RFID valuables (secret assets) in and out management plan
[ad_1]
1 background
Important exhibits or valuables of public security/political law/customs units usually require real-time positioning and monitoring. National defense scientific research units and secret-related assets usually require real-time positioning and monitoring.
This type of application requirement scenario usually includes the following parts:
A. Valuables/secret-related assets real-time location supervision, leave the supervision area to warn
B. Valuables/secret-related assets are automatically read when they pass the access control point, and unauthorized entry and exit are automatically alarmed
C. Automatic online inventory of valuables/secret assets or quick inventory and search through handheld devices
The RFID positioning management system for valuables/secret-related assets of Zhuojin Communication adopts active acousto-optic/semi-active electronic tags to realize positioning, search, inventory and access management.
2 System structure
3 Equipment deployment
Valuable asset positioning
To achieve precise positioning of assets/trays, low-frequency scalers and fixed readers need to be deployed, as shown in the figure below. The coverage area of the low-frequency scaler is a circular area with a radius of 3-5m, and the reader is a fan-shaped area with a radius of 80m.
property assessment
RFID tablet is used for asset inventory. The signal coverage radius of the RFID semi-active tablet is 3.5m. If the user is traveling with the RFID tablet, the asset electronic tag within the 3.5m coverage radius of the travel area can be 100% read, and the user can also use the tablet to find Specific assets.
The user can also use a fixed reader in the background to achieve a keyboard point.
Assets in and out
By deploying access control calibration readers inside and outside the passageway, 100% reading of asset tags can be realized. Alarm for abnormal asset in and out. (If you need to locate the room in and out, please refer to the appendix)
4 Application process
Asset location/find
The user selects specific asset information on the asset management background or on the RFID tablet, and clicks to find it.
The corresponding asset tag location is displayed on the tablet or system background. Sound and light alarm of asset electronic tag.
property assessment
One keyboard point: The user can click one keyboard point in the asset backend to realize real-time inventory of all electronic label data.
Physical inventory: The user can hold the RFID handheld for physical inventory, and the user downloads the data to be inventoried through the handheld. When the user travels, the asset tag within 3.5m of the travel route is read, the tablet displays the corresponding asset information, and the user can proceed Comparison of asset information and physical objects.
Assets in and out
When the asset passes through the fixed access control reader, it can read 100% of the access control reader.
The system backstage records asset entry and exit information. When assets enter and exit abnormally, access control point acousto-optic alarm, electronic tag acousto-optic alarm, background record abnormal entry and exit records.
The back-end system of assets illegally leaving the fixed area can notify the administrator by phone through the phone module.
5 Main equipment
electronic label:
2.45G RFID handheld
2.45G RFID tablet
Access control fixed reader
Communication gateway
6 Appendix:(Need to automatically judge and read the equipment deployment plan for assets entering and leaving the room)
6.1 Technical selection:
3-band asset electronic tag
6.2 Schematic diagram of signal coverage
6.3 Principle description
1) A calibration reader is deployed at the entrance and exit of the floor as a floor positioning mark L1
2) Calibration readers A, B, C are deployed at the door of the room to cover the door and walkway, with a coverage radius of 2m
3) The judgment logic is as follows:
The electronic tags A, B, and C respectively mark the attribution positions of rooms A, B, and C in the system
When the electronic tag A exits from room A, it will inevitably pass through the corridor scaler A/B or A/C. The calibration reader will generate the electronic tag to record after A, B or A, C and other scalers, which can be judged The tag left the room while recording its track. If you install an RFID camera similar to Shanghai, you can record its video track.
If the electronic tag enters room A from outside, its track record must be B/A or C/A, and it can be determined that the electronic tag enters room A.
[ad_2]