Secret-related carrier real-time monitoring and management plan
[ad_1]
Project background
The 21st century is the era of information technology. Information carriers such as notebook computers and mobile hard disks have entered popularized applications. Whether in the commercial field or in the military or political fields, leaks have occurred from time to time, bringing major issues to relevant countries and enterprises. Loss, the International Organization for Standardization has even issued the ISO27000 series of international standards for information security. It can be seen that information security management is generally highly valued by all sectors of society.
In some important occasions, such as those involving commercial secrets, technical secrets, military secrets, political secrets, etc., there are already very strict management systems for the management of secret-related carriers such as laptop computers and mobile hard disks used, but the management needs to be based on the hardware The angle can be ensured by matching the angle.
In order to ensure and facilitate the external control of secret-related carriers, Anfodi Technology has launched a real-time monitoring and management system for secret-related carriers (notebooks and mobile hard drives) based on 433MHz active RFID technology to monitor the status of secret-related carriers in real time in seconds. , And has been successfully applied in the military field.
Features and advantages of 433MHz active RFID technology in secret carrier management
1. 433MHz active RFID technology is the technology with the farthest identification distance among the current RFID technologies. It has the characteristics of strong penetration, strong diffraction, and long transmission distance. Therefore, even if it is not possible to enter certain workplaces, the RFID technology can still check whether the secret carrier is in place, which facilitates the inspection of whether the secret carrier is in place and prevents illegal means of carrying it out.
2. Real-time monitoring solves the problem of unrecognized carry-out of the original entry and exit system (such as illegal carry-out from a window); as long as the secret carrier leaves the signal coverage area, the system will immediately alarm.
3. Utilizing the long-distance characteristics of 433MHz active RFID technology, the handheld device can also be used to check the presence of secret-related carriers at designated locations.
4. The electronic tag adopts special anti-dismantling technology, and the action of the anti-dismantling switch is sensitive and accurate. As long as there is an attempt to remove the label, the label will emit an alarm signal and the system will automatically alarm immediately.
5. Ultra-low power consumption, tag battery life up to 2 years (1 radio frequency transmission per second).
6. The radiation intensity is lower than CDMA mobile phones, no radiation damage, safe and reliable to use.
7. The use of this system can realize the accurate and automatic identification and recording of the office area where the secret-related carrier is brought (or brought into it), and alarm when the unapproved secret-related carrier is brought out (or brought into) the office area, ensuring the secret-related carrier Effectiveness of management.
Overall architecture
The system consists of “application software server”, “monitoring computer”, “RFID reader” and “RFID electronic tag”.
The main realization idea is: stick the “RFID electronic tag” on the notebook or mobile hard disk device under management, install a certain number of “RFID readers” in the office area to achieve full coverage of the signal in the office area; when the notebook or mobile hard disk When located in the office area covered by the signal, the “RFID reader” immediately receives the “RFID electronic tag” signal, and feeds the information back to the “monitoring computer”, and the “monitoring computer” processes the received information (if it fails to receive it in time) The label signal or the received signal that the label is disassembled will be judged according to the pre-approval situation to determine whether to call the police immediately), and the record will be stored in the “application software server”, thereby realizing the function of real-time monitoring of whether the secret-related carrier is in place.
Software management function introduction
The software management system is designed with B/S architecture, which is convenient for users to manage applications in the local area network. The software is based on Microsoft’s mature .NET framework platform and adopts the latest version 4.0. It is currently one of the mainstream platforms used by most application management software. Using MS-SQLServer2005 database management software for management, its products have excellent stable data retrieval performance.
The software is mainly divided into management software and monitoring software.
The management software is installed on the “application software server”, using the browser-server or B/S architecture. The user enters the login address of the management terminal through the browser, and can perform tasks such as application, approval, and record review of the portable hard disk on any computer in the local area network.
The monitoring terminal software is mainly installed on the monitoring computer, and is mainly responsible for data communication with the “RFID reader”, obtaining real-time monitoring “RFID electronic tag” data, and data interaction with the application software server, and submitting monitoring records to the application software server .
[ad_2]