Brief description of the RFID cash operation management system treasury in and out program

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

1. Preface

1. Project background

With the widespread application of automatic identification technology in various industries, it has penetrated into many industry applications. Our bank’s tail box management still follows the way of hand-written transcripts. The level of automation is not high, and the degree of automation needs to be improved, which brings hidden dangers to the management of the tail box. There is an urgent need to improve the management level of the tail box, more quickly and accurately carry out the tail box in and out of the warehouse and the handover of the outlets, the fast inventory of the warehouse, the query and the automatic generation of related reports.

2. Current problems

Existing bank treasury tail box entry and exit management completely adopts manual registration methods, which are cumbersome to operate, low in efficiency, and present security risks.

2. System management goals

1. Electronic management of the tail box

 Use RFID electronic tags to automatically identify tail box information in batches.

 After each tail box has an independent number, it will transition from the traditional extensive “number” management to the fine “individual” automatic management.

2. Information management of the handover process

 Solve the problem of tracking records, transfer procedures informationization and electronicization between the bank cash center and the security company point.

 Provide real-time and detailed status and analysis reports for relevant leaders of the provincial and head offices, and provide decision support.

Three, system design principles

1. The principle of integrity

The system design is based on the overall situation, based on the Bank’s experience in the treasury and electronic cash flow projects, and carefully analyzes the needs of all aspects to achieve the overall goal of the system.

2. The principle of reliability

The system design must meet the design requirements of performance indicators, and the network and server must be designed and constructed with high reliability to meet the normal operation of 7*24 hours to ensure the reliability of the entire application system.

3. The principle of practicality

Starting from the actual needs of users, the software has concise, practical, and operability. The system has a friendly operation interface. The operator is convenient, simple and easy to learn, and can adapt to users of different educational levels.

4. Standardization principle

Adhere to standardization in the process of system planning, design, and implementation. The software and hardware construction of the system should conform to the corresponding technical specifications and national standards of the bank, and all kinds of documents should be complete and complete.

5. High performance principle

When the system was designed, sufficient transaction throughput and concurrent processing capabilities were considered. The ability of the system to process transactions can adapt to a large number of business expansions.

6. The principle of fault tolerance

The system has a certain degree of fault tolerance, which can ensure that the system is available and the data is correct in the event of user operating errors and other unexpected situations (such as machine damage, etc.). The error prompts are rich and accurate.

7. The principle of scalability

The system design has good business scalability.

Four, program overview

1. Program overview

This solution is mainly based on the business needs of tail box safety, through RFID technology and corresponding software systems, to complete the electronic management of the cash flow monitoring and management of the treasury tail box, and solve the potential hidden dangers in the actual operation of the treasury and cash flow.

(1) Utilizing RFID technology, the tail box can be read in batches quickly in and out of the warehouse, eliminating the need for a single read.

(2) The system automatically checks the legitimacy of the luggage storage and exit, and the system will warn if there is an abnormality.

(3) For banks and other payment users, it can provide a real-time cash tail box circulation information service platform, statistically analyze data, and can timely monitor and inquire the situation of treasury escort and collection, so that management banks at all levels can inquire real-time at any time Receipt, keep abreast of cash usage, escort and payment status at any time.

2. Overview of automatic identification technology

Automatic identification technology is a new technology that has developed rapidly in the world at present, and its development time is short. The English name is Automatic Equipment Identification, abbreviated as AEI. The basic idea of ​​this technology is to realize people’s automatic identification and management of various objects or equipment (personnel, articles) in different states (mobile, static or harsh environment) through the use of some advanced technical means.

(1) Automatic identification technology

Automatic Equipment Identification (English name is Automatic Equipment Identification, AEI for short) technology is a new technology that has developed rapidly in the world. The basic idea of ​​this technology is to realize people’s understanding of various objects or equipment through the use of advanced short-range communication technology. Automatic recognition and management in different states (mobile, stationary or harsh environment). At present, the most widely used automatic identification technology can be roughly divided into: imaging technology, bar code technology, biometric identification and radio frequency identification technology. Among them, “camera technology”, “bar code technology”, and “biological identification” have been widely used in people’s daily life and are already well known. For example, barcodes are used for commodity management, cameras are used to capture illegal vehicles, and biometrics are used for personnel management.

(2) Radio frequency identification technology

At present, the most widely used automatic identification technology is microwave technology. In the field of automatic identification applications, the more specific name of microwave technology is microwave radio frequency identification (Radio Frequency Identification in English, referred to as RFID for short). The composition of a radio frequency identification system generally includes at least two parts: (1) Electronic tags, whose English name is Tag; (2) Reader, whose English name is Reader.

The working principle of the RFID system is: RFID readers emit microwaves through antennas, RFID tags are activated by the reader’s microwave energy, and after receiving signals from the readers, they automatically send back microwave signals containing information, and the readers receive the RFID card. After these signals are decoded by the receiver decoder, the communication link between the reader and the RFID card is established. The decoded information is processed by a computer to realize the purpose of automatic identification.

Schematic diagram

3. Business terminology of RFID cash operation system

(1) RFID tail box electronic tag

The RFID electronic tag is used to uniquely determine the identity of the tail box. The electronic tag has the characteristics of non-contact reading, anti-collision, arbitrarily packaging, long service life, and reusability. The identification code is stored in the electronic tag, and the data can be read and written through a fixed or hand-held RFID radio frequency device. The electronic label itself is not easy to be damaged, the data is not easy to be lost or modified, and it is easy to make and the cost is low. In this solution, electronic tags are also called RFID tags.

(2) Treasury channel type RFID reading and writing device

It is a device that reads RFID tag data online. Installed at the door of the vault, connected to the operation terminal, read and write RFID tag data through a special program on the terminal, and can dynamically read and write in batches.

(3) Network terminal equipment

The equipment has achieved multiple functions, including box information collection, demonstration and safety, etc.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare