RFID-based personnel barrier-free tracking management system scheme
[ad_1]
1. System introduction
“Free Flow People Tracking System (FFPTS)” also known as “Personnel Accessibility Tracking Management System” is a management method for people developed with the development of modern automatic identification technology. With the development of radio frequency identification technology (RFID), FFPT has attracted unprecedented attention and invested a lot of effort in research and implementation. The so-called free tracking management of personnel is to complete the automatic identification and tracking of the object or the group of objects without any behavioral norms and restrictions on the personnel (recognition objects) entering a certain recognition area, so as to achieve the purpose of management. Of course, considering issues such as the privacy rights of the identified object, such free tracking and identification should be done in good faith and be informed that the system exists.
RFID technology has a long history of being used in personnel identification. One of the earliest applications of RFID is in access control management. The application of RFID in access control management can be regarded as the initial stage of personnel management, using a low-frequency RFID system. This low-frequency system is inexpensive, but there are also many technical problems. For example, in this management mode, because the low-frequency system does not have anti-collision characteristics and the recognition distance is short (usually less than 5 cm in the system used for access control), the behavior of the managed person is severely restricted and must be close to each other one by one. Distance recognition. Not to mention tracking and management on occasions other than access control. In recent years, people have begun to use high-frequency (13.56MHZ) RFID to build personnel management systems, and have achieved good application effects. Compared with the low-frequency system, the high-frequency system has a longer identification distance, good anti-collision characteristics, and has a certain penetration ability to the human body. Therefore, the high-frequency RFID system can be used to manufacture the FFPTS system.
The FFPTS system manufactured by using high-frequency RFID technology has the following characteristics: In real life, due to the “liberalization” of human behavior, it has great randomness. Therefore, in the management of human identification and tracking, it will often Encountered long-distance, simultaneous recognition of multiple targets and other problems. The high-frequency passive RFID system realizes a long identification distance and can identify multiple targets at the same time. It is inexpensive and has no harmful radiation to the human body. It is an ideal RFID product for personnel identification.
From the perspective of practical application, build a free tracking and management network system for personnel. The local area network and wireless network communication system are used to process and distribute the individual data of the identified personnel and objects in a timely manner, with the concept of real-time. Therefore, for different application occasions, requirements for environmental adaptability and common interface characteristics will be put forward for the RFID system. The RFID system developed in this project will solve these problems well; the well-intentioned barrier-free tracking management, and the humanized management revolution. The research and development of this project provides a brand-new technical path for personnel tracking management on specific occasions. The management system reform brought about by the implementation of this technical solution is revolutionary and humane. Develop an advanced FFPTS system based on RFID technology to break the monopoly of foreign technology. This FFPT system includes conference management systems of various scales, and its technology and management level can be comparable to or even surpassed similar foreign products. This has set up technical barriers for similar foreign products to enter the Chinese market.
In the FFPTS system based on RFID technology, the most critical basic components are RFID tags and readers. These two basic components constitute the basic part of the RFID identification system. In addition to the most basic reader and tag components, the components of the RFID system also include middleware, network, application software and other components. Different application systems have different requirements for RFID, but they also have the same characteristics. For a large-scale application system, they all include the following parts:
①Front-end RFID data acquisition system, ②Middleware, ③Data transmission network, ④Computer system, ⑤Automatic control and display system (including dynamic perception), ⑥Image acquisition and processing system, ⑦Back-end software platform related to RFID data system Business systems, such as FFPTS, etc.
The complete FFPTS system includes RFID acquisition system; display and operating system; automatic control system; image acquisition and processing system; document management and certification system; central monitoring system; central management system; central database; network and communication system; online work System; encryption system; other application systems (personnel positioning system, attendance system, query statistics system, etc.); ground frame antenna and other systems.
2. Function overview
Implement unified and standardized management of the personnel and vehicles involved in the system to realize the digitization and informatization of the information of the identified objects and the standardization and systematization of the overall process.
Specific requirements are as follows:
All involved persons and vehicle information are entered into the database for unified management, and RFID tags are used for identity marking; verification channels are set up at important passing locations and areas to achieve “undocumented is difficult to move, leaving marks wherever there is a document”; to achieve exemption ( hand-free) verification method, concealed installation or camouflage of the card reader antenna, with long-distance sensing capability, the holder can pass the verification without noticing; the identification and control of the monitoring points must be accurate, real-time, and complete Monitoring mechanism and post-audit capabilities; a set of convenient and easy operating procedures should be developed for the control of outside personnel and vehicles in the system, and the system’s supervisory functions should be fully utilized for complete and effective management; all aspects of system operation, especially the system The certification link must have good security and confidentiality; the system itself must have redundant design and disaster recovery functions, and a complete set of data backup and recovery mechanisms; the system provides a complete interface for function expansion and system upgrades; such as: add All-in-one card functions such as attendance function, meal, medical treatment, etc.; add personnel positioning function; add important items, document tracking function; add vehicle identification function; manage and produce multiple certificates of user units; other conditions and restrictions.
The original network conditions of the user unit and some of the equipment that may be reused, as well as the original management system and process of the user unit, may have a positive or negative impact in the design of the new system and need to be optimized, modified or reused.
3. Overall design
1. Processing flow
Standard system structure of the entire system
When it is an internal personnel, after entering the personnel identification area, the system will automatically detect its ID, and directly display its personal information, whether it has the access area authority and other information on the display terminal, and the personnel on duty will determine after comparison and judgment. Whether it is the person and whether he has the permission to pass, and decide whether to let it go.
For internal personnel who have not brought a certificate, they can judge whether to release by entering a positive number on the duty terminal. If there is no record, they will be processed by the duty room. The external personnel who carry the visitor card are the same as the internal personnel who have the certificate. For the duty room: the processing status of the personnel on duty will be simultaneously displayed on the terminal of the duty room. The duty room is responsible for the registration of outsiders or undocumented insiders and vehicles. The handling of external personnel and internal undocumented personnel is basically the same. The duty room directly queries the reserved visitor list through the duty computer. If there is a record, the visitor card will be issued. If it is not approved, the approver will be contacted.
For the approver: For an appointment visitor, the approver can directly log in to the “Approval Module of the Electronic Identity Management System” in WEB mode, directly enter the visitor’s information, and approve the passage. This operation is protected by the account password and is verified by a digital signature, and the approver will only be able to see the approval information and records corresponding to the person. In this way, the approved person can directly check the identity with the duty room and obtain the visitor card after arriving at the verification area. The card is used as an identity certificate for entering the controlled area and has an expiration date, which will be returned when you leave. For visitors who have not made an appointment, the operator of the duty room will directly enter the information of the person (car) to be approved and submit it to the approver, so that the approver will give an approval after logging in (or notify the approver by calling to get the approval), Issue a visitor card.
2. Computer system processing flow
The verification point system is in a long-term operation state, and the monitoring of the terminal on duty and the terminal center in the duty room simultaneously displays the monitoring status of the verification point area.
Verification point system loop detection:
Wireless infrared (or thermal) equipment to obtain personnel passing information
RFID reader (antenna) to obtain RFID tag information
The capture camera records the image of the monitoring point when it is triggered
When obtaining personnel pass tag information or RFID tag information, the system triggers the personnel processing module to process the electronic document record corresponding to the RFID tag. Query the internal personnel database and external personnel database. If there are records, the corresponding records will be displayed; otherwise, the corresponding event will be prompted and handed over to the duty room for processing.
3. Approval process
For approvers, they can log in to the system for approval management (within the scope of their authority) at any time, and all their operations will be recorded. And you can inquire about the entry status and historical records of its approved persons.
Four, function allocation
1. Verification point system (institution)
The verification point system includes two parts: the verification point subsystem and the duty room subsystem. It is responsible for the identity authentication and related data recording and processing of the identified objects with electronic certificates (including vehicles and objects identified by automatic license plate recognition technology) .
The main functions of the verification point system include:
Supervise (prompt) the identification of the identified object to perform information retrieval and query on the identified object (person, vehicle, object) attached with an electronic certificate, analyze and process it through predefined rules, and submit the processing result to the upper level for processing. Alarms for persons and objects without electronic certificates, and alarms for expired and lost certificates. The query function under special circumstances (such as the user forgets to bring the certificate), the user notification information prompt function (such as: the user arrives at a certain place, the system prompts “a leader asks you to go to a certain place to do something”). A notification triggered by a specified event. Automatically record user events (documents, time, images and other information archive) for inquiries. Special events are automatically submitted to the duty room and the central management system for processing or recording (such as illegal user events). The duty terminal can provide a simple multimedia communication platform.
2. Central Management System (Organization)
The central management system is the management center of the entire electronic identification system. It includes a central management subsystem, a central monitoring subsystem, and a certificate management subsystem. It is responsible for managing and coordinating the operation of the entire system. Its main affairs are:
Various configurations and parameter settings of the entire system, system operator account password and authority management, monitor and display the working conditions of all personnel verification systems, and provide alarms for special situations, provide all personnel information and user event statistics of the entire system, query and classify display system operation Time’s personnel dynamics, various report generation, printing, inquiries to specific personnel, positioning of external personnel, vehicle entry and exit approval management, data collection and sorting (manual) of the recognized objects of the system (persons, vehicles, objects) Informatization, digitization, and sorting and entry into the computer system. The production of electronic documents of the identified objects (including printing or printing). The production and management of authorized temporary electronic documents of the identified objects. Management of extended systems: such as all-in-one card systems, personnel positioning systems Wait.
[ad_2]