Business

Security system

Categories
Published
of 32
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
Share
Description
1. RFID Based Security Solution Concepts “THE SOURCE FOR ACCURATE INFORMATION FOR ANY BUSINESS’S IDENTIFICATION NEEDS” 2. What is RFID? RFID(Radio Frequency…
Transcript
  • 1. RFID Based Security Solution Concepts “THE SOURCE FOR ACCURATE INFORMATION FOR ANY BUSINESS’S IDENTIFICATION NEEDS”
  • 2. What is RFID? RFID(Radio Frequency Identification) is a technology that allows automatic identification of objects, animals or people. RFID is not just a better bar code Capabilities More data, greater accuracy, automated delivery Line of sight not required Reads 1000’s of items simultaneously Benefits Improved accuracy, visibility, operational efficiency and security Opportunities to quantify processes and map improvements Opportunities for exception based management
  • 3. RFID Components Tag : It is a transponder that is made up of an integrated antenna and an electronic circuit. The information can be written and rewritten on a tag. The ID written on the tag is known as the EPC (Electronic Product Code). Reader : An RFID reader is a device that is used to interrogate an RFID tag. The reader has an antenna that emits radio waves; the tag responds by sending back its data Host Computer : It reads/writes data from/to the tags through the reader. It stores and evaluates obtained data and links the transceiver to applications. Tag RFID Reader Host Computer
  • 4. How RFID works? Radio command signal issued from reader Host Computer Modified signal containing data returned Reader 164B28F34 Antenna
  • 5. Access Control To Secure / High value Warehousing facilities using RFID System….
  • 6. Few RFID based Security Solutions 1. Access to Secure Locations 2. Vehicle Convoy tracking & identification 3. Vehicle Identification & Tracking 4. Person Movement Tracking
  • 7. Fully Automatic Vehicle Entry / Exit tracking solution
  • 8. VIP Access Control to Secure Locations RFID Security in keychain RFID Security behind Vehicle ID sticker
  • 9. How will the complete system look?
  • 10. System Verify ID while in motion • 99.9% Correct visibility of Vehicle as it is in motion • Approx. distance form the gate can vary from 10 Meters to 30 meters depending upon the availability of the space near to the Complex Entry / Exit point. • Issued tags are secured & tamper proof and destroyed once tried to be removed from the authorized vehicle hence minimize the chances of any fraudulent practice. • Tags can be customized by printing the Logo and Name etc. for visual inspection too. • System can also work in automatic & offline mode without any human intervention required & store up-to 3000 records on its memory.
  • 11. Semi Automatic System for Vehicle Tracking
  • 12. Semi Automatic Vehicle Control System  Print RFID visitor pass and pickup in advance  Upon expiry of ID/Pass, Security office can remotely disable / Hold the tag from any misuse.  Can Generate reports on Daily / Weekly / Monthly basis in case of Online Application  Track misuse and wrongful entry attempts with Vehicle registration No. with the help on integrated security camera on the server. In case of correct Vehicle all details are shown on the screen The Guard just clicks “Pass” or RFID reader can take Automatic decision on it’s own on the basis of Registered Vehicle Database in even Offline Mode. In case of incorrect match, manual intervention is required. This increases the safety level.
  • 13. In case of unauthorized vehicle? Safety is critical • Boom-barrier gate will remain closed if vehicle detected without any Authorized tags or with Expired Tags • Boom Barrier gate can be opened manually from inside guardhouse on push button activation for any emergency action or Approved Transection • Automatic recording of Date / Time / Security Staff who opens manually
  • 14. Managing High vs. Low Security zones Maximum Security Zone Normal Security Zone Visitor Area Regular Security Zone – Owners Area / Secured Compound Outside area – Regular Traffic on Road
  • 15. Person Movement Tracking in Residential block / Office block
  • 16. Location Tracking How does the system look? Regular staff are trained to always wear their ID Card. This is a must. Contractors / Visitors can be given temporary ID’s on a returnable basis Data is captured automatically with date / time / location as person moves in or out
  • 17. How does it work? • RFID Card is tracked as people Move through the RFID gate way. • Portal will be located at each Entry / exit and areas connecting various building blocks. • Portal is mounted on the side of gates or on ceiling. • Camouflaged to be part of décor.
