Security method based on radio frequency identification (RFID)

An RFID tag and security technology, applied in the computer field, can solve the problems of security management dependence and poor timeliness, and achieve the effects of timely and reliable alarm and recorded evidence, low personnel dependence, and fast instant response speed.

Inactive Publication Date: 2012-07-04
DIGICAN SHANGHAI CORP
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention aims to provide a security method, which applies RFID technology to securi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security method based on radio frequency identification (RFID)
  • Security method based on radio frequency identification (RFID)
  • Security method based on radio frequency identification (RFID)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The specific embodiments of a security method using RFID provided by the present invention will be described in detail below with reference to the accompanying drawings.

[0022] attached figure 1 Shown is a schematic structural diagram of the method according to the first embodiment of the present invention, including: a plurality of RFID tags, which are represented by tags 11 to 13 in this embodiment; a plurality of RFID read-write detectors, which are represented by detectors 21 to 22 in this embodiment Representation; security management platform 30 and central command platform 40.

[0023] The RFID tags 11-13 are placed on the monitored terminal of the security network on movable assets such as personnel or vehicles, including personnel, bicycles, electric bicycles, and automobiles. e.g. attached figure 1 Labels 11 to 13 given in are placed on key fobs, electric bicycles and cars, respectively. The label can be placed on the keychain, which is convenient for peo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a security method based on radio frequency identification (RFID). According to the security method, a plurality of RFID tags, a plurality of RFID read-write detectors, a security management platform and a central command platform are adopted, wherein the RFID tags are arranged on monitored terminals of a security network; the RFID read-write detectors are arranged in a security area to form a detector array so as to acquire transfer information of the monitored terminals; the security management platform communicates with the RFID read-write detectors and checks whether the information detected by the RFID read-write detectors is legal or not according to information stored in a database; and the central command platform is used for summarizing, backuping, managing and analyzing information of each control point in the security method. Compared with the traditional camera security method, the security method has the advantages that: personnel dependence is low, immediate response speed is high, alarming and evidence recording are timely and reliably performed, and security is high.

Description

technical field [0001] The invention relates to the field of computer technology, and in particular to a security method using RFID. Background technique [0002] The security method is a system for monitoring people and properties in the environment. judge the situation. [0003] The security method in the prior art needs to set up a large number of cameras, so that personnel can watch the surveillance video for a long time, and rely on the judgment of the personnel to carry out security management. The disadvantage is that it is greatly affected by personnel, high labor costs, poor security efficiency, long response time to events, and poor reliability. SUMMARY OF THE INVENTION [0004] The present invention aims to provide a security protection method, which applies RFID technology to security management to solve the problems of security management's dependence on personnel and poor timeliness. [0005] In order to solve the above problems, the present invention prov...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G08B13/00G08B25/00G06K17/00B60R25/10B62H5/20B60R25/102
Inventor 不公告发明人
Owner DIGICAN SHANGHAI CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products