Security and anti-theft information management solutions for transportation vehicles in distribution centers
[ad_1]
1. Current situation analysis
In recent years, as a new type of retail industry, large supermarket chains have brought about the second revolution in commerce, and they are developing rapidly and vigorously. The distribution center is the distribution center of logistics and distribution. The experience of many large and medium chain supermarkets in the process of operation is that there will be no stable and healthy development of chain supermarkets without distribution centers. Therefore, chain supermarkets must pay attention to the construction of distribution centers. Give extremely high attention. The distribution and transportation from the distribution center to the branches is also one of the most important links of the entire logistics management, and the transportation to each branch is the final guarantee for the entire distribution.
The current situation of the transportation link is that the volume of goods is large, the types are many, the distance is close, the outlets are many and scattered, there are many employees, and the management is difficult. There are still a series of problems as follows:
1. It is difficult to guarantee the safety of goods in transit. Even with the use of vans, commodity theft or shoddy goods replacement often occur during the transit of goods, even causing safety hazards, which seriously affects the company’s reputation and causes the company to suffer heavy economic losses. The general prevention method is to use lead seals for anti-theft management. Because ordinary plastics have low anti-counterfeiting performance, the same lead seals can be easily purchased for replacement, or they can be easily opened without damage; although traditional padlocks are stronger, they can still be easily copied. , Or was pryed open artificially. Commodities lack safety guarantees during transportation.
2. The degree of informatization management of transportation vehicles is low. Although most of the vehicles are provided by third-party logistics companies, the vehicles are equipped with GPS positioning systems, but they are not integrated with the company’s information management. For the driving route of the vehicle, where to go, when to leave, when to arrive at the branch, and when to return, it is still a blind spot for monitoring. Therefore, the transportation efficiency of vehicles cannot be improved, which affects the company’s overall distribution efficiency and causes low performance.
3. It is difficult to confirm the responsibility in the process of commodity handover. As the vehicle arrives at the branch, it is difficult for the management personnel to monitor who opened the door and when the door was opened; who closed the door and when the door was closed. It is difficult for the management personnel to monitor, and it is difficult to clarify the responsibility for accidents such as loss of goods, which brings inconvenience to management.
2. System function
1. Using high-protection RFID radio frequency identification technology, the system automatically randomly generated SMS key and picture recognition and other unlocking methods, the unlocking command is transmitted to the handheld terminal through GPRS, and the handheld terminal authorizes the Bluetooth access control controller to execute the door The lock is opened and closed. The closing and closing instructions of the door lock are all controlled by the terminal server, which cannot be cracked, and the anti-theft level is high.
2. Whether the delivery vehicle opens and closes the door after arriving at the branch, the three-dimensional coordinates are determined by the on-board GPS positioning and sent back to the server. The server will determine according to the branch address planned in advance and save it on the server for query. If the vehicle does not enter the designated position, the door cannot be opened.
3. The hand-held terminal and authorized IC card held by the person in charge of receiving goods in each branch, swipe the card to open the door, or the SMS key and picture automatically generated by the server to open the door, the authorized IC card identity and SMS key held by the applicant, verification picture Applicants of are confirmed by the system server, verified with the system server, and saved on the server for query. Therefore, the identity of the person responsible for opening the door is clarified, and the related responsibilities are also clarified.
4. The time of opening the door of the delivery vehicle to load and unload the goods, as well as the time of closing the door after loading and unloading the goods, are all returned by the system to the system server for storage for query.
Three, system topology diagram (omitted)
Fourth, the system process
1. Hand-held terminal authentication and login.
2. Swipe to open the door.
3. Open the door with the SMS secret key.
4. The picture confirms the opening of the door.
Five, system advantages
[High degree of informatization]The system integrates vehicle GPS positioning, GPRS communication and transmission functions, as well as Bluetooth,RFIDA variety of information technology such as wireless identification technology is highly integrated, focusing on data integration and process optimization in information construction, and supporting users’ customization of personalized services; handheld terminals and servers communicate through the network through GPRS to complete the real-time upload of data, And unified centralized processing by the server.
[High compatibility]Supports the processing of different types and structures of data, and provides standard program interfaces and communication service mechanisms through data formats based on Extensible Markup Language (XML); migration operations through heterogeneous data table structure , To standardize heterogeneous data; Bluetooth master controller, using mainstream MCU, strong fault tolerance; handheld terminal using market popular NFC smart phone, product technology is mature, easy to buy and easy to configure.
[High security]The door lock is embedded in the door, unless it is physically damaged or cut, the door cannot be opened; the authorization information of the door lock is completed by the server; the opening and closing keys of the communication process are all encrypted; all handheld terminals are With a unique ID, unauthorized handheld terminals cannot perform authentication procedures; all door locks have unique IDs and the key to open the door is updated in real time; all RFID cards have unique IDs that cannot be copied; both RFID cards and handheld terminals can be deactivated in the background and take effect in real time ; Door opening conditions can be combined at will (time, location, RFID card, SMS authentication, management background)
[Initial investment cost is low]In the existing market products, custom-made handheld terminals are generally used to read information about items. The development of custom-made handheld terminals is more difficult and the cycle is relatively long, so handheld The end product is more expensive. Now we use convenient smart phones, as handheld terminals, not only the price is relatively lower, but also can shorten the development cycle.
[Low cost of operation and maintenance]The use of mobile phones is easy to operate and has strong versatility, which will bring convenience to the later maintenance of the product. At the same time, the preliminary training is relatively easy, and the adjustment of the later technical personnel can also be easily achieved. Using modularization and high integration mode, modular management mode can be used to achieve product upgrades, reduce the difficulty of management and maintenance, and relatively reduce the cost of management and maintenance.
[Energy saving and environmental protection]The handheld terminal adopts the latest low-power Bluetooth 4.0 technology, which reduces the overall power consumption of the handheld terminal itself. The system adopts low power consumption modules to minimize the power consumption of the system as much as possible. At the same time, the Bluetooth controller is also powered by a car battery or a lithium battery, which not only guarantees the power, but also can be easily moved and charged.
[Quick and easy operation]Simple software interface display, stylish and exquisite visual experience, simple and reasonable personalized page layout, more in line with Chinese operating habits, easy to grasp; traditional software login, you need to enter account, password, verification code and other information , More cumbersome. The software login is verified according to the device ID (with uniqueness), eliminating the cumbersome login method before, and the system automatically verifies the identity information; the function operation has a picture demonstration and a sound reminder to guide the user’s operation.
Six, system composition
1. Door lock: zinc alloy base, handle, stainless steel bolt; mechanical mechanism, with bolt, associated with electric actuator; handle can be rotated 90°, one-way locking stroke 25mm, three-point locking; in the lock body structure Under the same condition, the left and right door opening can be adjusted by changing the direction of the positioning parts.
2. Bluetooth access control controller: adopts Bluetooth 4.0 technology, dual-mode car battery and lithium battery power supply. Receive the data information transmitted by the smart phone, and issue an execution command to the door lock after processing.
3. Smart phone: smart NFC phone with Bluetooth 4.0 short-range communication function, GPRS or 3G communication function, Android operating system.
4. Terminal management software: management terminal software, divided into management role assignment, permission setting, authorization, prohibition, query and other functions.
5. Mobile APP application: on-site operation management.
6. Central server
7. Data storage server
8. Mobile SMS server
9. Computer room switch
10. Firewall
[ad_2]