Secret carrier RFD smart cabinet solution
[ad_1]
1Overview
1.1 Current Situation Analysis
At present, more and more attention is paid to the management and monitoring of important secret-related carriers. However, the traditional management methods have various drawbacks and cannot achieve real-time and effective monitoring of secret-related carriers and personnel. Some criminals are provided with secret-related carriers to go out. Opportunities, resulting in the leakage of secret-related carriers, posing a huge threat to the military’s national defense.
1.2 Construction goals
The secret-related mobile carrier intelligent management and control system consists of three parts: secret-related carrier storage subsystem, access control recognition subsystem and monitoring management software.
n pass throughRFID implementationAccurate location management of secret carriers, real-time perception of the specific location of each mobile carrier;
n pass throughRFID technology improves theThe inventory efficiency and accuracy of secret-related carriers;
n Through the system, realize the management of borrowing, returning, and handing over secret-related carriers;
n pass throughRFID technology to achieveThe management of the access rights of secret-related carriers can only be brought out through authorized assets; when unauthorized assets are brought out illegally, the system will alarm and prompt;
n Realize the visual tracking management of the secret carrier in the use process;
n Tracking and querying the trajectory of secret-related carriers in the process of internal circulation can be realized;
n At present, the main management objects are notebooks, printers, cameras, camcorders, mobile hard drives, voice recorders, mobile conference systems, etc.
1.3Construction principles
Advanced
The use of advanced and mature information technology not only ensures that the system can meet current functional requirements, but also provides conditions for future functional requirements;
Scalability
When the demand changes and increases, the modification of the system is minimized;
standardization
The software and hardware involved in the system should meet the relevant requirements of openness and standardization, and the software development should meet the requirements of military standards, industry standards and specifications.
safety
The system construction takes into account the security of the system, provides a backup function, can be restored when the system fails, and performs role management for users to ensure information security. The user interface is friendly and easy to operate.
2system design
2.1 System network architecture
Deploy secret-related carriers based on preliminary investigationsComprehensive management platform, deployment of notebooks, printers, cameras, camcorders, mobile hard drives, voice recorders, mobile conference systems and other itemsRFID tags automatically count the number of items after storage and retrieval of the carrier, and can automatically record the access log. The monitoring management software controls the secret carrier in real time, and the carrier control terminal, access control monitoring equipment, etc. are controlled by the software management system. The control management software pushes the alarm information of the carrier storage subsystem and the access control recognition subsystem to the security system. Ensure the use safety and traceability of secret-related carriers, and improve work efficiency at the same time.
LayRFID card issuing equipment, complete theSecret carrierLabel issuance, data entry, and related business inquiries, operations, etc. Deploy a management computer,RFIDSmart cabinet,RFID fixed reader, Access doors and other hardware equipment, complete functions such as asset storage, borrowing, inventory, and illegal exit alarms.
The data center is mainly equipped with database servers, application servers, switches, etc., to complete the storage and backup of the entire system data, and support the normal operation of the entire system.
2.2 SystemTechnology Architecturedesign
l Terminal presentation layer
(1) Log in through the unified portal website to complete various business operations.
l Service layer
Responsible for the realization of various business functions of the system, the realization of data interaction storage, and the completion of interaction with front-end hardware devices.
- Application Service Layer
The application service layer integrates functions such as warehouse operations, statistical analysis, and equipment management.
- Basic service layer
The basic service layer provides basic capabilities such as data access, log management, and exception handling.
l Data layer
Store structured data and unstructured data.
l Data collection layer
useRFID technology and smart cabinet technology collect secret-related carriers in and out of warehouses and other business operations.
As one of the core equipment of the intelligent management and control system, the smart cabinet can realize the confidentiality-related mobile carrierReal-time monitoring of borrowing, returning, and inventory, withRFID positioning function is convenient for real-time monitoring and checking inventory needs.
[ad_2]