Secret-related asset security management system based on semi-active RFID technology
[ad_1]
1 Introduction
1.1 Document construction instructions
The purpose of this program is to let integrators, engineers and users understand the Internet of ThingsRFIDThe design concepts, principles, overall planning and how to play a huge role of technology in the field of security management of classified assets, and elaborate on the working principle, installation location and other information of related Internet of Things equipment, so that integrators, engineering companies, and users can correctly understand The revolutionary changes brought about by the Internet of Things in the field of intelligent transportation have established a correct understanding of the Internet of Things in the field of confidential asset management. If you encounter any confusion or confusion during the reading process, please contact the program writer.
1.2 Explanation of terms and abbreviations
Term explanation
RFIDRadio frequency identification is a communication technology that can identify specific targets and read and write related data through radio signals without the need to establish mechanical or optical contact between the identification system and specific targets
The RFID active radio frequency card is composed of an embedded processor and its software, a transmitting and receiving antenna in the card, a transceiver circuit and a high-energy battery. The special number is pre-stored in the microcontroller, and a unique encrypted identification code radio signal is transmitted intermittently. The high-energy battery in the card provides energy for the normal operation of the active card, and the battery in the card can be replaced.
Directional reader It is composed of information collection, processing, information transmission, and embedded software. Its main function is to complete the real-time collection and processing of vehicle identification code output signals.
Secret assets related to fixed assets of units, companies, families, individuals, etc., related to property and secret documents, etc.
2. Project background
2.1 Status analysis
The real-time location and tracking system for classified assets (APS: Area Position System) is an area real-time location system using the most advanced ACTIVE RFID technology in the world. The APS positioning system can timely and accurately reflect the dynamics of personnel in various areas to the central monitoring computer system, so that managers can grasp the distribution of personnel in the control area and the movement trajectory of each controlled object at any time, so as to make more reasonable manage. When there is an emergency, managers can also quickly understand the location of relevant personnel and confidential assets based on the data and graphics provided by the APS regional positioning system, and take corresponding control measures in time to improve the efficiency of safety and emergency work .
The real-time location and tracking system for classified assets is a comprehensive application system that integrates security control, personnel attendance, tracking and positioning, and daily management. It is also the most advanced, most stable, and most professionally designed regional real-time positioning system in China. The realization of this scientific and technological achievement will bring new opportunities for the safety production and daily management of enterprises, institutions and confidential units, as well as emergency first aid.
2.2 Significance of system construction
Carry out anti-theft security management on classified assets. Many valuable assets are always lost, and the unit or asset owner suffers heavy losses. In order to prevent the loss of valuable assets, the system is specially developed;
Locating, tracking, and automatically counting secret-related valuable assets, making asset management automated and intelligent;
Liberation of labor, saving management costs, and greatly improving the management level;
3. System Overview
3.1 Principles of system construction
System construction includes both software and hardware. When developing, purchasing and integrating software and hardware, Shanghai Renwei Electronic Technology Co., Ltd. guarantees that the following principles are followed:
1) Advanced
The main construction idea of the APS system is to use radio frequency automatic identification technology, embedded mobile computing technology and software technology to construct a product intelligent tracking system covering a large area, with the advantages of advanced, mature, and cost-effective products.
2) Economical
On the premise of ensuring that the technical requirements are met, the system design uses products with the best performance-to-price ratio as much as possible. The construction of the system maximizes the role of some of the original equipment, such as computer networks, equipment, software, etc., saves investment for users to the greatest extent, and protects existing user investments.
3) Practicality
The construction of the system fully meets the application requirements and actual conditions of this project, highlighting strong practicability, friendly interface and simple operation.
4) Scalability
In the system plan, the system capacity and network development plan are designed according to the viewpoint of system analysis and overall planning, which not only considers the current ease of use, but also has appropriate advancement.
The APS area real-time positioning system involves embedded technology, mobile computing technology, radio frequency identification, computer software, database, digital communications, etc. Therefore, in addition to its functions, the stability, reliability, anti-interference ability, fault tolerance and abnormal protection are also fully considered when designing the scheme. The system uses the existing mature industrial TCP/IP communication network as the main transmission platform, and the corresponding wireless identification base stations, RFID identification tags and other equipment are connected to the system, and the real-time positioning management software and the main system are used as a standard special database for the background Data exchange to achieve regional target tracking and positioning and safety management. The overall design of the system is mainly reflected in:
1) Realize the effective identification and monitoring of the entry and exit of targets in the deployment control area, so that the management system fully reflects “humanization, informationization and high automation”.
2) Provide managers with management information such as personnel entry and exit restrictions, attendance operations, cross-zone alarms, safety monitoring, help alarms, and reasonable scheduling. Once there is an emergency, the system can immediately know and trace all controlled targets. The location and history of the movement to ensure the efficient operation of safety management;
3) The safety, scalability, easy maintenance and easy operation of the system design;
4) Easy networking, BS structure, easy to realize a wider area networking monitoring.
3.2 System design features
1) Highly automated. The system can automatically detect the time and location information of the controlled target passing through the controlled area, and automatically realize the attendance, statistics and safety management of the controlled target.
2) Mature and reliable network communication system. The wireless identification base station installed in the deployment control area transmits the collected information to the central centralized control system through the TCP/IP communication network in real time, without human intervention in the whole process.
3) Complete data statistics and information query software. The system software has a dedicated database management system, including controlled target information collection and statistical analysis system, attendance statistics and management analysis system, display and print various statistical reports, and provide a full range of queries and management for senior managers Serve.
4) The safety, stability and reliability design of the system. The system products are designed to work continuously and reliably all day long in an outdoor environment.
5) Complete alarm call system configuration for abnormal conditions (including invalid card, invalid card, blacklist card entry, unauthorized area, etc.).
3.3 Main functions realized by the system
1) Real-time tracking and monitoring of the controlled target and emergency button for help, and the position is automatically displayed;
2) Real-time query and print the current and a certain period of time controlled target number, activity trajectory and distribution;
3) Attendance, statistics, storage and printing of controlled targets;
4) The static and dynamic editing and drawing of the monitoring map page is open to users, supports multiple graphics formats, and can be operated by the mouse and keyboard
Work, fully support real-time multi-tasking. While the system is collecting real-time data, the system can record, display, query, edit, manual entry, network communication, etc.;
5) The system central station and network terminals can be operated in a local area network, so that all terminals on the Internet can share monitoring information and system comprehensive analysis information, and query various data reports within the scope of use rights;
6) The monitoring software has a strong drawing ability and provides a corresponding graphic library. The operator can easily realize online and complete graphic editing, drawing and modification while continuously monitoring;
7) The RFID identification tag adopts nanowatt-level low-power design, is light in weight, does not need an external power supply, and has a variety of carrying methods for selection. The entire system will try its best to maintain the user’s existing network system and application system, and reserve interfaces, which can be combined with the existing application system or the future application system to realize the unified management function of multiple parties and reduce or avoid the user’s repeated investment.
4. General introduction of the system
4.1 System Principle
The APS real-time positioning and tracking system uses RFID (electronic tag) applications, and uses electronic tags as the most advanced identification code at present. It has the characteristics of not easy to break, reliable data, long service life, and long effective communication distance. It is an alternative to barcode and infrared identification. The best choice. Install it on the controlled target to be the unique identification of the target for tracking and positioning.
At work, managers use networked wireless identification base stations to track and locate targets.
electronic label
Simply put, RFID technology is a non-contact automatic identification technology. Its basic principle is to use radio frequency signals and their spatial coupling and transmission characteristics to realize automatic machine identification of stationary or moving objects to be identified.
The radio frequency identification system generally consists of two parts, namely the electronic tag and the reader. In the application, the electronic tag is attached to the object, equipment, and person to be identified. The reader is used to automatically remove the electronic tag in the It is agreed that identification information is taken out or specific information is written, so as to realize the function of automatically identifying items or automatically collecting item identification information.
Since RFID does not require a light path between the tag and the reader, the shortcomings of other automatic identification systems (such as bar codes) are avoided. This ensures that the RFID system can be used in harsh environments, such as dust, dirt, high humidity, and poor visibility environments. The biggest advantage of RFID is that it can still get a satisfactory read and write speed under the above-mentioned harsh environment. In most cases, it can respond within 100 milliseconds. In addition, the reading and writing of RFID is completely automatic and transparent. It does not require manual scanning of tracked objects, nor does it require activation of magnetic stripe readers, IC card readers, etc. like other contact tag technologies.
The working principle of RFID automatic identification
The system composed of RFID and short-range communication equipment mainly includes two parts: smart RFID, RFID read-write unit (Read-Write Units, RWU). The wireless communication between the read-write device RWU and RFID realizes the communication between the information management system and RFID. Information exchange.
The read-write device RWU is an RFID read-write controller, which is composed of a microprocessor, a security module, a microwave communication controller and communication interfaces such as RS232, 485, TCP/IP, etc. It uses short-range communication protocols and microwave wireless transmission methods to realize RWU For the purpose of safe and reliable information exchange with RFID, RWU connects to the host computer through RS232, 485, WIFI, GPRS, TCP/IP, etc., receives control commands and data from the host computer and returns data.
RFID is a mobile device with microwave communication function and information processing and storage functions. RFID built-in a small real-time task system to complete the internal memory, I/O, power supply, communication protocol, key, algorithm, command protocol processing and other functions of the RFID.
The core of the wireless communication protocol adopted by the short-range communication technology is the cell segmentation formed by the coverage of low-power microwave antennas, and the time division multiple access and synchronous communication mechanism based on the HDLC protocol are adopted to realize RWU- by designing corresponding processing and control software. Two-way data transmission and information exchange between RFID.
4.2 The overall structure of the system
According to the overall system functions and on-site investigations, the overall design plan of the secret-related asset management system consists of two parts. One is the external secret-related asset access control system on the floor, and the second: the secret-related asset management system within the floor. The two parts complement each other to form a complete Secret-related asset management system.
Floor foreign secret asset access control management system
Working principle of access control management system
The fixed asset access control management system is based on advanced radio frequency technology. Each mobile carrier is equipped with a wireless identification. On the first floor, two identification base stations (elevator entrance and exit installation cables) are installed at the elevator entrances and exits (unit gates). Try antennas and install directional readers at the entrance of the unit). When the wireless identification is within a certain range of the identification base station, the identification base station will automatically identify the entry and exit of the item, and automatically record the wireless identification ID number carried by the item that enters and exits; if involved If confidential assets are not authorized, the system will automatically alarm to prevent the occurrence of confidential incidents. In this way, the access to each fixed asset carrier is strictly controlled, and the actual operation is highly efficient and fast.
Access control management system function
1) Prevent the unauthorized removal of secret-related assets from unauthorized areas. For example, when a secret-related asset is authorized for internal use in the building, and the borrower deliberately or unintentionally carries the asset outside the building (again Second authorization), the reader/writer collects relevant information and transmits it to the background for comparison, and activates the alarm device to alarm to prevent confidential leakage; only the fixed assets that have been authorized for the second time can be taken out of the building. At the same time, the fixed assets Related information (such as: borrower, borrowing date, out-of-warehouse time, etc.) is automatically recorded in the database;
2) Unit leaders or unit employees only need to carry electronic tags and pass through the access control to complete the attendance function (employee’s name, position, working time and other related information are automatically entered into the database), and can print out the weekly and monthly time periods according to actual needs Attendance report;
3) Prevent strangers from breaking into the office building under various names to ensure the safety of various classified assets and administrative personnel;
4) Register and issue temporary passes to visitors, foreign businessmen, etc. approved by the leader.
Access control management system components
Long-distance fixed directional reader (all-in-one), long-distance fixed cable antenna reader
Long-distance active (passive) electronic tag, as a temporary card
PC server
Alarm system
Confidential asset management system software
Card issuer to authorize temporary cards
Access control management system installation topology diagram
Elevator cable test antenna installation diagram
Installation location diagram of the directional antenna at the entrance of the unit
4.3 Secret-related asset management system on the floor
The secret-related asset management system on the floor uses RFID technology, and each mobile carrier is equipped with a wireless identification. Install one (or more) identification base stations that match the wireless identification in the computer room so that all fixed assets are identified Within the identification range of the base station, the identifying base station will automatically identify all the ID information carried by all fixed assets and supervise the status of all fixed assets in real time. If secret assets are brought out illegally without permission, the system will send information to the monitoring center at any time and trigger an alarm. Only authorized legal fixed assets can be safely brought out, thereby ensuring the safety of each fixed asset.
The working principle of the secret-related asset management system on the floor
1) The wireless identification is scanned by the identification base station equipment, and the signal is transmitted to the server;
2) The administrator logs in to the management platform through the password-related asset management software administrator password on the server and enters the fixed license, temporary license or wireless identification number that is strictly forbidden to be carried out, and the system automatically recognizes and judges;
3) If the server receives a wireless identification that the system is set to allow to carry out, the system will automatically record the time of entry and exit and the card number;
4) If the server receives a wireless identification that the system is set to prohibit carrying out, the monitoring center or the door and its secret room alarm will beep for a long time until the danger is eliminated.
Functions of the secret-related asset management system on the floor:
1) Real-time inventory, the inventory staff click the page refresh option, the reader will complete all the fixed assets in place within a few seconds, and the uploaded system management software will inform the inventory staff of the number of inventory assets and display the loaned assets Physical information (lending time, lending period, borrower’s name, contact information, etc.), through the network mechanism of each warehouse, you can always understand the loan and lending of the company’s computer room assets across the country;
2) Regional positioning, regional non-precision positioning can be achieved through more than 3 readers.
Detailed area positioning: The main technical issues regarding RFID positioning are as follows:
◆ The complexity of the positioning environment, RFID is a technology that uses microwave transmission, and the emission of waves is irregular, and the transmission is easily affected by the environment, such as reflection, diffraction, shielding, etc.;
◆ The technical characteristics of RFID products and the problem of product recognition distance. At present, the recognition distance is mainly through adjusting the signal receiving range (reader antenna gain) and direction (receiving range) of the reader. Because these two indicators are difficult to accurately control, they limit the development of RFID positioning technology to a certain extent;
Since the reception of the reader is difficult to control, do we consider changing the antenna gain of the RFID electronic tag to achieve positioning, thereby making fuzzy judgments. .
Regional positioning plan:
ABC is a reader, the receiving range is constant, tag1 tag2 tag3 is the same parameter and gain type tag. The gain can be cycled automatically (0db 1db 2db 3db respectively). When transmitting data, it can also send its own antenna gain data.
Schematic diagram:
Take the icon tag1 as an example,
When the maximum tag gain is 2db, the ABC reader can receive the signal
When the maximum tag gain is 1db. AB reader can receive the signal
When the maximum tag gain is 0db, the A reader can receive the signal
From this, it can be calculated through the software that tag1 is closest to A, that is, tag1 is positioned near A to achieve regional positioning
Take tag2 as an example:
When the maximum tag gain is 2db, the ABC reader can receive the signal
When the maximum tag gain is 1db, the ABC reader can receive the signal
When the maximum tag gain is 0db, the B reader can receive the signal
The software can also calculate that tag2 is closest to B, that is, tag2 is positioned near B.
This solution can avoid the influence of complex environment on RFID signal transmission to a certain extent. It can judge the realization of regional positioning by the number of recognition by multiple readers and its own gain when receiving. This technology can meet some of the needs of regional positioning to a certain extent, such as: monitoring the bank cash box area, monitoring the location of special equipment in hospitals, and the positioning of classified assets and personnel. . . . .
3) Asset anti-theft and extension alarm for borrowing. The electronic tags used on classified assets on the floor have anti-dismantling function. Once the tag is forcibly removed from the classified assets, the electronic tag will send a special ID to the reader , The reader transmits the signal to the background management software to drive the alarm to alarm; for unauthorized secret assets, they are forcibly taken out of the computer room, once the signal disappears, the alarm will be triggered immediately to alarm; if a secret asset is involved The borrowing period has expired and the borrower has not returned it. The system will automatically pop up a page to display the borrower and asset-related information and trigger an alarm;
[ad_2]