CN109344948A - A kind of intelligence password card and the garden safety management method using the card - Google Patents

A kind of intelligence password card and the garden safety management method using the card Download PDF

Info

Publication number
CN109344948A
CN109344948A CN201811276821.2A CN201811276821A CN109344948A CN 109344948 A CN109344948 A CN 109344948A CN 201811276821 A CN201811276821 A CN 201811276821A CN 109344948 A CN109344948 A CN 109344948A
Authority
CN
China
Prior art keywords
card
data
password card
module
visitor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811276821.2A
Other languages
Chinese (zh)
Inventor
尹峰
吴小凤
崔曙光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Big Data Research Institute
Original Assignee
Shenzhen Big Data Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Big Data Research Institute filed Critical Shenzhen Big Data Research Institute
Priority to CN201811276821.2A priority Critical patent/CN109344948A/en
Publication of CN109344948A publication Critical patent/CN109344948A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/0716Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips at least one of the integrated circuit chips comprising a sensor or an interface to a sensor
    • G06K19/0717Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips at least one of the integrated circuit chips comprising a sensor or an interface to a sensor the sensor being capable of sensing environmental conditions such as temperature history or pressure
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01CMEASURING DISTANCES, LEVELS OR BEARINGS; SURVEYING; NAVIGATION; GYROSCOPIC INSTRUMENTS; PHOTOGRAMMETRY OR VIDEOGRAMMETRY
    • G01C21/00Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00
    • G01C21/10Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00 by using measurements of speed or acceleration
    • G01C21/12Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00 by using measurements of speed or acceleration executed aboard the object being navigated; Dead reckoning
    • G01C21/16Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00 by using measurements of speed or acceleration executed aboard the object being navigated; Dead reckoning by integrating acceleration or speed, i.e. inertial navigation
    • G01C21/165Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00 by using measurements of speed or acceleration executed aboard the object being navigated; Dead reckoning by integrating acceleration or speed, i.e. inertial navigation combined with non-inertial navigation instruments
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N33/00Investigating or analysing materials by specific methods not covered by groups G01N1/00 - G01N31/00
    • G01N33/0004Gaseous mixtures, e.g. polluted air
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S19/00Satellite radio beacon positioning systems; Determining position, velocity or attitude using signals transmitted by such systems
    • G01S19/38Determining a navigation solution using signals transmitted by a satellite radio beacon positioning system
    • G01S19/39Determining a navigation solution using signals transmitted by a satellite radio beacon positioning system the satellite radio beacon positioning system transmitting time-stamped messages, e.g. GPS [Global Positioning System], GLONASS [Global Orbiting Navigation Satellite System] or GALILEO
    • G01S19/42Determining position
    • G01S19/45Determining position by combining measurements of signals from the satellite radio beacon positioning system with a supplementary measurement
    • G01S19/47Determining position by combining measurements of signals from the satellite radio beacon positioning system with a supplementary measurement the supplementary measurement being an inertial measurement, e.g. tightly coupled inertial
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/0723Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/28Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence

Landscapes

  • Engineering & Computer Science (AREA)
  • Remote Sensing (AREA)
  • Physics & Mathematics (AREA)
  • Radar, Positioning & Navigation (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Chemical & Material Sciences (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Food Science & Technology (AREA)
  • Pathology (AREA)
  • Immunology (AREA)
  • General Health & Medical Sciences (AREA)
  • Biochemistry (AREA)
  • Analytical Chemistry (AREA)
  • Medicinal Chemistry (AREA)
  • Combustion & Propulsion (AREA)
  • Automation & Control Theory (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)

Abstract

The present invention provides a kind of intelligent password card and its application methods.This intelligence password card includes password card ontology, current card chip, the intelligent apparatus integrated in current card chip, the intelligent apparatus includes RFID tag, locating module, MEMS gas sensor, wireless communication module, processor module and power supply unit, this password card can be according to the type of the vehicle or visitor that enter in garden, the intelligent password card of right competence is provided it, by intelligent password card, the scope of activities of vehicle or visitor in garden is limited.In addition to this, additionally it is possible to monitor the behavior of visitor using this intelligent password card and track the position of visitor.

Description

A kind of intelligence password card and the garden safety management method using the card
Technical field
The present invention relates to intelligent transportation and safety management fields, more specifically to a kind of intelligent password card and application The safety management method of the card.
Background technique
The social activities of the mankind has social concentration, is bunched work in daily social activities according to movable purpose Dynamic, reflection is exactly the movable various places of people, garden, community etc. in modern society.There are some closings or semiclosed property There are higher requirement, such as garden or some residential quarters, industrial park, unit garden in the garden of matter or community to safety management Etc..
But mankind's activity mobility with higher is needed again due to now social, no matter security requirement is more High garden always has population from other places and vehicle enters, and current management method is when nonnative personnel is in doorway gate sentry now After being registered, garden card (being applied to current most of university) or interim is provided to nonnative personnel by the administrative staff on doorway Password card is let pass and is entered.Then just the activity trajectory of visitor can not be limited or be monitored, garden password card still has Permission restriction effect (garden card is only held in such as current university can just enter library place) to a certain extent, it is interim logical The effect that row card just passes through only at front door.(in the description of the invention, garden includes that all need to be implemented peace for garden Garden, community, the place managed entirely, the including but not limited to places such as garden, industry park, office building, sight spot, hereinafter no longer do Illustrate) administrative staff what place has been gone in garden to visitor, if having unlawful practice that can not grasp completely, mostly Monitoring can only be transferred after meeting accident to check up on the facts in number situation, not have the safety management effect to prevent trouble before it happens.
In addition, most of garden has been carried out smoking ban now, whether visitor smokes in violation of rules and regulations after entering garden, safety Administrative staff can not also monitor completely, be currently that can only be managed by selective examination camera shooting and reports, and loophole is more, efficiency It is low, produce effects it is small.
In conclusion development need one kind of society can unique ID in interim or a period of time with visitor, such as identity The number bindings such as card number, license plate number, student's identity card can monitor motion profile of the visitor in garden convenient for carrying, and And the equipment whether visitor has unlawful practice and scope of activities of the visitor in garden is limited and set can be monitored Or device.
Summary of the invention
The object of the invention is that solving above-mentioned technical problem, a kind of intelligent password card, this password card and tradition are provided Password card adjoining dimensions, have it is small in size, lightly, it is portable the features such as.This password card can be according to the vehicle entered in garden Or the type of visitor, intelligent password card of right competence is provided it, by intelligent password card, vehicle is limited or visitor exists Scope of activities in school.In addition to this, additionally it is possible to monitor the behavior of visitor using this password card and track the position of visitor.
The purpose of foregoing invention is to be realized by the following technical solutions:
A kind of intelligence password card, including password card ontology and card chip of passing through, are integrated with intelligent apparatus in card chip of passing through, The intelligent apparatus includes:
A) RFID tag, each RFID tag have unique electronic code, are attached on password card ontology and identify the card;
B) locating module, and add associated peripheral circuits;
C) MEMS gas sensor incudes the concentration for the gas for needing to monitor in surrounding enviroment, when the concentration of the gas is super It crosses threshold value and issues signal to processor module, MEMS gas sensor has the features such as small in size, low energy consumption;
D) wireless communication module, for by being led between wireless network and telecommunication platform by data protocol News, transmit data to host computer;
E) processor module is used for preliminary treatment RFID tag, locating module, MEMS gas sensor and wireless telecommunications mould The data that the transmission of these component units of block comes, data fusion is transmitted and is then forwarded to host computer to wireless communication module;
F) power supply unit, for supplying electric power to each component units and processor module.
Preferably, RFID tag is read-write RFID tag.Read-write RFID tag application range is more extensive, and It economizes on resources, the password card for not needing to prepare in advance various permissions allows administrator to select when providing, but can be direct By equipment, information is written to RFID tag.
Further, the RFID tag is inductive coupling RFID tag or electromagnetic backscatter formula RFID tag. Both labels are small in size, and low energy consumption, especially suitable for the higher application of this portability requirements.
Preferably, the locating module be Inertial Measurement Unit, GPS positioning module, Beidou positioning module and front institute State the combination of one or more of wireless communication module.Inertial Measurement Unit (IMU) is a kind of electronic equipment, it uses acceleration Degree counts with the combination of gyroscope (there are also magnetometers sometimes) acceleration for measuring object, and angular speed, there are also around object sometimes Magnetic field.The IMU for being equipped with inertial navigation system (INS) is capable of providing to be believed independent of the short-term stability position of external environment Breath can be applied in vehicle location and visitor's tracking.But there are displacement error, proportional error and background white noise mistakes by IMU Difference, and error is constantly accumulated, so cannot be used for positioning for a long time.In outdoor, since we can obtain effectively GPS data, therefore GPS and IMU can be combined the advantage both given full play to and go to improve car tracing and positioning by we Precision and reliability.The advantage of IMU is to keep higher precision in a short time and not be affected by, and The advantage of GPS is that the absolute location information that it is provided can compensate the error that IMU is accumulated at any time to guarantee in long-time Positioning and tracking precision.Beidou positioning module is the supplement given to GPS positioning module, because at home, Beidou future Precision is tracked it is contemplated that GPS can be better than.After visitor enters the room, because building blocks, especially multiple wall Barrier, it is weak that GPS just will appear signal indoors, even no signal the case where, so be difficult to go to realize by GPS and IMU it is fixed Position.But wireless communication module can get RSSI value by scanning indoor AP access point, then merge RSSI information and IMU information goes to realize high accurately indoor visitor's tracking.So in this case, wireless communication module can not only be completed The function of data transmission is also used as a kind of locating module and is used for indoor auxiliary positioning.
Preferably, MEMS gas sensor is smoke from cigarette sensor or toxic gas sensor.MEMS
The gas that gas sensor can according to need monitoring is selected, and more there are commonly smoke from cigarette sensors (monitoring for the uncivil behaviors such as smoke to visitor), carbon monoxide (coal gas) sensor, fuel gas (such as gasoline) sensing Device (for that can prevent dangerous generation in some gardens for being easier to that toxic/pernicious gas leakage occurs) etc., can be it It is middle a kind of to be also possible to a variety of combinations.
Preferably, the processor is single-chip microcontroller, and said supply unit is rechargeable type battery.
Preferably, the switch for controlling each monitoring module is additionally provided on the password card.Since password card is card-shape Formula considers that the battery volume that power supply unit uses can not be very big for light and portable design, therefore, examines for economize on electricity Consider, have it is some need to carry whithin a period of time card (such as being made into garden card, student need to carry the several years), and user grow Phase activity can selectively close off one or several when not needing the safety zone of monitoring under the premise of administrator authorizes Functional module.
Using the safety management method of above-mentioned intelligent password card, including following operating procedure:
1) it initializes, it will be in password card in locating module, wireless communication module, MEMS gas sensor and processor module Data initialized;
2) it identifies, when user gets password card, administrator is by user's identity information input system and passage to be provided The RFID tag of card forms unique corresponding relation;
3) it is arranged, administrator carries out priority assignation to the card that user holds according to actual needs;
4) it uses, user gets the intelligent password card, enters the model allowed access into according to permission within the scope of garden It encloses;
5) monitoring, locating module and MEMS gas sensor are by the data transmission being collected into processor module, processor The data received are transferred to host computer by module, then by carrying out estimation trajectory track on host computer and to analyze periphery pernicious gas dense It whether exceeded spends;
6) it gives back, user's use finishes, and card is returned administrative office, by administrator's progress identity information unbundlings and initially Change.
Preferably, the method for trajectory track includes the following steps: in step 5) described in above-mentioned management method
I. start;
Ii. wireless locating module starts to receive data and sends the data to processor module;
Iii. the exercise data of visitor is merged and is packaged by processor module;
Iv. processor module is passed the exercise data in previous step back host computer by wireless communication module and is divided Analysis;
V. host computer calculates the motion profile of visitor according to exercise data;
Vi. terminate.
Preferably, the method for detection password card periphery harmful gas concentration includes in step 5) described in above-mentioned management method Following steps:
I. start;
Ii.MEMS gas sensor starts reception Data Concurrent and gives processor module;
Iii. processor module judges the harmful gas concentration of visitor's local environment or the concentration of smoke from cigarette gas is It is no exceeded, signal is sent to host computer if gas concentration value is exceeded;
Iv. host computer gives a warning according to the signal received to system manager;
V. terminate.
Compared with traditional password card, the invention has the beneficial effects that:
The card of only one built-in radio frequency identification (RFID) chip of traditional password card, cooperates the card reader of RFID For in garden visitor or vehicle is charged and access management, in addition to this without more functional attributes.And this The password card is invented, can go to determine position by locating module, the concentration of detection gas is gone with MEMS gas sensor, and Host computer is transmitted data to by wireless communication module to be further processed.This password card not only has lightly, portable etc. Feature, additionally it is possible to open for the visitor of different stage different right of access and scope of activities permission, and it is able to detect visit Behavior and position of the visitor in garden, this password card have great significance safely for maintenance garden.
In addition to this, this password card can be set in existing password card, and be designed using integrated modular, can be with It is made into close with existing password card size, it might even be possible to the production smaller special-shaped card of volume as needed, lightly, simply, just It takes, is widely used, it is easy to use.
Detailed description of the invention
Fig. 1 is the hardware realization block diagram of intelligent password card of the invention.
Fig. 2 is the flow chart of the embodiment of the present invention being tracked to vehicle or visitor.
Fig. 3 is whether the detection visitor of the embodiment of the present invention has the flow chart of cigarette smoking.
Specific embodiment
For a better understanding of the present invention, the present invention is done further in conjunction with specific embodiments below according to attached drawing It is bright.
Specific embodiment one as shown in Fig. 1, including password card ontology integrate in card chip of passing through with current card chip There is intelligent apparatus, which includes the RFID tag that there is sole electron to encode;GPS and inertance element locating module, this Locating module in specific embodiment is integrated with;MEMS gas sensor (i.e. smoke from cigarette sensor);Wireless network and long-range It is communicated between communication platform by data protocol, transmits data to the wireless communication module of host computer;For preliminary treatment The data that RFID tag, locating module, MEMS gas sensor and the transmission of these component units of wireless communication module come, carry out Send the processor module of signal after calculating to each component units respectively;For electric to each component units and processor module supply The power supply unit of power.
GPS and inertance element locating module, MEMS gas sensor, wireless communication module, processor module and power supply are single Member passes through circuit connection.
Specific embodiment two and specific embodiment one are the difference is that its locating module further includes Beidou positioning module And AP locating module.
Specific embodiment three and specific embodiment two the difference is that, MEMS gas sensor is that pernicious gas is examined Survey sensor.
The application method of specific embodiment one includes following several steps:
1) it initializes, by the number in locating module, wireless communication module, MEMS gas sensor and processor module in card According to being initialized;
2) it identifies, when user's card drawing, administrator is by the RFID of user's identity information input system and card to be provided Label forms unique corresponding relation;
3) it is arranged, administrator carries out priority assignation to the card that user holds according to actual needs;
4) it uses, user gets the intelligent password card, enters the model allowed access into according to permission within the scope of garden It encloses;
5) monitoring, locating module and MEMS gas sensor are by the data transmission being collected into processor module, processor The data received are transferred to host computer by module, then by carrying out estimation trajectory track on host computer and to analyze periphery pernicious gas dense It whether exceeded spends;
6) it gives back, user's use finishes, and card is returned administrative office, by administrator's progress identity information unbundlings and initially Change.
Wherein step 5) includes two sub-steps, and respectively trajectory track and pernicious gas detection, specific steps includes:
Trajectory track:
I. start;
Ii. wireless locating module starts to receive data and sends the data to processor module and judge that visitor is in room It is interior or outdoor;
Iii. the exercise data of visitor is merged and is packaged by processor module;
Iv. processor module is passed the exercise data in previous step back host computer by wireless communication module and is divided Analysis;
V. host computer calculates the motion profile of visitor according to exercise data;
Vi. terminate.
Pernicious gas detection:
I. start;
Ii.MEMS gas sensor starts reception Data Concurrent and gives processor module;
Iii. processor module judges whether the harmful gas concentration of visitor's local environment is exceeded, if gas concentration value is super Mark just sends signal to host computer;
Iv. host computer gives a warning according to the signal system administrator received
V. terminate.
It is described further below with several concrete application scenes in campus, especially campus: applied field Jing Yi, the temporary traffic card as campus security management
Step 1: when delivery vehicle enters campus, intelligent password card is provided to driver, in order to safeguard Campus Security And order in education, this intelligent password card cannot access students' dormitory region and teaching region.
In this example, when providing intelligent password card to driver, need to know driver into school purpose, thus The password card for having right competence is provided, in addition to this, after hair fastener, by devices such as the cameras of auxiliary, staff needs The information of the ID of the RFID tag of intelligent password card and driver are bound together into input system.
Step 2: all modules being initialized, GPS module starts to receive GPS data, and inertial positioning module starts to connect Inertial positioning data are received, wireless communication module starts to scan wireless aps and obtains RSSI value, and MEMS gas sensor starts to detect Aerosol gases concentration in air.
In actual operation, vehicle most of time is that traveling can be used in outdoor, GPS signal and inertial positioning data Vehicle is tracked, and wireless communication module may be obtained due to that can not find wireless aps access points less than RSSI Value.
Step 3: received exercise data and the packing of gas concentration data are transferred to wireless communication module by processor.
Step 4: received data is modulated into wireless signal by wireless network transmissions to upper by wireless communication module Machine.
In this application scene, wireless network can cover the full scope of school, therefore data can be realized reality substantially When transmission.Even if wireless communication module and wireless network disconnect suddenly, wireless telecommunications can also be temporarily stored data in In the included caching of module, it is connected to network and transfers data to host computer again.
Step 5: host computer calculates the track of vehicle driving according to the data received, and with the map in school It compares, looks at whether vehicle enters students' dormitory region or these regions for not having permission to enter such as region of imparting knowledge to students. It can be with the driving behavior of modeling analysis driver, vehicle uncultivated for some driving behaviors and driver, in order to safeguard campus Safety can limit it into campus.Finally when vehicle is driven out to campus, intelligent password card is recycled.
In this application scene, need that the driving trace of vehicle will be calculated by the map deposit system in campus in advance It is compared with the map in campus, mainly compares the content of two aspects, be on the one hand whether vehicle travels and having permission It is on the other hand exactly vehicle in the process of moving either with or without there is the case where lane change in scope of activities.Utilize inertial positioning module The data of collection can also judge the driving behavior of driver, can judge whether driver has anxious acceleration, emergency brake by the value of acceleration The behaviors such as vehicle judge whether the case where zig zag occurred by gyro data, can also be sentenced by time and motion profile It is disconnected situations such as hypervelocity, overspeed seriously, too long hypervelocity whether occur, to go the driving behavior for judging driver whether civilized.When It was found that school can arrange work after driver has uncultivated driving behavior or vehicle to enter the not scope of activities of permission Personnel remove interception car.For violating driver and vehicle as defined in school, it can give and alert, " black name is either added in fine The punishment measure such as list ".
Application scenarios two are used as Campus Security card:
Step 1: providing intelligent password card to students.
In this example, can provide an intelligent password card to each students, the information of each student and The ID value of the RFID tag of intelligent password card is bound together in input system.The password card of student is by oneself keeping and carries.
Step 2: when student leaves dormitory, all modules on password card are opened, GPS module starts to receive GPS data, Inertial positioning data start to receive inertial positioning data, and wireless communication module starts to scan wireless aps and obtains RSSI value, MEMS Gas sensor starts to detect the aerosol gases concentration in air.
In this application scene, dormitory is stayed in for a long time since student has, and dormitory is one comparatively safe Scene, therefore from the point of view of saving power consumption, it can be considered when dormitory and turn off module saving energy consumption, left in student Opening module when dormitory.So should be using the intelligent password card with module switch in this application scene.
Step 3: received exercise data packing is transferred to wireless communication module by processor.
Step 4: received data is modulated into wireless signal by wireless network transmissions to upper by wireless communication module Machine.
In this example, wireless network can cover the full scope of school, therefore data can be realized in real time substantially Transmission.Even if wireless communication module and wireless network disconnect suddenly, wireless communication module can also be temporarily stored data in In included caching, it is connected to network and transfers data to host computer again.
Step 5: host computer calculates motion profile and the current location of student, and modeling analysis using the data received Whether the current state of student is in abnormality.
In this application scene, GPS data, the RSSI number that inertial positioning data and wireless communication module receive can be used According to removing motion profile of the tracking student in campus.It needs in advance by the map deposit system of school, by the movement rail of student Mark and map compare, and whether the state for detecting student is abnormal.For example, showing the position there are also student in morning, in system The abnormal areas such as mountain after resting on the lakeside in campus either, this when, school can arrange work personnel according to system The position data that middle return comes looks for student.
Application scenarios three carry out access management to the visitor for entering books:
Step 1: when visitor enters campus library, providing intelligent password card to visitor, the permission of this password card should wrap Region containing books, that is to say, that this password card can open the access control system in library.
In this example, library is a valuable source of school, and not all visitor has permission can be into Enter, staff is also required to for the RFID tag number of the information of visitor and password card being bundled in when providing intelligent password card Together in input system, visitor needs to hand over certain cash pledge when getting intelligent password card or detains certificate.
Step 2: inertial positioning module starts to receive inertial positioning data, and wireless communication module starts to scan wireless aps and obtain RSSI value is taken, sensor starts to detect the aerosol gases concentration in air.
In this application scene, library is an indoor environment and is smoking ban, can use receive it is used Property location data and the RSSI data of wireless communication module scanning wireless aps access point visitor is positioned, while gas passes Sensor starts the aerosol gases concentration value of detection.
Step 3: received exercise data and the packing of aerosol gases concentration data are transferred to wireless telecommunications by processor Module.
Step 4: received data is modulated into wireless signal by wireless network transmissions to upper by wireless communication module Machine.
The scene of this application scene is in library, and most of library is all covered with wireless network, therefore number According to host computer can be transferred in real time.
Step 5: host computer receives exercise data and aerosol gases concentration data, and whether establishes model analysis visitor There is cigarette smoking, when cigarette smoking occurs in visitor, according to obtained exercise data, determines the current position of visitor, find visit The customized cigarette smoking for stopping him.
In this application scene, detection visitor whether have cigarette smoking, be transmitted back to according to gas sensor come smog Gas concentration judgement, if the gas concentration detected is greater than pre-set threshold value, then it is assumed that visitor has cigarette smoking, if The gas concentration of detection is less than threshold value, then it is assumed that visitor does not have cigarette smoking.According to be transmitted back to come exercise data, we can be with The position that visitor is presently in is calculated in real time.When detecting that visitor has cigarette smoking, library can send work people immediately Member finds visitor and prevents his cigarette smoking.
Step 6: when visitor leaves library, recycling intelligent password card.
In this application scene, the information of password card and visitor bind together and record in systems, work as visitor Library is left, library's entrance guard cannot be opened by occurring people's card information inconsistent situation when giving back password card.Except this it It outside, can be by these behaviors when having behavior as defined in uncultivated or violation library in library as visitor It is added in the record of visitor, plot dislikes the inferior and " blacklist " is added.
Application scenarios four, management enter visitor's behavior on campus public domain (such as playground):
Step 1: providing intelligent password card to the visitor outside school for entering playground.
Highland of the school as spiritual civilization construction, adheres to the principle of resource-sharing, and the playground of many colleges and universities is for society Meeting personnel open.But it during actually open, can but lead to the problem of, main problem has following three points: visitor It makes a racket on playground, upsets campus order;Visitor has smoking during using playground, the uncultivated row such as throw away rubbish freely For;In peak period, visitor and student, teaching and administrative staff take exercise together, are easy to produce place disagreement.In order to preferably realize to playground Social safety is safeguarded in management, be can use intelligent password card and is managed to the visitor outside school for entering playground.In this example, The visitor outside school that playground can be entered to each provides an intelligent password card, staff provide intelligent password card when Time is also required to bind together the RFID tag number of the information of visitor and password card in input system, and visitor gets intelligent passage It needs to hand over certain cash pledge when card or detains certificate.
Step 2: all module initializations of intelligent password card simultaneously start to receive exercise data and gas concentration data, will count According to being transferred to processor.
In recent years, " malicious playground " event takes place frequently, using the gas sensor on password card, cigarette cigarette not only can detecte The concentration of fog body can also detect the concentration of toxic gases value in playground.
Step 3: received exercise data and the packing of gas concentration data are transferred to wireless communication module by processor.
Step 4: received data is modulated into wireless signal by wireless network transmissions to upper by wireless communication module Machine.
In this example, wireless network can cover the full scope of school, therefore data can be realized in real time substantially Transmission.Even if wireless communication module and wireless network disconnect suddenly, wireless communication module can also be temporarily stored data in In included caching, it is connected to network and transfers data to host computer again.
Step 5: host computer can monitor the number on playground, additionally it is possible to detect according to the data received in real time The administrative staff of the behavior of visitor, playground in real time can manage playground according to the data received.
In this application scene, we can receive the information of each password card, therefore we can see in systems To the number for using playground, if number is excessive, a control can be carried out to the stream of people for entering playground.It is passed by MEMS gas Sensor, whether we can detecte has the toxic gas of cigarette smoking and playground exceeded.In addition to this, due in system In have each enter playground visitor message, when find visitor have uncultivated behavior when, we not only can be according to fortune His behavior is prevented in the position that dynamic rail mark tracks visitor in real time, and the " black of campus can also be added in systems in he by us List ".
Step 6: recycling intelligent password card, people's card information must be consistent when recycling intelligent password card.
Application scenarios five, the smart card as the motion profile of record student in school use:
Step 1: providing intelligent password card to student.
In real life, some students wish to know oneself motion profile during school, analyze oneself during school Behavioural habits, to realize better self-management.For this part of classmate, we can be in the agreement for soliciting them Afterwards, intelligent password card, round-the-clock their motion profile of tracking are provided to them.The information and intelligence of each student is current The ID value of the RFID tag of card is bound together in input system.
Step 2: when student moves in campus, opening all modules on password card, GPS module starts to receive GPS Data, inertial positioning data start to receive inertial positioning data, and wireless communication module starts to scan wireless aps and obtains RSSI value.
It is to stay in dormitory since student has for a long time in this application scene, library, teaching building, the areas such as gymnasium Domain, they it is only necessary to know that they stopped in these regions how long and theirs in school motion track, therefore From the point of view of saving power consumption, it can be considered when inside these regions and turn off module saving energy consumption, only work as student Ability opening module when movement in campus.So should be current using the intelligence with module switch in this application scene Card.
Step 3: received exercise data packing is transferred to wireless communication module by processor.
Step 4: received data is modulated into wireless signal by wireless network transmissions to upper by wireless communication module Machine.
In this example, wireless network can cover the full scope of school, therefore data can be realized in real time substantially Transmission.Even if wireless communication module and wireless network disconnect suddenly, wireless communication module can also be temporarily stored data in In included caching, it is connected to network and transfers data to host computer again.
Step 5: host computer is using the motion profile of the data calculating student received and current location and is stored in database.
In this application scene, it would be desirable to calculate the motion profile of student, and corresponding data are stored in number According in library, student can download oneself motion profile during school by account, and carry out deeper analysis and summary, To achieve the purpose that self-management.
The above description is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all utilizations Equivalent structure or equivalent flow shift made by description of the invention and accompanying drawing content, be applied directly or indirectly in except campus with Outer other environment, are included within the scope of the present invention.

Claims (10)

1. a kind of intelligence password card, including password card ontology and card chip of passing through, are integrated with intelligent apparatus in card chip of passing through, Be characterized in that: the intelligent apparatus includes:
A) RFID tag, each RFID tag have unique electronic code, are attached on password card ontology and identify the card;
B) locating module, and add associated peripheral circuits;
C) MEMS gas sensor incudes the concentration for the gas for needing to monitor in surrounding enviroment, when the concentration of the gas reaches threshold Value issues signal to processor module;
D) wireless communication module, for passing by being communicated between wireless network and telecommunication platform by data protocol Transmission of data is to host computer;
E) processor module, for preliminary treatment RFID tag, locating module, gas sensor and wireless communication module these The data that component units transmission comes, data fusion is transmitted and is then forwarded to host computer to wireless communication module;
F) power supply unit, for supplying electric power to each component units and processor module.
2. intelligence password card according to claim 1, it is characterised in that: the RFID tag is that read-write RFID is marked Label.
3. intelligence password card according to claim 2, it is characterised in that: the RFID tag is inductive coupling RFID mark Label or electromagnetic backscatter formula RFID tag.
4. intelligence password card according to claim 1, it is characterised in that: the locating module is Inertial Measurement Unit, GPS The combination of one or more of locating module, Beidou positioning module and the wireless communication module.
5. intelligence password card according to claim 1, it is characterised in that: the MEMS gas sensor is smoke from cigarette biography Sensor or toxic gas sensor.
6. intelligence password card according to claim 1, it is characterised in that: the processor is single-chip microcontroller, and the power supply is single Member is rechargeable type battery.
7. the safety management method of intelligence password card according to any one of claims 1 to 6, it is characterised in that: described logical The switch for controlling each module is additionally provided on row card.
8. a kind of safety management method using intelligent password card as claimed in claim 7, it is characterised in that: the management method Including following operating procedure:
1) initialize, by the data in card interior locating module, wireless communication module, MEMS gas sensor and processor module into Row initialization;
2) it identifies, when user's card drawing, administrator is by the RFID of user's identity information input system and password card to be provided Label forms unique corresponding relation;
3) it is arranged, administrator carries out priority assignation to the card that user holds according to actual needs;
4) it uses, user gets the intelligent password card, enters the range allowed access into according to permission within the scope of garden;
5) monitoring, locating module and MEMS gas sensor are by the data transmission being collected into processor module, processor module The data received are transferred to host computer, then trajectory track is carried out by host computer and analyzes periphery harmful gas concentration or cigarette cigarette Whether mistiness degree is exceeded;
6) it gives back, user's use finishes, and gives back card to administrative office, carries out identity information unbundlings and initialization by administrator.
9. safety management method according to claim 8, it is characterised in that: the method packet of trajectory track in the step 5) Include following steps:
I. start;
Ii. wireless locating module starts to receive data and sends the data to processor module and judge that visitor is gone back in indoor It is outdoor;
Iii. the exercise data of visitor is merged and is packaged by processor module;
Iv. processor module is passed the exercise data in previous step back host computer by wireless communication module and is analyzed;
V. host computer calculates the motion profile of visitor according to exercise data and analyzes the behavior of visitor;
Vi. terminate.
10. safety management method according to claim 8, it is characterised in that: detect password card periphery in the step 5) The method of harmful gas concentration includes the following steps:
I. start;
Ii.MEMS gas sensor starts reception Data Concurrent and gives processor module;
Iii. processor module judges whether the harmful gas concentration of visitor's local environment or the concentration of smoke from cigarette gas surpass Mark sends signal to host computer if gas concentration value is exceeded;
Iv. host computer gives a warning according to the signal received to system manager;
V. terminate.
CN201811276821.2A 2018-10-30 2018-10-30 A kind of intelligence password card and the garden safety management method using the card Pending CN109344948A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811276821.2A CN109344948A (en) 2018-10-30 2018-10-30 A kind of intelligence password card and the garden safety management method using the card

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811276821.2A CN109344948A (en) 2018-10-30 2018-10-30 A kind of intelligence password card and the garden safety management method using the card

Publications (1)

Publication Number Publication Date
CN109344948A true CN109344948A (en) 2019-02-15

Family

ID=65311212

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811276821.2A Pending CN109344948A (en) 2018-10-30 2018-10-30 A kind of intelligence password card and the garden safety management method using the card

Country Status (1)

Country Link
CN (1) CN109344948A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110335424A (en) * 2019-03-20 2019-10-15 特斯联(北京)科技有限公司 Community's blocking card integrated machine equipment and production method based on self-service authentication
CN113643167A (en) * 2020-05-11 2021-11-12 台达电子工业股份有限公司 Security monitoring method with track tracking, prediction and dwell time monitoring functions
CN113869159A (en) * 2021-09-16 2021-12-31 泰州蝶金软件有限公司 Cloud server data management system
CN114677792A (en) * 2022-03-26 2022-06-28 广西安讯科技股份有限公司 Intelligent park remote monitoring method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202870864U (en) * 2012-10-31 2013-04-10 新疆中钜电子科技有限公司 A positioning orientation and security facility identification apparatus used in sealed environment
WO2014169393A1 (en) * 2013-04-18 2014-10-23 Mcdowell Aidan Security switch for an rfid token
CN205721881U (en) * 2016-04-14 2016-11-23 深圳市欣华天泰信息技术有限公司 A kind of smart card apparatus based on multiple positioning modes
CN206224563U (en) * 2016-11-28 2017-06-06 Tcl集团股份有限公司 A kind of RFID label tag with smell sensor
CN206657373U (en) * 2017-05-04 2017-11-21 有爱科技(深圳)有限公司 Smart card

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202870864U (en) * 2012-10-31 2013-04-10 新疆中钜电子科技有限公司 A positioning orientation and security facility identification apparatus used in sealed environment
WO2014169393A1 (en) * 2013-04-18 2014-10-23 Mcdowell Aidan Security switch for an rfid token
CN205721881U (en) * 2016-04-14 2016-11-23 深圳市欣华天泰信息技术有限公司 A kind of smart card apparatus based on multiple positioning modes
CN206224563U (en) * 2016-11-28 2017-06-06 Tcl集团股份有限公司 A kind of RFID label tag with smell sensor
CN206657373U (en) * 2017-05-04 2017-11-21 有爱科技(深圳)有限公司 Smart card

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110335424A (en) * 2019-03-20 2019-10-15 特斯联(北京)科技有限公司 Community's blocking card integrated machine equipment and production method based on self-service authentication
CN110335424B (en) * 2019-03-20 2020-07-21 特斯联(北京)科技有限公司 Community card-making and card-making integrated machine equipment based on self-service identity authentication and making method
CN113643167A (en) * 2020-05-11 2021-11-12 台达电子工业股份有限公司 Security monitoring method with track tracking, prediction and dwell time monitoring functions
CN113869159A (en) * 2021-09-16 2021-12-31 泰州蝶金软件有限公司 Cloud server data management system
CN114677792A (en) * 2022-03-26 2022-06-28 广西安讯科技股份有限公司 Intelligent park remote monitoring method and system

Similar Documents

Publication Publication Date Title
CN109344948A (en) A kind of intelligence password card and the garden safety management method using the card
CN103489291B (en) A kind of integrated safety-protection system of comprehensive intelligent wireless
CN111552216A (en) Construction site intelligent supervision system based on 5G
CN113298444A (en) Private cloud-based intelligent power safety control platform
CN103248534A (en) Safeguard system for kindergarten
CN113408683A (en) Construction site safety supervision method and system
CN101496074A (en) Device and method for detecting suspicious activity, program, and recording medium
CN111383132A (en) Intelligent construction site management system and management method suitable for epidemic situation period
CN110349360B (en) Building window area defense system and monitoring method
CN106899827A (en) Image data acquiring, inquiry, video frequency monitoring method, equipment and system
CN111932757A (en) Intelligent building site in-out personnel identity information acquisition system based on Internet of things
CN107045782A (en) Intelligent transportation managing and control system differentiation allocates the implementation method of route
CN106485631A (en) Municipal public safety based on technology of Internet of things and automatic rescue method and system
CN108898520A (en) Safety of student monitoring method and system based on track data
CN205792652U (en) A kind of intelligence community based on Internet of Things management system
CN110751774A (en) Location sharing system based on intra-block security verification and wireless positioning
CN109636986A (en) Management-control method, system and the car-mounted device of vehicle in a kind of garden
CN109308670A (en) The substation safety management-control method of Behavior-based control prediction
CN108805243A (en) It is a kind of that system is managed based on the intelligent and safe of Internet of Things and ultrahigh frequency RFID
CN109616107A (en) A kind of voice management system based on ultra wide band
CN115940408A (en) Transformer substation operation safety management and control system and method based on indoor and outdoor fusion positioning
CN106127894B (en) A kind of intelligent video analysis system
CN104269061B (en) Yellow label car detection and management system and detection and management method based on network
Alshahrany et al. WSN and RFID integration to support intelligent monitoring in smart buildings using hybrid intelligent decision support systems
CN117373237A (en) Digital park intelligent vehicle management method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190215

RJ01 Rejection of invention patent application after publication