RFID asset management solution
[ad_1]
1. System significance
Fixed asset management is an important part of enterprise management. Fixed assets have the characteristics of large quantity, variety, high value, long service life, scattered use locations, etc., making management difficult. Many companies still rely on manual accounting management methods. Due to the large number of management documents and heavy inventory work, a large amount of manpower and material resources are required, and the historical operation of fixed assets and asset statistics are extremely difficult, resulting in asset loss and repeated asset purchases. In recent years, some fixed asset management software has appeared. Although it has solved the problem of manual bookkeeping to a large extent, most systems use manual data entry, which is not only slow and error-prone, but also has assets in asset management. The serious problem of the disconnection between physical objects and accounting information makes it difficult to meet the needs of modern enterprise management.
In order to improve the supervision of fixed assets, combined with the actual situation of the enterprise, we have developed the “RFID Asset Management System”, which is of great significance:
1) Ensure the safety of valuable materials, the stability of enterprise development and the protection of self-interests;
2) Improve the modernization level of the company’s valuable asset management and reduce the work intensity of safety management;
3) Carry out anti-theft and safety management of assets to prevent the occurrence of loss or leakage;
4) Real-time positioning, tracking, automatic inventory, etc. of valuable assets, making asset management automated and intelligent;
5) Liberate labor, save management costs, and greatly improve the management level;
The solution integrates high-tech long-distance radio frequency identification technology, short-distance radio frequency technology and multi-user anti-collision technology monitoring technology, tags, locators, readers, communication gateways, etc., using a new embedded microprocessor and Embedded software is designed, the system has strong signal penetration, no electromagnetic pollution to the human body, and strong environmental adaptability. It can locate multiple tags at the same time and realize wireless alarm. At present, this new information recognition, access, transmission and management technology , Has quickly been widely recognized by domestic and foreign counterparts.
2. The overall system architecture
The APS real-time location tracking and access control management system adopts RFID (electronic tag) application, and uses electronic tag as the most advanced identification code at present. It has the characteristics of not easy to break, reliable data, long service life, and long effective communication distance. It is an alternative to bar code. , The best choice for infrared marking. Install it on the controlled target as the unique identification of the target for tracking and positioning and access control management.
2.1 Asset regional positioning:
2.1.1 Asset regional positioning system architecture
Asset regional positioning architecture diagram
The asset regional positioning system uses RFID technology to wear an active tag for each mobile asset, and install one (or more) long-distance readers in the computer room to match the active tag, so that all fixed assets are in Within the recognition range of the reader, the reader will automatically identify the tag ID information carried by all fixed assets, and monitor the status of all fixed assets in real time. If assets are brought out illegally without permission, the system will send information to the monitoring center at any time and trigger an alarm. Only authorized legal fixed assets can be safely brought out, thereby ensuring the safety of each fixed asset.
2.1.3 Precise regional positioning:
Position the asset area in some key areas. Once the asset enters the area, the area will be located and the alarm will be realized. At the same time, the video surveillance function will be combined to realize the video linkage. Using low-frequency activator rod antenna, the activation area of each antenna is adjustable from 1m to 5m. When the asset enters the antenna wake-up area, the tag sends out the tag ID and the activation antenna address code ID in real time, 2.4G long-distance reading and writing After receiving it, the device directly serves as the data basis for asset location positioning, and can simultaneously perform alarm prompts and video linkage analysis.
2.1.4 Area fuzzy positioning:
Measurement principle of signal transmission attenuation model
Regional fuzzy positioning adopts the method of measuring and calculating the link signal strength (RSSI) between nodes (readers, electronic tags), and uses the wireless signal spatial transmission attenuation model to estimate the transmission distance between nodes; the RSSI attenuation estimation formula of the spatial free transmission model It is as follows: Loss=32.44+10klgd+10klgf, where d is the node distance (in Km), f is the frequency, and the unit is MHZ; k is the path attenuation factor (multipath diffraction, obstacles, etc.). In the case of constant d, the larger the value of k, the more severe the attenuation of the RSSI value.
This scheme can avoid the influence of complex environment on RFID signal transmission to a certain extent, and realize the regional positioning by judging the number of recognitions by multiple readers and the additional gain when receiving. This technology can meet some of the requirements for regional positioning to a certain extent, such as: monitoring the bank cash box area, monitoring the location of special equipment in hospitals, and confidential assets.
2.1.5 Regional positioning system function
1) The daily operation and management of assets, including the daily management of asset purchase and storage, withdrawal of assets, asset addition, modification, transfer, borrowing, return, scrapping, maintenance, and depreciation. Each fixed asset can also be attached with an asset photo to facilitate viewing of images of valuables. Among them, the electronic approval process for asset transfer, asset borrowing, asset maintenance, and asset scrapping is fully realized;
2) Fixed assets report, according to the conditions of unit, department, time, etc., query fixed asset classification statistics monthly (annual) report, increase (decrease) fixed asset monthly report this month, fixed asset depreciation monthly report (annual report), and print the report;
3) Real-time asset positioning, query, and printing of the current and a certain period of time, the activity trajectory and distribution of the number of controlled targets;
4) Asset information collection, verification, and inventory. The reader/writer collects asset active tag information in real time for inventory, checks the data uploaded by the reader with the data in the database, and appropriately handles abnormal data, such as inventory losses. Withdrawal of asset retirement and so on. It can also generate inventory profit, inventory loss schedule, and inventory summary table by unit and department;
5) Assets are brought into the restricted area to automatically alarm in the background. Some areas are restricted areas (warranty area, dangerous goods source area, etc.). Unauthorized assets are brought into the restricted area, and the background system automatically alarms and pops up the video window of the incident point;
6) The asset area cross-border alarm, unauthorized departure alarm, fixed assets in a specific area shall not be taken out of the area without authorization, once the area is illegally left, the system will automatically alarm, and the leaving asset information and location information will be automatically displayed;
7) Alarm for asset anti-theft and loan extension
8) Permission control function: divide users into different roles, and different roles can have different operation permissions. The fixed asset data can be controlled to read and write to the field.Each branch can have its own authority system
The entire system will try its best to maintain the user’s existing network system and application system, and reserve interfaces, which can be combined with the existing application system or the future application system to realize the unified management function of multiple parties and reduce or avoid the user’s repeated investment.
2.2 Asset access control management system
The asset access control management system is based on advanced radio frequency technology. It wears an active tag to each mobile asset, and installs a ceiling-mounted positioning base station (elevator, gate) at the elevator entrance (unit gate) that matches the asset tag. , Install activation antennas at the entrances and exits of the floors, 2.4G signal coverage), when the asset tag is close to the ceiling-mounted positioning base station within a certain range, the ceiling-mounted positioning base station will automatically identify the entry and exit of items, and automatically record the asset tag carried by the asset entering and exiting ID number; if the asset is not authorized, the system will automatically alarm to prevent the occurrence of classified incidents, so as to achieve strict control of the access of each fixed asset carrier, while ensuring the efficiency and speed of actual operation.
2.2.1 Access control management system functions
1) Prevent authorized assets from illegally taking out of unauthorized areas, such as: a certain asset is granted permission for use inside the building, and when borrowers deliberately or unintentionally carry the asset outside the building (without second authorization), The ceiling-mounted positioning base station collects relevant information and transmits it to the back-end for comparison, and inspires the alarm device to give an alarm; only the fixed assets that have been authorized for the second time can be taken out of the building, and at the same time the relevant information of the fixed assets (such as: borrower) , Borrowing date, out-of-warehouse time, etc.) are automatically recorded in the database;
2) As long as the unit leader or unit employee carries the electronic label, the attendance function can be completed through the access control (the employee name, position, working time and other related information are automatically entered into the database), and can be printed according to the actual needs of the week and month. Attendance reports; prevent strangers from breaking into the office building under various names to ensure the safety of various valuable assets and administrative personnel; register and issue temporary passes to visitors and foreign business personnel permitted by the leader.
3) Real-time monitoring function, system managers can check the entry and exit of each door area asset (with photo display at the same time) and the status of each door area (abnormal state alarm) through the PC;
4) Access record query function, the system can store all access records, status records, and query according to different query conditions
2.3 System composition
1. Asset tag
The electronic tag is a dual-frequency anti-theft electronic tag designed for the’asset intelligent management system’, which is suitable for most asset applications.
2. Reader
2.4G microwave frequency band dual antenna reader, which can identify 500 tags at the same time, and provides SDK interface.
3. Ceiling type positioning base station
Used for entrance and exit management of access control, and can also be used for dynamic management of key areas, which can trigger alarms when approaching key areas.
4. Communication gateway
Process the data uploaded by the reader and perform unified management on the reader.
5. Asset management system software
Used for asset authorization, inventory, searching, positioning, adding and scrapping, etc.;
[ad_2]