Application of active RFID in asset identification and monitoring system
[ad_1]
system requirement
Based on activeRFIDTechnical secret-related asset tracking management is mainly used for the management objects of secret-related information (that is, secret-related information carriers, divided into: paper carriers and electronic carriers) and application objects (that is, people who contact, use, and keep secret-related information) Management. Organically combine secret-related targets and management units, and incorporate them into effective management control through the management chain.
Mark important information objects with RFID tags to make them a target, and store the target data in a database (database) to make them an identifiable target, and deploy target identification and data collection equipment-RFID reading in different management units and monitoring points It reads the target data that enters the signal coverage area of ββthe reader (data acquisition platform); transmits the data to the management server through a wired or wireless network (data transmission platform), and analyzes the data through various configured modules. Judgment and release (service platform); respond to the target behavior according to the module configuration. Realize the safe and effective management of important information carriers, involved personnel, and related behaviors.
This technology is being vigorously promoted by the U.S. Department of Defense, and the full deployment of troops will begin in the first half of this year.Our countryRFID World NetAt the beginning of the year, relevant technology development white papers and industrial development support policies were also issued.
The active RFID asset identification and monitoring system will essentially change the previous management mode. Based on the “process management” of important information, it not only includes the management of the object itself, but more importantly, it can generate, move, and move important information. The operation process of a series of events such as dissemination, storage, inspection, etc. is tracked and managed. Management events are always accompanied by the development process of things. They are recorded, analyzed, and summarized, evaluated, judged, and issued early warnings and alarms according to pre-established rules. It can manage matters more humanely and get rid of the interference of human factors at the same time, embodying “humanities, science and technology, humanities management”.
application solution
We use activeelectronic labelTo correspond to each secret-related asset, a special mode is adopted to separate the electronic label and the secret-related asset not easily. Managers can quickly store, retrieve, and locate target items through the system, and can also monitor asset locations in designated areas in real time.
The system consists of three parts: front-end data acquisition equipment (active tag + reader), front-end management system and back-end management system. The following is a simple function description of the system:
The asset tag is fixed on the secret-related asset and serves as the only identity document for the asset; the reader can be deployed at doorways, passages, storage rooms, and other places that require special attention. Two modes can be used to monitor the movement of classified assets: one is continuous monitoring, such as in a storage room,ReaderIt will continue to collect the signal of the tag. If it is found that the tag cannot be read within a period of time, an alarm signal will be triggered; the other is at the door or passage, if the reader collects an asset movement signal that has not been filed in advance, an alarm will be triggered Signal. The reader can process the signal collection of 200 tags at the same time, and the signal sent by the tags can be read at the asset moving speed of 120 km/h.Confidential assetsRFID World NetIt will not move by itself, so when the secret asset moves, someone must bring it in and out. When a person carries a supervised secret-related asset through the export, the exported RFID reader will read the ID numbers of both the person and the secret-related asset, and query the server to find that this secret-related asset belongs to the scope of supervision and has not yet Get authorization to leave. The antenna at the door will automatically send out sound and light alarms; the server will send the personnel and secret-related asset information represented by the two ID numbers to the asset management department and the security control room, and display the monitoring point from which it flows. Make the relevant supervisory personnel arrive at the monitoring point where the alarm occurs as soon as possible, and carry out further processing.
Program features
Long distance: The reading distance is up to 80 meters, and can be adjusted according to actual needs.
Stable operation: The active card has a stable reading distance and is not easily affected by the surrounding environment. Moreover, the active card can effectively break through the shielding effect of the automobile’s explosion-proof metal mesh, and smoothly exchange data with the reader.
It supports high-speed mobile reading, and the moving speed of the identification card can reach 200 km/h.
High reliability, it can operate normally within the ambient temperature of -30β-85β, especially in the low temperature in the north and high temperature in the south, it has more advantages, and it can effectively resist dust and pollutants in the air.
High anti-interference: There are no special requirements for various interference sources on site, and the installation is convenient and simple.
There is no need to apply for and pay for the ISM microwave frequency band that is open worldwide.
Ultra-low power consumption: long service life, low average cost, and it is safer and healthier for the human body without radiation damage.
Applications:
East China Normal University Computer Room Asset Management
[ad_2]