All-in-one card solution
[ad_1]
All-in-one cardsolution
With the development of science and technology, the improvement of living standards, and the acceleration of the pace of modern cities, people are increasingly pursuing more convenient, more practical, and faster methods, both in work and in life. All kinds of smart cards appearing around people are replacing some traditional cash, keys, tickets, paper cards, etc. The appearance of these smart cards has indeed greatly facilitated people’s work and life.
Modern intelligent office buildings, communities, and enterprises need smart cards with complete functions, easy use, and good security to cooperate with the realization of overall intelligence.
The emergence of cards depends on the development of modern information recognition technology. Since the birth of barcode recognition technology, magnetic stripe read-write technology, contact IC card read-write technology, photoelectric technology read-write technology, etc. have appeared successively, and corresponding card types have also appeared. However, they have more or less insurmountable limitations. They cannot realize all-in-one card management and fail to achieve the effect of safety, convenience, speed, comfort and intelligence.
The proximity card IC card all-in-one card technology that has appeared in the past few years can effectively solve these problems. Proximity card IC card, with its unique non-contact card mode, unique adaptability to harsh environments, large-capacity reading and writing space, excellent electrical and mechanical characteristics, and extremely high security, is favored by users from all walks of life.
All-in-one card technology is widely used in various fields of society, and it is no exception in the field of intelligent buildings. In recent years, through the development and application of all-in-one card technology and the practice of intelligent construction engineering, our company deeply feels that the application of all-in-one card technology has a strong role in promoting the intelligentization of buildings, buildings, communities, enterprises, schools, and hotels. This technology expands the application range of intelligent system integration and enhances the overall functions of the entire building. It can not only realize the information exchange, sharing and unified management between the various sub-systems of the one-card system, but also realize the various functions of the one-card system and the building. Information exchange between subsystems, unified management and linkage control.
Access control system
1. Set up a variety of administrators with different permissions to achieve multi-level management of the system.
2. A variety of authorization modes can be used according to customer requirements, and can be defined as card, card plus password, multi-card combination and other permissions according to the different protection levels of the place. All personnel can be set to various use permissions through different combinations of departments, access control units, time periods, and time groups, which is very convenient to manage.
3. There is no limit to the number of controllers and personnel, no matter how big the system is, it can be used.
4. With the function of real-time monitoring of incoming and outgoing data, all original data are stored in the management PC, which has high security.
5. It is easy to realize cross-regional networking, and supports remote management and maintenance.
Attendance System
1. Adopt the most popular B/S structure software at present, namely browser + server mode, namely web page mode. The customer’s operation and use do not depend on a certain computer.
2. In order to meet the individual needs of customers, the source code is open, and individual modifications can be made according to customer requirements. 3. The back-end database can be SQL Server, ACCESS or other databases.
4. It can be directly connected to the computer, hub, and transmit data through the gateway. Built-in dial-up Internet access protocol can be directly connected to MODEGPRS, CDMA, and data can be transmitted to a remote server in real time via the Internet. It can be networked in real time, and data can be retrieved directly from the database. It is fully suitable for large-scale systems such as wide area networks and local area networks. Easily realize branch factory, main factory, and data sharing. Cross-regional networking.
5. Each machine can store 10,000 induction cards, 30,000 records, and 1,000 black notes when offline. There is no limit to the number of machines in the network; it can easily manage the enterprise card, campus card, logistics card, community card, park card, chain store card, etc. with more than 100,000 people.
6. The powerful background has various functions such as personnel, attendance, shift scheduling, leave, and reports, which can be used for attendance in various places.
7. The web-based software model makes the operation and use of the system simple and easy to learn, which not only reduces the difficulty of your training, but also reduces your after-sales service.
Toll system
hardware
1. The security of the charging data in the charging machine: the consumption records stored in the machine are independently stored in the large-capacity FLASH chip, which has the function of long-term storage after power failure; it will not be lost due to damage to some parts of the card machine .
2. Setting function: The charging machine must be initialized before it can be used. At the same time, some basic parameters of the charging machine must be set to limit the maximum consumption amount and minimum balance of each meal, including the use rights of different identities. The charging machine has the function of displaying the current date, time, and the machine number of the machine. It has different display information and prompt sounds for bad cards and lost cards. The card machine has the function of querying and displaying consumption number and consumption amount.
3. Keyboard coding method: the charging machine has ordinary charging and automatic charging methods (suitable for fixed-amount charging of the package). The charging method can be set by the button; the display of the amount in the existing card and the current consumption can also be divided according to different card types Limits on consumption time/day, consumption times/time, and maximum consumption/time.
4. The toll collection machine adopts the dual-purpose method of stand-alone and networking: the system can easily transmit management parameters (daily consumption times, different fixed charging amounts for different types of cards, etc.) through the network, transmit loss report data, and collect information such as consumption data in the toll collection machine. .
5. The charging machine has a double-sided LED display, which displays the consumption mode, card amount, consumption amount and card balance, etc. Staff and consumers can see the same display content at the same time, and the consumption process is clear at a glance.
6. The toll collection machine has an alarm prompt function. When a card is reported missing, there will be an “EEE” prompt and an alarm sound; when there is a bad card operation, there will be an “CE” display and an alarm sound.
Offline processing:
When the network is normal, all card swiping data are written into the server database in real time and not stored in the machine. The prerequisites for ASP program analysis and judgment are based on the data in the server database. However, in the case of network abnormalities, the use of the machine is the same as the 485 series, that is, the card data will be stored in the machine, but unlike 485, the .net machine will be on the network normally and there is no card swiping action, every interval The whitelist in the machine is automatically refreshed in 1 minute, that is, when there are operations such as entering the factory, resigning, reporting the loss, etc., the corresponding card number will be automatically added to the machine or deleted from the machine, so that it can be used normally when the network is abnormal. , When the network is abnormal, the machine will actively detect the network status every 1 minute. When it is found that the network has returned to normal, it will first transfer the saved card data to the database without special handling.
Management software
1. The host can view and collect data from multiple terminal consumer machines at any time.
2. Each toll collection machine can transmit data through INTENET. Enable remote data sharing.
3. Toll system software functions:
a. All operations such as system startup and recharge need to verify the operator’s operating password, and the operating system can only be entered when the password is correct.
b. Data collection: The system automatically categorizes the collected data, and automatically forms a daily, a certain period of time, and a monthly consumption detail database and summary database. The reports provided by the software are: daily and monthly income and expenditure reports; daily and monthly consumption reports; time period reports; daily and monthly charging reports for charging points; daily and monthly reports for service staff and monthly statement reports.
c. Deposit statistics: The system automatically generates and print reports for daily deposits. The reports include: daily and monthly deposit reports; consumption data error correction reports, etc.
d. Historical data: The system can query and print the historical data (including consumption and deposit details) of the current and any time period.
e. Data storage and backup: the workstation host can automatically divide the data into multiple databases, and automatically back up the data on a monthly basis; the daily data is automatically backed up; the host implements dual hard disk automatic backup functions, and the data is permanently stored in the host hard disk middle. Data can also be backed up via a floppy disk.
4. System operation process:
Card issuance subsidy deposit dining summary statistics loss report cancellation
.NET machine operating principle
1. Real-time upload of data: After the machine receives each swipe action, it will transfer the swiping card number, time, machine number, and data input from the machine’s keyboard (such as consumption amount) to the server in real time.
2. Server-side software judgment analysis: After the server receives the uploaded data, it triggers the corresponding software processing program (ASP), analyzes the uploaded data, writes the analysis result into the database and returns the corresponding judgment result Go to the machine site.
3. After receiving the judgment result from the server, the machine will make corresponding prompt processing: for example, a legal meal will display a green light and display the employee’s name, balance and current consumption amount on the LCD panel. Illegal meals are displayed with red lights and displayed on the LCD panel according to different types, such as meals during non-dining hours, meals with foreign cards, meals at non-designated locations, meals without reservations, insufficient balance and other information.
After completing the above three items, a dining process is over.
If it is a legal meal, the corresponding data is written into the database;
If the meal is illegal, only the judgment result will be sent back to the scene, and the data will not be written into the official database. (If necessary, write illegal records to another data table for investigation)
Data security measures
1.Server-side security guarantee
A: With the industry-wide SQL SERVER 2000 as the back-end database, there is no doubt about its security and stability
B: The software system is set up with 4 levels of authority management, the authority can not only be defined to different operation modules, but also can be defined to the different operation buttons of the last layer under the module
C: For each operator since entering the system, as long as the data modification (addition, deletion, modification) is involved, a special file will be used to record the operator’s code, modification time, and the value before and after the modified column, and these contents Can be stored permanently for inspection
D: The system can automatically perform backups on a regular basis
E: IIS log
2.Safety guarantee for canteen management
A: When it is legal to eat, write to the database first, and then send the prompt message to the dining site. This avoids the situation where the on-site prompt is legal and the data is not successfully written to the database, which causes the loss of the canteen.
B: When the network fails, each machine can reserve 5000 valid dining card numbers offline. When the card number is accepted, if the card number is already in the 5000 valid card numbers, it is considered a legitimate person and can eat, and the dining data will be saved (Card number, location, time, amount) is kept in the machine, when it is not in 5000 valid cards, it will call the police and refuse to eat
C: The effective dining card number is automatically generated by computer software according to relevant conditions, without human intervention. For example, a new employee who enters the factory will automatically download the card number to all dining machines after the employee is recharged, and the resigned employee will automatically delete the corresponding card number from all the dining machines after entering the relevant information. After each meal, the computer will determine the remaining balance. When the balance is less than the specified limit, the card number will also be deleted from all dining machines. If the employee later recharges and the balance after the recharge is greater than the specified limit, then It will be downloaded to all dining machines.When the employee card is damaged, lost, or log off, the dining machine will be operated accordingly to ensure that the data is accurate. The above two BCs are only used when the network fails. When the network is normal, there is no need to compare with the 5000 card numbers in the machine. Compare directly with the server
D: Timing of updating and uploading data: the downloading and deleting of the valid card number and the data retained in the machine during offline use will be actively searched for the server every minute when a single machine is not swiped by the card for one minute. When the server is successfully searched, it proves that the network has returned to normal. First upload the retained data, and then update the valid card number. When the network is unavailable, the machine will take the initiative to look for it again in one minute, so that the server and the machine are in place. Exchange data at any time without swiping the card
3. Security of diners’ data:
A: Every piece of dining data can be checked (time, dining location, amount)
B: Recharge amount and refund amount can be checked (receiver (refund), time, amount)
C: Within the specified time period, consumption amount + balance = recharge amount
D: Employees can check the balance in their card and the number of consumptions at any time at the designated inquiry machine. If any problems are found, they can go to the recharge office for verification and implementation
4.Data security guarantee for recharge and return card personnel
A: Record each recharge (refund) value list: including the operator, time, amount, and name of the operated card number
B: The cash receivable and payable and the flow list can be counted during the shift, so that the account balance between the recharged person and the operator can be achieved
[ad_2]