Open office intelligent management

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

Open office intelligent management

 I. Overview

With the development of society, creating a free and open office environment has become the choice of more and more enterprises and institutions. However, the prevention and monitoring of some highly confidential and sensitive office areas is an indispensable part of a modern management center. The “open office monitoring management” developed by Bell IOT can meet this urgent need.

Open office monitoring and management integrates intelligent video, active RFID, wireless communication and other technologies to form an invisible supervision network to monitor in real time whether anyone enters the open office area or restricted area, and promptly warns those who do not have permission to enter, and those who have permission to enter. Behavior record.

Open office intelligent management

 2. System function

Once the camera captures someone entering, it will immediately notify the monitoring host. The monitoring host will automatically quickly identify the person’s identity, authenticate according to the pre-set rules, and have no right to immediately call the police. In addition, supervisors can quickly handle the alarm by pressing the warning switch.

1. Door intrusion detection: Automatically detect whether someone is coming in and generate a signal for intrusion.

2. Identity recognition and authentication: to authenticate the identity of the intruder, linkage alarm will be triggered if there is no card or authorization.

3. Intelligent alarm: According to the pre-set alarm rules, once an abnormal situation occurs, an alarm will be triggered immediately.

4. Image capture: real-time capture of the video or image of the intrusion, which is convenient for review and behavior recording.

5. Area prohibition: for key prohibited areas, implement area prohibition, and automatically warn irrelevant and unauthorized persons approaching.

3. Main equipment

1. Monitoring host

It can be connected to a computer through a USB to serial cable to complete different functional requirements for the configuration of the monitoring host.

The radio frequency identification range of the monitoring host can be set to 4 gears, which are 10m, 30m, 50m, and greater than 50 meters. The monitoring host can read and identify the ID cards within the radius.

2. Identification card

Working frequency: 2.4GHZ

Transmission rate: 250kbps

Wearing method: wrist strap, lanyard, clip, pin, etc.

3. Camera

Support intelligent behavior analysis, intelligent face capture, passenger flow statistics and intelligent binocular behavior analysis functions.

Open office intelligent management

  Four, application place

1. Open office: office, factory, research and development room, financial room, laboratory, entrepreneurial base and other office places;

2. Restricted area: confidential places such as archives, government agencies, computer rooms, warehouses, etc.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare