Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Personnel security management system and method in mining areas

A technology for personnel safety and mining area, which is applied in the field of mining area personnel safety management system, can solve the problems of adding non-safety factors in mining area production, wasting manpower and material resources, and difficult to identify illegal personnel in mining area personnel, achieving fine user authority auditing and facilitating remote monitoring , Conducive to the effect of safe production

Inactive Publication Date: 2013-04-17
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF9 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, there are some unique problems in the management of personnel safety in mining areas: firstly, personnel in mining areas often enter the mining area in an unsafe state, such as alcoholism, fatigue, and without safety helmets; Illegal personnel impersonate and enter the mining area; in addition, mining area personnel violate their own authority to carry out activities that can only be carried out by certain specific personnel, such as management personnel
However, the existing safety management in mining areas mostly uses manual registration and simple card swiping. Even if the access control management system is used, it can only perform general authorization verification. Most of them use artificial methods to judge the safety status of mining area personnel. Such management not only wastes manpower and material resources , and there are many potential safety hazards, which have added a lot of non-safety factors to the production in the mining area

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Personnel security management system and method in mining areas
  • Personnel security management system and method in mining areas
  • Personnel security management system and method in mining areas

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0116] The administrator of the mining area assigns permissions to the user "Zhang San" through the management terminal: "Zhang San" belongs to the "common group", and the personal permission information of "Zhang San" does not have the access permission of Gate 2 at any time, but the "common group" Users can pass Gate 2 in the mining area from 8:00 to 10:00 on October 1, 2012. The management terminal stores the authority into the database server, issues the authority card through the card reader according to the authority sign in the database server, and encodes the personnel information corresponding to the authority information and writes it into the authority card. The management end uses the face recognition device to collect the facial image information of "Zhang San", and sends it to the face recognition device of Gate 2 through Ethernet. "Zhang San" will pass Gate 2 at 8:30 on October 1, 2012. At this time, he did not drink alcohol, wear a safety helmet as required, an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a personnel security management system and method in mining areas. According to special environments and conditions of the mining areas, security factors are detected. The system is internally provided with a face recognition device and alcohol detecting device, wherein the face recognition device is used for detecting whether face images are matched, whether security helmets are worn, and whether workers are fatigue; and the alcohol detecting device is used for detecting whether the alcohol content in oral cavities of the workers is qualified, thereby preventing dangerous operation of the workers in the mining areas; and multiple audit modes of holiday control, week control and time section control are adopted for user right verification. The personnel security management system of the mining areas can cover each gate entry and other important areas of the mining areas, improves the entry and working safety of the workers in the mining areas through security verification and right verification which are matched with each other, and is beneficial to safety production of the mining areas.

Description

technical field [0001] The invention belongs to the field of mine security, and more specifically relates to a mine security management system and method. Background technique [0002] my country is in the process of industrialization, and the demand for mineral resources has increased tremendously. The safe production in the mining area has also become an important part of the daily management of the mining area, and the safety management of the mining area personnel is one of the important aspects. Early mining areas mostly used manual registration and inspection to monitor the safety of staff. With the development of science and technology, mining areas introduced access control management systems to manage the safety of personnel entering and leaving the mining area. The existing access control management system generally includes a server, a management terminal, an access control card issuer, an access control device, and a data collection device, and mainly performs a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00
Inventor 郝家胜徐红兵邹见效潘宏
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products