RFID valuables (secret assets) in and out management plan

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

1 background

Important exhibits or valuables of public security/political law/customs units usually require real-time positioning and monitoring. National defense scientific research units and secret-related assets usually require real-time positioning and monitoring.

This type of application requirement scenario usually includes the following parts:

A. Valuables/secret-related assets real-time location supervision, leave the supervision area to warn

B. Valuables/secret-related assets are automatically read when they pass the access control point, and unauthorized entry and exit are automatically alarmed

C. Automatic online inventory of valuables/secret assets or quick inventory and search through handheld devices

The RFID positioning management system for valuables/secret-related assets of Zhuojin Communication adopts active acousto-optic/semi-active electronic tags to realize positioning, search, inventory and access management.

2 System structure

3 Equipment deployment

Valuable asset positioning

To achieve precise positioning of assets/trays, low-frequency scalers and fixed readers need to be deployed, as shown in the figure below. The coverage area of ​​the low-frequency scaler is a circular area with a radius of 3-5m, and the reader is a fan-shaped area with a radius of 80m.

property assessment

RFID tablet is used for asset inventory. The signal coverage radius of the RFID semi-active tablet is 3.5m. If the user is traveling with the RFID tablet, the asset electronic tag within the 3.5m coverage radius of the travel area can be 100% read, and the user can also use the tablet to find Specific assets.

The user can also use a fixed reader in the background to achieve a keyboard point.

Assets in and out

By deploying access control calibration readers inside and outside the passageway, 100% reading of asset tags can be realized. Alarm for abnormal asset in and out. (If you need to locate the room in and out, please refer to the appendix)

4 Application process

Asset location/find

The user selects specific asset information on the asset management background or on the RFID tablet, and clicks to find it.

The corresponding asset tag location is displayed on the tablet or system background. Sound and light alarm of asset electronic tag.

property assessment

One keyboard point: The user can click one keyboard point in the asset backend to realize real-time inventory of all electronic label data.

Physical inventory: The user can hold the RFID handheld for physical inventory, and the user downloads the data to be inventoried through the handheld. When the user travels, the asset tag within 3.5m of the travel route is read, the tablet displays the corresponding asset information, and the user can proceed Comparison of asset information and physical objects.

Assets in and out

When the asset passes through the fixed access control reader, it can read 100% of the access control reader.

The system backstage records asset entry and exit information. When assets enter and exit abnormally, access control point acousto-optic alarm, electronic tag acousto-optic alarm, background record abnormal entry and exit records.

The back-end system of assets illegally leaving the fixed area can notify the administrator by phone through the phone module.

5 Main equipment

electronic label:

RFID valuables (secret assets) in and out management plan

2.45G RFID handheld

RFID valuables (secret assets) in and out management plan

2.45G RFID tablet


RFID valuables (secret assets) in and out management plan

Access control fixed reader


RFID valuables (secret assets) in and out management plan

Communication gateway


RFID valuables (secret assets) in and out management plan

6 Appendix:(Need to automatically judge and read the equipment deployment plan for assets entering and leaving the room)

6.1 Technical selection:

3-band asset electronic tag

6.2 Schematic diagram of signal coverage

6.3 Principle description

1) A calibration reader is deployed at the entrance and exit of the floor as a floor positioning mark L1

2) Calibration readers A, B, C are deployed at the door of the room to cover the door and walkway, with a coverage radius of 2m

3) The judgment logic is as follows:

The electronic tags A, B, and C respectively mark the attribution positions of rooms A, B, and C in the system

When the electronic tag A exits from room A, it will inevitably pass through the corridor scaler A/B or A/C. The calibration reader will generate the electronic tag to record after A, B or A, C and other scalers, which can be judged The tag left the room while recording its track. If you install an RFID camera similar to Shanghai, you can record its video track.

If the electronic tag enters room A from outside, its track record must be B/A or C/A, and it can be determined that the electronic tag enters room A.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare