Channel management RFID solution
[ad_1]
1. Introduction to RFID system
The RFID system consists of three parts: a reader, an electronic tag and an application software system, as shown in Figure 1. Its working principle is: the reader emits radio waves of a specific frequency to the electronic tag to drive the electronic tag circuit to send out the internal data. At this time, the reader will sequentially receive and interpret the data and send it to the application software for corresponding processing. .
620)this.style.width=620;” border=0>
Figure 1: Schematic diagram of the RFID system
In practical applications, the electronic tag is attached to the surface of the object to be identified, and the electronic data in the agreed format is stored in it. The reader sends out a certain frequency radio frequency signal through the antenna. When the tag enters the magnetic field, it generates induced current and sends out its own encoded and stored information. The reader reads and decodes the information and transmits it to the host application software for related processing. So as to achieve the purpose of automatically identifying objects in different states (moving, stationary). The basic principle of using RFID technology for item management is shown in Figure 2.
620)this.style.width=620;” border=0>
Figure 2: Basic schematic diagram of article management using RFID technology
2.System composition
The system can include the following functional modules:
Asset management: By installing RFID readers at all entrances and exits, automatic registration of incoming and outgoing assets, automatic formation of asset flow records, realizing the consistency between the physical assets of the enterprise unit and the book, realizing full visibility of assets and real-time update of information, thereby improving assets Check efficiency and return on investment.
Personnel tracking management: In line with the existing visitor registration system of the enterprise unit, by installing RFID readers in each area (building) of the enterprise unit, the tracking management of visitors (personnel) can be realized, and different visitors (personnel) can be set with different permissions , The corresponding personnel can only enter the corresponding area, and at the same time, the current number of personnel and regional distribution can be inquired.
620)this.style.width=620;” border=0>
Figure 3: System structure diagram
3.Asset Management System
3.1 Introduction to the process
l The assets to be managed are affixed with RFID tags in accordance with regulations.
l The system database records the basic information of the assets corresponding to each RFID tag: name, model, department, put into use, responsible person and other information.
l RFID readers are installed at the entrances and exits.
l Asset addition operation: fill in the relevant information (name, model, department, put into use, person in charge, etc.) of the device to be managed in the card issuing software, and save the record in the database. Attach electronic tags with asset information to the assets in accordance with regulations.
l Asset allocation operation: Take out the assets to be allocated with electronic tags and walk out from the door. At this time, the RFID tags attached to the assets are automatically recognized and registered; bring the assets to the allocation destination and enter from the door. At this time, The RFID tags attached to the assets are automatically recognized and registered, thus completing the asset allocation operation. Asset maintenance and scrapping operations are the same as this.
l Asset inventory operations: use handheld RFID readers to perform inventory operations, and the inventory results are transmitted to the back-end database server via GPRS to achieve data synchronization and update.
620)this.style.width=620;” border=0>
Figure 4: Schematic diagram of asset management
3.2 Function introduction
◆ Effective and accurate automatic identification and registration of incoming and outgoing assets to improve the efficiency of asset management.
◆ Conveniently and quickly realize the inventory operation of assets, realize the consistency between the physical assets of the enterprise unit and the book, and improve the utilization rate of fixed assets and the rate of return on investment.
◆ Improve the corporate image and informatization level.
4.Personnel tracking management
4.1 Introduction to the process
l A UHF RFID card is issued to each visitor at the registration office at the gate of the enterprise (it can be combined with the existing visitor registration system of the enterprise to associate the RFID card with its ID card information). The manager assigns the corresponding authority to each RFID card according to the regulations.
l Install RFID readers at the entrances of key buildings and areas (most of the equipment can be shared with the asset management system).
l When an authorized person (RFID card) passes through the entrance, the system will give a correct prompt and record the relevant information of the event; when an unauthorized person (RFID card) passes through the entrance, the system will immediately alarm.
620)this.style.width=620;” border=0>
Figure 5: Schematic diagram of personnel tracking management
4.2 Function introduction
◆ Prevent unauthorized personnel from entering special areas.
◆ Track the movement trajectory of visitors; count the number and distribution of visitors in each area.
◆ Improve the security and management rigor of enterprise units.
The Seventh Research Institute of China Electronics Technology Group Corporation
Address: No. 381, Xingang Middle Road, Guangzhou
Post Code: 510310
Contact: Yao Pengfei
Mobile: 15913182376
Phone: (86-20) 84119353
Fax: (86-20) 84119342
E-mail:
[email protected]
QQ:398323086
[ad_2]