RFID intelligent management system for computer room
[ad_1]
1 Introduction
In order to further improve the management level of the computer room, the management system of the computer room is armed with the scientific means of the Internet of Things. The intelligent computer room management system independently developed by Guangzhou Leerpu, through real-time perception of asset location, posture, movement status, and personnel location information, with video linkage, intelligent alarm and patrol monitoring functions, can optimize personnel management methods and control assets. Provide multi-scene 360-degree real-time monitoring and multi-means timely alarm function. The launch of this system will open a new application mode for computer room management.
2 Technical principle
2.1 Information collection
Composed of “electronic tags” and “signal transceivers”, it is equivalent to the human body’s nervous system, realizing the real-time perception and transmission and collection functions of various position and status information.
(1) Assemble the corresponding asset electronic tags for the equipment, such as sticking to the cabinet door or directly sticking to the equipment.
Such as close to the door of the cabinet
(2) The electronic tags worn by the staff in the computer room and security guards can be worn on the chest, hung on the neck, or on the waist.
Hang on the chest
(3) Install signal transceivers in specific areas for remote real-time reception of electronic tag signals, such as on the wall, in the ceiling or on the ground.
Installed on the ceiling
2.2 Information Management and Service
Completed by a specially developed software system. It can be understood as a human brain, capable of comprehensive management and intelligent analysis of the collected information and data, and constructing various intelligent management and service methods such as real-time monitoring, intelligent alarms, and comprehensive management and control according to actual management needs.
3 Construction plan
By arranging signal transceivers and locators at the entrance of the computer room and the main aisle area of the computer room, and affixing electronic tags on the door of the cabinet and the equipment in the cabinet, real-time supervision of the equipment in the cabinet can be realized.
When the cabinet door or equipment is illegally opened or closed, vibrated, moved, or the label is torn, the electronic label can send an alarm signal to the system in time.
When the equipment moves illegally from one area to another, the system can also find out and send out an alarm in time, and the range of moving distance is adjustable.
By wearing electronic tags for the personnel entering the computer room, real-time tracking and monitoring of the personnel entering the room can be realized, such as which areas have passed, which cabinet doors have been opened, and the length of stay. It can also restrict personnel’s access to areas and cabinets through authority management. If a worker enters an unauthorized area or opens an unauthorized cabinet, the system can detect it in time and send out an alarm message.
4 System function
4.1 Smart anti-theft
Intelligent anti-theft mainly refers to attaching electronic tags to the cabinets or equipment in the computer room, and direct and accurate active anti-theft monitoring of the status and location of the cabinets and equipment. Once the asset has the following abnormal conditions, the system will detect it immediately and activate the smart alarm (see smart alarm function):
(1) Vibration;
(2) The cabinet door is opened;
(3) The location of assets changes;
(4) The electronic label is detached, etc.
4.2 Smart Alert
The intelligent alarm function consists of two parts: alarm rule setting, intelligent matching and alarm:
(1) Alarm rule setting-management personnel preset various management rules in the system (including abnormal state of objects, partition defense rules, security work arrangements, personnel authorization rules, etc., see various specific management functions), various violations The alarm methods corresponding to the situation (including mobile phone text messages or APP, monitoring system pop-up windows, on-site sound and light alarms, etc.), and alarm removal rules (including time-limited release, designated personnel on-site release, system operation release, etc.).
(2) Intelligent matching and alerting-the system will intelligently match the situation detected in real time with preset alert rules, filter out violations, and activate corresponding alert methods, such as:
The system pops up an alarm window, and the location and prompt of the alarm source are displayed on the electronic map. Click the alarm icon to view the details and the nearby surveillance video screen.
Acoustic and visual alarms are activated on site.
According to preset alarm rules, send alarm details SMS to relevant personnel.
4.3 Location tracking
The system location tracking functions include:
(1) Specify the location to find any assets or personnel that have been equipped with electronic tags.
(2) Display the movement track within the specified time period.
(3) In the event of an emergency, the whereabouts of objects and personnel can be tracked in real time.
4.4 Video linkage
In addition to traditional video surveillance functions, as described in Smart Alarm, when the system sends out an alarm message, it automatically pops up the corresponding video surveillance screen and automatically starts on-site video recording. To avoid the shortcomings of the monitoring personnel being unable to conduct comprehensive and effective video monitoring due to the small video images of each channel after the screen is split, and to play a timely and active warning role.
4.5 Smart authorization
Smart authorization includes work authorization and access authorization.
(1) Work authorization: Managers can authorize designated personnel in the system (multiple people can be at the same time) to have the authority to maintain the designated equipment. Personnel only need to wear their own electronic tag card to carry out maintenance operations on the designated equipment site, the system is recognized as a legal operation, does not trigger an intelligent alarm, and automatically generates work records and saves them in the system log.
(2) Area authorization: similar to work authorization, it enables authorized personnel to enter and exit the designated area without triggering an intelligent alarm, and at the same time generate personnel entry and exit records.
In the above cases, the corresponding personnel can also be notified by SMS according to preset rules.
4.6 Smart Arming
The system provides intelligent arming setting function:
(1) Partition defense: The manager can separately deploy any designated area, which is convenient for management and maintenance work.
(2) Time-sharing deployment: Managers can pre-set the deployment time, which is convenient for forming an orderly management system.
(3) State-by-state defense: The manager can set the specific state of the designated object to achieve a flexible and practical monitoring and defense mode. For example, there is no need to perform vibration monitoring for the A cabinet, only the tilt monitoring for the B cabinet, and only the door switch monitoring for the C cabinet.
(4) Convenient fort and disarm: use a pre-registered mobile phone to control the fort and disarm status of the entire system through mobile phone text messages; at the same time, the system also supports monitoring systems, mobile apps, etc. for defense and disarming.
4.7 Intelligent statistics of data
Provide professional statistical functions for the data of all functional modules of the system, statistically display through lists, icons, etc., support export or print functions, perform statistical chart analysis on data, and improve management effects. Such as alarm statistics, personnel statistics, cabinet statistics and so on.
5 Operating environment configuration requirements
It will be determined after the actual functional requirements are determined.
6 Hardware equipment
6.1 Signal Transceiver
Indoor signal transceiver
Collect information sent by electronic tags in real time;
It has the characteristics of long recognition distance, high sensitivity, fast recognition speed, and strong anti-interference ability;
Communication via wired network;
Support work abnormal reminder function;
Equipped with power adapter.
6.2 Electronic label (for objects)
(Or other shapes)
Regularly issue its own identification information;
Built-in power supply battery, can be used for 2-4 years;
Support low battery reminder;
With anti-tear function, vibration, tilt sensing function.
Other equipment is temporarily omitted.
7 Engineering construction
Install signal transceivers and locators at the entrance and exit gates and in the machine room. They can be installed on the wall, in the ceiling, or on the ground, so that the signal covers the area that needs to be monitored.
8 Program features
Real-time, active monitoring
Using IoT intelligent sensing technology to realize real-time perception, intelligent discrimination, and intelligent warning of abnormal or unexpected situations in the area, making daily monitoring more intelligent and accurate.
24/7 monitoring, no hindrance to normal work
Directly monitor the cabinet status, without affecting the normal activities of the staff in the area, and play an effective security role.
Real-time video linkage
On the basis of video surveillance, combined with intelligent alarms, it provides a convenient means of video linkage, allowing surveillance video to exert its true power.
Scalability
Based on the lofty perspective, comprehensive planning, open technical standards, with good scalability and compatibility.
Integrated management
“Civil defense-material defense-technical defense” is organically combined to build an integrated management and guarantee mechanism.
Ease of use and visual operation
The system interface is friendly, concise and reasonable, easy to understand and easy to use.
Good stability and operation and maintenance
The company has solid strength, thorough construction and commissioning specifications, and provides high-quality localized operation and maintenance support to ensure the stable operation of the system.
Personalized configuration
Configure functions and hardware devices according to requirements, and support phased and partitioned construction to avoid waste of resources.
9 Engineering benefits
Comprehensively improve the level of security
The organic combination of “civil defense-physical defense-technical defense” comprehensively improves the security management level of the computer room.
Promote the construction of a complete and convenient internal management system
Through the improvement of security management, the improvement of the overall internal management is promoted, and the ability of the management team is demonstrated.
[ad_2]