RFID Based Security Solution Concepts
“THE SOURCE FOR ACCURATE INFORMATION FOR ANY BUSINESS’S IDENTIFICATION NEEDS”
What is RFID?
RFID(Radio Frequency Identification) is a technology that allows automatic
identification of objects, animals or people.
RFID is not just a better bar code
Capabilities
More data, greater accuracy, automated delivery
Line of sight not required
Reads 1000’s of items simultaneously
Benefits
Improved accuracy, visibility, operational efficiency and security
Opportunities to quantify processes and map improvements
Opportunities for exception based management
RFID Components
Tag : It is a transponder that is made up of an integrated antenna and an electronic circuit. The information can be written and rewritten on a tag. The ID written on the tag is known as the EPC (Electronic Product Code).
Reader : An RFID reader is a device that is used to interrogate an RFID tag. The reader has an antenna that emits radio waves; the tag responds by sending back its data
Host Computer : It reads/writes data from/to the tags through the reader. It stores and evaluates obtained data and links the transceiver to applications.
Tag RFID Reader Host Computer
How RFID works?
164B28F34
Host Computer
Reader
Antenna
Radio command signal issued from reader
Modified signal containing data returned
Access Control To Secure / High value Warehousing
facilities using RFID System….
Few RFID based Security Solutions1. Access to Secure Locations
2. Vehicle Convoy tracking & identification
3. Vehicle Identification & Tracking
4. Person Movement Tracking
Fully Automatic Vehicle Entry / Exit tracking solution
RFID Security in keychain
RFID Security behind Vehicle ID sticker
VIP Access Control to Secure Locations
How will the complete system look?
System Verify ID while in motion
• 99.9% Correct visibility of Vehicle as it is in motion
• Approx. distance form the gate can vary from 10 Meters to 30 meters
depending upon the availability of the space near to the Complex Entry
/ Exit point.
• Issued tags are secured & tamper proof and destroyed once tried to be
removed from the authorized vehicle hence minimize the chances of
any fraudulent practice.
• Tags can be customized by printing the Logo and Name etc. for visual
inspection too.
• System can also work in automatic & offline mode without any human
intervention required & store up-to 3000 records on its memory.
Semi Automatic System for Vehicle Tracking
Semi Automatic Vehicle Control System
Print RFID visitor pass and pickup in advance
Upon expiry of ID/Pass, Security office can remotely disable / Hold the tag from any misuse.
Can Generate reports on Daily / Weekly / Monthly basis in case of Online Application
Track misuse and wrongful entry attempts with Vehicle registration No. with the help on integrated security camera on the server.
In case of correct Vehicle all details are shown on the screenThe Guard just clicks “Pass” or RFID reader can take Automatic decision on it’s own on the basis of Registered Vehicle Database in even Offline Mode.In case of incorrect match, manual intervention is required.This increases the safety level.
In case of unauthorized vehicle?Safety is critical
• Boom-barrier gate will remain closed if vehicle detected without any Authorized tags or with Expired Tags
• Boom Barrier gate can be opened manually from inside guardhouse on push button activation for any emergency action or Approved Transection
• Automatic recording of Date / Time / Security Staff who opens manually
Managing High vs. Low Security zones
Normal Security ZoneVisitor Area
Regular Security Zone – Owners Area /Secured Compound
Outside area – Regular Traffic on Road
Maximum Security Zone
Person Movement Tracking in Residential block / Office block
Regular staff are trained to always wear their ID Card. This is a must.
Contractors / Visitors can be given temporary ID’s on a returnable basis
Data is captured automatically with date / time / location as person moves in or out
How does the system look?
Location Tracking
• RFID Card is tracked as people Move through the RFID gate way.
• Portal will be located at each Entry / exit and areas connecting various building blocks.
• Portal is mounted on the side of gates or on ceiling.
• Camouflaged to be part of décor.
How does it work?
Equipment Options
• Active ID Card
• Active Key-chain
• Active Tamper Proof Tags
• Passive ID Card
• Passive Tamper Proof Tags with Logo
• Active Bluetooth
• Active Fixed Reader
• Passive Mobile Reader
• Passive Fixed Reader
• Mobile/PDA Device
• Wall Mounted PC
• Touch – Screen PC
• PC + Boom-Barrier
Tag Type Reader Type Display Type
Report GenerationCustom reporting & status on Real Time / Offline basis
Get Online / Offline Reports
Get Reports per Employee \ Assets
Get Reports by Date / Duration
Get Reports by Vehicle Movement / IN / OUT
Any other custom reports available
Get Exception information by Email / SMS with local Audio – Visual Aides
Public Utility Staff tracking in Secured Residential Area
Some one is SECURITY Threat or Not?
Or a person with Malintention in guise of Maid / Delivery Boy / Courier Guy
/ Repair Man / Maintenance Staff etc.
How to Control Such things
1. Register all casual / regular staff’s Biometric data for future reference
with all details at Security Office.
2. Capture entry & exit details for such person on regular basis.
3. Generate the reports & monitor the same for any deviation from
regular practice.
What it Do
In case of any incident data will be available on the click of mouse about the Contact Details of such staff along with their visit pattern and Biometric Information.
It’ll create a pressure on the house hold staff for avoiding any remote idea of getting involved in such acts by any mean.
It’ll assure that re-entry of the such staff in smooth and paperless mode and enables the immediate monitoring.
Even in case of the staff leaves the job it doesn't mean he forgets all the details of the previous employer and any existing lapse in manual system.
In case of any unwarranted behaviors by staff, one can permanently barred for entry to the premises if desired.
How it’ll work
Biometric devises with Display will be placed at Security gate
On the registration of the new staff, data can be passed via connected PC or USB drive to the devices.
In case of the Barred staff, staff will be barred on application and records will be updated to the devices and warning messages can be displayed to the security staff on duty.
When ever staff approaches to the premises, he puts his Finger on the Reader and on identification a relevant audio visual message given to the security staff.
Even an application running on PC can generate a warning message etc. for any deviations.
Hi-Fi Frequent Visitor Tracking Solution
Turbo-charged Visitor Service –
Track & Alert immediately when clients walk into premises
Get real-time Metrics and Usage data –
Measure time spent by people via different entry / exit gates or office or facilities in waste area and at single or multi location environment.
No Queue Management –
Use as replacement for token-numbering system
Use for employee time and attendanceNo need to punch-in or get it queue to record timing
Security-guard friendly identificationSuper fast ID as people walk in-and-out. Empower low-level employees & pamper high profile people.
Hi-Fi Frequent Visitor Tracking Solution
High Level Visitor Tracking SolutionOnline Application – High Cost
• Visitor Tracking software allows for the Security / Manager / Supervisor to view the visitor details the moment the person enters the building.
• A simple popup message flashes on the computer screen with the visitor’s name, photo, last visit time, etc.
• This allows the staff to greet the visitor without having to wait for the person to identify himself/herself.
• The visitor does not need to stand in line and waste his time.
Project Phases
Upon Order Receipt Hardware Developed Components Post Tested Development
Pro
du
ct
LIV
E Ongoing Support
Ongoing Training
Hardware R&D Hardware Testing Client Site Testing
Software & Firmware Development S/W Training
Project Phases
2 to 3 Weeks4 to 6 Weeks
Simple, Error-Free, ReliableEasy for everyone to use
Touch-Screen for fast usage – no need to learn new software
Display in English or local language
All Details are shown in simple and clear format
Equipment is rugged and can be used for special occasions or regular checking
RFID StandardsMany to choose from!
RFID Standards
ISO 180006C - Freight containers — RF automatic identification
ISO 180006C - Supply chain applications of RFID - Freight containers
ISO 180006C - Supply chain applications of RFID - Returnable transport items
ISO 180006C - Supply chain applications of RFID - Transport units
ISO 180006C - Supply chain applications of RFID - Product packaging
ISO 180006C - Supply chain applications of RFID - Product tagging
Contact US
MONTEAGE TECHNOLOGIES
B-86, Sector – 60, Noida – 210310, INDIA
Top Related