The Application of RFID Technology in the Management of Military Secret-related Equipment

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

1. Technical introduction

1.1 Introduction to RFID

RFID is the abbreviation of Radio Frequency Identification, that is, radio frequency identification, commonly known as electronic tags.
RFID technology is a non-contact automatic identification technology, which automatically recognizes the target object and obtains related data through radio frequency signals. The identification work does not require manual intervention and can work in various harsh environments. RFID technology can identify high-speed moving objects and can identify multiple tags at the same time, and the operation is quick and convenient.

1.composition

The RFID system consists of readers, antennas, tags and application software.

2.Carrier frequency band

In practical applications of RFID technology, different carrier frequency bands are selected according to different requirements. Under normal circumstances, RFID carrier frequency basically has 3 ranges: low frequency (30kHz~300kHz), high frequency (3MHz~30MHz) and ultra high frequency (300MHz~3GHz). Common working frequencies include low frequency 125kHz and 134.2kHz, high frequency 13.56MHz, ultra high frequency 433Mhz, 860MHz~930MHz, 2.45GHz, etc.

1.2 Technical advantages

Before RFID technology entered the field of practical application, barcode technology assumed the main social function of item identification, and it has been widely used in the fields of commodities and logistics. However, the shortcomings of barcode technology and the advantages of RFID technology (which can be widely used in fields such as production, equipment, logistics, personnel, animals, anti-counterfeiting, positioning, etc.) have made the application fields of RFID technology continue to expand, and its trend to replace barcode technology has gradually form.

RFID technology and barcode technology have similarities in terms of purpose. Both are to quickly and accurately identify and track the target object. The main differences are as follows:

First, RFID technology can identify single and very specific objects (objects with individual characteristics), while barcode technology can only identify one type of object. That is, RFID technology can realize “similar differentiated identification”;
Second, RFID technology has the ability to identify “objects out of sight”, and barcode technology can only identify objects “in sight”;
Third, RFID technology can identify multiple objects at the same time, and barcode technology can only identify one object at a time;
Fourth, the electronic tag of RFID technology has the function of repeated use, and the barcode can only be used once;

2. Security Management of Confidential Articles

The application of RFID technology in the management of military secret-related equipment should fully reflect two points: first, safety prevention; second, safety traceability.

2.1 Application object:

Secret-related computers (notebooks), secret-related hard disks, communication equipment, confidential equipment, U disks, paper-based confidential materials (documents).

2.2 Determine the needs

Confidential articles or equipment involve national security, and reliable security management is an important guarantee to prevent the leakage of secrets. The application of RFID technology to the security management of classified items or equipment is due to the inherent technical advantages of RFID technology: 1. Automatic identification; 2. Out-of-sight identification. These two characteristics of RFID technology can precisely solve the two major problems in security management: 1. If you don’t find (see), you can’t stop it; 2. Manual management errors (omissions) are inevitable.

After RFID technology has established a binding relationship with each security object (computer, communication equipment, etc.), a security management system for confidential items with automatic identification, automatic tracking, automatic alarm, historical tracing, and rapid inspection functions is established. .

2.3 Realization of functions

When the safety management system of RFID technology is established, the following functions can be realized:

1.Automatic Identification
1) Confidential items carried in clothes, parcels, and vehicles are automatically discovered when passing through entrances and exits;
2) For found items, the system automatically judges whether to call the police;

2.Automatic tracking
1) After the confidential item leaves the confidential room or office, it will automatically track the moving route;
2) For the main passages (such as confidential rooms, office building entrances and exits, corridors, etc.) that confidential items pass through, the system automatically remembers the elapsed time;

3.Automatic alarm
1) The system does not issue alarm notifications for confidential items that are allowed (or have approval procedures) to be carried, and only stores the passing records for historical traceability;
2) For unauthorized confidential items, the system will issue an alarm or notification;

4.History
The custodians, recipients, and borrowers of confidential items are bound to the system. After an abnormality occurs, the system automatically generates records of confidential personnel and items.

5.Quick inspection
Quick inspections can be carried out for confidential items and confidential rooms with a high level of confidentiality. Realize the organic combination of technical prevention and manual prevention.
1) The system can instantly prompt whether confidential items are moved, damaged, and moved information;
2) For a confidential room that stores 100 confidential items, an inspection report can be provided within 10 seconds;

2.4 Solution

2.4.1 System design

1. Labels are installed or fixed on confidential items (computers (laptops), confidential hard drives, communication equipment, U disks, etc.).
2. Confidential rooms, offices, corridors, entrances and exits of office buildings, main roads in the courtyard, gates and entrances, etc. must pass through, install remote identifiers.
3. According to the settings of the management system, managers carry mobile identifiers (small display screens) to conduct quick inspections of classified items on a regular or irregular basis.
4. Install necessary alarm equipment and set up appropriate alarm notification methods.
5. Development of application software: security management system for classified items.

2.4.2 System structure diagram

620)this.style.width=620;” border=0>

Three, software and hardware

The RFID system consists of readers, electronic tags, middleware (software), and application management software.

3.1 Hardware

3.1.1 Overview
The hardware of the RFID system includes readers and electronic tags. According to the requirements for the security management of classified items discussed in Chapter 2, the system should select remote readers and electronic tags that are suitable for installation on various devices. For U disk items, it is necessary to design a small and sturdy electronic tag.

According to the characteristics of the security management of classified items, the system should select a reader that can recognize long distances, recognize multiple targets at a time, have high recognition reliability, and can pass through packages or vehicles. Therefore, it is the safest choice to use an integrated (reader and antenna integrated) reader that can read and write active tags in the system.

According to the size and shape of the equipment, electronic tags can choose a variety of special-shaped tags with different requirements and shapes. The label can adapt to the requirements of long distance, high temperature, low temperature, impact resistance, corrosion resistance, and long-term use.

3.1.2 Fixed reader

3.1.2.1 Equipment parameters
Working frequency band: 920-925MHz
Product size: 250X250X60MM
Working voltage: DC—9V±0.5V
Maximum power: 5W
Polarization mode: 7dbi circular polarization
Working temperature: -35℃~+65℃
Storage temperature: -45℃~+85℃
Data interface: RS232, RS485, Wiegand 26 or 34 data interface; reserved external trigger signal access port.
Working mode: trigger and timing optional
Reading distance: when used with active tags, the reliable distance is not less than 15M
Package weight: 2.0㎏

3.1.2.2 Installation location and purpose

620)this.style.width=620;” border=0>

3.1.3 Mobile reader

3.1.3.1 Equipment parameters

Working frequency band: 920-925MHz
Protocol: EPCglobal C1G2 (ISO18000-6C), ISO18000-6B
Product size: 90x 50 x 30mm
Working voltage: DC—9V±0.5V
Maximum power: 5W
Polarization mode: 7dbi circular polarization
Working temperature: -35℃~+65℃
Storage temperature: -45℃~+85℃
Data interface: RS232, RS485
Wireless communication: GPRS, WIFI, Bluetooth (data exchange with server)
Working mode: trigger and timing optional
Reading distance: 1M
Package weight: about 100g

620)this.style.width=620;” border=0>

3.1.3.2 Installation location and purpose

Conduct regular or irregular inspections of confidential rooms or offices. It is convenient to carry and can communicate with the server wirelessly. The identification data and database information can be displayed on the LCD screen.

3.1.4 Electronic label

The selection of electronic tags is related to the size and shape of the equipment. You can choose a variety of special-shaped labels to meet the requirements. The system has high requirements for label reliability and environmental adaptability, and should have the characteristics of high temperature resistance, low temperature resistance, impact resistance, corrosion resistance, and metal resistance. Shanghai Changfeng Smart Card Co., Ltd. is a professional manufacturer in the industry that specializes in the development and production of such high-performance electronic tags. Judging from the application effects of the RFID system that has been implemented for users, it is particularly suitable for the life-long management of equipment and items.

3.2 System Software

The software of the system consists of two parts:
1) Application management software (platform);
2) Middleware;
Application management software is a management platform for operations such as query, statistics, database management, and system settings. Middleware (software) mainly realizes data transfer between hardware and application management software.

Contact: Xu Bin 13916146457QQ:386947531MSN:[email protected]

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare