RFID intelligent vehicle safety management system
SaveSavedRemoved 0
Deal Score0
[ad_1]
1. System overview
In response to the above problems, Beijing Zhongmao Vision Technology Development Co., Ltd. launched the latest generation of automatic vehicle entry and exit management system, with UHF RFID radio frequency identification products as the core, instead of traditional management methods, vehicles do not need to stop when entering and exiting, all identification, Judgment is realized by the system remotely and automatically, without manual intervention, preventing mistakes and cheating. The application and approval procedures for vehicle use are also completed through the internal network system of the unit and handed over to the system for automatic execution.
In response to the above problems, Beijing Zhongmao Vision Technology Development Co., Ltd. launched the latest generation of automatic vehicle entry and exit management system, with UHF RFID radio frequency identification products as the core, instead of traditional management methods, vehicles do not need to stop when entering and exiting, all identification, Judgment is realized by the system remotely and automatically, without manual intervention, preventing mistakes and cheating. The application and approval procedures for vehicle use are also completed through the internal network system of the unit and handed over to the system for automatic execution.
The intelligent vehicle safety management system based on UHF RFID technology can provide independent and uninterrupted system equipment for the passage of vehicles, and realize convenient management of vehicles. It has the characteristics of high reliability, high recognition rate, easy installation and maintenance, without manual intervention. , Automatically complete a series of on-site data collection, comparison and switch control work, saving manpower, improving work efficiency, reducing human errors and illegal release. At the same time, it also provides a new high-tech defender for the security of the entire camp.
2. System composition
The system is mainly composed of RFID hardware (electronic tags, readers, antennas) system and safety management software system:
1, RFID hardware system
[Electronic label]The electronic label records the legal number of the identified vehicle registered in the management department and the photo of the hijacked vehicle. Through the system software, each tag can be authorized to identify whether the vehicle has the right to pass through the door.
[Smart RFID Reader]Installed at gates and entrances, vehicles passing through traffic intersections that need to be monitored, responsible for driving the antenna to transmit signals or receiving signals returned by the antenna, analyze and process the electronic tag data placed on the vehicle, and transmit these data to the system at the same time In the PC server, the system software can quickly identify and record the incoming and outgoing vehicles.
[Radio frequency antenna]It is used to transmit wireless signals to activate the electronic tag, and at the same time receive the wireless radio frequency signals fed back by the electronic vehicle license, and transmit these signals to the reader.
2, Safety management software system
【Personnel Registration】Enter vehicle user information. Including: name, gender, date of birth, validity period of the certificate, department, unit or address, contact number, and photo.
[Vehicle Registration]Entry of vehicle volume information. Including: vehicle license number, vehicle type, driver, permitted driver (person allowed to drive the vehicle), engine number, frame number, make model, load, seat, user or unit, vehicle owner, vehicle photo Wait.
【Driver Registration】Enter driver information. Including: name, gender, date of birth, driver’s license number, date of obtaining the license, validity period of the certificate, type of license to drive, working hours, unit or address, contact phone number, and photo.
[Vehicle use application management]The user applies for the use of the vehicle. Including: date, vehicle license number, applicant, reason for using the vehicle, approval status, location (or range) of using the vehicle, and entry and exit time of the application.
[Vehicle use approval management]Approval of the vehicle application. Including: date, vehicle license number, applicant, the reason for using the vehicle, approval status, location of the vehicle, and approved time of entry and exit, etc.
[Vehicle Violation Record Management]Record vehicle violations. Including: violation time, driver information of the violation vehicle, and registration information of the violation vehicle.
[Vehicle usage behavior query]Comprehensive query on vehicle conditions. Including: current status, historical records, violations, and safety values. (Vehicle license number, time, access status, driver, user unit, approver, reason, location, mileage).
[Real-time vehicle information screen]Real-time display of all vehicle status information. Including: license plate number, applicant, approver, actual time of entry and exit, etc.
【Vehicle Cost Management】Registration of tariffs during vehicle use.
[Vehicle refueling management]Registration of refueling conditions during vehicle use.
【Vehicle Maintenance Management】Registration of vehicle maintenance in use.
[Management of vehicle annual review]The registration of the annual review of vehicles in use.
3. System workflow
The RFID vehicle management system involves card issuance, basic data entry, vehicle exit application and approval, entry and exit monitoring, and record query.
1, Card issuance
The electronic tag is made into a vehicle license, and then the data information in the vehicle license is read through the card issuing device and uploaded to the PC, and the electronic vehicle license is authorized through the software system. After completing the information input, fix the electronic vehicle certificate to the vehicle body or paste it on the window glass.
2,Data Entry
Enter relevant information such as car users, vehicles, drivers, and approvers.
3, Vehicle application, approval
According to agency vehicle use management regulations, any unit or individual must obtain an application and approval before using a vehicle. Before the user uses the vehicle, he applies for the use of the vehicle application system through the unit’s internal network to the superior management personnel. After receiving the application, the management personnel will give an approval and the result will be automatically sent to the system. If the approval is passed, the vehicle is allowed to go out; if the approval is not passed, the vehicle goes out illegally and immediately report to the police.
4, In and out monitoring
When the vehicle enters or exits the gate or the supervision area, the data acquisition system automatically collects the data in the electronic vehicle license for registration and judgment. The system is in automatic monitoring and acquisition status. When a legal vehicle enters and exits, the system passes the judgment and displays the release so that the vehicle can pass freely. At the same time, the system will record the time of vehicle entry and exit; when an illegal vehicle enters and exits, the system will automatically alarm and the automatic barrier will not be opened; only when the tag is damaged, The system will automatically prompt, and the staff can change the card, or manually release it. At the same time, the system will automatically control the surveillance cameras to take photos or videos of passing vehicles, and the image data will be automatically stored by the computer for inquiries.
5, Record query
According to multi-directional combination conditions such as time and vehicle information, the system can query and manage vehicle traffic data in real time to meet management requirements.
Four, system characteristics
1, Anti-counterfeiting
Every RFID tag has a unique UID number in the world, and it is unmodifiable, so RFID technology has unparalleled anti-counterfeiting performance. In the RFID tag, in addition to the UID number, there is also a part of the DATA area, which can write some data information. The vehicle number plate and license information can be encrypted and written into this area, which also has a high anti-counterfeiting feature. Through the control of the vehicle barrier system by the reader, vehicles with false certificates or unauthorized entry and exit cannot enter or exit specific areas at all.
2, Anti-borrowing
Because the vehicle license plate information can be encrypted and written into the label, and the image data in the system database can be called, it can be distinguished whether a certain vehicle has the right to use the vehicle license, which can prevent the phenomenon of vehicle license borrowing. The vehicle is unified or the license, vehicle, and driver are unified.
3, Anti-theft
If a vehicle license is accidentally lost, we can not only use the above methods to determine whether a vehicle has the right to use the vehicle license from the unity of the vehicle license number and the vehicle license. It is also possible to invalidate the vehicle license by reporting the loss of the owner. Once a vehicle tries to enter a certain area with the vehicle license report, it can be recognized on the spot.
4, Vehicle statistics
Since vehicles are automatically recognized by the reader when they enter and exit the gate, how many vehicles are in a certain compound, which vehicles have gone out, and where have they gone? And those vehicles can be counted in real time when they are on standby.
Beijing Zhongmao Weixin Technology Development Co., Ltd. is a comprehensive high-tech development company integrating scientific research, development, sales and maintenance. Mainly engaged in: target identification information management technology research, RFID and security management application and information security system research and development.
Committed to providing users with high-end professional application solutions, customized development and maintenance upgrades.
Legal reputation:
1. Beijing Zhongmao Weixin Technology Development Co., Ltd. owns copyright and other intellectual property rights of all content including but not limited to products or services and materials on the website issued by it or jointly issued with cooperative companies, which are protected by law.
1. Beijing Zhongmao Weixin Technology Development Co., Ltd. owns copyright and other intellectual property rights of all content including but not limited to products or services and materials on the website issued by it or jointly issued with cooperative companies, which are protected by law.
2. Without the written permission of the company, no unit or individual may use, copy, modify, transcribe, disseminate or bundle any part of the above-mentioned products, services, information and materials in any way or for any reason.
3. Anyone who infringes on the company’s copyright and other intellectual property rights shall be held accountable by the company in accordance with the law.
Chairman: Sun Jianzhong
Address: Room A-403, Jiahua Building, No. 9 Shangdi Third Street, Haidian District, Beijing
Tel: 010-62974923 62974916 62974396
Fax: 010-62974313 Zip code: 100085
1
[ad_2]