RFID NEWS

RFID personnel and confidential carrier management system

◆Project Introduction


The new "Law of the People's Republic of China on Safeguarding State Secrets" came into effect on October 1, 2010. It is important for doing a good job in keeping secrets under the new situation, safeguarding national security and interests, and ensuring the smooth progress of reform, opening up, and socialist construction. And profound meaning. The use of RFID technology to achieve comprehensive management of open personnel and mobile confidential carriers is very suitable for the management needs of the military, government, scientific research institutes, etc. with high confidentiality requirements. For the information management of important information carriers or media targets (such as laptops, portable devices, confidential documents, etc.) and their users (that is, people who contact, use, and keep mobile confidential carriers), the goals and management, process and The behaviors are organically combined to realize the full life cycle management of all labeling mobile confidential carriers.


◆Key processes


Labeling: All mobile confidential carriers are labeled. Laptops and mobile hard drives use anti-metal labels, documents and Files use paper file labels, and personnel use standard card labels.


Registration: Register all mobile confidential carriers, personnel and other information, and use globally unique RFID tags for identification.


Borrowing: Record the borrowing and return information of mobile confidential media, such as the responsible person, borrowing period, approval status, etc.


Monitoring: deploy automatic identification channels at key entrances and exits, fully automatically monitor and record information on the entry and exit of confidential carriers at all times, and sound and light alarms when illegal entry or exit.


◆Implementation benefits


1. Establish personnel, visitor and other information files, including certificates, department information, etc., to achieve unified personnel and information management.


2. Strictly register confidential media such as laptops, mobile hard disks and paper documents, such as: enter the media type, responsible person, confidentiality level, registration code and other information to achieve standardized registration management.


3. All confidential carriers are included in the scope of Access Control management, and the scope of use is standardized to achieve "full range" coverage of management and control without leaving any dead ends.


4. Strictly follow the approval procedures for out-of-town borrowing. When confidential carriers are taken out of the office area, the responsible person must go through the approval procedures and electronic borrowing registration procedures to achieve traceability management.


5. Full-time and fully automatic monitoring and management can realize that when all registered mobile confidential carriers enter the access control channel, the monitoring and management system can perform full-time and fully automatic identification and record the entry and exit information of the confidential carriers. When unapproved carriers enter or exit, an audible and visual alarm will sound, and illegal carriers carrying confidential carriers out of the office can be checked and corrected.


6. Full-process management of out-of-town borrowing, so that when the confidential mobile carriers borrowed out exceed the approved time limit, an automatic alarm will be issued so that security department personnel can organize timely inspection or recovery to prevent the loss of control of confidential mobile carriers.


◆Device configuration


Reading and writing equipment: RFID desktop card issuance equipment, RFID automatic identification channel.


Electronic tags: anti-metal tags, file tags, personnel tags.


CATEGORIES

CONTACT US

Contact: Adam

Phone: +86 18205991243

E-mail: sale1@rfid-life.com

Add: No.987,Innovation Park,Huli District,Xiamen,China

Scan the qr codeclose
the qr code