Community Security System Application Based on RFID Technology

From the analysis of recent theft incidents in several communities, several common problems were found: the communication between the community security and the personnel entering the community was not timely; the efficiency of handling the accident after the incident was low, and the effect of obtaining evidence was poor. To this end, how to correctly handle and locate the information of personnel vehicles entering the community is crucial to improving the safety of the community. At present, the security system of the community cannot realize the monitoring and positioning of all the personnel vehicles entering the community. This paper is aimed at this problem and proposes to apply the RFID technology in the security system of the community, so as to realize the entry into each community. The personnel vehicles carry out positioning and information processing to provide security for the community. This paper mainly demonstrates the feasibility of RFID technology in the community security system from the perspective of "positioning".

Community Security System Application Based on RFID Technology

1 RFID composition and working principle

1.1 System composition is divided into three parts

(1) Label (Tas)

The tag is equivalent to a bar code symbol in the bar code technology and is used to store information that needs to be identified for transmission.

(2) Reader (Reader)

The complexity of the reader is significantly different depending on the type of tag supported and the function being completed. The basic function of the reader is to provide a way to transfer data with the tag. In addition, the reader provides fairly complex signal state control, parity error checking and correction functions.

(3) Antenna (Antenna)

The antenna is a transmitting and receiving device that transmits data between the tag and the reader.

1.2 Working principle

RFID technology is a technology that uses radio frequency signals to transmit contactless information through spatial coupling (alternating magnetic field or electromagnetic field) and automatically recognizes the transmitted information. The working principle is as follows: the radio frequency signal and the spatial coupling transmission characteristic are used to realize automatic recognition of the recognized object. Working process: When the item with the electronic tag is within the readable range of the reader, the reader sends a magnetic field, the inquiry signal will activate the tag, and the tag requests the reflected signal according to the received inquiry signal, and the reader receives the signal. After the signal reflected back by the tag, the electronic data stored in the electronic tag is read and recognized by the decoding process of the internal circuit without contact, thereby achieving the purpose of automatically recognizing the object. Then, through the computer and computer network, management functions such as collection, processing and remote transmission of object identification information are realized.

2 Status of community security technology

At present, the main function of the community security system is security. In order to create a safe and comfortable living environment for the residents of the community, it is necessary to have a high-standard and intelligent security system. Now most of the communities still use the patrol and duty mode of security personnel. This traditional method is inefficient and personnel. The amount of labor is large, and the factors of insecurity are not well controlled. Even if some advanced communities adopt advanced intelligence, they are equipped with high-quality security personnel, but these devices have the disadvantages of high price and easy man-made damage. In short, the security effect is not obvious.

3 Structural design and working process

3.1 Structural design

Considering the diversity and complexity of the sections through which buildings and people in the cell may pass, several readers need to be installed and exchanged with the computers of the monitoring center via communication lines. At the same time, an electronic tag is placed on each vehicle entering the community to monitor and locate it.

In the working process of the RFID system, data is always exchanged through a certain time series based on energy. The reader provides working energy to the electronic tag. When the electronic tag enters the RFID field, the RF wave emitted by the reader activates the tag circuit, interacts, and completes the exchange of data. For multi-tag simultaneous reading, you can use the form of the reader first, or the form of the label first. In order to realize multi-tag conflict-free simultaneous reading, the reader first issues an isolation command to a batch of tags, so that multiple electronic tags in the reading range of the reader are isolated, and finally only one tag is kept active and the reader is established without conflict. Communication link. For the label first-issue method, the label randomly sends its own identification lID repeatedly. Different labels can be correctly read by the reader in different time periods, and the multi-tag is read at the same time. For any electronic tag, it has a unique ID number. In most applications, the data attribute of the tag is supported by using a back-end database. The interface between the reader and the application system is represented by standard functions called by the development tool. The function roughly includes the following aspects: the application system issues configuration commands and other instructions to the reader as needed; the reader returns its current configuration state and execution results of various instructions to the application system.

3.2 Working process

Each personnel vehicle entering the community must wear a security-issued identity card (including the personnel card and the vehicle card) when passing through the community gate. The RFID tag contains a unique identification code and the user-specified designation. Information, which can be read by the reader (Reader) in a non-contact manner within a certain distance. The dynamic monitoring system based on radio frequency identification technology can perform non-contact, high-speed and accurate parallel tracking and identification of multiple target objects with radio frequency tags in a certain range at the same time, so as long as radio frequency identification tags are placed on the personnel vehicles entering the community (usually packaged as a card, so also known as a radio frequency card), when the personnel entering the cell travels within the effective reading range of the placed reader, the reader of the system will automatically read the radio frequency held by the personnel vehicle. The ID number of the tag is identified, and then the system will transfer the lD number of the tag and related information of the personnel vehicle to the background system for processing.

4 Feasibility analysis

After the introduction, it can be argued that the security problem that plagues the community has been solved to a large extent, and the vehicle personnel in and out of the community have been effectively identified, monitored, monitored and positioned, so that the security system of the community fully reflects the humanization and information. And highly automated, to achieve the goal of the digital community, at the same time, RFID identity card production costs are lower, less investment. Therefore, the solution of applying this technology in the community security system is feasible.

5 Overall design of RFID technology in community security system

5.1 Functional design

The basic functions that RFID technology implements in personnel location management include:

1 Identification: How many people or vehicles are there at any time or in a certain location, who can fully recognize these people or vehicles;

2 Record: All the trajectories of the personnel vehicles entering the cell at any time in the cell can be recorded in the database;

3 Positioning: The community monitoring center can remotely monitor the personnel vehicles entering the community;

4 Inquiring about a series of information about the arrival/departure time and total stay time of the personnel's vehicles at any location, etc., can supervise and implement whether the important patrol personnel conduct testing and processing of various data on time and at the point, and fundamentally eliminate the cause. Related security issues caused by negligence.

5 Anti-cheating: The personnel in the pedestrian community loses or discards the identity card while driving, and the monitoring center can automatically recognize it.

5.2 Design plan

Several readers are installed in the channels of the cell and the channels through which the personnel may pass, and they are exchanged data with the computers of the ground monitoring center through the communication lines. At the same time, an RFID electronic tag ID card is placed on each of the personnel vehicles entering the cell. When the personnel vehicle enters the cell, the reader will sense the signal and upload it immediately as long as it passes or approaches any reader placed in the channel. On the computer in the monitoring center, the computer can determine the specific information (such as: who, at which location, specific time), the administrator can also click on any location in the cell according to the distribution diagram on the big screen or on the computer. The computer will count and display the personnel situation in this area.

At the same time, once an accident occurs in the community (such as: fire, robbery, etc.), the personnel and vehicles around the accident location can be immediately detected according to the location information of the personnel in the computer, and then the detector can be used to further determine the exact position of the personnel in the accident. In order to help the public security department to rescue the distressed personnel and solve the case in an accurate and rapid manner.

5.3 System completion

The information processing system is the core of the entire community security system, and is composed of a database system and a response application software system. The system can complete the functions of recording, querying and processing related information of the travel route of the personnel vehicle. For example, the travel route information of the personnel and vehicles entering the community on March 15, 2007 can be inquired.

6 RFID technology prospects

Radio Frequency Identification (RrID) has become a hot topic now. According to industry insiders, the RFID technology market will bring about $30 billion to $10 billion in new products and services in the next five years. There are also huge demands for servers, data storage systems, database programs, business management software, consulting services, and other computer infrastructure. Many high-tech companies are stepping up the development of RFID-specific software and hardware, and have invested heavily in the development of this technology and solutions, including Intel, Microsoft, IBM, Oracle, SUN and other Irr giants. And Wal-Mart, the world's largest retailer, recently "requires its top 100 suppliers to use RFID technology when sending pallets and boxes to their distribution centers, using this technology in a single piece of merchandise before January 2006." The resolution pushed the RFID again into the spotlight. Therefore, it can be said that RFID technology is becoming a hot new technology in the world.

7 Conclusion

The application of RFID in the community security system is based on the community management regulations and can be classified according to personnel safety management, vehicle safety management and safety material management. The FRID technology is used to establish an information collection and processing scheme to realize information transmission and information sharing, provide support for community security management, and realize community management informationization, standardization and visualization. Maximum protection of the safety of personnel and property in the community.

High Voltage Power Supplies

iDealTek-Electronics has accumulated rich application experience and design technical knowledge in the field of High-voltage power supplies, from Linear High Voltage Power Supplies based on power frequency transformers to Switching High Voltage power supplies based on IGBT components, from 60KV, 1KW High Voltage Power Module, to 5KV ~ 40KV, 1KW 2U Laboratory High-voltage power supplies, and to 5KV ~ 60KV, 2KW 4U and 5KV ~ 100KV, 6U rack-mounted capacitor charging high-voltage power supplies, and then to floor-standing cabinet-type high-current high-power high-voltage power supplies, all our high voltage power supplies are featured for high reliability, excellent high-voltage output stability and low-ripple electronic characteristics.
Ccp 6u High Voltage Capacitor Charging Power Supplies Side PanelCcps 6u High Voltage Power Supplies FrontCcps Cabinet Type High Voltage Power Supplies
Through the reliable and durable operation panel on the front panel of the high-voltage power supply, the output voltage and current can be easily set and controlled. The high-precision LED or LCD ensures intuitive and high-precision high-voltage output measurement functions. Our high-voltage power supplies can be equipped with a wealth of remote-control interfaces, such as RS232 / RS485 /DB15 / DB25 / DB50 analog signal interface, etc. for remote high-voltage enable and inhibit, high-voltage output control programming and data monitoring.

Our HV power supplies have complete built-in protection functions, such as overvoltage protection, ARC protection, load discharge protection, over heat protection, etc. The protection mechanism can start in transient time to ensure the safety and reliability of the power supply itself and customer loads under high-voltage output.
Hps High Power High Voltage Power Supplies
At present, our high voltage power supplies are widely used in high-voltage laboratories, capacitor charging, electron beam, ion implantation, FUSION power generation and other industries.

HV Power Supplies, High-voltage Power Supplies, High Voltage DC Power Supplies, HV PSU, High Voltage Power Module

Yangzhou IdealTek Electronics Co., Ltd. , https://www.idealtekpower.com