Shengshilongtu RFID system asset management solution
[ad_1]
With the development of the Internet of Things, in the future, ubiquitous terminal equipment and facilities will have built-in various sensors, realize information exchange through various sensor networks, and provide safe, controllable and even personalized service functions through safety guarantee mechanisms. Such as remote control, alarm linkage, dispatch command, etc. Realize the integration of “management, control, and operation” of “high efficiency, energy saving, safety, and environmental protection” of objects.
The RFID intelligent asset supervision system of Shengshi Longtu Company is based on the RFID radio frequency technology at the core of the Internet of Things, which integrates computer software and hardware, information collection and processing, data transmission and identification card production and other technologies into an asset automatic identification and IoT supervision system. The system can effectively integrate the daily management and anti-theft monitoring of various assets to realize the status monitoring, anti-theft alarm, tracking and positioning of important and valuable assets, as well as intelligent management such as asset inventory, inspection, loan and return, warehouse storage and statistics . Solve the problems of low efficiency of traditional asset management and lack of anti-theft function, and truly realize intelligent integrated asset management.
2 System construction plan
2.1 The overall structure of the system
Figure 2.1-1 Overall system diagram
The system structure mainly includes four parts: front-end data acquisition system, data transmission system, data processing service system and Web upper application system.
The front-end data acquisition system is an RFID wireless transmission system, which is mainly composed of a radio frequency identification card (that is, an electronic tag), a low-frequency locator, a signal transceiver (base station), and a field bus/local area network. Its main function is to wirelessly collect target location data and other data sent by the identification card.
The data transmission system is mainly composed of a data collection computer, a data server and a dedicated upload line. The main function is to upload the collected data to the data center for storage and processing.
The data processing service system mainly includes application server, database server, system management workstation, etc. The system is located in the monitoring center, and its main function is to analyze and process data and provide various data services for the upper application system.
The upper-level Web application system mainly uses the data collected by the collection system to display various business functions through the software platform, display intuitive effects to specific regional managers, and realize various data report statistical management.
2.2 Function description
Location and status monitoring
Real-time perception and comprehensive monitoring of the identity information, real-time location, movement trajectory and real-time status of assets equipped with electronic identification cards in the area.
Intelligent alarm management
Alarm rules can be set in advance. Once abnormal conditions occur, the system can immediately warn through alarm windows, sound and light alarms, SMS and video linkage, and provide functions such as alarm source location and emergency dispatch. Realize the timely monitoring of abnormal conditions of assets and ensure the safety of assets.
Video linkage
When an abnormal or unexpected situation occurs, the system will automatically retrieve the corresponding camera screen, upload it to the management platform system, and view the real-time surveillance video. At the same time, the corresponding camera equipment will automatically turn on the video recording function.
Track query and statistical analysis
The electronic map of the system can play back the historical movement track of the specified asset in a certain period of time in the form of animation, and can also display the detailed travel record data with the chart. Provide chart statistics, record data export and print functions for all kinds of statistical record data.
Combination of various technologies
The system takes the new generation of Internet of Things technology as the core, combined with RFID radio frequency identification technology, video surveillance technology, 3G communication technology and other advanced methods to provide intelligent management solutions for the daily supervision of the region.
Accessibility application function
It can be extended to the monitoring and management of personnel. By wearing identification cards to personnel, it can realize the location tracking and real-time distribution query of personnel within the monitoring range, as well as personnel attendance management, visitor registration and meeting attendance management.
2.3 Design principles
Advancement: System design and equipment specifications conform to industry technical specifications and technological development trends, adapt to the requirements of digital technology development, and reflect the advanced nature of technological development in terms of functions and performance.
Practicability: The various technologies and functions of the system should be based on the principle of the construction needs of intelligent asset management, and the operation and maintenance of the system should be simple, convenient and easy to use.
Standardization: All kinds of equipment, communication software and protocols applied to the system should comply with relevant technical standards.
Openness: The system has a development interface and can be seamlessly connected with other application systems.
Compatibility: The system can be compatible with the original system to the greatest extent, and function modules and hardware devices can be configured according to requirements to avoid waste of resources.
Reliability: The system should have a highly reliable operation capability under various conditions.
Real-time: Using IoT intelligent sensing technology, it can realize real-time perception, intelligent discrimination, video linkage, intelligent warning, etc. of abnormal assets within the monitoring range in real time.
Scalability: When technology develops and business increases, the system should have the ability to expand, and there should be external interfaces to facilitate the secondary development of customers according to actual needs.
Confidentiality: The system should ensure that data cannot be leaked, and that it has a function and data authority authorization mechanism.
Reliability: The system should have reliable operation capability to ensure the provision of daily reliable services.
3 System principle
3.1 Working principle
This system is our company builds an IoT asset management service platform based on RFID radio frequency identification technology, which can realize the identification, positioning, tracking, monitoring and management of assets within a region. By deploying low-frequency locators, signal transceivers and other terminal equipment in the monitoring range, using RFID wireless communication technology to transmit information to the collection server, various upper-level applications are realized, so as to realize automatic identification, distributed display, tracking and positioning of assets. Comprehensive services such as remote monitoring and information management.
Signal transceiver: also called base station. It is mainly used as information transmission equipment to achieve full coverage of signals in a specific monitoring area. It can accept the signal sent by the identification card and upload the information to the collection server. It can be installed on the eaves, on the wall or on the Waiting inside the ceiling.
Identification card: It is bound to the asset and has a unique number. It can actively receive 125KHz low-frequency signals and upload relevant information through 2.4G. It can realize functions such as identity authentication, location tracking, and status awareness. On the wall of the box, hidden in the accessories of the asset, etc.
Low-frequency locator: referred to as locator, active transmitter. When the identification card enters the low-frequency signal range, it can receive the 125KHz low-frequency signal continuously sent by the locator. The signal includes its own number, which can be used to distinguish and distinguish between different locators. Recognition, the recognition range is less than 2~8m.
Collection system: Process the data uploaded by the signal transceiver to realize various upper-level applications, such as asset anti-theft monitoring, asset inventory application, asset warehousing management, etc.
3.2 Introduction to RFID technology
RFID is the abbreviation of Radio Frequency Identification, which is a non-contact automatic identification technology. It automatically recognizes target objects and obtains related data through radio frequency signals. The identification work does not require manual intervention and can work in various harsh environments. RFID technology can identify high-speed moving objects and can identify multiple tags at the same time, and the operation is quick and convenient. Short-distance radio frequency products are not afraid of oil stains, dust pollution and other harsh environments, and can replace barcodes in this environment; long-distance radio frequency products can identify distances up to tens of meters, even hundreds of meters, and can be used in logistics, asset management, anti-counterfeiting and anti-theft , Identification and so on. Compared with barcode recognition technology, RFID has the following characteristics:
The identification work does not require manual intervention;
It can support both read-only working mode and read-write working mode without contact or precise aiming;
Can work freely in various harsh environments;
Can carry out a high degree of data integration;
Because this technology is difficult to be counterfeited or invaded, RFID has a very high security protection capability.
3.3 RFID product classification
There are roughly three categories of products derived from RFID technology: passive RFID products, purely active RFID products, and semi-active RFID products.
Passive RFID products are the first to develop, and they are also the most mature and widely used products in the market. For example, bus cards, canteen meal cards, bank cards, hotel access cards, second-generation ID cards, etc., which can be seen everywhere in our daily life, belong to the category of close contact recognition. The main operating frequencies of its products are low frequency 125KHZ, high frequency 13.56MHZ, UHF 433MHZ, and UHF 915MHZ.
Pure active RFID products, that is, active RFID products, have been slowly developed in recent years. They have the characteristics of long-distance automatic identification and belong to the category of long-distance automatic identification. There are major applications in the field of long-distance automatic identification, such as smart prisons, smart hospitals, smart parking lots, smart transportation, smart cities, smart earth, and the Internet of Things. The main operating frequencies of its products are ultra-high frequency 433MHZ, microwave 2.4GHZ and 5.8GHZ.
