RFID-based entity document management system solution

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

Chapter 1 System Overview

The RFID-based document management and anti-counterfeiting system developed by Shulun Technology Co., Ltd. uses advanced science and technology to continuously materialize part of people’s business activities into various modern office equipment other than people, and these equipment and office personnel constitute services. A human-machine information processing system for a certain purpose.

The system is a set of document or article safety management system, which can manage confidential documents well, allow who can borrow documents with authority, and view the detailed information of documents and users in time. The system can fully automate the management of tangible documents and materials, thereby improving the efficiency of the use of documents; it provides powerful technical means for the implementation of relevant use regulations for confidential documents or high-value documents; it provides reliable identification of the authenticity of documents Methods.

The document cabinet or important article storage cabinet can store important documents and articles. After the system assigns corresponding tasks, the file cabinet system has the authority to be opened, allowing users to take corresponding documents or items; the access control system can effectively manage the situation where important documents are brought out at will; the copier can be effectively controlled through the management of the system Persons with authority can copy documents, but cannot copy any documents at will; the destruction machine can effectively manage whether documents and materials have the authority to be destroyed and whether the document is actually destroyed.

Chapter 2 System Functions

When RFID technology has established a binding relationship with each object (documents, borrowers, computers, communication equipment), etc., a new document registration, automatic inventory and positioning, automatic guidance, automatic identification, automatic tracking, copy and destruction control, fast A safety management system with functions such as query, alarm, and statistical documentation is established. The functions are as follows:

(1) New document registration: every new document will be affixed with an RFID tag when it is stored in the library. Through the binding operation of the tag and the corresponding document in the system, the system will automatically search when a document tag is scanned in the future All the relevant information of the document.
(2) Automatic inventory and positioning: Each smart document cabinet uses the program inside the reader to control the antenna connected to the reader, scanning one by one, that is, the process of reading the tags in the document cabinet to determine whether the document exists;
(3) Automatic guidance: Once approved by the leader, the borrower can find the required document in the shortest time according to the indicator light as long as he holds a legal ID card.
(4) Automatic identification: When the borrower finds out the specific location of the document he needs through the document resource management subsystem, he submits a borrowing application, and after the application is approved, he can take out the needed file from the file cabinet with his legal identity card Data, the system will automatically record the entire behavior.
(5) Automatic tracking: the documents contained in the clothes and packages will be automatically discovered by the system when they pass through the entrance and exit of the unit. For the documents found, the system will automatically determine whether to call the police; after the documents leave the confidential room, the system can also automatically track the documents The system automatically remembers the elapsed time for the main passages (such as confidential rooms, office building entrances and exits, corridors, etc.) that it passes through; for documents that are allowed to be carried, the system does not issue alarm notifications, and only stores the pass records for preparation Historical tracking, the system will issue alarms or notifications for unauthorized documents.
(6) Copying and destruction control: by installing RFID readers and corresponding antennas on the copier and document destruction device. When the card reader reads a valid card and finds that there is an approved copy or destroy task, the controller instructs the RFID reader to read the RFID tag signal, and checks the document whether to instruct the copier to copy or whether to destroy it by the destroyer. After the copying and destruction actions are over, status information is sent back to the central system.
(7) Quick inspections and alarms: the management personnel, applicants, and borrowers of the documents are bound to the system. After an abnormality occurs, the system can conduct quick inspections and send out an alarm signal: it instantly prompts whether the documents are moved or damaged And movement information, automatically generate related personnel and article passage records.
(8) Process management: Secure individual identification (unique identification number), which can strictly control the process of borrowing, returning, and transferring documents, ensuring the visualization of document status and real-time automatic registration. The integration of RFID and work flow management (WORK FLOW) can closely integrate document approval, access, destruction, etc. with document entities to achieve comprehensive document management
(9) Statistical document function: Leaders can view the loan status of documents in a specific period of time; who has borrowed a document; view a specific document by document number, etc.

Chapter 3 System Composition

The system is mainly composed of a hardware system and a software system.

3.1. Hardware system

The hardware of the document management and anti-counterfeiting system includes: (1) document cabinet management unit (2) access control system (3) document label (4) document copy and destruction system (5) network access system (6) data center computer, etc. part. The specific introduction is as follows:

(1) Document management unit: a document storage device with RFID reading and writing functions. Such as document cabinet unit and document drawer unit. The document cabinet is equipped with an IC card reader or a password keyboard. When a valid card or password is entered, the cabinet door will automatically open, and the system will not issue an alarm for taking out or putting in documents. Otherwise, the cabinet door will not Will open and the cabinet will sound an alarm. The cabinet is also equipped with a display screen, which displays the entered password and cardholder’s name, as well as the name of the retrieved or returned document, for the borrower to confirm. At the same time, the display screen will also display various patterns to indicate the document you intend to find In the cupboard. The above devices are connected to a central controller, and these devices are controlled by the central controller. When triggered by certain events (such as closing the door, reading a card, or pressing a button), the file cabinet will read the RFID tags attached to the documents and file folders in the entire cabinet to detect the increase or decrease of the file, and The information is transmitted to the central system or displayed for confirmation. The document cabinet is equipped with a multi-receiving RFID reader, which is connected to each antenna in the cabinet to focus the RF energy to a designated location. Cabinets and drawers are equipped with electronic locks, which are controlled by the central controller. When a valid card is inserted or a password is entered, the drawer will open automatically or the central system will order it to open. There is a bracket for hanging the document holder in the drawer.

Figure 3.1 Document cabinet with RFID reading and writing function

(2) Access control system: The access control system has an RFID monitoring module, which includes an RFID reader, an RFID antenna and an LED indicator. The RFID reader can have single or multiple RF interfaces, and the module also includes an infrared detector module and a camcorder. The RFID reader, infrared detector, and camcorder are all connected to a controller, which has a serial port, an Ethernet interface and a wireless network card to connect to the central system to realize the cooperation between the system and the personnel’s long-distance RFID work permit In addition, the access control system will automatically determine whether to give an alarm for the documents carried by the borrower: for the documents that are allowed to be carried, the system does not issue an alarm notification, but only stores the pass records for historical traceability, and for the documents that are not permitted Data, the system issues an alarm or notification.

Figure 3.2 RFID access control system

(3) Document label: There are two forms of document label: one is with a bar code attached to a document, book or material; the other is by connecting an RFID chip to a piece of metal-coated paper, Documents, books or materials.

Figure 3.5 The RFID tag on the document

Figure 3.6 Document folder with RFID tag attached

(4) Network access mode: Each module exchanges data with the central server in a wired or wireless manner. Wireless access methods include: GPRS, WIFI, Bluetooth and other currently popular wireless communication methods.

12

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare