RFID community security applications make the community environment more harmonious!

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

RFID technology is becoming more and more mature, and its application fields are becoming more and more extensive. RFID technology is also widely used in the security system of the community. The security application of the RFID community realizes the monitoring and positioning of all personnel and vehicles entering the community. It truly combines the application of RFID technology with the security of the community. Realize the positioning and information processing of each person and vehicle entering the community, and provide protection for the safety of the community.

Radio frequency identification technology is a wireless communication technology that can identify specific targets and read and write related data through radio signals without requiring mechanical or optical contact between the identification system and specific targets. The radio signal is an electromagnetic field tuned to a radio frequency to transmit data from the tag attached to the item to automatically identify and track the item. Some tags can get energy from the electromagnetic field emitted by the recognizer during identification, and do not need a battery; there are also tags that have a power source and can actively emit radio waves (electromagnetic fields adjusted to radio frequencies). The label contains electronically stored information that can be identified within a few meters. Unlike the barcode, the radio frequency tag does not need to be in the line of sight of the recognizer, and can also be embedded in the tracked object.

1. RFID composition and working principle

1. The system is divided into three parts

(1) Label (Tas)

The label is equivalent to the bar code symbol in the bar code technology, used to store the information that needs to be identified and transmitted.

(2) Reader

Depending on the types of tags supported and the completed functions, the complexity of the reader is significantly different. The basic function of the reader is to provide a way for data transmission with the tag. In addition, the reader also provides quite complex signal state control, parity error checking and correction functions.

(3) Antenna

The antenna is a transmitting and receiving device that transmits data between the tag and the reader.

2. Working principle

RFID technology is a technology that uses radio frequency signals through spatial coupling (alternating magnetic field or electromagnetic field) to achieve contactless information transmission and achieve automatic identification through the transmitted information. The working principle is: the use of radio frequency signals and spatial coupling transmission characteristics to realize automatic identification of the identified objects. Working process: When the item with the electronic tag is within the readable range of the reader, the reader emits a magnetic field, the query signal will activate the tag, and the tag requires a reflection signal according to the received query signal, and the reader receives After the signal reflected by the label, the electronic data stored in the electronic label is read and identified without contact through the decoding process of the internal circuit, so as to achieve the purpose of automatically identifying the object. And then further realize the collection, processing and remote transmission management functions of the object identification information through the computer and computer network.

2. Current status of community security technology

At present, the main function of the community security system is safety precautions. In order to create a safe and comfortable living environment for the residents of the community, it is necessary to have a high-standard and intelligent security system. Now most communities still use the patrol and duty methods of security personnel. This traditional method is inefficient and requires personnel. The amount of labor is large, and unsafe factors cannot be well controlled. Even if some high-end communities adopt advanced intelligence equipment and are equipped with relatively high-quality security personnel, these devices have the disadvantages of expensive and easy to be damaged by humans. In short, the security effect is not obvious.

3. Structural design and working process

1. Structural design

Taking into account the diversity and complexity of the road sections that the buildings and people in the community may pass through, it is necessary to install several readers and exchange them with the computer of the monitoring center through the communication line. At the same time, an electronic tag is placed on each vehicle of the personnel entering the community to monitor and locate it.

In the working process of the RFID system, energy is always the basis, and data exchange is realized through a certain time sequence. The reader provides working energy to the electronic tag. When the electronic tag enters the radio frequency identification field, the radio frequency wave emitted by the reader activates the tag circuit, interacts, and completes the data exchange. For simultaneous reading of multiple tags, either the reader or the tag can be used.

In order to realize multi-tag reading at the same time without conflict, the reader first issues isolation commands to a batch of tags, so that multiple electronic tags within the reading range of the reader are isolated, and finally only one tag is kept in an active state, and no conflict is established with the reader. Communication link. For the tag-first approach, the tag randomly sends its own identification ID repeatedly, and different tags can be read correctly by the reader at different time periods, and multiple tags can be read simultaneously. For any electronic tag, it has a unique ID number. In most applications, the data attributes of the tag are supported by the use of a back-end database. The interface between the reader and the application system is represented by a standard function called by the development tool. The functions roughly include the following aspects: the application system issues configuration commands and other instructions to the reader as needed; the reader returns its current configuration status and the execution results of various instructions to the application system.

2. Work process

Each vehicle entering the community must wear an identity card (including personnel card and vehicle card) issued by the security guard-radio frequency identification tag when passing through the gates of the community. Its chip contains a unique identification code and a user-specified code. Information, they can be read out by a reader in a non-contact manner within a certain distance. The dynamic monitoring system based on radio frequency identification technology can simultaneously track and identify multiple target objects with radio frequency tags within a certain range without contact, high speed and accuracy, so only place radio frequency identification tags on vehicles entering the community (Usually packaged in the form of a card, so it is also called a radio frequency card), when the personnel and vehicles entering the community drive within the effective reading range of the reader, the reader of the system will automatically read the radio frequency held by the personnel and vehicles Identify the ID number of the tag, and then the system will transmit the ID number of this tag and related information about the driving of personnel and vehicles to the background system for processing.

Four. Feasibility analysis

After the previous introduction, it can be argued that the security problems that plagued the community have been resolved to a large extent, and the effective identification, monitoring, monitoring and positioning of personnel and vehicles in the community have been realized, so that the security system of the community fully reflects the “humanization, information” The goal of digital community is achieved. At the same time, the production cost of RFID identity cards is lower and the investment is less. Therefore, it is feasible to apply this technology in the community security system.

5. RFID technology in the community

The overall design in the security system

1. Functional design

The basic functions realized by RFID technology in personnel location management include:

①Recognition: How many people or vehicles are there at any time or in a certain place, and who can fully identify these people or vehicles;

②Recording: the activity trajectory of all people and vehicles entering the community at any time in the community can be recorded in the database;

③Positioning: The community monitoring center can remotely monitor people and vehicles entering the community;

④ Inquire about a series of information such as the arrival/departure time and total stay time of relevant personnel and vehicles at any location, so as to supervise and confirm whether important inspectors conduct the test and processing of various data on time and at the point, and fundamentally eliminate the cause Related safety issues caused by negligence.

⑤ Anti-cheating: The monitoring center can automatically recognize the identity card that the personnel and vehicles entering the community lose or discard during driving.

2. Design plan

Install several readers in the various passages of the community and the passages through which people may pass, and exchange them with the computer of the ground monitoring center through the communication line. At the same time, an RFID electronic tag identity card is placed on each vehicle entering the community. When a vehicle enters the community, as long as it passes or approaches any reader placed in the passage, the reader will sense the signal and upload it immediately. On the computer in the monitoring center, the computer can determine the specific information (such as: who, where, and the specific time), and the manager can also click on any location in the community according to the distribution diagram on the big screen or on the computer. The computer will then count and display the personnel in this area.

3. The system is complete

The information processing system is the core of the entire community security system, consisting of a database system and a corresponding application software system. The system can complete functions such as recording, querying and processing related information on the travel path of personnel and vehicles. For example, it can query the travel path information of the personnel and vehicles that entered the community on March 1513, 2007.

6. Prospects of RFID technology

Radio frequency identification technology has now become a very hot topic, and the RFID technology market will become more and more extensive in the future. Along with this, there is a huge demand for servers, data storage systems, database programs, business management software, consulting services, and other computer infrastructure. Many high-tech companies are stepping up the development of RFID-specific software and hardware, and have invested heavily in the development of this technology and solutions. Therefore, it can be said that RFID technology is becoming a hot new technology in the world.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare