201118744 六、發明說明: 【發明所屬之技術領域】 本發明是有關於一種管理系統,特別是指一種使用射 頻辨識(Radio Frequency Identification,RFID)技術的整入管 理系統。 【先前技術】BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a management system, and more particularly to a system for managing a radio frequency identification (RFID). [Prior Art]
傳統維護校園安全的方法是以派遣人力的方式.進行巡 邏’但由於巡邏範圍太大除了必需花費大量時間,對於緊 急事件也無法在第一時間監控’且又由於人事精簡而造成 校園管理的工作負擔更為加重。 另外’根據校園的傳統通訊方式,若有來自外部的電 活要找内部的某人員時,若該人員剛好不在位置上,就只 能請他人、或總機幫忙轉接、或留下聯絡資料、或稍後再 重播,而無法即時地找到該人員,甚至耽誤緊急事件的處 理時間。 【發明内容】 因此’本發明之目的,即在提供一種避免錯過緊急事 件的處理時間,並能對學生出缺席的情況即時掌握且減輕 校園管理工作負擔的整合管理系統。 該整合管理系統,適用於處理來自—發話端的一個載 有-受話端之-系統帳號的要求通訊信號,該系統包含: 多數個讀取器,每一讀&哭# 貝取益5又置於至少一個網路話機 的附近,並用於偵測該受話端; 一資料庫’用於儲存該季 示现帳號對應的一射頻辨識 201118744 (RFID)標藏,並儲存該對應RFID標籤被哪一讀取器偵測到 ,且儲存該對應RFID標籤適用於「偵測到其之讀取器」的 哪一個鄰近網路話機;及 一對話啟動協定(SIP)伺服器分別電連接於該資料庫 及每一網路話機,且會設定該對應RFID標籤做為該受話端 ,並根據該要求通訊信號所載的系統帳號對該資料庫進行 查詢,而得知該受話端被哪一讀取器偵測到且得知適用哪 一網路話機,並藉由該網路話機建立該發話端與該受話端 間的通訊。 【實施方式】 有關本發明之前述及其他技術内容、特點與功效,在 以下配合參考圖式之三個較佳實施例的詳細說明中,將可 清楚的呈現。 <第一較佳實施例> 如圖1所示’本發明整合管理系統2之第一較佳實施 例,適用於經由一專用自動交換機(Private Aut〇maUc Branch eXchange,PABX)l〇接收來自一發話端的一個載有一 受話端之一系統帳號的要求通訊信號。並且,該整合管理 系統2會從複數個網路話機1中選出一個,以藉由該選出 的網路話機1建立該發話端與該受話端間的通訊。 本例中,該受話端是一個RFID標籤3,該發話端是指 直接連接上PABX 10的一傳統電話或一手機,也可以是指 透過公用父換電話網路(pubHc switched Telephone NetW〇rk,PSTN)連接上PABX 10的一裝置(圖未示卜而網路 201118744 話機1是指一網路協定(Internet Protocol, IP)電話或是一軟 體電話。 該整合管理系統2包含依序電連接的一 RFJD中介控制 器5、一資料庫6及一對話啟動協定(Sessi〇n Iniiiati〇n Protocol, SIP)伺服器7。且SIP伺服器7會電連接前述該等 網路話機1。The traditional way to maintain campus security is to patrol the way of dispatching manpower. 'But because the patrol is too large, it takes a lot of time, it can't be monitored for the first time in an emergency, and the campus management work is caused by the streamlining of personnel. The burden is even heavier. In addition, according to the traditional communication method of the campus, if there is someone from the outside to find someone inside, if the person is not in the position, they can only ask others, or the switchboard to help transfer, or leave contact information, Or replay it later, and you can't find the person in real time, even delaying the processing time of the emergency. SUMMARY OF THE INVENTION Accordingly, it is an object of the present invention to provide an integrated management system that avoids the need to miss the processing time of an emergency event and can instantly grasp and reduce the burden of campus management work for the absence of the student. The integrated management system is adapted to process a request communication signal from a system-loaded-received-system account. The system comprises: a plurality of readers, each reading & crying #贝取益5 is placed again In the vicinity of at least one network phone, and used to detect the receiving end; a database 'for storing a radio frequency identification 201118744 (RFID) corresponding to the current account, and storing the corresponding RFID tag is read The picker detects and stores the neighboring network phone of the corresponding RFID tag for "detecting the reader"; and a session initiation protocol (SIP) server is electrically connected to the database and Each network phone, and the corresponding RFID tag is set as the receiving end, and the database is queried according to the system account number contained in the request communication signal, and it is known which reader is detected by the receiver. Detecting and knowing which network phone is applicable, and establishing communication between the utterer and the receiver by the network phone. The above and other technical contents, features and effects of the present invention will be apparent from the following detailed description of the preferred embodiments of the drawings. <First Preferred Embodiment> As shown in Fig. 1, a first preferred embodiment of the integrated management system 2 of the present invention is adapted to be received via a private automatic switch (Private Aut〇maUc Branch eXchange, PABX) A request communication signal from a system that carries a system account of one of the terminals. Moreover, the integrated management system 2 selects one of the plurality of network telephones 1 to establish communication between the calling terminal and the called terminal by the selected network telephone 1. In this example, the receiving end is an RFID tag 3, which refers to a traditional telephone or a mobile phone directly connected to the PABX 10, or may refer to a public telephone exchange network (pubHc switched Telephone NetW〇rk, PSTN) A device connected to the PABX 10 (not shown and the network 201118744 phone 1 refers to an Internet Protocol (IP) phone or a software phone. The integrated management system 2 includes electrical connections in sequence. An RFJD mediation controller 5, a database 6 and a session initiation protocol (Sessi〇n Iniiiati〇n Protocol, SIP) server 7. The SIP server 7 is electrically connected to the aforementioned network phones 1.
此外,該整合管理系統2更包含多數個讀取器4 A、4B 、4C。每一讀取器4A〜4C設置於至少一個網路話機】的附 近,且用於在一偵測範圍内偵測該受話端,以得到一具有 該受話端之一獨特標籤編號的讀取信號。且在本實施例令 ,每一讀取器4A〜4C的偵測範圍彼此之間不重複,因此不 會有多數個讀取器同時偵測到該受話端的情況發生。 RFID令介控制器5電連接每一讀取器4A〜4C,且接收 來自各頃取态的項取信冑,當其中一讀取器偵測到該受話 端時,對應的讀取信號合且古兮… 說a具有该標戴編號,且在本實施例 中RFID中介控制气θ ,、, ^ 』态5疋以—RFID中介軟體(Middleware) 實現》 參閱圖2和圖3,眘袓. 貝枓庫6包括一糸統帳號對應表61 、一讀取ϋ對應表62、—話機對應表63,和—衫電話對 應表64由於發遺端每次要求的受話端可能不同所以發 出的要求通訊信號會跟著載 戰不问糸統帳號。因此,該系 統帳號對應表61會儲在夂# 。 省存各種可能系統帳號所對應的一標籤 編號’該讀取器對庳袅 RFm ^ χ …表62會儲存具有該等標籤編號的 RFID標戴分別被哪—讀 取器4A〜4C偵測到,該話機對應表 201118744 63會儲存具有該等標籤編號的RFID標籤分別適用於「偵 測到其之續取器」的哪一個鄰近網路話機^,且該指定電話 對應表64會儲存具有該等標籤編號的RFid標籤分別對應 的私疋電話,而該等對應表的使用方式會於稍後說明。 <電話轉撥方法> 較佳地,本例適用於校園内,每一學生都會配戴一具 有獨特標籤編號的RFID標籤3,以做為可能的受話端。當 來自校園外部的發話端要求與校園内部的某―受話端建立 通Λ時’該整合官理线2將執行__種電話轉撥方法,該 電活轉撥方法包括圖4的以下步驟: 。步驟12: SIP飼服器7接收發話端傳來的一載有系統帳 ° .要长通則。號’且根據該系統帳號對系統帳號對應表 61進行查詢’以得知對應的標籤編號。請注意,具有這個 標籤編號的RFID標籤3即為所期望進行通訊的受話端。 >步驟13 :训词服器7根據該標籤編號對該資料庫6的 項取益對應表62進㈣詢,以判斷該受話端是否被哪一讀 取器4A〜4C_到,若是則進到步驟14,反之,則進到步 ,步驟14 ·· SIP词服器7根據該標籤編號對—㈣對應表 63進仃查詢’以判斷該受話端適用於「制到其之讀取器 M4C」所鄰近的哪'網路話機ι而具有使用權限。若有使 用權限,則進行轉撥,反之,則進到步驟15。 步驟,15. SIP伺服器7根據該標籤編號對一指定電話對 應表64進行杳詢,^ π丨 & — 寸1丨該文話端的一指定電話號碼,且 201118744 根據該指定電話號碼進行轉撥。 其中,該指定電話號碼不限於手機號碼或是家裡傳統 電話’也可以是家中的網路電話。 上述的轉撥方式,在本實施例中是於SIP伺服器7中安 裝一 Astensk軟體作為電信交換機以進行建立通話的操作, 但不限於此,也可以其他具有電信交換機功能的硬體或軟 體實現。 在此舉一例子說明受話端對其中一網路話機丨且有使 用權的情況。回歸參閱圖2’若發話端要求與系統帳號1〇2 ,立通話,SIP飼服器7查表得知該系統帳號1〇2的對應標 籤編號為A1B0,進而查表以得知標鐵編號aib〇目前位: 讀取器4C的偵測範圍内,再查表得知對於話機號碼細 具有使用權’便進行轉撥。 不具有使用權的例子如圖3所示,若標籤編號A⑽目 别位於讀取器4B㈣測範圍内,再查表以得知對讀取号 仙之話機號碼不具有使用權⑽中顯示為null),便再查表 以得知指定電話號碼0933869543來進行轉撥。 一 值得注意的是,當受話端游移於該等讀取器4a〜4C間 各讀取信號傳回的標籤編號會產生變動,所以 =制器5會適時地據以更新讀取器對應表Q與話機對録 〈第一較佳實施例> 如圖5所示’本發明整合管理系統2之 例,與第一較佳實施例的差別為:整 & 0 Β理系統2更包含 201118744 多個用以偵測複數個待測端的 』鲕的5買取器4,且更包含電連接於 該SIP飼服器7的一雷腦8 a ❖ a 包細8 u及多數個網路協定監視器9。 而每一網路協定監視器9會 應讀取器附近。 會對應一個讀取器4,並設置於對 此外本例的貝料庫6更用於儲存哪-讀取器4债測 到哪-待測端’並儲存所有待測端的通信資料。每一待測 端的通L貝料可以疋指—專屬受話端的系統帳號、手機電 話、室内電話、電子郵件,也可以是其他通信方式。 <危險區域監控方法> 如圖6所示,本例的待測端是相各學生所配戴的rfid 標籤’且每-待測端的通㈣料會指向該學生之專屬教務 管理人員,而該等讀取H 4是設置於校園内危險區域,例 如.建築工地、樓頂,或是校園中較偏僻少人活動的地方 當有學生進入讀取器涵蓋的危險區域,警衛人員可選 擇性地利用該電腦8來啟動網路協定監視器9進行監控,' 此時該整合管理系統2將執行一危險區域監控方法,該危 險區域監控方法包括以下步驟: 步驟21 :當設置於危險區域的讀取器4偵測到配戴 RFID標籤3之學生進人時,會輸出—具有對應標籤編號和 s亥讀取器之網路位址的讀取信號’以供rfid中介控制器$ 通知該SIP伺服器7。 步驟22 : SIP伺服器7根據該標籤編號從資料庫6找出 該子生所配戴RFID標戴的通信資料’且顯示於電腦8的— 201118744 螢幕上。請注意,本流程的學生通信資料是指教務管理 員的糸統帳號。 步驟23 :電腦8接收專屬教務管理人員的系統帳號, 且扮演該發話端的角色而向該SIP伺服器7發出一載有專屬 教務管理人員之系統帳號的要求通訊信號。 步驟24 : SIP伺服器7根據教務管理人員之系統帳號所 對應的標籤編號進行轉撥,以建立警衛人員與教務管理人In addition, the integrated management system 2 further includes a plurality of readers 4 A, 4B, and 4C. Each reader 4A~4C is disposed in the vicinity of at least one network phone, and is configured to detect the receiver end within a detection range to obtain a read signal having a unique tag number of the receiver end. . Moreover, in the embodiment, the detection ranges of each of the readers 4A to 4C are not overlapped with each other, so that there is no case where a plurality of readers simultaneously detect the received terminal. The RFID controller 5 is electrically connected to each of the readers 4A to 4C, and receives the item fetching signals from the respective states. When one of the readers detects the receiving end, the corresponding read signal is combined.古兮... Say a has the standard number, and in this embodiment, the RFID intermediary controls the gas θ, ,, ^ 』 state 5疋 to - RFID media software (Middleware implementation) See Figure 2 and Figure 3, Shen. The Beckham library 6 includes a unified account account correspondence table 61, a read/correspondence table 62, a phone correspondence table 63, and a shirt phone correspondence table 64. The request communication is issued because the caller end may be different each time the call end request is different. The signal will follow the battle without asking the account. Therefore, the system account correspondence table 61 will be stored in 夂#. Save a tag number corresponding to various possible system accounts. 'The reader pair RFm ^ χ ... table 62 will store the RFID tags with the tag numbers, respectively - which are detected by the readers 4A to 4C The telephone correspondence table 201118744 63 stores the neighboring network telephones of the RFID tags having the label numbers respectively applicable to the "receiving the reclaimer", and the designated telephone correspondence table 64 stores the The RFid tags of the tag numbers correspond to the private phones, and the usage of the corresponding tables will be described later. <Telephone Transfer Method> Preferably, this example is applicable to a campus, and each student wears an RFID tag 3 having a unique tag number as a possible call end. When the caller from outside the campus requests to establish a communication with a certain caller inside the campus, the integrated official line 2 will execute the __phone transfer method, which includes the following steps of FIG. 4: . Step 12: The SIP feeder 7 receives a system account from the sender. The number 'and the system account correspondence table 61 is queried according to the system account number' to know the corresponding tag number. Please note that the RFID tag 3 with this tag number is the intended end of the communication that is expected to be communicated. > Step 13: The training server 7 enters (4) the item benefit correspondence table 62 of the database 6 according to the tag number to determine whether the receiver is accessed by which readers 4A to 4C_, and if so, Go to step 14, and vice versa, then go to step, step 14 · · SIP word server 7 according to the tag number - (four) correspondence table 63 query 'to query 'to determine the receiver is suitable for "made to its reader M4C "Which is adjacent to the Internet phone ι and has access rights. If there is permission to use, transfer is performed, otherwise, proceed to step 15. Step 15. The SIP server 7 queries a specified telephone correspondence table 64 according to the label number, and π 丨 amp amp 丨 丨 丨 一 一 一 一 一 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 dial. The designated telephone number is not limited to a mobile phone number or a traditional telephone at home, and may also be a home network telephone. In the above embodiment, the Astensk software is installed in the SIP server 7 as a telecommunications switch to establish a call, but the invention is not limited thereto, and other hardware or software having the function of the telecommunication switch can be implemented. . Here is an example of the case where the receiving end has a right to use one of the network telephones. Regression refers to Figure 2' If the caller requests and the system account number 1〇2, the call is made, the SIP feed device 7 check the table to know that the corresponding tag number of the system account 1〇2 is A1B0, and then look up the table to know the standard number. Aib〇 current position: Within the detection range of the reader 4C, and then look up the table to know that the phone number has the right to use 'transfer. An example of not having the right to use is shown in Fig. 3. If the tag number A (10) is within the range of the reader 4B (four), look up the table to find that the phone number of the read number is not used (10) is displayed as null. ), then check the table to know the designated phone number 0933869954 for transfer. It is worth noting that when the receiving end moves between the readers 4a and 4C, the tag number returned by each read signal will change, so the controller 5 will update the reader correspondence table Q according to the time. Recording with the telephone <First Preferred Embodiment> As shown in FIG. 5, the example of the integrated management system 2 of the present invention differs from the first preferred embodiment in that the whole & 0 processing system 2 further includes 201118744. a plurality of 5 purchasers 4 for detecting a plurality of terminals to be tested, and further comprising a lightning rod 8 a ❖ a package 8 8 and a plurality of network protocol monitoring electrically connected to the SIP feeder 7 9. And each network protocol monitor 9 should be near the reader. It will correspond to a reader 4, and will be set to the pair. In addition, the shell library 6 of this example is used to store which-to-detector 4 debt-to-measurement end and store all the communication data of the terminal to be tested. The pass-through material of each terminal to be tested can refer to the system account of the exclusive receiver, mobile phone, indoor phone, email, or other communication methods. <Hazardous Area Monitoring Method> As shown in Fig. 6, the end of the test in this example is the rfid tag worn by each student's and the pass-through of each of the terminals to be tested is directed to the exclusive educational administrator of the student. The reading H 4 is placed in a dangerous area on campus, such as a construction site, a roof, or a relatively small number of people on campus. When a student enters a dangerous area covered by a reader, the guard can choose The computer 8 is used to start the network protocol monitor 9 for monitoring, 'At this time, the integrated management system 2 will execute a dangerous area monitoring method, and the dangerous area monitoring method includes the following steps: Step 21: When set in the dangerous area The reader 4 detects that the student wearing the RFID tag 3 enters a read signal having a corresponding tag number and a network address of the s-reader for the rfid mediation controller $ notification The SIP server 7. Step 22: The SIP server 7 finds the RFID-tagged communication data from the database 6 based on the tag number and displays it on the computer 18-201118744 screen. Please note that the student communication data for this process refers to the administrator account of the Academic Administrator. Step 23: The computer 8 receives the system account of the dedicated educational administrator and plays the role of the speaking terminal, and sends a request communication signal to the SIP server 7 carrying the system account of the dedicated educational administrator. Step 24: The SIP server 7 transfers the label according to the label number corresponding to the system administrator's system account to establish the guard and the administrator.
員之間的通訊,因為此步驟24類似上述的電話轉撥方法, 故此不再縈述。 步驟25:根據教務管理人員的指示,電腦8接收一命 令,以決定是否進行監控,若是,則進到步驟%,反之, 則忽略進入危險區域的rFID標籤3。 步驟26:警衛人員的電腦8發出—具有該讀取器之網 路位址的監控指令給SIP词服器7,使snM司服器7啟動最 接近該讀取器4的一網路協定監視器9。 步驟27:網路較監視器9進行攝影以得到—龄視夺 像,且將該監視影像回傳顯示於電腦螢幕上。 / <第三較佳實施例> -一小哪Z〈弟三較佳眚始 與第一較佳實施例的差別為:整合管理系、统2更包含 多個用以_複數待測端的讀取器[並且,該資 合 儲存哪些待測端被該等讀取器4 ^ 端的通信資料。 儲存該等待測 本較佳實施例中 該等讀取器 4疋設置於上課教室内 201118744 ’該等待測端是指各學生所配戴的RFID標籤,每一待測端 的通信資料會指向該學生之家長。且該資料庫6更包括— 記錄有至少一待測端的請假記錄表65,會記錄學生請假時 間的訊息。 <考勤回報方法> 如圖8所示,在上課時間時對於安排上課的教室,該 整合官理系統2將執行一種考勤回報方法,該考勤回報方 法包含以下步驟: 步驟Μ .該等讀取器4對教室内每一 RFID標籤3進 行偵測,且回報一載有標籤編號的讀取信號給RFID中介控 制器5。 : μ步驟32 ’ RFID中介控制器5集合所有讀取信號所载的 t籤編戒來當作一已出席資料’並儲存至資料冑6中。亦 即,儲存哪些待測端被偵測到。Communication between the members, because this step 24 is similar to the above-mentioned telephone transfer method, and therefore will not be described again. Step 25: According to the instruction of the educational administrator, the computer 8 receives a command to decide whether to perform monitoring, and if so, proceeds to step %, otherwise, the rFID tag 3 entering the dangerous area is ignored. Step 26: The guard's computer 8 sends out a monitoring command with the reader's network address to the SIP word server 7, causing the snM server 7 to initiate a network protocol monitoring closest to the reader 4. 