RFID item positioning management system solution

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

1. System Overview

Dingchuang Hengda RFID item positioning management system is an item management system that uses RFID technology and specifically solves the constant research and development brought about by item positioning in the past. Mainly realize the functions of real-time monitoring of items, item management, authority management, area management, item movement track playback, alarm record query, access record query, etc., changing the traditional manual method of classifying equipment information management, recording and query management It provides comprehensive, reliable and efficient dynamic data and decision-making basis for the management of items, realizes the informatization, standardization and standardization of item management, and comprehensively improves the work efficiency and management level of item management. This system automatically While counting the number of vehicles carried, it can also perform operations such as attendance on the driver, which is more convenient and scientific management, and the system also provides a third-party interface for customers to seamlessly connect with other software.

2. System composition

RFID item positioning management system

System composition diagram (Figure 2-1)

The hardware of this system includes: activeelectronic label, 2.4G active reader (DC-0302A), 2.4G locator (DC0310A), item positioning management system host, server, image capture camera, etc.

3. Software function

RFID item positioning management system

PC-side software interface diagram of item positioning management system (3-1)

RFID item positioning management system

PC-side software function diagram of item positioning management system (3-2)

The PC-side software of the item positioning management system includes: real-time monitoring, object management, system settings, query statistics, and area management.

3.1 Real-time monitoring

After real-time monitoring is turned on, the system will monitor the area covered by all readers. If an item with an RFID active tag appears in the reader’s read-write range, the system will record the information of the item bound to the tag And its trigger event, if this item is an unauthorized entry or exit, an alarm will be processed;

Monitor the status of items

Deployment map management

3.2 Object management

Functions for related management of users and items;

User Management

Item management

Inbound management: Bind a positioning card to the item. When entering the warehouse, you can enter the item number, positioning card number, item type, item description and other related information. After the information is reported to the host by the base station, it will be displayed in the item information column of item management;

Item inventory: item inventory can automatically count various types of items and quantities without manual operation;

Outgoing statistics: Outgoing statistics include item number, item type, storage time, outgoing time, destination and other information. It can be inquired according to the item number, item type, whereabouts and time;

3.3 Query Statistics

Provides a variety of query methods, which can be used to query items according to their area, shelf number, item type, item number, location card number, maintenance status, and storage time;

Track playback: You can query information about the place and time of entry and exit of the specified item within the specified time

Alarm record query

Access record query

3.4 Area Management

Set up the management function of the authority of the area where the item is located;

Item authorization

Regional authorization

3.5 System Settings

System settings and management of system user information and permissions.

Permission settings

parameter settings

Operator management

change Password

4. System Features

The system uses RFID technology to achieve long-distance control, better, safer and more accurate supervision of items.

Good anti-interference can greatly reduce the misreading rate.

While monitoring the items in real time, you can also authorize the items to be prohibited from entering and exiting places. If the item appears in the restricted area, the alarm will be reported to improve safety.

The user can query whether the item is lent or alarmed according to the specified conditions, so that the user has a more intuitive visual state, which is more convenient and faster than the previous file management;

The system provides a variety of flexible third-party interfaces to seamlessly connect with third-party application systems.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare