Dolphin rfid laptop tracking with secure gate app latest

815 views

Published on

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
815
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
28
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Dolphin rfid laptop tracking with secure gate app latest

  1. 1. Dolphin RFID Presentation ON Laptop Trackingp p g DOLPHIN The RFID Experts Slide No : 1
  2. 2. Dolphin Group of Companies DOLPHIN EMT NU SOLUTIONS DOLPHIN RFID DOLPHIN The RFID Experts Slide No : 2
  3. 3. DOLPHIN RFID Profile •Provides customized end to end solutions requiring special RFIDq g p hardware and software • Partners with best of breed RFID OEM’s for RFID Hardware •Developed and successfully deployed Specialized RFID Middleware in the fieldfield •RFID Hardware deployments led by RF Professionals. DOLPHIN The RFID Experts Slide No : 3 Many More ……
  4. 4. RFID Overview  RFID allows data to be transmitted by a product containing an RFID tag microchip, which is read by an RFID reader RFID Technology – Key Advantages  No contact or line-of-sight required to read d twhich is read by an RFID reader.  The data transmitted can provide identification or location info about the data  Simultaneous & multiple tag reads, 10s to 1000s in short time intervals W k i h h i t ( d tidentification or location info about the product, or specifics such as date of manufacture, date of last servicing, material composition etc.  Works in harsh environments (compared to bar code, optical scan technologies) withstands extreme temperatures, acid baths etc. DOLPHIN The RFID Experts Slide No : 4  Can be read through the human body, clothing and non-metallic materials
  5. 5. DOLPHIN The RFID Experts Slide No : 5
  6. 6. DOLPHIN The RFID Experts Slide No : 6
  7. 7. Component of a RFID Solution PRINTER TAG MIDDLEWARE BUSINESS LOGIC END USER APPLICATION READER DOLPHIN The RFID Experts Slide No : 7  RFID Middleware can be set according to Business Requirements
  8. 8. RFID Middleware Schematic Design DOLPHIN The RFID Experts Slide No : 8
  9. 9. LAPTOP TRACKING USING RFID DOLPHIN The RFID Experts Slide No : 9
  10. 10. Manual & Barcode Asset Crosscheck methods cause huge bottlenecks at peak times DOLPHIN The RFID Experts Slide No : 10
  11. 11. RFID Base Authentication Desk …. DOLPHIN The RFID Experts Slide No : 11
  12. 12. Laptop Authentication Desk …. Laptop with UHF tag RFID UHF Tag inside Bag UHF RFID Reader g Access Control Card RFID Client Access Control/USB Reader Application Reader Tower Light Indicator DOLPHIN The RFID Experts Slide No : 12
  13. 13. Laptop/Assets Identification & Authentication System Using RFID Portals Monitor Search AuditAudit DOLPHIN The RFID Experts Slide No : 13
  14. 14. Basic Requirement for Cross Authentication Logic …. John IT User Identification No 1 No 2 DOLPHIN The RFID Experts Slide No : 14 Laptop/Asset IdentificationNo 2
  15. 15. Ways to get User Identification Information …. John IT 1 7 User Identification Integration with Existing Access Control SoftwareHandKey Reader 2 6 3 54 DOLPHIN The RFID Experts Slide No : 15 HID Proximity Mifare Card HID iClass Biometric Reader UHF Card
  16. 16. Ways to add UHF Identification Tag added with existing Access Card…. DOLPHIN The RFID Experts Slide No : 16
  17. 17. Ways to get Laptop Identification Information …. Various size options with UHF Technology .. Dolphin RFID DOLPHIN The RFID Experts Slide No : 17
  18. 18. Unauthorized Laptop/Asset Detection can generate Alarm with Tower Indicator, SMS, Email and Video Recorder (DVR) Integrations … On Alarm Audio-Visual Indication via Tower Light SMS to Authorities and Laptop owner Email to Authorities and Laptop owner DOLPHIN The RFID Experts Slide No : 18 Interface to CCTV for initiating recording – Pre and Post Event
  19. 19. Authentication Monitoring Screen … List of Assets Assigned to user …. (2 Nos) Currently Detectedy will be shown in GREEEN Assigned but NOT Detected will be shown in BLUE Unauthorized Asset detected will generate DOLPHIN The RFID Experts Slide No : 19 g Alarm Audio-Visual Indication via Tower Light
  20. 20. Alarm Panel …. Owner for the Detected Asset will be shown in GREEEN withGREEEN with Contact Details Unauthorized Asset detected with Person will be indicated in RED with Details Auto SMS and/or Email can be configured for Alarm … else Operator can send them manually from alarm panel. Acknowledgement can be made DOLPHIN The RFID Experts Slide No : 20 pa e c o edge e t ca be ade compulsory to have operator inputs on all Alarms…
  21. 21. Identification Portal Site Photograph FEB 2013 ….
  22. 22. Thank You!!! Open for Questions Thank You!Thank You! Presenter Name : Sachin Joshi Designation : Head Business & IT Email ID: sachinj@dolphinrfid.in DOLPHIN The RFID Experts Slide No : 22 Ph: +9120 26158200 Mobile: +91981473127

×