RFID secret carrier in-place management system

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

Chapter 1 Overview

With the rapid development of information technology today, the use of digital media to store, transmit, and process classified information has become common in the military and party and government agencies. However, due to the lack of effective technical supervision methods, the random deployment and chaotic belting of secret-related carriers, and the inadvertent supervision of personnel entering and exiting secret-related areas, the number of incidents of leakage of secrets caused by this is increasing, which directly endangers the security of the country and the military. The construction of the security and secrecy management of secret-related carriers is a requirement and a strict line of defense for the development of information security management of the military and party and government agencies.

According to the unconsciously brought out of the secret-related carriers and the inadvertent management of personnel in the secret-related areas caused serious leaks, the use of RFID radio frequency identification technology will realize the implementation of the in-place supervision system of the secret-related carriers, and play a full-scale supervision. As a result, it can effectively solve the problem of management of secret carriers and other equipment brought out and the problem of strict control and management of foreign visitors. Specially launched the “secret-related carrier in-place supervision system”, and strictly supervised and dealt with methods such as alarming and recording and storing relevant information on carriers brought out privately in violation of regulations.

This system uses radio frequency identification technology to realize the overall idea of ​​the secret-related carrier in-place supervision system, especially the management of the personnel who enter and exit the secret-related area and the secret-related carrier. The program uses the management system software center and the RF card reader to form a radio frequency electronic identification card issuing system, establishes a one-to-one correspondence between the secret carrier and personnel entering and exits the secret area, and the radio frequency electronic identification, and uses the reader to form a supervisory system to achieve access The management of personnel in secret areas and secret-related carriers. The system will issue an audible and visual alarm when the secret-related carriers are brought out privately in violation of regulations, and record the carrier’s data and time at the same time; the management system can be connected to the local area network for use The network technology realizes the interconnection between the gate and the confidential area, which simplifies the system connection relationship and the complicated operation process; the application and approval of the external carrier of the secret carrier achieve the purpose of effective, convenient and comprehensive supervision.
The construction of confidential carrier security and confidentiality systems is the trend and requirement of the development of information security management. The application of radio frequency identification technology to the confidential management of confidential carriers can better solve the out-of-office management problems of devices such as confidential notebooks. In the current military In an environment where the forms of struggle are complex and changeable, and the struggle against theft and anti-secrets is increasingly acute, the confidentiality of military information is becoming more and more important. Strengthening the management of confidential carriers with the help of radio frequency identification technology will play an important role in information security and confidentiality. Radio frequency identification technology is a technology that has attracted much attention all over the world in recent years. It has developed rapidly and has a huge application prospect. Through the implementation of the security and confidentiality management system for secret-related carriers based on radio frequency identification technology, we have accumulated experience in the application of radio frequency identification technology, promoted the application of radio frequency identification technology research results, and carried out radio frequency identification technology in military equipment management, safety management, personnel management, and logistics support The application of RFID technology will give full play to the role of radio frequency identification technology in the military, and achieve the purpose of ensuring the smooth completion of military objectives and improving efficiency.

The “RFID-related secret carrier in-place supervision system” (hereinafter referred to as the secret-related system) supervises secret-related carriers such as U disks embedded or pasted with special electronic identification cards, mobile hard disks, laptops, folders, etc.; at the same time, access to secret-related areas Internal and external personnel to supervise.

The “secret-related system” detects and recognizes the entry and exit of the supervision object in the secret-related area, displays relevant detailed information and alarms according to the violation of the supervision object, automatically records and stores the information, and prompts the guards and confidential personnel to manage and deal with it promptly .

Chapter 2 System Function and Technical Index

  2.1 System function

RFID secret carrier in-place management system

  Each carrier must be registered through the system software and stored in the library.After the carrier is put into the warehouse, the system will automatically check whether each carrier is in place in real time within 24 hours. Once the system detects the illegal disappearance of the carrier, the system will automatically alert the management personnel, and the specific information of the disappeared carrier will be displayed in real time through the system software and saved in the system. Software database for reference

When the authorized carry-out carrier (active radio frequency electronic tag) is brought out of the supervision area, the system will automatically record the relevant information (unit, responsible person, carrier type, time, status), and automatically record and store the current event record. Prepare for future inquiry. At the same time, the door query machine will also display the relevant information of the carrier in real time, which is convenient for management personnel to view.

When the carrier is brought out without authorization, the system will automatically emit an alarm tone, display the relevant information of the carrier (unit, responsible person, carrier type, time, status), and can automatically record and store and shoot the whole process video recording. Intervention by the guards.

When the carrier enters the door, no matter whether it is authorized or not, it will not alarm, only record the carrier’s relevant information and time, store the relevant information, and automatically change the state of the carrier, for example: it has been out of the warehouse and becomes already in the warehouse.

The system can set the return time after the carrier is brought out. If the authorized carrier is brought out and is not returned to the warehouse within the specified time, the system will prompt an alarm and notify the management staff to intervene.

It integrates local area network, controller, and PC to form a powerful network system, supports RS485 and TCP/IP communication methods, and supports two-mode hybrid networking, and can easily realize Internet remote networking.

The PC can be placed anywhere in the network, and can monitor and manage all controllers in the system. The PC can monitor various events in real time, dynamic online display, and user-friendly operation interface, making the operation and management of the system very simple, and each controller can also be configured and tested through a laptop PC on site.

2.2 Main technical indicators

  Secret carrier monitoring width 2-6 meters

Secret carrier monitoring height 0-3.5 meters

Secret carrier monitoring distance 3-15 meters

The antenna transmission distance is 10-30 meters (depending on the tag type)

High-power antenna transmission distance 60-130 meters (depending on the tag type)

Multi-identification ability ≥20

Identifies battery life ≥ 3 years (in standard mode)

Label card size 83×52×5.5mm

Small hanging label size 46×35×10.5mm

Touch all-in-one machine size 1370 (height) × 470 (width) × 380 (depth) mm

Chapter III Design Principles and Main Features

3.1 Standardization principle

  The electronic identification used in this system uses the current international advanced 2.4G microwave, low power consumption, and long-distance identification Internet of Things technology.

3.2 System characteristics

  Adopt advanced RFID technology system for secret carrier supervision.

Each part of the system is connected by a wireless network. The reader can be directly installed in the touch screen all-in-one machine or in the ceiling. The installation is convenient, the channel structure is abandoned, and it is easy to integrate with the environment.
The logo adopts low-frequency activation technology, and it is launched instantaneously only when it is close to the card reader. It does not launch at ordinary times, which prolongs the battery life and improves the security and confidentiality of the system.

The use of active identification, low frequency control the identification distance, high frequency determines the identification effect, so that the system’s identification distance control is reliable, and the anti-blocking performance is superior.

Multiple security protection measures effectively prevent technical theft and logo duplication.

Chapter 4 System Scheme Design

  The system adopts radio frequency identification technology to construct a comprehensive supervision system composed of three parts: “in-place supervision, electronic label and management center”.

4.1 Supervision System

The system is mainly composed of four parts: reader, electronic label, touch all-in-one machine, and management software. It is installed at the entrance and exit of the supervision area, and automatically detects and records the secret-related carriers and personnel in and out of the channel, and carries out unauthorized carriers. Raise an alarm.

The system management center and the reader are connected through the internal LAN to realize real-time monitoring of all carriers and personnel entering and exiting secret places.

The radio frequency sensing area at the gate of the district is used to register and distribute the information of visitors entering the confidential area, compare it with the relevant registration information stored at the entrance of the confidential area, and release it when they are consistent.

The all-in-one machine uses a vertical touch screen all-in-one machine, installed on the side of the gate, and immediately displays the photo, unit, type, time, status and other information at the entrance of personnel and carriers for the guards to view, use and process.

electronic label

  Adopting the current international advanced wireless chips, low-power chips and related circuits designed to meet the needs of the system, to ensure the service life of the battery and the reliability of the logo.

The electronic tag used by the system is safe and harmless. It can only work instantaneously when it passes through the trigger area and within the specified time. Its transmission power is only one-500th of the power of the mobile phone.

4.2 Management Center

  The management center is composed of a high-performance computer, a card reader, and a functional software package. It has functions such as system function setting, carrier registration, bring-out authorization, violation alarm, information storage, and log query.

How the system works

  4.2.1 The management center is composed of software packages that meet the various functions of the system.

(1) Controlling carrier from creation to cancellation

(2) Bring out the authorized software: the authorization information includes: the carrier’s unit, applicant, responsible person, approval leader, operator, authorization status, authorization period, carrier category, carrier secret level, etc.

(3) Channel management: Alarm information includes: carrier type, attribution unit and other information.

(4) Cancellation of authorization

(5) Overdue reminder

(6) Extension of authorization

Chapter 5 Confidential System Configuration and Installation

In-place detection card reader, touch screen all-in-one machine, management software, label card.

(1) The touch all-in-one machine has built-in high-frequency identification signal receiving equipment, which receives the identification data emitted by the electronic identification in time-sharing, and performs corresponding processing according to the identification data, such as displaying personnel photos, units, carrier authorization and other information, and the result is sound and light prompts and alarms And record.

(2) The management software part, completes functions such as data entry, data communication, identification processing, authorization logout, log query, and alerting.

(3) The electronic identification part is used to transmit high-frequency wireless identification signals.

(4) On-site monitoring equipment. Regularly receive the data sent by the electronic identification, if the data is not received within the specified time, it will alarm.

System architecture diagram

Chapter VI. Product detailed technical parameters

6.1 On-site monitoring reader

  6.1.1 CGR-280 directional adjustable monitoring reader

Performance characteristics

l 2.45G microwave is an open frequency band, all certified by the US and EU regulations for high-frequency radiation electromagnetic waves, and the power is very small, the time is very short, and there is no harm to the human body.

l Adopt 32-bit ARM series processor, anti-interference and lightning protection design, with a buffer area, can store 800 (expandable to 30,000) card reading data;

l The card battery holder is a drawer-type design, which is convenient for users to replace the battery by themselves;

l 120 degree directional card reading, the reading distance is adjustable from 3-80m;

l Use channel isolation technology, multiple card readers, no interference between multiple cards;

l Advanced anti-collision technology, anti-reread technology, can recognize 200 cards at the same time

l The wake-up source activation technology greatly reduces the power consumption of the card. The card outside the induction area is in a dormant state, and the card is activated only when it enters the induction area, ensuring that the card battery can be used for more than two years;

l Support RS232/485/Wiegand 26/34 multiple data output methods;

l Intelligent dual interface card technology, compatible with ID/IC card technology, dual cards in one and the same card number, which is conducive to the realization of all-in-one cards;

l Strong penetrating power, can penetrate the car anti-riot heat insulation film;

l Ultra-thin card design, easy to carry

l Dynamic key encryption calculation and authentication to ensure data security and prevent link eavesdropping and data cracking;

l Fully waterproof and dustproof design to meet the requirements of industrial environment.

technical parameter

Working frequency 2.45G

Working frequency bandwidth 8MHz

Signal modulation method GFSK

RF power maximum peak power 1.5 mW

Receiving sensitivity -90dbm

Voltage standing wave ratio≤1.5

Front-to-back ratio ≥25dB

Vertical polarization

120-degree sector orientation of the card reading area

Reading distance is adjustable from 2 to 80 meters

Card reading speed within 180 km/h

Anti-collision can recognize 200 cards at the same time

Communication method dynamic key encryption method

Bit error rate 0.0000001

Input voltage DC12V±15%

Working current 60mA

Interface RS485, Weigand26

Working temperature -40℃~+70℃

Working relative humidity 10%~95%

Audible/visual cue buzzer/indicator

Card reader size 134mm X 106mm X 55mm

Reader weight 0.75Kg

Antenna size 245mm X 215.6mm X 57mm

Antenna weight 2.0Kg

Antenna wind resistance 60m/s

6.1.2 CGR-200 Omnidirectional Monitoring Reader

Performance characteristics:

2.45G microwave is an open frequency band, all certified by the US and EU regulations for high-frequency radiation electromagnetic waves, and the power is very small, the time is very short, and there is no harm to the human body. The card battery holder is a drawer-type design, which is convenient for users to replace the battery by themselves;

360-degree omnidirectional card reading, the reading distance is 3-15m adjustable;

Using channel isolation technology, multiple card readers, no interference between multiple cards;

Advanced anti-collision technology, anti-reread technology, can recognize 200 cards at the same time

The wake-up source activation technology greatly reduces the power consumption of the card. The card outside the sensing area is in a dormant state, and the card is activated only when it enters the sensing area, ensuring that the card battery can be used for more than two years;

Support RS232/485/Wiegand 26/34 multiple data output methods;

Intelligent dual interface card technology, compatible with ID/IC card technology, dual cards in one and the same card number, which is conducive to the realization of all-in-one cards;

Strong penetrating power, can penetrate automobile anti-riot heat insulation film;

Card ultra-thin design, easy to carry

Dynamic key encryption calculation and authentication to ensure data security and prevent link eavesdropping and data cracking;

Anti-interference and lightning protection design;

Fully waterproof and dustproof design to meet the requirements of industrial environment.

technical parameter:

Input voltage DC12V±15%

Working current 250mA

Working temperature -10℃~+70℃

Working relative humidity 10%~95%

Interface RS485, Weigand 26/34

Card reading distance 3~15M

Card reading frequency 2.4GHz

Sound/visual cue buzzer / LED

Size 125mm X 55mm X 13mm

Weight 250g

6.1.3 HPC3000B handheld monitoring intelligent terminal

HPC-3000B

The smart mobile handheld terminal is an embedded handheld terminal based on the LPC3250 processor, pre-installed with the genuine Microsoft Windows CE 6.0 operating system. This handheld terminal device has the characteristics of small size, light weight, high performance, high scalability, and is suitable for handheld. It has real-time collection, automatic storage, real-time display, real-time feedback, automatic processing, real-time data transmission and other functions. The authenticity and real-time of the field data are guaranteed.

The outstanding characteristics of HPC3000B microwave reading terminal

Using high-performance ARM926EJ-S processor LPC3250, operating frequency up to 2666MHz, 256MB large-capacity NAND Flash memory and 64MB SDRAM memory;

2.8-inch LED backlit LCD display with 240×320 resolution, 1 serial port, 1 Micro SD card (TF card) interface, one USB Device interface, USB charging support, DC fast charging function;

The 2.4-2.45 GHz ISM microwave frequency band, which is open worldwide, does not require application and payment, and has passed the international certification of high-frequency radiation electromagnetic waves from the United States and the European Union. The power is extremely small (the maximum peak power is 1.5mW), and there is no harm to the human body;

HDLC-based time division multiple access and synchronous communication mechanism, with multi-channel high-speed recognition capability;

Using channel isolation technology, multiple devices do not interfere with each other;

Built-in antenna, integrated with handheld reader;

The recognition speed is fast, and the reading speed can reach within 200 km/h;

Strong penetrating ability to non-metallic objects, with diffraction and refraction properties;

There is no limit to the direction of the card reading, and it can be read at any angle within a spherical range of 2 to 50 meters radius, which is truly automatic identification;

The anti-interference and lightning protection design does not have any impact on other equipment and meets the requirements of the industrial environment;

The misreading rate is extremely low, less than one in ten million.

The product has no special requirements for various interference sources on site, with strong anti-interference ability and stable performance;

Provide secondary development kit SDK, which can be used for secondary development according to different needs of customers;

The products have independent intellectual property rights in both software and hardware. The company has strong development and technical support capabilities and can provide RFID series products that meet the special needs of customers.

Basic technical parameters

Physical parameter

Dimensions: 174 (length) mm x 67.2 (width) mm x 40 (height) mm

186.5 (length) mm x 75 (width) mm x 144.5 (height) mm (including handle)

Weight (including standard battery): 560 grams Handle: 155 grams

Display screen: color 2.8-inch QVGA display TFT-LCD, 240*320 resolution

Touch panel: durable acrylic touch screen

Backlight: LED backlight

Main battery: 3.7V, 2750mAh Li-ion rechargeable battery

Extended battery capacity: optional rechargeable polymer battery (3.7V, 4000mAH)

Expansion slot: a MicroSD card (TF card) slot, a standard SIM card slot

Development environment

WINCE version: WINCE environment development, provide secondary development package, support C++, C#, VB.NET development language

Performance parameter

CPU: LPC3250

Memory: 64MB RAM/256MB Flash storage

Interface/communication: USB, RS232

Keys: 26-key multi-function keyboard

Use environment

Working temperature: -10℃ to 60℃

Storage temperature: -20℃ to 60℃

Working humidity: 5%RH-95%RH (no condensation)

Drop specifications: within the operating temperature range, 6 sides can withstand the impact of falling from a height of 1.5 meters to the concrete floor

Rolling specifications: 1,000 times of 0.5 meters, rolling on six contact surfaces

Waterproof and dustproof rating: IP65

6.2 Radio Frequency Identification Tag Card

  LR310A standard type

LR310C shaped

Performance characteristics:

2.4G microwave is an open frequency band. It has passed the international certification of high-frequency radiation electromagnetic waves under the US and EU regulations. It has a very small power (maximum peak power 1.5mW), a very short time, and no harm to the human body.

