International Core Journal of Engineering 2020-26 | Page 209

The whole process of equipment logistics supervision is realized through physical identification, and automatic management is realized through physical identification in material acceptance, storage and discharge operations. x Data security: The key data stored in tags are encrypted in partitions by stream encryption. The key data will not be acquired or tampered with, which ensures the security of key data. The amount of data storage information is large: the capacity of the RFID chip is large, so the key information including equipment asset information, business flow information, inspection information, scrap information can be stored in the RFID tag, and form consistent interaction with background information to realize the life cycle management of asset information; Construction phase By using automatic identification technology to scan and record the use of Engineering materials, the automatic conversion of materials - > equipment - > assets is realized, which provides intuitive basis for completion and acceptance. x Operation and maintenance phase Environmental adaptability: China's territory is vast, the power grid is widely distributed, the outdoor power equipment working environment is complex, labels need to meet long time high pressure, sunlight, high humidity, low temperature, wind and sand, and so on. The special RFID tag shell is made of ABS material, coated with anti ultraviolet and high temperature resistant materials, and the antenna is designed with special materials and special materials, which can be adapted to electric power. Equipment application environment, and ensure effective work for 10 years; Using high-security RFID and mobile terminal equipment, in the process of equipment operation, the functions of work assignment, defect data acquisition and defect reporting are carried out through the life cycle management system of power equipment assets. In management, the patrol control and the standardization of defect input are realized through the patrol field acquisition terminal. x Retirement and Abandonment Stage In the process of asset scrapping, the asset information can be automatically checked and scrap information can be automatically generated to prevent the loss of assets. Installation modes are various: Electric power equipment has various forms. In order to ensure that it is suitable for a variety of electric power equipment, the special label designed integrates five installation modes: strong glue installation, double-sided glue installation, screw installation, rivet installation and two-end banding installation. C. Electronic tag based on high security RFID Technology x High Security RFID Electronic Tag Characteristics Compared with traditional barcode tags, high security RFID tags have many irreplaceable advantages: x Working principle of high safety RFID tag for power equipment In addition to unique ID number, RFID tags also have certain data storage space, which can write the key data of assets into tags to solve the problem of traditional tags depending on network connection and interconnection between different systems. The high security electronic tag based on the national secret algorithm can encrypt the written data and authorize the tag writing. It can effectively protect the security of asset data and realize the decentralized management of assets. High security RFID for power equipment uses 900MHz passive radio frequency identification technology. The tag does not need external battery power supply. Its internal power recovery circuit restores the radio frequency carrier to DC power supply for other internal circuits of the chip. There is a non-volatile memory inside the tag. The essence of all kinds of applications based on RFID is to read and write the memory. This is a non-contact automatic identification technology based on radio frequency communication. The distance between the measuring equipment equipped with radio frequency tag and the reading and writing terminal is mutual induction in a certain range to realize non-contact automatic identification. The interaction between read-write terminal and data exchange and management system can process the data stored in RF tags for different applications. RFID tags can be encapsulated into different forms according to different application scenarios, using special materials to achieve IP67 dust-proof and waterproof grade. The tag chip is mainly composed of control logic, memory, algorithm unit and RF analog front-end. Its structure block diagram is shown as follows: Electronic tags can realize mass reading, scan and identify a large number of tags within a few meters, not only can realize efficient inventory of assets, but also can use this feature to achieve rapid location and search of warehouse assets, reduce the workload of warehouse management; x Characteristics of High Security RFID Electronic Label for Power Equipment The special tag of high security RFID for power equipment fully considers the demand of power application and field application environment. Based on the national standard UHF RFID chip, the special tag has the following characteristics and advantages: Tag anti-counterfeiting: Because of the use of RFID chip with national secret SM7 algorithm, the key is distributed through the unified key management system of the national network, the authenticated tags and read-write devices can communicate normally, ensure one sign and one secret, and achieve high-level anti-counterfeiting function; 187