9. Step 27: The network takes a picture with the monitor 9 to obtain an image of the image, and displays the surveillance image on the computer screen. / <Third Preferred Embodiment> - The difference between the first and the third preferred embodiment is that the integrated management system and the system 2 further include a plurality of The reader of the end [and, the resource stores which communication ends are to be communicated by the readers. Storing the waiting sample in the preferred embodiment, the readers are disposed in the classroom of the class 201118744. The waiting terminal refers to the RFID tags worn by the students, and the communication data of each terminal to be tested points to the student. Parents. And the database 6 further includes - a leave record table 65 in which at least one terminal to be tested is recorded, and a message of the student leave time is recorded. <Attendance Return Method> As shown in FIG. 8, the classroom system 2 performs a time and attendance return method for the classroom in which the class is arranged during the class time, and the attendance return method includes the following steps: Step Μ. The extractor 4 detects each RFID tag 3 in the classroom and reports a read signal carrying the tag number to the RFID mediation controller 5. : μ Step 32 ' The RFID mediation controller 5 aggregates the t-tagged rings contained in all the read signals to be regarded as an attended material' and stored in the data frame 6. That is, which terminals to be tested are stored are detected.
步驟33 _ SIP伺服器7從該資料庫6中根據該已出席資 料與請假記錄表65進行比對,以_—缺席記錄表,且將 该缺席記錄表儲存至資料庫6。 /驟34 . SIP伺服器7根據該缺席記錄表内每一缺席學 生的㈣㈣’查m賣取器對應纟62’以判斷每—缺席學 生的所在位置。 =細來說’當缺席學生&RFID標籤位於其中—讀 圍内,训祠服器7會將該讀取器4之網路位址 對應£域寫入到該出缺席記錄表 4 方面,由於本例 等4取θ的分佈數目足以涵蓋整個校園而不存. 10 201118744 任何死角,所以當缺席學生的RFID標箴沒有被任何一個讀 取器4«到時,SIP舰器7是在該出缺席記錄表中記錄 :該學生不在校園内。 ' 步驟35 . SIP伺服器7根據每一沒有請假之缺席學生的 標籤編號從資料庫6中找出相對應的家長通信資料。 步驟36 . SIP词服器7根據家長通信資料對家長進行通 知’其中,該通知方式包括以電子郵件方式 '簡訊方式, 和語音方式。 步驟37·· SIP伺服器7是否收到由家長傳來的一載有導 師系統帳號的要求通訊信號,若是,則進到㈣%,反之 ,則結束。 步驟38 . SIP伺服器7建立家長與導師之間的通訊,因 為此步驟38相同於上述的電話轉撥方法,故此不再f述。 步驟39:當家長詢問缺席學生的狀況時,導師的電腦( 圖未示)可藉由該SHM顿器7對資料庫6的缺席記錄表進 行查詢,以判斷缺席學生的目前位置。 综上所述,本發明具有以下優點: ()藉由RFID標籤3和讀取器4A〜4C酉己合網路話機^ 、使用使SIP伺服器7能迅速得知受話端的目前狀態及所 處置!此即時的建立發話端與受話端之間的通訊達到 避免錯過緊急事件的處理時間,且又能對學生出缺席的情 況即時掌握以告知家長。 (二)以網路協定監視器9搭配RFID標籤3和讀取器4 的使用,能對危險區域作即時的監控,進而藉由仙飼服器 201118744 7利用網路話機1知會教務管理人員作出適當的處理,而且 有減輕校園管理工作負擔的功能。 /、 处惟以上所述者,僅為本發明之較佳實施例而已,當不 ,以此限定本發明實施之範圍,即大凡依本發明中請^ 範圍及發明說明内容所作之簡單的等效變化與修 屬本發明專利涵蓋之範圍内。 仍 【圖式簡單說明】 圖1是本發明之第一較佳實施例的方塊圖; 圖2是該資料庫的對應表之示意圖; 圖3是查詢對應表的示意圖; 圖4是該第一較佳實施例的流程圖; 圖5是本發明之第二較佳實施例的方塊圖; 圖6是該第二較佳實施例的流程圖; 圖7是本發明之第三較佳實施例的方塊圖;及 圖8是該第三較佳實施例的流程圖。Step 33 _ The SIP server 7 compares the attended data from the leave record table 65 from the database 6 to the absent record table, and stores the absence record table in the database 6. /Step 34. The SIP server 7 judges the location of each of the absent students based on the (four) (four) 'checks the seller's corresponding 纟 62' for each absent student in the absence record table. = In detail, 'When the Absent Student & RFID tag is located in it-reading, the training server 7 will write the network address corresponding to the field of the reader 4 to the out-of-absence record table 4, Since the number of θ distributions in this example is sufficient to cover the entire campus without any .10 201118744 any dead angle, so when the RFID tag of the absent student is not being accessed by any reader 4, the SIP 7 is in the Recorded in the absence record table: The student is not on campus. Step 35. The SIP server 7 finds the corresponding parent communication data from the database 6 based on the tag number of each absent student who has no leave. Step 36. The SIP word server 7 informs the parent according to the parent communication data, wherein the notification method includes an email method, a text message mode, and a voice mode. Step 37·· Does the SIP server 7 receive a request communication signal from the parent that contains the account of the tutor system, and if so, enters (4)%, otherwise, it ends. Step 38. The SIP server 7 establishes communication between the parent and the tutor, because step 38 is the same as the above-mentioned telephone transfer method, and therefore will not be described. Step 39: When the parent asks about the status of the absent student, the tutor's computer (not shown) can query the absent record table of the database 6 by the SHM monitor 7 to determine the current position of the absent student. In summary, the present invention has the following advantages: () By using the RFID tag 3 and the readers 4A to 4C, the SIP server 7 can quickly know the current state of the receiver and the handling thereof. ! This instant establishment of communication between the sender and the receiver achieves the processing time to avoid missed emergencies, and can immediately inform the parents of the absence of the student. (2) Using the network protocol monitor 9 with the use of the RFID tag 3 and the reader 4, the dangerous area can be monitored in real time, and then the network phone 1 is used to inform the educational administrators by using the fairy feed device 201118744 7 Proper handling, and the ability to reduce the burden of campus management. The above is only the preferred embodiment of the present invention, and is not intended to limit the scope of the present invention, that is, the simple scope of the scope and the description of the invention according to the present invention. The effects and modifications are within the scope of the patents of the present invention. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a block diagram of a first preferred embodiment of the present invention; FIG. 2 is a schematic diagram of a correspondence table of the database; FIG. 3 is a schematic diagram of a query correspondence table; Figure 5 is a block diagram of a second preferred embodiment of the present invention; Figure 6 is a flow chart of the second preferred embodiment; Figure 7 is a third preferred embodiment of the present invention FIG. 8 is a flow chart of the third preferred embodiment.
1212