Important item inventory system
[ad_1]
system introduction
This system uses 2.45G RFID technology to log important item information into the system and write it into the electronic lock. After the important item is locked with the electronic lock, it uses a 2.45G RFID reader to monitor in real time, including the real-time status and operating time of important items. , Item number, item name and power of electronic lock, etc., to realize real-time monitoring, safety control and alarm of important items.
The system is divided into 3 parts:
Log important item information: including item number, name, registration time, etc. The system uses a 2.45G RFID reader to write this information into the electronic lock.
System monitoring: Specify or cancel the items to be monitored and the power of the electronic lock.
Register important item information: including item number, name, registration time, etc. The system uses RFID reader to write this information into the tamper-evident electronic tag.
System alarm:
a. Damaged or unauthorized opening of the electronic lock under monitoring
b. Alarm mechanism includes: SMS, Notes Email, alarm light
c. Early warning of insufficient power of the electronic lock or replacement of the electronic lock in advance
The administrator uses CMC190 to write item information into the electronic lock, and CMC812 to log important item information into the system.
After confirming that the electronic lock is closed, lock it on the controlled object.
Place the controlled object within the signal range of CMC191, the system receives the data read by CMC191, monitors the real-time status of the item, and monitors the power of the electronic lock in real time.
When there is a violation of safety rules and CMC191 cannot detect it, the system will send mobile phone text messages, emails, and warning lights to alarm:
a. The electronic lock is artificially damaged
b. The power of the electronic lock is insufficient
c. The electronic lock leaves the monitoring area (stolen with the item)
d. The electronic lock is opened when it is not authorized. As shown in the figure:
System flow:
System expansion
The system can use the handheld inventory machine to realize the on-site inventory of important items: download all item information to the handheld inventory machine, and when the inventory personnel approach the items to be inventory, they can sense the item information to prompt the inventory to be completed, and finally import the inventory results into the system.Application Case RFID Warehouse Management System Armed Police Gun Management System Personnel Positioning Management System Automatic Attendance System Parking Lot Management System Warehouse Item Storage Location Monitoring System Certificate Document Management System Item Search System Cold Chain Transportation Monitoring System Product Aging Test Monitoring System Important Item Control System Important item inventory system, intelligent laundry application system, SFC flow pallet automatic collection system, campus communication system, mold management system, ESL shelf label, semi-finished product turnover box, storage management system, CNC tool management system
[ad_2]