Chapter I overview

The RFID classified carrier management system of our company (donwit Dongzhi Technology) is an information-based, intelligent and standardized system for unified management and analysis of RFID intelligent warehouse based on mutual RFID technology, 3D technology, database technology, AI and video analysis technology.

Today, with the rapid development of information technology, the use of digital carriers to store, transmit and process classified information has been very common in the military, party and government organs. However, due to the lack of effective technical supervision means, the phenomenon of random placement and random belt of secret related carriers, and the careless supervision of personnel in and out of secret related areas occur from time to time, resulting in an increasing number of secret loss and disclosure events, which directly endanger the security of the state and the army. The construction of security management of secret related carriers is the requirement and strict defense line for the development of information security management of military and party and government organs.

According to the situation of serious leakage caused by unconscious bringing out of classified carriers and careless access management of confidential area personnel, RFID RFID technology is applied to the on-site supervision system of classified carriers, which has the effect of all-round supervision, and can effectively solve the problems of bringing out management of classified carriers and other equipment and strict control and management of foreign visitors. The “secret related carrier in place supervision system” is specially launched to strictly supervise and handle the carriers brought out in violation of the regulations by giving an alarm, recording and storing relevant information.

The system uses RFID technology to realize the overall idea of the on-site supervision system of secret related carriers, especially the management of personnel in and out of secret related areas and secret related carriers. In the scheme, the RF electronic identification card issuing system is composed of the management system software center and the RF card reader, the one-to-one correspondence between the classified carrier and the personnel entering and leaving the classified area and the RF electronic identification is established, and the reader is used to form the supervision system to realize the management of the personnel entering the classified area and the classified carrier, The system will give an audible and visual alarm for the behavior of taking out the secret related carrier in violation of the regulations, and record the data and time of the carrier at the same time; The management system can be connected to the LAN, and the interconnection between the gate and the confidential area is realized by using the network technology, which simplifies the system connection relationship and complicated operation process; The application and approval of secret related carrier takeout has achieved the purpose of effective, convenient and all-round supervision.

The construction of secret related carrier security system is the development trend and requirement of information security management. The application of RFID technology to secret related carrier security management can better solve the problem of out management of equipment such as secret related notebooks, The confidentiality of military information is becoming more and more important. Strengthening the management of classified carriers with the help of RFID technology will play an important role in information security. Radio frequency identification technology is a technology that has attracted much attention all over the world in recent years. It has developed very rapidly and has great application prospects. Through the implementation of the security management system of classified carriers based on RFID technology, accumulate the application experience of RFID technology, promote the research results of the application of RFID technology, carry out the application of RFID technology in military equipment management, security management, personnel management and logistics support, and give full play to the role of RFID technology in military, To achieve the goal of ensuring the smooth completion of military objectives and improving efficiency.

“RFID classified carrier in place supervision system” (hereinafter referred to as “classified system”) supervises classified carriers such as USB flash disk, mobile hard disk, notebook computer and folder embedded or pasted with special electronic identification card; At the same time, supervise the internal and external personnel entering and leaving the classified area.

The “secret related system” detects and identifies the access of the supervised object to the secret related area, displays the relevant detailed information and alarm function according to the violation of the supervised object, automatically records and stores the information, and prompts the security personnel and confidentiality personnel to manage and deal with it quickly and timely.

Chapter II system functions and technical indicators

2.1 system functions

pYYBAGGJD2mAPcZVAABSBUYeJ5Y038.jpg

Each carrier must be registered and stored through the system software. After the carrier is put into storage, the system will automatically detect whether each carrier is in place in real time for 24 hours. Once the system detects that the carrier disappears illegally, the system will automatically alarm and prompt the management personnel. At the same time, the specific information of the disappeared carrier will be displayed in real time through the system software and saved in the software database for future reference

When the authorized carrier (active RF electronic tag) is brought out of the supervision area, the system will automatically record relevant information (unit, responsible person, carrier type, time and status), and automatically record and store the current event records for future query. At the same time, the door query machine will also display carrier related information in real time, which is convenient for managers to view.

When the carrier is taken out without authorization, the system will automatically send an alarm tone to display the carrier related information (unit, responsible person, carrier type, time and status), and can automatically record, store and shoot the whole process video. Intervention by guards.

When the carrier enters the door, no alarm will be given regardless of whether it is authorized or not. Only the relevant information and time of the carrier will be recorded, the relevant information will be stored, and the status of the carrier will be automatically changed, for example, from out of warehouse to in warehouse.

The system can set the return time after the carrier is brought out. If the authorized carrier is brought out and does not return to the warehouse within the specified time, the system will prompt an alarm and notify the management personnel to intervene.

It integrates LAN, controller and PC to form a powerful network system, supports RS485 and TCP / IP communication modes, supports mixed networking of the two modes, and can easily realize Internet remote networking.

PC can be placed anywhere in the network, and can monitor and manage all controllers in the system. PC can monitor various events in real time, with dynamic online display and humanized operation interface. The operation and management of the system is very simple, and each controller can be configured and detected on site through notebook PC.

2.2 main technical indicators

The monitoring width of classified carrier is 2-6m

The monitoring height of classified carrier is 0-3.5m

The monitoring distance of classified carrier is 3-15m

Antenna transmission distance 10-30m (related to label type)

The transmitting distance of high-power antenna is 60-130m (related to the label type)

Multiple identification capacity ≥ 20

Identification battery service life ≥ 3 years (in standard mode)

Label card size 83 × fifty-two × 5.5mm

Small hanging label size 46 × thirty-five × 10.5mm

Touch all-in-one machine size 1370 (high) × 470 (width) × 380 (deep) mm

Chapter III design principles and main features

3.1 standardization principle

The electronic identification selected by the system applies the international advanced Internet of things technology of 2.4G microwave, low power consumption and remote identification.

3.2 system characteristics

Adopt the advanced RFID technology system for the supervision of classified carriers.

All parts of the system are connected by wireless network. The reader and writer can be directly installed in the touch screen integrated machine or in the ceiling. It is easy to install, discards the channel structure and is easy to integrate with the environment.

The logo adopts low-frequency activation technology. It is only launched instantaneously when it is close to the card reader. It is not launched at ordinary times, so as to prolong the battery life and improve the security and confidentiality of the system.

Active identification is adopted, low frequency controls the identification distance, and high frequency determines the identification effect, so that the identification distance control of the system is reliable and the anti occlusion performance is superior.

A number of security protection measures effectively prevent technology theft and logo replication.

Chapter IV system scheme design

The system adopts radio frequency identification technology and constructs a comprehensive supervision system composed of “on-site supervision, electronic tag and management center”.

4.1 supervision system

The system is mainly composed of reader, electronic tag, touch all-in-one machine and management software. It is installed at the entrance and exit of the supervision area to automatically detect and record the classified carriers and personnel in the access channel, and send an alarm to the carriers brought out by unauthorized violations.

The system management center and the reader are connected through the internal LAN to realize the real-time monitoring of all carriers and personnel entering and leaving the classified places.

The RF sensing area at the entrance of the area is used to register and issue the information of visitors entering the confidential area, compare it with the relevant registration information stored at the entrance of the confidential area, and release it if it is consistent.

The all-in-one machine uses a vertical touch screen all-in-one machine, which is installed on one side of the gate. The photo, unit, type, time, status and other information are immediately displayed at the entrance and exit of personnel and carrier for the guard to watch, use and process.

Electronic label

Using the current international advanced wireless chip, the low-power chip and related circuits designed to meet the system requirements ensure the service life of the battery and the reliability of the identification.

The electronic tag used in the system is safe and harmless. It works instantaneously only through the trigger area and within the specified time. Its transmission power is only one fifth of the power of the mobile phone.

4.2 Management Center

The management center is composed of high-performance computer, card reader and functional software package. It has the functions of system function setting, carrier registration, bring out authorization, violation alarm, information storage and log query.

System working principle

4.2.1 the management center is composed of software packages that meet various functions of the system.

poYBAGGJD26ASl5MAABJ7QDdKD0464.jpg

(1) Control carrier from generation to cancellation

(2) Bring out the authorization software: the authorization information includes: the carrier’s unit, applicant, responsible person, approval leader, operator, authorization status, authorization period, carrier category, carrier security level, etc.

(3) Channel management: alarm information includes: carrier type, attribution unit and other information.

(4) Cancel authorization

(5) Overdue prompt

(6) Extension of authorization

Chapter V configuration and installation of classified system

In place detection card reader, touch screen all-in-one machine, management software and label card.

(1) Touch the built-in high-frequency identification signal receiving and other equipment of the all-in-one machine, receive the identification data transmitted by the electronic identification in time-sharing, and carry out corresponding processing according to the identification data, such as displaying personnel photos, unit, carrier authorization and other information, and give audible and visual alarm and record the results.

(2) The management software part completes the functions of data entry, data communication, identification processing, authorization cancellation, log query, prompt alarm and so on.

(3) The electronic identification part is used to transmit high-frequency wireless identification signals.

(4) In place monitoring equipment. Regularly receive the data sent by the electronic identification. If no data is received within the specified time, an alarm will be given.

Chapter V software features

The management software is developed for the needs of the Chinese market, and is designed according to China’s national conditions, working hours and living habits. It adopts the design method of Chinese window and SQL professional database, so it is very easy to operate and can be familiar with the application of the software in a short time. The software can also print various reports to facilitate management inspection.

The system database adopts standard MS SQL server large C / s multi-user database, is compatible with access database, provides OLE DB / ODBC general access interface, g-level record volume, 10000 level concurrent access, and provides the import and export functions of Excel and TXT standard file formats.

The software supports a variety of connection modes, and can freely network through RS232, RS485, TCP / IP, optical fiber and other modes. It supports mixed access across network segments and nodes, and can easily realize remote networking through the Internet.

Provide an open interface development package, including clear data structure and data dictionary, which is convenient for users to carry out secondary development, and can provide detailed databases, classes and interfaces for users in need.

PC and workstation can be placed anywhere in the LAN, and they can monitor and set all equipment in the system at the same time. Each controller can also be configured and tested on site through notebook PC.

The software provides confidentiality guarantee for the all-in-one card system from many aspects: it has a series of security measures such as identity authentication, node authentication, transaction data authentication, encrypted transmission, data authentication and so on. It can also provide multi-level password protection, manage and restrict the use of central monitoring by different operators, and prevent the system from being used by non relevant personnel.

Provide an open interface development package, including clear data structure and data dictionary, which is convenient for users to carry out secondary development, and can provide detailed databases, classes and interfaces for users in need.

Leave a Reply

Your email address will not be published. Required fields are marked *