Smart meeting sign-in system
[ad_1]
1. Company profile
Xuzhan Technology (Yangzhou) Co., Ltd. is a high-tech enterprise specializing in the application, development and production of RFID technology. The company’s products include high-frequency/ultra-high-frequency and active electronic tags and supporting reading and writing equipment, which are widely used in vehicle management , Logistics management, personnel management, library management, etc. anti-counterfeiting and intelligent management systems;
The company has a group of high-end technical talents, has advanced international management experience and has been engaged in the application of intelligent RFID technology for many years. In the actual development process, it strives to integrate the unique advantages of the high-tech field, absorbs and digests advanced technologies at home and abroad, and has formed a relatively strong The comprehensive technology development strength of the company has been well witnessed in the continuous application and practice. A series of complete RFID application technology systems have been formed, enjoying a high reputation and technological forward-looking in the industry.
The conference sign-in management system developed by our company is very cost-effective, and is the most advanced, intelligent conference management with the latest RFID technology; it is convenient and fast, has good confidentiality, high sensitivity, long service life, flexible form, powerful functions, etc. Numerous advantages. It is widely used in conference management places such as hotels, hotels, schools, institutions, etc.
2. Overview
At present, frequent business exchanges or large-scale government meetings, etc., some require fee-based conferences, some limited-person conferences, and people come from all corners of the country. This makes the organization and management of conference affairs more difficult and complicated, because of the high level of conferences. , There are many representatives from all over the country, so the conference affairs organization is under a lot of pressure, and it is difficult for conference affairs organizers to accurately identify the participants from memory. Therefore, how to effectively identify and count the participants has become a conference A focus of organization and management. The frequent holding of meetings has also aggravated the difficulty of meeting management. Simple sign-in can no longer meet the needs of management. Inevitable omissions are inevitable. Customer complaints and supervisors’ accusations add to the psychological pressure of meeting staff. Excite
Traditional conference management generally uses conference sign-in and the simple method is manual verification of documents and ordinary smart card documents. The methods have many shortcomings:
1. Manual check:
Manual verification of documents or sign-in is extremely inefficient, cannot guarantee accuracy, and is inconvenient for automated statistics;
2. Ordinary smart card certificate:
Ordinary smart cards require participants to show their credentials and swipe their cards at a designated place. When there are too many people, the problem of queuing for swiping cards is formed. It is inevitable that people are unwilling to sign in; generally, people who participate in important meetings have considerable identities. If you use this This credit card access mode is completely undesirable in terms of etiquette and convenience, and is not conducive to the realization of humanized meeting management by participating organizations;
The emergence of a conference management system using RFID technology has greatly avoided the above-mentioned problems:
1. Long-distance automatic identification realized by radio frequency technology, data transmission speed is fast, the speed can reach 16K/s;
2. Each card has a globally unique number to avoid the problem of heavy cards and wrong cards;
3. RFID is an electronic data carrier that can store data in a chip. It is small in size and the smallest chip can reach the micron level, which is convenient to carry;
The RFID technology conference management system can be applied, which greatly facilitates the work of the conference affairs group. The humanized design makes the conference affairs easier and more convenient, which can fully meet the needs of modern large-scale government conference management and participant identification work. ;
Three, system design
2.1 Overall design
Reading heads are set up at the entrance and exit of the venue. It is necessary to set up barriers and infrared or cameras. All data lines use 485 bus and connect to the computer. The working diagram of this case is as follows:
620)this.style.width=620;” border=0>
plan:
Set up a reader at each entrance to the venue, and transfer the information read by the reader to the computer for background processing. The reader can connect as many entrances as there are, as long as one computer is enough. The relevant wiring diagram is as follows:
620)this.style.width=620;” border=0>
Program summary:
The entire system is managed by one computer, and the computer configuration must meet the requirements of the system. This computer is placed in the information processing center or conference reception desk, etc., as the data processing center of the conference management system and the workstation for issuing new cards. The computer management system collects data (electronic barcode) from the reading head and pre-defined personnel to verify the identity of the personnel. The system is very easy to operate with windows, and the user can easily grasp the operation of the system.
Details of equipment used in plan planning (the following table is the minimum configuration, which is only used for the presentation of this case):
620)this.style.width=620;” border=0>
Remarks: If there is an actual increase, it will be calculated based on the actual occurrence;
Scheme planning structure diagram (only for the presentation of this case):
620)this.style.width=620;” border=0>
2.2 Entrance and exit part
◆ The entrance and exit part is mainly completed by the card reader to complete the data collection, and if necessary, a camera/infrared human sensor can also be added.
◆ When a person enters the entrance and exit of the venue, the equipment will collect the identification card made by RFID on each participant, and the data will be sent to the computer for processing through the 485 bus;
If it is invalid, admission is not allowed. Prompt abnormality with optional alarm device;
2.3 Part of the venue
Join the personnel positioning equipment in the venue to realize the personnel positioning, and it is clear when the personnel sit in the wrong position/vacancy at a glance;
4 Software management part
For conference affairs background processing such as card issuance/sign-in, the software operation function is powerful, and functions such as search/summary can be used as much as possible, which truly replaces the work that the human brain cannot;
2.5 Principle of action:
The conference affairs team prepares the identification cards for the participants in advance (temporary production is also possible), and the participants wear identification cards to enter the venue, and set up readers at each entrance and exit. Once the person enters, the reader obtains the data, and the computer background processes the identification. OK, pass, otherwise, the warning lights up, the conference staff can handle it, this system can cooperate with the audio and video system, and each participant will present a photo and welcome voice when entering the conference venue;
Participants arrive at the reserved seats, and the venue personnel positioning equipment transmits signals to the system. When the participants are normal, the system lights up green. On the contrary, when the participants are in the wrong position or are not in the venue, the system lights up in red, but a participant needs to be found due to an emergency. , As long as you enter the name of the person, you can find its location accurately;
Four, system function
Main equipment functions (access card reading equipment and management system software functions)
·Long-distance identification card
·The card is valid and invalid to be judged, and it will warn if it is invalid.
·The system reads the legally authorized cards in the induction zone at any time, reads the card type, card number, loss report sign, entry and exit sign, expiration date and other data items on the card at any time, and sends it to the CPU for processing and enters the corresponding card according to the card type. Processing procedures, and display the card number and card status.
·All effective operations have built-in inventory files in the memory, and the recorded data can be consulted at any time.
Five, system technical indicators
5.1 Environmental conditions
·Temperature: -20℃~+60℃
·Humidity: 5%~95%
·Using environment: indoor and outdoor all-weather conditions
·Working voltage: 220V±15%, 50Hz
5.2 Indexes of entrance and exit equipment (different depending on the selection)
·Dimensions: width (W) × length (L) × width (H): 155*148*35mm
·Communication interface: in line with RS-232/485 standard
·Power source: DC5/9/12V
·Card reading speed: ≤0.1 second
·Induction distance: 2-80m
5.3 Proximity card
·Dimensions: width (W) × length (L) × thickness (H): 86×54×5.5mm
·Thickness: 1: 5.5±0.025mm 2: 2.5±0.025mm
6. Performance characteristics of main components
6.1 Access equipment (there is a difference in performance between active equipment and passive equipment, this document uses general active equipment to introduce, the camera is well-known, this document does not introduce)
620)this.style.width=620;” border=0>
●Interface: Support RS232/485/Wiegand 26 interface to communicate with the host computer
●Reading distance: effective recognition distance (2 ~ 80 meters) adjustable
●Recognition speed: within 200km/h
●Anti-collision design: advanced anti-collision technology, support multi-tag identification, up to
Anti-collision performance that recognizes 200 logos at the same time
●Security: Encrypted calculation and authentication to ensure data security and prevent link eavesdropping and data cracking
●Anti-interference: using channel isolation technology, multiple devices do not interfere with each other
6.2 Card
620)this.style.width=620;” border=0>
●Long distance: The effective recognition distance can reach 2-80m, adjustable.
●Anti-collision: Advanced anti-collision technology can identify more than 200 signs per second at the same time.
●High speed: The maximum recognition speed can reach 200 km/h.
●Security: Encryption algorithm and authentication to ensure data security and prevent link eavesdropping and data cracking.
●Directivity: It can realize directional and non-directional recognition.
●Power consumption: ultra-low power consumption, healthier and safer.
●Transmission: The ISM microwave frequency band is open worldwide, no application and payment are required.
●High anti-interference: no special requirements for various interference sources on site
Seven, the main advantages of the system
RFID technology conference management system came out, thus realizing humanized intelligent management, combined with the needs of organizers, Asahi Technology adopts RFID technology conference management, its characteristics are:
7.1 Humanized sign-in:
Participants directly pass through the channel system without any stay. The system automatically recognizes and can recognize multiple people at the same time, up to 50 cards can be recognized at the same time, effectively ensuring that multiple people sign in at the same time. And personalized display of the representative’s attendance information and welcome message;
7.2 Effective anti-counterfeiting:
Each electronic label has a globally unique code. The further encryption and anti-counterfeiting of the internal information of the label fundamentally eliminates the possibility of forgery and guarantees the uniqueness of the global label. The system equipment adopts an effective anti-reread design to protect the problem of repeated registration;
7.3 High sensitivity:
Even if many delegates pass through the channel at high speed at the same time, the system can effectively identify them;
7.4 No need to swipe at a fixed point:
Participants only need to pass the only way through the venue at a normal walking speed to be recognized;
7.5 Combination of card and card:
Participants only need to wear a representative badge on their chests to automatically recognize them, without manually swiping their cards;
7.6 Practical background management:
Through the system software background, it is convenient for unified statistics, printing, conference management, etc.;
Eight, the function of the system software
8.1. Real-time positioning of participants: You can check whether a certain person is in the venue and the specific location by entering the card number and name.
8.2 Inquiry of participants’ access: You can inquire about the time of participants’ access to the venue.
8.3. Inquiry about the general situation of the conference staff: you can inquire about the absence of the conference staff and so on.
8.4…
Nine, system plan quotation
620)this.style.width=620;” border=0>
Remarks: Calculated based on the actual number of occurrences
[ad_2]