+ All Categories
Home > Business > Security system

Security system

Date post: 06-May-2015
Category:
Upload: vineet-m-srivastav
View: 77 times
Download: 0 times
Share this document with a friend
32
RFID Based Security Solution Concepts “THE SOURCE FOR ACCURATE INFORMATION FOR ANY BUSINESS’S IDENTIFICATION NEEDS”
Transcript
Page 1: Security system

RFID Based Security Solution Concepts

“THE SOURCE FOR ACCURATE INFORMATION FOR ANY BUSINESS’S IDENTIFICATION NEEDS”

Page 2: Security system

What is RFID?

RFID(Radio Frequency Identification) is a technology that allows automatic

identification of objects, animals or people.

RFID is not just a better bar code

Capabilities

More data, greater accuracy, automated delivery

Line of sight not required

Reads 1000’s of items simultaneously

Benefits

Improved accuracy, visibility, operational efficiency and security

Opportunities to quantify processes and map improvements

Opportunities for exception based management

Page 3: Security system

RFID Components

Tag : It is a transponder that is made up of an integrated antenna and an electronic circuit. The information can be written and rewritten on a tag. The ID written on the tag is known as the EPC (Electronic Product Code).

Reader : An RFID reader is a device that is used to interrogate an RFID tag. The reader has an antenna that emits radio waves; the tag responds by sending back its data

Host Computer : It reads/writes data from/to the tags through the reader. It stores and evaluates obtained data and links the transceiver to applications.

Tag RFID Reader Host Computer

Page 4: Security system

How RFID works?

164B28F34

Host Computer

Reader

Antenna

Radio command signal issued from reader

Modified signal containing data returned

Page 5: Security system

Access Control To Secure / High value Warehousing

facilities using RFID System….

Page 6: Security system

Few RFID based Security Solutions1. Access to Secure Locations

2. Vehicle Convoy tracking & identification

3. Vehicle Identification & Tracking

4. Person Movement Tracking

Page 7: Security system

Fully Automatic Vehicle Entry / Exit tracking solution

Page 8: Security system

RFID Security in keychain

RFID Security behind Vehicle ID sticker

VIP Access Control to Secure Locations

Page 9: Security system

How will the complete system look?

Page 10: Security system

System Verify ID while in motion

• 99.9% Correct visibility of Vehicle as it is in motion

• Approx. distance form the gate can vary from 10 Meters to 30 meters

depending upon the availability of the space near to the Complex Entry

/ Exit point.

• Issued tags are secured & tamper proof and destroyed once tried to be

removed from the authorized vehicle hence minimize the chances of

any fraudulent practice.

• Tags can be customized by printing the Logo and Name etc. for visual

inspection too.

• System can also work in automatic & offline mode without any human

intervention required & store up-to 3000 records on its memory.

Page 11: Security system

Semi Automatic System for Vehicle Tracking

Page 12: Security system

Semi Automatic Vehicle Control System

Print RFID visitor pass and pickup in advance

Upon expiry of ID/Pass, Security office can remotely disable / Hold the tag from any misuse.

Can Generate reports on Daily / Weekly / Monthly basis in case of Online Application

Track misuse and wrongful entry attempts with Vehicle registration No. with the help on integrated security camera on the server.

In case of correct Vehicle all details are shown on the screenThe Guard just clicks “Pass” or RFID reader can take Automatic decision on it’s own on the basis of Registered Vehicle Database in even Offline Mode.In case of incorrect match, manual intervention is required.This increases the safety level.

Page 13: Security system

In case of unauthorized vehicle?Safety is critical

• Boom-barrier gate will remain closed if vehicle detected without any Authorized tags or with Expired Tags

• Boom Barrier gate can be opened manually from inside guardhouse on push button activation for any emergency action or Approved Transection

• Automatic recording of Date / Time / Security Staff who opens manually

Page 14: Security system

Managing High vs. Low Security zones

Normal Security ZoneVisitor Area

Regular Security Zone – Owners Area /Secured Compound

Outside area – Regular Traffic on Road

Maximum Security Zone

Page 15: Security system

Person Movement Tracking in Residential block / Office block

Page 16: Security system

Regular staff are trained to always wear their ID Card. This is a must.

Contractors / Visitors can be given temporary ID’s on a returnable basis

Data is captured automatically with date / time / location as person moves in or out

How does the system look?

Location Tracking

Page 17: Security system

• RFID Card is tracked as people Move through the RFID gate way.

• Portal will be located at each Entry / exit and areas connecting various building blocks.

• Portal is mounted on the side of gates or on ceiling.

• Camouflaged to be part of décor.

How does it work?

Page 18: Security system

Equipment Options

• Active ID Card

• Active Key-chain

• Active Tamper Proof Tags

• Passive ID Card

• Passive Tamper Proof Tags with Logo

• Active Bluetooth

• Active Fixed Reader

• Passive Mobile Reader

• Passive Fixed Reader

• Mobile/PDA Device

• Wall Mounted PC

• Touch – Screen PC

• PC + Boom-Barrier

Tag Type Reader Type Display Type

Page 19: Security system

Report GenerationCustom reporting & status on Real Time / Offline basis

Get Online / Offline Reports

Get Reports per Employee \ Assets

Get Reports by Date / Duration

Get Reports by Vehicle Movement / IN / OUT

Any other custom reports available

Get Exception information by Email / SMS with local Audio – Visual Aides

Page 20: Security system

Public Utility Staff tracking in Secured Residential Area

Page 21: Security system

Some one is SECURITY Threat or Not?

Or a person with Malintention in guise of Maid / Delivery Boy / Courier Guy

/ Repair Man / Maintenance Staff etc.

How to Control Such things

1. Register all casual / regular staff’s Biometric data for future reference

with all details at Security Office.

2. Capture entry & exit details for such person on regular basis.

3. Generate the reports & monitor the same for any deviation from

regular practice.

Page 22: Security system

What it Do

In case of any incident data will be available on the click of mouse about the Contact Details of such staff along with their visit pattern and Biometric Information.

It’ll create a pressure on the house hold staff for avoiding any remote idea of getting involved in such acts by any mean.

It’ll assure that re-entry of the such staff in smooth and paperless mode and enables the immediate monitoring.

Even in case of the staff leaves the job it doesn't mean he forgets all the details of the previous employer and any existing lapse in manual system.

In case of any unwarranted behaviors by staff, one can permanently barred for entry to the premises if desired.

Page 23: Security system

How it’ll work

Biometric devises with Display will be placed at Security gate

On the registration of the new staff, data can be passed via connected PC or USB drive to the devices.

In case of the Barred staff, staff will be barred on application and records will be updated to the devices and warning messages can be displayed to the security staff on duty.

When ever staff approaches to the premises, he puts his Finger on the Reader and on identification a relevant audio visual message given to the security staff.

Even an application running on PC can generate a warning message etc. for any deviations.

Page 24: Security system

Hi-Fi Frequent Visitor Tracking Solution

Page 25: Security system

Turbo-charged Visitor Service –

Track & Alert immediately when clients walk into premises

Get real-time Metrics and Usage data –

Measure time spent by people via different entry / exit gates or office or facilities in waste area and at single or multi location environment.

No Queue Management –

Use as replacement for token-numbering system

Use for employee time and attendanceNo need to punch-in or get it queue to record timing

Security-guard friendly identificationSuper fast ID as people walk in-and-out. Empower low-level employees & pamper high profile people.

Hi-Fi Frequent Visitor Tracking Solution

Page 26: Security system

High Level Visitor Tracking SolutionOnline Application – High Cost

• Visitor Tracking software allows for the Security / Manager / Supervisor to view the visitor details the moment the person enters the building.

• A simple popup message flashes on the computer screen with the visitor’s name, photo, last visit time, etc.

• This allows the staff to greet the visitor without having to wait for the person to identify himself/herself.

• The visitor does not need to stand in line and waste his time.

Page 27: Security system

Project Phases

Page 28: Security system

Upon Order Receipt Hardware Developed Components Post Tested Development

Pro

du

ct

LIV

E Ongoing Support

Ongoing Training

Hardware R&D Hardware Testing Client Site Testing

Software & Firmware Development S/W Training

Project Phases

2 to 3 Weeks4 to 6 Weeks

Page 29: Security system

Simple, Error-Free, ReliableEasy for everyone to use

Touch-Screen for fast usage – no need to learn new software

Display in English or local language

All Details are shown in simple and clear format

Equipment is rugged and can be used for special occasions or regular checking

Page 30: Security system

RFID StandardsMany to choose from!

Page 31: Security system

RFID Standards

ISO 180006C - Freight containers — RF automatic identification

ISO 180006C - Supply chain applications of RFID - Freight containers

ISO 180006C - Supply chain applications of RFID - Returnable transport items

ISO 180006C - Supply chain applications of RFID - Transport units

ISO 180006C - Supply chain applications of RFID - Product packaging

ISO 180006C - Supply chain applications of RFID - Product tagging

Page 32: Security system

Contact US

MONTEAGE TECHNOLOGIES

B-86, Sector – 60, Noida – 210310, INDIA

[email protected]


Recommended