RFID access control system quickly identifies vehicle management

01. Social background

With the continuous improvement of living standards, cars began to enter the family in large numbers. With the rapid increase in the number of vehicles in Chinese cities, vehicle management has become a problem. The core issue of effective management of vehicles is how to identify vehicles. This article introduces an access control management system based on radio frequency identification technology. The application of RFID technology to access control management can effectively realize the rapid and reliable identification of vehicles and make RFID access control management in security efficient and intelligent.

Insert picture description here

RFID access control management system, RFID channel access control, RFID logistics warehousing

** RFID access control system management ** The application of radio frequency identification technology can realize that vehicles with effective electronic tags do not stop, which is convenient and time-saving, and improves the efficiency of intersections; more importantly, vehicles can enter and exit the community or parking lot. Real-time monitoring can accurately verify the identity of the vehicle and the owner of the vehicle, maintain regional public order, and make the security management of the community or parking lot more humanized, informatized, intelligent and efficient.

Based on the characteristics of radio frequency identification technology, the application model of radio frequency identification technology in the access control system is proposed, and the realization of software and hardware is emphasized. The system has the advantages of high recognition accuracy, strong anti-interference ability, and reliable communication.

Radio Frequency Identification (RFID, Radio Frequency Identification) technology is the specific application and development of automatic identification technology in radio technology. Its basic principle is to use radio frequency for non-contact two-way communication to achieve the purpose of identification and data exchange. So it can achieve many Target recognition, moving target recognition and remote real-time monitoring and management. The communication distance can be from a few centimeters to tens of meters. Its main advantage is that it has strong environmental adaptability and is less affected by rain, snow, hail, dust, etc. It can work around the clock, complete automatic identification, tracking and management without contact, and can Penetrate non-metallic objects for identification, strong anti-interference ability.

As a leading RFID brand, Fuwit, Shenzhen Quanshunhong Technology Co., Ltd., while providing all major operators and integrators with a full range of ThingMagic products, has always adhered to the business model of "equipment + solution + service". Recognition technology is the core, the overall application solution of the Internet of things as the guide, the application of technical services, the effective integration of technology and application, the creation and realization of application value is the purpose, to provide a mature, stable, professional and detailed package for the Internet of Things industry And value-added services. At the same time, relying on the advantages of brand and technology, combined with rich experience in technical services in the Internet of Things industry, in the field of smart warehousing and logistics, file informatization, smart new retail, smart manufacturing, smart washing, asset management, etc., from product selection , To the program design and system platform support, to provide users with easy-to-operate, highly stable, differentiated and innovative comprehensive technical services.

02. System software design

The software system mainly includes two parts: signal processing and system management of the reader. The signal processing module software is developed using C language, the system management software uses Visual C++ (VC) programming, and the database uses Microsoft SQL Server 2000.

2.1 System workflow

The RFID access control system is initialized first, and the reader sends an interrogation signal at a certain time interval, which is transmitted by the radio frequency interface module. When the electronic tag enters the microwave inquiry signal coverage area of ​​the reader, the electronic tag (transponder) receives the inquiry signal and sends its own information back to the reader. After the reader signal processing module receives the serial number, the vehicle Recognition. Firstly, anti-collision processing is performed to establish a communication channel, then the data information is decoded, and the information is sent to the database for verification after decoding. If the verification is correct, send a signal to the control system; if there is an error, provide an audible and visual alarm. In this process, if the management system does not send an end command, it will end a recognition process and start the next cycle.

2.2 Management software design

The system runs on a PC machine. The application program on the PC collects serial port data and verifies the received data according to the communication protocol. If the verification is wrong, the "signal processing module" is required to resend the data; if the verification is correct, the license plate number in the vehicle tag information is extracted and compared with the vehicle information in the database. If the extracted license plate number exists in the database, the information is sent to the "control system", and the control system is responsible for the operation of the gate (access control) system, and the basic information of the currently passing vehicle is displayed on the application program interface; if the extracted license plate If the number does not exist in the database, the manager will be notified of the alarm.

The database is the core part of the system, mainly set up three basic forms to store information. The tables and fields are defined as: Vehicle and owner's basic information table: owner's name, owner's ID card, owner's unit, card ID number, license plate number, model, car brand, body color, etc.; vehicle traffic record table (temporal and spatial information): Vehicle card ID number, passing date and time, number of passes, etc.; system operation record table: fault code, fault time.

03. System function

3.1 Long-distance recognition

Since the recognition distance is up to 10m and the system’s signal penetration capability is strong, the owner’s vehicle holding the card can enter and exit at a faster speed, without the driver having to stop, roll down the window, or extend his arm to approach the card reader. Greatly improve traffic efficiency. The administrator provides a temporary ID card for temporary vehicle entry and exit.

3.2 Dual card confirmation

This system implements that the driver carries a card, which can be used for entrance and exit. One card is installed in the car, and the system recognizes the signals of the two cards at the same time before granting release, achieving the dual insurance function.

3.3 The system automatically records the time and place of passage

When the card holder enters and exits, the computer will automatically record the pass record, and the record cannot be deleted, which is convenient for querying, statistics and various report generation of vehicles and personnel entering and leaving the community, thereby eliminating errors, forgery and cheating.

3.4 Automatic billing for temporary vehicles

After reading the card, the temporary vehicle will automatically calculate the fee according to the admission time and charging standards. The administrator will provide a free parking card for special vehicles. The free parking card has special settings and cannot be faked.

The RFID access control system uses radio frequency identification technology, which can realize that vehicles with effective electronic tags do not stop, which is convenient and time-saving, and improves the efficiency of intersections; more importantly, it can monitor the vehicle entry and exit of the community or parking lot in real time, accurately Verify the identity of people, vehicles and vehicle owners, maintain regional public security, and make the security management of the community or parking lot more humane, informatized, intelligent, and efficient.

04. System hardware configuration

The radio frequency access control system is composed of six parts: vehicle electronic tags, car sensing coils, radio frequency interfaces, signal processing, control systems and management systems.

4.1 Electronic label

Electronic tags are usually called transponders. It stores the basic information of the vehicle and the owner, and is installed on the vehicle as a passive tag. When the electronic tag enters the microwave query signal coverage area of ​​the reader, the energy obtained by the electronic tag through the induced current sends the information stored in the chip to the reader, and the effective reading distance is 6-10m.

4.2 Reader

The reader includes two modules: radio frequency interface and signal processing. The radio frequency interface is mainly responsible for signal transmission and reception. It receives the command signal from the signal processing and control system, converts the command signal into a microwave signal and sends it out; at the same time, it also receives the microwave reflection signal from the electronic tag, and converts the microwave reflection signal into a digital signal to the signal processing module for decoding deal with.

The signal processing module is mainly responsible for processing command signals and electronic tag data signals. It receives the instruction signal from the management system, encodes the instruction signal and sends it to the radio frequency interface, which is converted into a microwave signal and sent out; at the same time, it also receives the electronic tag data signal from the radio frequency interface, and decodes the electronic tag data signal Send it to the management system.

RFID integrated machine, RFID integrated reader

RFID integrated machine, RFID integrated reader

FU-Astra-M9 is an
RFID integrated reader/writer with Linux operating system integrated with ThingMagic’s excellent M6e-Micro module as the core .
It adopts ABS shell,
built-in 9dbi circular polarization antenna
, and provides power interface with IP67 protection level. It communicates with WIFI or TCP/IP or serial port, and supports an external antenna. The installation is simple and convenient, and it is suitable for all-weather high and low temperature harsh working environment.

It is widely used in smart storage and logistics, smart manufacturing, smart new retail, smart medical and other industry segments.

4.3 Access Control System

The control system is mainly responsible for the communication control of the gate (access control system) mechanism. It receives command signals from the management system, controls the gate mechanism, and feeds back the gate status to the management system. That is, if the data read from the electronic tag is analyzed by the management system as a legal passer, it will signal to the control system to open the gate and let it go.

RFID channel access control, RFID access control system, RFID security door

RFID channel access control, RFID access control system, RFID security door

FU-TD04 UHF RFID access control system supports EPC C1 G2 (ISO18000-6C) protocol, supports server mode to realize multi-channel control function, integrates high-gain antenna group, high-speed reader and control module based on ThingMagic, and has high-speed Read label performance and good read and write area control ability, provide standard RS232 or RJ45 interface, easy to connect to the software platform.

The product is especially suitable for applications in various sub-fields such as logistics and storage, book files, and personnel attendance management.

4.4 Car sensor coil

The car sensing coil uses the PBD232 ground sensing loop type detector. The detector is a vehicle detector based on the principle of electromagnetic induction. Its sensor is a toroidal coil (generally 2m×1.5m) buried under the road and passing a certain working current. When the vehicle passes through the loop buried coil or stops on the elbow of the loop buried coil, the vehicle's own iron cuts the magnetic flux lines, causing the change of the inductance of the coil loop. The detector can detect the existence of the vehicle by detecting the change of inductance. The response time of the detector is 100ms, and its various performance characteristics can ensure that the system can accurately and quickly detect the arrival of the vehicle, and output signals to the computer through the digital I/O card to start the reader.

4.5 Management System

The management system is mainly responsible for processing user information electronic label data and control system information. It controls and manages the system according to user instructions, receives data from the signal processing module and control system, and sends the command signal to the signal processing module and control system. At the same time, the management system can communicate with the security center through the network.

This article was published by Shenzhen Quan Shunhong Technology. Reprinting of this article requires the author's consent, and please attach the source and link to this page.
Original link: https://www.fuwit.com.cn/Manufacture_Application_rfidmjglxt.html.

Guess you like

Origin blog.csdn.net/RFIDqsh/article/details/108336861