CN116167399B - Secret-related carrier terminal in-situ monitoring method and system - Google Patents
Secret-related carrier terminal in-situ monitoring method and system Download PDFInfo
- Publication number
- CN116167399B CN116167399B CN202310403048.6A CN202310403048A CN116167399B CN 116167399 B CN116167399 B CN 116167399B CN 202310403048 A CN202310403048 A CN 202310403048A CN 116167399 B CN116167399 B CN 116167399B
- Authority
- CN
- China
- Prior art keywords
- carrier terminal
- confidential
- rfid tag
- auxiliary device
- confidential carrier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 238000012544 monitoring process Methods 0.000 title claims abstract description 28
- 238000011065 in-situ storage Methods 0.000 title description 4
- 238000003860 storage Methods 0.000 claims abstract description 33
- 230000002159 abnormal effect Effects 0.000 claims abstract description 19
- 230000000007 visual effect Effects 0.000 claims description 11
- 238000005259 measurement Methods 0.000 claims description 4
- 239000000969 carrier Substances 0.000 description 2
- 206010063385 Intellectualisation Diseases 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000000691 measurement method Methods 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
- G06K17/0025—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01C—MEASURING DISTANCES, LEVELS OR BEARINGS; SURVEYING; NAVIGATION; GYROSCOPIC INSTRUMENTS; PHOTOGRAMMETRY OR VIDEOGRAMMETRY
- G01C21/00—Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00
- G01C21/005—Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00 with correlation of navigation data from several sources, e.g. map or contour matching
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S5/00—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
- G01S5/02—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
- G01S5/0273—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves using multipath or indirect path propagation signals in position determination
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S5/00—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
- G01S5/02—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
- G01S5/06—Position of source determined by co-ordinating a plurality of position lines defined by path-difference measurements
Landscapes
- Engineering & Computer Science (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Automation & Control Theory (AREA)
- Burglar Alarm Systems (AREA)
Abstract
The invention discloses an on-site monitoring method and system of a confidential carrier terminal, and relates to the technical field of safety management systems; acquiring image information of a storage area of a secret related carrier terminal in real time; the access information of the confidential carrier terminal in the set range is obtained by using a fixed reader arranged at an access opening of the confidential carrier terminal storage area; when the access information is abnormal, determining an active area of a corresponding secret-related carrier terminal according to the access information; in the active area, according to the measured signal intensity of auxiliary equipment with a known position received by a receiver, determining the position relation between an RFID tag on a confidential carrier terminal and the auxiliary equipment by using an RSSI ranging method; and positioning the confidential carrier terminal according to the position relation. The invention can realize the automatic intelligent management of the full life cycle of the secret related carrier terminal.
Description
Technical Field
The invention relates to the technical field of security management systems, in particular to a secret-related carrier terminal in-place monitoring method and system.
Background
The current security situation is increasingly severe. The types and the number of the confidential carriers used in the development process of modern enterprises are also large, and the confidential carriers mainly comprise U discs, mobile hard discs, notebook computers, paper materials and the like. In daily work, a large amount of data information related to enterprises is generated and stored. At present, the management of the secret-related information system still adopts a three-point technology combining ' technical prevention ' and ' personal defense ', and the traditional management concept and method of seven-point management ' lead to that the most critical secret-related information physical carrier can not perform individual monitoring. Based on the problems in the prior art, it is needed to provide a method or a system for monitoring the terminal of a secret-related carrier in place so as to realize the automatic intelligent management of the whole life cycle of the terminal of the secret-related carrier.
Disclosure of Invention
The invention aims to provide an in-place monitoring method and system for a secret-related carrier terminal, which can realize automatic intelligent management of the whole life cycle of the secret-related carrier terminal.
In order to achieve the above object, the present invention provides the following solutions:
a secret related carrier terminal in-situ monitoring method comprises the following steps:
acquiring registration information of the secret-related carrier terminal according to the RFID label stuck on the secret-related carrier terminal; the registration information includes: file name, file type, time of use, borrowing record, borrower;
acquiring image information of a storage area of a secret related carrier terminal in real time; the access information of the confidential carrier terminal in the set range is obtained by using a fixed reader arranged at an access opening of the confidential carrier terminal storage area; the image information includes: image information of personnel in and out; the access information includes: setting registration information corresponding to the RFID tag on the confidential carrier terminal in a range and the entering and exiting direction of the confidential carrier terminal;
when the access information is abnormal, determining an active area of a corresponding secret-related carrier terminal according to the access information; in the active area, according to the measured signal intensity of auxiliary equipment with a known position received by a receiver, determining the position relation between an RFID tag on a confidential carrier terminal and the auxiliary equipment by using an RSSI ranging method; and positioning the confidential carrier terminal according to the position relation.
Optionally, when the access information is abnormal, determining an active area of the corresponding confidential carrier terminal according to the access information, and then further including:
when the access information is abnormal, the audible and visual alarm is controlled to give an alarm, and the image information of the storage area of the corresponding confidential carrier terminal is acquired.
Optionally, the secret related carrier terminal in-place monitoring method further includes:
and storing the registration information of the confidential carrier terminal, the image information of the storage area of the confidential carrier terminal, the real-time access information and the real-time position of the confidential carrier terminal into a database.
Optionally, the positioning of the confidential carrier terminal according to the position relationship further includes:
determining a holographic map according to RFID tag signals acquired by a fixed reader in real time and space information acquired by a sensor deployed in a storage area of a secret-related carrier terminal;
and displaying the registered information, the real-time image information, the access information and the real-time position of the confidential carrier terminal on the holographic map according to the registered information, the real-time image information and the access information of the confidential carrier terminal stored in the database.
Optionally, in the active area, according to the measured signal strength of the auxiliary device with a known position received by the receiver, determining the position relationship between the RFID tag on the confidential carrier terminal and the auxiliary device by using an RSSI ranging method specifically includes:
using the formulaDetermining an RFID tag on a security carrier terminal and auxiliary device +.>And auxiliary device->Is a positional relationship of (a);
using the formulaDetermining an RFID tag on a security carrier terminal and auxiliary device +.>And auxiliary device->Is a positional relationship of (a);
wherein,,is related to RFID tag and auxiliary device on the confidential carrier terminal>And auxiliary device->Three-dimensional coordinates of>Is related to RFID tag and auxiliary device on the confidential carrier terminal>And auxiliary device->Three-dimensional coordinates of>Is an auxiliary device->Three-dimensional coordinates of>Is an auxiliary device->Three-dimensional coordinates of>Is an auxiliary device->Three-dimensional coordinates of>Is the receiver receiving auxiliary device->Is a measure of signal strength,/>Is the receiver receiving auxiliary device->Is a measure of signal strength,/>Is the receiver receiving auxiliary device->Is provided for the measurement of the signal strength.
Optionally, the positioning the secret-related carrier terminal according to the position relationship specifically includes:
when two crossed nodes are obtained according to the position relation, a formula is utilizedDetermining the position of the terminal of the security-related carrier>;
When the intersection node is not obtained according to the position relationship, the formula is utilizedDetermining the position of the terminal of the security-related carrier>;
Wherein,,and->Is a weight factor that is used to determine the weight of the object,,,/>as a function of the euclidean distance,,/>horizontal distance and vertical distance of the RFID tag to the receiver, respectively, < >>Is related to RFID tag and auxiliary device on the confidential carrier terminal>Distance between->Is related to RFID tag and auxiliary device on the confidential carrier terminal>Distance between->Is related to RFID tag and auxiliary device on the confidential carrier terminal>Distance between them.
An encryption carrier terminal presence monitoring system comprising:
the data reading module is used for acquiring registration information of the confidential carrier terminal according to the RFID tag stuck on the confidential carrier terminal; the registration information includes: file name, file type, time of use, borrowing record, borrower;
the real-time monitoring module is used for acquiring image information of the storage area of the confidential carrier terminal in real time; the access information of the confidential carrier terminal in the set range is obtained by using a fixed reader arranged at an access opening of the confidential carrier terminal storage area; the image information includes: image information of personnel in and out; the access information includes: setting registration information corresponding to the RFID tag on the confidential carrier terminal in a range and the entering and exiting direction of the confidential carrier terminal;
the positioning tracking module is used for determining the corresponding movable area of the confidential carrier terminal according to the access information when the access information is abnormal; in the active area, according to the measured signal intensity of auxiliary equipment with a known position received by a receiver, determining the position relation between an RFID tag on a confidential carrier terminal and the auxiliary equipment by using an RSSI ranging method; and positioning the confidential carrier terminal according to the position relation.
Optionally, the secret-related carrier terminal in-place monitoring system further includes:
the audible and visual alarm module is used for controlling the audible and visual alarm to give an alarm when the access information is abnormal and acquiring the image information of the corresponding confidential carrier terminal storage area;
the database module is used for storing the registration information of the confidential carrier terminal, the image information of the storage area of the confidential carrier terminal, the real-time access information and the real-time position of the confidential carrier terminal into the database;
the holographic map module is used for determining a holographic map according to the RFID tag signals acquired by the fixed reader in real time and the space information acquired by the sensor deployed in the storage area of the confidential carrier terminal; and displaying the registered information, the real-time image information, the access information and the real-time position of the confidential carrier terminal on the holographic map according to the registered information, the real-time image information and the access information of the confidential carrier terminal stored in the database.
According to the specific embodiment provided by the invention, the invention discloses the following technical effects:
according to the method and the system for on-site monitoring of the confidential carrier terminal, the RFID tag is stuck on the confidential carrier terminal, and the fixed reader is installed at the entrance and exit of the storage area of the confidential carrier terminal, so that a group intelligent RFID (radio frequency identification) network based on a multi-directional antenna reader is constructed, and related information of the confidential carrier terminal is acquired in real time; when the access information is abnormal, determining an active area of the corresponding confidential carrier terminal according to the access information; in the active area, according to the measured signal intensity of auxiliary equipment with a known position received by a receiver, determining the position relation between an RFID tag on a confidential carrier terminal and the auxiliary equipment by using an RSSI ranging method; and positioning the confidential carrier terminal according to the position relation. Compared with the prior art, the positioning method based on the RSSI distance measurement method has the advantages of standardization, intellectualization, high efficiency and the like, greatly reduces the labor intensity of secret-related carrier terminal management staff, and improves the working efficiency.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic flow chart of a method for monitoring the presence of a confidential carrier terminal;
fig. 2 is an overall schematic diagram of a secret-related carrier terminal in-situ monitoring system provided by the invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The invention aims to provide an in-place monitoring method and system for a secret-related carrier terminal, which can realize automatic intelligent management of the whole life cycle of the secret-related carrier terminal.
In order that the above-recited objects, features and advantages of the present invention will become more readily apparent, a more particular description of the invention will be rendered by reference to the appended drawings and appended detailed description.
As shown in fig. 1, the method for monitoring the terminal of the secret-related carrier in place provided by the invention comprises the following steps:
s101, acquiring registration information of the confidential carrier terminal according to an RFID label stuck on the confidential carrier terminal; the registration information includes, but is not limited to: file name, file type, time of use, borrowing record, borrower. And a worker holds the multi-antenna RFID card reader to scan the RFID tag information of the secret related carrier terminal, and data reading is completed.
S102, acquiring image information of a storage area of a confidential carrier terminal in real time; the access information of the confidential carrier terminal in the set range is obtained by using a fixed reader arranged at an access opening of the confidential carrier terminal storage area; the image information includes: image information of personnel in and out; the access information includes: register information corresponding to the RFID tag on the confidential carrier terminal within the set range and the entering and exiting direction of the confidential carrier terminal. The staff can check whether the abnormal situation exists at any time and acquire the image information of the personnel.
S103, when the access information is abnormal, determining an active area of a corresponding confidential carrier terminal according to the access information; in the active area, according to the measured signal intensity of auxiliary equipment with a known position received by a receiver, determining the position relation between an RFID tag on a confidential carrier terminal and the auxiliary equipment by using an RSSI ranging method; and positioning the confidential carrier terminal according to the position relation. The abnormal condition of the access information comprises that the confidential carrier terminal is not registered with an external belt and the like.
S103, specifically comprising:
according to the formulaAcquiring the actual received signal strength difference of the tag; wherein,,is the reception auxiliary device signal power level, +.>Is->Or->。/>Is the receiver receiving auxiliary device->Is a measure of signal strength,/>Is the receiver receiving auxiliary device->Is provided for the measurement of the signal strength.,/>Is the received signal power level,/->Is the transmission signal strength of the auxiliary device, +.>Is the maximum antenna gain of the auxiliary device, +.>Is the distance between the RFID tag and the auxiliary device, < >>Is the wavelength.
According to the formulaA distance between the RFID tag and the auxiliary device is determined.Is related to RFID tag and auxiliary device on the confidential carrier terminal>Distance between->Is related to RFID tag and auxiliary device on the confidential carrier terminal>Distance between them.
Using the formulaDetermining an RFID tag on a security carrier terminal and auxiliary device +.>And auxiliary device->Is a positional relationship of (a);
using the formulaDetermining an RFID tag on a security carrier terminal and auxiliary device +.>And auxiliary device->Is a positional relationship of (a);
wherein,,is related to RFID tag and auxiliary device on the confidential carrier terminal>And auxiliary device->Three-dimensional coordinates of>Is related to RFID tag and auxiliary device on the confidential carrier terminal>And auxiliary device->Three-dimensional coordinates of>Is an auxiliary device->Three-dimensional coordinates of>Is an auxiliary device->Three-dimensional coordinates of>Is an auxiliary device->Three-dimensional coordinates of>Is the receiver receiving auxiliary device->Is a measure of signal strength,/>Is a receiver jointReceive auxiliary device->Is a measure of signal strength,/>Is the receiver receiving auxiliary device->Is provided for the measurement of the signal strength.
When two crossed nodes are obtained according to the position relation, a formula is utilizedDetermining the position of the terminal of the security-related carrier>;
When the intersection node is not obtained according to the position relationship, the formula is utilizedDetermining the position of the terminal of the security-related carrier>;
Wherein,,and->Is a weight factor that is used to determine the weight of the object,,,/>as a function of the euclidean distance,,/>horizontal distance and vertical distance of the RFID tag to the receiver, respectively, < >>Is related to RFID tag and auxiliary device on the confidential carrier terminal>Distance between->Is related to RFID tag and auxiliary device on the confidential carrier terminal>Distance between->Is related to RFID tag and auxiliary device on the confidential carrier terminal>Distance between them.
When the access information is abnormal, namely when the fixed reader scans the illegal situation, the audible and visual alarm is controlled to give an alarm, and the image information of the storage area of the corresponding confidential carrier terminal is acquired.
In order to trace the information of the confidential carrier terminal, the registration information of the confidential carrier terminal, the image information of the storage area of the confidential carrier terminal, the real-time access information and the real-time position of the confidential carrier terminal are stored in a database.
In order to evaluate the information of the confidential carrier terminal in real time in the space dimension and the time dimension, determining a holographic map according to the RFID tag signals acquired by the fixed reader in real time and the space information acquired by the sensor deployed in the storage area of the confidential carrier terminal; and displaying the registration information, the real-time image information, the access information and the real-time position of the confidential carrier terminal stored in the database on the holographic map.
As shown in fig. 2, as another specific embodiment, the present invention further provides a system for monitoring the presence of a confidential carrier terminal, including:
the data reading module is used for acquiring registration information of the confidential carrier terminal according to the RFID tag stuck on the confidential carrier terminal; the registration information includes: file name, file type, time of use, borrowing record, borrower;
the real-time monitoring module is used for acquiring image information of the storage area of the confidential carrier terminal in real time; the access information of the confidential carrier terminal in the set range is obtained by using a fixed reader arranged at an access opening of the confidential carrier terminal storage area; the image information includes: image information of personnel in and out; the access information includes: setting registration information corresponding to the RFID tag on the confidential carrier terminal in a range and the entering and exiting direction of the confidential carrier terminal;
the positioning tracking module is used for determining the corresponding movable area of the confidential carrier terminal according to the access information when the access information is abnormal; in the active area, according to the measured signal intensity of auxiliary equipment with a known position received by a receiver, determining the position relation between an RFID tag on a confidential carrier terminal and the auxiliary equipment by using an RSSI ranging method; positioning the secret-related carrier terminal according to the position relation;
the audible and visual alarm module is used for controlling the audible and visual alarm to give an alarm when the access information is abnormal and acquiring the image information of the corresponding confidential carrier terminal storage area;
the database module is used for storing the registration information of the confidential carrier terminal, the image information of the storage area of the confidential carrier terminal, the real-time access information and the real-time position of the confidential carrier terminal to the database;
the holographic map module is used for determining a holographic map according to the RFID tag signals acquired by the fixed reader in real time and the space information acquired by the sensor deployed in the storage area of the confidential carrier terminal; and displaying the registration information, the real-time image information, the access information and the real-time position of the confidential carrier terminal stored in the database on the holographic map.
As shown in FIG. 2, the present invention is classified into a hardware system and a software system as a secret-related carrier relationship system.
Wherein the control of each module is realized through a control model. The hardware system and the software system are controlled by a central control computer, if abnormal information occurs, the audible and visual alarm module is controlled to alarm firstly by the audible and visual alarm module, then the real-time monitoring module is controlled to acquire the image information of the personnel in and out, and the real-time positioning module is started to track the position of the confidential carrier terminal.
In the present specification, each embodiment is described in a progressive manner, and each embodiment is mainly described in a different point from other embodiments, and identical and similar parts between the embodiments are all enough to refer to each other. For the system disclosed in the embodiment, since it corresponds to the method disclosed in the embodiment, the description is relatively simple, and the relevant points refer to the description of the method section.
The principles and embodiments of the present invention have been described herein with reference to specific examples, the description of which is intended only to assist in understanding the methods of the present invention and the core ideas thereof; also, it is within the scope of the present invention to be modified by those of ordinary skill in the art in light of the present teachings. In view of the foregoing, this description should not be construed as limiting the invention.
Claims (6)
1. The method for monitoring the terminal of the secret related carrier in place is characterized by comprising the following steps:
acquiring registration information of the secret-related carrier terminal according to the RFID label stuck on the secret-related carrier terminal; the registration information includes: file name, file type, time of use, borrowing record, borrower;
acquiring image information of a storage area of a secret related carrier terminal in real time; the access information of the confidential carrier terminal in the set range is obtained by using a fixed reader arranged at an access opening of the confidential carrier terminal storage area; the image information includes: image information of personnel in and out; the access information includes: setting registration information corresponding to the RFID tag on the confidential carrier terminal in a range and the entering and exiting direction of the confidential carrier terminal;
when the access information is abnormal, determining an active area of a corresponding secret-related carrier terminal according to the access information; in the active area, according to the measured signal intensity of auxiliary equipment with a known position received by a receiver, determining the position relation between an RFID tag on a confidential carrier terminal and the auxiliary equipment by using an RSSI ranging method; positioning the secret-related carrier terminal according to the position relation;
in the active area, according to the measured signal intensity of auxiliary equipment with a known position received by a receiver, determining the position relationship between the RFID tag on the confidential carrier terminal and the auxiliary equipment by using an RSSI ranging method, wherein the method specifically comprises the following steps:
using the formulaDetermining an RFID tag on a security carrier terminal and auxiliary device +.>And auxiliary device->Is a positional relationship of (a);
using the formulaDetermining an RFID tag on a security carrier terminal and auxiliary device +.>And auxiliary device->Is a positional relationship of (a);
wherein,,is related to the RFID tag on the confidential carrier terminal relative to the auxiliary device +.>And auxiliary device->Three-dimensional coordinates of>Is related to the RFID tag on the confidential carrier terminal relative to the auxiliary device +.>Auxiliary equipmentThree-dimensional coordinates of>Is an auxiliary device->Three-dimensional coordinates of>Is an auxiliary device->Three-dimensional coordinates of>Is an auxiliary device->Three-dimensional coordinates of>Is the receiver receiving auxiliary device->Is a measure of signal strength,/>Is the receiver receiving auxiliary device->Is a measure of signal strength,/>Is the receiver receiving auxiliary device->Is a measurement of signal strength;
and then according to the position relation to the secret related carrier terminal location, specifically include:
when two crossed nodes are obtained according to the position relation, a formula is utilizedDetermining the position of the terminal of the security-related carrier>;
When the intersection node is not obtained according to the position relationship, the formula is utilizedDetermining the position of the terminal of the security-related carrier>;
Wherein,,and->Is a weight factor that is used to determine the weight of the object,,,/>as a Euclidean distance function, +.>,/>Horizontal distance and vertical distance of the RFID tag to the receiver, respectively, < >>Is related to RFID label and auxiliary equipment on secret carrier terminalDistance between->Is related to RFID tag and auxiliary device on the confidential carrier terminal>Distance between->Is related to RFID tag and auxiliary device on the confidential carrier terminal>Distance between them.
2. The method for on-site monitoring of a confidential carrier terminal according to claim 1, wherein when the access information is abnormal, determining an active area of the confidential carrier terminal according to the access information, and then further comprising:
when the access information is abnormal, the audible and visual alarm is controlled to give an alarm, and the image information of the storage area of the corresponding confidential carrier terminal is acquired.
3. The method for monitoring the presence of a confidential carrier terminal according to claim 1 or 2, further comprising:
and storing the registration information of the confidential carrier terminal, the image information of the storage area of the confidential carrier terminal, the real-time access information and the real-time position of the confidential carrier terminal which are acquired in real time into a database.
4. A method for monitoring the presence of a confidential carrier terminal according to claim 3, wherein the positioning of the confidential carrier terminal according to the positional relationship further comprises:
determining a holographic map according to RFID tag signals acquired by a fixed reader in real time and space information acquired by a sensor deployed in a storage area of a secret-related carrier terminal;
and displaying the registration information, the real-time image information, the access information and the real-time position of the confidential carrier terminal stored in the database on the holographic map.
5. An in-place monitoring system for a confidential carrier terminal, configured to implement the in-place monitoring method for a confidential carrier terminal according to any one of claims 1 to 4, comprising:
the data reading module is used for acquiring registration information of the confidential carrier terminal according to the RFID tag stuck on the confidential carrier terminal; the registration information includes: file name, file type, time of use, borrowing record, borrower;
the real-time monitoring module is used for acquiring image information of the storage area of the confidential carrier terminal in real time; the access information of the confidential carrier terminal in the set range is obtained by using a fixed reader arranged at an access opening of the confidential carrier terminal storage area; the image information includes: image information of personnel in and out; the access information includes: setting registration information corresponding to the RFID tag on the confidential carrier terminal in a range and the entering and exiting direction of the confidential carrier terminal;
the positioning tracking module is used for determining the corresponding movable area of the confidential carrier terminal according to the access information when the access information is abnormal; in the active area, according to the measured signal intensity of auxiliary equipment with a known position received by a receiver, determining the position relation between an RFID tag on a confidential carrier terminal and the auxiliary equipment by using an RSSI ranging method; and positioning the confidential carrier terminal according to the position relation.
6. The secure carrier terminal presence monitoring system of claim 5, further comprising:
the audible and visual alarm module is used for controlling the audible and visual alarm to give an alarm when the access information is abnormal and acquiring the image information of the corresponding confidential carrier terminal storage area;
the database module is used for storing the registration information of the confidential carrier terminal, the image information of the storage area of the confidential carrier terminal, the real-time access information and the real-time position of the confidential carrier terminal to the database;
the holographic map module is used for determining a holographic map according to the RFID tag signals acquired by the fixed reader in real time and the space information acquired by the sensor deployed in the storage area of the confidential carrier terminal; and displaying the registration information, the real-time image information, the access information and the real-time position of the confidential carrier terminal stored in the database on the holographic map.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310403048.6A CN116167399B (en) | 2023-04-17 | 2023-04-17 | Secret-related carrier terminal in-situ monitoring method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310403048.6A CN116167399B (en) | 2023-04-17 | 2023-04-17 | Secret-related carrier terminal in-situ monitoring method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116167399A CN116167399A (en) | 2023-05-26 |
CN116167399B true CN116167399B (en) | 2023-07-07 |
Family
ID=86420375
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310403048.6A Active CN116167399B (en) | 2023-04-17 | 2023-04-17 | Secret-related carrier terminal in-situ monitoring method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116167399B (en) |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115809839A (en) * | 2018-03-14 | 2023-03-17 | 联邦快递服务公司 | Method for performing store-to-consumer logistics operations |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012143952A2 (en) * | 2011-04-20 | 2012-10-26 | B Amutha | A system and apparatus for safe remote on-line tracing, shadowing, surveillance, inter-communication, location, navigation, tagging, rescue, recovery and restitution of humans and stolen/missing chattels, and the method/s thereof |
CN202453917U (en) * | 2011-07-12 | 2012-09-26 | 武汉华工安鼎信息技术有限责任公司 | Confidential carrier intelligent monitoring system based on radio frequency identification (RFID) |
CN102325155B (en) * | 2011-07-14 | 2014-11-19 | 福建冰原网络科技有限公司 | Vital sign monitoring method and system based on wireless sensor network |
CN103955979A (en) * | 2014-05-13 | 2014-07-30 | 广州市远望谷信息技术有限公司 | Identification method and system for secrete-related moving carrier or equipment |
WO2017132629A1 (en) * | 2016-01-27 | 2017-08-03 | Ping Liang | Cellular wireless communication systems enhanced by intelligent self-organizing wireless distributed active antennas |
CN114900797A (en) * | 2016-12-30 | 2022-08-12 | 英特尔公司 | Method and apparatus for radio communication |
KR102130933B1 (en) * | 2017-03-16 | 2020-07-08 | 론프록스 코퍼레이션 | Systems and methods for positioning indoors using wireless positioning nodes |
CN110351655B (en) * | 2019-07-10 | 2021-06-18 | 博睿泰克科技(宁波)有限公司 | Indoor positioning method and system based on signal multipath propagation measurement |
-
2023
- 2023-04-17 CN CN202310403048.6A patent/CN116167399B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115809839A (en) * | 2018-03-14 | 2023-03-17 | 联邦快递服务公司 | Method for performing store-to-consumer logistics operations |
Also Published As
Publication number | Publication date |
---|---|
CN116167399A (en) | 2023-05-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7898419B2 (en) | Systems and methods for object localization and path identification based on RFID sensing | |
KR101797231B1 (en) | BLE beacon-based system and method for managing entrance and exit | |
CN100450269C (en) | Monitoring changeable locations of client devices in wireless networks | |
US8504431B2 (en) | Method and system for monitoring forestry products | |
US7567179B2 (en) | Configuration management system and method for use in an RFID system including a multiplicity of RFID readers | |
CN106559749B (en) | Multi-target passive positioning method based on radio frequency tomography | |
CN106778957B (en) | Positioning system and method based on RFID double-frequency technology | |
CN101853427A (en) | Police affair information management and application integration system | |
CN108235290B (en) | Method for quickly and accurately extracting mobile communication terminal user ID in near space | |
CN111866711A (en) | Vehicle abnormal movement management method and system based on base station and vehicle management system | |
CN103258258B (en) | Asset monitoring and anti-theft method based on RFID technology | |
TWI459304B (en) | Object movement direction radio frequency identification method, device and the use of the device control area personnel access control system | |
CN116167399B (en) | Secret-related carrier terminal in-situ monitoring method and system | |
CN204102174U (en) | A kind of handheld device for Intelligent well cover supervisory system | |
CN111815992B (en) | Fixed-point parking monitoring method, device and system, storage medium and electronic equipment | |
CN104914449A (en) | Person one-way in/out identifying and positioning system based on 2.4G wireless communication | |
US20090289772A1 (en) | Method and system for analyzing signals from electronic tags, and recording medium thereof | |
CN203689554U (en) | Label card for monitoring properties and prevention of thievery | |
KR101837846B1 (en) | Active Container Access Control Wireless Security System and Method thereof | |
Xiao et al. | Research and application of RFID technology in smart campus | |
CN205103858U (en) | Radio station management system that stands based on RFID | |
Adewole et al. | Hybrid human resources localization and tracking system. | |
Du et al. | The design of RFID dual frequency integrated technology based on prison application | |
SRAIRI et al. | RFID based vehicle-infrastructure communication system for road maintenance | |
CN114139965A (en) | Multi-sensor exhibition monitoring management system and guarantee management method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |