless transmitter module, described control point comprises the first wireless receiving module, a data storage server, second wireless receiving module, secondary data storage server, multidigit digital comparator, audible-visual annunciator, 3rd wireless receiving module, video monitoring display screen and data storage server, the input end of a data storage server connects the first wireless receiving module, the output terminal of a data storage server connects the input end of multidigit digital comparator, the input end of secondary data storage server connects the second wireless receiving module output terminal, the output terminal of secondary data storage server connects multidigit numerical value comparator input terminal, multidigit numerical value comparator output terminal connects audible-visual annunciator, the output terminal of the 3rd wireless receiving module connects video monitoring display screen, video monitoring display screen connection data storage server, first wireless transmitter module of collection point and the first wireless receiving module of control point carry out data communication by wireless network, the second wireless receiving module of the second wireless transmitter module a little and control point of deploying to ensure effective monitoring and control of illegal activities carries out data communication by wireless network, and the 3rd wireless receiving module of deploy to ensure effective monitoring and control of illegal activities the 3rd wireless transmitter module a little and control point carries out data communication by wireless network.
Further, described hand-held identification code collecting device and large-scale identification code collecting device adopt in following technology one or more: virtual base station, wireless shielding, CDMA module, LTE acquisition module.
Further, described hand-held identification code collecting device and large-scale identification code collecting device are equipped with power amplification circuit.
Further, described camera is arranged on The Cloud Terrace, and described The Cloud Terrace realizes rotating by the tripod head controlling device of control point.
Further, described control point is provided with GPS locating module, realizes the locating and monitoring to suspicious mobile phone.
The beneficial effects of the utility model are:
The hotel that police and hand-held identification code collecting device 1, can be utilized to enter suspect assemble, hotel, community check, the handset identity code of these suspicion personnel is gathered simultaneously, the database on backstage is utilized to store, when the handset identity code that these store is when deploying to ensure effective monitoring and control of illegal activities in region again collected, warning can be sent after comparison is determined, the dynamic of suspect can be observed from monitoring display screen in control point, and notify police on the scene, effective control impact development, prevents the generation of public order incident.
2, be provided with power amplifier module, effectively can amplify the collection signal of identification equipment, adjust suitable sample range, when not affecting call and the privacy of the normal common people as far as possible, do not let slip any one a suspect.
3, the technological means such as virtual base station, wireless shielding, CDMA module, LTE acquisition module and equipment is utilized to carry out phone number, the particularly collection of handset identity code, the communication network signal that 2G, 3G, 4G etc. are different can be covered, ensure that the signal gathered is comprehensive, accurate.
4, be provided with The Cloud Terrace, utilize the function software that The Cloud Terrace carries, the camera controlling The Cloud Terrace is installed moves, and real-time follow-up monitoring suspect's is dynamic, determines the position of suspect.
5, be provided with GPS module, if suspect escapes from point range of deploying to ensure effective monitoring and control of illegal activities, monitor staff can utilize the base station of existing communication network and GPS to position, and arrests suspect.
Accompanying drawing explanation
Fig. 1 is principle schematic of the present utility model.
Embodiment
Below in conjunction with accompanying drawing, concrete enforcement of the present utility model is described, should be appreciated that exemplifying embodiment described herein is only for instruction and explanation of the utility model, and be not used in restriction the utility model.
A bad actor as shown in Figure 1 fixes a point supervisory systems, it is characterized in that, comprise collection point, deploy to ensure effective monitoring and control of illegal activities a little and control point, described collection point is the people's police carrying hand-held identification code collecting device and the first wireless transmitter module, and hand-held identification code collecting device is connected with the first wireless transmitter module, described deploying to ensure effective monitoring and control of illegal activities a little comprises large-scale identification code collecting device, the second wireless transmitter module, camera and the 3rd wireless transmitter module, and large-scale identification code collecting device is connected with the second wireless transmitter module, and camera is connected with the 3rd wireless transmitter module, described control point comprises the first wireless receiving module, a data storage server, second wireless receiving module, secondary data storage server, multidigit digital comparator, audible-visual annunciator, 3rd wireless receiving module, video monitoring display screen and data storage server, the input end of a data storage server connects the first wireless receiving module, the output terminal of a data storage server connects the input end of multidigit digital comparator, the input end of secondary data storage server connects the second wireless receiving module output terminal, the output terminal of secondary data storage server connects multidigit numerical value comparator input terminal, multidigit numerical value comparator output terminal connects audible-visual annunciator, the output terminal of the 3rd wireless receiving module connects video monitoring display screen, video monitoring display screen connection data storage server, first wireless transmitter module of collection point and the first wireless receiving module of control point carry out data communication by wireless network, the second wireless receiving module of the second wireless transmitter module a little and control point of deploying to ensure effective monitoring and control of illegal activities carries out data communication by wireless network, and the 3rd wireless receiving module of deploy to ensure effective monitoring and control of illegal activities the 3rd wireless transmitter module a little and control point carries out data communication by wireless network.
Described hand-held identification code collecting device and large-scale identification code collecting device adopt different technology and equipments to realize:
1) virtual base station: be applicable to 2G network that is mobile and UNICOM, do not affect telex network.
2) wireless shielding: the cost of the program is lower, in overlay area, 3G subscription logs in 2G network automatically, converses unaffected, but GPRS can only be adopted to surf the Net.In some specific occasion, as user is very sensitive to 3G online, also can matches 3G virtual base station module and realize Gather Number, user can normally 3G online.
3) CDMA module: can Gather Number be realized, but user can not normally revert to connection carrier network, therefore, does not advise gathering telecommunication user number.If some site-specific does not have house and office building, user in some region, position is personnel or the vehicle of flowing, can consider to install CDMA module, although user can not communicate in this region, but user can leave this " black hole " region very soon, not easily causes customer complaint.
4) LTE acquisition module: be applicable to 4G network.
Further, described hand-held identification code collecting device and large-scale identification code collecting device are equipped with power amplification circuit, be used for adjust mobile phone signal gather scope, particularly for the suspicion personnel of collection point, need to adjust according to the scope of room or floor, so just can be accurate to individual, not affect the normal common people again simultaneously.
In order to convenient control suspect is in position a little of deploying to ensure effective monitoring and control of illegal activities, described camera is arranged on The Cloud Terrace, and described The Cloud Terrace realizes rotating by the tripod head controlling device of control point.
In order to position the Xinyi people escaping from the scope of deploying to ensure effective monitoring and control of illegal activities, described control point is provided with GPS locating module, realizes the locating and monitoring to suspicious mobile phone.
This system, for the supervision of the external a suspect in city, prevents the generation of public order incident, and specific works process is as follows:
Collection point is the police carrying hand-held identification code collector one by one, police carry out conventional investigation to hotel, hotel, picked-up, if run into questionable person person, or be subject to informants' hot-line telephone, police, at normal inspection identity document, link up in checking process with monitor staff, open hand-held identification code collecting device, gather the cellphone information of a suspect, and upload and be saved in a data storage server, as data for subsequent use.
Deploy to ensure effective monitoring and control of illegal activities Dian Shi government bodies, hold the place of the important or gathering of people in movable square, traffic main artery etc., in the scope that this place allows, camera is set, large-scale identification code collecting device is placed in the central area of scope, this equipment not timing is opened, gather and enter the cellphone information of deploying to ensure effective monitoring and control of illegal activities a little, and information is uploaded be stored in secondary data storage server.
In control point, identification code in a data storage server and secondary data storage server enters multidigit digital comparator and compares, when the every numeric ratio of appearance sends signal to time consistent, audible-visual annunciator receives signal, sends warning, and the monitor staff of control point transfers the picture of monitoring display screen, clear picture is obtained by cradle head control camera, determine the action form of a suspect, notice is deployed to ensure effective monitoring and control of illegal activities a little and neighbouring police on duty enhance your vigilance, and intervenes in advance.
If a suspect implements crime or affects public order, when carrying out a suspect and arresting, monitor staff can determine the position of suspect by monitoring display screen, and suspect escape from deploy to ensure effective monitoring and control of illegal activities region time, start GPS locating module, tracking is positioned to suspect.
Should be understood that; the above-mentioned description for preferred embodiment is comparatively detailed; therefore the restriction to the utility model scope of patent protection can not be thought; those of ordinary skill in the art is under enlightenment of the present utility model; do not departing under the ambit that the utility model claim protects; can also make the various deformation such as replacement, simple combination, these all fall within protection domain of the present utility model, and request protection domain of the present utility model should be as the criterion with claims.
Claims (5)
1. a bad actor fixes a point supervisory systems, and it is characterized in that, comprise collection point, deploy to ensure effective monitoring and control of illegal activities a little and control point, described collection point comprises hand-held identification code collecting device and the first wireless transmitter module, and hand-held identification code collecting device is connected with the first wireless transmitter module, described deploying to ensure effective monitoring and control of illegal activities a little comprises large-scale identification code collecting device, the second wireless transmitter module, camera and the 3rd wireless transmitter module, and large-scale identification code collecting device is connected with the second wireless transmitter module, and camera is connected with the 3rd wireless transmitter module, described control point comprises the first wireless receiving module, a data storage server, second wireless receiving module, secondary data storage server, multidigit digital comparator, audible-visual annunciator, 3rd wireless receiving module, video monitoring display screen and data storage server, the input end of a data storage server connects the first wireless receiving module, the output terminal of a data storage server connects the input end of multidigit digital comparator, the input end of secondary data storage server connects the second wireless receiving module output terminal, the output terminal of secondary data storage server connects multidigit numerical value comparator input terminal, multidigit numerical value comparator output terminal connects audible-visual annunciator, the output terminal of the 3rd wireless receiving module connects video monitoring display screen, video monitoring display screen connection data storage server, first wireless transmitter module of collection point and the first wireless receiving module of control point carry out data communication by wireless network, the second wireless receiving module of the second wireless transmitter module a little and control point of deploying to ensure effective monitoring and control of illegal activities carries out data communication by wireless network, and the 3rd wireless receiving module of deploy to ensure effective monitoring and control of illegal activities the 3rd wireless transmitter module a little and control point carries out data communication by wireless network.
2. a bad actor according to claim 1 fixes a point supervisory systems, it is characterized in that, described hand-held identification code collecting device and large-scale identification code collecting device adopt in following technology one or more: virtual base station, wireless shielding, CDMA module, LTE acquisition module.
3. a bad actor according to claim 1 and 2 fixes a point supervisory systems, and it is characterized in that, described hand-held identification code collecting device and large-scale identification code collecting device are equipped with power amplification circuit.
4. a bad actor according to claim 1 fixes a point supervisory systems, and it is characterized in that, described camera is arranged on The Cloud Terrace, and described The Cloud Terrace realizes rotating by the tripod head controlling device of control point.
5. a bad actor according to claim 1 fixes a point supervisory systems, and it is characterized in that, described control point is provided with GPS locating module, realizes the locating and monitoring to suspicious mobile phone.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201520845365.4U CN205177118U (en) | 2015-10-29 | 2015-10-29 | Dangerous molecule fixed point supervisory systems |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201520845365.4U CN205177118U (en) | 2015-10-29 | 2015-10-29 | Dangerous molecule fixed point supervisory systems |
Publications (1)
Publication Number | Publication Date |
---|---|
CN205177118U true CN205177118U (en) | 2016-04-20 |
Family
ID=55741079
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201520845365.4U Expired - Fee Related CN205177118U (en) | 2015-10-29 | 2015-10-29 | Dangerous molecule fixed point supervisory systems |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN205177118U (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107784769A (en) * | 2016-08-26 | 2018-03-09 | 杭州海康威视系统技术有限公司 | A kind of alarm method, apparatus and system |
CN109495978A (en) * | 2017-09-13 | 2019-03-19 | 大唐移动通信设备有限公司 | A kind of data transmission method and device |
-
2015
- 2015-10-29 CN CN201520845365.4U patent/CN205177118U/en not_active Expired - Fee Related
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107784769A (en) * | 2016-08-26 | 2018-03-09 | 杭州海康威视系统技术有限公司 | A kind of alarm method, apparatus and system |
CN107784769B (en) * | 2016-08-26 | 2020-07-31 | 杭州海康威视系统技术有限公司 | Alarm method, device and system |
CN109495978A (en) * | 2017-09-13 | 2019-03-19 | 大唐移动通信设备有限公司 | A kind of data transmission method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103578228B (en) | A kind of Storm Flood Disasters monitoring and warning and emergency response system and method | |
CN107018362B (en) | Anti-theft hunting monitoring method and system | |
US20150230072A1 (en) | Personal safety mobile notification system | |
CN106254838B (en) | A kind of preventing damage to power transmission line caused by external force intelligent early-warning system | |
CN205230242U (en) | Intelligent residential district security protection system | |
CN101674464A (en) | Digital urban public security integrated management system | |
CN205263990U (en) | Infrared thermal imaging forest fires on -line monitoring system | |
CN204066307U (en) | A kind of safety-protection system based on technology of Internet of things | |
CN102427521A (en) | Mobile supervision method based on face recognition technology | |
CN102496267A (en) | Traffic accident alarm system and accident handling method | |
CN104301867A (en) | Improved community correction method and system | |
CN106888435A (en) | A kind of mobile phone managing and control system | |
CN106033635A (en) | Monitoring method and system | |
CN202362931U (en) | Traffic accident alarm system | |
CN105978657A (en) | Full-format network-wide base station type shielding control conference system and shielding control method | |
CN107426442A (en) | The information gathering of mobile phone full system type pictorial and recognition of face analyses and comparison system and application method | |
CN103914940A (en) | Indoor antitheft monitoring system based on wireless sensor network technology and monitoring method thereof | |
CN205177118U (en) | Dangerous molecule fixed point supervisory systems | |
CN203288029U (en) | Alarm linkage system | |
CN105389962A (en) | One-key alarm system based on mobile intelligent terminals | |
CN108366344A (en) | A kind of LTE mobile phones detect a yard system | |
CN113947865A (en) | Safety control method and system | |
KR101344723B1 (en) | Anti-theft system of cultivated plants | |
CN206452478U (en) | Overhead transmission line external force damage prevention high-definition monitoring device | |
CN103078951A (en) | Environmental-protection data acquisition device based on mobile application |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160420 |