Yixintong RFID personnel and vehicle intelligent management system solutions
[ad_1]
1. System overview
With the development of economy, the scale of enterprise personnel and the number of private vehicles are also expanding. The personnel structure of entering and exiting enterprises is increasingly showing diversified characteristics, such as the large number of vehicles entering and exiting, and the high frequency of entering and exiting. On-site management work has brought great difficulties. Because the traditional manual record management model has problems such as low efficiency, manual intervention, easy loss of information, and inability to interact in real time, the management of personnel cannot be truly informatized. Scientific.
This system is a system solution based on RFID technology proposed for the problems of enterprise personnel access and vehicle access management. Through different label types and permission settings, it is applied to enterprise personnel entry and exit management and information identification and inspection, and at the same time realizes the intelligent management of entering and exiting vehicles, taking delivery vehicles, fixed vehicles, and temporary vehicles entering and exiting the company/enterprise as the service objects to achieve It is convenient, fast, safe to enter and exit users, and the management is scientific and efficient. It can not only improve the efficiency of work, but also improve the timeliness, accuracy and sharing of data.
2. Demand analysis
2.1 Hardware equipment requirements
High reliability design: product design should follow the principle of 24-hour uninterrupted operation; considerate electromagnetic interference protection and electrostatic protection; adopt modular design, and the connection between each module is simple and consistent; data communication adopts international standards and error control Rigorous; the internal power supply of the control machine is DC/DC isolated to improve the anti-interference ability of the product and the stability of the system;
Strong environmental adaptability: The product should use industrial-grade components to adapt to harsh and complex working environments; the structural parts are strong and firm; the service life is not less than five years, and the anti-rust and explosion-proof treatments are perfect; ventilation, heat dissipation, earthquake resistance, moisture-proof and anti-communication measures Strict and effective, the system can support the three-level lightning protection function, and has a good defense against induced lightning;
Reliable equipment quality: equipment procurement, manufacturing, testing, installation and commissioning all follow strict quality management and control requirements;
The modular design of the system hardware equipment adopts a distributed system to facilitate the increase of subsystems and functions in the future. Various resources of computer equipment retain sufficient margin; the design of software adopts the modularization of subsystems and functions, and the increase of subsystems and functions. It’s just the increase of modules; the design of the system ensures that no large-scale adjustments will be made in the future due to technical adjustments and the increase of access ports.
The modular design of hardware equipment reduces maintenance costs and guarantees timely and reliable maintenance; the software design adopts a functional modular design to facilitate the maintenance of various subsystems and sub-functions, and the program structure is clear.
2.2 System security
The system should adopt strict hierarchical management technology, operation password and smart card verification network authority design, double authentication, effectively avoid illegal overstepping operations, all levels of management are defined by customer requirements;
There are protective measures for all data files. The creation, modification, deletion and query of data should be authorized to prevent illegal operations on the data; the modification and deletion of original data are recorded in log files for future verification.
2.3 Rationality of management operations
Choose a friendly Chinese operation interface to ensure that the operator is easy to learn and use;
Divide the display screen into different areas, such as: status display area, operation area, operation prompt area, etc.; some content of the status display area can be displayed intuitively in a graphical manner; for common operations, the displayed content is prominent, Increase
When an alarm occurs in the system, there will be a sound prompt, and the monitoring center will display the alarm area and status area monitoring screen. When the system or a certain equipment fails, the bidder shall provide emergency measures, and record the local special handling during the failure period after the system is restored.
With a simple mouse click, system settings can be easily performed, which is convenient for users to set various functions, etc.;
The universal query function can query system usage and related data through one condition or a combination of multiple conditions, and can generate reports according to customer requirements or electronic reports that are convenient for other systems to call;
Provide various statistical data output in different report forms, provide any form of query and output in report form;
Retaining the international standard interface, the factory gate access control monitoring software should design and develop the interface required by the above-mentioned conceptual design, and at the same time develop the interface with the company’s existing collaborative management system to facilitate system expansion.
3. System scheme design
3.1 System construction goals
Establish a multifunctional supervisory software platform based on the modular design idea of high scalability and multi-compatibility
Establish a standardized and unified personnel management mechanism
Through the multi-functional and multi-domain management of one card per person, efficient and accurate personnel management is achieved, which is convenient for the company and for the individual.
Very established safe and reliable vehicle management system
Through the combined identification of RFID and video capture, it can distinguish between vehicles in the factory and vehicles outside the factory, and realize the corresponding identification of vehicle owners and vehicles; and regulate the traffic behavior of vehicles in the factory through road monitoring.
3.2 System Engineering Technology
3.2.1 RFID technology
1) The RFID cards for personnel and vehicles use 915MHz and 13.56MHz integrated composite cards, the number is 4100, and the long-distance effective reading distance is not less than 10m.
2) The memory capacity of the RFID card is at least 1024bits EEPROM memory, which can be read, written, erased and then written. The user can permanently write-protect the designated word area to make the application system safe and reliable. Users can add passwords to store data.
3) The memory can be repeatedly erased and written for more than 100,000 times, with an effective service life of more than ten years.
4) The label has a certain anti-disassembly function, and the company LOGO can be printed on it. The human card should be easy to carry, and the car card should be easy to detect and store.
5) The RFID card should adopt the binary tree anti-collision protocol, anti-collision, and allow reliable reading and writing when there are multiple tags in the work area.
6) The reader adopts an international interface, and the average reading of 32Bits is less than 10ms.
7) The reader/writer of the pedestrian passage system can record offline, with at least 15,000 records.
8) The reader can read RFID cards of different manufacturers, which is universal.
9). The antenna power can be adjusted between 12-36dBm to enhance the effective range of reading. At least 40 tags can be read per second at the same time.
10) The antenna must have frequency hopping anti-interference function, be able to resist harsh environment, lightning protection and other functions.
3.2.2 Analysis of the access channel system
1) The purpose of the XX project is to strengthen the management of personnel and vehicles entering and leaving the enterprise, ensuring the safety of production, the safety of assets, and restricting the entry of irrelevant personnel. It can detect the passage of people without cards and unauthorized personnel in time, call the police, take pictures, and manually video monitor and track the movement of personnel and vehicles. For foreign vehicles and personnel, it is necessary to register at the enterprise certificate office, after paying a specified amount of deposit, enter the personnel-related information into the RFID card and then open the corresponding access control authority, and notify that they can move in a specific area. The RFID card will be returned when the personnel leaves and the corresponding deposit will be returned.
2) Sensitive control, reliable detection, rapid action, and rapid alarm at the channels entering and exiting the enterprise.
3) The technical parameters of the gate passages of each bus yard are as follows:
Pedestrian passage: 3.5 to 4m, vehicle road width: about 18m. There should be at least 5×5m open space inside and outside the pedestrian access door.
Panorama of the gate
Pedestrian passage road map
4). The peak period when the gates of the 15 bus depots in the city pass is the commuting time, with an average of about 500 people passing by. Bicycles and cars are the means of transportation.
5). Each gate passage is divided into pedestrian passages and vehicle passages. The passage principle is right-hand passage. The pedestrian passage adopts single-sided dual passages, and the width of the two passages allows bicycles to be pushed in and out; the car passage adopts a double-pole split take-off and landing method, and the opening time is not higher than 1.8 seconds.
6) The vehicle barriers of the main gate passage are equipped with license plate cameras and vehicle type cameras (panoramic cameras). The vehicle type cameras are also used as video surveillance cameras to monitor the operation of the lanes. The opening condition is that when the system detects the personnel card or non-security personnel card in the car, the security guard manually controls the opening of the gate. The license plate camera recognizes accurately and quickly, and the vehicle camera takes pictures to ensure the quality of night pictures.
7). Each gate personnel channel is single-sided and dual-channel, using 13.56MHz frequency card reader authorization, the channel is equipped with a camera to alarm and take pictures, and the camera is also used as an in and out surveillance camera.
8). The personnel on the motor vehicle conduct detection statistics through the 915MHz antenna, which is only used as a condition for the detection and judgment of the personnel in the vehicle.
9). Each gate channel configuration: vehicle barriers, license plate cameras and vehicle type cameras (panoramic cameras). The vehicle type cameras are also used as video surveillance cameras to monitor the operation of the lanes. The opening condition is that when the system detects that the personnel card in the car is also a non-security personnel card, the security guard manually controls the opening of the brake. The license plate camera recognizes accurately and quickly, and the vehicle camera takes pictures when passing through. The barriers are arranged on both sides. The pole is 4 meters long and the opening time is no more than 3 seconds. The personnel on the motor vehicle conduct detection statistics through the 915MHz antenna, and the statistics are required to be accurate and timely.
10). Single-sided dual-channels for personnel entering and exiting the gates of each bus yard to meet the needs of personnel entering and exiting. A camera is set in the channel to alarm and take pictures, and the camera also serves as a surveillance camera for personnel entering and exiting. Pedestrian passages and motor vehicle lanes are equipped with isolation fences for effective isolation.
11) The pedestrian passage system uses manual card swiping to enter and exit. After paying the specified amount of deposit, enter the personnel and vehicle-related information into the RFID card to open the corresponding access control authority, and notify that you can move in the specified area/bus yard. When the personnel leave, the corresponding deposit and RFID card will be returned. When designing, we must consider the location of foreign personnel and vehicles at the time of RFID registration and return.
12). The personnel passage in each entry and exit passage of the enterprise adopts the swing wing action, and the swing speed of the door wing is less than 0.6 seconds.
13). The personnel channel can self-check and prompt for failures, can prevent trailing function, run-through alarm function, and can count information related to personnel entering and exiting.
14). The personnel channel has an automatic reset function. When the card is not passed for a certain period of time after swiping the card, the system will automatically reset, and the interval time can be set freely.
15). The personnel channel can be set with a variety of traffic modes or current limiting modes, and different action modes can be set according to the time, such as normally open during the day, normally closed at night, and closed on the left and right.
16). The personnel passage traffic indicator is accurate and bright, and can be clearly indicated under strong light.
17). After the personnel channel is powered off, it can be set to automatically open the function.
18). The vehicle channel can remotely open the barriers.
19). The starting action time of the vehicle channel gate can be set freely, and the longest action time can be seen in the above requirements.
20). Vehicle barriers have at least overcurrent protection, stepless speed regulation, travel protection, function of moving and falling rod, and function of anti-smashing.
21). The time of delay opening or closing of the vehicle barrier can be set at will.
22). Vehicle management can perform image comparison, check vehicles and numbers, and prevent vehicles from being stolen.
23). The monitoring center (8 demonstration examples in the figure) is located in the enterprise center computer room to monitor the pedestrian passages entering and exiting the 15 bus depot gates, the overall operation of the vehicle passages, and the individual operation of each passage.
24). Data transmission adopts analog signals, which are converted by optical transceivers and enter the company-wide/enterprise optical fiber network.
25), the camera pixel is not less than 460 lines.
26). The camera can support night photography and fill up the light at night. The camera flash requires good operation and reliable action.
27). The camera can be remotely controlled, and the camera can manually track suspects or vehicles throughout the process.
28). The image data can be stored for no less than 20 days.
29). The installation of monitoring points is generous and reasonable, and the equipment is installed neatly.
30). The monitor adopts two 21-inch color monitors.
31). The hard disk video recorder can use MPEG4 or H.264 compression algorithm to record the image signal, and adopts 16-channel digital hard disk video recorder. The recording system adopts D1 format.
32). The monitoring center is equipped with a video matrix, which uses 32 channels of input and 16 channels of output. Able to switch the video signal of all front-end cameras.
33). The monitoring center is equipped with an alarm receiving control device, which can realize alarm linkage with related cameras. Adopt sound and light alarm device. The local control room receives local alarm information and alarms with sound and light.
34). The pedestrian passages and vehicle passages at the gate of each bus depot use model cameras (gun-type) and personnel passage cameras (gun-type) to monitor the entire passage while separately setting up surveillance cameras for the entire area.
35). The deletion and change of monitoring data must be operated by authorized personnel. Security personnel have no right to modify the monitoring data, but can only view it.
3.2.3 Analysis of software function requirements
1). Large databases such as SQL server or Oracle are used.
2) The safety supervision and protection system should be composed of the following subsystems: basic data management, pedestrian vehicle management system, and road monitoring system. Basic data management, pedestrian vehicle management, road monitoring, and the company’s existing application system interfaces are developed and implemented this time. Other modules provide interfaces and provide codes.
3) In order to ensure a seamless interface between RFID personnel and vehicle intelligent management systems, existing business systems and future online business systems, ensure data integrity and consistency, and avoid information islands, software design methods should follow SOA design methods and standards .
4) The backbone network of the enterprise is a gigabit network, and the office network is a 100M network. (Fill in according to the actual situation of the enterprise)
5) The server adopts the IBM brand, equipped with a CPU (multi-core converted to a single-core CPU, the main frequency is 3.0G), 4G memory, 15K to 3.5 inches 300G×6, dual power supplies, support Raid 0, 1, 3, 5, hard disk The data record is not less than 20 years.
6) The video recording time of the monitoring system is not less than 20 days. The photo information is recorded in different locations for easy viewing and management. The data image storage requires a certain compression technology.
7). The vehicle image comparison function, which compares the information of the vehicle to be passed with the image information in the card, and releases after confirming that the vehicle information is correct.
8) The alarm image can be recorded quickly and can be easily inquired.
9). Record the gate opening information and confirm.
10). The software system (including monitoring) supports simultaneous viewing and management of two places and above, and different operation permissions can be granted. The software supports workstation management and can control the system flexibly to achieve rapid response.
11) The software supports the query of the workstation and the management function after authorization.
[ad_2]