RFID community security application makes the community environment more harmonious!
RFID technology is becoming more and more mature, and its application fields are becoming more and more extensive. RFID technology is also widely used in the security system of the community. The RFID community security application implements monitoring and positioning of all personnel vehicles entering the community. Really combine the application of RFID technology with the security of the community. Realize the positioning and information processing of each vehicle entering the community to provide security for the community.
Radio frequency identification technology is a wireless communication technology that can identify specific targets and read and write related data through radio signals without establishing mechanical or optical contact between the identification system and the specific targets. The signal of the radio is to transmit the data from the label attached to the item through the electromagnetic field tuned to the radio frequency to automatically identify and track the item. Some tags can obtain energy from the electromagnetic field emitted by the recognizer during identification, and do not require batteries; some tags have power sources and can actively emit radio waves (electromagnetic fields tuned to radio frequencies). The label contains electronically stored information and can be identified within a few meters. Unlike the barcode, the radio frequency tag does not need to be in the line of sight of the identifier, but can also be embedded in the tracked object.
1. RFID composition and working principle
1. The system consists of three parts
(1) Tags: Tags are equivalent to bar code symbols in bar code technology and are used to store information that needs to be identified and transmitted.
(2) Reader: The complexity of the reader is significantly different depending on the type of tag supported and the function it completes. The basic function of the reader is to provide a way of data transmission with the tag. In addition, the reader also provides quite complex signal state control, parity error check and correction functions.
(3) Antenna: The antenna is a transmitting and receiving device that transmits data between the tag and the reader.
2. Working principle
RFID technology is a technology that uses radio frequency signals to achieve contactless information transmission through spatial coupling (alternating magnetic field or electromagnetic field) and achieve automatic identification through the transmitted information. The working principle is: the use of radio frequency signals and space coupling transmission characteristics to achieve automatic recognition of the identified objects. Working process: When the item with an electronic tag is within the readable range of the reader, the reader emits a magnetic field, the query signal will activate the tag, the tag requires a reflection signal according to the received query signal, and the reader receives After the signal reflected by the tag, the electronic data stored in the electronic tag is read and identified without contact through the decoding process of the internal circuit, so as to automatically identify the object. And then through the computer and computer network to realize the collection, processing and remote transmission of object identification information management functions.
2. The status of community security technology
At present, the main function of the community security system is security. In order to create a safe and comfortable living environment for the residents of the community, a high standard and intelligent security system is required. Most communities still use the patrol and duty of security personnel. This traditional method is inefficient and personnel The amount of labor is large, and unsafe factors are not well controlled. Even if some advanced communities adopt advanced intelligence and are equipped with relatively high-quality security personnel, these devices have the disadvantages of being expensive and easily damaged by humans. In short, the security effect is not obvious.
3. Structural design and working process
1. Structural design
Considering the diversity and complexity of the roads that may be traversed by various buildings and personnel in the community, several readers need to be installed, and they will exchange data with the computer of the monitoring center through the communication line. At the same time, an electronic label is placed on each vehicle of people entering the community to monitor and locate it.
In the working process of the RFID system, based on energy, data exchange is realized through a certain timing method. The reader provides working energy to the electronic tag. When the electronic tag enters the radio frequency identification field, the radio frequency wave emitted by the reader activates the tag circuit, interacts, and completes the data exchange. For simultaneous reading of multiple tags, a reader-first form or a tag-first form may be used.
In order to achieve multi-tag conflict-free simultaneous reading, the reader first issues an isolation command to a batch of tags, so that multiple electronic tags within the reader's reading range are isolated, and finally only one tag remains active and there is no conflict with the reader. Communication link. For the method of tag first sending, the tag randomly sends its own identification ID repeatedly, and different tags can be correctly read by the reader at different time periods to complete the simultaneous reading of multiple tags. For any electronic tag, it has a unique ID number. In most applications, it uses the back-end database to support the data attributes of the tag. The interface between the reader and the application system is represented by standard functions called by the development tools. The function generally includes the following aspects: the application system sends configuration commands and other instructions to the reader as needed; the reader returns its current configuration status and the execution results of various instructions to the application system.
2. Working process
Every personnel vehicle entering the community must wear a security identification card (including personnel card and vehicle card)-radio frequency identification tag when it passes through the gate of the community. Its chip contains a unique identification code and the user specified Information, they can be read in a non-contact manner by a reader within a certain distance. The dynamic monitoring system based on radio frequency identification technology can simultaneously perform non-contact, high-speed and accurate parallel tracking and identification of multiple target objects with radio frequency tags within a certain range, so as long as the radio frequency identification tags are placed on the personnel vehicles entering the community (Usually packaged in a card shape, so it is also called an RF card), when the personnel vehicle entering the community travels within the effective reading range of the reader, the system reader will automatically read the radio frequency held by the personnel vehicle Identify the ID number of the tag, and then the system will transfer the ID number of the tag and the related information of the personnel vehicle to the background system for processing.
Four. Feasibility analysis
After the previous introduction, it can be argued that the security problems that have troubled the community have been solved to a large extent, and the effective identification, monitoring, monitoring and positioning of the personnel and vehicles in and out of the community have been achieved, so that the security system of the community fully reflects the "humanity, information And high automation” to achieve the goal of a digital community. At the same time, the production cost of RFID ID cards is low and the investment is low. Therefore, the scheme of applying this technology in the community security system is feasible.
5. RFID technology in the community
Overall design in security system
1. Functional Design
The basic functions of RFID technology in personnel positioning management include:
①Identification: how many persons or vehicles are there at any one time or in a certain place, and who can be fully identified;
②Record: the activity track of all the personnel vehicles entering the community at any time in the community can be recorded in the database;
③Positioning: The community monitoring center can remotely monitor the personnel vehicles entering the community;
④Inquire about a series of information such as the arrival/departure time and total stay time of the relevant personnel vehicles at any place, you can urge and implement whether the important inspectors conduct the testing and processing of various data on time and at the point, and fundamentally eliminate the cause Related safety issues caused by negligence.
⑤Anti-cheating: The personnel vehicles entering the community will lose or discard their identity cards while driving, and the monitoring center can automatically recognize them.
2. Design plan
Install several readers in the various channels of the community and the channels that people may pass, and exchange them with the computer of the ground monitoring center through the communication line. At the same time, place an RFID electronic tag identification card on each personnel vehicle entering the community. When the personnel vehicle enters the community, as long as it passes or approaches any reader placed in the channel, the reader will sense the signal and upload it immediately. Go to the computer in the monitoring center, the computer can determine the specific information (such as: who, where, and the specific time), the manager can also click on any location in the community according to the distribution diagram on the big screen or the computer, The computer will count and display the personnel in this area.
3. The system is completed
The information processing system is the core of the entire community security system, consisting of the database system and the response application software system. The system can complete functions such as recording, querying, and processing related information on the travel path of personnel and vehicles. For example, it can query the travel path information of people and vehicles entering the community on March 15, 1313.
6. Prospect of RFID technology
Radio frequency identification technology has become a hot topic now, and the RFID technology market will become more and more extensive in the future. Along with this is the huge demand for servers, data storage systems, database programs, business management software, consulting services, and other computer infrastructures. Many high-tech companies are stepping up the development of RFID-specific software and hardware, and have invested heavily in the development of this technology and solution, so it can be said that RFID technology is becoming a hot new technology in the world.
Add：Xminnov IOT Industrial Park, No.943, Tonglong ErLu, Tong'an District, Xiamen, PRC 361100