Security products and systems in prisons must have intelligent features. The front-end device and system must have capabilities including clear and reliable communication, automatic fault detection and alarm functions.
Security products and systems in prisons must have a good human-machine interfaces, so that users can easily learn and operate the machine to do tasks. The systems’s front-end products and softwares are simple to learn and operate, such that through simple training and instruction, users can master the essentials of the systems to perform their duties.
Today, computer network technology is highly developed and widely used across the world. The design of the access control systems in detention centers and prisons, then, should also utilize such technology. When the system is reasonably configured, it has good scalability, good compatibility and low scale cost.
Reliability and stability :
A reliable system need to carefully consider the configurations and certifications of all equipments including computers, systems, and the front-end device. In actual operation, even with very low system failure rates, errors may still occur due to unexpected causes. Hence, quick preservation and rapid recovery of data has been taken into account in the system design.
Can be upgraded and maintained :
When designing the system, we have taken into consideration the issues of upgrades and maintenance. Hence, the systems we provide contain a free software upgrading guarantee with easy-to-understand instructions. No complicated operations or specialized technologies are needed.
The integrated management control system using iris recognition consists of three components: the iris acquisition system, iris server system, as well as the identity authorization management system.
Iris acquisition, recognition and identification are the security foundations in this system.
The iris acquisition system, which can be installed in the prisons’ working areas, is mainly composed of iris acquisition equipment and supporting acquisition management software.
After stringent checking of user information, the prison officers collect users’iris and ID information from the iris acquisition device. The system then automatically binds the iris information with the identity information, and automatically uploads this to the iris database to complete the iris registration process. Iris registration is conducted by prison officers while only senior management officers have the authority to modify or delete the registered iris data. The safety of basic personal data is ensured through this strict authority regulation.
The iris server system is composed of an iris database server and an alignment server. The system is installed in the working areas of prisons and it is the information foundation of the entire system. It accepts iris registration information uploaded by the access control terminals in different supervisory districts, and updates the iris information collected from iris acquisition devices.
The identity authorization management system is composed of equipment which supervises internal and external machines, prevents mistaken releases of people, controls family members' meeting facilities and controls doors A / B. It serves functions such as access control, visitor management, prisoner management in supervisory districts, and so on:
(1) District door access control
Access control systems with iris recognition are installed in all key areas within prison. Prison officers can divide their working areas into different regions with different access restrictions, according to their division of work. Officers collect iris and identity information using the access control system, and the system automatically performs iris comparison and identification. For a successful alignment, the system gives a permission signal and opens the controlled gate so that the person can enter. For a failed alignment, the system prohibits entry and triggers an alarm. The management terminal manages the access authority of the staff and records and checks the usage history at each guarded entrance. Strict management of the access control can effectively ensure order and safety in the prison.
The principle of designing the control access machine is that the gate can be opened only when the the authentification is passed by the highly advanced iris recognition devices at doors A and B. In the event of a fire or other emergency situations, all access control systems can be fully opened and fully locked via access control buttons or software. Once the access control system is powered off, all locks must be manually opened by the officers.
According to the practical requirements of prison management, the management mode of AB linkage doors can realize the interlinkage of double doors as well as form a buffer zone between the two doors. In normal situations, personnel can enter the buffer zone when door A is opened if permission is given by iris recognition system. Once door A is closed, door B is opened by the iris recognition system to allow entry into the internal area. A similar procedure is required when personnel exits.
(2) Visitor management
Visitors must conduct iris recognition and alignment before meeting the prisoners. Once the identification is successful, the permission for the meeting is granted. The police officer can then lead the visitor to the reception area to meet with the prisoner.
After the meeting, iris recognition and alignment are conducted again. Once the identification is successful, the visitor is granted permission to leave and the officer can guide the visitor to leave the supervised area. This stringent visitor recognition procedure can effectively prevent situations such as the entry of impersonated visitors or the exit of prisoners.
(3) Prisoner management
Prisoners management is divided into daily roll call management and access control management. Prisoners perform iris recognition at a fixed time daily. A positive identification indicates a successful rollcall registration, so as to allow prison officers to keep track of the prisoners’status.
When a prisoner comes to prison, the system registers his iris and identity information. If he need to leave the prison due to a specific reason, iris recognition is used to confirm his unique identity and permission to leave will be granted only after a successful identification. This automatic, efficient and accurate iris recognition and authorization system can effectively circumvent any manual errors.