Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Open RFID access control system and its processing method for access detection

An access control system and RFID tag technology, applied in the field of open RFID access control systems, can solve problems such as restricting access control throughput efficiency, unfavorable personnel experience, and limited throughput, and achieve the effects of eliminating physical constraints, optimizing personnel experience, and saving time

Active Publication Date: 2020-04-17
NANJING UNIV
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, most access control systems rely on access control cards and gates. When people pass through the access control, they need to go through a series of complex and time-consuming processes such as stopping to take cards, swiping cards, waiting for gates to open, gates to open, and fast passage.
In addition, the existing access control only allows one object to pass through at a time, and the throughput is very limited, especially for access control oriented to a large number of objects (such as: stadium access control, concert access control), this serialization method will seriously restrict the throughput efficiency of access control. Not conducive to human experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Open RFID access control system and its processing method for access detection
  • Open RFID access control system and its processing method for access detection
  • Open RFID access control system and its processing method for access detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0067] The invention discloses an open RFID access control system for access detection, such as figure 1 with figure 2 As shown, this embodiment includes access control left device 1, access control right device 2, RFID reader, No. 1 antenna 3, No. 2 antenna 4, No. 3 antenna 5, No. 4 antenna 6, RFID tag 7, and No. 1 antenna Antennas No. 2 and No. 3 are located at the A side of the access control, and Antennas No. 2 and No. 4 are located at the B side of the access control.

[0068] The access control system consists of two parts: RFID signal acquisition equipment and background server. Among them, the RFID signal acquisition device is composed of an RFID reader and an antenna, and the background server is divided into two parts: an algorithm for determining the direction of access control and a display interface. The functions of each part are as follows:

[0069] RFID reader: connected to an external antenna, feeds back the read tag signal to the background server in real...

Embodiment 2

[0089] This embodiment combines Figure 4 , Figure 5 The access control entry and exit judgment algorithm is described.

[0090] Figure 5 The circle pattern and the triangle pattern represent the tag signals that have been classified according to the antenna port number, and the EPC number of the tag is epc 1 . Among them, the circle pattern represents the tag signal read by the antenna at the A-end, and the triangle pattern represents the tag signal read by the antenna at the B-end. The total time T corresponding to the tag signal sequence is 590 ms. The classified data is divided into 6 segments with a time period of 100ms. For the A-end antenna, there are triplets in segments 1, 2, 3, 4, and 5, that is, there are corresponding feature triplets in segments 1, 2, 3, 4, and 5. For the B-end antenna, there are triplets in segments 2, 3, 4, and 6, that is, there are corresponding feature triplets in segments 2, 3, 4, and 6. Taking the first segment of the antenna at end A...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed are an open-type RFID entrance guard system for access detection and a handling method therefor. The system mainly comprises an RFID reader, an antenna, a tag and a background server. The operating method thereof is: respectively deploying two antennas having a certain angle included therebetween inside a device at both sides of an entrance guard channel, both of which are connected to the RFID reader, wherein the antenna receives a signal reflected by an RFID tag carried by an object accessing the entrance guard, and time periods during which the antennas at both ends of the entrance guard receive the reflected signal are different, and by using such a characteristic, determining and recording and displaying entering and exiting behaviours of personnel in the entrance guard system in real time. The present invention applies RFID technology to an open-type entrance guard system, which can automatically recognize entering and exiting behaviours when a person accesses the entrance guard, without the need for arranging a wing gate or contact-type recognition, thereby greatly improving the efficiency of entrance guard access of personnel.

Description

technical field [0001] The invention relates to the technical field of RFID, in particular to an open RFID access control system for access detection and a processing method thereof. Background technique [0002] RFID (Radio Frequency Identification) technology is an automatic identification technology based on wireless communication technology. Its basic principle is to use the radio frequency signal and space coupling transmission characteristics to automatically identify the information carried by the identified object. Its biggest advantage is non-contact Recognition, and can identify high-speed moving objects, identify multiple targets. RFID technology is currently being more and more widely used in various industries, including supply chain management, warehouse inventory, electronic payment, security access control, target monitoring and tracking, etc. [0003] At present, most access control systems rely on access control cards and gates. When people pass through th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06K17/00G07C9/20
CPCG06K17/0029G07C9/20
Inventor 刘佳陈力军张晓聪严颖丽陈星宇黄嘉琪李珍珠郁裕杰荀凯
Owner NANJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products