RFID technology-based historic building monitoring and protecting system and method

A technology of monitoring protection and RFID tags, which is applied in the field of monitoring and protection systems of ancient buildings based on RFID technology, can solve the unfavorable problems of unification of ancient architectural styles, high price, and large volume, and achieve the effect of maintaining a complete appearance

Inactive Publication Date: 2015-04-22
SUZHOU UNIV
5 Cites 1 Cited by

AI-Extracted Technical Summary

Problems solved by technology

Both types of tags have their own advantages and disadvantages: Generally speaking, passive tags are cheap and small in size, but have a shorter transmission distance and smaller memory capacity; while active tags have a longer transmission distanc...
View more

Method used

[0024] In the present embodiment, the RFID tag is a passive RFID tag, which has the advantage of being small in size, will not destroy the coordination and unity of the ancient architectural style, and has a metal coil, which generates electric energy through electromagnetic induction and supplies its own electric energy consumption. In ancient buildings, an RFID tag is installed at a certain distance, and it is used as a node to monitor the condition of ancient buildings within a certa...
View more

Abstract

The invention provides an RFID technology-based historic building monitoring and protecting system and method. The system comprises an acquisition device, a reader, a server and a client, wherein the acquisition device is wirelessly connected with the reader in short range; the reader and the client are respectively connected with the server; the acquisition device is arranged on a historic building and comprises a sensor module and an RFID tag; and the sensor module is connected with the RFID tag.

Application Domain

Measurement devicesCo-operative working arrangements

Technology Topic

Embedded systemProtection system

Image

  • RFID technology-based historic building monitoring and protecting system and method
  • RFID technology-based historic building monitoring and protecting system and method

Examples

  • Experimental program(1)

Example Embodiment

[0021] Hereinafter, the present invention will be described in detail with reference to the drawings and in conjunction with the embodiments. It should be noted that the embodiments in the application and the features in the embodiments can be combined with each other if there is no conflict.
[0022] figure 1 It is a schematic diagram of an ancient building monitoring and protection system based on RFID technology provided by a preferred embodiment of the present invention. Such as figure 1 As shown, the ancient building monitoring and protection system based on RFID technology provided by the preferred embodiment of the present invention includes a collection device 1, a reader 2, a server 3, and a client 4. The collection device 1 is connected to the reader 2 in a short-range wireless manner. The reader 2 and the client 4 are connected to the server 3 respectively. Wherein, the collection device 1 is installed on an ancient building and includes a sensor module 11 and an RFID tag 12, and the sensor module 11 is connected to the RFID tag 12.
[0023] Specifically, the sensor module includes a temperature sensor, a humidity sensor, a pressure sensor, and a level sensor. Among them, the temperature sensor refers to a sensor that can sense temperature and convert it into a usable output signal. It is divided into two categories: contact type and non-contact type. The temperature sensor described in this embodiment is a contact type temperature sensor to sense the temperature of ancient buildings. The change. The humidity sensor covers a specific part with a film made of moisture-sensitive material. When water vapor in the air is adsorbed on the moisture-sensitive film, the resistivity and resistance value of the element will change, that is, the output of the sensor will change. When changes occur, this feature can be used to measure the humidity of ancient buildings. In this embodiment, both the pressure sensor and the level sensor adopt existing products, and their working principles are already mature technologies in the industry, so they will not be detailed here.
[0024] In this embodiment, the RFID tag is a passive RFID tag, which has the advantage of being small in size and will not disrupt the harmony and unity of the ancient architectural style, and it has a metal coil that generates electrical energy through electromagnetic induction to supply its own electrical energy consumption. In ancient buildings, an RFID tag is installed every certain distance, which is used as a node to monitor the condition of ancient buildings within a certain range. The RFID tag can accept the physical information collected by the sensor, has a certain on-site storage capacity, and regularly sends the tag ID number and ancient building information to the reader. In addition, in order to protect architectural cultural relics, the reader will be placed outside the ancient building (within the range of 300m to 600m from the ancient building), with a built-in 3G communication interface, which can be connected to the mobile communication network upward.
[0025] figure 2 It is a flowchart of an ancient building monitoring and protection method based on RFID technology provided by a preferred embodiment of the present invention. Such as figure 2 As shown, the method for monitoring and protecting ancient buildings based on RFID technology provided by a preferred embodiment of the present invention includes steps S1 to S3.
[0026] Step S1: The RFID tag stores the ancient building physical data collected by the sensor module and sends the information to the reader.
[0027] Specifically, in this step, the information sent by the RFID tag includes the ID of the RFID tag and the ancient building physical data collected by the sensor module. The physical data includes temperature, humidity, pressure-bearing data and tilt angles of ancient buildings.
[0028] Step S2: The reader forwards the information to the server, and the server parses the information to determine whether the state of the ancient building is abnormal.
[0029] Specifically, the client logs in to the server to set thresholds for various indicators of ancient buildings, and when the server determines that the indicators in the received information exceed the thresholds, an alarm is sent to the client. Here, the thresholds of various indicators include corresponding temperature, humidity, pressure, and tilt angle thresholds. If the server judges that the state of the ancient building is normal, the server continues to wait for the next message sent by the reader.
[0030] Step S3: If yes, the server initiates an alarm to the client.
[0031] Specifically, the client can realize 24-hour uninterrupted monitoring of ancient buildings based on real-time alarms from the server. This avoids a series of serious problems caused by maintenance personnel who ignore the poor drainage of ancient buildings, realizes that no manual intervention is required, and greatly reduces the cost of monitoring and maintenance of ancient buildings.
[0032] In summary, according to the ancient building monitoring and protection system and method based on RFID technology provided by the preferred embodiment of the present invention, the physical data of the ancient building is collected in real time by installing RFID tags and different sensors on the ancient building to be monitored, and It is sent to the server, and when the server judges that the state of the building is abnormal according to its stored threshold, it sends an alarm message to the client. In this way, it solves the problem that the inner cable of the ancient building affects its classical atmosphere and the monitoring and protection cannot have both.
[0033] The foregoing description of the disclosed embodiments enables those skilled in the art to implement or use the present invention. Various modifications to these embodiments will be obvious to those skilled in the art, and the general principles defined in this document can be implemented in other embodiments without departing from the spirit or scope of the present invention. Therefore, the present invention will not be limited to the embodiments shown in this document, but should conform to the widest scope consistent with the principles and novel features disclosed in this document.

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.

Similar technology patents

Packaging combination

InactiveCN102765523Aincrease material costkeep the full look
Owner:DARWIN PRECISIONS CORP

Classification and recommendation of technical efficacy words

  • keep the full look

Packaging combination

InactiveCN102765523Aincrease material costkeep the full look
Owner:DARWIN PRECISIONS CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products