မီးရထား
Operation passage door of high-speed railway protection fence
Refined management solution
နောက်ခံသမိုင်း
အကာအကွယ်စည်းရိုးများနှင့်ပတ်သက်သည့် မတော်တဆမှုများ မကြာခဏဖြစ်ပွားလေ့ရှိပြီး တံခါးများကို စီမံခန့်ခွဲခြင်းကို လျစ်လျူရှု၍မရပါ။
-
Two construction workers climbed the railway protection net and entered the railway line under the instruction of the person in charge, and were dealt with on the spot by the police of Jianshi Railway Station Police Station of Xiangyang Railway Public Security Department.
-
Entering through the breach of the railway line protection fence illegally and walking on the railway line, colliding with a running train, resulting in 3 deaths.
လက်ရှိအခြေအနေ
The traditional door locks of high-speed railway protection fence do not have the functions of waterproof, anti-prying and anti-theft opening, and fail to meet the requirements of "changing from outside to inside and from exposed to hidden" of the head office.
Regular inspections cannot be supervised in place, and the rust and damage of the locks are only known after the incidents occur.
Project framework
-
Cloud စီမံခန့်ခွဲမှုပလပ်ဖောင်း
The platform centrally manages personnel, keys, locks, and the opening and locking permissions of the keys held by authorized personnel. It reads key information and relevant opening and closing records of locks in real time. Big data visualization for statistical analysis and monitoring. -
Mobile phone mini program
Functions such as lock management and positioning, applying for or receiving tasks, executing tasks, reporting abnormalities, inspecting, approving, monitoring, and statistical data, etc. -
Intelligent NB Iot electronic key
Physical intelligent key, obtaining platform tasks by authority, time, and personnel, unlocking and automatically uploading operation logs internally. -
Passive electronic lock
Passive, waterproof, anti-theft, and anti-prying. The main material of the lock cylinder is stainless steel 304. It is an electronic lock cylinder with a built-in control chip and electric drive part, automatically identifying the switch personnel. Various specifications and models of locks are suitable for various scenarios.
Solution: Cloudmanagement platform
-
System workbench
with tree structure management being clear at a glance. -
သော့ခတ်စီမံခန့်ခွဲမှု
combining the list and map presentation methods to make each lock clearly visible -
ဌာနစီမံခန့်ခွဲမှု
structured organization management -
အချက်အလက်ဖတ်ပါ။
Put the key on the card issuer to easily read the data. -
သော့ကိုစီမံခန့်ခွဲမှု
set the unlocking permission and time limit for each key, set the period for taking out and returning, and bind the users at the same time. -
Switch records
The records of opening and locking are clear at a glance.
Solution: NB-IOT Key
1.အထောက်အထား အသိအမှတ်ပြုခြင်း။
The key has the function of effectively identifying the identity of the user, preventing the key from being illegally duplicated when lost and illegally unlocked, and protecting the rights and interests of the key holder.
2.မှတ်တမ်းတင်ခြင်း function ကို
The intelligent key itself can record operator information, the start and end time of the switch lock operation, and the lock information, etc.
3.အဝေးထိန်းစနစ်
Using NB-IoT communication and Bluetooth communication, it can automatically upload the switch lock information or remotely monitor the switch lock operation through the mobile phone.
4.Key security
If the key is lost, the following solutions are available:
1. The key authorization can be deleted on the management platform.
2. The key can be deleted on the management platform.
Solution: Passive smart lock
Technical functions
1、Eliminate technical unlocking: Adopt digital coding technology and encrypted communication technology;
2、No mutual rate: 64*8-digit coding, the mutual rate is zero;
3、With switch lock records, switch lock must be operated with a key;
4、The lock cylinder stores 22 operation (unlocking, locking, patrol, etc.) logs.
နည်းပညာဆိုင်ရာ parameters တွေကို
1、Main material of the lock body: 304 stainless steel
2、Voltage: 3V - 5.5V
3、Working temperature: -40~80℃
4、Working humidity: 20% - 98%
5、Switching times: 300,000 times
6、Storable logs: 22 items
7、Protection level IP67
Solution: Rim lock
1.Technical functions
1、Eliminate technical unlocking: Adopt digital coding technology and encrypted communication technology;
2、No mutual rate: 64*8-digit coding, the mutual rate is zero;
3、With switch lock records, switch lock must be operated with a key;
4、The lock cylinder stores 22 operation (unlocking, locking, patrol, etc.) logs.
2.Technical ဘောင်များ
1、Lock body main material: 304 SUS
2、Voltage: 3V - 5.5V
3、Working temperature: -40~80℃
4、Working humidity: 20% - 98%
5、Switching times: 300,000 times
6、Storable logs: 22 items
7、Protection level IP67
3.Scene description:
Used in the emergency evacuation passage of the bridge.
The lock can be unlocked with an authorized electronic key from the outside;
In an emergency inside, simply rotate the knob to unlock.
Solution: Phone mini program
အဆင်ပြေမြန်ဆန်
No installation is required and it is suitable for various types of mobile phones
Task application
Initiate task application processing based on the inspection status.
ကျွန်ုပ်၏စက်ပစ္စည်းများ
Showing the maintained devices of the operators in a tree structure
လည်ပတ်မှုမှတ်တမ်းများ
Clearly display the operation logs of the locks.
ကုန်ပစ္စည်းအားသာချက်များ
-
Task ကိုစီမံခန့်ခွဲမှု
Set the unlocking area, period and operation authority for on-site operators according to the needs of on-site work, remote unlocking and remote upgrade. -
ဝန်ထမ်းစီမံခန့်ခွဲမှု
Management of information of system administrators and on-site operators, and authority setting. -
မှတ်တမ်းစီမံခန့်ခွဲမှု
View, count and output self-check logs and operation logs. -
သော့ခတ်စီမံခန့်ခွဲမှု
Lock group information, lock files, and hierarchical management of locks. -
အချက်ပေးအချက်အလက်များ
View alarm information related to locks and tasks. -
သော့ကိုစီမံခန့်ခွဲမှု
Key files, key status management, task download.
အဆင်သင့်ခြင်း
-
There is a big bunch of keys, and finding the right one is also a difficult problem.
-
"One Key Pass", convenient for unlocking
လုံခွုံရေး
-
If a key is lost, there is a security risk. All the keys need to be replaced if one is lost.
-
If the key is lost, the following solutions are available:
1. The key authorization can be deleted on the management platform.
2. The key can be deleted on the management platform.
သန့်စင်ခြင်း
-
Manual ledger registration is prone to loopholes, making it difficult to track and manage the unlocking time, and the operators are uncontrollable.
-
1. Assign tasks, time, and personnel, and authorize staff to switch on and off at each level;
2. Relevant logs are stored in the cloud for real-time viewing and easy tracking.
visualization
-
The person who unlocked the lock / The time of unlocking cannot be known.
-
The person who unlocked the lock / The time of unlocking are clear at a glance.
Tasks, inspections, lock status, etc. can all be remotely monitored.
GPS positioning / navigation
-
The protective fences are scattered along the railway at various locations. During the processes of operation and maintenance inspection and equipment emergency repair, a lot of time and energy are needed to find the specific locations.
-
The mobile phone mini-program has the GPS navigation function, which enables the staff to arrive at the designated site at the first time, greatly saving the time for finding the station and improving work efficiency.