With the advent of the information age, there are many types of information carriers, and the information security situation is becoming increasingly severe. Especially in the military, government agencies, scientific research institutes, enterprises and institutions and other departments, there are a large number of information carriers involving national security, government security, and commercial security. and important Assets, traditional confidentiality management methods can no longer fully meet the needs of the information age.
The 21st century is an era of informationization. Information carriers such as laptops and mobile hard disks have entered widespread use. No matter in the commercial field, military or political fields, leaks occur from time to time, bringing major consequences to relevant countries and enterprises. Loss, in order to ensure and facilitate the control of confidential assets when going out, Shanghai Hongjian Information Technology Co., Ltd. has launched an active or semi-active RFID real-time monitoring and management solution for confidential assets, which can monitor the status of confidential assets in real time within seconds. status and has been successfully applied in many military and civilian fields.
The system integrates long-distance radio frequency identification technology, short-distance radio frequency technology and multi-user anti-conflict technology monitoring technology, tags, locators, readers and writers, communication gateways, etc. It is designed using new embedded microprocessors and embedded software. The system signal has strong penetrating power, no electromagnetic pollution to the human body, and strong environmental adaptability. It can locate multiple tags at the same time and realize wireless alarm. Currently, this brand-new information identification, access, transmission, and management technology has rapidly gained popularity at home and abroad. Widely recognized by peers.
The real-time positioning monitoring and Access Control management system uses RFID (electronic tags) as the most advanced identification code at present. It has the characteristics of unbreakable, reliable data, long service life, and long effective communication distance. It is an alternative to barcodes, The best choice for infrared marking. Install it on the controlled target to use it as a unique identification of the target for monitoring, positioning and access control management.
1. Monitoring the management status of confidential assets
(1) On-site monitoring function
The system has the function of real-time supervision of the status information, location information, and usage status of confidential assets within the monitoring scope.
(2) Abnormal status alarm function
Tag removal alarm: When the tag recording confidential asset information is forcibly removed from the confidential carrier or the tag fails and the confidential assets are out of control, the system will raise an alarm through sound and light, SMS and other alarm methods.
Cross-border alarm: When confidential assets are used or moved to an illegal area set by the system without authorization, the system will automatically activate alarm functions such as sound and light, call nearby cameras, and adopt established plans for emergency response.
2. Positioning tracking
Within the monitoring area, the system can locate and track confidential assets and personnel, view their location movements in real time and conduct precise trajectory tracking.
3. Confidential ASSET MANAGEMENT function
Information management function
Bind confidential asset information and electronic tags, establish a confidential asset information database, and realize information management of confidential assets;
Authorized use of functions
The system can set the authorization management function according to the user's confidentiality management system to meet user needs;
Confidential asset inspection function
Confidentiality staff use handheld devices to regularly inspect and count confidential assets in accordance with the confidential asset management system.
4. Video linkage function
When an abnormality occurs in confidential assets, the system can automatically perform video evidence collection in the monitoring area.
5. Equipment status monitoring
When the monitoring equipment is damaged or destroyed, the system will automatically raise equipment abnormality information and perform alarm processing.
Key deployment:
Carry out asset regional positioning in some key areas. Once the assets enter the area, regional positioning and alarm prompts will be realized. At the same time, combined with the video surveillance function, video linkage will be achieved.
Using low-frequency activator rod antenna, the activation area of each antenna is adjustable from 1m to 5m. When the asset enters the antenna wake-up area, the tag sends the tag ID and activation antenna address code ID in real time, and 2.4G long-distance reading and writing After being received by the receiver, it can be directly used as the data basis for asset area positioning, and alarm prompts and video linkage analysis can be performed at the same time.
Contact: Adam
Phone: +86 18205991243
E-mail: sale1@rfid-life.com
Add: No.987,Innovation Park,Huli District,Xiamen,China