source:Industry News Popular:rfid fpc tag release time:2021-11-05 14:56:30 Article author:sznbone
RFID controlled area personnel management system
RFID controlled area management system background
In places like the military, prisons, etc., due to concerns about the access rights of relevant personnel and their own management system, access and other behaviors are strictly controlled. Without the approval of a specific leader, soldiers are resolutely not allowed to enter and exit. At present, personnel management in strictly controlled areas is achieved by signing and approving authority. The process and time are relatively cumbersome, and the personnel positioning in the controlled area can no longer be achieved. The personnel are determined to be in the area, but how do you know the area location of the personnel without communication tools? Passive systems cannot be achieved. In the area, if you want to enter a house that requires permission to enter, if there are more people with access permission, the traditional method is to equip the key or use the employee card, but there are more people, the number of keys is too large. Moreover, keys and ordinary cards are easy to lose, and if you want to check who has entered, you can't know.
In response to the above problems and management abuses, using its own technology and relying on an excellent development team, the following RFID controlled area management personnel system has been developed.
RFID controlled area personnel management system advantages
The system has the following advantages:
1. Accurate regional positioning
The system can realize area positioning, and in a controlled area, personnel can be positioned within an area. Since there are readers in the area everywhere, each area is within the signal range of the fixed reader, so all the electronic tags in the area can be covered by the information of the reader, so as to achieve regional positioning;
2. Strict access control
A fixed card reader is installed at the gate of the area. Personnel want to leave the area, and the guard can only let him out after receiving the approval of two specific leaders. Otherwise, personnel are prohibited from leaving the area. When the person goes out, the reader will record the time when the person goes out, and record and notify the time when the person returns. If within the specified return time, the card reader does not read the return information of the person, the system will alarm the guard and related personnel.
3, floor access control
In the area, not everyone can enter all floors. We have installed a fixed card reader with a specific function at the door of each floor. The card reader shields the electronic tag signal near that floor. Only when the electronic tag is close to the card reader (the proximity distance can be set by yourself, generally 0.5m-1m), the card reader can read the tag. In this way, the label is read and the access permission is judged. If you have permission to enter, the door will automatically open, saving the trouble of the key;
4. Judgment of persons approaching the gate
The system can judge the people close to the gate. When a person approaches the card reader at the door, the reader can send the read tag information to the system host computer at the doorman, and the system host computer can quickly retrieve the basic information of the person from the system database and display it on the host On the plane, such as name, department, photo, etc., so that the guard can better judge the person approaching;
5. Floor access judgment
For some floors with relatively high confidentiality, not only the personnel entering and exiting must be strictly monitored, but the judgment of entering and exiting is also necessary. The previous system was equipped with two doors, one in and one out. The system we set up can judge the entry and exit of personnel with a single door. Install two card readers A and B before and after the doorway, one after the other, first pass A and then pass B to judge as entering, on the contrary, pass B and then pass A to judge as out.
6, monitoring integration
The system can be integrated with the monitoring system of the area. After the area is located, the monitoring screen of a certain monitor in the area can be viewed;
7, PDA leader inspection
The system is equipped with a handheld PDA in case the leader wants to check the situation of the personnel in a certain area.
Introduction to the RFID Controlled Area Personnel Management System
System Overview
Every person in the area is issued an active tag, and the relevant information of the person is recorded on the tag, such as the person’s name, gender, date of birth, department, level, image, access history records, return records, access permissions, etc.; in the area A fixed card reader is placed at the gate to monitor the entry and exit of personnel. When someone approaches the gate, the card reader will give an alarm first to remind the guard to pay attention. Then the card reader recognizes the tag and transmits the data to the upper computer of the terminal in the guard room, and the upper computer will display the specific information of the person, such as name and picture. If necessary, the relevant data can be sent to the general control center; a certain number of fixed card readers are installed in the area to realize the regional positioning of personnel. The number of card readers installed is based on the on-site measurement area. The readers (each card reader has a certain recognition range and can only identify the surrounding area) as shown in the figure; two fixed card readers are placed at the gate of each floor to determine Access and entry authority. If the person has access rights, the card reader sends the tag data to the system center, and the system center controls the access control system and opens the door, so that no one keyless judges the person's access and permissions.
System function realization
Access floor management
Two fixed readers (set as A and B) are installed at the door of each floor, one after the other, used to judge the entry and exit of people, the reader will shield the electronic tag signal near the floor, and only go to the door of the floor The tag can be read by the card reader; if A reads the tag first, then B reads it, it is judged to be in, otherwise it is out; when the card reader reads the tag data, the data is transmitted to the system center of the control end, The system software side judges whether the person has the permission to enter the floor (the label records each person’s permission to enter each floor); if the system judges that the person has the permission to enter the floor, the system side controls the access control system and punches the door; otherwise, it does not Open the door
Access area management
When using an electronic tag card to enter and exit the area, personnel must have their own tag card. A fixed card reader is installed at the door, and a system-side host computer is installed in the guard room. When the person holding the electronic tag card approaches the door, the fixed card reader will sound an alarm to remind the door guard that someone is approaching. The card reader at the door reads the tag data, and the card reader sends the data to the system-side host computer. The system automatically calls the person’s data in the database, such as the person’s name, photo, etc., and checks whether the person has relevant leadership Approved. If approved, the upper computer will display the status of the approved leader, and when the personnel will return, start timing from this moment. When the personnel does not return within the specified return time, the upper computer of the system will issue an alarm to remind the relevant personnel to pay attention. If necessary, the data from the host computer of the guard system can be transmitted to the host computer of the control center in a wireless or wired manner;
Regional positioning management
The realization of area positioning requires that the tags of the personnel and the various positions in the area are within the signal coverage of the card reader to ensure that each tag in the area can be read by the card reader. The signal range of the card reader is within a few tens of meters in the area of the card reader. In the area, the card reader is arranged according to the signal distribution. The card reader transmits the label data in the read area to the upper computer of the control center, and the upper computer can count the number of people in each area and display the specific situation of the personnel in each area.
RFID controlled area personnel management system system software function
1. Inquire about the number and specific situation of each person in each area;
2. Realize personnel regional positioning;
3. Different personnel access rights on different floors;
4. Control the access control system of each floor;
5. Determine the basic information of the personnel close to the guard;
6. Control the entry and exit area of personnel;
7. Leaders can use the PDA software system to inquire about relevant situations at any time;
8. System end and monitoring system integration.
RFID controlled area personnel management system hardware system
The hardware of the system consists of active tags, fixed card readers, PDAs, etc.
Read recommendations:
M04 ISO11784/5 Animal Microchip Implant
M03 ICAR Certifiicated Injected Under Skin Microchip
M02- Pet Microchip with Needle Pack
Introduction to the working principle of RFID.dog microchip maker
What are the advantages of UHF RFID electronic tags? Mainly in three aspects!Pet Tag Sale
Popular recommended products
ACM1252U-Z2 Small NFC Reader Module
2020-08-02Vehicle Tracking Tamper Proof RFID windshield sticker
2020-07-27RFID Waste Bin Worm Tag
2020-07-27ISO18000-6C Rubber UHF RFID Tire Patch Tag
2020-07-27Long Reading Range Metal Wire RFID Seal Tag for Gas Cylinder
2020-07-27Disposable RFID Seal Tag for Container Tracking
2020-07-27UHF 860-960Mhz Seal RFID Tag for Assets tracking management
2020-07-27Metal RFID Screw Tag for Machine Tracking
2020-07-27RFID/ NFC PCB Tag for second packaging
2020-07-27RFID Chicken Foot Ring Tag
2020-07-26M05- Animal Pet Microchip with Syringe
2020-07-25M04 ISO11784/5 Animal Microchip Implant
2020-07-25M03 ICAR Certifiicated Injected Under Skin Microchip
2020-07-25M02- Pet Microchip with Needle Pack
2020-07-25Woven Event RFID Wristband for Access control/ Payment
2020-07-25HF/UHF Stretchy RFID Wristband
2020-07-25S12 Dual Chip RFID Wristband
2020-07-25S11 Silicone RFID Wristband for Swimming Pool
2020-07-25S10 Access Control RFID Slap Wristband
2020-07-25s09 Adjustable RFID Wristband with Metal Clasp
2020-07-25Related Products
Related Information
RF Technology
2022-12-06NFC function of Huawei mobile phone
2022-11-28Function and purpose of mobile phone nfc
2022-11-21What are the mobile phones of nfc
2022-11-14NFC principle and characteristics
2022-11-07Application of RFID technology in intelligent transportation
2022-10-24Current situation and opportunities of RFID utilization
2022-10-24The advantages and applications of RFID UHF electronic tag
2022-10-17Common functions of RFID handhelds
2022-10-17Features and uses of flexible RFID labels
2022-10-10RFID medical waste management
2022-10-10Industrial RFID empowers the site identification of AGV trolleys
2022-10-10The RFID system is introduced by the reader
2022-10-10RFID simple Workflow
2022-10-08What technology is rfid?
2022-09-30What technology is rfid?
2022-09-23The hardware composition of the RFID system will give you a clear understanding
2022-09-22The composition and main functions of RFID reader
2022-09-21Middle and long distance running RFID timing lap system
2022-09-20What is RFID electronic tag
2022-09-19