CN116167399B - Secret-related carrier terminal in-situ monitoring method and system - Google Patents

Secret-related carrier terminal in-situ monitoring method and system Download PDF

Info

Publication number
CN116167399B
CN116167399B CN202310403048.6A CN202310403048A CN116167399B CN 116167399 B CN116167399 B CN 116167399B CN 202310403048 A CN202310403048 A CN 202310403048A CN 116167399 B CN116167399 B CN 116167399B
Authority
CN
China
Prior art keywords
carrier terminal
confidential
rfid tag
auxiliary device
confidential carrier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310403048.6A
Other languages
Chinese (zh)
Other versions
CN116167399A (en
Inventor
罗远哲
刘瑞景
刘威
荆全振
李连庚
李雪茹
陈思杰
王玲洁
赵永营
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing China Super Industry Information Security Technology Ltd By Share Ltd
Original Assignee
Beijing China Super Industry Information Security Technology Ltd By Share Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing China Super Industry Information Security Technology Ltd By Share Ltd filed Critical Beijing China Super Industry Information Security Technology Ltd By Share Ltd
Priority to CN202310403048.6A priority Critical patent/CN116167399B/en
Publication of CN116167399A publication Critical patent/CN116167399A/en
Application granted granted Critical
Publication of CN116167399B publication Critical patent/CN116167399B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0025Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01CMEASURING DISTANCES, LEVELS OR BEARINGS; SURVEYING; NAVIGATION; GYROSCOPIC INSTRUMENTS; PHOTOGRAMMETRY OR VIDEOGRAMMETRY
    • G01C21/00Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00
    • G01C21/005Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00 with correlation of navigation data from several sources, e.g. map or contour matching
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S5/00Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
    • G01S5/02Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
    • G01S5/0273Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves using multipath or indirect path propagation signals in position determination
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S5/00Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
    • G01S5/02Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
    • G01S5/06Position of source determined by co-ordinating a plurality of position lines defined by path-difference measurements

Landscapes

  • Engineering & Computer Science (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Automation & Control Theory (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

The invention discloses an on-site monitoring method and system of a confidential carrier terminal, and relates to the technical field of safety management systems; acquiring image information of a storage area of a secret related carrier terminal in real time; the access information of the confidential carrier terminal in the set range is obtained by using a fixed reader arranged at an access opening of the confidential carrier terminal storage area; when the access information is abnormal, determining an active area of a corresponding secret-related carrier terminal according to the access information; in the active area, according to the measured signal intensity of auxiliary equipment with a known position received by a receiver, determining the position relation between an RFID tag on a confidential carrier terminal and the auxiliary equipment by using an RSSI ranging method; and positioning the confidential carrier terminal according to the position relation. The invention can realize the automatic intelligent management of the full life cycle of the secret related carrier terminal.

Description

Secret-related carrier terminal in-situ monitoring method and system
Technical Field
The invention relates to the technical field of security management systems, in particular to a secret-related carrier terminal in-place monitoring method and system.
Background
The current security situation is increasingly severe. The types and the number of the confidential carriers used in the development process of modern enterprises are also large, and the confidential carriers mainly comprise U discs, mobile hard discs, notebook computers, paper materials and the like. In daily work, a large amount of data information related to enterprises is generated and stored. At present, the management of the secret-related information system still adopts a three-point technology combining ' technical prevention ' and ' personal defense ', and the traditional management concept and method of seven-point management ' lead to that the most critical secret-related information physical carrier can not perform individual monitoring. Based on the problems in the prior art, it is needed to provide a method or a system for monitoring the terminal of a secret-related carrier in place so as to realize the automatic intelligent management of the whole life cycle of the terminal of the secret-related carrier.
Disclosure of Invention
The invention aims to provide an in-place monitoring method and system for a secret-related carrier terminal, which can realize automatic intelligent management of the whole life cycle of the secret-related carrier terminal.
In order to achieve the above object, the present invention provides the following solutions:
a secret related carrier terminal in-situ monitoring method comprises the following steps:
acquiring registration information of the secret-related carrier terminal according to the RFID label stuck on the secret-related carrier terminal; the registration information includes: file name, file type, time of use, borrowing record, borrower;
acquiring image information of a storage area of a secret related carrier terminal in real time; the access information of the confidential carrier terminal in the set range is obtained by using a fixed reader arranged at an access opening of the confidential carrier terminal storage area; the image information includes: image information of personnel in and out; the access information includes: setting registration information corresponding to the RFID tag on the confidential carrier terminal in a range and the entering and exiting direction of the confidential carrier terminal;
when the access information is abnormal, determining an active area of a corresponding secret-related carrier terminal according to the access information; in the active area, according to the measured signal intensity of auxiliary equipment with a known position received by a receiver, determining the position relation between an RFID tag on a confidential carrier terminal and the auxiliary equipment by using an RSSI ranging method; and positioning the confidential carrier terminal according to the position relation.
Optionally, when the access information is abnormal, determining an active area of the corresponding confidential carrier terminal according to the access information, and then further including:
when the access information is abnormal, the audible and visual alarm is controlled to give an alarm, and the image information of the storage area of the corresponding confidential carrier terminal is acquired.
Optionally, the secret related carrier terminal in-place monitoring method further includes:
and storing the registration information of the confidential carrier terminal, the image information of the storage area of the confidential carrier terminal, the real-time access information and the real-time position of the confidential carrier terminal into a database.
Optionally, the positioning of the confidential carrier terminal according to the position relationship further includes:
determining a holographic map according to RFID tag signals acquired by a fixed reader in real time and space information acquired by a sensor deployed in a storage area of a secret-related carrier terminal;
and displaying the registered information, the real-time image information, the access information and the real-time position of the confidential carrier terminal on the holographic map according to the registered information, the real-time image information and the access information of the confidential carrier terminal stored in the database.
Optionally, in the active area, according to the measured signal strength of the auxiliary device with a known position received by the receiver, determining the position relationship between the RFID tag on the confidential carrier terminal and the auxiliary device by using an RSSI ranging method specifically includes:
using the formula
Figure SMS_1
Determining an RFID tag on a security carrier terminal and auxiliary device +.>
Figure SMS_2
And auxiliary device->
Figure SMS_3
Is a positional relationship of (a);
using the formula
Figure SMS_4
Determining an RFID tag on a security carrier terminal and auxiliary device +.>
Figure SMS_5
And auxiliary device->
Figure SMS_6
Is a positional relationship of (a);
wherein,,
Figure SMS_10
is related to RFID tag and auxiliary device on the confidential carrier terminal>
Figure SMS_9
And auxiliary device->
Figure SMS_19
Three-dimensional coordinates of>
Figure SMS_12
Is related to RFID tag and auxiliary device on the confidential carrier terminal>
Figure SMS_16
And auxiliary device->
Figure SMS_22
Three-dimensional coordinates of>
Figure SMS_24
Is an auxiliary device->
Figure SMS_13
Three-dimensional coordinates of>
Figure SMS_21
Is an auxiliary device->
Figure SMS_7
Three-dimensional coordinates of>
Figure SMS_17
Is an auxiliary device->
Figure SMS_8
Three-dimensional coordinates of>
Figure SMS_20
Is the receiver receiving auxiliary device->
Figure SMS_11
Is a measure of signal strength,/>
Figure SMS_18
Is the receiver receiving auxiliary device->
Figure SMS_14
Is a measure of signal strength,/>
Figure SMS_23
Is the receiver receiving auxiliary device->
Figure SMS_15
Is provided for the measurement of the signal strength.
Optionally, the positioning the secret-related carrier terminal according to the position relationship specifically includes:
when two crossed nodes are obtained according to the position relation, a formula is utilized
Figure SMS_25
Determining the position of the terminal of the security-related carrier>
Figure SMS_26
When the intersection node is not obtained according to the position relationship, the formula is utilized
Figure SMS_27
Determining the position of the terminal of the security-related carrier>
Figure SMS_28
Wherein,,
Figure SMS_32
and->
Figure SMS_34
Is a weight factor that is used to determine the weight of the object,
Figure SMS_37
Figure SMS_31
,/>
Figure SMS_35
as a function of the euclidean distance,
Figure SMS_38
,/>
Figure SMS_40
horizontal distance and vertical distance of the RFID tag to the receiver, respectively, < >>
Figure SMS_29
Is related to RFID tag and auxiliary device on the confidential carrier terminal>
Figure SMS_33
Distance between->
Figure SMS_39
Is related to RFID tag and auxiliary device on the confidential carrier terminal>
Figure SMS_41
Distance between->
Figure SMS_30
Is related to RFID tag and auxiliary device on the confidential carrier terminal>
Figure SMS_36
Distance between them.
An encryption carrier terminal presence monitoring system comprising:
the data reading module is used for acquiring registration information of the confidential carrier terminal according to the RFID tag stuck on the confidential carrier terminal; the registration information includes: file name, file type, time of use, borrowing record, borrower;
the real-time monitoring module is used for acquiring image information of the storage area of the confidential carrier terminal in real time; the access information of the confidential carrier terminal in the set range is obtained by using a fixed reader arranged at an access opening of the confidential carrier terminal storage area; the image information includes: image information of personnel in and out; the access information includes: setting registration information corresponding to the RFID tag on the confidential carrier terminal in a range and the entering and exiting direction of the confidential carrier terminal;
the positioning tracking module is used for determining the corresponding movable area of the confidential carrier terminal according to the access information when the access information is abnormal; in the active area, according to the measured signal intensity of auxiliary equipment with a known position received by a receiver, determining the position relation between an RFID tag on a confidential carrier terminal and the auxiliary equipment by using an RSSI ranging method; and positioning the confidential carrier terminal according to the position relation.
Optionally, the secret-related carrier terminal in-place monitoring system further includes:
the audible and visual alarm module is used for controlling the audible and visual alarm to give an alarm when the access information is abnormal and acquiring the image information of the corresponding confidential carrier terminal storage area;
the database module is used for storing the registration information of the confidential carrier terminal, the image information of the storage area of the confidential carrier terminal, the real-time access information and the real-time position of the confidential carrier terminal into the database;
the holographic map module is used for determining a holographic map according to the RFID tag signals acquired by the fixed reader in real time and the space information acquired by the sensor deployed in the storage area of the confidential carrier terminal; and displaying the registered information, the real-time image information, the access information and the real-time position of the confidential carrier terminal on the holographic map according to the registered information, the real-time image information and the access information of the confidential carrier terminal stored in the database.
According to the specific embodiment provided by the invention, the invention discloses the following technical effects:
according to the method and the system for on-site monitoring of the confidential carrier terminal, the RFID tag is stuck on the confidential carrier terminal, and the fixed reader is installed at the entrance and exit of the storage area of the confidential carrier terminal, so that a group intelligent RFID (radio frequency identification) network based on a multi-directional antenna reader is constructed, and related information of the confidential carrier terminal is acquired in real time; when the access information is abnormal, determining an active area of the corresponding confidential carrier terminal according to the access information; in the active area, according to the measured signal intensity of auxiliary equipment with a known position received by a receiver, determining the position relation between an RFID tag on a confidential carrier terminal and the auxiliary equipment by using an RSSI ranging method; and positioning the confidential carrier terminal according to the position relation. Compared with the prior art, the positioning method based on the RSSI distance measurement method has the advantages of standardization, intellectualization, high efficiency and the like, greatly reduces the labor intensity of secret-related carrier terminal management staff, and improves the working efficiency.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic flow chart of a method for monitoring the presence of a confidential carrier terminal;
fig. 2 is an overall schematic diagram of a secret-related carrier terminal in-situ monitoring system provided by the invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The invention aims to provide an in-place monitoring method and system for a secret-related carrier terminal, which can realize automatic intelligent management of the whole life cycle of the secret-related carrier terminal.
In order that the above-recited objects, features and advantages of the present invention will become more readily apparent, a more particular description of the invention will be rendered by reference to the appended drawings and appended detailed description.
As shown in fig. 1, the method for monitoring the terminal of the secret-related carrier in place provided by the invention comprises the following steps:
s101, acquiring registration information of the confidential carrier terminal according to an RFID label stuck on the confidential carrier terminal; the registration information includes, but is not limited to: file name, file type, time of use, borrowing record, borrower. And a worker holds the multi-antenna RFID card reader to scan the RFID tag information of the secret related carrier terminal, and data reading is completed.
S102, acquiring image information of a storage area of a confidential carrier terminal in real time; the access information of the confidential carrier terminal in the set range is obtained by using a fixed reader arranged at an access opening of the confidential carrier terminal storage area; the image information includes: image information of personnel in and out; the access information includes: register information corresponding to the RFID tag on the confidential carrier terminal within the set range and the entering and exiting direction of the confidential carrier terminal. The staff can check whether the abnormal situation exists at any time and acquire the image information of the personnel.
S103, when the access information is abnormal, determining an active area of a corresponding confidential carrier terminal according to the access information; in the active area, according to the measured signal intensity of auxiliary equipment with a known position received by a receiver, determining the position relation between an RFID tag on a confidential carrier terminal and the auxiliary equipment by using an RSSI ranging method; and positioning the confidential carrier terminal according to the position relation. The abnormal condition of the access information comprises that the confidential carrier terminal is not registered with an external belt and the like.
S103, specifically comprising:
according to the formula
Figure SMS_43
Acquiring the actual received signal strength difference of the tag; wherein,,
Figure SMS_46
is the reception auxiliary device signal power level, +.>
Figure SMS_52
Is->
Figure SMS_45
Or->
Figure SMS_47
。/>
Figure SMS_51
Is the receiver receiving auxiliary device->
Figure SMS_56
Is a measure of signal strength,/>
Figure SMS_42
Is the receiver receiving auxiliary device->
Figure SMS_49
Is provided for the measurement of the signal strength.
Figure SMS_53
,/>
Figure SMS_55
Is the received signal power level,/->
Figure SMS_44
Is the transmission signal strength of the auxiliary device, +.>
Figure SMS_48
Is the maximum antenna gain of the auxiliary device, +.>
Figure SMS_50
Is the distance between the RFID tag and the auxiliary device, < >>
Figure SMS_54
Is the wavelength.
According to the formula
Figure SMS_57
A distance between the RFID tag and the auxiliary device is determined.
Figure SMS_58
Is related to RFID tag and auxiliary device on the confidential carrier terminal>
Figure SMS_59
Distance between->
Figure SMS_60
Is related to RFID tag and auxiliary device on the confidential carrier terminal>
Figure SMS_61
Distance between them.
Using the formula
Figure SMS_62
Determining an RFID tag on a security carrier terminal and auxiliary device +.>
Figure SMS_63
And auxiliary device->
Figure SMS_64
Is a positional relationship of (a);
using the formula
Figure SMS_65
Determining an RFID tag on a security carrier terminal and auxiliary device +.>
Figure SMS_66
And auxiliary device->
Figure SMS_67
Is a positional relationship of (a);
wherein,,
Figure SMS_82
is related to RFID tag and auxiliary device on the confidential carrier terminal>
Figure SMS_72
And auxiliary device->
Figure SMS_78
Three-dimensional coordinates of>
Figure SMS_74
Is related to RFID tag and auxiliary device on the confidential carrier terminal>
Figure SMS_85
And auxiliary device->
Figure SMS_75
Three-dimensional coordinates of>
Figure SMS_81
Is an auxiliary device->
Figure SMS_68
Three-dimensional coordinates of>
Figure SMS_76
Is an auxiliary device->
Figure SMS_69
Three-dimensional coordinates of>
Figure SMS_77
Is an auxiliary device->
Figure SMS_71
Three-dimensional coordinates of>
Figure SMS_80
Is the receiver receiving auxiliary device->
Figure SMS_73
Is a measure of signal strength,/>
Figure SMS_79
Is a receiver jointReceive auxiliary device->
Figure SMS_70
Is a measure of signal strength,/>
Figure SMS_84
Is the receiver receiving auxiliary device->
Figure SMS_83
Is provided for the measurement of the signal strength.
When two crossed nodes are obtained according to the position relation, a formula is utilized
Figure SMS_86
Determining the position of the terminal of the security-related carrier>
Figure SMS_87
When the intersection node is not obtained according to the position relationship, the formula is utilized
Figure SMS_88
Determining the position of the terminal of the security-related carrier>
Figure SMS_89
Wherein,,
Figure SMS_93
and->
Figure SMS_95
Is a weight factor that is used to determine the weight of the object,
Figure SMS_98
Figure SMS_91
,/>
Figure SMS_100
as a function of the euclidean distance,
Figure SMS_101
,/>
Figure SMS_102
horizontal distance and vertical distance of the RFID tag to the receiver, respectively, < >>
Figure SMS_90
Is related to RFID tag and auxiliary device on the confidential carrier terminal>
Figure SMS_94
Distance between->
Figure SMS_97
Is related to RFID tag and auxiliary device on the confidential carrier terminal>
Figure SMS_99
Distance between->
Figure SMS_92
Is related to RFID tag and auxiliary device on the confidential carrier terminal>
Figure SMS_96
Distance between them.
When the access information is abnormal, namely when the fixed reader scans the illegal situation, the audible and visual alarm is controlled to give an alarm, and the image information of the storage area of the corresponding confidential carrier terminal is acquired.
In order to trace the information of the confidential carrier terminal, the registration information of the confidential carrier terminal, the image information of the storage area of the confidential carrier terminal, the real-time access information and the real-time position of the confidential carrier terminal are stored in a database.
In order to evaluate the information of the confidential carrier terminal in real time in the space dimension and the time dimension, determining a holographic map according to the RFID tag signals acquired by the fixed reader in real time and the space information acquired by the sensor deployed in the storage area of the confidential carrier terminal; and displaying the registration information, the real-time image information, the access information and the real-time position of the confidential carrier terminal stored in the database on the holographic map.
As shown in fig. 2, as another specific embodiment, the present invention further provides a system for monitoring the presence of a confidential carrier terminal, including:
the data reading module is used for acquiring registration information of the confidential carrier terminal according to the RFID tag stuck on the confidential carrier terminal; the registration information includes: file name, file type, time of use, borrowing record, borrower;
the real-time monitoring module is used for acquiring image information of the storage area of the confidential carrier terminal in real time; the access information of the confidential carrier terminal in the set range is obtained by using a fixed reader arranged at an access opening of the confidential carrier terminal storage area; the image information includes: image information of personnel in and out; the access information includes: setting registration information corresponding to the RFID tag on the confidential carrier terminal in a range and the entering and exiting direction of the confidential carrier terminal;
the positioning tracking module is used for determining the corresponding movable area of the confidential carrier terminal according to the access information when the access information is abnormal; in the active area, according to the measured signal intensity of auxiliary equipment with a known position received by a receiver, determining the position relation between an RFID tag on a confidential carrier terminal and the auxiliary equipment by using an RSSI ranging method; positioning the secret-related carrier terminal according to the position relation;
the audible and visual alarm module is used for controlling the audible and visual alarm to give an alarm when the access information is abnormal and acquiring the image information of the corresponding confidential carrier terminal storage area;
the database module is used for storing the registration information of the confidential carrier terminal, the image information of the storage area of the confidential carrier terminal, the real-time access information and the real-time position of the confidential carrier terminal to the database;
the holographic map module is used for determining a holographic map according to the RFID tag signals acquired by the fixed reader in real time and the space information acquired by the sensor deployed in the storage area of the confidential carrier terminal; and displaying the registration information, the real-time image information, the access information and the real-time position of the confidential carrier terminal stored in the database on the holographic map.
As shown in FIG. 2, the present invention is classified into a hardware system and a software system as a secret-related carrier relationship system.
Wherein the control of each module is realized through a control model. The hardware system and the software system are controlled by a central control computer, if abnormal information occurs, the audible and visual alarm module is controlled to alarm firstly by the audible and visual alarm module, then the real-time monitoring module is controlled to acquire the image information of the personnel in and out, and the real-time positioning module is started to track the position of the confidential carrier terminal.
In the present specification, each embodiment is described in a progressive manner, and each embodiment is mainly described in a different point from other embodiments, and identical and similar parts between the embodiments are all enough to refer to each other. For the system disclosed in the embodiment, since it corresponds to the method disclosed in the embodiment, the description is relatively simple, and the relevant points refer to the description of the method section.
The principles and embodiments of the present invention have been described herein with reference to specific examples, the description of which is intended only to assist in understanding the methods of the present invention and the core ideas thereof; also, it is within the scope of the present invention to be modified by those of ordinary skill in the art in light of the present teachings. In view of the foregoing, this description should not be construed as limiting the invention.

Claims (6)

1. The method for monitoring the terminal of the secret related carrier in place is characterized by comprising the following steps:
acquiring registration information of the secret-related carrier terminal according to the RFID label stuck on the secret-related carrier terminal; the registration information includes: file name, file type, time of use, borrowing record, borrower;
acquiring image information of a storage area of a secret related carrier terminal in real time; the access information of the confidential carrier terminal in the set range is obtained by using a fixed reader arranged at an access opening of the confidential carrier terminal storage area; the image information includes: image information of personnel in and out; the access information includes: setting registration information corresponding to the RFID tag on the confidential carrier terminal in a range and the entering and exiting direction of the confidential carrier terminal;
when the access information is abnormal, determining an active area of a corresponding secret-related carrier terminal according to the access information; in the active area, according to the measured signal intensity of auxiliary equipment with a known position received by a receiver, determining the position relation between an RFID tag on a confidential carrier terminal and the auxiliary equipment by using an RSSI ranging method; positioning the secret-related carrier terminal according to the position relation;
in the active area, according to the measured signal intensity of auxiliary equipment with a known position received by a receiver, determining the position relationship between the RFID tag on the confidential carrier terminal and the auxiliary equipment by using an RSSI ranging method, wherein the method specifically comprises the following steps:
using the formula
Figure QLYQS_1
Determining an RFID tag on a security carrier terminal and auxiliary device +.>
Figure QLYQS_2
And auxiliary device->
Figure QLYQS_3
Is a positional relationship of (a);
using the formula
Figure QLYQS_4
Determining an RFID tag on a security carrier terminal and auxiliary device +.>
Figure QLYQS_5
And auxiliary device->
Figure QLYQS_6
Is a positional relationship of (a);
wherein,,
Figure QLYQS_17
is related to the RFID tag on the confidential carrier terminal relative to the auxiliary device +.>
Figure QLYQS_10
And auxiliary device->
Figure QLYQS_12
Three-dimensional coordinates of>
Figure QLYQS_21
Is related to the RFID tag on the confidential carrier terminal relative to the auxiliary device +.>
Figure QLYQS_23
Auxiliary equipment
Figure QLYQS_22
Three-dimensional coordinates of>
Figure QLYQS_24
Is an auxiliary device->
Figure QLYQS_15
Three-dimensional coordinates of>
Figure QLYQS_19
Is an auxiliary device->
Figure QLYQS_7
Three-dimensional coordinates of>
Figure QLYQS_11
Is an auxiliary device->
Figure QLYQS_9
Three-dimensional coordinates of>
Figure QLYQS_13
Is the receiver receiving auxiliary device->
Figure QLYQS_16
Is a measure of signal strength,/>
Figure QLYQS_20
Is the receiver receiving auxiliary device->
Figure QLYQS_8
Is a measure of signal strength,/>
Figure QLYQS_14
Is the receiver receiving auxiliary device->
Figure QLYQS_18
Is a measurement of signal strength;
and then according to the position relation to the secret related carrier terminal location, specifically include:
when two crossed nodes are obtained according to the position relation, a formula is utilized
Figure QLYQS_25
Determining the position of the terminal of the security-related carrier>
Figure QLYQS_26
When the intersection node is not obtained according to the position relationship, the formula is utilized
Figure QLYQS_27
Determining the position of the terminal of the security-related carrier>
Figure QLYQS_28
Wherein,,
Figure QLYQS_30
and->
Figure QLYQS_33
Is a weight factor that is used to determine the weight of the object,
Figure QLYQS_36
Figure QLYQS_32
,/>
Figure QLYQS_34
as a Euclidean distance function, +.>
Figure QLYQS_37
,/>
Figure QLYQS_40
Horizontal distance and vertical distance of the RFID tag to the receiver, respectively, < >>
Figure QLYQS_29
Is related to RFID label and auxiliary equipment on secret carrier terminal
Figure QLYQS_35
Distance between->
Figure QLYQS_39
Is related to RFID tag and auxiliary device on the confidential carrier terminal>
Figure QLYQS_41
Distance between->
Figure QLYQS_31
Is related to RFID tag and auxiliary device on the confidential carrier terminal>
Figure QLYQS_38
Distance between them.
2. The method for on-site monitoring of a confidential carrier terminal according to claim 1, wherein when the access information is abnormal, determining an active area of the confidential carrier terminal according to the access information, and then further comprising:
when the access information is abnormal, the audible and visual alarm is controlled to give an alarm, and the image information of the storage area of the corresponding confidential carrier terminal is acquired.
3. The method for monitoring the presence of a confidential carrier terminal according to claim 1 or 2, further comprising:
and storing the registration information of the confidential carrier terminal, the image information of the storage area of the confidential carrier terminal, the real-time access information and the real-time position of the confidential carrier terminal which are acquired in real time into a database.
4. A method for monitoring the presence of a confidential carrier terminal according to claim 3, wherein the positioning of the confidential carrier terminal according to the positional relationship further comprises:
determining a holographic map according to RFID tag signals acquired by a fixed reader in real time and space information acquired by a sensor deployed in a storage area of a secret-related carrier terminal;
and displaying the registration information, the real-time image information, the access information and the real-time position of the confidential carrier terminal stored in the database on the holographic map.
5. An in-place monitoring system for a confidential carrier terminal, configured to implement the in-place monitoring method for a confidential carrier terminal according to any one of claims 1 to 4, comprising:
the data reading module is used for acquiring registration information of the confidential carrier terminal according to the RFID tag stuck on the confidential carrier terminal; the registration information includes: file name, file type, time of use, borrowing record, borrower;
the real-time monitoring module is used for acquiring image information of the storage area of the confidential carrier terminal in real time; the access information of the confidential carrier terminal in the set range is obtained by using a fixed reader arranged at an access opening of the confidential carrier terminal storage area; the image information includes: image information of personnel in and out; the access information includes: setting registration information corresponding to the RFID tag on the confidential carrier terminal in a range and the entering and exiting direction of the confidential carrier terminal;
the positioning tracking module is used for determining the corresponding movable area of the confidential carrier terminal according to the access information when the access information is abnormal; in the active area, according to the measured signal intensity of auxiliary equipment with a known position received by a receiver, determining the position relation between an RFID tag on a confidential carrier terminal and the auxiliary equipment by using an RSSI ranging method; and positioning the confidential carrier terminal according to the position relation.
6. The secure carrier terminal presence monitoring system of claim 5, further comprising:
the audible and visual alarm module is used for controlling the audible and visual alarm to give an alarm when the access information is abnormal and acquiring the image information of the corresponding confidential carrier terminal storage area;
the database module is used for storing the registration information of the confidential carrier terminal, the image information of the storage area of the confidential carrier terminal, the real-time access information and the real-time position of the confidential carrier terminal to the database;
the holographic map module is used for determining a holographic map according to the RFID tag signals acquired by the fixed reader in real time and the space information acquired by the sensor deployed in the storage area of the confidential carrier terminal; and displaying the registration information, the real-time image information, the access information and the real-time position of the confidential carrier terminal stored in the database on the holographic map.
CN202310403048.6A 2023-04-17 2023-04-17 Secret-related carrier terminal in-situ monitoring method and system Active CN116167399B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310403048.6A CN116167399B (en) 2023-04-17 2023-04-17 Secret-related carrier terminal in-situ monitoring method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310403048.6A CN116167399B (en) 2023-04-17 2023-04-17 Secret-related carrier terminal in-situ monitoring method and system

Publications (2)

Publication Number Publication Date
CN116167399A CN116167399A (en) 2023-05-26
CN116167399B true CN116167399B (en) 2023-07-07

Family

ID=86420375

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310403048.6A Active CN116167399B (en) 2023-04-17 2023-04-17 Secret-related carrier terminal in-situ monitoring method and system

Country Status (1)

Country Link
CN (1) CN116167399B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115809839A (en) * 2018-03-14 2023-03-17 联邦快递服务公司 Method for performing store-to-consumer logistics operations

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012143952A2 (en) * 2011-04-20 2012-10-26 B Amutha A system and apparatus for safe remote on-line tracing, shadowing, surveillance, inter-communication, location, navigation, tagging, rescue, recovery and restitution of humans and stolen/missing chattels, and the method/s thereof
CN202453917U (en) * 2011-07-12 2012-09-26 武汉华工安鼎信息技术有限责任公司 Confidential carrier intelligent monitoring system based on radio frequency identification (RFID)
CN102325155B (en) * 2011-07-14 2014-11-19 福建冰原网络科技有限公司 Vital sign monitoring method and system based on wireless sensor network
CN103955979A (en) * 2014-05-13 2014-07-30 广州市远望谷信息技术有限公司 Identification method and system for secrete-related moving carrier or equipment
WO2017132629A1 (en) * 2016-01-27 2017-08-03 Ping Liang Cellular wireless communication systems enhanced by intelligent self-organizing wireless distributed active antennas
CN114900797A (en) * 2016-12-30 2022-08-12 英特尔公司 Method and apparatus for radio communication
KR102130933B1 (en) * 2017-03-16 2020-07-08 론프록스 코퍼레이션 Systems and methods for positioning indoors using wireless positioning nodes
CN110351655B (en) * 2019-07-10 2021-06-18 博睿泰克科技(宁波)有限公司 Indoor positioning method and system based on signal multipath propagation measurement

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115809839A (en) * 2018-03-14 2023-03-17 联邦快递服务公司 Method for performing store-to-consumer logistics operations

Also Published As

Publication number Publication date
CN116167399A (en) 2023-05-26

Similar Documents

Publication Publication Date Title
US7898419B2 (en) Systems and methods for object localization and path identification based on RFID sensing
KR101797231B1 (en) BLE beacon-based system and method for managing entrance and exit
CN100450269C (en) Monitoring changeable locations of client devices in wireless networks
US8504431B2 (en) Method and system for monitoring forestry products
US7567179B2 (en) Configuration management system and method for use in an RFID system including a multiplicity of RFID readers
CN106559749B (en) Multi-target passive positioning method based on radio frequency tomography
CN106778957B (en) Positioning system and method based on RFID double-frequency technology
CN101853427A (en) Police affair information management and application integration system
CN108235290B (en) Method for quickly and accurately extracting mobile communication terminal user ID in near space
CN111866711A (en) Vehicle abnormal movement management method and system based on base station and vehicle management system
CN103258258B (en) Asset monitoring and anti-theft method based on RFID technology
TWI459304B (en) Object movement direction radio frequency identification method, device and the use of the device control area personnel access control system
CN116167399B (en) Secret-related carrier terminal in-situ monitoring method and system
CN204102174U (en) A kind of handheld device for Intelligent well cover supervisory system
CN111815992B (en) Fixed-point parking monitoring method, device and system, storage medium and electronic equipment
CN104914449A (en) Person one-way in/out identifying and positioning system based on 2.4G wireless communication
US20090289772A1 (en) Method and system for analyzing signals from electronic tags, and recording medium thereof
CN203689554U (en) Label card for monitoring properties and prevention of thievery
KR101837846B1 (en) Active Container Access Control Wireless Security System and Method thereof
Xiao et al. Research and application of RFID technology in smart campus
CN205103858U (en) Radio station management system that stands based on RFID
Adewole et al. Hybrid human resources localization and tracking system.
Du et al. The design of RFID dual frequency integrated technology based on prison application
SRAIRI et al. RFID based vehicle-infrastructure communication system for road maintenance
CN114139965A (en) Multi-sensor exhibition monitoring management system and guarantee management method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant