Campus All-in-One Card System Solution
[ad_1]
1 System overview
Application of RFID (Radio Frequency Identification) technology to realize the intelligent automation of campus access control and meeting attendance and modernization of teaching management, a highly concentrated and comprehensive application of new network information technology and long-distance radio frequency identification technology. Using long-distance non-contact sensing, so that students don’t have to swipe their cards,RFIDThe reader automatically reads the tags, and the system receives and processes the information, which is simple, convenient and controllable, stable and fast, and provides accurate and reliable information for the management of the campus. Control the whereabouts and attendance of students, ensure the safety and discipline management of students, and truly realize the modern campus of informationization.
2 System principle
The smart campus management system mainly includes two major categories: “information sensing” and “intelligent management”. Through the application of RFID (electronic tag), the system uses electronic tag as the most advanced identification code at present, which has the characteristics of not easy to be damaged, reliable data, long service cycle, and long effective communication distance. Install it on the controlled target to be the unique identification of the target for tracking and recording.
2.1 Information sensing
It is equivalent to the nervous system of the human body, realizing the real-time perception and transmission of various status information. According to different actual needs, the system is equipped with corresponding identification cards for personnel and objects to realize real-time perception of various status and identity information. At the same time, information transceivers are installed in a reasonable location on the campus to send various perception information to the data center.
2.2 Intelligent management
It can be understood as the human brain, capable of comprehensive management and intelligent analysis of various perceptual data, and constructing various intelligent campus management methods such as real-time monitoring, intelligent alarm and comprehensive management and control according to actual management needs.
2.3 Working principle
Combined with a low-frequency locator and an active RFID tag, the tag works normally after being activated. The activation distance of the low-frequency activator is limited. It can only be activated accurately in a small distance and a small range. In this way, use the low-frequency activator as the base point for positioning, install different base points in different positions, and then use 2.4G in a large area. The communication recognizes and reads the signal, and then uploads the signal to the management center using different upload methods. In this way, the entire process of signal collection, transmission, processing, and application is completed.
2.4 Introduction to RFID technology
RFID (Radio Frequency Identification Technology) is a non-contact automatic identification technology that uses radio frequency signals to automatically identify target objects and obtain related data. Conceptually, RFID is similar to barcode scanning. The barcode scanning technology is to attach the encoded barcode to the target and use a dedicated scanning reader to use photoelectric signals to transmit information from the bar magnet to the scanning reader; and RFID Use a dedicated RFID reader and a dedicated RFID unit that can be attached to the target, and use RF signals to transmit information from the RFID unit to the RFID reader. At present, there are roughly three types of products derived from RFID technology: passive RFID products, active RFID products, and semi-active RFID products. Passive RFID products are the first to develop, and are currently the most mature and widely used products in the market. For example, bus cards, canteen meal cards, bank cards, hotel access cards, second-generation ID cards, etc., which can be seen everywhere in our daily life, belong to the category of close contact recognition. The main operating frequencies of its products are low frequency 125KHZ, high frequency 13.56MHZ, UHF 433MHZ, and UHF 915MHZ. Active RFID products have been slowly developed in recent years, and their long-distance automatic identification characteristics determine their huge application space and market potential. At present, there are major applications in the field of remote automatic identification, such as smart prisons, smart hospitals, smart parking lots, smart transportation, smart cities, smart earth, and the Internet of Things. Active RFID has sprung up in this field, belonging to the category of long-distance automatic identification. The main operating frequencies of the product are ultra-high frequency 915MHZ and microwave 2.45GHZ. Active RFID products and passive RFID products have different characteristics, which determine different application fields and different application modes, and they also have their own advantages. But in this system, we focus on introducing active RFID products, which have great advantages in the fields of access control entry and exit management, precise positioning of personnel, regional positioning management, perimeter management, electronic fences and security alarms.
3 Overall scheme design
3.1 Overall description of the system
Import and export management
Carry out access control management for key entrances and exits such as school gates and dormitory buildings, and record all the card-holding teachers, students and visitors passing through the school gates in real time; people without a card cannot pass.
Meeting management
Before the meeting, set meeting-related information, meeting rooms, participants and meeting documents in the system, and automatically send meeting notices to participants; during the meeting, the card distribution personnel entering and leaving the venue can be automatically recorded to realize intelligent meeting attendance.
Issuing Card Management
It supports manual entry and electronic document entry, and supports card registration, card replacement, account cancellation, loss reporting, recharge, etc.
Real-time smart alert
According to the management rules preset in the system, once an abnormal situation is sensed, the system can immediately warn in the form of a warning bell, reminder window, text message, etc.
Statistical Analysis
Perform statistical analysis of all data such as alarms, meetings, attendance usage, etc. to help users fully understand the management and operation of various tasks, assist users in their daily work, and improve work efficiency
3.1.1 Access control management
As shown in the figure above, we install a low-frequency locator for each access control that needs to be managed, and each locator leads to 2 low-frequency activation antennas, which are antenna 1 and antenna 2, respectively, arranged on the outside and inside of the access control. , And install a 2.4G long-distance reader next to the access control as a signal receiver. When a person wearing an active RFID tag enters the door, they are activated by the activation antenna No. 1 and the activation antenna No. 2, so that the system judges that the person has entered the door, and on the contrary, the system recognizes that it is going out. This completes the management of the entire access control system personnel entry and exit judgment.
3.1.2 Meeting Management
Before the meeting, set the meeting-related information, meeting room, participants and meeting documents in the system, and the system can automatically send meeting notifications; during the meeting, it can automatically record the card distribution personnel entering and leaving the venue to realize intelligent meeting attendance; after the meeting It provides functions such as sending meeting records and handling special situations.
3.2 Overall system architecture
The attendance system based on active RFID technology consists of active RFIDelectronic label, Low-frequency locator, 2.4G base station, network equipment, computer, server and system software. The following figure shows the system architecture of a simple personnel area positioning management system:
3.3 System characteristics
3.3.1 Powerful system processing capabilities: a high degree of automation; complete data analysis capabilities;
3.3.2 Excellent recognition performance: high recognition reliability, 100% front-end recognition rate; long recognition distance (recognition distance up to 2-100 meters adjustable); extremely high anti-collision performance (each recognition base station can be up to Recognize hundreds of moving targets at the same time); High recognition stability (error rate is less than 1/100,000); Fast recognition speed (the fastest recognition speed can reach 200 km/h).
3.3.3 Field advantages: environmental adaptability: high anti-interference, no special requirements for interference sources and perimeter environment; ease of installation: integrated structure design, no external antenna required; operational reliability: highly integrated internal circuits, devices The failure rate is minimized.
3.3.4 Electrical characteristics: ultra-low power consumption: nanowatt-level ultra-low power consumption design, RFID tags can work normally for more than 3 years without changing the battery; convenience and safety, the tags do not need external power supply, and do not need to be charged , No need to replace the battery; no radiation, no impact on the human body and the environment, safer and healthier.
3.3.5 System hardware design: The industrial control frequency band adopts the 2.4G industrial control frequency band for wireless communication without the approval of the Radio Regulatory Commission, and there is no need to pay for spectrum occupancy fees.
3.3.6 Ultra-low power consumption: RFID tags use a unique nanowatt-level ultra-low power design to ensure that they can continue to work for about 3 to 5 years with battery support. At the same time, the low-power design of the overall structure not only ensures the effective operation of the equipment, but also reduces the complexity and cost of application implementation.
3.3.7 Large network capacity: A regional positioning network can accommodate more than 60,000 RFID identification targets and a large number of access points. The large capacity guarantees the powerful data collection capability of the network. At the same time, the high redundancy of the network ensures that the entire network can still operate normally even when individual nodes stop working.
3.3.8 Low cost of operation and maintenance: All hardware equipment adopts maintenance-free design, and the labor cost required for construction and maintenance is very low. Any authorized RFID tag can be placed within the wireless signal coverage of the network. Automatically join the network to work, without any installation configuration. The high degree of intelligence reduces the manpower and time required for network maintenance to the greatest extent, and the low price of the network node itself makes the maintenance cost of the system extremely low.
4 System function overview
4.1 Attendance management
Real-time records of all card-holding teachers, students and visitors passing through the school gates. The system can also verify the identity of people entering and exiting the door, preventing illegal entry into campuses, dormitories and other important areas. At the same time, the system can also automatically count the number of people in campuses, dormitories and other areas, generate reports and print out, and achieve efficient and intuitive attendance management records for students and faculty.
4.2 Access Control Management
The built-in IC/ID module in the marking card realizes all-in-one card functions such as import and export management and credit card consumption.
4.3 Home-school interaction
Through RFID, GPRS, etc., it can quickly read the student’s identity and school status information from a long distance, and send the student’s entry and exit status, attendance status, academic performance, activity notification and other interactive information to the student’s parents. The system can automatically identify abnormal situations (such as skipping classes, etc.), and send reminders to relevant personnel.
4.4 Conference sign-in
Before the meeting, set the meeting-related information, meeting room, participants and meeting documents in the system, and the system can automatically send meeting notifications; during the meeting, it can automatically record the card distribution personnel entering and leaving the venue to realize intelligent meeting attendance; after the meeting It provides functions such as sending meeting records and handling special situations.
4.5 Statistical analysis
Perform statistical analysis of graphs and texts on all data such as meetings and attendance to help users fully understand the management and operation of various tasks, assist users in their daily work, and provide work efficiency.
4.6 Data Management
Provide data management functions such as information setting, modification and adjustment for personnel buildings, signal transceivers, identification cards, etc.
4.7 Security Management
Provides multi-level authority control, flexibly distinguishes the management authority of different users, performs different operations separately, and dynamically records system operation logs; in system operation, the authority of the upper level has absolute priority over the next level.
4.8 Extended functions:
4.8.1 Intelligent supervision of school buses
Equipped with dedicated school bus intelligent monitoring equipment on the school bus, passengers wearing identification cards, through the school bus intelligent monitoring system to achieve school bus location tracking, real-time video monitoring in the vehicle, passenger identification and intelligent management, real-time monitoring of driving conditions, etc. School bus supervision function.
4.8.2 Intelligent supervision of students
Wear identification cards for all students, and install signal transceivers in the school to realize students’ intelligent attendance, roll call, location tracking and other functions. It can also be combined with handheld signal transceivers to realize intelligent supervision of students going out.
4.8.3 Intelligent supervision of canteens
Through the intelligent identification of personnel, a sound canteen access mechanism has been established. Deploy electronic labels for food distribution and realize food traceability management. Combined with harmful gas sensing equipment, it can detect the concentration of harmful gas in canteens in real time to ensure the safety of canteens and food.
4.8.4 Micropayment function
The user can directly use the personnel card as an electronic wallet, and can use the card for dining, shopping and other consumption on campus. Users can also access the platform system to perform functions such as balance inquiry, transaction record inquiry, password modification and so on in real time.
4.8.5 Smart Book Management
The system can realize the intelligent management of the library, including the work arrangement and supervision of the librarian, the intelligent identification of the borrower’s identity, the borrowing and returning of books, the shelves, the search, the inventory inventory and other functions, as well as the intelligent management and positioning of library materials and equipment Wait.
4.8.6 Asset Management
Asset supervision
Perform status monitoring, tracking and positioning of assets, and check the overall distribution of assets, etc.;
Smart alert
When there is an abnormal situation in the asset status, carry out corresponding warning processing;
Intelligent management
Provides daily information maintenance and process management functions for assets, and automatically prompts asset planning and maintenance.
4.8.7 Perimeter protection of fences
The perimeter protection of the wall combines infrared intrusion detectors, laser beam detectors, RFID, etc. to solve the problem of no effective isolation inside and outside the school. When an unauthorized person breaks into the school or a student breaks the wall out of the school in violation of regulations, the system will automatically start an alarm and display the alarm location, and can immediately call a nearby surveillance camera, or activate an audible and visual alarm as needed.
[ad_2]