Design and implementation of community security information monitoring system using RFID technology

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

From the analysis of recent theft incidents in several communities, several common problems were found: the community security did not communicate timely with the personnel and vehicles entering the community; the efficiency of handling accidents after the incident was low and the effect of obtaining evidence was poor. For this reason, how to correctly process and locate the information of people and vehicles entering the community is of vital importance to improve the safety of the community. At present, the security system of the community is unable to monitor and locate all the people and vehicles entering the community. This article is aimed at this problem and proposes the application of RFID technology in the security system of the community, and then realizes that every person enters the community Positioning and information processing of the personnel and vehicles in order to provide protection for the safety of the community. This article mainly demonstrates the feasibility of RFID technology in the community security system from the perspective of “location”.

 1 RFID composition and working principle

1.1 The system is divided into three parts

(1) Label (Tas)

The label is equivalent to the bar code symbol in the bar code technology, used to store the information that needs to be identified and transmitted.

(2) Reader

Depending on the types of tags supported and the completed functions, the complexity of the reader is significantly different. The basic function of the reader is to provide a way for data transmission with the tag. In addition, the reader also provides quite complex signal state control, parity error checking and correction functions.

(3) Antenna

The antenna is a transmitting and receiving device that transmits data between the tag and the reader.

  1.2 Working principle

RFID technology is a technology that uses radio frequency signals through spatial coupling (alternating magnetic field or electromagnetic field) to achieve contactless information transmission and achieve automatic identification through the transmitted information. The working principle is: the use of radio frequency signals and spatial coupling transmission characteristics to realize automatic identification of the identified objects. Working process: When the item with the electronic tag is within the readable range of the reader, the reader emits a magnetic field, the query signal will activate the tag, and the tag requires a reflection signal according to the received query signal, and the reader receives After the signal reflected by the label, the electronic data stored in the electronic label is read and identified without contact through the decoding process of the internal circuit, so as to achieve the purpose of automatically identifying the object. And then further realize the collection, processing and remote transmission management functions of the object identification information through the computer and computer network.

 2 Current status of community security technology

At present, the main function of the community security system is safety precautions. In order to create a safe and comfortable living environment for the residents of the community, it is necessary to have a high-standard and intelligent security system. Most communities still use the patrol and duty methods of security personnel. This traditional method is inefficient and requires personnel. The amount of labor is large, and unsafe factors cannot be well controlled. Even if some high-end communities adopt advanced intelligence equipment and are equipped with relatively high-quality security personnel, these devices have the disadvantages of expensive and easy to be damaged by humans. In short, the security effect is not obvious.

 3 Structural design and working process

3.1 Structural design

Taking into account the diversity and complexity of the road sections that the buildings and people in the community may pass through, it is necessary to install several readers and exchange them with the computer of the monitoring center through the communication line. At the same time, an electronic tag is placed on each vehicle of the personnel entering the community to monitor and locate it.

In the working process of the RFID system, energy is always the basis, and data exchange is realized through a certain time sequence. The reader provides working energy to the electronic tag. When the electronic tag enters the radio frequency identification field, the radio frequency wave emitted by the reader activates the tag circuit, interacts, and completes the data exchange. For simultaneous reading of multiple tags, either the reader or the tag can be used. In order to realize multi-tag reading at the same time without conflict, the reader first issues isolation commands to a batch of tags, so that multiple electronic tags within the reading range of the reader are isolated, and finally only one tag is kept in an active state, and no conflict is established with the reader. Communication link. For the tag-first approach, the tag randomly sends its own identification ID repeatedly, and different tags can be correctly read by the reader at different time periods, and multiple tags can be read at the same time. For any electronic tag, it has a unique ID number. In most applications, the data attributes of the tag are supported by the use of a back-end database. The interface between the reader and the application system is represented by a standard function called by the development tool. The function roughly includes the following aspects: the application system issues configuration commands and other instructions to the reader as needed; the reader returns its current configuration status and the execution results of various instructions to the application system.

  3.2 Working process

Each vehicle entering the community must wear an identity card (including personnel card and vehicle card) issued by the security guard-radio frequency identification tag when passing through the gates of the community. Its chip contains a unique identification code and a user-specified code. Information, they can be read out by a reader in a non-contact manner within a certain distance. The dynamic monitoring system based on radio frequency identification technology can simultaneously track and identify multiple target objects with radio frequency tags within a certain range without contact, high speed and accuracy, so only place radio frequency identification tags on people and vehicles entering the community (Usually packaged in the form of a card, so it is also called a radio frequency card), when the personnel and vehicles entering the community drive within the effective reading range of the reader, the reader of the system will automatically read the radio frequency held by the personnel and vehicles Identify the ID number of the tag, and then the system will transmit the ID number of this tag and related information about the driving of personnel and vehicles to the background system for processing.

 4 Feasibility analysis

After the previous introduction, it can be argued that the security problems that plague the community have been resolved to a large extent, and the effective identification, monitoring, monitoring and positioning of personnel and vehicles in the community have been realized, so that the security system of the community fully reflects the “humanization, information” The goal of digital community is achieved. At the same time, the production cost of RFID identity cards is lower and the investment is less. Therefore, it is feasible to apply this technology in the community security system.

  5 The overall design of RFID technology in the community security system

5.1 Functional design

The basic functions realized by RFID technology in personnel location management include:

①Recognition: How many people or vehicles are there at any time or in a certain place, and who can fully identify these people or vehicles;

②Recording: the activity trajectory of all people and vehicles entering the community at any time in the community can be recorded in the database;

③Positioning: The community monitoring center can remotely monitor people and vehicles entering the community;

④ Inquire about a series of information such as the arrival/departure time and total stay time of relevant personnel and vehicles at any location, so as to supervise and confirm whether important inspection personnel conduct various data testing and processing on time and at the point, and fundamentally eliminate the cause Related safety issues caused by negligence.

⑤ Anti-cheating: The monitoring center can automatically recognize the identity card that the personnel and vehicles entering the community lose or discard during driving.

 5.2 Design scheme

Install several readers in the various passages of the community and the passages through which people may pass, and exchange them with the computer of the ground monitoring center through the communication line. At the same time, an RFID electronic tag identity card is placed on each vehicle entering the community. When a vehicle enters the community, as long as it passes or approaches any reader placed in the passage, the reader will sense the signal and upload it immediately. On the computer in the monitoring center, the computer can determine the specific information (such as: who, where, and the specific time), and the manager can also click on any location in the community according to the distribution diagram on the big screen or on the computer. The computer will then count and display the personnel in this area.

At the same time, once an accident occurs in the community (such as: fire, robbery, etc.), the personnel and vehicles around the accident site can be found immediately based on the personnel location distribution information in the computer, and then the detector can be used to further determine the accurate location of the personnel at the accident site , In order to help the public security department to rescue people in distress and solve cases in an accurate and quick manner.

 5.3 System completion

The information processing system is the core of the entire community security system, consisting of a database system and a corresponding application software system. The system can complete functions such as recording, querying and processing related information on the travel path of personnel and vehicles. For example, it can query the travel path information of the personnel and vehicles that entered the community on March 1513, 2007.

 6 Prospects of RFID technology

Radio frequency identification technology (RrID) has now become a very hot topic. According to industry insiders, the RFID technology market will bring about $3-10 billion in business opportunities in new products and services in the next five years. There are also huge demands for servers, data storage systems, database programs, business management software, consulting services, and other computer infrastructure. Many high-tech companies are stepping up the development of RFID-specific software and hardware, and have invested heavily in the development of this technology and solutions. These companies include Intel, Microsoft, IBM, Oracle, SUN and other Irr giants. Recently, the world’s largest retailer, Wal-Mart, “required its top 100 suppliers to use RFID technology when sending pallets and boxes to its distribution center, and use this technology in a single product before January 2006.” The resolution put RFID under the spotlight again. Therefore, it can be said that RFID technology is becoming a hot new technology in the world.

 7 concluding remarks

The application of RFID in the community security system is based on community management regulations, and can be classified and applied in accordance with personnel security management, vehicle security management, and security material management. Use FRID technology to establish information collection and processing plans, realize information transmission and information sharing, provide support for community safety management, and realize community management informatization, standardization and visualization. To maximize the safety of people and property in the community.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare