Shanghai Renwei Medical Baby Anti-theft System Solution
[ad_1]
1. Application background
Medical and health care is a social public undertaking related to everyone’s health. In recent years, the modernization of management in my country’s medical and health field has made considerable progress. Many medium-sized and above hospitals have adopted computer management, and are developing from a single machine to a networked and wireless direction. However, compared with the advanced international level, my country’s medical and health standards are still relatively lagging behind. How to adjust the pace of development of the medical and health system, improve its management mechanism, improve its own business and management level, better utilize the overall advantages of the hospital, increase economic efficiency and enhance competitiveness, are currently urgent problems to be solved. From a global perspective, RFID technology has become more and more widely used in the medical industry, which has played a role in saving labor, improving the efficiency of medical staff, effectively preventing medical accidents caused by operating errors, saving medical costs, and increasing safety. RFID eliminates the cumbersome operating procedures of the medical system, and can also provide patients with more freedom and convenience; for example: in the field of newborn management, newborn babies have similar characteristics and lack understanding and expression skills. If they are not effective, Signs often cause misidentification. At present, the hospital has problems such as the mother holding the wrong baby, malicious artificial replacement, and theft of the baby. How to effectively avoid this problem is to add RFID technology to the existing management software, including wristbands and fixed readers. , Access control system, positioning system, etc.
2. Introduction to RFID technology
RFID (Radio Frequency Identification Technology) is a non-contact automatic identification technology that automatically recognizes target objects and obtains related data through radio frequency signals. Conceptually, RFID is similar to barcode scanning. The barcode scanning technology attaches the encoded barcode to the target and uses a dedicated scanning reader to use photoelectric signals to transmit information from the bar magnet to the scanning reader; and RFID Use a dedicated RFID reader and a dedicated RFID unit that can be attached to the target, and use RF signals to transmit information from the RFID unit to the RFID reader.
At present, there are roughly three types of products derived from RFID technology: passive RFID products, active RFID products, and semi-active RFID products.
Passive RFID products are the first to develop, and are currently the most mature and widely used products in the market. For example, bus cards, canteen meal cards, bank cards, hotel access cards, second-generation ID cards, etc., which can be seen everywhere in our daily life, belong to the category of close contact recognition. The main operating frequencies of its products are low frequency 125KHZ, high frequency 13.56MHZ, UHF 433MHZ, and UHF 915MHZ.
Active RFID products have been slowly developed in recent years, and their long-distance automatic identification characteristics determine their huge application space and market potential. At present, there are major applications in the field of long-distance automatic identification, such as smart prisons, smart hospitals, smart parking lots, smart transportation, smart cities, smart earth, and the Internet of Things. Active RFID has sprung up in this field and belongs to the category of long-distance automatic identification. The main operating frequencies of the products are ultra-high frequency 915MHZ and microwave 2.45GHZ.
Active RFID products and passive RFID products have different characteristics, which determine different application fields and different application modes, and they also have their own advantages. But in this system, we focus on introducing semi-active RFID products between active RFID and passive RFID. This product integrates the advantages of active RFID and passive RFID. In access control management, personnel can be accurately positioned. , Regional positioning management, perimeter management, electronic fences and security alarms have great advantages.
2.1 Introduction to semi-active RFID technology
Semi-active RFID products, combined with the advantages of active RFID products and passive RFID products, under the trigger of the low frequency 125KHZ frequency, let the microwave 2.45G play its advantage. Semi-active RFID technology, which can also be called low-frequency activation triggering technology, uses low-frequency short-distance precise positioning, microwave long-distance identification and data upload to solve the functions that pure active RFID and passive RFID cannot achieve. Simply put, it is to activate positioning at a short distance, identify and upload data at a long distance. Really achieve the demeanor of a general of “strategic strategy, decisive victory thousands of miles away”.
2.2 Features and advantages of semi-active RFID technology
Semi-active RFID is a flexible application technology that is easy to control, simple and practical, and especially suitable for automatic control. The identification work does not require manual intervention. It can support both read-only working mode and read-write working mode without contact Or aiming; can work freely in various harsh environments, short-distance radio frequency products are not afraid of oil stains, dust pollution and other harsh environments, and can replace barcodes, such as tracking objects on the assembly line of a factory; long-distance radio frequency products are mostly used in traffic, The recognition distance can reach tens of meters, such as automatic toll collection or vehicle identification. Its unique advantages are beyond the reach of other identification technologies, mainly in the following aspects:
Easy and quick to read:
Data reading does not require a light source, and can even be carried out through the outer packaging. The effective recognition distance is larger, and the effective recognition distance can reach more than 30 meters;
Fast recognition speed:
As soon as the terminal enters the magnetic field, the reader can read the information in it instantly, and it can process multiple terminals at the same time to realize batch recognition and 500 tags at the same time.
Large data capacity:
The two-dimensional barcode (PDF417) with the largest data capacity can only store up to 2725 numbers; if it contains letters, the storage capacity will be less; RFID terminals can be expanded to dozens of K according to the needs of users;
Long service life and wide application range:
Its radio communication method makes it possible to work in highly polluted environments such as dust and oil pollution and radioactive environments without being in them. The closed packaging of the terminal makes the service life much longer than the printed bar code;
The label data can be changed dynamically:
The programmer can be used to write data, which gives the RFID tag the function of interactive portable data file, and the writing time is less than that of printing a bar code;
Better security:
Not only can it be embedded or attached to products of different shapes and types, but also password protection can be set for the reading and writing of terminal data, thus having higher security;
Dynamic real-time communication:
The terminal communicates with the reader at a frequency of 50-100 times per second, so as long as the object attached to the RFID terminal appears within the effective recognition range of the reader, its position can be dynamically tracked and monitored.
3 Overall introduction of semi-active RFID system
3.1 System principle
The PS real-time positioning and tracking system uses RFID (electronic tag) as the most advanced identification code at present. It has the characteristics of not easy to break, reliable data, long service cycle, and long effective communication distance. It is an alternative to barcode and infrared identification. The best choice. Install it on the controlled target to be the unique identification of the target for tracking and positioning.
At work, managers use networked wireless identification base stations to track and locate targets.
3.1.1 Semi-active RFID electronic tags
The semi-active RFID electronic tag integrates the advantages of the active RFID electronic tag and the passive RFID electronic tag as a special marker. In normal conditions, it is in a dormant state and does not work, and does not send RFID signals to the outside world. Only when it enters the activation signal range of the low-frequency activator, the tag starts to work.
3.1.2 Working principle of semi-active RFID automatic identification
Combined with a low-frequency activator, a semi-active RFID tag works normally after being activated. The activation distance of the low-frequency activator is limited. It can only be accurately activated at a small distance and a small range. In this way, the low-frequency activator is used as the base point for positioning, and different base points are installed in different positions, and then used for a long distance in a large area. The reader recognizes and reads the signal, and then uploads the signal to the management center using different upload methods. In this way, the entire process of signal collection, transmission, processing, and application is completed.
As shown in the figure above, we use RFID semi-active technology for personnel area positioning management. In each monitored area, such as each room, a semi-active positioning base station, which is our company’s low-frequency activator, is installed, and each low-frequency activation The device has 4 or 6 activating antennas. 4 or 6 adjacent rooms can share a low-frequency activator. In our positioning system, the positioning base station is the smallest base point, which is the nearest base of the positioning point. The base point, the distance of the activation tag is 3-3.5 meters, that is, each tag is activated within the range of 3-3.5 meters from the activator, and its positioning accuracy can be described as 3-3.5 meters. Activators in different areas have their own unique address codes. When a person enters the positioning base station with a semi-active low-frequency activation tag and is activated, the tag works normally. It sends the ID number of the tag to the outside world and also sends out the activation tag’s ID number. The address code of the activator, in this way, through the address code of the activator, we can locate the location of the label. When the tag is taken from one activator to another location, the uploaded activator address code will also change accordingly, thus forming a complete positioning system. The data uploaded by the tag is received by a large-scale positioning base station gateway, and the information is uploaded to the management center for processing, completing the entire positioning system.
3.1.3 Thoughts of system design
The anti-theft management system for newborn babies is built around standardization, standardization, and informatization. It is used to solve newborn anti-theft (anti-disassembly electronic wristband design, with disassembly alarm function) and mis-holding (each electronic tag has a unique code. When newborn nursing or temporary transfer of nursing rights, the nurse holds a handheld device for identity verification to prevent mis-holding), malicious exchange, and real-time positioning (real-time tracking of the newborn’s position and query of movement trajectory). The system construction is designed in accordance with the requirements of advanced, reliable and long-term development, and aims to build a set of medical industry management system. The system mainly uses the radio frequency automatic identification products provided by Shanghai Renwei Electronic Technology Co., Ltd. to realize the customer’s application requirements. At the same time, we also consider the development space of the system, with the ultimate goal of building a highly scalable product comprehensive intelligent tracking system . The entire system will try its best to maintain the user’s existing network system and application system, and reserve interfaces, which can be combined with the existing application system or the future application system to realize the unified management function of multiple parties and reduce or avoid the user’s repeated investment.
3.1.4 Principles of system construction
System construction includes both software and hardware. When developing, purchasing and integrating software and hardware, Shanghai Renwei Electronic Technology Co., Ltd. follows the following principles:
Advanced
The main construction idea of ”Newborn Baby Anti-theft Management System” is to use radio frequency automatic identification technology, software technology, and computer communication technology to construct a baby anti-theft management system covering a large area. It has the advantages of advanced, mature, and cost-effective products.
Economy
On the premise of ensuring that the technical requirements are met, the system design uses products with the best performance-to-price ratio as much as possible. The construction of the system maximizes the role of some of the original equipment, such as computer networks, equipment, software, etc., saves investment for users to the greatest extent, and protects existing user investments.
Practicality
The construction of the system fully meets the application requirements and actual conditions of this project, highlighting strong practicability, friendly interface and simple operation.
Scalability
In the system plan, the system capacity and network development plan are designed according to the viewpoint of system analysis and overall planning, which not only considers the current ease of use, but also has appropriate advancement.
4. Significance of infant anti-theft system construction
◆ Improve the level of hospital informatization and intelligent management, and lay a solid foundation for the hospital to build a higher and more comprehensive informatization;
◆ Prevent patients and babies from being misidentified and receiving wrong treatment;
◆ Patient wireless help-seeking function;
◆ Help doctors or nurses to confirm the identity of infants with similar characteristics and communication difficulties, and prevent miscarriage;
◆ Monitor and track people who enter high-risk areas without permission to prevent unnecessary accidents;
◆ Prevent the occurrence of malicious exchange and theft of babies through measures such as anti-disassembly of tags, uniqueness of ID numbers and mother-to-child pairing;
◆ When medical emergencies, epidemics of infectious diseases, terrorist threats and other situations pose a threat to the normal and effective work of the hospital, the RFID system can promote the implementation of restrictive measures to prevent unauthorized medical care, staff and patients from entering and leaving the hospital.
3.2.1 System composition and architecture
The personnel area location management system based on semi-active RFID technology is composed of semi-active RFID electronic tags, semi-active low-frequency activators, readers (receivers, electronic monitoring base stations), network equipment, computers, servers and system software. The following figure shows the system architecture of a simple personnel area positioning management system:
Figure 3-2 System network architecture
Structure diagram of baby anti-theft system
4.3.1 Significance of access control management system construction
(1) Prevent infants from being taken out illegally, and prevent infant theft;
(2) Prevent nurses and mothers from holding babies by mistake (mother-infant tag matching);
(3) When medical emergencies, epidemics of infectious diseases, terrorist threats and other situations pose a threat to the normal and effective work of the hospital, the RFID system can promote the implementation of restrictive measures to prevent unauthorized medical care, staff and patients from entering and leaving the hospital.
(4) Attendance and responsibility for hospital staff (record the entry and exit records of related workers around the clock in order to prepare for the responsibility to the individual after the incident)
4.3.2 Topology diagram of access control management system
System overall design
5.1 System function structure diagram
The construction of the system involves three parts: first, wristband label binding and information entry; second, entry and exit prohibition management system; third, real-time positioning and monitoring of the newborn infant monitoring area. The two parts of the system construction are introduced as follows:
Part 1: The mother and baby should be identified in the delivery room immediately after the baby is born. Both the mother and the baby should be transferred out of the delivery room before other patients are sent to the delivery room. The delivery room must prepare: two non-transferable labels, use them separately For mothers and newborns. The information on the label should be the same, including the mother’s full name and label number, the baby’s gender, the date and time of birth, and what other hospitals think can clearly match the biological mother and child.
Part 2: Install a reader that matches the electronic tag at the entrance and exit of the floor (or hospital). When a newborn baby equipped with an electronic wristband tag approaches a certain range of the reader, the reader can automatically identify the relevant information in the electronic tag The baby information and related data are automatically transmitted to the nurse workstation or the background host of other management departments for processing. If an unauthorized electronic tag or an unpaired electronic wristband tag is read, the reader will immediately transmit the corresponding signal to the access control controller and the background alarm device. At this time, the hospital management personnel need to take emergency anti-theft measures (the door is closed in time or Send relevant personnel to conduct inspections until the danger is eliminated), so as to achieve the safety of the newborn baby.
Part 3: Install one or two readers that are matched with the electronic wristband tags on each floor of the baby care room and monitoring area. Because the reader can read the baby’s electronic information in real time in the area where the reader can read Tag-related information, if a certain electronic tag information is not read within a certain period of time (usually 5 seconds), the reader will send relevant signals to the background alarm device to avoid theft of newborn babies.
5.2 Front-end maternal and child information binding system
Schematic diagram of RFID mother and child system
Note: In addition to the identification of newborns, the function of patient identification must be realized. At the same time, mother and baby are matched. Separate identification of infants has management loopholes, which cannot prevent malicious artificial replacement. Therefore, it is best to identify both the newborn baby and its mother, and use the same code to connect the biological mother and child. When the temporary transfer of baby care rights between hospital staff and mothers is carried out, both parties should conduct inspections at the same time to ensure the correct mother-child pairing. In addition to marking, it can also fully guarantee the safety of the marked object.
Working principle of access control management system
The electronic wristband tag is recognized by the RFID reader device, and the signal is transmitted to the server;
The administrator logs in to the platform through the password of the system administrator of the newborn baby anti-theft management software on the server
Enter the fixed permission, temporary permission or electronic label that is strictly prohibited to go out, and the system automatically recognizes and judges;
If the server receives an electronic tag that the system is set to allow to carry out, the system will automatically record the time of entry and exit and the card number;
If the server receives the electronic wristband tag that the system is set to prohibit entry and exit, the system will activate the alarm, and relevant personnel will conduct a search during the period. After the situation is resolved, the administrator will stop the alarm after the “condition is resolved” processing on the system management platform tweet. The system automatically records the alarm time, alarm card number, situation processing time, handlers and other corresponding information.
5.4 Real-time monitoring system for wards
5.4.1 Significance of building a real-time monitoring system for wards
(1) Prevent the theft from broken windows when the infant thief does not use the entrance guard, and add double insurance to the safety of the infant;
(2) Query the approximate location of nurses in real time so as to make reasonable deployment and dispatch of nurses;
(3) In the event of an emergency, nurses and patients can seek wireless help from the nurse management center or related management departments;
(4) Set permissions for some important wards and confidential rooms, alarm the entry of persons without relevant permissions and record the time of entry;
5.4.2 Expansion diagram of real-time supervision system for wards (RTLS)
Ward drawings
Schematic diagram of software terminal personnel flow
RTLS provides accurate indoor positioning that can be used anywhere, and has a lower cost relative to GPS, which is conducive to indoor use. Readers are arranged in the corridors and rooms of the entire hospital to monitor the activities of tags in each area in real time, and the locations of these terminals are marked on the display screen of a personal computer. RTLS includes a window server software, that is, the positioning engine software used to display the location of the corresponding tag according to the tag signal received by the reader, the client software for the window terminal, the tags for tracking personnel and important fixed assets, and Equipment management software for remote management of wireless clients and application software used to monitor the location of mobile terminals, assets and personnel on the displayed map image. In the hospital indoor environment, our real-time positioning system can reach 5-6M. Such high accuracy is not valuable in itself, but it is very important because it is difficult to achieve a reliable and continuous room accuracy for a less than perfect system.
6. System software introduction
6.1 Overview of software system functions
This information management system is tightly integrated with the RFID system. Through the basic information of the baby, the configuration of the system hardware, the monitoring of the baby’s entry and exit, and the design of the integration interface with other systems, a complete and independent information management system is formed to strengthen the newborn baby’s For security management such as identity verification, constant location and house theft, the system also has a complete system management function module to prevent unauthorized users from logging in.
6.11 Software cross section
6.2 System Security Management
(1) System role management
According to the different operating authority of the system operator, it is divided into different roles such as system administrator, security administrator and general information inquiry officer, which is convenient for assigning the security authority of the system to strengthen the security management of the system.
(2) System authority management
According to the different functions of the various modules of the system, set different operating permissions and assign them to different roles. When the system does not have high permissions, an alarm will be given and a login dialog box will pop up to prompt you to log in.
6.3 System basic information management
(1) Registration of newborn babies (code attribution)
Register the newborn baby’s information from the moment the newborn is born, uniformly code it and configure its related information, such as parent’s name, date of birth, gender, nurse’s name, etc.
(2) RFID binding registration:
The registered newborn babies are bundled with RFID electronic wristband information to establish a unique corresponding relationship between each baby and each RFID electronic wristband, and provide basic data for entry and exit registration and monitoring alarms.
(3) Bundle change registration:
With the replacement of the electronic wristband or the cancellation of the baby’s situation, it is necessary to change the binding registration relationship and re-establish the unique correspondence between each baby and each RFID tag.
6.4 System hardware configuration configuration management
(1) RFID parameter configuration management
This module provides the basic parameter configuration of the RFID reader, in order to ensure the reading reliability of the reader, it is convenient to adjust the reading distance of the reader.
(2) RFID orientation configuration management
Manage the position distribution of RFID readers and record them in the system, record the baby’s in and out position in order to track the baby’s flow and related location alarms.
6.5 Newborn baby entry and exit monitoring management
(1) Infant take-out registration:
This module provides the registration function for the baby to bring out, and records the name, time, reason and other information of the person who brought it out. Through the setting of the alarm module of this system, it is possible to send out an audible and visual alarm when a newborn baby enters and exits illegally (without the registration or the time of entry and exit does not match the registration time).
(2) Newborn babies return to registration:
This module provides the registration record function of the newborn baby after returning.
(3) Newborn baby entry and exit log and timely location query:
This module can query the baby’s location at all times, historical entry and exit log information, including time, location, name of the person who brought it out, and date of return.
6.6 Newborn Infant Entry and Exit Summary Report
This module collects statistics on the log information of the baby’s entry and exit, and can query the statistical report according to the actual needs of the laborer, so as to analyze the flow of the baby.
7. System integration interface design
7.1 Integrated design with access control system
This module provides an interface with the access control system, through which the access record information of the access control system can be inquired and compared with the entry and exit information of the baby in the system.
7.2 Reserve interface with other systems such as ERP
This module provides an interface with other systems such as ERP or OA, and can share basic baby information and real-time information of access monitoring with other systems, providing a bridge for the hospital’s information integration.
[ad_2]