Ultrahigh frequency RFID key alarm system

An alarm system and RFID tag technology, applied in the field of key alarm systems, can solve the problems that the key chain is easy to drop in places that are not easy to see, it is difficult to find the key, and the key is easy to be lost or stolen, so as to avoid the inconvenience of life , easy to expand, and low power consumption

Inactive Publication Date: 2016-03-23
HENAN MECHANICAL & ELECTRICAL ENG COLLEGE
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002]In daily life, it often happens that the key is forgotten on the door or looking for the key everywhere. The size is very small, even the key chain is easy to drop in places that are not easy to see, and the keys are easy to lose or be stolen when you are out of the house
In order to prevent theft and find keys, there are two schemes on the market to track and record keys. The first is to use a keychain that integrates GSM, GPS, GIS, Bluetooth and other functions to track keys in real time through wireless signals. Although this method is powerful, there are four reasons that will cause inconvenience in life: one is that the keychain is widely known, and the person who gets the key will directly throw away the keychain; the other is the accuracy of tracking and positioning due to technical limitations. In a small complex environment such as a home, it is not easy to find the key; the third is that this solution needs to replace the small battery regularly, because the power required to send location information is a lot; the fourth is the cost, in order to use the GSM network, you need to buy a mobile phone card and use a mobile phone Serve
The second is to use high-frequency RFID technology to design key management boxes. This method is to place high-frequency RFID readers at various locations in an internal environment. When the key appears within the range of the reader, the reader automatically Read and upload the read time, in this way to track the path of the key, but this method also has two disadvantages: one is that this method can only be carried out in a closed environment, and the other is to place as many read keys as possible. Extractor, high cost, poor practicability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ultrahigh frequency RFID key alarm system
  • Ultrahigh frequency RFID key alarm system
  • Ultrahigh frequency RFID key alarm system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0012] Example 1. like figure 1 As shown, it consists of two parts: UHF RFID tag and RFID reader. The UHF RFID tag uses a passive UHF RFID tag. The passive UHF RFID tag is pasted on the key handle. The RFID reader uses SD card type RFID reader, the RFID reader is placed in the SD card slot of the mobile phone. like image 3 As shown, a door lock alarm module, a location alarm module and an alarm control module are installed in the mobile phone, the door lock alarm module and the location alarm module are connected to the alarm control module, and the alarm control module is connected to the RFID reader; The alarm module is respectively provided with a vibration alarm device, a sound alarm device and a flashing alarm device.

[0013] Working principle: The present invention can realize two functions: one is door lock alarm; The realization of its function is based on the judgment of the signal strength between the RFID reader and the UHF RFID electronic tag. When the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an ultrahigh frequency RFID key alarm system which is constituted of an ultrahigh frequency RFID label and an RFID reader, wherein the ultrahigh frequency RFID label is firmly connected on a key handle; the RFID reader is placed in a mobile phone card slot; a door locking alarm module, a positioning alarm module and an alarm control module are installed in a mobile phone; and a vibration alarm device, a sound alarm device and a flicker alarm device are respectively disposed in the door locking alarm module and the positioning alarm module. The system disclosed by the invention is characterized in that the system is based on an ultrahigh frequency RFID technology; a distance between the mobile phone and a key is determined through reading of strength of energy of a signal between the RFID reader and the ultrahigh frequency RFID label, so that corresponding alarming is realized; and the system is characterized by low cost, simple, practical and convenient utilization, and rapid operations, etc.

Description

technical field [0001] The invention relates to a key alarm system, in particular to a simple and practical ultra-high frequency RFID key alarm system. Background technique [0002] In daily life, it often happens that you forget the key on the door or look for the key everywhere. For example, you locked the door because you were in a hurry to go to work but forgot to remove the key. Because the size of the key is very small, even the key chain is easy to fall out of sight. Wherever you go, keys are easily lost or stolen. In order to prevent theft and find keys, there are two schemes on the market to track and record keys. The first is to use a keychain that integrates GSM, GPS, GIS, Bluetooth and other functions to track keys in real time through wireless signals. Although this method is powerful, there are four reasons that will cause inconvenience in life: one is that the keychain is widely known, and the person who gets the key will directly throw away the keychain; the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G08B21/24G06K17/00
CPCG08B21/24G06K17/00
Inventor 左阳梁萍左玲
Owner HENAN MECHANICAL & ELECTRICAL ENG COLLEGE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products