Dingchuang Hengda RFID Visitor Management System
[ad_1]
1. System Overview
The Dingchuang Hengda Visitor Intelligent Management System combines advanced radio frequency RFID technology, digital communication technology, optical recognition (OCR), digital video technology, etc., to overcome the lack of management strength and single means in traditional visitor management. Disadvantages, truly unified the personnel, certificates, and photos. It realizes the functions of “entry registration, exit cancellation, portrait one-to-one correspondence, personal belongings registration, hierarchical management, historical record query, report summary” and other functions, which can efficiently record, store, query and summarize the relevant information of visitors, and provide convenience for visiting information Query in multiple ways. Greatly improve the quality and efficiency of the guard management work, and solve the management problems of visiting personnel of various enterprises and institutions.
2. System Features
Advanced identification technology: The use of RFID technology to realize long-distance real-time supervision, which is more convenient and accurate to realize the management of personnel and artworks, and to ensure safety.
Abundant visitor management functions: In addition to supporting personnel registration management, it also adds the OCR recognition function of the ID photo, the second-generation ID card reading function, the on-site photographing function, automatic telephone dialing association, strong screen notification, two visitor slip printing, and stranded personnel Reminder, blacklist management, access control linkage, data query and other functions.
The software architecture of the combination of CS and BS: not only has strong data interaction, but also has flexible management and diverse functions.
Combination of multiple technologies: The system applies network technology, RFID technology, digital video technology, digital identification technology and other technologies to achieve a full range of multi-functional system management.
The interface is beautiful and the style is uniform: the interface is fresh and elegant, and it is not easy to cause visual fatigue; the interface style is uniform, the operation mode is uniform, and it is easy to use and easy to use.
Good scalability: The system provides a variety of flexible third-party interfaces, seamlessly connecting with third-party application systems.
3. System composition
System composition diagram (Figure 3.10)
The system hardware includes: passive electronic tags, desktop readers, second-generation ID cards, visiting personnel management system hosts, servers, image capture cameras, printers, telephones, scanners, automatic barriers, etc.
4. Visitor process
Flow chart of visitor visiting system (4.10)
After the visitor registers a valid certificate, take a photo of the certificate/image. After confirming the visitor, the system can select three processing methods: strong screen to notify the respondent, telephone to notify the respondent, or confirm entry, and then submit the visitor information to the system. After generating the visitor card (RFID card)/printing the visitor receipt, visitors can use this card to enter the visiting area.
Flow chart of visitor removal system (4.11)
After the visitor finishes his visit, he shall return the visitor card or print the receipt to the staff. After checking the relevant information with the system, the information is submitted to the visitor management system for relocation registration, and the relocation of the visitor is completed.
5. Operating environment
Operating system: windows server 2008/ windows7/ windows8/ windows XP/ windows CE/ windows Mobile
Software framework: .net framework 3.5
Software structure: B/S, C/S, PDA
Database: MySQL, SQL server, ORACLE, DB2, Access (other databases can be customized according to user needs)
6. Function Module
This system includes basic information (document information, image information), access information, inquiry, appointment and other functions of visitors. Eliminates the traditional handwriting registration and filling time long, false false information, difficult to save, difficult to query information and other shortcomings.
6.1 Guest management system client software
The client software interface diagram of the visitor management system (6.10)
Guest management system client software function diagram (6.11)
The local monitoring client software includes: visitor management, notification management, statistical query, employee management, and system management.
6.1.1 Visitor Management
Control module for a series of management functions of visitor registration, card issuance, identification, and query;
Visitor management: the function of registering, confirming and entering the system of visitors;
Appointment management: realize appointment registration for visitors in advance, including appointment registration and appointment confirmation functions;
Visitor sheet printing: After the visitor registration is completed, the system will automatically print out a QR code visitor sheet containing the visitor’s photo, basic information, and northerners’ information as a voucher for entry and exit;
Visitor card management: After the visitor registration is completed, the system will issue a visitor card (RFID electronic tag) as a voucher for entry and exit. The card is associated with the access control system and can politely restrict visitors from entering and exiting and related activity areas;
Blacklist management: The system can set a blacklist function. For some suspicious or banned persons, set them, and the system will automatically prompt the next time you visit to increase the alertness of the staff;
Visitor relocation management: the function of registering, confirming and entering the system for the relocation of visitors
Second-generation ID card reader: Built-in second-generation ID card reader issued by the public security department directly reads the relevant information in the ID card into the system to identify the authenticity of the visitor’s ID card;
ID photo OCR recognition: OCR recognition of second-generation ID cards, driver’s licenses, passports, etc., without manual input, and the original IDs should be photographed and saved for future reference;
On-site photography: When the visitors register, they can take photos of the visitors through the system image acquisition camera and save the photos, so that the staff can quickly identify the visitors after an emergency.
6.1.2 Notification Management
A module that notifies internal staff of visitors and reminds visitors of the status of internal area visitors;
Telephone notification: realize the function of telephone confirmation with the interviewed person, no need to find the telephone number manually;
Strong screen notification: the interviewed person automatically pops up the visitor information, and the interviewed person can confirm the reception according to the situation;
Reminder of stranded personnel: When there are stranded visitors, the system will remind staff according to the set time to ensure the safety of personnel assets;
Illegal entry reminder: The system will notify the staff in real time for illegal entry.
6.1.3 Statistics query
The query management of visitor information and related information enables managers to review visitors and related historical information in a timely and effective manner to achieve the purpose of safe management of visits. And have historical log statistics function;
Visitor query: the function of querying and operating the information of visitors;
Visitor reservation query: the function of querying the visitor reservation and visit situation;
Access records query: the function of querying the records of the visitor’s entry and exit time, interviewee, interviewed department, etc.;
Employee information query: the function of querying internal employee information;
Department information query: the function of query operation for internal department information;
Blacklist query: the function of querying the information of visitors from the list based on the established blacklist;
Historical data statistics: Users can set various query conditions, such as: time, visit reason, interviewee, visit status, etc., and generate statistical analysis reports.
6.1.4 System Management
Enable managers to rely on system management to realize the functions of manager and system equipment management.
User settings: set the function of managing user related parameters;
Password setting: the function of setting the system management password;
Authority setting: manage the function of using user authority;
Parameter setting: the function of setting system related parameters;
Software version: Display the software version number.
7. Equipment list
[ad_2]