Office fixed assets anti-theft management system
[ad_1]
1. Demand background
In 2015, there were more than 3 million burglaries in my country. The office is unattended after get off work, and valuables such as computers, printers, and photocopiers in the office have attracted the attention of thieves. The number of security guards in the property management is limited, and there is no way to monitor all the offices all the time. The traditional video surveillance realized later, and waited until the theft was discovered before checking the video. The thieves had already escaped.
Guangzhou Zhongzhi Internet of Things Technology Co., Ltd. uses Internet of Things technology to effectively solve the problem of burglary, activates an alarm when the theft occurs, and informs the security to pursue it.
2. Introduction to application requirements
Figure 1 Schematic diagram of the product
As shown in Figure 1, the anti-theft base station is installed at the entrance and exit of the office, and the anti-theft label is bound to valuables by pasting, and the remote control can be used to arm and disarm on site.
1. If theft occurs, alert immediately
When items with mobile anti-theft tags are illegally taken out of the office or the tags are violently removed, the anti-theft monitoring base station will send out an audible and visual alarm, upload the alarm information to the system, and notify the management personnel for inspection by means of text messages or phone calls. An item with a fixed anti-theft tag will trigger an alarm as long as it is moved/lifted.
2. Inventory of fixed assets
The system will count the fixed assets in the office once a day. If there is a tag without a signal for 24 hours, an alarm will be displayed on the system and the management staff will be notified to inspect the item.
3. System introduction
The system topology is shown in Figure 2. The monitoring base station is responsible for receiving the signal sent by the monitoring tag and uploading it to the server through the 3G network. No matter when and where, the administrator can access the server via computer or mobile phone to realize remote monitoring.
Figure 2 System topology diagram
1. Mobile anti-theft label
As an “electronic ID card” for anti-theft items, the mobile anti-theft tag has the characteristics of being compact and easy to use, adopts an environmentally friendly low-power design, has a continuous service life of more than 2 years, uses a dedicated frequency band, and is not susceptible to interference.
Figure 3 Schematic diagram of going out alarm
Mobile anti-theft tags are mainly used to bind fixed assets that will be moved indoors, such as office chairs, portable instruments (oscilloscopes, voltmeters, etc.). As shown in Figure 3, in the armed state, when an item is taken out of the door, an alarm will be triggered.
Figure 4 Disassembly alarm schematic
As shown in Figure 4, when the tag is violently removed by the thief, the tag will send an alarm signal to the anti-theft monitoring base station to trigger an alarm.
Figure 5 Mobile anti-theft label
As shown in Figure 5, the size of the mobile anti-theft label is 70.0mm*44.0mm*9.0mm. The mobile anti-theft label is pasted on the surface of the article by strong foam double-sided tape.
2. Fixed anti-theft label
The fixed anti-theft tag is an “electronic ID card” for anti-theft items. It is compact and easy to use. It adopts an environmentally friendly and low-power design. It has a continuous service life of more than 2 years. It uses a dedicated frequency band and is not susceptible to wireless interference.
Fixed anti-theft labels are mainly used to bind fixed assets that cannot be moved indoors, such as printers, computer hosts, computer displays, photocopiers, projectors, etc. In the armed state, when an item is moved, an alarm will be triggered.
Figure 6 Fixed anti-theft label
As shown in Figure 6, the size of the fixed anti-theft label is 70.0mm*44.0mm*9.0mm. The fixed anti-theft label is pasted on the surface of the article by strong foam double-sided tape.
3. Anti-theft monitoring base station
Figure 7 Anti-theft base station and installation schematic
The anti-theft monitoring base station is used to receive the alarm signal sent by the anti-theft tag in the office and perform sound and light alarm, and upload it to the background server through the 3G network. As shown in Figure 7, the anti-theft monitoring base station needs to be installed at the entrance and exit of the office, which can be installed through a bracket or ceiling. The appearance size of the anti-theft monitoring base station: 200mm (diameter) * 35mm (height).
4. Remote control
Figure 8 Remote control
As shown in Figure 8, the remote control is used for arming, disarming, and stopping alarms. The remote control uses a dedicated frequency band and is free from wireless interference. The remote control uses 2 AAA batteries for power supply, and the appearance size: 90mm*38mm*22mm.
5. Active card issuer
Figure 9 Active card issuer
The card issuer is connected to the computer through the USB interface, and the ID number of the anti-theft tag is read in a non-contact manner. The administrator then enters the specific installation position of the anti-theft tag into the system and binds it with the ID number of the anti-theft tag. After marking the tag shell , The card issuance is completed. The card issuer can repeatedly issue the anti-theft label, which is convenient for repeated use. Appearance size: 145mm×93mm×35mm.
Fourth, the software effect
1. Login interface
Figure 10 Login interface
As shown in Figure 10, the user can enter the management system through a browser and enter the account password to log in to the system.
2. Device entry
Figure 11 Device input
As shown in Figure 11, before installing the tag, you need to enter relevant information in the system, such as the item name, office number, item number, etc., to bind and identify the tag.
3. Equipment Alarm
Figure 12 Device alarm
As shown in Figure 12, when the anti-theft tag sends out an alarm signal, the background system will immediately display the location and label of the alarm tag in the pop-up window at the bottom right corner of the window, and the background color of the alarm record is red to mark unprocessed alarm information.
4. Equipment inventory
Figure 13 Equipment inventory
As shown in Figure 13, the system can query inventory information records, and the background color of records of abnormal inventory devices is red.
5. Advantages and highlights
1. Cover the dead spots
The anti-theft base station accurately covers every position in the office, sufficiently reduces the situation that the blind corner cannot communicate, and makes the anti-theft alarm more sensitive.
2. Tag anti-disassembly
The tag has a strong binding to valuables, and if it is violently dismantled by thieves, an alarm will be issued.
3. Remote management
The management system is connected to the Internet through the 3G network, and the management personnel can log in to the management system through a computer or mobile phone APP anytime and anywhere for remote monitoring.
4. Low radiation impact
Relative to passive tags, active tags can provide energy by themselves, and the transmission power of monitoring base stations and monitoring tags can be made very small, which is about one-tenth of the radiation of mobile phones.
5. Long working hours
The monitoring tag uses low data volume and low power consumption wireless technology, which can work for a long time, and the working time can be as long as 2 years.
[ad_2]