RFID smart asset supervision system
[ad_1]
1 System introduction
With the development of the Internet of Things, in the future, ubiquitous terminal equipment and facilities will have built-in various sensors, realize information exchange through various sensor networks, and provide safe, controllable and even personalized service functions through safety guarantee mechanisms. Such as remote control, alarm linkage, dispatch command, etc. Realize the integration of “management, control, and operation” of “high efficiency, energy saving, safety, and environmental protection” of objects.
Guangzhou Leerpu’s RFID smart asset supervision system is based on the RFID radio frequency technology at the core of the Internet of Things, which integrates computer software and hardware, information collection and processing, data transmission and identification card production and other technologies into an asset automatic identification and IoT supervision system. The system can effectively integrate the daily management and anti-theft monitoring of various assets to realize the status monitoring, anti-theft alarm, tracking and positioning of important and valuable assets, as well as intelligent management such as asset inventory, inspection, loan and return, warehouse storage and statistics . Solve the problems of low efficiency and poor anti-theft of traditional asset management, and truly realize intelligent integrated asset management.
2.1 The overall structure of the system
The system structure mainly includes four parts: front-end data acquisition system, data transmission system, data processing service system and Web upper application system.
The front-end data acquisition system is an RFID wireless transmission system, which is mainly composed of a radio frequency identification card (ie, an electronic tag), a low-frequency locator, a signal transceiver, and a field bus/local area network. Its main function is to wirelessly collect target location data and other data sent by the identification card.
The data transmission system is mainly composed of a data collection computer, a data server and a dedicated upload line. The main function is to upload the collected data to the data center for storage and processing.
The data processing service system mainly includes application server, database server, system management workstation, etc. The system is located in the monitoring center, and its main function is to analyze and process data and provide various data services for the upper application system.
The upper-level web application system mainly uses the data collected by the collection system to display various business functions through the software platform, display intuitive effects to specific area managers, and realize statistical management of various data reports.
2.2 Function description
Location and status monitoring
Real-time perception and comprehensive monitoring of the identity information, real-time location, movement trajectory and real-time status of assets equipped with electronic identification cards in the area.
Intelligent alarm management
Alarm rules can be set in advance. Once abnormal conditions occur, the system can immediately warn through alarm windows, sound and light alarms, SMS and video linkage, and provide functions such as alarm source location and emergency dispatch. Realize the timely monitoring of abnormal conditions of assets and ensure the safety of assets.
Video linkage
When an abnormal or unexpected situation occurs, the system will automatically retrieve the corresponding camera screen, upload it to the management platform system, and view the real-time surveillance video. At the same time, the corresponding camera equipment will automatically turn on the video recording function.
Track query and statistical analysis
The electronic map of the system can play back the historical movement track of the specified asset in a certain period of time in the form of animation, and can also display the detailed travel record data with the chart. Provide chart statistics, record data export and print functions for all kinds of statistical record data.
Combination of various technologies
The system takes the new generation of Internet of Things technology as the core, combined with RFID radio frequency identification technology, video surveillance technology, 3G communication technology and other advanced methods to provide intelligent management solutions for the daily supervision of the region.
Accessibility application function
It can be extended to the management of personnel monitoring. By wearing identification cards to personnel, the location tracking of personnel within the monitoring range, real-time distribution inquiries, as well as personnel attendance management, visitor registration and conference attendance management, etc. can be realized.
2.3 Design principles
Advancement: System design and equipment specifications conform to industry technical specifications and technological development trends, adapt to the requirements of digital technology development, and reflect the advanced nature of technological development in terms of functions and performance.
Practicability: The various technologies and functions of the system should be based on the principle of the construction needs of intelligent asset management, and the operation and maintenance of the system should be simple, convenient and easy to use.
Standardization: All kinds of equipment, communication software and protocols applied to the system should comply with relevant technical standards.
Openness: The system has a development interface and can be seamlessly connected with other application systems.
Compatibility: The system can be compatible with the original system to the greatest extent, and function modules and hardware devices can be configured according to requirements to avoid waste of resources.
Reliability: The system should have a highly reliable operation capability under various conditions.
Real-time: Using IoT intelligent sensing technology, it can realize real-time perception, intelligent discrimination, video linkage, intelligent warning, etc. of abnormal assets within the monitoring range in real time.
Scalability: When technology develops and business increases, the system should have the ability to expand, and there should be external interfaces to facilitate the secondary development of customers according to actual needs.
Maintainability: When the system fails and needs to be upgraded, the system should have expandability.
Confidentiality: The system should ensure that data cannot be leaked, and that it has a function and data authority authorization mechanism.
Reliability: The system should have reliable operation capability to ensure the provision of daily reliable services.
3 System principle
3.1 Working principle
This system is Guangzhou Leerpu builds an IoT asset management service platform based on RFID radio frequency identification technology, which can realize the identification, positioning, tracking, monitoring and management of assets within a region. By deploying low-frequency locators, signal transceivers and other terminal equipment in the monitoring range, using RFID wireless communication technology to transmit information to the collection server, various upper-level applications are realized, thereby realizing automatic identification, distributed display, tracking and positioning of assets, Comprehensive services such as remote monitoring and information management.
Signal transceiver: It is mainly used as information transmission equipment to achieve full coverage of signals in a specific monitoring area. It can accept signals sent by identification cards and upload the information to the collection server. It can be installed on the eaves, on the wall or in the ceiling, etc.
Identification card: It is bound to the asset and has a unique number. It can actively receive 125KHz low-frequency signals and upload relevant information through 2.4G. It can achieve identity authentication, location tracking, status awareness and other functions. It can be attached to assets and closely On the wall of the box, hidden in the accessories of the asset, etc.
Low-frequency locator: active transmitter, when the identification card enters the low-frequency signal range, it can receive the 125KHz low-frequency signal continuously sent by the locator. The signal includes its own number, which can be used to distinguish and identify different locators, and the recognition range Less than 2~8m.
Acquisition system: Process the data uploaded by the signal transceiver to realize various upper-level applications, such as asset anti-theft monitoring, asset inventory application, asset warehousing management, etc.
3.2 Introduction to RFID technology
RFID is the abbreviation of Radio Frequency Identification, that is, radio frequency identification. It is a non-contact automatic identification technology that automatically recognizes target objects and obtains related data through radio frequency signals. The identification work does not require manual intervention and can work in various harsh environments. RFID technology can identify high-speed moving objects and can identify multiple tags at the same time, and the operation is quick and convenient. Short-distance radio frequency products are not afraid of oil stains, dust pollution and other harsh environments, and can replace barcodes in this environment; long-distance radio frequency products can identify distances up to tens of meters, even hundreds of meters, and can be used in logistics, asset management, anti-counterfeiting and anti-theft , Identification and so on. Compared with barcode recognition technology, RFID has the following characteristics:
The identification work does not require manual intervention;
It can support both read-only working mode and read-write working mode without contact or precise aiming;
Can work freely in various harsh environments;
Can carry out a high degree of data integration;
Because this technology is difficult to be counterfeited or invaded, RFID has a very high security protection capability.
3.3 Classification of RFID products
There are roughly three categories of products derived from RFID technology: passive RFID products, purely active RFID products, and semi-active RFID products.
Passive RFID products are the first to develop, and are also the most mature and widely used products in the market. For example, bus cards, canteen meal cards, bank cards, hotel access cards, second-generation ID cards, etc., which can be seen everywhere in our daily life, belong to the category of close contact recognition. The main operating frequencies of its products are low frequency 125KHZ, high frequency 13.56MHZ, UHF 433MHZ, and UHF 915MHZ.
Pure active RFID products, that is, active RFID products, have been slowly developed in recent years. They have the characteristics of long-distance automatic identification and belong to the category of long-distance automatic identification. There are major applications in the field of long-distance automatic identification, such as smart prisons, smart hospitals, smart parking lots, smart transportation, smart cities, smart earth, and the Internet of Things. The main operating frequencies of its products are UHF 433MHZ, microwave 2.4GHZ and 5.8GHZ.
Semi-active RFID products are products that are between active RFID and passive RFID. The product is triggered by a low frequency of 125KHZ, allowing microwave 2.4G to play its advantage, that is, using low frequency 125KHz to achieve close-range precise positioning, and microwave 2.5G to achieve Remotely identify and upload data. The product integrates the advantages of active RFID and passive RFID, and has great advantages in the fields of access control management, precise positioning of personnel and assets, perimeter management, electronic fences and security alarms.
4 System function
4.1 Asset anti-theft monitoring
The asset monitoring and management function is to use the integrated photosensitive card, lanyard card, magnetoresistive card and other types of asset cards, according to the pre-set alarm rules, to alert the abnormal situation of assets, set by the alarm rules, abnormal situation monitoring and The alarm is composed of three parts.
Alarm rule setting
The asset manager can preset various management rules in the system (including abnormal asset status, time-sharing/division/status arming rules, personnel authorization rules, etc.), and alarm methods corresponding to various abnormal situations (including mobile phone text messages, web pages) Reminders, video linkage, etc.), and alarm release rules (including time-limited release, designated personnel to release on site, system operation release, etc.).
Zoning defense: It can be individually deployed to any designated area, which is convenient for management and maintenance work.
Time-sharing arming: The arming time can be set in advance to facilitate the formation of an orderly management system.
State-by-state defense: The specific state of the specified object can be set to achieve a flexible and practical monitoring and defense mode.For example, there is no need to perform vibration monitoring for asset A, only tilt monitoring for asset B, and only position monitoring for asset C.
Abnormal situation monitoring
Through integrated photo-sensitive cards, lanyard cards, magnetoresistive cards and other types of asset cards, the system can make emergency alarms for abnormal assets in accordance with pre-set alarm rules. Once the assets have the following abnormal conditions, the system will automatically and intelligently alarm:
Real-time location monitoring
By deploying and controlling the various base stations and locators in the area, it is possible to know the asset location and distribution of a certain indoor and outdoor attached asset card in time, and record its historical location information.
Real-time location: The administrator can query the real-time location of the specified asset in real time and mark it on the system electronic map.
Distribution query: real-time query of the distribution of assets in each depository, and detailed asset information in a certain distribution.
Track record: can query and replay the historical movement track of assets, historical data reports, etc.
Match alarm reminder
The system matches the preset alarm rules according to the actual detection conditions, filters abnormal conditions, and initiates alarm reminders.
Web page reminder: The system pops up an alarm box in real time, locates the location of the alarm source on the map, and displays the alarm details, etc.;
Start the on-site sound and light alarm;
Video linkage: automatically call the monitoring screen near the alarm source, and start on-site video recording;
According to the preset alarm rules, the alarm details are sent to relevant personnel in real time.
4.2 Asset inventory management
Through the signal transceiver and hand-held data collection terminal configured in the system, the administrator can carry out periodic cargo inventory work in accordance with conventional requirements, so as to grasp the current status of the inventory in time. Generate a variety of different inventory results reports, such as: inventory profit, inventory loss, inventory, location reports, etc.
The system automatically counts assets bound with active tags through base stations that can be deployed in the area. For assets bound with passive tags, the administrator can use a handheld data collection terminal for inventory. At the same time, the administrator can directly generate inventory statistics results through the import function of inventory data.
4.3 Inbound and outbound management
By installing a signal transceiver at the entrance and exit of the asset storage location, when the asset that has been issued an electronic label passes through the entrance and exit, the system will automatically generate asset outbound and inbound records in the database and generate corresponding inbound and outbound orders; the operator can also manually Increase the asset storage information. Based on the information collected by the signal transceiver and the warehousing information entered by the administrator, the system can also automatically modify the warehousing status and inventory information of the corresponding assets.
4.4 Asset Information Management
Asset information management: The system provides batch import and export functions of asset information data, and can generate various report statistics, which is conducive to the query and statistics of the system center.
Asset identification card issuance: Pre-entry asset and asset inventory information in the system, read active card or passive RFID card information, and associate it with actual asset information. It can be posted on the corresponding assets to realize the issuance of asset cards.
Asset information query: The asset identification card can be read through the handheld or signal transceiver to display the asset information, such as asset number, type, storage location and other information. You can also enter the asset number, type, name, etc. in the system for query.
Asset application approval: provide application, approval and records for borrowing, requisitioning, reporting damage, repairing, and outgoing assets, as well as exporting, printing and statistical analysis of application records.
Asset inspection management: According to asset inspection requirements, remind the asset inspection cycle, and support the formulation of inspection plans and inspection results recording.
4.5 Other application functions
4.5.1 Report statistics
It can perform statistical analysis of graphs and texts with the data recorded by the system, including asset information, inventory, storage, and other data, and supports data export and printing. Help users to fully understand the management and operation of various tasks, assist users in their daily work, and improve work efficiency.
4.5.2 Alarm reminding and handling
When the system monitors abnormal conditions, it provides various alarm reminding methods and processing functions.
Alarm reminder
Web page reminder: Real-time pop-up alarm window and turn on the web page alarm sound, where the alarm window displays the time, type and details of the alarm.
Video linkage: The surveillance video near the alarm source will pop up in real time, and the alarm details will be displayed.
Sound and light alarm: When an abnormal situation is monitored, the sound and light alarm will be activated in real time to give sound and light alarm notifications.
SMS reminder: send alarm details to relevant personnel in real time, such as automatically sending asset exception information to asset managers.
Alarm processing: Provide location of alarm source, view alarm details, and alarm processing record to stop the alarm.
4.5.3 System Maintenance
Data management
Basic data management refers to the management of the basic data used, including the module that records all basic information such as personnel or assets that need to be entered into the system, and realizes the management of personnel, assets, identification cards, buildings, base stations, locators, and cameras. .
system maintenance
All basic settings in the system, such as organization, users, roles, maps, alarm parameters, etc., are set and managed. Only by setting these basic setting data can the realization of other functions of the system be ensured.
Safety management
Provides multi-level authority control, flexibly distinguishes the functional authority and data authority of users in different roles, performs different operations separately, and dynamically records system operation logs.
Authorization management
The system products are divided into trial version and official version. Users can activate the product by importing a file, entering a verification code, or remotely verifying authorization. The trial version of the product can normally use the functions of the system, but there are restrictions on the number of users, the number of identification cards, the number of uses, and the period of use.
4.5.4 In-site mail
In-site mail provides system users with the functions of writing and receiving letters. Through the mail function, mail files and attachment information can be sent to the relevant personnel of the system to facilitate the communication of system users.
4.6 Extended applications
Intelligent vehicle monitoring
Equipped with special vehicle intelligent monitoring equipment, loading and unloading goods with identification cards, through the vehicle intelligent monitoring system to achieve vehicle position tracking, real-time monitoring of in-car video, recognition and intelligent management of in-car goods, real-time monitoring of driving conditions, etc. Directional vehicle supervision function, and one-key call for help in the car.
Vehicle monitoring host
Description: The vehicle monitoring host is the main device of the vehicle terminal integrated with active RFID, 3G video, GPS, and WCDMA 3G. It is installed on the vehicle and can effectively shockproof, adapt to the wide power supply and the harsh environment in the vehicle.
Remote power supply
Through the access to the power supply, the user can remotely control the power switch through the network, and realize the operation of the power switch of the device through the network at any place.
Remote power controller
Confidential data management
The special U disk can only be used in the preset authorized area, which can effectively protect information such as examination papers, financial documents and other confidential data. At the same time, the system can also locate and track the special U disk.
Secret-related data authorizer secret-related special U disk
[ad_2]