  • 18. Equipment Options Tag Type Reader Type • Active ID Card • Active Bluetooth • Active Key-chain • Active Tamper Proof Tags • Passive ID Card • Passive Tamper Proof Tags with Logo • Active Fixed Reader Display Type • Mobile/PDA Device • Wall Mounted PC • Passive Mobile Reader • Passive Fixed Reader • Touch – Screen PC • PC + Boom-Barrier
  • 19. Report Generation Custom reporting & status on Real Time / Offline basis  Get Online / Offline Reports  Get Reports per Employee Assets  Get Reports by Date / Duration  Get Reports by Vehicle Movement / IN / OUT Any other custom reports available  Get Exception information by Email / SMS with local Audio – Visual Aides
  • 20. Public Utility Staff tracking in Secured Residential Area
  • 21. Some one is SECURITY Threat or Not? Or a person with Malintention in guise of Maid / Delivery Boy / Courier Guy / Repair Man / Maintenance Staff etc. How to Control Such things 1. Register all casual / regular staff’s Biometric data for future reference with all details at Security Office. 2. Capture entry & exit details for such person on regular basis. 3. Generate the reports & monitor the same for any deviation from regular practice.
  • 22. What it Do  In case of any incident data will be available on the click of mouse about the Contact Details of such staff along with their visit pattern and Biometric Information.  It’ll create a pressure on the house hold staff for avoiding any remote idea of getting involved in such acts by any mean.  It’ll assure that re-entry of the such staff in smooth and paperless mode and enables the immediate monitoring.  Even in case of the staff leaves the job it doesn't mean he forgets all the details of the previous employer and any existing lapse in manual system.  In case of any unwarranted behaviors by staff, one can permanently barred for entry to the premises if desired.
  • 23. How it’ll work  Biometric devises with Display will be placed at Security gate  On the registration of the new staff, data can be passed via connected PC or USB drive to the devices. In case of the Barred staff, staff will be barred on application and records will be updated to the devices and warning messages can be displayed to the security staff on duty.  When ever staff approaches to the premises, he puts his Finger on the Reader and on identification a relevant audio visual message given to the security staff.  Even an application running on PC can generate a warning message etc. for any deviations.
  • 24. Hi-Fi Frequent Visitor Tracking Solution
  • 25. Hi-Fi Frequent Visitor Tracking Solution  Turbo-charged Visitor Service – Track & Alert immediately when clients walk into premises  Get real-time Metrics and Usage data – Measure time spent by people via different entry / exit gates or office or facilities in waste area and at single or multi location environment.  No Queue Management – Use as replacement for token-numbering system  Use for employee time and attendance No need to punch-in or get it queue to record timing  Security-guard friendly identification Super fast ID as people walk in-and-out. Empower low-level employees & pamper high profile people.
  • 26. High Level Visitor Tracking Solution Online Application – High Cost • Visitor Tracking software allows for the Security / Manager / Supervisor to view the visitor details the moment the person enters the building. • A simple popup message flashes on the computer screen with the visitor’s name, photo, last visit time, etc. • This allows the staff to greet the visitor without having to wait for the person to identify himself/herself. • The visitor does not need to stand in line and waste his time.
  • 27. Project Phases
  • 28. Hardware Testing Software & Firmware Development Upon Order Receipt Hardware Developed 4 to 6 Weeks Client Site Testing S/W Training Components Tested 2 to 3 Weeks LIVE Hardware R&D Ongoing Support Product Project Phases Ongoing Training Post Development
  • 29. Simple, Error-Free, Reliable Easy for everyone to use  Touch-Screen for fast usage – no need to learn new software  Display in English or local language  All Details are shown in simple and clear format  Equipment is rugged and can be used for special occasions or regular checking
  • 30. RFID Standards Many to choose from!
  • 31. RFID Standards ISO 180006C - Freight containers — RF automatic identification ISO 180006C - Supply chain applications of RFID - Freight containers ISO 180006C - Supply chain applications of RFID - Returnable transport items ISO 180006C - Supply chain applications of RFID - Transport units ISO 180006C - Supply chain applications of RFID - Product packaging ISO 180006C - Supply chain applications of RFID - Product tagging
  • 32. Contact US MONTEAGE TECHNOLOGIES B-86, Sector – 60, Noida – 210310, INDIA sales@monteagetech.com
  • Rice Krispies

    Jul 23, 2017

    Ch 1 Slideshow

    Jul 23, 2017
    We Need Your Support
    Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

    Thanks to everyone for your continued support.

    No, Thanks