1 System Introduction
With the development of the Internet of Things, in the future, ubiquitous end devices and facilities will have built-in sensors, communicate information through various sensor networks, and provide secure and controllable and personalized service functions through a secure guarantee mechanism. Such as remote control, alarm linkage, dispatching command, etc. To achieve the integration of “management, control, and battalion” of “efficient, energy-saving, safe, and environmentally friendly”.
The RFID intelligent asset supervision system is an RFID automatic radio frequency technology based on the core of the Internet of Things. It integrates computer hardware and software, information collection and processing, data transmission and identification card production technologies into an automatic asset identification and IoT supervision system. The system can effectively integrate the daily management and anti-theft monitoring of various assets to realize the state monitoring, burglar alarm, tracking and positioning of important and valuable assets, as well as intelligent management of asset inventory, inspection, borrowing, storage and statistics. . Solve the problems of low efficiency and poor security of traditional asset management, and truly realize intelligent asset comprehensive management.
2.1 Overall structure of the system
The system structure mainly includes: front-end data acquisition system, data transmission system, data processing service system and Web upper-layer application system.
The front-end data acquisition system is an RFID wireless transmission system, which is mainly composed of a radio frequency identification card (ie, an electronic tag), a low-frequency locator, a signal transceiver, and a field bus/local area network. Its main function is to collect the target location data and other data sent by the identification card in a wireless manner.
The data transmission system is mainly composed of a data acquisition computer, a data server and an uploading dedicated line. The main function is to upload the collected data to the data center for storage processing.
The data processing service system mainly includes an application server, a database server, a system management workstation, and the like. The system is located in the monitoring center, its main role is to analyze and process the data, and provide various data services for the upper application system.
The upper layer application system of the Web mainly uses the data collected by the collection system to display various business functions through the software platform, and displays the visual effects to specific regional management parties, and realizes statistical management of various data reports.
2.2 Functional Description
Location and status monitoring
Real-time awareness and comprehensive monitoring of the identity information, real-time location, movement trajectory and real-time status of the assets in the area where the electronic identification card is assembled.
Intelligent alarm management
The alarm rules can be preset. Once an abnormal situation occurs, the system can immediately alert through the alarm window, sound and light alarm, SMS and video linkage, and provide functions such as alarm source location and emergency dispatch. Realize the timely monitoring of abnormal conditions of assets and ensure property safety.
In the event of an abnormal or unexpected situation, the system will automatically retrieve the corresponding camera screen, upload the management platform system, and view the real-time monitoring video. At the same time, the corresponding camera device will also automatically turn on the recording function.
Track query and statistical analysis
The system electronic map can play back historical movement trajectories of specified assets and the like at a certain time in an animated form, and can also display detailed travel record data by using a chart. For various types of statistical record data, it provides functions such as chart statistics, record data export and printing.
Diverse technology combination
The system takes the new generation of Internet of Things technology as the core, and combines RFID radio frequency identification technology, video surveillance technology, 3G communication technology and other advanced means to provide intelligent management solutions for the daily supervision of the region.
Auxiliary application function
The management can be extended to the personnel to monitor the management. By wearing the identification card for the personnel, the positioning and tracking of the personnel within the monitoring scope, real-time distributed inquiry, personnel attendance management, visitor registration and conference attendance management are realized.
2.3 Design principles
Advancement: System design and equipment specifications conform to industry technical specifications and technology development trends, adapt to the requirements of digital technology development, and reflect the advanced nature of technology development in terms of functions and performance.
Practicality: The various technologies and functions of the system should be based on the principle of intelligent asset management and construction. The operation and maintenance of the system should be simple, convenient and easy to use.
Standardization: The various types of equipment and communication software and protocols to which the system is applied shall comply with relevant technical standards.
Openness: The system has a development interface that can be seamlessly interfaced with other application systems.
Compatibility: The system can be compatible with the original system to the greatest extent. Functional modules and hardware devices can be configured according to requirements to avoid waste of resources.
Reliability: The system should have high reliability in all situations.
Real-time: Adopting the intelligent sensing technology of the Internet of Things, real-time perception, intelligent identification, video linkage, and intelligent warning of asset anomalies within the monitoring range can be realized in real time.
Scalability: When the technology development and business increase, the system should have the ability to expand, and leave the external interface, so that customers can carry out secondary development according to actual needs.
Maintainability: The system should be scalable when the system fails and needs to be upgraded.
Confidentiality: The system should ensure that data cannot be disclosed, and that there are functional and data authority authorization mechanisms.
Reliability: The system should be reliable and capable of providing everyday reliable service.
3 system principle
3.1 Working principle
The system is based on RFID radio frequency identification technology to build an IoT asset management service platform, which can realize the identification, location, tracking, monitoring and management of assets within the region. By deploying terminal devices such as low-frequency locators and signal transceivers in the monitoring range, RFID wireless communication technology is used to transmit information to the collection server to realize various applications of the upper layer, thereby realizing automatic identification, distribution display, tracking and positioning of assets, Comprehensive services such as remote monitoring and information management.
