RFID conference attendant sign-in and visitor management system solution
[ad_1]
1. System Overview
The intelligent visitor management system of Suzhou Xindao aims at the visitor’s entry and exit, combined with advanced radio frequencyRFIDTechnology, digital communication technology, optical recognition technology (OCR), digital video technology, etc., overcome the shortcomings of insufficient management and single methods in the traditional management of visiting personnel, and truly achieve the integration of personnel, certificates, and photos. It realizes the functions of “entry registration, exit cancellation, portrait one-to-one correspondence, personal belongings registration, hierarchical management, historical record query, report summary” and other functions, which can efficiently record, store, query and summarize the relevant information of visitors, and provide convenience for visiting information Query in multiple ways. Greatly improve the quality and efficiency of the guard management work, and solve the management problems of visiting personnel of various enterprises and institutions.
2. System Features
Advanced identification technology: The use of RFID technology to realize long-distance real-time supervision, which is more convenient and accurate to realize the management of personnel and artworks, and to ensure safety.
Abundant visitor management functions: In addition to supporting personnel registration management, it also adds the OCR recognition function of the document photo, the second-generation *** reading function, the on-site photographing function, automatic telephone dialing association, strong screen notification, two-visitor single printing, and staying Personnel reminder, blacklist management, access control linkage, data query and other functions.
The software architecture of the combination of CS and BS: not only has strong data interaction, but also has flexible management and diverse functions.
Combination of multiple technologies: The system applies network technology, RFID technology, digital video technology, digital identification technology and other technologies to achieve a full range of multi-functional system management.
The interface is beautiful and the style is uniform: the interface is fresh and elegant, and it is not easy to cause visual fatigue; the interface style is uniform, the operation mode is uniform, and it is easy to use and easy to use.
Good scalability: The system provides a variety of flexible third-party interfaces, seamlessly connecting with third-party application systems.
3. System composition
The hardware of this system includes: passive electronic tags, desktop readers, second-generation ***, visitor management system host, server, image capture camera, printer, telephone, scanner, automatic barrier, etc.
4. Visitor process
After the visitor registers a valid certificate, take a photo of the certificate/image. After confirming the visitor, the system can select three processing methods: strong screen to notify the respondent, telephone to notify the respondent, or confirm entry, and then submit the visitor information to the system. After generating the visitor card (RFID card)/printing the visitor receipt, visitors can enter the visiting area with this card.
After the visitor finishes his visit, he shall return the visitor card or print the receipt to the staff. After checking the relevant information with the system, the information is submitted to the visitor management system for relocation registration, and the relocation of the visitor is completed.
5. Operating environment
Operating system: windows server 2008/ windows7/ windows8/ windows XP/ windows CE/ windows Mobile
Software framework: .net framework 3.5
Software structure: B/S, C/S, PDA
Database: MySQL, SQL server, ORACLE, DB2, Access (other databases can be customized according to user needs)
6. Function Module
This system includes basic information (document information, image information), access information, inquiry, appointment and other functions of visitors. Eliminates the traditional handwriting registration and filling time long, false false information, difficult to save, difficult to query information and other shortcomings.
6.1 Guest management system client software
The local monitoring client software includes: visitor management, notification management, statistical query, employee management, and system management.
6.1.1 Visitor Management
A control module for a series of management functions such as registration, card issuance, identification, and query of visitors;
Visitor management: the function of registering, confirming and entering the system of visitors;
Appointment management: realize appointment registration for visitors in advance, including appointment registration and appointment confirmation functions;
Visitor sheet printing: After the visitor registration is completed, the system will automatically print out a QR code visitor sheet containing the visitor’s photo, basic information, and northerners information as a voucher for entry and exit;
Visitor card management: After the visitor registration is completed, the system will issue a visitor card (RFID electronic tag) as a voucher for entry and exit. The card is associated with the access control system and can be polite to ***visitors in and out and related activity areas;
Blacklist management: The system can set up a blacklist function. For some suspicious or banned persons, set them, and the system will automatically prompt the next time you visit to increase the alertness of the staff;
Visitor relocation management: the function of registering, confirming and entering the system for the relocation of visitors
Second-generation *** reading: Built-in the second-generation *** reader issued by the *** department directly reads the relevant information in the *** into the system to identify the authenticity of the visitor***;
ID photo OCR recognition: OCR recognition of the second-generation ***, driver’s license, passport, etc., without manual input, and the original ID should be photographed and saved for future reference;
On-site photography: When the visitors register, they can take photos of the visitors through the system image acquisition camera and save the photos, so that the staff can quickly identify the visitors after an emergency.
6.1.2 Notification Management
A module that notifies internal employees of visitors and reminds visitors of the status of internal areas;
Telephone notification: realize the function of telephone confirmation with the interviewed person, no need to find the telephone number manually;
Strong screen notification: the interviewed person automatically pops up the visitor information, and the interviewed person can confirm the reception according to the situation;
Reminder of stranded personnel: In the presence of stranded visitors, the system will remind staff according to the set time to ensure the safety of personnel and assets;
Illegal entry reminder: The system will notify the staff in real time for illegal entry.
6.1.3 Statistics query
The query management of visitor information and related information enables managers to review visitors and related historical information in a timely and effective manner to achieve the purpose of safe management of visits. And has historical log statistics function;
Visitor query: the function of querying and operating the information of visitors;
Visitor appointment inquiry: the function of inquiring about the visitor appointment and visit situation;
Access record query: the function of querying the records of the visitor’s entry and exit time, interviewee, interviewed department, etc.;
Employee information query: the function of querying internal employee information;
Department information query: the function of query operation for internal department information;
Blacklist query: the function of querying the information of visitors from the list based on the established blacklist;
Historical data statistics: Users can set various query conditions, such as: time, visit reason, interviewee, visit status, etc., and generate statistical analysis reports.
6.1.4 System Management
Enable managers to rely on system management to realize the functions of manager and system equipment management.
User settings: set the function of managing user related parameters;
Password setting: the function of setting system management password;
Authority setting: manage the function of using user authority;
Parameter setting: the function of setting system related parameters;
Software version: Display the software version number.
7. Equipment list
product name | Model specification | quantity | unit |
RFIDDesktop card issuer | DC-HF17U | 1 | tower |
RFIDPassive tags | 200 | Piece | |
The second generation*** card reader | 1 | tower | |
RFIDBarrier equipment control panel | 2 | Piece | |
Barrier | 2 | Piece | |
ISBN printer | 1 | tower | |
Document Scanner | 1 | tower | |
Image capture camera | 1 | tower | |
RFIDVisitor management system platform software | 1 | set |
[ad_2]