?Using 32-bit ARM series processor, anti-interference and lightning protection design, with a buffer area, can store 200 data;

LR310A type electronic label adopts the design of drawer type battery clip, which is convenient for users to replace the battery by themselves (LR310C type label does not support this function);

?CGR-320 directional adjustable distance reader can realize 120-degree directional card reading, and the reading limit distance is adjustable from 3-80m;

? HDLC-based time division multiple access and synchronous communication mechanism, with multi-channel high-speed identification capabilities;

?Using channel isolation technology, multiple card readers, multiple cards do not interfere with each other;

? Advanced anti-collision technology, anti-reread technology, can identify 200 cards at the same time

The wake-up source activation technology greatly reduces the power consumption of the card. The card outside the sensing area is in a dormant state, and the card is activated only when it enters the sensing area, ensuring that the card battery can be used for more than two years;

? Support RS232/RS485/Wiegand26/ Wiegand 34 multiple data output methods;

?Intelligent dual interface card technology, compatible with ID/IC card technology, dual cards in one and the same card number, which is conducive to the realization of all-in-one cards;

? Strong penetrating power, can penetrate the car anti-riot heat insulation film;

?Card ultra-thin design, easy to carry

? Dynamic key encryption calculation and authentication to ensure data security and prevent link eavesdropping and data cracking;

?Fully waterproof and dustproof design to meet the requirements of industrial environment.

  6.3 Query touch all-in-one

  

Touch screen: smart touch infrared screen

Display: LCD display

Display size: 17″ 19″ 22″ etc.

Cabinet: Imported steel metal box, luxurious imported car paint on the outer surface

Color: standard silver gray body + black/blue cover (optional color)

Power supply: AC220V±10% 50HZ

Control host: can be matched with various compatible machines and brand machines

Working environment: temperature: 0℃ to 35℃; humidity: 20%-80%

Physical size: 1370 (height) × 470 (width) × 380 (depth) mm

Peripheral options: receipt printer, IC card reader, metal keyboard, coin acceptor

product advantages:

1. Fashionable, concise and streamlined appearance;

2. The model is compact and ultra-thin;

3. All metal shell, imported car paint;

4. Set a variety of extended external devices, with practical and powerful functions;

5. According to the display requirements, provide a variety of specifications display screens;

6. Advanced touch technology to meet the actual needs of the use environment

Scope of application:

1. Public government affairs system

2. Public places query system

3. Public inquiry system for medical affairs

4. Property rights transaction analysis system

5. Public inquiry system of school affairs

6. Enquiries in corporate reception halls and many other public places

6.4 System software

  6.4.1 Features of management software

This management software is developed for the needs of the Chinese market and is designed according to China’s national conditions, working hours and living habits. It adopts the design method of Chinese windows and SQL professional database, so it is very easy to operate and can be familiar with the software in a short time. application. The software can also print various reports to facilitate management inspections.

The system database adopts standard MS SQL Sever large-scale C/S multi-user database, and is compatible with ACCESS database. It provides Ole DB/ODBC universal access interface, G-level record volume, 10,000-level concurrent access, and provides import of Excel and TXT standard file formats. With export function.

The software supports a variety of connection methods, can freely network through RS232, RS485, TCP/IP, optical fiber and other methods, supports cross-network segment, cross-node hybrid access, and can easily achieve remote remote networking through the Internet.

Provide an open interface development kit, including a clear data structure and data dictionary, convenient for users to carry out secondary development, can provide users in need with detailed databases, classes and interfaces.

PCs and workstations can be placed anywhere in the local area network, and they can simultaneously monitor and set all devices in the system, and configure and test each controller on the spot through a notebook PC.

The software guarantees the confidentiality of the all-in-one card system from many aspects: a series of security measures such as identity authentication, node authentication, transaction data authentication, encrypted transmission, and data authentication are provided. It can also provide multi-level password protection, manage and restrict different operators from using central monitoring, and prevent the system from being used by non-related personnel.

Provide an open interface development kit, including a clear data structure and data dictionary, convenient for users to carry out secondary development, can provide users in need with detailed databases, classes and interfaces.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare