RFID intelligent vehicle identification management system

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

1. System overview

The current management of vehicles usually adopts two modes of manual management and IC card close-range management. However, the large number and frequency of entry and exit have led to cumbersome approval and registration procedures and extremely low efficiency, and the accuracy of data is also very limited. The main defects are have:

1. For manual management, the labor intensity is high, the approval procedures are complicated, the manual delivery form has many loopholes and it is not easy to query, the entry and exit time records are inaccurate, the efficiency is low, and the error rate is high. It is difficult to identify whether the local license plate of the cadre himself and his family members is an in-hospital vehicle or a temporary visiting vehicle. Even if there is a parking permit, it is sometimes difficult to distinguish the authenticity of the vehicle.

2. For the IC card short-distance management method, the vehicle must stop and pick up the card, which is slow and cumbersome procedures.

In response to the above problems, Beijing Zhongmao Vision Technology Development Co., Ltd. launched the latest generation of automatic vehicle entry and exit management system, with UHF RFID radio frequency identification products as the core, instead of traditional management methods, vehicles do not need to stop when entering and exiting, all identification, Judgment is realized by the system remotely and automatically, without manual intervention, preventing mistakes and cheating. The application and approval procedures for vehicle use are also completed through the internal network system of the unit and handed over to the system for automatic execution.

The intelligent vehicle safety management system based on UHF RFID technology can provide independent and uninterrupted system equipment for the passage of vehicles, and realize convenient management of vehicles. It has the characteristics of high reliability, high recognition rate, easy installation and maintenance, without manual intervention. , Automatically complete a series of on-site data collection, comparison and switch control work, saving manpower, improving work efficiency, reducing human errors and illegal release. At the same time, it also provides a new high-tech defender for the security of the entire camp.

2. System composition

The system is mainly composed of RFID hardware (electronic tags, readers, antennas) system and safety management software system:

1. RFID hardware system

[Electronic label]The electronic label records the legal number of the identified vehicle registered in the management department and the photo of the hijacked vehicle. Through the system software, each tag can be authorized to identify whether the vehicle has the right to pass through the door.

[Smart RFID Reader]Installed at gates and entrances, vehicles passing through traffic intersections that need to be monitored, responsible for driving the antenna to transmit signals or receiving signals returned by the antenna, analyze and process the electronic tag data placed on the vehicle, and transmit these data to the system at the same time In the PC server, the system software can quickly identify and record the incoming and outgoing vehicles.

[Radio frequency antenna]It is used to transmit wireless signals to activate the electronic tag, and at the same time receive the wireless radio frequency signals fed back by the electronic vehicle license, and transmit these signals to the reader.

2. Safety management software system

【Personnel Registration】Enter vehicle user information. Including: name, gender, date of birth, validity period of the certificate, department, unit or address, contact number, and photo.

[Vehicle Registration]Entry of vehicle volume information. Including: vehicle license number, vehicle type, driver, permitted driver (person allowed to drive the vehicle), engine number, frame number, make model, load, seat, user or unit, vehicle owner, vehicle photo Wait.

【Driver Registration】Enter driver information. Including: name, gender, date of birth, driver’s license number, date of obtaining the license, validity period of the certificate, type of license to drive, working hours, unit or address, contact phone number, and photo.

[Vehicle use application management]The user applies for the use of the vehicle. Including: date, vehicle license number, applicant, reason for using the vehicle, approval status, location (or range) of using the vehicle, and entry and exit time of the application.

[Vehicle use approval management]Approval of the vehicle application. Including: date, vehicle license number, applicant, the reason for using the vehicle, approval status, location of the vehicle, and approved time of entry and exit, etc.

[Vehicle Accident Record Management]Record vehicle violations. Including: accident time, accident vehicle driver information, accident vehicle registration information.

[Vehicle usage behavior query]Comprehensive query on vehicle conditions. Including: current status, historical records, violations, and safety values. (Vehicle license number, time, access status, driver, user unit, approver, reason, location, mileage).

[Real-time vehicle information screen]Real-time display of all vehicle status information. Including: license plate number, applicant, approver, actual time of entry and exit, etc.

【Vehicle Cost Management】Registration of tariffs during vehicle use.

[Vehicle refueling management]Registration of refueling conditions during vehicle use.

【Vehicle Maintenance Management】Registration of vehicle maintenance in use.

[Management of vehicle annual review]The registration of the annual review of vehicles in use.

[Entry and exit monitoring]Real-time monitoring and effective management of the vehicle entry and exit process.

3. System workflow

The RFID vehicle management system involves card issuance, basic data entry, vehicle exit application and approval, entry and exit monitoring, and record query.
1. Issuing cards

The electronic tag is made into a vehicle license, and then the data information in the vehicle license is read through the card issuing device and uploaded to the PC, and the electronic vehicle license is authorized through the software system. After completing the information input, fix the electronic vehicle certificate to the vehicle body or paste it on the window glass.

2. Data entry

Enter relevant information such as car users, vehicles, drivers, and approvers.

3. Vehicle application and approval

According to agency vehicle use management regulations, any unit or individual must obtain an application and approval before using a vehicle. Before the user uses the vehicle, he applies for the use of the vehicle application system through the unit’s internal network to the superior management personnel. After receiving the application, the management personnel will give an approval and the result will be automatically sent to the system. If the approval is passed, the vehicle is allowed to go out; if the approval is not passed, the vehicle goes out illegally and immediately report to the police.

4. Access monitoring

When the vehicle enters or exits the gate or the supervision area, the data acquisition system automatically collects the data in the electronic vehicle license for registration and judgment. The system is in automatic monitoring and acquisition status. When a legal vehicle enters and exits, the system passes the judgment and displays the release so that the vehicle can pass freely. At the same time, the system will record the time of vehicle entry and exit; when an illegal vehicle enters and exits, the system will automatically alarm and the automatic barrier will not be opened; only when the tag is damaged, The system will automatically prompt, and the staff can change the card, or manually release it. At the same time, the system will automatically control the surveillance cameras to take photos or videos of passing vehicles, and the image data will be automatically stored by the computer for inquiries.

5. Record query

According to multi-directional combination conditions such as time and vehicle information, the system can query and manage vehicle traffic data in real time to meet management requirements.

Four, system characteristics

1. Anti-counterfeiting
Each RFID tag has a unique UID number in the world, and it is unmodifiable, so RFID technology has unparalleled anti-counterfeiting performance. In the RFID tag, in addition to the UID number, there is also a part of the DATA area, which can write some data information. The vehicle number plate and license information can be encrypted and written into this area, which also has a high anti-counterfeiting feature. Through the control of the vehicle barrier system by the reader, vehicles with false certificates or unauthorized entry and exit cannot enter or exit specific areas at all.

2. Anti-borrowing

Because the vehicle license plate information can be encrypted and written into the label, and the image data in the system database can be called, it can be distinguished whether a certain vehicle has the right to use the vehicle license, which can prevent the phenomenon of vehicle license borrowing. The vehicle is unified or the license, vehicle, and driver are unified.

3. Anti-theft

If a vehicle license is accidentally lost, we can not only use the above methods to determine whether a vehicle has the right to use the vehicle license from the unity of the vehicle license number and the vehicle license. It is also possible to invalidate the vehicle license by reporting the loss of the owner. Once a vehicle tries to enter a certain area with the vehicle license report, it can be recognized on the spot.

4. Vehicle statistics

Since vehicles are automatically recognized by the reader when they enter and exit the gate, how many vehicles are in a certain compound, which vehicles have gone out, and where have they gone? And those vehicles can be counted in real time when they are on standby.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare