Electronic ear Tag Dealer

News

RFID Asset Management Solutions,Chip Bracelet

source:optimization Popular:rfid fpc tag release time:2022-03-09 15:03:21 Article author:sznbone

  RFID Asset Management Solutions

  1. System Significance

  Fixed asset management is an important part of enterprise management. Fixed assets have the characteristics of large quantity, variety, high value, long service cycle and scattered use locations, which are difficult to manage. Many units still rely on manual bookkeeping management. Due to the large number of management documents and the heavy inventory work, it takes up a lot of manpower and material resources, and the historical operation of fixed assets and asset statistics are extremely difficult, resulting in asset loss and repeated asset purchases. In recent years, some fixed asset management software has appeared. Although the problem of manual bookkeeping has been solved to a large extent, most systems use manual data entry, which is not only slow and prone to errors, but also has assets in asset management. The serious problem of disconnection between physical objects and accounting information is difficult to meet the needs of modern enterprise management.

  In order to improve the supervision of fixed assets, combined with the actual situation of the enterprise, we have developed the "RFID asset management system", which is of great significance:

  1) Guarantee the safety of valuable materials, the stability of enterprise development and the protection of self-interest;

  2) Improve the modernization level of enterprise valuable asset management and reduce the work intensity of safety management;

  3) Anti-theft security management of assets to prevent loss or leakage;

  4) Real-time positioning, tracking, and automatic inventory of valuable assets, making the management of assets automatic and intelligent;

  5) Liberate manual labor, save management costs, and greatly improve the management level;

  The solution integrates high-tech long-distance radio frequency identification technology, short-distance radio frequency technology and multi-user anti-collision technology monitoring technology, tags, locators, readers, communication gateways, etc., using a new embedded microprocessor and Designed with embedded software, the system has strong signal penetration, no electromagnetic pollution to the human body, and strong environmental adaptability. Multiple tags can be located at the same time to realize wireless alarm. At present, this new information identification, access, transmission and management technology , has quickly been widely recognized by domestic and foreign counterparts.

  2. Overall system architecture

  APS real-time location tracking and access control management system uses RFID (electronic label) application, with electronic label as the most advanced identification code at present, with the characteristics of non-breakable, reliable data, long service cycle, long effective communication distance, etc., is an alternative to barcodes , the best choice for infrared identification. It is installed on the controlled target to be used as the unique identification of the target for tracking, positioning and access control management.

  2.1 Asset regional positioning:

  2.1.1 Architecture of Asset Regional Positioning System

  Asset Regional Positioning Architecture Diagram

  The asset area positioning system uses RFID technology to wear an active tag for each mobile asset, and install one (or more) long-distance reader/writer matching the active tag in the computer room, so that all fixed assets are located Within the recognition range of the reader, the reader will automatically identify the tag ID information carried by all fixed assets, and monitor the in-position status of all fixed assets in real time. If the asset is illegally taken out without permission, the system will send information to the monitoring center at any time and trigger an alarm. Only authorized legal fixed assets can be safely taken out, thus ensuring the safety of each fixed asset.

  2.1.3 Regional precise positioning:

  Carry out regional positioning of assets in some key areas. Once the assets enter the area, regional positioning will be realized and alarm prompts will be realized. At the same time, combined with the video monitoring function, video linkage will be realized. The low-frequency activator rod antenna is used, and the activation area of each antenna is adjustable from 1m to 5m. When the asset enters the antenna wake-up area, the tag sends the tag ID and the activated antenna address code ID in real time, and 2.4G long-distance reading and writing After the receiver receives it, it is directly used as the data basis for asset area positioning, and it can simultaneously perform alarm prompts and video linkage analysis.

  2.1.4 Regional fuzzy positioning:

  The measurement principle of the signal transmission attenuation model

  Regional fuzzy positioning adopts the method of measuring the link signal strength (RSSI) between nodes (readers, electronic tags), and uses the wireless signal space transmission attenuation model to estimate the transmission distance between nodes; the RSSI attenuation estimation formula of the space free transmission model As follows: Loss=32.44+10klgd+10klgf, where d is the node distance (unit is Km), f is the frequency, the unit is MHZ; k is the path attenuation factor (multipath diffraction, obstacles, etc.). When d is constant, the larger the value of k, the more serious the attenuation of the RSSI value.

  This solution can avoid the influence of complex environment on RFID signal transmission to a certain extent, and realize regional positioning by the number of recognition times by multiple readers and the additional gain when receiving. This technology can meet some needs of regional positioning to a certain extent, such as: monitoring the bank's cash box area, monitoring the location of special equipment in hospitals, and confidential assets.

  2.1.5 Area Positioning System Function

  1) The daily operation and management of assets mainly includes daily management work such as purchase and storage of assets, receipt and use of assets, asset addition, modification, transfer, borrowing, return, scrapping, maintenance, and depreciation. An asset photo can also be attached to each fixed asset for easy viewing of images of valuables. Among them, asset transfer, asset borrowing, asset maintenance, asset scrapping fully realize the electronic approval process;

  2) Fixed asset report, according to the unit, department, time and other conditions to query the monthly (annual) report of fixed assets classification statistics, this month's increase (decrease) fixed asset monthly report, fixed asset depreciation monthly report (annual report), and print the report;

  3) Real-time asset positioning, query, and printing of the current and within a certain period of time the number of controlled objects, the number of activities, and their distribution;

  4) Asset information collection, verification and inventory, the reader collects the asset active tag information in real time for inventory, checks the data uploaded by the reader with the data in the database, and appropriately handles abnormal data, such as inventory loss The assets are scrapped and withdrawn, etc. And can generate inventory surplus, inventory deficit list, inventory summary table by unit and department;

  5) When assets are brought into the restricted area, the background will automatically alarm, some areas are restricted areas (warning areas, dangerous goods source areas, etc.), if unauthorized assets are brought into the restricted area, the background system will automatically alarm and pop up a video window of the incident point;

  6) The asset area cross-border alarm, unauthorized out-of-position alarm, the fixed assets in a specific area cannot be taken out of the area without authorization, once the area is illegally left, the system will automatically alarm, and the asset information and location information will be automatically displayed;

  7) Asset theft prevention and loan extension alarm

  8) Permission control function: Divide users into different roles, and different roles can have different operation permissions. The fixed asset data can be controlled to read and write fields. Each branch can have its own authority system

  The whole system will try its best to maintain the user's existing network system and application system, and reserve the interface, which can be combined with the existing application system or future application system to realize the unified management function of multiple parties and reduce or avoid the repeated investment of users.

  2.2 Asset access control management system

  The asset access control management system is based on advanced radio frequency technology, wears an active tag to each mobile asset, and installs a ceiling-mounted positioning base station (elevator, gate) matching the asset tag at the elevator entrance (unit gate). , floor entrances and exits are installed with activated antennas, 2.4G signal coverage), when the asset tag is close to the ceiling-mounted positioning base station within a certain range, the ceiling-mounted positioning base station will automatically identify the entry and exit of the item, and automatically record the asset tag carried by the asset. ID number; if the asset is unauthorized, the system will automatically alarm to prevent the occurrence of secret-related events, so as to achieve strict control over the access of each fixed asset carrier, while ensuring the efficient and fast operation of the actual operation.

  2.2.1 Function of access control management system

  1) Prevent authorized assets from being illegally taken out of unauthorized areas. For example, when an asset is authorized to be used inside the building, and the borrower intentionally or unintentionally takes the asset out of the building (without secondary authorization), The ceiling-mounted positioning base station collects relevant information and transmits it to the background for comparison, and triggers the alarm device to give an alarm; only the fixed assets that have been authorized twice can be taken out of the building, and at the same time, the relevant information of the fixed assets (such as the borrower , borrowing date, delivery time, etc.) are automatically recorded in the database;

  2) Unit leaders or unit employees only need to carry electronic tags with them and pass through the access control to complete the attendance function (employee names, positions, working hours and other related information are automatically entered into the database), and can print weekly and monthly time periods according to actual needs. To prevent strangers from breaking into the office building in various names to ensure the safety of various valuable assets and administrative personnel; to register and issue temporary passes to visitors and foreign business personnel permitted by leaders.

  3) Real-time monitoring function, the system administrator can check the in and out status of assets in each door area in real time through the PC (with photos displayed at the same time), and the status of each door area (abnormal state alarm);

  4) Entry and exit record query function, the system can store all entry and exit records, status records, and can be queried according to different query conditions

  2.3 System Composition

  1. Asset Tag

  The electronic tag is a dual-frequency anti-theft electronic tag designed for the "asset intelligent management system", which is suitable for most asset applications.

  2. Reader

  2.4G microwave frequency band dual antenna reader, can identify 500 tags at the same time, provide SDK interface.

  3. Ceiling-mounted positioning base station

  It is used for the access management of access control, and can also be used for dynamic management of key areas, which can trigger alarms when approaching key areas.

  4. Communication Gateway

  Handle the data uploaded by the reader, and manage the reader in a unified manner.

  5. Asset management system software

  Used for asset authorization, inventory, search, location, addition and scrap, etc.;


Read recommendations:

M04 ISO11784/5 Animal Microchip Implant

M03 ICAR Certifiicated Injected Under Skin Microchip

M02- Pet Microchip with Needle Pack

RFID management and control scheme of property involved,RFID Tags

RFID material receiving and dispatching management system solution,RFID Seal

Previous : RFID mine personnel positioning and attendance management solutions,Chip Animal Glass Tag Next : Personnel access control entry and exit management area positioning,Chip Wristband

Popular recommended products

Related Products

Related Information

RFID applied to 4S store information management,UHF RFID Anti Metal Tag

2022-03-09

UHF RFID application construction site personnel management,Waterproof Bracelet

2022-03-09

RFID electronic prison industry application,UHF Cards RFID

2022-03-09

RFID detainee electronic wristband positioning management solution,Ticket Wristband

2022-03-09

BRT bus rapid transit management system based on active RFID technology,Tire RFID Tag

2022-03-09

Middle and long distance running RFID sports timing lap system,Waterproof RFID Tag

2022-03-09

RFID Dual Frequency Sports Timing Lap System,tamperproof rfid wristband

2022-03-09

Renwei Electronic Intelligent Vehicle RFID Management System,tamperproof rfid tag

2022-03-09

Electronic RFID long-distance barrier-free automatic induction access,Waterproof Wristband

2022-03-09

Prison RFID roll call system scheme,Wearable NFC Tags

2022-03-09

RFID hospital asset management solution,Wholesale RFID tag China

2022-03-09

Shengshi Longtu RFID system asset management solution,Waterproof Silicone RFID Wristband

2022-03-09

RFID Dual Frequency Sports Timing System,Rfid Apparel Tag

2022-03-09

Active RFID2.4G Electric Bicycle Intelligent Anti-theft Cloud Platform,RFID Bracelet Hf

2022-03-09

FMCG RFID anti-counterfeiting and traceability information management system,rfid ceramic tag

2022-03-09

Puwei warehouse RFID management system,Proximity Sticker

2022-03-09

Solution of Information System of Logistics Distribution Center Based on RFID Technology,UHF Tag

2022-03-08

RFID Bank Cash Box Circulation Electronic Identification System Solution,NFC Card

2022-03-08

RFID fixed asset management system,rfid pcb

2022-03-08

Analysis on the hidden dangers of RFID system and its related countermeasures,RFID Tag

2022-03-08

Creative, organized, responsible, enthusiastic

contact us