RFID Secret Assets Intelligent Management System Solution

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

The APS area real-time positioning system involves embedded technology, mobile computing technology, RFID identification, computer software, database, digital communication, etc. Therefore, in addition to its functions, the stability, reliability, anti-interference ability, fault tolerance and abnormal protection are also fully considered when designing the scheme. The system uses the existing mature industrial TCP/IP communication network as the main transmission platform, and the corresponding wireless identification base station,RFIDThe identification tags and other equipment are connected to the system, and the background data is exchanged with the main system through the special software for real-time location management of the area and the standard special database to realize the tracking and positioning and safety management of the area target. The overall design of the system is mainly reflected in:

RFID Secret Assets Intelligent Management System Solution

1) Realize the effective identification and monitoring of the entry and exit of targets in the deployment control area, so that the management system fully reflects “humanization, informationization and high automation”.

2) Provide managers with management information such as personnel entry and exit restrictions, attendance operations, cross-zone alarms, safety monitoring, help alarms, and reasonable scheduling. Once there is an emergency, the system can immediately know and trace all controlled targets. The location and history of the movement to ensure the efficient operation of safety management;

3) The safety, scalability, easy maintenance and easy operation of the system design;

4) Easy networking, BS structure, easy to realize a wider area networking monitoring.

System design features

1) Highly automated. The system can automatically detect the time and location information of the controlled target passing through the controlled area, and automatically realize the attendance, statistics and safety management of the controlled target.

2) Mature and reliable network communication system. The wireless identification base station installed in the deployment control area transmits the collected information to the central centralized control system through the TCP/IP communication network in real time, without human intervention in the whole process.

3) Complete data statistics and information query software. The system software has a dedicated database management system, including controlled target information collection and statistical analysis system, attendance statistics and management analysis system, display and print various statistical reports, and provide a full range of queries and management for senior managers Serve.

4) The safety, stability and reliability design of the system. The system products are designed to work continuously and reliably all day long in an outdoor environment.

5) Complete alarm call system configuration for abnormal conditions (including invalid card, invalid card, blacklist card entry, unauthorized area, etc.).

Main functions realized by the system

1) Real-time tracking and monitoring of the controlled target and emergency button for help, and the position is automatically displayed;

2) Real-time query and print the current and a certain period of time controlled target number, activity trajectory and distribution;

3) Attendance, statistics, storage and printing of controlled targets;

4) The static and dynamic editing and drawing of the monitoring chart page is open to users, supports a variety of graphic formats, can be operated by the mouse and keyboard, and fully supports real-time multitasking. While the system is collecting real-time data, the system can record, display, query, edit, manual entry, network communication, etc.;

5) The system central station and network terminals can be operated in a local area network, so that all terminals on the Internet can share monitoring information and system comprehensive analysis information, and query various data reports within the scope of use rights;

6) The monitoring software has a strong drawing ability and provides a corresponding graphic library. The operator can easily realize online and complete graphic editing, drawing and modification while continuously monitoring;

7) The RFID identification tag adopts nanowatt-level low-power design, is light in weight, does not need an external power supply, and has a variety of carrying methods for selection. The entire system will try its best to maintain the user’s existing network system and application system, and reserve interfaces, which can be combined with the existing application system or the future application system to realize the unified management function of multiple parties and reduce or avoid the user’s repeated investment.

Principles of system construction

System construction includes both software and hardware. When developing, purchasing and integrating software and hardware, Shanghai Boao Electronic Technology Co., Ltd. guarantees that the following principles are followed:

1) The main construction idea of ​​the advanced APS system is to use radio frequency automatic identification technology, embedded mobile computing technology and software technology to construct a product intelligent tracking system covering a large area, with the advantages of advanced, mature, and cost-effective products.

2) Economical On the premise of ensuring that the technical requirements are met, the system design uses products with the best performance-to-price ratio as far as possible. The construction of the system maximizes the role of some of the original equipment, such as computer networks, equipment, software, etc., saves investment for users to the greatest extent, and protects existing user investments.

3) The construction of the practical system fully meets the application requirements and actual conditions of this project, highlighting strong practicality, friendly interface and simple operation.

4) Scalability. In the system plan, the system capacity and network development plan are designed according to the viewpoint of system analysis and overall planning, which not only takes into account the ease of use at present, but also has appropriate advancement.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare