Military secret carrier management system
[ad_1]
1.1. System Introduction
The long-distance radio frequency identification system realizes the automatic identification of objects and people in a mobile state by collecting information from the radio frequency card at a long distance and non-contact, so as to realize the automatic management of the target. The system product integrates computer software and hardware, information collection and processing, data transmission, network data communication, mechanical electronics, automatic control and smart card production and other technical integrated applications into a high-performance identification technology. It is one of the basic products to realize informatization and automatic management. First, it is an important technological means that can effectively carry out automatic identification and online supervision of valuable assets.
The project uses RFID (Radio Frequency Identification) electronic tags as the identification of valuable assets, and together with the identification induction system, it builds a complete automatic entry and exit registration and supervision alarm system for valuable assets.
The most important feature of this system is that it is based on the military’s internal LAN, builds an internal information architecture, is not interfered by external networks, realizes the transmission of basic information of valuable assets, basic personnel information, etc., and can execute control instructions of the management department and be supervised by the management department. Moreover, each system runs independently. After the system is set, it automatically transmits and receives information according to the set time, and executes the received control instructions. The system can perform global control and global information query and statistical summary, which is a feature that the previous access control system does not have.
In addition, the system can also expand the personnel management system, video surveillance system, etc., to improve the level of automated supervision and management of personnel, valuable assets and facilities.
1.2. System goals
Ÿ Asset alarm: Any asset marked with an RFID identity card entering the access control area will be automatically identified with asset information, ownership and other attribute information, and there will be lights, sounds, etc. to prompt the alarm;
Ÿ Personnel management: If any person enters the access control area without an RFID identification card, the system will prompt an alarm;
Ÿ Hierarchical management: according to the different levels of personnel can be set to allow entry/exit and not allow entry/exit;
Ÿ Intelligent: You can set the effective entry/exit time period and personnel;
Ÿ Real-time detection: You can see the entry/exit status of valuable assets on the network terminal.
1.3. Design principles
² Frequency point selection
The 915MHz radio frequency identification system is selected for this system to meet the needs of a large monitoring area, and it should have the ability to identify and record multiple tags at the same time. The 915MHz radio frequency identification system can better meet such requirements. Its reading distance can reach more than 2 meters, and it can simultaneously identify and process more than 40 tags’ information every second.
² Practicability
The system has complete functions and practical standards, and the system settings emphasize practicality; it meets the requirements of relevant domestic and foreign regulations, is simple to use and easy to operate.
² Advanced
The system maintains the technological advancement under the premise of satisfying reliability and practicability, and especially conforms to the latest development trend of computer technology and network communication technology and has mature applications.
² Safety and reliability
The system has extremely high safety and reliability. Have long-term and stable working ability.
² Openness and scalability
The system can provide software, hardware, communication, network, operating system and database management system interfaces and tools that comply with international standards, so that the system has good flexibility, compatibility and portability; it can inherit different types from different manufacturers With advanced products, the whole system can be enriched and improved continuously with the development and progress of technology.
² Standardization and structure
The configuration design of the system is structured, standardized and modularized in accordance with relevant national standards, and comprehensively reflects today’s advanced technology.
² Economical
Under the premise of realizing advancement and reliability, it can achieve functional and economical optimized design.
1.4. Features
1. The system uses non-contact encrypted readable and writable radio frequency tags to make management paperless, orderly, standardized, intelligent and efficient. The label has the characteristics of waterproof, anti-magnetic, no wear, high density, strong anti-interference ability and good anti-counterfeiting performance, which can avoid the occurrence of forgery and enhance the security of the system. When the label is used, there is no mechanical contact action, inductive communication, non-directional, convenient for users to use; non-contact encrypted read/write card, realizes the security of data recording, reduces wear and tear, and ensures the reusability of electronic tags;
2. The system uses SQL database as the background data support, with powerful data processing functions, which can complete the setting of various parameters of the system, data collection and statistics, historical data query and error traceability, and can print effective statistical reports;
3. The graphical interface accurately reflects the dynamic changes of data in real time and accurately;
4. Operator login system to ensure the traceability of work omissions;
5. All kinds of equipment are easy to operate and conform to on-site working conditions;
6. The network environment supports the TCP/IP protocol, while other communication protocols are supplementary;
7. The network query function is powerful, the report form is flexible, and the report format is flexible;
1.5. System composition and component functions
The RFID access control monitoring system is mainly composed of three basic parts, namely, on-site access control equipment (including card reader, on-site interface unit, identification induction system), system centralized controller, management server and management workstation. The main parts are:
1. On-site access control equipment
The gate data acquisition equipment mainly collects information on the time and location of the passage of objects in a long-distance non-contact manner, and provides an alarm function. The gate data acquisition equipment is equipped with the following equipment:
u Long-distance radio frequency identification system (access control identification; alarm)
u Hand-held monitoring system (verification processing after alarm; temporary inspection)
u Identification induction system
Each door is equipped with a set of remote radio frequency identification system, including antenna, reader and radio frequency tag, used to complete information collection and identification, so as to achieve the preset system functions and information management goals. in:
(1) Antenna: Transmit and receive radio signals between the reader and the radio frequency tag
(2) Reader: The reader continuously generates a 900MHz UHF carrier signal and transmits it through the antenna to activate the radio frequency card entering the area; at the same time, the high frequency carrier signal of the radio frequency tag received by the antenna is amplified and then After software demodulation and decoding, the effective digital signal is extracted through 2, the data transmission part is transmitted to 3, the monitoring and management part;
(3) Radio frequency tag: The electronic tag converts the radio signal from the reader’s antenna into its own energy in the working area of the system, and then the encrypted identification code radio signal is emitted by the tag antenna.
At the same time, the dynamic monitoring device supporting the system monitors the gate area in real time, combined with the application of the personnel card, to prevent unauthorized entry by other personnel.
2. Data transmission part
Data transmission is mainly to complete the network connection between the monitoring door and the monitoring room. This system is composed of several access control devices through the IP protocol to form a local area network, and the data transmission configuration is as follows:
u Communication cable (twisted pair or optical fiber)
u Signal conversion module (RS232 information is converted to RS485 information)
u Data transmission interface
3. Monitoring and management part
The monitoring management part is mainly to complete the processing of uploaded data, provide complete traffic record reports, generate monitoring records and other statistical reports, and monitor the status of items in and out of the system in real time. It can also be added or connected to the monitoring system to store the data in the hard disk video recorder. for future reference. The following equipment is configured for monitoring and management:
u Data communication interface
u Monitoring host, including monitoring management software
u HUB/ MODEM
u Network terminal
1.6. System Topology Diagram
620)this.style.width=620;” border=0>
1.7. System application process analysis
1.6.1. Installation of electronic tags on assets
620)this.style.width=620;” border=0>
According to the different items to be identified, the finished products and installation methods of the labels are different. The labels are divided into three categories, corresponding to different assets, as shown below:
620)this.style.width=620;” border=0>
Figure: Types of tags and corresponding fixed assets
In the pasted label, it contains the basic information of the asset, such as the unit to which it belongs, the person in charge, and the authority. This information can be viewed at any time through a handheld monitoring device:
620)this.style.width=620;” border=0>
View the information stored in the item tag through the handheld terminal
1.6.2. Installation of electronic tags on personnel certificates
The electronic label is directly made into the size of a personnel work card, and the surface can be printed with relevant personnel photos and other information
Overview of personnel access management system functions:
Basic information: You can enter basic information such as the type of unit, employee status, job title, normal working hours, and management level.
Organization setting: Enter the organization name, type, telephone, fax, mailing address and other information and establish a mutual relationship.
Staff management: staff issuance and cancellation of cards.
Sending and receiving: including reading device time, setting device time, clearing device history, setting personnel, etc.
Data collection: save the historical records of the equipment to the database for processing.
Query reports: Organization reports, employee reports, employee card status, equipment data sheets, equipment permitted personnel reports, check-in records, and equipment event reports.
1.6.3. Installation of Access Control System
Set up infrared monitoring equipment within a certain distance before and after the camp gate area. When no one passes through the camp gate, the antenna installed in the camp gate area is in a dormant state and does not emit radio signals.
1.6.4. The system records the entry and exit of personnel and assets
When a person triggers infrared detection, the electronic tag antenna starts to work to read all the electronic tags in the field. Once the personnel and secret-related asset tags are detected, analysis and judgment are immediately carried out, and the results are reflected on the monitoring terminal. While displaying the relevant information of the personnel and secret-related asset carriers, light and sound alarms are given:
620)this.style.width=620;” border=0>
Interface indication:
620)this.style.width=620;” border=0>
[ad_2]