Shanghai Zhongling Secret Assets Security Management System
[ad_1]
1. System significance
Carry out anti-theft and safety management of classified assets to prevent the occurrence of loss or leaks.
Locating, tracking, and automatically counting secret-related valuable assets, making asset management automated and intelligent;
Liberation of labor, saving management costs, and greatly improving the management level;
2. System architecture and program description
The APS real-time positioning and tracking system uses RFID (electronic tag) applications, and uses electronic tags as the most advanced identification code at present. It has the characteristics of not easy to break, reliable data, long service life, and long effective communication distance. It is an alternative to barcode and infrared identification. The best choice. Install it on the controlled target to be the unique identification of the target for tracking and positioning.
2.1 System architecture
In-building asset management system
Secret-related asset management system structure diagram in the floor
Application of secret-related asset management system in the floorRFIDTechnology, each mobile carrier is equipped with a wireless identification, and one (or more) identification base stations that are matched with the wireless identification are installed in the computer room, so that all fixed assets are within the identification range of the identification base station. Automatically identify all ID information carried by all fixed assets, and monitor the status of all fixed assets in real time. If secret assets are brought out illegally without permission, the system will send information to the monitoring center at any time and trigger an alarm. Only authorized legal fixed assets can be safely brought out, thereby ensuring the safety of each fixed asset.
Out-of-floor asset access control management system
Structure diagram of the access control management system for assets outside the floor
The fixed asset access control management system is based on advanced radio frequency technology. Each mobile carrier is equipped with a wireless identification. On the first floor, two identification base stations (elevator entrance and exit installation cables) are installed at the elevator entrance and exit (unit gate). Test antenna, installation directionality at unit gateReader), when the wireless identification is within a certain range of the identification base station, the identification base station will automatically identify the entry and exit of items, and automatically record the wireless identification ID number carried by the entry and exit items; if the secret asset is unauthorized, the system will automatically alarm to prevent involvement The occurrence of a secret incident. In this way, the access to each fixed asset carrier is strictly controlled, and the actual operation is highly efficient and fast.
3. Typical cases
Real-time tracking and positioning system for secret-related assets of a certain security cabinet of Nanjing Air Force
Motorola (Motorola) real-time tracking and positioning system for classified assets (RTLS)
Real-time Locating System (RTLS) for Confidential Assets of a Military Region in Beijing
British Biodata LT equipment real-time tracking and positioning system (RTLS)
Real-time tracking and positioning system for fixed assets (RTLS) of an aerospace research institute
[ad_2]