Gun management method with intelligent chip identification different from traditional recording

A technology of smart chips and management methods, applied in the field of gun management, can solve problems such as personnel receiving wrongly, receiving other people's guns on behalf of others, and missing registration in the ledger, so as to achieve the effect of preventing wrongly receiving, detailed data, and increasing intervention methods

Inactive Publication Date: 2020-07-31
武汉中安技通信息科技有限公司
5 Cites 2 Cited by

AI-Extracted Technical Summary

Problems solved by technology

[0002] The traditional gun management method is to supervise the use and return of guns by manual means, and manually record the information of gun users and the information of guns received and...
View more

Method used

The firearm management method that the present invention relates to can intelligently identify the identity information of the person with the gun, identify the information of the firearm, and verify whether the corresponding relationship between the personnel and the firearm is legal, whether the identity of the person is illegal, or the firearm is not authorized When people use it, the gates will be intercepted and cannot be released from the warehouse, which greatly enhances the control and safety of guns, and is recorded by computer instead of manual registration. The data is more detailed and accurate, and it is more convenient to query various ledger records; accurate records The information of the person who used the gun and the information of the gun, and through the means of verifying the release of the gate, only legal identities can pass, illegal identities are blocked and intercepted, and closed-loop management to ensure the safety of guns is added. Intervention ...
View more

Abstract

The invention discloses a gun management method with intelligent chip identification different from traditional recording. The gun management method comprises the steps of gun identification chip installation, card issuing and reading, photo taking, face comparison and warehouse-in and warehouse-out recording. According to the gun management method with intelligent chip identification different from traditional recording, which relates to a gun management method, the identity information of a gun user can be intelligently identified, the gun information is identified, whether the correspondingrelationship between the personnel and the gun is legal or not is verified, a gate performs interception when the identity of the person is illegal or the gun is not received by an authorizer, the gun can not leave the warehouse, the gun management and control safety is greatly enhanced, manual registration is replaced by computer recording, data is more detailed and more accurate, various machine account records are more convenient to inquire, closed-loop management of gun safety is ensured, intervention means are increased, and the loopholes of mistaken taking, substituted taking and unregistered taking are effectively prevented.

Application Domain

Individual entry/exit registers

Technology Topic

Embedded systemEngineering +3

Image

  • Gun management method with intelligent chip identification different from traditional recording

Examples

  • Experimental program(1)

Example Embodiment

[0019] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.
[0020] See figure 1 , The present invention provides a technical solution: a gun management method with smart chip recognition that is different from traditional records, including the following steps:
[0021] S1: Establish basic data files of personnel and bullets:
[0022] First, install the identification chip in each gun and number them 1, 2, 3..., each identification chip can extract the face information of the gun, and number them as A, B, C..., among them The recognition chip numbered 1 can be set to correspond to the trusted face number A, B, C, AB, AC, BC..., that is, each recognition chip can be set with multiple receivable faces, among which the recognition chip and the face The information encoders are respectively signal connected to the central data processor;
[0023] S2: The card issuer signal is connected to the central data processor, and the card issuer uses the computer to generate electronic tags for personnel and items, and then the warehouse software in the computer issues the card, and reads the ID card through the card reader on the gate control unit, and Push the ID card number through the Android system of the gate control unit and send it to the computer;
[0024] S3: The computer system finds out the corresponding person through the ID card number and calls up the person's photo;
[0025] S4: The computer pushes the photos of the people transferred to the Android system of the gate control unit;
[0026] S5: The face recognition machine is integrated in the gate control unit. When taking the gun, the person taking the gun stands in front of the face recognition machine for face recognition. The face recognition machine is equipped with a camera module, including the camera module and the central data processor. Signal connection, and then compare the image recognized by the camera module in the face recognition machine to the face according to the recalled photo of the person;
[0027] S6: The face comparison is successful, give the gate unlock signal, open the gate, and display the name of the person, the name of the gun and the gun number on the computer screen, if the face comparison fails, the gate will not be closed , And start the alarm, where the alarm signal is connected to the central data processor, and the alarm sounds warning at the gate, and the signal is transmitted to the central data processor, and the background is manually identified according to the alarm information given by the central data processor , Find the illegal intruder immediately;
[0028] S7: According to the gun’s serial number, the person who takes the gun takes out the gun that can be retrieved. After getting the gun, the gate uses the face recognition and the radio frequency identification of the gun identification chip in the gate. After matching the data in the database, the gun is taken The gunman’s behavior of taking the gun is judged. If the data in the information database matches the gunman, the gate can release;
[0029] S8: The computer’s warehousing software is equipped with personnel name recording module, article name recording module, identification chip recording module, entry and exit personnel corresponding number recording module, entry and exit personnel entry and exit time recording module, entry and exit personnel entry and exit status recording module, through the computer The warehousing software in, records personnel names, item names, serial numbers, access status (whether personnel are in or out, whether items are withdrawn or returned), and time; it generates personnel in and out reports, item return reports, and inventory reports.
[0030] Furthermore, the ID card in the S2 is a 125K electronic chip, the card reader is an ID card reader, and the card issuer is an ID card issuer.
[0031] Furthermore, the identification chip in the S7 adopts a 900MHz UHF electronic chip, the card reader used to read the electronic chip is an UHF remote card reader, and the card issuer is an UHF desktop card issuer.
[0032] Furthermore, the data stored in the identification chip includes gun names, specifications and models, purchase batches, etc., and the data stored in the face information encoder includes personnel names, job attributes, department names, certificate numbers, contact information, etc.
[0033] The gun management method involved in the present invention can intelligently identify the identity information of the gun user, identify the gun information, and verify whether the correspondence between the person and the gun is legal, whether the person’s identity is illegal or the gun is not obtained by an authorized person , The gates will be intercepted and cannot be shipped out, which greatly enhances the safety of gun control. It is recorded by a computer instead of manual registration. The data is more detailed and accurate. It is more convenient to query various account records; accurate records of the use of guns Information about people and guns, and through the means of verifying the opening of the gate, it is possible to pass through only with legal identities, blocking and intercepting illegal identities, ensuring closed-loop management of gun safety, increasing intervention methods, and effectively preventing wrong Vulnerabilities of collecting and not registering; the gun information (specification and model, date of purchase, gun body number, gun license number, user information) in the gun management method is written in the gun identification chip, which is 900 Mega-ultra-high-frequency RFID technology does not need to open the box. When personnel carry a gun through the induction area of ​​the high-frequency card reader, the computer can automatically identify which gun it is, who it belongs to, and all gun information and affiliation information; gun identification The chip gives life to every gun. From the purchase of the gun to its destruction, the chip accompanies the gun. The chip is not removable, otherwise it will be damaged. This eliminates the loopholes that separate the chip from the gun and only sense the chip without inspecting the gun.
[0034] Although the embodiments of the present invention have been shown and described, those of ordinary skill in the art can understand that various changes, modifications, and substitutions can be made to these embodiments without departing from the principle and spirit of the present invention. And variations, the scope of the present invention is defined by the appended claims and their equivalents.

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products