Real-time monitoring and management system for RFID-related secret objects based on active 433MHz
[ad_1]
1. Project background
The 21st century is the era of information technology. Information carriers such as notebook computers and mobile hard disks have entered popularized applications. Whether in the commercial, military, or political fields, leaks have occurred from time to time, bringing major issues to relevant countries and enterprises. In order to ensure and facilitate the carrying control of secret-related carriers, Jiangsu Tangan IOT Technology Co., Ltd. launched a real-time monitoring and management system for secret-related carriers (notebooks and mobile hard disks) based on active technology, which monitors secret-related carriers in real time in seconds. The state of the secret carrier has been successfully applied in many military and civilian fields.
2. Features and advantages of the scheme
1. 433MHz active RFID technology is currentlyRFIDThe technology with the longest recognition distance in the technology has the characteristics of strong penetration, strong diffraction, and long transmission distance.Therefore, even if it is impossible to enter certain workplaces, the RFID technology can still be used to check whether the secret carrier is in place, which facilitates the inspection of whether the secret carrier is in place and prevents illegal means of carrying it out.
2. Real-time monitoring, which solves the problem of unrecognized carry-out in violation of the general entry and exit system (such as illegal carry-out from a window, etc.). As long as the secret carrier leaves the signal coverage area, the system will immediately alarm
3. Utilizing the long-distance characteristics of 433MHz active RFID technology, you can also use the handheld to check the presence of secret-related carriers at a designated location, etc.
4. The electronic tag adopts special anti-dismantling technology, and the action of the anti-dismantling switch is both sensitive and accurate. As long as there is an attempt to remove the label, the label will emit an alarm signal and the system will automatically alarm immediately
5. Ultra-low power consumption, lower radiation intensity than CDMA mobile phones, no radiation damage, safe and reliable use
6. The use of this system can realize the accurate and automatic identification and recording of secret-related carriers brought out (or brought into) the office area, and alarms when unapproved secret-related carriers are brought out (or brought into) the office area, ensuring the secret-related carriers Effectiveness of management
7. High reliability, the hardware is industrial grade product, the system works uninterrupted and reliable
Three, the principle of the scheme
The system is composed of “application software server”, “monitoring computer”, “reader” and “electronic label”.
Working principle: Paste the “RFID electronic label” on the notebook or mobile hard disk device under management, install a certain number of “readers” in the office area to achieve full coverage of the office area’s signal; when the notebook or mobile hard disk is in the signal coverage Office area, “RFIDReader“Receive the “RFID electronic label” signal immediately, and feed the information back to the “monitoring computer”. The “monitoring computer” processes the received information (if it fails to receive the tag signal in time or receives the signal that the tag is removed, it will be Judging whether to call the police immediately in advance of the approval status), and save the record in the “application software server”, thereby realizing the function of real-time monitoring of whether the secret-related carrier is in place.
Four, main function introduction
1. Location monitoring: real-time display of the location and time of the secret carrier
2. Off-location alarm: alarm for illegal off-location of secret-related carriers
3. Departure information of the day: the monitoring terminal displays the number of departures and the time of departure of the current day
4. Anti-dismantling alarm: If the label is disassembled, it will alarm immediately
5. Online application and approval function of the management terminal
6. Online query function: can query historical information of dislocation and disassembly
7. Software shutdown password: you need to enter the password to close the software
8. Cancel the alarm password: you need to enter the password to cancel the alarm
V. Schematic diagram of the hardware deployment plan
Six, practical application legend
Seven, hardware product introduction
1. ETAG-R71 active fixed RFID reader
Working frequency: |
387 MHz ~464MHz |
Reading distance: |
Up to 150 meters (in the air, unobstructed environment) |
Anti-collision processing: |
200 tags read at the same time |
Recognition speed: |
150 tag seconds |
Communication error detection: |
CRC16 cyclic redundancy check |
Receiving sensitivity: |
-94dBm |
Anti-electromagnetic interference: |
10V/m 0.1~1GHz AM |
Dimensions: |
125×105×28.5mm (without antenna) |
Operating temperature: |
-20℃~+70℃ |
Communication Interface: |
RS232, RS485 or 10/100M Ethernet (optional) |
power supply: |
5~8V DC, ≥500MA |
antenna: |
Omnidirectional identification, standard rubber whip antenna |
Packaging materials: |
aluminum |
2. ETAG-T72 read-only active RFID anti-tamper tag
Dimensions: |
86×54×3.9mm |
Working frequency: |
433MHz |
Reading distance: |
Up to 150 meters (in the air, unobstructed environment) |
Expected battery life: |
5 years, automatic alarm when the battery power is too low (RF transmission once per second) |
Power-down storage period: |
More than 10 years |
ID number: |
>32 bit |
Modulation: |
2-FSK |
Baud rate of air transmission: |
250kbps |
Anti-electromagnetic interference: |
10V/m 0.1~1GHz AM |
seal upPacking materials: |
ABS |
Operating temperature: |
-20℃~+60℃ |
[ad_2]