Beiyang Group RFID secret asset management system solution

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

  System background

At present, more and more attention is paid to the management and monitoring of secret-related assets. However, the traditional bar code method has various drawbacks, which cannot realize real-time monitoring of secret-related assets, and creates opportunities for illegal personnel to carry secret-related carriers out, making secret-related carriers and important The leakage of documents has brought great inconvenience to the management of enterprises and institutions.

System Overview

Using RFID technology to realize the management and monitoring of secret-related assets, realize the monitoring of secret-related assets, prevent loss management and inventory, etc., can effectively prevent the leakage of secret-related assets, and implement management and supervision of secret-related carriers and important documents. .
This program uses RFID readers and radio frequency cards to realize remote identification and monitoring functions, and a comprehensive application system integrating security control, personnel attendance, tracking and positioning, and daily management.

System functions

The system is mainly composed of three parts: radio frequency card, RFID reader, data exchange and management system. The main functions include:
1) Real-time target recognition and data storage function
2) Target matching function
3) Identify data transmission function
4) Target data release and statistical functions
5) Analysis, evaluation and early warning function
6) Authority control and real-time query function
7) Regional positioning function
8) Monitoring and alarm function
9) The function of the remote control management unit
10) The mobile deployment function of the management unit

system design

Deploying RFID tags on secret-related assets can use electronic tags suitable for different media to mark assets that need to be identified according to the actual situation of the user and the different types of assets.

1) Functional design of classified assets

The design method of classified assets is:
Attach active electronic labels to secret-related carriers and important documents
Write the information of the secret carrier and important documents on the active electronic label, and the active electronic label card number corresponds to the secret carrier one-to-one
Upload the active electronic label and secret carrier information to the central database of the management system
Only those who hold a certificate recognized by the system can enter the scope of control of secret-related carriers
Hold a certificate recognized by the system and go through the procedures of borrowing, returning and using after entering
Find, consult, carry, and inventory secret carriers and important documents

2) Anti-loss design of classified assets

The use of RFID technology for secret carrier monitoring and loss prevention management can not only monitor the location and flow of each secret carrier in real time, but also remotely monitor the number, name, outflow time, inflow time, and carry of each secret carrier. Personnel information and other materials flowing in secret carriers.

The anti-loss management of secret-related carriers has the timeliness of alarming when the loss occurs, so that the asset management department and security personnel can handle the loss in the shortest time after the loss occurs, and arrive at the loss site, thereby preventing the loss.

When a person carries a supervised secret-related carrier through the exit, the RFID reader reads the ID numbers of both the person and the secret-related carrier, and the server finds that this secret-related carrier belongs to the scope of supervision. If the person is not authorized to leave, the system will activate an audible and visual alarm, and the server will send the personnel and asset information represented by the two ID numbers to the asset management department and the security control room, and display the room from which it flows out, making relevant Supervisors arrive at the place where the secret-related carrier has been alarmed as soon as possible, and proceed with further processing.

3) Inventory of classified assets

The use of RFID technology for secret carrier inventory can save time and human resource costs, reduce workload, reduce error probability, instant feedback of inventory status, and automatically prompt missing inventory when inventory is lost; complete inventory work more quickly, and accurately query each involved The location and status of the secret carrier, and the status of each secret carrier can be inquired at any time, and timely maintenance and maintenance can be carried out to reduce the maintenance cost of the secret carrier and improve the operation efficiency and management level of the enterprise.

 System Features

1) Real-time management, quick and easy operation, detailed log records, complete “management link”
2) Automatic identification, long distance, high precision, good anti-interference, strong environmental adaptability, realizing “intelligent judgment”
3) Information is disclosed according to levels, with strict authority control and clear levels to achieve “upward responsibility”
4) The system data and the system hardware fingerprint are bound and encrypted, and the module data is encrypted for transmission
5) The system is independently encrypted and coded to prevent information leakage and facilitate data fusion
6) A strong supervisory and supervisory role, requiring personnel to consciously abide by system rules and operating procedures, which facilitates real-time control, inspection and supervision by leaders
7) Humanized management, avoid conflicts, unique early warning and alarm functions
8) Unique quantitative management of safety credit value and quantitative work statistics, which is convenient for quantitative assessment
9) Distributed structure, convenient for networking, mobile deployment and scope expansion
10) Modular design, convenient for function expansion and special module customization

Application area

1) Army
2) Government agencies
3) Institutions
4) Books and archives management department
5) Research institutes
6) Safety management requirements of enterprises and companies
7) High-end application customers

Sales Hotline: 0631-5698111

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare