Upload
nipunmalhotra1971
View
243
Download
3
Tags:
Embed Size (px)
DESCRIPTION
Citation preview
Dolphin RFID Presentation ONLaptop Trackingp p g
DOLPHIN The RFID Experts Slide No : 1
Dolphin Group of Companies
DOLPHIN EMT NU SOLUTIONS DOLPHIN RFID
DOLPHIN The RFID Experts Slide No : 2
DOLPHIN RFID Profile
•Provides customized end to end solutions requiring special RFID q g p
hardware and software
• Partners with best of breed RFID OEM’s for RFID Hardware
•Developed and successfully deployed Specialized RFID
Middleware in the
fieldfield
•RFID Hardware deployments led by RF Professionals.
DOLPHIN The RFID Experts Slide No : 3
Many More ……
RFID Overview
RFID allows data to be transmitted by a product containing an RFID tag microchip, which is read by an RFID reader
RFID Technology – Key Advantages
No contact or line-of-sight required to read d twhich is read by an RFID reader.
The data transmitted can provide identification or location info about the
data Simultaneous & multiple tag reads, 10s to
1000s in short time intervals W k i h h i t ( d t identification or location info about the product, or specifics such as date of manufacture, date of last servicing, material composition etc.
Works in harsh environments (compared to bar code, optical scan technologies) withstands extreme temperatures, acid baths etc.
DOLPHIN The RFID Experts Slide No : 4
Can be read through the human body, clothing and non-metallic materials
DOLPHIN The RFID Experts Slide No : 5
DOLPHIN The RFID Experts Slide No : 6
Component of a RFID Solution
PRINTER
TAG
MIDDLEWAREBUSINESS LOGIC
END USER APPLICATION
READER
DOLPHIN The RFID Experts Slide No : 7
RFID Middleware can be set according to Business Requirements
RFID Middleware Schematic Design
DOLPHIN The RFID Experts Slide No : 8
LAPTOP TRACKING USING RFID
DOLPHIN The RFID Experts Slide No : 9
Manual & Barcode Asset Crosscheck methods cause huge bottlenecks at peak times
DOLPHIN The RFID Experts Slide No : 10
RFID Base Authentication Desk ….
DOLPHIN The RFID Experts Slide No : 11
Laptop Authentication Desk …. Laptop with UHF tag
RFID UHF Tag
inside BagUHF RFID Reader
g
Access Control Card RFID Client
Access Control/USB Reader
Application
Reader
Tower Light Indicator
DOLPHIN The RFID Experts Slide No : 12
Laptop/Assets Identification & Authentication System Using RFID Portals
Monitor SearchAuditAudit
DOLPHIN The RFID Experts Slide No : 13
Basic Requirement for Cross Authentication Logic ….
JohnIT
User Identification
No 1
No 2
DOLPHIN The RFID Experts Slide No : 14
Laptop/Asset IdentificationNo 2
Ways to get User Identification Information ….
JohnIT
1 7
User Identification Integration with Existing Access Control SoftwareHandKey Reader
2 6
3 54
DOLPHIN The RFID Experts Slide No : 15
HID Proximity Mifare Card HID iClassBiometric Reader
UHF Card
Ways to add UHF Identification Tag added with existing Access Card….
DOLPHIN The RFID Experts Slide No : 16
Ways to get Laptop Identification Information …. Various size options with UHF Technology ..
Dolphin RFID
DOLPHIN The RFID Experts Slide No : 17
Unauthorized Laptop/Asset Detection can generate Alarm with Tower Indicator, SMS, Email and Video Recorder (DVR) Integrations …
On Alarm Audio-Visual Indication via Tower Light
SMS to Authorities and Laptop owner
Email to Authorities and Laptop owner
DOLPHIN The RFID Experts Slide No : 18
Interface to CCTV for initiating recording – Pre and Post Event
Authentication Monitoring Screen …
List of Assets Assigned to user …. (2 Nos)
Currently Detected ywill be shown in GREEEN
Assigned but NOT Detected will be shown in BLUE
Unauthorized Asset detected will generate
DOLPHIN The RFID Experts Slide No : 19
gAlarm Audio-Visual Indication via Tower Light
Alarm Panel ….
Owner for the Detected Asset will be shown in GREEEN withGREEEN with Contact Details
Unauthorized Asset detected with Person will be indicated in RED with Details
Auto SMS and/or Email can be configured for Alarm … else Operator can send them manually from alarm panel. Acknowledgement can be made
DOLPHIN The RFID Experts Slide No : 20
pa e c o edge e t ca be adecompulsory to have operator inputs on all Alarms…
Identification Portal Site Photograph FEB 2013 ….
Thank You!!!
Open for Questions
Thank You!Thank You!
Presenter Name : Sachin JoshiDesignation : Head Business & ITEmail ID: [email protected]
DOLPHIN The RFID Experts Slide No : 22
Ph: +9120 26158200Mobile: +91981473127