TIIS target recognition safety management system
[ad_1]
Introduction
At present, the rapid development of RFID technology has a wide range of applications and a high degree of automation. With the internationalization and popularization storm sweeping the world, the industrial growth it brings is immeasurable. In the target market, its application is quite extensive, such as in traffic monitoring, personnel entry and exit, cargo tracking and so on. Its essence is to add RFID tags to make people, vehicles, or goods become targets that can be identified by the system by means of artificial identification. Through the management of targets and related information, effective, efficient, and effective The purpose of scientific management.
But for this kind of application based on RFID technology and computer network technology, there has not been a set of application theory for scientific guidance and analysis, which greatly reduces our system application and system integrity. Through a large amount of data analysis, we can draw such a conclusion:
1. Only when the managed object becomes an identifiable target, the system can manage it; the target itself or its process acts on the system or its subsystems through the identification unit;
2. The system must be based on certain operating rules and operating procedures, using computer network technology to scientifically perform real-time and high-efficiency calculations on the target information, and feedback various results to relevant subsystems in real time. The relevant subsystems then react to the target or interact with the target. To achieve scientific management of objects related to target behaviors.
Beijing Zhongmao Weixin Technology Development Co., Ltd. is a comprehensive high-tech development company integrating scientific research, development, sales and maintenance. Through mathematical modeling and scientific analysis and research of a large number of target management systems, we have created and developed a set of system model research technical theories applied in the field of target management with independent intellectual property rights-target identification information management technology. After a lot of theoretical research, we are committed to the research, application and development of target identification information management technology. Through mathematical modeling and scientific analysis of management objects, using high-tech technology, relying on computer network information processing systems to provide users with professional management application solutions and system development.
Target identification information management technology is to use the special exclusive attributes of the accepting object or adopt the method of artificial identification to make it a management object that can be identified by the management system-the “target”, and it is unique; the system is based on certain rules and procedures, All the subsystems that process, organize, and calculate target-related information are organized in a chain and linked together for management, which we call the “management chain”; and the information fed back by the system in the process is conveyed in real time to Relevant subsystems react to the target itself and related individual objects and their behaviors and actions to achieve “process control”; at the same time, all management behaviors and target behaviors are recorded in detail, and the records are logically judged, and the system automatically makes various intelligent responses , To achieve “behavior management”. The operation of the entire system is like a chain, interlocking and repeating. So as to achieve the purpose of effective organization, scientific calculation, reliable control, real-time monitoring, and efficient management.
1. Introduction to the system
Today’s society has completely entered the information age, and information security and information management have become an important topic in the information society. Regardless of the safety management of important information carriers such as government agencies, scientific research units, the military, and large companies, such as documents, drawings, and mobile storage devices, it is directly related to their normal operation, and even the safety of departments and individuals.
It is very important and necessary to develop a good working habit and safety awareness in daily work. However, as far as current safety management is concerned, we mostly rely on propaganda education and external intervention supervision, as well as superficial and formal inspections. These can play an educational role to a certain extent, but they cannot urge the personnel themselves. Actively obey and obey, and cannot always combine and bind systems and regulations with personal growth.
How to achieve the safety management of information carriers, and at the same time enable everyone involved in the application of these carriers to consciously participate in it, and achieve seamless connection and organic integration? A solution based on target recognition management technology can solve this problem well. .
Combining its own technical advantages, Beijing Zhongmao Vision Technology Development Co., Ltd. developed a target identification information system for the security management of important information carriers-TIIS system, which is mainly used for important information carriers or media targets (such as paper documents, drawings or mobile Storage equipment) and application objects (that is, those who contact, use, and keep confidential information) target management. The goal and management, process and behavior are organically combined to form a complete management chain to realize the information application of various management functions.
Based on comprehensive considerations such as technical principles, characteristics, applicability and market factors, RFID-based target recognition application development is the best choice for information management. Moreover, the application characteristics and mature experience of RFID can be easily extended to the field to which it is applied, which is convenient for development, deployment and application.
Based on TIIS, it is the management of important information carriers and related behaviors. Therefore, the system must be logically complete, system perfect, safe and stable, clear responsibilities and rights, detailed logs, reliability close to 1, easy to operate, and easy to deploy. Its application can be easily extended to the management of personnel, vehicles, inventory, etc. The existing system and its subsystems completely exceed the existing application requirements in function.
2. Technical introduction
Mark important information objects with RFID tags to make them the target, and store the target data in the database (database) to make them a target that can be identified by the TIIS system, and deploy the target identification and data in the TIIS system in different management units and monitoring points Reading device-RFID reader, which reads the target data that enters the coverage area of the antenna (data acquisition platform); transmits the data to the management server through a wireless network (data transmission platform), and uses various configuration modules to Data analysis, research and judgment, and release (service platform); respond to target behaviors according to module configuration. Realize the safe and effective management of important information carriers, involved personnel, and related behaviors.
The RFID technology used in the system is based on the application of the UHF UHF UHF band technology standards announced by the country this year. It has non-contact two-way communication, automatically recognizes the target object and obtains relevant data; high accuracy, long recognition distance, fast reading speed, and adaptability Strong environmental ability, anti-interference, good penetration; rich hardware options, fast operation and many other advantages. It is now being vigorously promoted and applied by many global retail giants and the US Department of Defense.
The TIIS system will essentially change the previous management model, based on the “process management” of important information, which not only includes the management of the object itself, but more importantly, it can generate, move, disseminate, store, and inspect important information. The development process of a series of events is managed. Management events are always accompanied by the development process of things. They are recorded, analyzed, and summarized, evaluated and judged according to pre-established rules, and issued early warnings and alarms. It can manage matters more humanely and get rid of the interference of human factors at the same time, embodying “humanities, science and technology, humanities management”.
Three, system structure
This system is mainly composed of electronic tags, UHF RFID identification equipment, control modules, and management chain systems to realize automatic monitoring and simple operation. With modular configuration, all functional modules can be deployed independently or in combination, and interfaces are reserved for the development of customized modules.
(1) Electronic label
Depending on the type of carrier, labels with different characteristics can be pasted or inlaid. The encrypted target information coded data is stored in the label, which corresponds to the target information in the system database.
(2) UHF RFID identification equipment
TI-R1 is a long-distance UHF reader specially designed for carriers and personnel. It has four read-write antennas and is suitable for outdoor installation. It can directly transmit data through a network cable and serial-parallel interface, which can read a large number of overlapping tags. Better meet the needs of carrier control and access monitoring. The data information in the electronic tag in the target can be read non-contact and remotely, and the data in the tag can be rewritten or terminated according to the system settings.
(3) Control module
As an independent functional hardware necessary for the system, it can control up to 16 infrared monitoring signals, control the switch of the reader antenna; output display data to the LCD screen and LED screen; control the data transmission of the system.
(4) Management chain system
Including the following 5 independent function modules and system database composition.
1. Cataloging
The main task is to identify foreign carriers and become targets, and process the target information into categories and catalogs.
2. Approval
Allocate carrier usage rights in strict accordance with the ownership rights of personnel and carriers. Including: the use of approval carrier, approval inquiry, approved inquiry, carrier tracking, and the setting of system related parameters.
3. Search
The retrieval system mainly provides retrieval of data in this system, and users can query the required information in various ways, make inquiries, and make appointments.
4. Management chain
The main functions of the management chain include: registration of application target personnel, license processing, cancellation, carrier operation, user information query, file information query, operator’s work record, and the setting of system related parameters.
5. Monitoring
Receive and process the data sent by the control module and the identification device, intelligently judge the match between the access and the target, analyze the target data in real time, and automatically alarm for illegal behavior.
6. System database
The server side of the target data.
Four, system characteristics
1. Real-time management, quick and easy operation, detailed log records, complete “management link”;
2. Automatic identification, long distance, high precision, good anti-interference, strong environmental adaptability, and realize “intelligent judgment”;
3. The information is disclosed by level, with strict authority control and clear levels, to achieve “upward responsibility”;
4. The system data and the system hardware fingerprint are bound and encrypted, and the module data is encrypted for transmission;
5. The system is independently encrypted and coded to prevent information leakage and facilitate data fusion;
6. A strong supervisory and supervisory role requires personnel to consciously abide by system rules and operating procedures, which facilitates real-time control, inspection and supervision by leaders;
7. Humanized management, avoid conflicts, unique early warning and alarm functions;
8. Unique quantitative management of safety credit value, quantitative work statistics, convenient for quantitative assessment;
9. Distributed structure, convenient for networking, mobile deployment and scope expansion;
10. Modular design is convenient for function expansion and special module customization.
Five, application areas
1. Government agencies
2. Army
3. Institutions
4. Books and archives management department
5. Research institutes
6. Information management needs of enterprises and companies
7. High-end application customers
Beijing Zhongmao Weixin Technology Development Co., Ltd. is a comprehensive high-tech development company integrating scientific research, development, sales and maintenance. Mainly engaged in: target identification information management technology research, RFID and security management application and information security system research and development.
Committed to providing users with high-end professional application solutions, customized development and maintenance upgrades.
Legal reputation:
1. Beijing Zhongmao Weixin Technology Development Co., Ltd. owns copyright and other intellectual property rights of all contents including but not limited to products or services and materials on the website issued by it or jointly issued with cooperative companies, which are protected by law.
2. Without the written permission of the company, no unit or individual may use, copy, modify, transcribe, disseminate or bundle any part of the above-mentioned products, services, information and materials in any way or for any reason.
3. Anyone who infringes on the company’s copyright and other intellectual property rights shall be held accountable by the company in accordance with the law.
Address: Room A-403, Jiahua Building, No. 9 Shangdi Third Street, Haidian District, Beijing
Tel: 010-62974923 62974916 62974396
Fax: 010-62974313 Post Code: 100085
[ad_2]