Semi-active RFID products are products that are between active RFID and passive RFID. The product is triggered by a low-frequency 125KHZ frequency, allowing microwave 2.4G to play its advantage, that is, using low-frequency 125KHz to achieve close-range precise positioning, and microwave 2.5G to achieve Remotely identify and upload data. This product integrates the advantages of active RFID and passive RFID, and has great advantages in the fields of access control management, precise positioning of personnel and assets, perimeter management, electronic fences and security alarms. The RFID products provided by our company include pure active RFID products and semi-active RFID products. Among them, pure active RIFD products refer to 2.4G pure active RFID products, semi-active RFID products refer to 125K+2.4G semi-active RFID products, 125K+13.56M+2.4G semi-active RFID products, etc.
4 System function
4.1 Asset anti-theft monitoring
The asset monitoring and management function is to use the integrated acceleration card, lanyard card, magneto-resistance card and other types of asset cards, according to the pre-set alarm rules, to alert the abnormal situation of assets, set by the alarm rules, abnormal situation monitoring and The alarm is composed of three parts.
Alarm rule setting
The asset manager can preset various management rules in the system (including abnormal asset status, time-sharing/division/status arming rules, personnel authorization rules, etc.), and alarm methods corresponding to various abnormal situations (including mobile phone text messages, web pages) Reminders, video linkage, etc.), and alarm release rules (including time-limited release, designated personnel to release on site, system operation release, etc.).
Zoning defense: It can be individually deployed to any designated area, which is convenient for management and maintenance work.
Time-sharing arming: The arming time can be set in advance to facilitate the formation of an orderly management system.
State-by-state defense: The specific state of the specified object can be set to achieve a flexible and practical monitoring and defense mode. For example, there is no need for vibration monitoring for asset A, only tilt monitoring for asset B, and position monitoring for asset C only.
Abnormal situation monitoring
Through the integrated accelerometer card, lanyard card, magnetoresistance card and other types of asset cards, the system can make emergency alarms for abnormal assets in accordance with pre-set alarm rules. Once the assets have the following abnormal conditions, the system will automatically and intelligently alarm:
Real-time location monitoring can know the asset location and distribution of an indoor and outdoor attached asset card in time by deploying and controlling each base station and locator in the area, and record its historical location information.
Real-time location: The administrator can query the real-time location of the specified asset in real time and mark it on the system electronic map.
Distribution query: real-time query of the distribution of assets in each depository, and detailed asset information in a certain distribution.
Track record: can query and replay the historical movement track of assets, historical data reports, etc.
Match alarm reminder
The system matches the preset alarm rules according to the actual detection conditions, filters abnormal conditions, and initiates alarm reminders.
Web page reminder: The system pops up an alarm box in real time, locates the location of the alarm source on the map, displays the alarm details, etc.; activates the on-site sound and light alarm;
Video linkage: Automatically call the monitoring screen near the alarm source and start on-site video recording; according to the preset alarm rules, the alarm details are sent to relevant personnel in real time.
4.2 Asset inventory management
Through the signal transceiver and hand-held data collection terminal configured in the system, the administrator can carry out periodic cargo inventory work in accordance with conventional requirements, so as to grasp the current status of the inventory in time. Generate a variety of different inventory results reports, such as: inventory profit, inventory loss, inventory, location reports, etc. The system automatically counts assets bound with active tags through base stations that can be deployed in the area. For assets bound with passive tags, the administrator can use a handheld data collection terminal for inventory. At the same time, the administrator can directly generate inventory statistics results through the import function of inventory data.
4.3 Inbound and outbound management
By installing a signal transceiver at the entrance and exit of the asset storage location, when the asset that has been issued an electronic label passes through the entrance and exit, the system will automatically generate asset outbound and inbound records in the database and generate corresponding inbound and outbound orders; the operator can also manually Increase the asset storage information. Based on the information collected by the signal transceiver and the warehousing information entered by the administrator, the system can also automatically modify the warehousing status and inventory information of the corresponding assets.
4.4 Asset Information Management
Asset information management: The system provides batch import and export functions of asset information data, and can generate various report statistics, which is conducive to the query and statistics of the system center.
Asset identification card issuance: Pre-entry asset and asset inventory information in the system, read active card or passive RFID card information, and associate it with actual asset information. It can be posted on the corresponding assets to realize the issuance of asset cards.
Asset information query: The asset identification card can be read through the handheld or signal transceiver to display the asset information, such as asset number, type, storage location and other information. You can also enter the asset number, type, name, etc. in the system for query.
Asset application approval: provide application, approval and records for borrowing, requisitioning, reporting damage, repairing, and outgoing assets, as well as exporting, printing and statistical analysis of application records.
Asset inspection management: According to asset inspection requirements, remind the asset inspection cycle, and support the formulation of inspection plans and inspection results recording.
4.5 Other application functions
4.5.1 Report statistics
Statistical analysis of all data such as data recorded by the system, user information, asset information, inventory, storage and exit, etc. can be performed on graphs and texts, and data export and printing are supported. Help users to fully understand the management and operation of various tasks, assist users in their daily work, and improve work efficiency.
4.5.2 Alarm reminding and handling
When the system monitors abnormal conditions, it provides various alarm reminding methods and processing functions.
Alarm reminder
Web page reminder: Real-time pop-up alarm window and turn on the web page alarm sound, where the alarm window displays the time, type and details of the alarm.
Video linkage: The surveillance video near the alarm source will pop up in real time, and the alarm details will be displayed.
Sound and light alarm: When an abnormal situation is monitored, the sound and light alarm will be activated in real time to give sound and light alarm notifications.
SMS reminder: send alarm details to relevant personnel in real time, such as automatically sending asset exception information to asset managers.
Alarm processing: Provide location of alarm source, view alarm details, and alarm processing record to stop the alarm.
4.5.3 System Maintenance
Data management
Basic data management refers to the management of the basic data used, including the module that records all basic information such as personnel or assets that need to be entered into the system, and realizes the management of personnel, assets, identification cards, buildings, base stations, locators, and cameras. .
system maintenance
All basic settings in the system, such as organization, users, roles, maps, alarm parameters, etc., are set and managed. Only by setting these basic setting data can the realization of other functions of the system be ensured.
Safety management
Provides multi-level authority control, flexibly distinguishes the functional authority and data authority of users in different roles, performs different operations separately, and dynamically records system operation logs.
Authorization management
The system products are divided into trial version and official version. Users can activate the product by importing a file, entering a verification code, or remotely verifying authorization. The trial version of the product can normally use the functions of the system, but there are restrictions on the number of users, the number of identification cards, the number of uses, and the period of use.
4.5.4 In-site mail
In-site mail provides system users with the functions of writing and receiving letters. Through the mail function, mail files and attachment information can be sent to the relevant personnel of the system to facilitate the communication of system users.
5 System operating environment configuration requirements
5.1 Server environment
(1) Server configuration (refer to requirements)
Form factor: Rack server is recommended
Processor: Quad-core processor or above
Memory: ≥4GB (2G*2 configuration), maximum support ≥8 memory slots
Storage: 250G SSD or above
Network card: the motherboard integrates dual gigabit adaptive network cards, supports network wake-up, network redundancy, load balancing and other functions
Interface: USB interface ≥ 4, VGA interface ≥ 1, serial port ≥ 1
Accessories: USB mouse, standard keyboard
Description: The server is used to deploy memory database, disk database, JMS message alignment center, collection system, collection analysis system, alarm analysis and processing system, synchronization system, WEB system,
Video service system, short message service system, etc. At least one is configured, and the user can choose to use a proxy server, without having to equip it with a server (a proxy server is not recommended).
(2) Supported operating systems
Windows Server 2003/2008
redhat enterprise 6
CentOS 6.2
(3) Supported databases
oracle 10g/11g
5.2 Client environment
(1) Computer configuration (refer to requirements)
Processor: Intel P4 2.0G Hz or above, dual core is recommended
RAM: 2GB RAM or above
Storage: 100G hard disk or above
Sound card: 2.1 channel sound card or above
Display: 17-inch display or above
Network card: 100Mbps Ethernet card or more
Accessories: USB mouse, standard keyboard
Note: At least one computer needs to be configured for basic operation of the system, asset supervision and alarm handling
Management, etc., as well as the management operations of the background system.
(2) Operating environment
Operating system: Windows XP Professional SP3 and above
Recommendations: Windows XP, Windows Vista, Windows 7
Auxiliary software: Web browser of Internet Explorer 8.0 and above
Network: 2Mbps broadband access
6 Hardware equipment
6.1 Signal Transceiver
The TZBS signal transceiver of our company is a long-distance active RFID reading and writing device, which has the characteristics of long recognition distance, high sensitivity, fast recognition speed, and strong anti-interference ability. It is directly fixed by screws and is firmly installed. It can be used indoors. outside. The TZBS signal transceiver performs two-way data communication with the monitoring center through Ethernet, uploading all the information of the identification card to the monitoring center in real time, providing the system with high-precision, real-time data.
6.1.1 Product Features
Frequency band selection: ISM microwave frequency bands open worldwide, no application and payment are required. 2.4G microwave working frequency band: high data transmission speed, long identification distance and large coverage.
Recognition direction can be adjusted: the signal receiving angle can be adjusted to meet different requirements.
Excellent anti-collision mechanism: using multiple anti-collision schemes, it can identify more than 500 identification cards at the same time.
Fast recognition speed: the identification card can be reliably read even when moving at a speed of more than 180 kilometers per hour.
Two-way data exchange: to achieve two-way high-speed data exchange with the monitoring center.
Flexible power supply mode: supports multiple power supply modes.
6.1.2 Technical parameters
6.2 Identification card
Various types of asset cards
The various types of identification cards developed by our company are active active identification cards, which regularly transmit their own identification information. The identification card is powered by a built-in battery.The identification card has a long recognition distance, low power consumption, maintenance-free, etc.
Features. The identification card contains an excellent anti-collision mechanism, which is suitable for applications with multiple identification cards.Have
Positioning, posture detection, button help and other functions. The appearance of the logo is in various forms, including square, long strip, lanyard, etc., which can be customized as needed. Some cards support LOGO customization and card surface customization.
6.2.1 Product Features
Frequency band selection: ISM microwave frequency bands open worldwide, no application and payment are required.
2.4G microwave working frequency band: high data transmission speed, long identification distance and low power consumption.
Excellent anti-collision mechanism: The identification card adopts an excellent anti-collision mechanism, and the signal transceiver can recognize more than 500 identification cards at the same time.
Maintenance-free: The identification card can work continuously for 1 to 3 years without maintenance during the period.
Battery voltage detection function, automatically prompts when the voltage is low.
The transmitting power is small, and it is not harmful to the human body.
6.2.2 Technical parameters
6.3 Positioner
product description
TZLF type locator (hereinafter referred to as low-frequency locator) is an active transmitter that continuously sends 125KHZ low-frequency signals at a certain frequency. The signal includes its own number for distinguishing and identifying different locators. If the identification card or Dulian card with low frequency receiving function is not within the signal range of the low frequency locator, the card is in the standby state. When the card enters the signal range of the low-frequency locator, it can automatically receive the low-frequency signal and analyze it.
Main Specifications
Working temperature: -20℃~60℃
Storage temperature: -40℃~60℃
Working frequency: 125KHz
Working voltage: AC220V
Shell material: ABS engineering plastic
Environmental adaptability: Waterproof and impact-proof design, protection level reaches IP31
Installation method: buried installation, top-mounted or side-mounted, fixed with screws, avoiding close to large areas of metal.
6.4 Video surveillance equipment (optional)
The NVR camera is connected to a computer terminal or other equipment for video monitoring. Supports digital video transmission methods such as Ethernet, WIFI, 3G, etc., and can monitor and record images
6.5 Other equipment
[ad_2]