RFID laboratory personnel entering and exiting the security and asset management control system

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

System composition:

The system is divided into three subsystems: personnel management system, asset management system, and back-end management system, as shown in the following figure:

RFID laboratory personnel entering and exiting the security and asset management control system

System functions:

1. Staff management function:

1.1 The staff are those who frequently enter and exit the laboratory, and adopt corresponding card-issuing management

On the RFID work permit, the photo, department, position, and employee number of each staff member are printed on the surface of the work permit;

More detailed personal information of employees can also be written inside the work permit. Make each work permit have both visual image and text information and internal information that can be read from a distance.

The staff and RFID work permit adopt corresponding technology for authority management. Each RFID work card has a unique ID number, this number cannot be changed and copied; this ID number corresponds to the employee’s name, department, etc. in the database, and the corresponding authority settings are performed.

1.2 Regional access rights of the internal staff of the laboratory:

The staff of each independent laboratory can only work in the designated laboratory, to prevent other laboratory staff from entering without permission;

When an employee enters an authorized area, the door antenna indicator will show a green light, allowing entry.

When an employee enters an unauthorized area, the door antenna indicator will show a red light and a sound will be issued; entry is prohibited.

The server reports this unexpected situation to the management department, and can send it directly to the security control room. Notify the corresponding department to deal with accidents.

When an employee’s RFID information card is lost or damaged, the server will list this information card as a waste card. When someone else enters the laboratory with this card, the door antenna indicator will show a red light and a sound will be issued to indicate that entry is prohibited. The server sends unexpected event alerts to the management department and the security control room for further processing.

1.3 Regional authority and time authority of visiting customers

Visiting customers are active in authorized areas and time periods to prevent customers from entering non-authorized areas and entering after the authorized time limit;

Give voice prompts or other reminders to all customers who have not returned their temporary cards when they are not authorized to enter and leave.

The background database records the daily flow information of the staff and automatically organizes and archives them.

Visiting customers need to show their credentials at the front desk. The front desk compares their credentials with the appointment information, enters the customer’s name, company and other information into the computer after confirmation, and sets the customer’s activity area permissions and valid time, and then this temporary card Issued to customers. Complete the card issuance process for visiting customers.

When the customer enters the authorized area, the door antenna indicator shows a green light, and entry is allowed.

When a customer enters an unauthorized area or enters the laboratory after the expiration date, the door antenna indicator will display a red light and a sound will be issued to indicate that entry is prohibited.

The server reports this unexpected situation to the management department, and can send it directly to the security control room. Notify the corresponding department to deal with accidents.

When the customer leaves the laboratory, the temporary card will be returned by voice or screen prompts, and the customer will return the temporary card to the front desk. The front desk swipes the card to cancel the correspondence between the temporary card ID number and the customer, and complete the customer visit management process.

When the customer’s temporary card is lost or damaged, the server will classify the temporary card as a waste card. When someone else enters the laboratory with this card, the door antenna indicator will show a red light and a sound will prompt; entry is prohibited.

The server sends unexpected event alerts to the management department and the security control room for further processing.

The back-end database records the customer’s flow information and automatically organizes and archives it.

When visiting customers need to shuttle back and forth between different authorized floors, the door antennas between floors will sense the customer’s entry and exit, and write records on the server side.

For example, when a visiting customer enters an unauthorized floor, the door antenna will give an alarm to prohibit entry. At this time, the door antenna should read the customer ID number twice. For the records that leave after the alarm, when the interval between these two records exceeds the specified time, it shall be deemed that the customer has illegally stayed in the unauthorized area.

In special circumstances, such as when the customer is allowed to move between the two floors of AB, the door antenna will not send an alarm when leaving the A floor, but when the customer leaves the A floor and walks out of the institute building, the door antenna at the entrance of the institute will An alarm is issued to remind the customer to return the temporary card to the original card-collecting office. Reduce the loss of temporary cards and reduce operating costs.

RFID laboratory personnel entering and exiting the security and asset management control system

1.4 Unidentified persons enter the early warning mechanism

When an unknown person enters the laboratory floor, the door antenna detects the entry of a person without a card, the door antenna indicator shows a red light, and a sound prompt is issued; entry is prohibited. The server sends unexpected event alerts to the management department and the security control room for further processing. Common situations are divided into the following types:

-Entering the laboratory area without a card:

-Enter unauthorized areas with a card;

-The customer’s temporary card is overdue for entry;

-Invalid cards enter the laboratory area;

-Unauthorized movement of fixed assets;

2. Laboratory asset management functions:

-One-to-one correspondence between card numbers and fixed assets to achieve quick inventory;

-Monitor the flow of fixed assets and the flow and loss alarms under unauthorized conditions.

3. Backstage management system:

-Process the information collected by the front-end and provide feedback on current events.

hardware equipment:

An RFID reader is installed at the entrance and exit of each laboratory to monitor the personnel and objects entering and leaving the laboratory.

Each staff member is equipped with a personalized printed work card containing RFID tags, and visiting customers are equipped with temporary cards to realize the correspondence between the entry and exit personnel and the tag ID number.

An RFID tag with absorbing material is fixed on each fixed asset to realize the correspondence between the tag ID number and each asset.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare