Swimming competition CPU card certificate management system project application case

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

In 2011, Shanghai Pujiang Smart Card System Co., Ltd. (hereinafter referred to as the company) obtained the qualification for the certificate management system project of the 14th World Swimming Championships.

The safety of this project is the first factor. The company provides all-round, full-service, all-weather services, and has produced nearly 100 types of ID cards including personnel, vehicles, consumption, publicity, advertising, etc., as well as all verification card offices. It has achieved the goals of zero failure, zero error and zero complaint, providing safety guarantee for the participating teams and spectators at home and abroad.

This time, the personnel pass inspection system of the World Swimming Championships Certificate Management System is responsible for the inspection of the pass certificates of the participants, staff, construction personnel and spectators entering and leaving the competition area. It is the first security line of defense when entering the Expo site. The project has successfully used related technologies of the Internet of Things, using RFID, receiving induction equipment, numerical control center, technical defense monitoring and related software accessories.

The system selects the non-contact passive CPU card as the medium of the pass, and the working frequency adopts 13.56Mhz. read memory) in the COS (on-chip operating system). The CPU card equipped with COS is equivalent to a microcomputer, which not only has the function of data storage, but also has functions such as command processing and data security protection, and through ROM reverse extraction, memory data encryption, enhances the security of information in the card, To ensure the rapidity and convenience of the use of the certificate, the card reading-display photo-manual comparison method is adopted to complete the inspection of the certificate and the confirmation of the certificate holder, and at the same time, the opening and closing of the passage gate is automatically controlled by the computer to control the passage of personnel. .

The system adopts a multi-level database and network structure, that is, the basic information of personnel is not only stored in the central database, but also stored in the local database. When checking documents, the system can be separated from the central data and run directly by the local data. At the same time, the card stores personal photos, names and other information (the security mechanism of the CPU card ensures the safety and reliability of the data in the card). It is not only used for hand-held device inspection, that is, offline personnel ID detection is adopted, and personnel are checked according to the chip information. Identity, there are constantly patrolling security personnel holding wireless detectors, random detection, the detection is no longer comparing the information on the printed surface of the card, but directly reading the information stored in the chip, while comparing the information in the received database, check the information in the database. Is the photo the same as mine? When the network system or data system of the system fails, it can be used as an emergency data source to support the operation of fixed inspection equipment. This structure not only achieves mutual backup of data, but also improves the reliability of the system.

The design of the whole scheme highlights the principles of convenient and fast use, mature and practical technology, and the system has multiple backup methods, which ensures the efficiency, reliability and safety of the inspection system.

In addition, in the whole application scheme, a variety of user-friendly details are also designed, such as the information buffer of document inspection, and the information buffer column of the first number of personnel is listed on the screen to prevent the information inspection from being delayed when people are crowded and responsible for the entire project application. Comprehensive training and after-sales service.

In various large-scale events and conferences, the adoption of a new type of intelligent security system is in line with the strategic orientation of smart city development, and is conducive to promoting the upgrading of regional industrial structures and the upgrading of high-end RFID products.

Highlights of this application case:

1. In the entire production and transportation process, a full range of safety management is adopted, and emergency plans have been prepared in each link to ensure the goal of zero errors.

2. Adopt non-contact high security CPU module with strict security mechanism, including reverse power analysis module, high and low frequency detection reset module, automatic reset of chip operating frequency beyond the detection range, ROM reverse reverse extraction, memory data encryption, etc.

3. The system can detect documents in two ways: online and offline. By means of serial number (uniqueness), key authentication, etc., the authenticity of documents and personnel is verified.

4. A new image compression algorithm is selected, and the multi-resolution encoding method mainly based on wavelet transform is adopted, and the four modes of JPEG (sequential mode, progressive mode, lossless mode and layered mode) are integrated into one standard. among. At the encoding end, the image is compressed with the maximum compression quality (including distortion-free compression) and the maximum image resolution. At the decoding end, the image can be decompressed from the code stream with any image quality and resolution, and the maximum image quality during encoding can be achieved. And resolution, the picture is only 2-3KB.

5. The system distributes card reading, query, display, control and other work in the running server and each embedded computer, which distributes the work pressure and improves the overall reliability of the system. At the same time, the inspection equipment interacts through the network as a whole. The independence of the system can be easily expanded or reduced without changing the overall structure of the system.

6. The entire central database and each operating database form a mutual backup relationship in terms of data storage and verification services, which effectively improves the overall reliability of the system. At the same time, the use of distributed database design can effectively avoid the interruption of communication network and affect the operation of the system. The fatal impact brought by the system can be separated from the central database within a certain time range and only rely on the operation of the database.

7. Different internal COSs are used for different types of documents, and COS is loaded with applications suitable for corresponding functions, including functions such as personnel inspection, personnel positioning, and security response triggering, to meet the application needs of various types of documents and personnel.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare