News

Home > News > Content
Explore The Application Of RFID Internet Of Things Technology In Postal Security System
Jun 19, 2018

In recent years, the postal industry has accelerated the research and exploration of key technologies for the Internet of Things and has achieved certain results. The establishment of the Post IoT security intelligent architecture will bring a qualitative leap for postal security work, and postal security will enter a new era.

1, postal security intelligent platform architecture

The application of Internet of Things technology in the postal industry is currently focused on all aspects of production. However, security defense is the basic guarantee for all production activities. The application of the postal security and intelligence system to Internet of Things technology also relates to the future of postal services.

The postal security intelligent system architecture strictly follows the architecture of the Internet of Things system and is mainly composed of an awareness-based interaction layer, a network transmission layer, and an application service layer .

1.1 Perceptual interaction layer

The perception and interaction layer is the foundation of the postal security intelligence system architecture and is the connecting layer between the physical world and the information world. This layer mainly realizes data acquisition, information perception, automatic identification and control of the bottom layer through RFID technology, sensor technology or electronic label technology. For example, temperature and humidity sensors, voltage monitors, and smoke sensors are used to collect environmental data from important locations, and electronic collection and RFID technology are used to collect information on the legality of the cashbox, through pressure sensors, vibration sensors, and infrared detectors. Realize the collection of illegally-invasive object information.

1.2 Network Transport Layer

The network transmission layer is the middle layer of the postal security intelligent system architecture. It mainly implements the transmission and communication of information, that is, it is responsible for the various types of information collected by the perception and interaction layer. It is highly efficient and reliable through postal integrated computer networks, the Internet, or other network infrastructure. , securely transmitted to the application service layer to achieve user-object interaction or object-to-item interaction. The transmission layer of the postal security intelligentization system will be based on the postal integrated network and the Internet as the supplement to enhance the stability of the network as much as possible.

1.3 Application Service Layer

The application service layer combines the technology of the Internet of Things with security requirements, encapsulates the sensing data processing, and provides the service to the user, that is, the results are displayed to the user according to the needs of postal security. In terms of interaction with users, it is necessary to provide a user interface customization model under a massive information environment to achieve an intelligent and interactive system that is friendly and convenient, especially for low network and computer resource consumption.

2, postal security intelligent system function and implementation

The postal security intelligent platform mainly studies the application of IoT technology from four aspects. The specific functions are shown in Figure 2.

2.1 Smart Intrusion Prevention

2.1.1 Background

Many places in postal facilities have strict access systems, such as treasury, information center, monitoring center, financial business management site, and some important office locations. Access to these important places requires identification and permission to enter. Some places or areas may not be accessible without permission, such as the vault, cash registers, cash drawers, etc. However, in the actual work at present, the identity verification of entering personnel depends on human judgment, which can not guarantee the accuracy of the authentication, can not eliminate the phenomenon of illegal access, resulting in the occurrence of multiple robbery cases. In view of this status quo, it is necessary to use technical means to achieve the identification of personnel identities and to take active defense against illegal intrusions.

2.1.2 Function

According to the safety level of a particular place, in a certain area, once someone illegally approaches, a variety of methods will be used to alarm immediately, and the video image of the alarm area will be transmitted to the monitoring center at the same time. For personnel entering the site, the employee badge is used for the first time to identify the identity of the employee, and then fingerprints and face features are verified. All fingerprints and facial features can be accessed. Once the verification fails, the same alarm is issued and the alarm zone video image is transmitted to the monitoring center. The first time alarm was also reported for the attempt to damage the building components such as doors, windows and walls.

2.1.3 Implementation

Each employee wears an employee badge with an electronic tag. Various attribute attributes of the wearer are written into the electronic tag. Pressure sensors are placed on the ground within a certain area around a specific area, and a long-distance RFID reader is placed at a suitable location in the periphery. Anyone who has not been identified by the RFID reader enters a specific area and touches the pressure sensor to issue an alarm. At the same time, the video monitoring device is triggered to transmit the live image to the monitoring center. The identification of the personnel, according to the need for fingerprint recognition and face recognition, to further determine the legitimacy of the identity (see Figure 3). Vibration sensors or acceleration sensors are placed in the walls, doors, windows, important objects, etc. of buildings, and personnel attempting to forcibly enter the building will issue an alarm message at the initial stage of destroying or touching the building components. According to environmental factors, data will be output mainly by wired networks and supplemented by wireless networks.

2.1.4 Technical Difficulties

The technical difficulties of smart anti-intrusion are the connection of multiple sensors and the linkage between sensors, alarm devices, and image transmission devices.

2.2 Cash Box Delivery Security

2.2.1 Background

With the booming development of postal financial services, the amount of cash needed by the branches (branches) of the postal service has been continuously increasing, and the amount of cash transported daily from the vault to the sub-branches has also increased. The existence of security loopholes in the entire process of delivery of the cash box may result in criminal activities aimed at transporting the cash box. For example, the detaining staff may change the cash box privately and steal cash; the criminals pretend to be paid by the demobilization personnel to the branch office to receive the branch cash box in advance. Criminal activities have seriously affected the healthy development of postal financial services, and also caused major losses to people’s property.

The management of cash box mainly has the following security risks: First, the judgment of the authenticity of the cash box still relies on manual identification, the staff cannot accurately identify whether the cash box is a cash box for the branch, and cannot prevent the occurrence of the case of the internal staff losing the money box; It is difficult to identify the legitimacy of cash dispensers and debenturers, especially when the salesperson and the out-clearing debentures are replaced. There are hidden dangers in which the criminals pretend to accept the cash box. Third, the cash box delivery time cannot be accurately and promptly obtained. The active monitoring methods for time limits of outsourcing companies' shipments are also detrimental to the formulation and optimization of the banknote routing.

2.2.2 Function

Automatically identify the legality of escort personnel, escort vehicles and cash boxes, discover abnormalities, send out alarm information, and transmit regional video images; automatically record the transport time of cash boxes at various stages, and provide early warning of overdue failures and help management personnel to strengthen External escort companies monitor the time limit of escort and optimize the route for banknotes.

2.2.3 Implementation Method

The RFID readers are installed at the junction of the cashbox, the branch office (branch), and the armored car door. Each escort officer, each escort vehicle, and each cash box are installed with electronic tags of various attribute characteristics. Banknotes install wireless communication devices and positioning devices.

Personnel, Vehicle, and Cashbox Identification: After the escort vehicle enters the set area, the RFID reader of the sub-bureau recognizes the legality of the identity of the vehicle and escort personnel. If the verification fails, an alarm is issued and an alarm video image is transmitted. This function helps the staff to accurately identify whether the cash box is a branch payment box, prevent the internal staff from losing the money box case, and also solve the problem of difficult identification of the legality of money transfer vehicles and depots, even if the salesperson, When the outsourced cashiers are replaced, they can also accurately prevent the occurrence of cases in which the escort officers have taken over the money box in advance. Cash box delivery control: When the cash box leaves the vault, enters the armored car, leaves the armored car, and arrives at the branch office (line), the RFID readers in various locations automatically record the specific time for each cash box to be identified, through the back-office design. Each time point is compared, real-time location of the cash transport vehicle that has not yet reached the designated location and an early warning message is issued in real time. At the same time, the cash box handover time can be accurately and promptly grasped, and the initiative for the outsourcing company to transport cash notes is enhanced. Monitoring efforts.

2.2.4 Key Technologies

The key technology for the delivery of cashboxes is the access of multiple sensors, the linkage of sensors and alarm devices, image transmission devices, and wireless communication technologies.

2.3 Environmental Monitoring

2.3.1 Background

Environmental monitoring work is a work that all walks of life attach great importance to, the environment temperature and humidity, various parameters of the power supply system, fire monitoring, early warning, anti-theft doors and windows closed, whether the air quality is up to standard, etc., need real-time or quasi-real-time monitoring. The traditional environmental monitoring needs to consume a large amount of labor costs, and the accuracy and timeliness of monitoring cannot be ensured. As a result, the initial abnormality of environmental parameters cannot be detected in a timely manner, eventually leading to accidents and causing major losses.

2.3.2 Functions

Real-time or quasi-real-time monitoring of the temperature and humidity of a specific environment, various voltages and currents of the power supply system, whether there is water leakage, whether the doors and windows are closed, whether there is a fire, equipment operation status, etc., abnormal alarms are detected in time, and video images are transmitted.

2.3.3 Implementation Method

Environmental temperature and humidity monitoring: The installation of temperature and humidity probes in places with high temperature and humidity requirements, real-time monitoring, temperature and humidity values exceed the set threshold, the system sends an alarm message.

Anti-theft door and window monitoring: Through the magnetic sensors installed on the doors and windows to detect the opening and closing of doors and windows, especially the monitoring of the linkage doors in the business premises, it can detect abnormal situations in time.

Monitoring of power supply system parameters: installation of voltage and current test terminals, real-time measurement of zero fire voltage, zero earth voltage, current and other parameters of the power supply system to ensure the safety of equipment power.

Water intrusion monitoring: Water infiltration sensors detect leaks in equipment rooms, warehouses, and other venues.

Air quality monitoring: Through air quality sensors installed in important places, real-time monitoring of air quality is up to the standard to ensure a healthy working environment for workers.

Fire monitoring: By installing a fire smoke sensor, it is ensured that an alarm can be issued in an early stage of a fire and measures can be taken immediately.

Server health monitoring: Through the installation of client software in each important server system, real-time monitoring of various server parameters to ensure the stable operation of the system.

Through the installation and deployment of monitoring sensors, managers can view the actual situation of important places anytime, anywhere; when an abnormal situation occurs within the production environment, the environmental monitoring system automatically feedbacks the detailed information of the changing environment according to the preset actions and takes the initiative to take Effective treatment method.

2.3.4 Technical difficulties

The technical difficulty of environmental monitoring is the access of multiple sensors, and the linkage between sensors and alarm equipment and image transmission equipment.

2.4 Vehicle Safety Management

2.4.1 Background

Post has a huge physical transport and delivery network, that is, it has a huge number of transport and delivery vehicles. Many attempts have also been made for the safety management of vehicles, such as GPS positioning, speed control, etc. Most of these methods cannot actively insecure vehicles. The behaviors are monitored and alarmed. In and out of the vehicle cannot be recorded in real time. Security personnel are required to participate in the activity, and the vehicle's operating range cannot be actively supervised.

2.4.2 Function

Alarms are issued for vehicles that are overspeeding and beyond the operating range. At the same time, the driver of the vehicle is actively prompted to actively identify the identity of the vehicle. After the confirmation, the entrance is automatically opened, and the time of the vehicle at each site is recorded. This facilitates management personnel to adjust the route of the vehicle.

2.4.3 Implementation

Establish electronic maps of vehicles running at the monitoring center, set electronic fences for each vehicle on the electronic map, install RFID readers at the entrances of parking lots and vehicle operation sites, and install GPS positioning devices and electronic tags on vehicles. The GPS positioning device determines the route and the vehicle speed at which the vehicle runs, determines the time when the vehicle is running to a specific place through the electronic tag, and the legitimacy of the vehicle's entry.

2.4.4 Technical Difficulties

The technical difficulties of vehicle safety management are the establishment of electronic maps and the delineation of electronic fences.