International Core Journal of Engineering 2020-26 | Page 209
The whole process of equipment logistics supervision is
realized through physical identification, and automatic
management is realized through physical identification in
material acceptance, storage and discharge operations.
x
Data security: The key data stored in tags are encrypted
in partitions by stream encryption. The key data will not be
acquired or tampered with, which ensures the security of key
data.
The amount of data storage information is large: the
capacity of the RFID chip is large, so the key information
including equipment asset information, business flow
information, inspection information, scrap information can
be stored in the RFID tag, and form consistent interaction
with background information to realize the life cycle
management of asset information;
Construction phase
By using automatic identification technology to scan and
record the use of Engineering materials, the automatic
conversion of materials - > equipment - > assets is realized,
which provides intuitive basis for completion and acceptance.
x Operation and maintenance phase
Environmental adaptability: China's territory is vast, the
power grid is widely distributed, the outdoor power
equipment working environment is complex, labels need to
meet long time high pressure, sunlight, high humidity, low
temperature, wind and sand, and so on. The special RFID tag
shell is made of ABS material, coated with anti ultraviolet
and high temperature resistant materials, and the antenna is
designed with special materials and special materials, which
can be adapted to electric power. Equipment application
environment, and ensure effective work for 10 years;
Using high-security RFID and mobile terminal
equipment, in the process of equipment operation, the
functions of work assignment, defect data acquisition and
defect reporting are carried out through the life cycle
management system of power equipment assets. In
management, the patrol control and the standardization of
defect input are realized through the patrol field acquisition
terminal.
x Retirement and Abandonment Stage
In the process of asset scrapping, the asset information
can be automatically checked and scrap information can be
automatically generated to prevent the loss of assets.
Installation modes are various: Electric power equipment
has various forms. In order to ensure that it is suitable for a
variety of electric power equipment, the special label
designed integrates five installation modes: strong glue
installation, double-sided glue installation, screw installation,
rivet installation and two-end banding installation.
C. Electronic tag based on high security RFID Technology
x High Security RFID Electronic Tag Characteristics
Compared with traditional barcode tags, high security
RFID tags have many irreplaceable advantages: x Working principle of high safety RFID tag for power
equipment
In addition to unique ID number, RFID tags also have
certain data storage space, which can write the key data of
assets into tags to solve the problem of traditional tags
depending on network connection and interconnection
between different systems. The high security electronic tag based on the national
secret algorithm can encrypt the written data and authorize
the tag writing. It can effectively protect the security of asset
data and realize the decentralized management of assets. High security RFID for power equipment uses 900MHz
passive radio frequency identification technology. The tag
does not need external battery power supply. Its internal
power recovery circuit restores the radio frequency carrier to
DC power supply for other internal circuits of the chip. There
is a non-volatile memory inside the tag. The essence of all
kinds of applications based on RFID is to read and write the
memory. This is a non-contact automatic identification
technology based on radio frequency communication. The
distance between the measuring equipment equipped with
radio frequency tag and the reading and writing terminal is
mutual induction in a certain range to realize non-contact
automatic identification. The interaction between read-write
terminal and data exchange and management system can
process the data stored in RF tags for different applications.
RFID tags can be encapsulated into different forms
according to different application scenarios, using special
materials to achieve IP67 dust-proof and waterproof grade. The tag chip is mainly composed of control logic,
memory, algorithm unit and RF analog front-end. Its
structure block diagram is shown as follows:
Electronic tags can realize mass reading, scan and
identify a large number of tags within a few meters, not only
can realize efficient inventory of assets, but also can use this
feature to achieve rapid location and search of warehouse
assets, reduce the workload of warehouse management;
x Characteristics of High Security RFID Electronic
Label for Power Equipment
The special tag of high security RFID for power
equipment fully considers the demand of power application
and field application environment. Based on the national
standard UHF RFID chip, the special tag has the following
characteristics and advantages:
Tag anti-counterfeiting: Because of the use of RFID chip
with national secret SM7 algorithm, the key is distributed
through the unified key management system of the national
network, the authenticated tags and read-write devices can
communicate normally, ensure one sign and one secret, and
achieve high-level anti-counterfeiting function;
187