RFID intelligent vehicle identification management system
[ad_1]
1. System overview
Current vehicle management usually adopts two modes: manual management and IC card close-range management. However, the large number and the frequent ingress and egress have led to cumbersome approval and registration procedures and extremely low efficiency, and the accuracy of data is also very limited. The main defects are have:
1. For manual management, the labor intensity is high, the approval procedures are complicated, the manual delivery form has many loopholes and it is not easy to query, the entry and exit time records are inaccurate, the efficiency is low, and the error rate is high. It is difficult to identify whether the local license plate of the cadre himself and his family members is an in-hospital vehicle or a temporary visiting vehicle. Even if there is a parking permit, it is sometimes difficult to distinguish the authenticity of the vehicle.
2. For the short-distance management method of IC card, the vehicle must stop to pick up the card, which is slow and cumbersome procedures.
Use RFID or barcode scanning, based on the research results of GPS, PDA, GPRS/CDMA network technology to achieve an excellent solution for vehicle management.The system uses RFID technology to give each vehicle a unique electronic label, and uses RFID or barcode scanning and GPS to implement the entire process control and management of each link of vehicle transportation, and standardize operations in all links such as the entire departure, transportation transfer, and vehicle return.
The intelligent vehicle safety management system based on UHF RFID technology can provide independent and uninterrupted system equipment for the passage of vehicles, and realize convenient management of vehicles. It has the characteristics of high reliability, high recognition rate, easy installation and maintenance, without manual intervention. , Automatically complete a series of on-site data collection, comparison and switch control work, saving manpower, improving work efficiency, reducing human errors and illegal release. At the same time, it also provides a new high-tech defender for the security of the entire camp.
2. System composition
The system is mainly composed of RFID hardware (electronic tags, readers, antennas) system and safety management software system:
1. RFID hardware system
[Electronic label]The electronic label records the legal number of the identified vehicle registered in the management department and the photo of the hijacked vehicle. Through the system software, each tag can be authorized to identify whether the vehicle has the right to pass through the door.
[Smart RFID Reader]Installed at gates and entrances, vehicles passing through traffic intersections that need to be monitored, responsible for driving the antenna to transmit signals or receiving signals returned by the antenna, analyze and process the electronic tag data placed on the vehicle, and transmit these data to the system at the same time In the PC server, the system software can quickly identify and record the incoming and outgoing vehicles.
[Radio frequency antenna]It is used to transmit wireless signals to activate the electronic tag, and at the same time receive the wireless radio frequency signals fed back by the electronic vehicle license, and transmit these signals to the reader.
2. Safety management software system
【Personnel Registration】Enter vehicle user information. Including: name, gender, date of birth, validity period of the certificate, department, unit or address, contact number, and photo.
[Vehicle Registration]Entry of vehicle volume information. Including: vehicle license number, vehicle type, driver, permitted driver (person who is allowed to drive the vehicle), engine number, frame number, make model, load, seat, user or unit, vehicle owner, vehicle photo Wait.
【Driver Registration】Enter driver information. Including: name, gender, date of birth, driver’s license number, date of obtaining the license, validity period of the certificate, type of license to drive, working hours, unit or address, contact phone number, and photo.
[Vehicle use application management]The user applies for the use of the vehicle. Including: date, vehicle license number, applicant, reason for using the vehicle, approval status, location (or range) of the vehicle, and time of entry and exit of the application.
[Vehicle use approval management]Approval of the vehicle application. Including: date, vehicle license number, applicant, the reason for using the vehicle, approval status, location of the vehicle, and approved time of entry and exit, etc.
[Vehicle Accident Record Management]Record vehicle violations. Including: accident time, accident vehicle driver information, accident vehicle registration information.
[Vehicle usage behavior query]Comprehensive query on vehicle conditions. Including: current status, historical records, violations, and safety values. (Vehicle license number, time, access conditions, driver, user unit, approver, reason, location, mileage).
[Real-time vehicle information screen]Real-time display of all vehicle status information. Including: license plate number, applicant, approver, actual time of entry and exit, etc.
【Vehicle Cost Management】Registration of tariffs during vehicle use.
[Vehicle refueling management]Registration of refueling conditions during vehicle use.
【Vehicle Maintenance Management】Registration of vehicle maintenance in use.
[Management of vehicle annual review]The registration of the annual review of vehicles in use.
[Entry and exit monitoring]Real-time monitoring and effective management of the vehicle entry and exit process.
3. System workflow
The RFID vehicle management system involves card issuance, basic data entry, vehicle exit application and approval, entry and exit monitoring, and record query.
1. Issuing cards
The electronic tag is made into a vehicle license, and then the data information in the vehicle license is read through the card issuing device and uploaded to the PC, and the electronic vehicle license is authorized through the software system. After completing the information input, fix the electronic vehicle certificate to the vehicle body or paste it on the window glass.
2. Data entry
Enter relevant information such as car users, vehicles, drivers, and approvers.
3. Vehicle application and approval
According to agency vehicle use management regulations, any unit or individual must obtain an application and approval before using a vehicle. Before the user uses the vehicle, he applies for the use of the vehicle application system through the unit’s internal network to the superior management personnel. After receiving the application, the management personnel will give an approval and the result will be automatically sent to the system. If the approval is passed, the vehicle is allowed to go out; if the approval is not passed, the vehicle goes out illegally and immediately report to the police.
4. Access monitoring
When the vehicle enters or exits the gate or the supervision area, the data acquisition system automatically collects the data in the electronic vehicle license for registration and judgment. The system is in automatic monitoring and acquisition status. When a legal vehicle enters and exits, the system passes the judgment and displays the release so that the vehicle can pass freely. At the same time, the system will record the time of vehicle entry and exit; when an illegal vehicle enters and exits, the system will automatically alarm and the automatic barrier will not be opened; only when the tag is damaged, The system will automatically prompt, and the staff can change the card, or manually release it. At the same time, the system will automatically control the surveillance cameras to take photos or videos of passing vehicles, and the image data will be automatically stored by the computer for inquiries.
5. Record query
According to multi-directional combination conditions such as time and vehicle information, the system can query and manage vehicle traffic data in real time to meet management requirements.
Four, system characteristics
1. Anti-counterfeiting
Every RFID tag has a unique UID number in the world, and it is unmodifiable, so RFID technology has unparalleled anti-counterfeiting performance. In the RFID tag, in addition to the UID number, there is also a part of the DATA area, which can write some data information. The vehicle number plate and license information can be encrypted and written into this area, which also has a high anti-counterfeiting feature. Through the control of the vehicle barrier system by the reader, vehicles with false certificates or unauthorized entry and exit cannot enter or exit specific areas at all.
2. Anti-borrowing
Because the vehicle license plate information can be encrypted and written into the label, and the image data in the system database can be called, it can be distinguished whether a certain vehicle has the right to use the vehicle license, so as to prevent the phenomenon of vehicle license borrowing. The vehicle is unified or the license, vehicle, and driver are unified.
3. Anti-theft
If a vehicle license is accidentally lost, we can not only use the above methods to determine whether a vehicle has the right to use the vehicle license from the unity of the vehicle license number and the vehicle license. It is also possible to invalidate the vehicle license by reporting the loss of the owner. Once a vehicle tries to enter a certain area with the vehicle license report, it can be recognized on the spot.
4. Vehicle statistics
Since vehicles will be automatically recognized by the reader when entering and exiting the gate, how many vehicles are in a certain compound, which vehicles have gone out, and where have they gone? And those vehicles that are on standby can be counted in real time of.
[ad_2]