Abnormal event monitoring method and system based on radio frequency identification positioning

A radio frequency identification positioning and abnormal event technology, applied in computer parts, collaborative devices, instruments, etc., can solve problems such as inability to effectively monitor abnormal events, save time and resources, and reduce negative effects.

Inactive Publication Date: 2014-07-09
BEIJING INST OF COMP TECH & APPL
3 Cites 8 Cited by

AI-Extracted Technical Summary

Problems solved by technology

Existing abnormal event monitoring methods, such as the application layer event (ALE) organized by the Global Electronic Product Code (EPC Global), are formulated for item tracking events...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Method used

In order to avoid interference to the antenna to the greatest extent, the electronic tag 4 adopts plastic screws to fasten, and can even be directly installed in the meter head 3, and the top cover PCB5 adopts a hot-melt column process to fix, which also greatly reduces the cost of injection molding. difficulty.
Table head 3 adopts PC material, has excellent electrical insulation, extensibility, dimensional stability and chemical corrosion resistance, higher intensity, heat resistance and cold resistance; Short strap 7 and long strap 1 Using TPU material, it has the characteristics of high strength, good toughness, wear resistance, cold resistance, oil resistance, water resistance, aging resistance and weather resistance. The integrated injection molding of the two ensures the waterproof effect. At the same time, it is worn with a wrist strap, which makes any carrier feel very comfortable.
Watch strap, comprises long watch strap 1, short watch strap 7, is all connected with watch head 3, and watch strap is designed to adjustable form, adapts to different crowds as far as possible; Watch strap adopts unique molding design, With grooves and indentations of a certain depth, the appearance of the strap is more beautiful, and at the same time, it is easy t...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Abstract

The invention discloses an abnormal event monitoring method and system based on radio frequency identification positioning. The method comprises the step that (1) radio frequency identification positioning devices including a radio frequency reader-writer are installed in an area where abnormal events need to be monitored, and a radio frequency tag is installed on an object to be positioned; (2) a user specifies abnormal events to be monitored and intervals for an abnormal event monitoring device; (3) the abnormal event monitoring device acquires the information of the radio frequency tag from the radio frequency identification positioning devices at specified intervals; (4) the abnormal event monitoring device matches the acquired information of the radio frequency tag with the abnormal events specified by the user each time the information of the radio frequency tag is acquired, and the abnormal event monitoring device reports to the user that the specified abnormal events happen under the condition of successful matching; (5) the user cancels the specified abnormal events from the abnormal event monitoring device when the user does not need to monitor the abnormal events. The method and system can monitor multiple abnormal events specified by multiple users in time.

Application Domain

Technology Topic

Image

  • Abnormal event monitoring method and system based on radio frequency identification positioning
  • Abnormal event monitoring method and system based on radio frequency identification positioning
  • Abnormal event monitoring method and system based on radio frequency identification positioning

Examples

  • Experimental program(1)

Example Embodiment

[0037] figure 1 It is a flowchart of the abnormal event monitoring method based on radio frequency identification positioning of the present invention. Such as figure 1 As shown, the method includes:
[0038] Step 1. Install radio frequency identification positioning devices in areas where abnormal events need to be monitored, including radio frequency readers, and radio frequency tags on objects that need to be positioned;
[0039] Step 2: The user specifies the abnormal event and time interval to be monitored to the abnormal event monitoring device;
[0040] Step 3: The abnormal event monitoring device obtains radio frequency tag information from the radio frequency identification positioning device every designated time interval;
[0041] Step 4. Each time the radio frequency tag information is acquired, the abnormal event monitoring device will match the acquired radio frequency tag information with the abnormal event specified by the user, and if the matching is successful, report the occurrence of the specified abnormal event to the user;
[0042] Step 5. When the user does not need to monitor the abnormal event, cancel the specified abnormal event from the abnormal event monitoring device.
[0043] The abnormal event monitoring device may be one computer or multiple computers. The radio frequency reader can be any commercial reader that meets a certain standard. It is installed in the area where abnormal events need to be located and monitored, and used to obtain the unique code of the radio frequency tag and calculate the area where the radio frequency tag is located; The tag can be any commercial tag that meets a certain standard and can work with a radio frequency reader. It can be installed on an item that needs to be positioned or worn by a person who needs to be positioned to provide the code of the item or the identity of the person.
[0044] In the step 1, in order to increase the credibility of abnormal event monitoring, the radio frequency tag can be made into a low-power anti-dismantling alarm device to achieve the purpose of not being arbitrarily dismantled under unauthorized circumstances in some cases. These occasions include: real-time positioning and monitoring systems for personnel in prisons, mental illness and other industries; hospital neonatal monitoring and management systems, external visitor management systems for confidential units, monitoring areas, exhibition areas, and other places, real-time positioning systems for personnel, and special personnel safety for important meetings and events Management system.
[0045] The low-power anti-dismantling alarm device includes:
[0046] The magnet includes a first magnet and a second magnet, the S pole of the first magnet faces downward, and the N pole of the second magnet faces downward;
[0047] The Hall switch includes a first Hall switch and a second Hall switch. The first Hall switch and the first linear Hall element are fixed on the printed board and are placed on the positive side of the first magnet. Below, the second Hall switch is also fixed on the printed board and placed in a position where the first magnet and the second magnet will not conduct under the magnetic field strength;
[0048] The linear Hall element includes a first linear Hall element and a second linear Hall element. The second linear Hall element is fixed on the printed board and placed directly under the second magnet;
[0049] The switch tube is fixed on the printed board, and is respectively connected with the first linear Hall element, the second linear Hall element and the second Hall switch circuit.
[0050] Microprocessor, with AD converter, respectively connected with the first Hall switch, the second Hall switch, the first linear Hall element, and the second linear Hall element circuit for processing Various signals generate alarm signals.
[0051] The first linear Hall element and the second linear Hall element are non-programmable linear Halls.
[0052] The first Hall switch and the second Hall switch, the first linear Hall element and the second linear Hall element, the switch tube, and the microprocessor are all injection molded They are fixed on a printed board, and the printed board, the first magnet and the second magnet are also fixed on the low power consumption tamper alarm device by injection molding.
[0053] The first magnet and the second magnet are cylindrical with a diameter of 4 mm and a height of 1 mm.
[0054] The working method of the low-power anti-dismantling alarm device as described above includes:
[0055] In the absence of external magnetic field interference, when the low-power anti-dismantling alarm device is destroyed, the first Hall switch detects that the magnetic field strength of the first magnet changes, and its level state also changes Send an interrupt signal to the microprocessor, and the microprocessor generates an alarm signal after receiving the interrupt signal for processing.
[0056] The working method of the low-power anti-dismantling alarm device as described above also includes:
[0057] In the case of external magnetic field interference, the output level of the second Hall switch changes and causes the switch tube to be turned on, so that the first linear Hall element and the second linear Hall element are supplied with power And respectively output stable voltages. The microprocessor collects the voltages and converts them into two digital quantities through an A\D converter. At the same time, the switch tube causes the second Hall switch to send to the microprocessor The device sends a second interrupt signal, and the microprocessor processes the interrupt signal and judges that it is interfered by an external magnetic field. If the low-power anti-dismantling alarm device is destroyed at this time, the two digital quantities will change. The microprocessor generates an alarm signal after processing the two changed digital quantities.
[0058] The low-power anti-tamper alarm device further includes a wristband, which is composed of a first wristband and a second wristband, and the printed board is fixed on the second wristband, and the first magnet And the second magnet is fixed on the first wristband.
[0059] The first magnet and the second magnet are fixed on the first wristband by injection molding, and the printed board is also fixed on the second wristband by injection molding.
[0060] A working method of a low-power anti-dismantling alarm device including a wrist strap, the working method includes:
[0061] In the absence of external magnetic field interference, when the first wristband and the second wristband are separated, the first Hall switch detects that the magnetic field strength of the first magnet changes, and its level state When a change occurs, an interrupt signal is sent, and the microprocessor generates an alarm signal after receiving the interrupt signal for processing.
[0062] The working method of the low power consumption tamper-proof alarm device including the wrist strap, the working method further includes:
[0063] In the case of external magnetic field interference, the output level of the second Hall switch changes and causes the switch tube to be turned on, so that the first linear Hall element and the second linear Hall element are supplied with power And respectively output stable voltages. The microprocessor collects the voltages and converts them into two digital quantities through an A\D converter. At the same time, the switch tube causes the second Hall switch to send to the microprocessor The processor sends a second interrupt signal, and the microprocessor processes the interrupt signal and judges that it is interfered by an external magnetic field. At this time, if the first wristband and the second wristband are separated, the two digital quantities There will be changes, and the microprocessor generates an alarm signal after processing the two changed digital quantities.
[0064] Figure 3a It is a schematic diagram of the first embodiment of the low power consumption tamper alarm device of the present invention. Such as Figure 3a As shown, the low-power anti-dismantling alarm device includes: a magnet, a Hall switch, a linear Hall element, a switch tube model, and a microprocessor.
[0065] The magnet includes a first magnet 7 and a second magnet 8, the first magnet 7S pole facing down, and the second magnet 8N pole facing down;
[0066] The Hall switch includes a first Hall switch 1 and a second Hall switch 2. The first Hall switch 1 and the first linear Hall element 3 are fixed on the printed board and are placed together on the first hall switch. Directly below a magnet 7, the second Hall switch 2 is also fixed on the printed board and placed in a position where the first magnet 7 and the second magnet 8 will not conduct under the magnetic field strength; The switch model can be A3212;
[0067] The linear Hall element includes a first linear Hall element 3 and a second linear Hall element 4. The second linear Hall element 4 is fixed on the printed board and placed on the front side of the second magnet 8. Below; the linear Hall element model can be OH49E;
[0068] The switch tube 5 is fixed on the printed board, and is connected to the first linear Hall element 3, the second linear Hall element 4, and the second Hall switch 2 respectively; the switch tube model can be 6401;
[0069] Microprocessor 6, with AD converter, respectively connected to the first Hall switch 1, the second Hall switch 2, the first linear Hall element 3, and the second linear Hall element 4 circuits for processing various signals To generate an alarm signal. The microprocessor model can be STM8L151G6U6;
[0070] The first Hall switch 1 and the second Hall switch 2, the first linear Hall element 3 and the second linear Hall element 4, the switch tube 5, the microprocessor 6, the first magnet 7 and the second magnet 8 All are fixed to the low-power anti-dismantling alarm device by injection molding.
[0071] The first linear Hall element 3 and the second linear Hall element 4 are non-programmable linear Halls.
[0072] Linear Hall can be divided into two types: one is non-programmable linear Hall. After A/D conversion, the microprocessor can collect its digital value. In this embodiment, the first non-programmable one is used. The linear Hall is converted by the A/D converter of the microprocessor to obtain the corresponding digital quantity. Of course, another linear Hall can also be used, that is, a programmable linear Hall, which has an A/D conversion module inside, and the microprocessor can directly obtain its value without its own A/D converter for conversion. The corresponding digital quantity can be obtained. Both of these can be used in the present invention, but the A/D conversion of the programmable linear Hall is relatively slow. Therefore, it is better to use non-programmable linear Hall elements.
[0073] The printed circuit board is fixed on the low power consumption tamper alarm device by injection molding.
[0074] The first magnet 7 and the second magnet 8 are cylindrical with a diameter of 4 mm and a height of 1 mm.
[0075] As a variation of this embodiment, the low-power anti-tamper alarm device further includes a wristband, which is composed of a first wristband 9 and a second wristband 10, and the printed board is fixed to the second On the wristband 10, the first magnet 7 and the second magnet 8 are fixed on the first wristband 9, and the wristbands are made of waterproof and flexible materials such as rubber. Such as Figure 3b As shown, Figure 3b It is a schematic diagram of the second embodiment of the low power consumption tamper alarm device of the present invention.
[0076] The first magnet 7 and the second magnet 8 are fixed on the first wrist strap 9 by injection molding.
[0077] A working method of the low power consumption tamper-proof alarm device includes:
[0078] In the absence of external magnetic field interference, when the low-power anti-dismantling alarm device is destroyed, the first Hall switch 1 detects that the magnetic field strength of the first magnet 7 has changed, and its level state is also When a change occurs, an interrupt signal is sent to the microprocessor 6, and the microprocessor 6 generates an alarm signal after receiving the interrupt signal for processing.
[0079] A working method of the low power consumption anti-dismantling alarm device further includes:
[0080] In the case of external magnetic field interference, the output level of the second Hall switch 2 changes and causes the switch tube 5 to be turned on, so that the first linear Hall element 3 and the second linear Hall element 4 are powered and respectively Output a stable voltage, the microprocessor 6 collects the voltage and converts it into two digital quantities through the A/D converter. At the same time, the switch tube 5 causes the second Hall switch 2 to send the second hall switch to the microprocessor 6. Interrupt signal, the microprocessor 6 processes the interrupt signal and judges that it is interfered by the external magnetic field. At this time, if the low-power anti-tamper alarm device is destroyed, the two digital quantities will change, and the microprocessor 6 6 After processing the changed two digital quantities, an alarm signal is generated.
[0081] A working method of the low-power consumption tamper-proof alarm device, the working method includes:
[0082] In the absence of external magnetic field interference, when the first wristband 9 and the second wristband 10 are separated, the first Hall switch 1 detects that the magnetic field strength of the first magnet 7 has changed, and its level status changes, sending An interrupt signal, the microprocessor 6 generates an alarm signal after receiving the interrupt signal for processing.
[0083] A working method of the low power consumption anti-dismantling alarm device, the working method further includes:
[0084] In the case of external magnetic field interference, the output level of the second Hall switch 2 changes and causes the switch tube 5 to be turned on, so that the first linear Hall element 3 and the second linear Hall element 4 are powered and respectively Output a stable voltage, the microprocessor 6 collects the voltage and converts it into two digital quantities through the A/D converter. At the same time, the switch tube 5 causes the second Hall switch 2 to send the second hall switch to the microprocessor 6. When the interrupt signal is interrupted, the microprocessor 6 processes the interrupt signal and determines that it is interfered by an external magnetic field. If the first wristband 9 and the second wristband 10 are separated at this time, the two digital quantities will change. The microprocessor 6 processes the changed two digital quantities and generates an alarm signal.
[0085] The radio frequency tag can also be made into a wearable anti-dismantling alarm device with strong anti-dismantling reliability, strong adaptability, active alarm and waterproof function, which solves the problem that the adjustable range in the prior art is short and will be damaged when disassembled. Material and unrecoverable, poor waterproof skills, false alarms, and unsightly wearing.
[0086] The wearable anti-dismantling alarm device includes:
[0087] Meter head, a PCB board is installed inside the meter head, and the PCB board is used as an electronic label;
[0088] The electronic tag is installed inside the meter head and mainly performs short-range wireless communication;
[0089] A top cover, a top cover PCB board is installed on the top cover, the top cover PCB board is connected with the electronic tag, and an active alarm device is installed on the top cover;
[0090] Watch straps, including long straps and short straps, are connected to the watch head;
[0091] The long flexible circuit board is injection molded into the long strap and connected with the electronic tag, and is equipped with a tamper-proof alarm circuit;
[0092] The short flexible circuit board is injection molded into the short strap and connected to the electronic tag, and is equipped with an inductive tamper-proof alarm circuit;
[0093] The buckle includes an upper buckle and a lower buckle. When the upper buckle and the lower buckle are closed, the buckle cooperates with the strap to form a tamper-evident alarm loop;
[0094] The working state of the wearable anti-dismantling alarm device is:
[0095] When the active alarm device is activated, an alarm signal is generated;
[0096] When the long watchband is damaged, the tamper-evident alarm circuit is disconnected and an alarm signal is generated;
[0097] When the short strap is damaged, the inductive tamper-proof alarm circuit is disconnected, and an alarm signal is generated;
[0098] When the upper clasp, lower clasp or top cover is opened without authorization, the inductive tamper-proof alarm circuit will generate an alarm signal.
[0099] The short flexible circuit board adopts coating technology to protect the components welded on it.
[0100] The watch head is made of PC material, the short watch band and the long watch band are both made of TPU material, and the long watch band, the short watch band and the watch head are connected in an integrated injection molding manner.
[0101] The active alarm device adopts a double-touch alarm switch and has two corresponding alarm buttons. Only when the two alarm buttons are pressed at the same time, an active alarm command can be issued.
[0102] The alarm button is equipped with a key pad, and the key pad and the watch cover realize integral injection molding.
[0103] The electronic tag is fastened with plastic screws, and the top cover PCB is fixed with a hot-melt column process.
[0104] The top cover PCB is connected with the electronic tag through a 2-pin connector (spring post).
[0105] Both the long flexible circuit board and the short flexible circuit board are connected to the electronic tag through the outer wall of the meter head.
[0106] The wearable tamper-proof alarm device is a wristband-type tamper-proof alarm device, a neckband-type tamper-proof alarm device, and an entrainment type tamper-proof alarm device. For example, when the abnormal event monitoring method and system based on radio frequency identification positioning are used for abnormal monitoring of scenic spots, tourists can use a neckband type anti-disassembly alarm device or an entrainment type anti-disassembly alarm device. In short, according to the specific circumstances of the abnormal monitoring event, different labeling devices can be selected.
[0107] Figure 4 It is an exploded view of the structure of the wristband type anti-disassembly alarm device of the present invention. Such as Figure 4 As shown, the wristband type tamper-proof alarm device includes:
[0108] Head 3, a PCB board is installed inside the head, and the PCB board is used as the electronic label 4.
[0109] The top cover 6 is equipped with a top cover PCB board 5, which is connected to the electronic tag 4, and the top cover is equipped with an active alarm device, which mainly functions as an active alarm and an anti-opening alarm.
[0110] The top cover PCB board 5 can also be used as other functional devices. For example, it can be designed to be hooked with a bank card to generate ordinary bank card swiping consumption and other functions; it can also be designed to be hooked with a unit’s employee identity authentication card to generate identity recognition, Time attendance and other functions; it can also be designed as a bus card and other devices to provide various conveniences for it.
[0111] The electronic tag 4 is installed inside the meter head 3. The electronic tag is used for short-distance wireless communication.
[0112] The straps, including the long strap 1 and the short strap 7, are connected to the head 3, and the strap is designed in an adjustable form, which can adapt to different groups of people to the greatest extent; the strap adopts a unique design to match a certain depth The grooves and recesses make the watchband more beautiful in appearance, easy to bend, ergonomic, comfortable to wear, compact and convenient. The length of the wrist strap can be flexibly adjusted. The buckle can be opened many times under authorization, will not damage the material, can be reused, environmental protection and resource saving.
[0113] The long flexible circuit board 2 is injection molded into the long watchband 1 and connected to the electronic tag 4 through the outer wall of the meter head 3, on which a tamper-proof alarm circuit is installed.
[0114] The short flexible circuit board 8 is injection molded into the short watchband 7 and connected to the electronic tag 4 through the outer wall of the meter head 3, on which an inductive tamper-proof alarm circuit is installed. When the top cover 6 is opened without authorization, the inductive tamper-proof alarm circuit will generate an alarm signal.
[0115] The buckle includes an upper buckle 9 and a lower buckle 10. When the upper buckle and the lower buckle are closed, the buckle cooperates with the strap to form a tamper-proof alarm loop.
[0116] When the alarm device is activated, at least one of the long strap 1 and the short strap 7 is damaged, and the upper buckle 9, lower buckle 10 or top cover 6 is opened without authorization, an alarm signal will be generated and sent through the antenna To the background system. The working state of the wearable anti-dismantling alarm device is:
[0117] When the active alarm device is activated, an alarm signal is generated;
[0118] When the long watchband 1 is damaged, the tamper-proof alarm circuit is disconnected and an alarm signal is generated;
[0119] When the short strap 7 is damaged, the inductive tamper-proof alarm circuit is disconnected and an alarm signal will be generated;
[0120] When the upper buckle 9, the lower buckle 10 or the top cover 6 is opened without authorization, the inductive tamper-proof alarm circuit will generate an alarm signal. The short flexible circuit board 8 adopts coating technology to weld the components. The short flexible circuit board has high temperature resistance characteristics, and at the same time, a special coating technology is adopted for the components welded on it, so as to avoid damage to the circuit caused by the injection temperature. In addition, since the thickness of the flexible circuit board is very thin, it will not affect the shape and bending of the strap.
[0121] Because the materials of each part are different, and there is a flexible circuit board between the watchband and the watch head, the traditional connection method of the watchband bolt has greater difficulties in waterproofing. Therefore, an integrated injection molding method is adopted.
[0122] The head 3 is made of PC material, which has excellent electrical insulation, extensibility, dimensional stability and chemical resistance, high strength, heat resistance and cold resistance; the short strap 7 and long strap 1 are made of TPU material , With high strength, good toughness, wear resistance, cold resistance, oil resistance, water resistance, aging resistance, weather resistance and other characteristics. The two are integrated injection molding to ensure the waterproof effect. At the same time, the wrist strap is used to wear the belt, and any wearer will feel very comfortable.
[0123] The alarm device adopts a double-touch alarm switch and has two corresponding alarm buttons. Only when the two alarm buttons are pressed at the same time can the active alarm instruction be issued. The monitoring center can receive the alarm information in time, know the location of the alarm person, and provide support quickly.
[0124] For the alarm device, it is necessary to ensure the convenience of triggering and avoid false triggering. Therefore, the double-touch alarm switch is used, and the alarm command can only be issued when pressed at the same time, such as Figure 4 Shown in the table cover 6.
[0125] Of course, in order to better prevent false alarms, three alarm buttons can also be used, and the active alarm command can only be issued when the three alarm buttons are pressed at the same time.
[0126] The alarm button is equipped with a key pad, and in order to ensure the waterproof level, the key pad and the watch cover realize integral injection molding of soft and hard materials.
[0127] Of course, the key pad can also be made of PC material or TPU material to better protect the alarm button.
[0128] In order to avoid interference to the antenna to the greatest extent, the electronic tag 4 is fastened with plastic screws and can even be directly installed in the meter head 3. The top cover PCB5 is fixed by a hot-melt column process, which greatly reduces the difficulty of injection molding.
[0129] The watchband is injection molded with a flexible circuit board. When the managed person puts on the wristband and connects the buckle, the electronic label starts to work. If the strap breaks or the buckle is opened without authorization, a tamper alarm signal will be sent out, and then sent to the background system through the antenna. The watch head and watch band of different materials adopt integrated injection molding, which not only ensures the strength of the watch head to protect the internal device, but also ensures the softness of the watch band and makes it comfortable to wear. At the same time, in order to cope with emergencies, the managed person can initiate an alarm through the double-touch button, which not only ensures the convenience of triggering, but also reduces the possibility of false triggering.
[0130] In the step 2, E n , X 1 , X 2 ,..., x m , Where E is abnormal event, n is abnormal event type, x 1 , X 2 ,..., x m Qualifying conditions for the corresponding event type specified by the user. The qualification may include: time limitation, region limitation, and label limitation.
[0131] The abnormal event monitoring device generates a corresponding tag list according to the tag restriction condition of a certain abnormal event, and marks each tag in the tag list as "not acquired".
[0132] If multiple abnormal events are specified, the abnormal event monitoring device stores multiple corresponding tag lists, and each tag list corresponds to a specified abnormal event.
[0133] In the step 4, the radio frequency tag information is matched with all tags in the tag list of the specified abnormal event, and the tag mark of the successfully matched tag is changed from "not acquired" to "acquired"; When the number of tags marked as "acquired" in the tag list of the event reaches the specified number, the abnormal event is reported.
[0134] In this example, the description of the abnormal event is: "User name; unique event number specified by the user; event type; time qualifier {start time, end time}; area qualifier {area name 1,...,area name m} ; Tag qualifier {tag unique code 1,..., tag unique code n}; number limit; interval time".
[0135] In the event description, both the start time and the end time are expressed as "hour: minute: second".
[0136] In the event description, the time qualifier, area qualifier and label qualifier are all "IN" or "EX", and "IN" means inclusion, for example, "IN{7:0:0,8:59:59} "Means the time period from 7:0:0 to 8:59:59, "EX" means exclusion, for example, "EX{7:0:0,8:59:59}" means from 7:0:0 Until 8:59:59.
[0137] In the event description, if all areas need to be specified, the area list can be expressed as "{*}". If all tags need to be specified, the tag list can be expressed as "{*}".
[0138] In the event description, wildcards "*" and "?" can be used for the unique code of the label. "*" means zero, one or more characters, and "?" means one character. For example, "1234*" means the most unique code. The first 4 characters are the label of "1234", "*1234" means that the last 4 characters of the unique code are labels of "1234", and "1234??" means that the only code is 6 characters long and starts with "1234". , "??1234" means a label with a unique coding length of 6 characters and ending with "1234".
[0139] In the event description, the event type is one of "E1" (gathering), "E2" (staying), "E3" (absent) and "E4" (lost), for example, "E1; time limit; area limit ; Label limit; 10" means the specified time period, in the designated area, the number of designated labels reaches or exceeds 10, which is an abnormal event; "E2; time limit; area limit; label limit; 30" means in the designated time period, designated In the area, if the stay time of the designated tag reaches or exceeds 30 seconds, it is an abnormal event; "E3; time limit; area limit; tag limit; 0" means that no information about the specified tag is obtained in the specified time period and area . It is an abnormal event. The number of event types "E3" must be limited to 0; "E4; time limit; area limit; label limit; 20" means that the information of the specified tag is not obtained within the specified time period and area for 20 consecutive seconds , Is an abnormal event.
[0140] In the step 2, for all events specified by the user, the tags specified in the events need to be marked as "not acquired".
[0141] In the step 3, the tag information is described as "tag unique code; time; tag area", where "tag unique code" is read from the radio frequency tag by the radio frequency reader, and "time" is the time when the tag is read Time, the "area where the tag is located" is provided by the radio frequency reader, which can be the area where the reader is located, or the area where an antenna of the reader is located, or the area calculated by the reader according to a certain method.
[0142] In the step 4, if no tag information is obtained in step 3, the events "E3" and "E4" are matched in sequence; if the tag information is obtained in step 3, the events "E1" and "E2" are matched in sequence ", "E3" and "E4". Step 4 includes the following steps:
[0143] Step 41: When the tag information is not obtained, a certain "out of position" event "E3" is matched. (1) If the current time is not within the time range specified by the event, the abnormal event will not be reported and the matching of this event will end; (2) If the current time is within the time range specified by the event, the abnormal event will be reported and the event will end Match
[0144] Step 42: When the tag information is not obtained, a certain "lost" event "E4" is matched. For each tag specified by the event: (1) If the tag is marked as "not acquired", no abnormal event will be reported and the matching of this event will end; (2) if the tag is marked as "acquired" and the current time If the difference between the tag acquisition time and the recorded tag acquisition time is less than the number limit, no abnormal event will be reported, and the matching of this event will end; (3) If the tag is marked as "acquired", and the difference between the current time and the recorded tag acquisition time is greater than If the number is equal to the limit, the abnormal event will be reported and the matching of this event will be ended;
[0145] Step 43: When the tag information is obtained, a certain "gathering" event "E1" is matched. (1) If the tag is uniquely coded within the range specified by the event, and the area of ​​the tag is not within the area specified by the event, and the tag is marked as "acquired", no abnormal event is reported and the tag is marked as "not acquired", And end the matching of this event; (2) If the tag is uniquely coded within the range specified by the event, and the tag area is within the area specified by the event, and the time of the tag is not within the time specified by the event, and the tag is marked as "acquired" , The abnormal event is not reported, and the tag is marked as "not acquired", and the matching of this event is ended; (3) If the tag is uniquely coded within the range specified by the event, and the tag area is within the area specified by the event, and the tag If the time is within the time specified by the event and the tag is marked as "not acquired", no abnormal event will be reported, the tag will be marked as "acquired", and the matching of this event will end; (4) If the tag is uniquely coded in the event Within the specified range, the label area is within the area specified by the event, and the time of the label is within the time specified by the event, and the label is marked as "acquired", and the number of tags currently marked as "acquired" in the event is less than If the number is limited, no abnormal event will be reported, and the matching of this event will end; (5) If the tag is uniquely coded within the range specified by the event, and the tag area is within the area specified by the event, and the tag time is within the time specified by the event , And the tag is marked as "acquired", and the number of tags currently marked as "acquired" in the event is greater than or equal to the limit, the abnormal event will be reported and the matching of this event will end; (5) If it is in other cases, no Report abnormal events and end the matching of this event;
[0146] Step 44: When the tag information is obtained, a certain "staying" event "E2" is matched. (1) If the tag is uniquely coded within the range specified by the event, and the area of ​​the tag is not within the area specified by the event, and the tag is marked as "acquired", no abnormal event is reported and the tag is marked as "not acquired", And end the matching of this event; (2) If the tag is uniquely coded within the range specified by the event, and the tag area is within the area specified by the event, and the time of the tag is not within the time specified by the event, and the tag is marked as "acquired" , The abnormal event is not reported, and the tag is marked as "not acquired", and the matching of this event is ended; (3) If the tag is uniquely coded within the range specified by the event, and the tag area is within the area specified by the event, and the tag If the time is within the time specified by the event and the tag is marked as "not acquired", no abnormal event will be reported, and the tag will be marked as "acquired", the acquisition time will be recorded, and the matching of this event will end; (4) If the tag is The unique code is within the range specified by the event, the tag area is within the area specified by the event, and the tag time is within the time specified by the event, and the tag is marked as "acquired", and the difference between the current time and the recorded tag acquisition time If the number is less than the limit, no abnormal event will be reported, and the matching of this event will end; (5) If the tag is uniquely coded within the range specified by the event, and the tag area is within the area specified by the event, and the tag time is at the time specified by the event If the tag is marked as "acquired", and the difference between the current time and the recorded tag acquisition time is greater than or equal to the number limit, the abnormal event will be reported and the matching of this event will end; (6) If it is in other cases, do not report Abnormal event, and end the match of this event;
[0147] Step 45: When the tag information is obtained, a certain "out of position" event "E3" is matched. (1) If the current time is within the time range specified by the event, and the obtained unique code of the tag is not within the range specified by the event, the abnormal event will be reported and the matching of this event will end; (2) If the current time is within the specified time range of the event Within the time range, and the unique code of the obtained tag is within the range specified by the event, and the obtained tag area is not within the area specified by the event, the abnormal event will be reported and the matching of this event will end; (3) If it is in other cases , The abnormal event is not reported, and the matching of this event is ended;
[0148] Step 46: When the tag information is obtained, a certain "lost" event "E4" is matched. For each label specified by the event: (1) If the unique code of the obtained label is different from the label specified by the event, and the label specified by the event is marked as "acquired", and the difference between the current time and the acquisition time of the label specified by the event If the number is greater than or equal to the limit, the abnormal event will be reported and the matching of this event will end; (2) If the unique code of the obtained tag is the same as the tag specified by the event, and the area of ​​the obtained tag is the same as the area of ​​the tag specified by the event, And the current time is within the time specified by the event, no abnormal event is reported, the tag acquisition time is recorded, and the matching of this event is ended; (3) If it is in other cases, the abnormal event is not reported, and the matching of this event is ended;
[0149] In the step 5, the description of canceling the abnormal event that needs to be monitored is: "user name; unique event number designated by the user".
[0150] The first embodiment takes the "gathering" event E1 as an example, the event that user A needs to monitor is described as: "A; 101; E1; IN{07:00:00, 09:59:59}; IN{R301}; IN {*}; 5; 20". It means that from 07:00:00 to 09:59:59, the number of people in room 301 cannot reach or exceed 5 people.
[0151] After receiving the event request, the abnormal event monitoring device generates a tag list for the event. In this example, the tag list includes all tags, and each tag is marked as "not acquired".
[0152] The abnormal event monitoring device obtains tag information from the radio frequency identification positioning device every 20 milliseconds. For example, the tag information may be obtained (T201, 08:05:13, room 301), or the tag information may not be obtained. Make the following judgments:
[0153] (1) If the unique code of the tag is not within the range specified by the event, no abnormal event will be reported, and the matching of this event will end;
[0154] (2) If the tag is uniquely coded within the range specified by the event, and the area of ​​the tag is not in the room 301 area specified by the event, and the tag is marked as "not acquired", then no abnormal event will be reported and the matching of this event will end;
[0155] (3) If the tag is uniquely coded within the range specified by the event, and the area of ​​the tag is not in the room 301 area specified by the event, and the tag is marked as "acquired", no abnormal event is reported, and the tag is marked as "not acquired" , And end the match of this event;
[0156] (4) If the unique code of the tag is within the range specified by the event, and the tag area is in the room 301 area specified by the event, and the time of the tag is not within the time specified by the event {07:00:00, 09:59:59}, And the label is marked as "not acquired", no abnormal event is reported, and the matching of this event is ended;
[0157] (5) If the unique code of the tag is within the range specified by the event, and the tag area is in the room 301 area specified by the event, and the time of the tag is not within the time {07:00:00, 09:59:59} specified by the event, And the label is marked as "acquired", no abnormal event is reported, the label is marked as "not acquired", and the matching of this event is ended;
[0158] (6) If the tag's unique code is within the range specified by the event, and the tag area is in the room 301 area specified by the event, and the tag time is within the time specified by the event {07:00:00, 09:59:59}, And the label is marked as "not acquired", no abnormal event is reported, the label is marked as "acquired", and the matching of this event is ended;
[0159] (7) If the tag's unique code is within the range specified by the event, and the tag area is in the room 301 area specified by the event, and the tag time is within the time {07:00:00, 09:59:59} specified by the event, And the tag is marked as "acquired", and the number of tags currently marked as "acquired" in the event is less than 5, no abnormal event is reported, and the matching of this event is ended;
[0160] (8) If the tag's unique code is within the range specified by the event, the tag area is in the room 301 area specified by the event, and the tag time is within the time specified by the event {07:00:00, 09:59:59}, And the tag is marked as "acquired", and the number of tags currently marked as "acquired" in the event is greater than or equal to 5, the abnormal event is reported and the matching of this event is ended;
[0161] In the second embodiment, the "stay" event E2 is taken as an example, the event that user B needs to monitor is described as: "B; 3; E2: IN{17:00:00, 19:59:59}; IN{R502}; IN {T100, T101, T102, T103, T104}; 600: 20". Indicates that from 17:00:00 to 19:59:59, the stay time of tags T100, T101, T102, T103, T104 in room 502 cannot reach or exceed 600 seconds.
[0162] After receiving the event request, the abnormal event monitoring device generates a tag list for the event. In this example, the tag list includes 5 tags, and each tag is marked as "not acquired".
[0163] The abnormal event monitoring device obtains tag information from the radio frequency identification positioning device every 20 milliseconds. For example, it may obtain (T104,18:20:35, room 502) or may not obtain the tag information, and then proceed as follows judgment:
[0164] (1) If the tag's unique code is not within the range {T100, T101, T102, T103, T104} specified by the event, no abnormal event will be reported, and the matching of this event will end;
[0165] (2) If the tag is uniquely coded within the range {T100, T101, T102, T103, T104} specified by the event, and the area of ​​the tag is not in the area of ​​the room 502 specified by the event, and the tag is marked as "not acquired", no report Abnormal event, and end the match of this event;
[0166] (3) If the tag is uniquely coded within the range {T100, T101, T102, T103, T104} specified by the event, and the area of ​​the tag is not in the room 502 area specified by the event, and the tag is marked as "acquired", then no report For abnormal events, mark the label as "not acquired" and end the matching of this event;
[0167] (4) If the tag is uniquely coded within the range {T100, T101, T102, T103, T104} specified by the event, and the tag area is in the room 502 area specified by the event, and the tag time is not the time specified by the event {17:00 :00,19:59:59}, and the tag is marked as "not acquired", no abnormal event will be reported, and the matching of this event will end;
[0168] (5) If the tag is uniquely coded within the range {T100, T101, T102, T103, T104} specified by the event, and the tag area is in the room 502 area specified by the event, and the tag time is not the time specified by the event {17:00 :00,19:59:59}, and the tag is marked as "acquired", no abnormal event is reported, the tag is marked as "not obtained", and the matching of this event is ended;
[0169] (6) If the tag is uniquely coded within the range {T100, T101, T102, T103, T104} specified by the event, and the tag area is in the room 502 area specified by the event, and the tag time is at the time specified by the event {17:00 :00,19:59:59} and the tag is marked as "not acquired", no abnormal event is reported, the tag is marked as "acquired", the acquisition time is recorded, and the matching of this event is ended;
[0170] (7) If the tag is uniquely coded within the range {T100, T101, T102, T103, T104} specified by the event, and the tag area is in the room 502 area specified by the event, and the tag time is at the time specified by the event {17:00 :00,19:59:59}, and the tag is marked as "acquired", and the difference between the current time and the recorded tag acquisition time is less than 600 seconds, no abnormal event will be reported, and the matching of this event will end;
[0171] (8) If the tag is uniquely coded within the range {T100, T101, T102, T103, T104} specified by the event, and the tag area is in the room 502 area specified by the event, and the tag time is at the time specified by the event {17:00 :00,19:59:59}, and the tag is marked as "acquired", and the difference between the current time and the recorded tag acquisition time is greater than or equal to 600 seconds, the abnormal event is reported and the matching of this event is ended.
[0172] figure 2 It is a schematic diagram of the abnormal event monitoring system based on radio frequency identification positioning of the present invention. Such as figure 2 As shown, the system includes:
[0173] The radio frequency identification positioning module 100 is used for radio frequency identification positioning in areas that need to be monitored for abnormal events, including an installed radio frequency reader and a radio frequency tag installed on the object to be positioned;
[0174] The abnormal event monitoring module 200 includes: an abnormal event subscription module 300, a tag information acquisition module 400, an abnormal event matching module 500, and an abnormal event canceling module 600;
[0175] The abnormal event subscription module 300 is used to specify the abnormal event and time interval to be monitored to the abnormal event monitoring device;
[0176] The tag information acquisition module 400 is configured to obtain radio frequency tag information from the radio frequency identification positioning device at a specified time interval through the abnormal event monitoring device;
[0177] The abnormal event matching module 500 is configured to match the obtained radio frequency tag information with the abnormal event specified by the user through the abnormal event monitoring device every time the radio frequency tag information is obtained. If the matching is successful, report to the user that the specified Abnormal events;
[0178] The abnormal event canceling module 600 is used to cancel the specified abnormal event from the abnormal event monitoring device when the user does not need to monitor the abnormal event.
[0179] The radio frequency identification positioning module 100 includes:
[0180] The radio frequency tag module 700 can be any commercial tag that meets a certain standard and can work with radio frequency readers. It can be installed on an item that needs to be positioned or worn by a person who needs to be positioned to provide the code or person of the item. The RFID tag module 700 can be made into a low-power tamper-proof alarm device or a wearable tamper-proof alarm device. The specific content is related to the low-power tamper-proof alarm device or wearable anti-tamper device in the abnormal event monitoring method based on RFID positioning The dismantling of the alarm device is the same and will not be repeated here.
[0181] The radio frequency reader module 800, which can be any commercial reader that meets a certain standard, is installed in an area that needs to locate and monitor abnormal events, and is used to obtain the unique code of the radio frequency tag and calculate the area where the radio frequency tag is located.
[0182] The abnormal event description in the abnormal event subscription module 300 is: E n , X 1 , X 2 ,..., x m , Where E is abnormal event, n is abnormal event type, x 1 , X 2 ,..., x m Qualifying conditions for the corresponding event type specified by the user. The qualification may include: time limitation, area limitation, label limitation, and number limitation.
[0183] The abnormal event monitoring device 200 generates a corresponding tag list according to the tag restriction condition of a certain abnormal event, and marks each tag in the tag list as "not acquired".
[0184] In the abnormal event matching module 500, the radio frequency tag information is matched with all tags in the tag list of the specified abnormal event, and the tag mark of the successfully matched tag is changed from "unacquired" to "acquired"; When the number of tags marked as "acquired" in the tag list of an abnormal event reaches the specified number, the abnormal event is reported.
[0185] If multiple abnormal events are specified, the abnormal event monitoring device stores multiple corresponding tag lists, and each tag list corresponds to a specified abnormal event.
[0186] The abnormal event can be described as: "user name; unique event number designated by the user; event type; time qualifier {start time, end time}; area qualifier {area name 1, ..., area name m} ; Tag qualifier {tag unique code 1,..., tag unique code n}; number limit; interval time".
[0187] In the event description, both the start time and the end time are expressed as "hour: minute: second".
[0188] In the event description, the time qualifier, area qualifier and label qualifier are all "IN" or "EX", and "IN" means inclusion, for example, "IN{7:0:0,8:59:59} "Means the time period from 7:0:0 to 8:59:59, "EX" means exclusion, for example, "EX{7:0:0,8:59:59}" means from 7:0:0 Until 8:59:59.
[0189] In the event description, if all areas need to be specified, the area list can be expressed as "{*}". If all tags need to be specified, the tag list can be expressed as "{*}".
[0190] In the event description, wildcards "*" and "?" can be used for the unique code of the tag. "*" means zero, one or more characters, and "?" means one character. For example, "1234*" means that the unique code is Labels starting with "1234", "*1234" means a label whose unique code ends with "1234", "1234??" means a label whose unique code length is 6 characters and starts with "1234", "??1234" means Uniquely encode a label with a length of 6 characters and ending with "1234".
[0191] In the event description, the event type is one of "E1" (gathering), "E2" (staying), "E3" (absent) and "E4" (lost), for example, "E1; time limit; area limit ; Label limit; 10” means that the number of designated labels reaches or exceeds 10 in the designated time period, in the designated area. It is an abnormal event; "E2; time limit; area limit; label limit; 30" means that in the specified time period, in the specified area, the specified tag stays for 30 seconds or more, it is an abnormal event; "E3; time limit; area Limited; label limited; 0" means that the information of the specified label is not obtained in the specified time period and in the specified area, which is an abnormal event. The number limit after the event type "E3" must be 0; "E4; time limit; area limited ;Tag limit; 20" means that the information of the specified tag is not obtained within the specified time period, within the specified area, and continuously for 20 seconds. It is an abnormal event. For all events specified by the user, the label specified in the event needs to be marked as "not acquired".
[0192] The tag information obtaining module 400 obtains tag information from the radio frequency identification positioning module every specified time, including: the unique code of the tag, the current time, and the area where the tag is located; the description of the tag information is "tag unique code; time; area where the tag is located" , Among them, the "tag unique code" is read from the radio frequency tag by the radio frequency reader, "time" is the time when the tag is read, and the "tag area" is provided by the radio frequency reader, which can be the area where the reader is located. It can also be the area where an antenna of the reader is located, or the area calculated by the reader according to a certain method.
[0193] In the abnormal event matching module 500, if the tag information acquiring module 400 does not acquire any tag information, it will match each event "E3" and "E4" in sequence, and if the tag information acquiring module 300 acquires tag information, it will sequentially Match each event "E1", "E2", "E3" and "E4". include:
[0194] The first abnormal event matching module is used to match a certain "out of position" event "E3" when the tag information is not obtained. (1) If the current time is not within the time range specified by the event, the abnormal event will not be reported and the matching of this event will end; (2) If the current time is within the time range specified by the event, the abnormal event will be reported and the event will end Match
[0195] The second abnormal event matching module is used to match a certain "lost" event "E4" when the tag information is not obtained. For each tag specified by the event: (1) If the tag is marked as "not acquired", no abnormal event will be reported and the matching of this event will end; (2) if the tag is marked as "acquired" and the current time If the difference between the recorded tag acquisition time and the recorded tag acquisition time is less than the threshold, no abnormal event will be reported and the matching of this event will end; (3) If the tag is marked as "acquired", and the difference between the current time and the recorded tag acquisition time is greater than or equal to Threshold, the abnormal event is reported and the matching of this event is ended;
[0196] The third abnormal event matching module is used to match a certain "aggregation" event "E1" when tag information is obtained. (1) If the tag is uniquely coded within the range specified by the event, and the area of ​​the tag is not within the area specified by the event, and the tag is marked as "acquired", no abnormal event is reported and the tag is marked as "not acquired", And end the matching of this event; (2) If the tag is uniquely coded within the range specified by the event, and the tag area is within the area specified by the event, and the time of the tag is not within the time specified by the event, and the tag is marked as "acquired" , The abnormal event is not reported, and the tag is marked as "not acquired", and the matching of this event is ended; (3) If the tag is uniquely coded within the range specified by the event, and the tag area is within the area specified by the event, and the tag If the time is within the time specified by the event and the tag is marked as "not acquired", no abnormal event will be reported, the tag will be marked as "acquired", and the matching of this event will end; (4) If the tag is uniquely coded in the event Within the specified range, the label area is within the area specified by the event, and the time of the label is within the time specified by the event, and the label is marked as "acquired", and the number of tags currently marked as "acquired" in the event is less than If the number is limited, no abnormal event will be reported, and the matching of this event will end; (5) If the tag is uniquely coded within the range specified by the event, and the tag area is within the area specified by the event, and the tag time is within the time specified by the event , And the tag is marked as "obtained", and the number of tags currently marked as "obtained" in the event is greater than or equal to the number limit, the abnormal event is reported and the matching of this event is ended; (6) If it is in other cases, then Do not report abnormal events, and end the matching of this event;
[0197] The fourth abnormal event matching module is used to match a certain "stay" event "E2" when tag information is obtained. (1) If the tag is uniquely coded within the range specified by the event, and the area of ​​the tag is not within the area specified by the event, and the tag is marked as "acquired", no abnormal event is reported and the tag is marked as "not acquired", And end the matching of this event; (2) If the tag is uniquely coded within the range specified by the event, and the tag area is within the area specified by the event, and the time of the tag is not within the time specified by the event, and the tag is marked as "acquired" , The abnormal event is not reported, and the tag is marked as "not acquired", and the matching of this event is ended; (3) If the tag is uniquely coded within the range specified by the event, and the tag area is within the area specified by the event, and the tag If the time is within the time specified by the event and the tag is marked as "not acquired", no abnormal event will be reported, and the tag will be marked as "acquired", the acquisition time will be recorded, and the matching of this event will end; (4) If the tag is The unique code is within the range specified by the event, the tag area is within the area specified by the event, and the tag time is within the time specified by the event, and the tag is marked as "acquired", and the difference between the current time and the recorded tag acquisition time If the number is less than the limit, no abnormal event will be reported, and the matching of this event will end; (5) If the tag is uniquely coded within the range specified by the event, and the tag area is within the area specified by the event, and the tag time is at the time specified by the event If the tag is marked as "acquired", and the difference between the current time and the recorded tag acquisition time is greater than or equal to the number limit, the abnormal event will be reported and the matching of this event will end; (6) If it is in other cases, do not report Abnormal event, and end the match of this event;
[0198] The fifth abnormal event matching module is used to match a certain "out of position" event "E3" when the tag information is obtained. (1) If the current time is within the time range specified by the event, and the obtained unique code of the tag is not within the range specified by the event, the abnormal event will be reported and the matching of this event will end; (2) If the current time is within the specified time range of the event Within the time range, and the unique code of the obtained tag is within the range specified by the event, and the obtained tag area is not within the area specified by the event, the abnormal event will be reported and the matching of this event will end; (3) If it is in other cases , The abnormal event is not reported, and the matching of this event is ended;
[0199] The sixth abnormal event matching module is used to match a certain "lost" event "E4" when the tag information is not obtained. For each label specified by the event: (1) If the unique code of the obtained label is different from the label specified by the event, and the label specified by the event is marked as "acquired", and the difference between the current time and the acquisition time of the label specified by the event If the number is greater than or equal to the limit, the abnormal event will be reported and the matching of this event will end; (2) If the unique code of the obtained tag is the same as the tag specified by the event, and the area of ​​the obtained tag is the same as the area of ​​the tag specified by the event, And the current time is within the time specified by the event, no abnormal event is reported, the tag acquisition time is recorded, and the matching of this event is ended; (3) If it is in other cases, the abnormal event is not reported, and the matching of this event is ended;
[0200] In the abnormal event cancellation module 600, the description of the abnormal event that needs to be monitored for cancellation is: "user name; unique event number designated by the user".
[0201] Similarly, the abnormal event monitoring system based on radio frequency identification positioning of the present invention can also be described in the following embodiments:
[0202] The first embodiment takes the "gathering" event E1 as an example, and the description of the event that user A needs to monitor is: "A; 101; E1; IN{07:00:00, 09:59:59}; IN{R301}; IN {*}; 5; 20". It means that from 07:00:00 to 09:59:59, the number of people in room 301 cannot reach or exceed 5 people.
[0203] After receiving the event request, the abnormal event monitoring device generates a tag list for the event. In this example, the tag list includes all tags, and each tag is marked as "not acquired".
[0204] The abnormal event monitoring device obtains a tag information from the radio frequency identification positioning device every 20 milliseconds. For example, the tag information may be obtained (T201, 08:05:13, room 301), or the tag information may not be obtained. Make the following judgments:
[0205] (1) If the unique code of the tag is not within the range specified by the event, no abnormal event will be reported, and the matching of this event will end;
[0206] (2) If the tag is uniquely coded within the range specified by the event, and the area of ​​the tag is not in the room 301 area specified by the event, and the tag is marked as "not acquired", then no abnormal event will be reported and the matching of this event will end;
[0207] (3) If the tag is uniquely coded within the range specified by the event, and the area of ​​the tag is not in the room 301 area specified by the event, and the tag is marked as "acquired", no abnormal event is reported, and the tag is marked as "not acquired" , And end the match of this event;
[0208] (4) If the unique code of the tag is within the range specified by the event, and the tag area is in the room 301 area specified by the event, and the time of the tag is not within the time specified by the event {07:00:00, 09:59:59}, And the label is marked as "not acquired", no abnormal event is reported, and the matching of this event is ended;
[0209] (5) If the unique code of the tag is within the range specified by the event, and the tag area is in the room 301 area specified by the event, and the time of the tag is not within the time {07:00:00, 09:59:59} specified by the event, And the label is marked as "acquired", no abnormal event is reported, the label is marked as "not acquired", and the matching of this event is ended;
[0210] (6) If the tag's unique code is within the range specified by the event, and the tag area is in the room 301 area specified by the event, and the tag time is within the time specified by the event {07:00:00, 09:59:59}, And the label is marked as "not acquired", no abnormal event is reported, the label is marked as "acquired", and the matching of this event is ended;
[0211] (7) If the tag's unique code is within the range specified by the event, and the tag area is in the room 301 area specified by the event, and the tag time is within the time {07:00:00, 09:59:59} specified by the event, And the tag is marked as "acquired", and the number of tags currently marked as "acquired" in the event is less than 5, no abnormal event is reported, and the matching of this event is ended;
[0212] (8) If the tag's unique code is within the range specified by the event, the tag area is in the room 301 area specified by the event, and the tag time is within the time specified by the event {07:00:00, 09:59:59}, And the tag is marked as "acquired", and the number of tags currently marked as "acquired" in the event is greater than or equal to 5, the abnormal event is reported and the matching of this event is ended;
[0213] The second embodiment takes the "stay" event E2 as an example, and the description of the event that user B needs to monitor is: "B; 3; E2; IN{17:00:00, 19:59:59}; IN{R502}; IN {T100, T101, T102, T103, T104}; 600: 20". Indicates that from 17:00:00 to 19:59:59, the stay time of tags T100, T101, T102, T103, T104 in room 502 cannot reach or exceed 600 seconds.
[0214] After receiving the event request, the abnormal event monitoring device generates a tag list for this event. In this example, the tag list includes 5 tags, and each tag is marked as "not acquired".
[0215] The abnormal event monitoring device obtains a tag information from the radio frequency identification positioning device every 20 milliseconds. For example, the tag information may be obtained (T104, 18:20:35, room 502), or the tag information may not be obtained. Make the following judgments:
[0216] (1) If the tag's unique code is not within the range {T100, T101, T102, T103, T104} specified by the event, no abnormal event will be reported, and the matching of this event will end;
[0217] (2) If the tag is uniquely coded within the range {T100, T101, T102, T103, T104} specified by the event, and the area of ​​the tag is not in the area of ​​the room 502 specified by the event, and the tag is marked as "not acquired", no report Abnormal event, and end the match of this event;
[0218] (3) If the tag is uniquely coded within the range {T100, T101, T102, T103, T104} specified by the event, and the area of ​​the tag is not in the room 502 area specified by the event, and the tag is marked as "acquired", then no report For abnormal events, mark the label as "not acquired" and end the matching of this event;
[0219] (4) If the tag is uniquely coded within the range {T100, T101, T102, T103, T104} specified by the event, and the tag area is in the room 502 area specified by the event, and the tag time is not the time specified by the event {17:00 :00,19:59:59}, and the tag is marked as "not acquired", no abnormal event will be reported, and the matching of this event will end;
[0220] (5) If the tag is uniquely coded within the range {T100, T101, T102, T103, T104} specified by the event, and the tag area is in the room 502 area specified by the event, and the tag time is not the time specified by the event {17:00 :00,19:59:59}, and the tag is marked as "acquired", no abnormal event will be reported, the tag will be marked as "not acquired", and the matching of this event will end;
[0221] (6) If the tag is uniquely coded within the range {T100, T101, T102, T103, T104} specified by the event, and the tag area is in the room 502 area specified by the event, and the tag time is at the time specified by the event {17:00 :00,19:59:59}, and the tag is marked as "not acquired", no abnormal event is reported, the tag is marked as "acquired", the acquisition time is recorded, and the matching of this event is ended;
[0222] (7) If the tag is uniquely coded within the range {T100, T101, T102, T103, T104} specified by the event, and the tag area is in the room 502 area specified by the event, and the tag time is at the time specified by the event {17:00 :00,19:59:59}, and the tag is marked as "acquired", and the difference between the current time and the recorded tag acquisition time is less than 600 seconds, no abnormal event will be reported, and the matching of this event will end;
[0223] (8) If the tag is uniquely coded within the range {T100, T101, T102, T103, T104} specified by the event, and the tag area is in the room 502 area specified by the event, and the tag time is at the time specified by the event {17:00 :00,19:59:59}, and the tag is marked as "acquired", and the difference between the current time and the recorded tag acquisition time is greater than or equal to 600 seconds, the abnormal event is reported and the matching of this event is ended.
[0224] Of course, the present invention can also have various other embodiments, for example, changing the description of events, adding event types, etc., without departing from the spirit and essence of the present invention, those skilled in the art can make various changes according to the present invention. There are corresponding changes and modifications, but these corresponding changes and modifications should belong to the protection scope of the claims of the present invention.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Similar technology patents

Multi-path parallel optical sampling analog-to-digital conversion data fusion method

ActiveCN113126388ASave time and resourcesImprove signal qualityOptical analogue/digital convertersAnalogue-digital convertersDigital conversionEffective number of bits
Owner:UNIV OF ELECTRONIC SCI & TECH OF CHINA

Classification and recommendation of technical efficacy words

  • Reduce negative effects
  • Save time and resources

Compact multi-port cam cell implemented in 3D vertical integration

InactiveUS20080283995A1Reduce negative effectsTransistorSemiconductor/solid-state device detailsStorage cellThree dimensional integration
Owner:GLOBALFOUNDRIES INC

Dual-motor series elastic actuator

ActiveUS20120312114A1Reduce negative effectsEliminate backlashPortable liftingGearing detailsEngineeringActuator
Owner:RETHINK ROBOTICS

Plant functional combination for planting in arenaceous fluctuating zone of reservoir area

InactiveCN102177781AImproves cohesion and soil organic matter contentReduce negative effectsSeed coating/dressingFertilizer mixturesRosinMoisture
Owner:NINGBO INST OF TECH ZHEJIANG UNIV ZHEJIANG

System score coverage adjusting and optimizing method

PendingCN113836381AComprehensive coverageReduce negative effectsFinanceWeb data indexingSystem evaluationEngineering
Owner:广东南方信息安全研究院

Moxibustion device

Owner:THE FIRST AFFILIATED HOSPITAL OF WANNAN MEDICAL COLLEGE YIJISHAN HOSPITAL OF WANNAN MEDICAL COLLEGE

Pipeline robot with sizes of tires convenient to adjust

Owner:XIANGTAN HONGYUAN ELECTRONICS SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products