RIFD conference automatic sign-in system solution
[ad_1]
1. System significance
1. The meeting is automatically reported, and the statistical results of the names, photos and number of participants are displayed in real time. The whole process is automatically completed to avoid human intervention;
2. The reporting process is simple, fast and has complete reporting and query functions;
2. System architecture and program description
This system integrates automatic identification technology, computer network technology and projection technology to form an integrated system for meeting automatic registration. Its working mechanism is: the electronic card is activated by the electromagnetic interrogation signal continuously emitted by the card reader, and a response signal carrying the electronic card number is fed back to the card reader. It is through the signal between the electronic card and the reader. Inquiry and response, the card reader can accurately and quickly identify the number carried in the electronic card, and output the read electronic card number to the computer, external controller or other terminal equipment in a certain output format, so as to realize the electronic Identification of the card.
When the representative wearing the electronic card came to the entrance of the check-in terminal, the nearbyCard readerThe read electronic card number is transferred to the check-in terminal through the Ethernet, and the check-in terminal transmits the data (the read electronic card number) to the remote computer server through the computer network. In this way, the check-in terminal and the query terminal connected to the server can update the data in real time: the check-in terminal displays real-time information such as the photo and name of the channel representative, and the query terminal displays the real-time situation and statistical data of the meeting report in real time, such as the number of people, The actual number of people and the number of people who have not arrived.
2.1 System architecture
2.2 Program description
Install a low-frequency activator for each access control that needs to be managed, and each activator leads to 2 low-frequency activation antennas, namely No. 1 antenna and No. 2 antenna, which are arranged on the outside and inside of the door, and one is installed next to the door. 2.45G long-distance researched and developed by our companyReader, Suzhou Xindao serves as the signal receiver. When a person wearing a semi-active RFID low-frequency activation tag enters the door, they are activated by the activation antenna No. 1 and the activation antenna No. 2, so that the system judges that the person has entered the door. On the contrary, the system recognizes that it is going out. This completes the management of the entire access control system personnel entry and exit judgment.
[ad_2]