Signal Transceiver: Mainly used as information transmission equipment to achieve full coverage of specific monitoring area signals, accept signals sent by identification cards, and upload the information to the collection server, which can be installed in the eaves, installed on the wall or installed in the ceiling.
Identification card: Bind to the asset, with a unique number, can actively receive the low frequency signal of 125KHz, and upload relevant information through 2.4G, which can realize the functions of identity authentication, location tracking, state awareness, etc., which can be closely attached to the asset and closely attached to On the wall of the cabinet, hidden in the asset attachments, etc.
Low-frequency locator: The active transmitter can receive the 125KHz low-frequency signal continuously transmitted by the locator when the identification card enters the low-frequency signal range. The signal includes its own number, which can be used to distinguish and identify different locators. Not 2~8m.
Acquisition system: processing the data uploaded by the signal transceiver to achieve various applications of the upper layer, such as asset anti-theft monitoring, asset inventory application, asset management and storage management.
3.2 Introduction to RFID technology
RFID is the abbreviation of Radio Frequency Identification, which is a non-contact automatic identification technology. It automatically recognizes the target object and acquires relevant data through radio frequency signals. The identification work can work in various harsh environments without manual intervention. RFID technology can recognize high-speed moving objects and recognize multiple labels at the same time, which is quick and easy to operate. Short-range RF products are not afraid of harsh environments such as oil stains and dust pollution, and can replace barcodes in this environment; long-distance RF products can reach tens of meters or even hundreds of meters, which can be applied to logistics, asset management, anti-counterfeiting security. , identification, and more. Compared to barcode recognition technology, RFID has the following characteristics:
Identification work does not require manual intervention;
Supports both read-only mode and read-write mode of operation without the need for contact or precise aiming;
Free to work in a variety of harsh environments;
High level of data integration;
Because the technology is difficult to be counterfeited and invaded, RFID has a very high security protection capability.
3.3 RFID product classification
There are three main categories of products derived from RFID technology: passive RFID products, pure active RFID products, and semi-active RFID products.
Passive RFID products are the earliest developed products, and they are also the most mature products in the market. For example, bus cards, canteen meal cards, bank cards, hotel access cards, second-generation ID cards, etc., which are everywhere in our daily life, belong to the close-contact type. The main working frequency of its products are low frequency 125KHZ, high frequency 13.56MHZ, ultra high frequency 433MHZ, ultra high frequency 915MHZ.
Pure active RFID products, that is, active RFID products, have been slowly developed in recent years, and have the characteristics of long-distance automatic identification, belonging to the long-distance automatic identification class. In the field of remote automatic identification, such as smart prisons, smart hospitals, smart parking lots, intelligent transportation, smart cities, smart earth and Internet of Things, there are major applications. Its main working frequencies are UHF 433MHZ, microwave 2.4GHZ and 5.8GHZ.
The semi-active RFID product is a product between active RFID and passive RFID. Under the trigger of low frequency 125KHZ frequency, the product gives the advantage of microwave 2.4G, that is, using low frequency 125KHz to achieve close proximity precise positioning, microwave 2.5G implementation Identify and upload data from a distance. This product combines the advantages of active RFID and passive RFID, and has great advantages in the fields of access control, precise positioning of personnel and assets, perimeter management, electronic fence and security alarm.
4 system function
4.1 Asset anti-theft monitoring
The asset monitoring and management function is to use the integrated photo card, lanyard card, magnetic resistance card and other types of asset cards to alert the abnormal conditions of the assets according to the preset alarm rules, set by the alarm rules, abnormal situation monitoring and The alarm reminder consists of three parts.
Alarm rule setting
The asset administrator can preset various management rules (including asset status anomaly, time-sharing/partition/minute status arming rules, personnel authorization rules, etc.) and alarm methods corresponding to various abnormal situations (including mobile phone text messages, web pages). Reminders, video linkages, etc., as well as alarm cancellation rules (including time-limited release, release of personnel to the scene, system operation, etc.).
Partition Arming: Individually designated areas can be individually armed for easy maintenance and maintenance.
Time-sharing arming: The arming time can be set in advance to facilitate an orderly management system.
Split state arming: It can set the specific state of the specified object to realize flexible and practical monitoring and arming mode. For example, for asset A, no vibration monitoring is required, and asset B only needs to be tilt monitored, and asset C only needs to be monitored.
Abnormal situation monitoring
Through the integrated type of asset card such as photosensitive card, lanyard card, and magnetic resistance card, the system can make an emergency alarm to the abnormal situation of the asset according to the preset alarm rules. Once the following abnormal conditions occur in the asset, the system will automatically alarm:
Real-time location monitoring
Through the control of each base station and locator in the area, information such as the location and distribution of the assets of an attached asset card inside and outside the room can be known in time, and the historical location information is recorded.
Real-time positioning: The administrator can query the real-time location of the specified asset in real time and mark it on the system electronic map.
Distributed query: You can query the distribution of assets in each depository in real time, and view the detailed asset information of a certain distribution.
Track record: It can play back the query of the historical movement track of the asset and the historical data report.
Match alarm reminder
The system matches the preset alarm rules according to the actual situation, filters the abnormal situation, and starts the alarm reminder.
Webpage reminder: the system pops up the alarm box in real time, locates the alarm source location on the map, displays the alarm details, etc.
Start live sound and light alarm;
Video linkage: automatically call the monitoring screen near the alarm source and start live video recording;
The alarm details are sent to the relevant personnel in real time according to the preset alarm rules.
4.2 Asset Inventory Management
Through the system configuration of the signal transceiver and handheld data acquisition terminal, the administrator can perform periodic cargo inventory work according to the conventional requirements, so as to grasp the current status of the inventory goods in time. Generate a variety of different inventory results reports, such as: disk surplus, disk loss, inventory, location report, and so on.
The system automatically binds the assets of the active tag through the base station that can be deployed through the area. For the assets that are bound to the passive tag, the administrator can use the handheld data collection terminal to perform the inventory. At the same time, the administrator can directly generate the count statistics by using the import function of the count data.
4.3 Outbound Management
By installing a signal transceiver at the entrance and exit of the asset storage location, when the asset that has been issued the electronic label passes through the entrance and exit, the system automatically generates the asset outbound and inbound records in the database and generates the corresponding inbound and outbound order; the operator can also manually Increase asset inbound and outbound information. The system can also automatically modify the inbound and outbound status of the corresponding asset and the inventory information according to the information collected by the signal transceiver and the inbound and outbound information entered by the administrator.
4.4 Asset Information Management
Asset information management: The system provides batch import and export of asset information data, and can generate various report statistics, which is beneficial to system center query and statistics.
Asset identification card issuance: The asset and asset inventory information is entered in the system in advance, and the information of the active card or the passive RFID card is read and associated with the actual asset information. You can paste it on the corresponding asset to realize asset card issuance.
Asset information inquiry: The asset identification card can be read by the handset or the signal transceiver, and the asset information, such as asset number, type, storage location, etc., can be displayed, and the asset number, type, name, etc. can also be entered in the system for inquiry.
Asset application approval: Provide application, approval and record of asset borrowing, requisition, loss, repair, and outbound, and export, print, and statistical analysis of application records.
Asset inspection management: According to the asset inspection requirements, remind the asset inspection cycle, and support the development of inspection plans and inspection results records.
4.5 Other application functions
4.5.1 Report Statistics
It can perform statistical analysis of the chart data with the data recorded by the system, including asset information, as well as inventory, storage and storage, and support data export and printing. Help users to fully understand the management and operation of each work, assist users in their daily work, and improve work efficiency.
4.5.2 Alarm Reminder and Processing
When the system monitors abnormal conditions, it provides various alarm reminding methods and processing functions.
Webpage Reminder: The alarm window pops up in real time and the webpage alarm sound is turned on. The alarm window displays the time, type and details of the alarm.
Video linkage: The monitoring video near the alarm source pops up in real time, and the alarm details are displayed.
Sound and light alarm: When abnormal conditions are monitored, the sound and light alarms are activated in real time to make sound and light alarm notifications.
SMS reminder: Send alarm details to relevant personnel in real time, such as automatically sending asset exception information to the asset manager.
Alarm processing: Provide alarm source position positioning, alarm detail view, and alarm processing record to stop alarm.
4.5.3 System Maintenance
Basic data management refers to the management of the basic data used, including the recording of all the basic information and materials such as personnel or assets that need to be entered into the system, to achieve information management for personnel, assets, identification cards, buildings, base stations, locators and cameras. .
Set all the basic settings in the system, such as organization, user, role, map, alarm parameters, etc. By setting these basic settings data, you can ensure the realization of other functions of the system.
Provide multi-level access control, flexibly distinguish between functional rights and data permissions of users of different roles, perform different operations separately, and dynamically record system running logs.
The system products are divided into trial version and official version. Users can give authorization to activate products by importing files, entering verification codes or remote verification. The trial version of the product can use the various functions of the system, but there are restrictions on the number of users, the number of identification cards, the number of uses and the duration of use.
4.5.4 In-site mail
The mail in the station provides the system user with the function of writing and receiving the mail. The mail function can send the mail file and the attached information to the relevant personnel of the system to facilitate the communication of the system users.
4.6 Extended application
Vehicle intelligent monitoring
It is equipped with special vehicle intelligent monitoring equipment, loading and unloading cargo binding identification card, realizing vehicle position and tracking, vehicle real-time video monitoring, vehicle identification and intelligent management, real-time monitoring of driving conditions, etc. Azimuth vehicle supervision function, and a one-button call for help in the car.
Vehicle monitoring host
Description: The vehicle monitoring host is an in-vehicle terminal main device integrated with active RFID, 3G video and GPS, WCDMA 3G, installed on the vehicle, which can effectively prevent earthquakes, adapt to wide power supply and poor indoor environment.
Remote power supply
Through the access to the power supply, the user can remotely control the power switch through the network to operate the power switch of the device through the network anywhere.
Remote power controller
Classified data management
The special U disk can only be used in the preset authorized area, which can effectively protect the confidential data of test papers, financial documents, etc. At the same time, the system can also locate and track the special U disk.
Confidential data authorized device for special U disk