Chuangyi Technology RFID Controlled Area Personnel Management System

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

  Chuangyi Technology RFID Controlled Area Management System Background

In places such as the military and prisons, due to concerns about the access rights of relevant personnel and their own management systems, access and other behaviors are strictly controlled. Without the approval of a specific leader, soldiers are resolutely not allowed to enter and exit. At present, personnel management in strictly controlled areas is achieved through signing and approving authority. The process and time are relatively cumbersome, and the personnel positioning in the controlled area can no longer be achieved. The personnel are determined to be in the area, but how do you know the area location of the personnel without communication tools? Passive systems cannot be achieved. In the area, if you want to enter a house that requires permission to enter, if there are more people with access permission, the traditional method is to equip keys or use employee cards, but there are more people, and the number of keys is too large. Moreover, keys and ordinary cards are easy to lose, and if you want to check who has entered, you can’t know.

In response to the above-mentioned problems and management drawbacks, Chuangyi Technology uses its own technology and with an excellent development team to develop the following RFID controlled area management personnel system.

Advantages of Chuangyi Technology RFID Controlled Area Personnel Management System

The system has the following advantages:

1. Accurate regional positioning
The system can realize area positioning, and in a controlled area, personnel can be positioned within an area. Since there are readers everywhere in the area, and each area is within the signal range of the fixed reader, all electronic tags in this area can be covered by the information of the reader, so as to achieve regional positioning;

2. Strict access control
At the gate of the area, a fixed card reader is installed. Personnel want to leave the area, and the guard can only let him out after receiving the approval of two specific leaders. Otherwise, personnel are prohibited from leaving the area. When the person goes out, the reader records the time when the person goes out, and records and informs the time when the person returns. If the card reader fails to read the return information of the person within the specified return time, the system will alarm the guard and related personnel.

3. Floor access control
In the area, not everyone can enter all floors. We have installed a fixed card reader with a specific function at the door of each floor, which shields the electronic tag signal close to that floor. Only when the electronic tag is close to the reader (the proximity distance can be set by yourself, generally 0.5m-1m), the reader can read the tag. In this way, the label is read and the access permission is judged. If you have permission to enter, the door will automatically open, saving the trouble of the key;

4. Judgment of personnel close to the gate
The system can judge the people close to the gate. When a person approaches the card reader at the door, the reader can send the read tag information to the system host computer at the door guard, and the system host computer can quickly call up the person’s basic information from the system database and display it on the host On board, such as name, department, photo, etc., so that the guard can better judge who is approaching;

5. Floor access judgment
For some floors with relatively high confidentiality, not only the personnel entering and exiting must be strictly monitored, but the judgment of entering and exiting is also necessary. The previous system was equipped with two doors, one in and one out. The system we set up can judge the entry and exit of personnel with a single door. Install two card readers A and B before and after the door, one after the other, first pass A and then pass B to judge as entering, on the contrary, pass B first and then pass A to judge as out.

6. Monitoring integration
The system can be integrated with the monitoring system of the area. After the area is located, the monitoring screen of a certain monitor in the area can be viewed;

7. PDA leader inspection
The system is equipped with a handheld PDA in case the leader wants to check the situation of the personnel in a certain area.

Introduction of Chuangyi Technology RFID Personnel Management System in Controlled Areas

System Overview

Each person in the area is issued an active tag, and the relevant information of the person is recorded on the tag, such as the person’s name, gender, date of birth, department, level, image, access history records, return records, access permissions, etc.; in the area A fixed card reader is placed at the gate to monitor the entry and exit of personnel. When someone approaches the gate, the card reader will give an alarm first to remind the guard to pay attention. Then the card reader recognizes the tag and transmits the data to the upper computer of the terminal in the guard room, and the upper computer will display the specific information of the person, such as name and picture. If necessary, you can send relevant data to the general control center; install a certain number of fixed card readers in the area to achieve regional positioning of personnel. The number of card readers installed is based on the on-site measurement area. The card readers are arranged (each reader has a certain recognition range and can only identify the surrounding area) as shown in the figure; two fixed readers are placed at the gate of each floor to determine Access and entry authority. If the person has access rights, the card reader will send the tag data to the system center, and the system center will control the access control system and open the door, so that no one keyless judges the person’s access and permissions.

System function realization

Access floor management

Two fixed readers (set as A and B) are installed at the door of each floor, one after the other, used to judge the entry and exit of people, the reader will shield the electronic tag signal near the floor, and only go to the door of the floor The tag can be read by the card reader; if A reads the tag first, then B reads it, it is judged as in, otherwise it is out; when the card reader reads the tag data, the data is transmitted to the system center of the control end, The system software side judges whether the person has the permission to enter the floor (the label records each person’s permission to enter each floor); if the system judges that the person has the permission to enter the floor, the system side controls the access control system and punches the door; otherwise, it does not Open the door

Access area management

When using an electronic tag card to enter and exit the area, personnel must have their own tag card. A fixed card reader is installed at the door, and a system-side host computer is installed in the guard room. When the person holding the electronic tag card approaches the door, the fixed card reader will sound an alarm to remind the door guard that someone is approaching. The card reader at the door reads the tag data, and the card reader sends the data to the system-side host computer. The system automatically calls the person’s data in the database, such as the person’s name, photo, etc., and checks whether the person has a relevant leader Approved. If approved, the upper computer will display the status of the approved leader, and when the personnel will return, start timing from this moment. When the personnel does not return within the specified return time, the upper computer of the system will issue an alarm to remind the relevant personnel to pay attention. If necessary, the data from the host computer of the guard system can be transmitted to the host computer of the control center in a wireless or wired manner;

Regional positioning management

The realization of regional positioning requires that the tags of the personnel and the various positions in the area are within the signal coverage range of the card reader to ensure that each tag in the area can be read by the card reader. The signal range of the card reader is within a few tens of meters in the area of ​​the card reader. In the area, the card reader is arranged according to the signal distribution. The card reader transmits the label data in the read area to the upper computer of the control center, and the upper computer can count the number of people in each area and display the specific situation of the personnel in each area.

Chuangyi Technology RFID Controlled Area Personnel Management System System Software Function

1. Inquire about the number and specific situation of each person in each area;
2. Realize the regional positioning of personnel;
3. Different access rights for different personnel on different floors;
4. Control the access control system of each floor;
5. Determine the basic information of the personnel near the guard;
6. Control personnel’s entry and exit area;
7. Leaders can use the PDA software system to inquire about relevant situations at any time;
8. System end and monitoring system integration.

Chuangyi Technology RFID Controlled Area Personnel Management System Hardware System

The hardware of the system consists of active tags, fixed card readers, PDAs, etc.

Active tag

Fixed card reader

PDA

Summarize

Chuangyi Technology’s RFID controlled area management system implements area location management for personnel in the controlled area. As long as the person in the area holds an electronic tag, the area location of the person can be located. It is better to manage the entry and exit of personnel, and the leader can also conveniently conduct inspections at any time. For floors that require permission to enter, it saves the trouble of manual direct registration.

Beijing Chuangyi Xingsheng Technology Development Co., Ltd.
Phone: 010-58077045 010-58077046
Fax: 010-58077046
URL:www.radio99k.com
Address: 2501, Block B, Riyuetiandi Building, South Second Ring Road, Beijing
Create a better wireless experience

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare