Your SlideShare is downloading. ×
ATM Security Guard MonitoringSolution using Magnasoft NorthStarAUTHOR: K UNAL ASHARD ATE: 15-J ANUARY-2012Table of Content...
Business ProblemSecurity guards hired by 3rd party security firms are placed inside or next to ATM rooms belonging tobanks...
Problems in the solutions1.    On-guard device theft2.    On-ATM transmitter/reader theft3.    On-guard device tampering o...
Proposed SolutionBluetooth.Solution DiagramInstallation                   Parameter                                       ...
Usage       When the security guard carrying the Bluetooth tag enters the invisible area covered by the        Bluetooth ...
About Magnasoft and NorthStar  About NorthStar  NorthStar is an integrated, wed-based tracking & monitoring solution that ...
Upcoming SlideShare
Loading in...5
×

ATM Bank security guard monitoring

1,666

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,666
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
49
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "ATM Bank security guard monitoring"

  1. 1. ATM Security Guard MonitoringSolution using Magnasoft NorthStarAUTHOR: K UNAL ASHARD ATE: 15-J ANUARY-2012Table of ContentsBusiness Problem ....................................................................................................................................... 2Solutions ..................................................................................................................................................... 2 Solution Options ...................................................................................................................................... 2 1. GPS............................................................................................................................................. 2 2. RFID ............................................................................................................................................ 2 3. Bluetooth ..................................................................................................................................... 2 Solution Components .............................................................................................................................. 2Problems in the solutions ............................................................................................................................ 3Comparison of Solutions ............................................................................................................................. 3Proposed Solution....................................................................................................................................... 4 Solution Diagram ..................................................................................................................................... 4 Installation............................................................................................................................................ 4 Usage .................................................................................................................................................. 5 1
  2. 2. Business ProblemSecurity guards hired by 3rd party security firms are placed inside or next to ATM rooms belonging tobanks. These security guards need to be in close proximity of the room/ATM machine during their entireshift, so as to prevent any theft or tampering.The security firm managing the guards needs a way to ensure that the guards are always at their post,and be alerted if the guards leave their posts.SolutionsSolution Options1. GPS The guard carries a small, battery powered GPS device that tracks his location 24x7. The location of the guard and any movement away from his post are remotely monitored by the security agency over the web, and are also sent as instant alerts over SMS to the security firm.2. RFID The ATM machine is fitted with a long range RFID (smartcard) reader that is powered by the ATM machine’s power source. The security guard carries a RFID (smartcard) badge or tag that can be read over long distances. When the security guard comes in close proximity of the ATM room, the RFID reader detects the presence of the guard’s tag, and an SMS alert is sent to the security firm. If the security guard leaves the proximity of the ATM room, the RFID reader detects the absence of the guard’s tag, and an SMS alert is sent to the security firm.3. Bluetooth The ATM machine is fitted with a long range Bluetooth transmitter that is powered by the ATM machine’s power source. The security guard carries a Bluetooth reader or tag that can be read over long distances. When the security guard comes in close proximity of the ATM room, the Bluetooth transmitter detects the presence of the guard’s tag, and an SMS alert is sent to the security firm. If the security guard leaves the proximity of the ATM room, the Bluetooth transmitter detects the absence of the guard’s tag, and an SMS alert is sent to the security firm.Solution Components1. ATM machines2. ATM room or building (brick and/or glass)3. Security guard4. Security guard’s optional weapon5. Plastic or metal chair placed in or near the ATM machine or room6. On-ATM monitoring device7. On-guard monitoring device8. 24x7 power to ATM9. Location of the ATM (in remote areas without cellular coverage)10. ATM machine communication infrastructure 2
  3. 3. Problems in the solutions1. On-guard device theft2. On-ATM transmitter/reader theft3. On-guard device tampering or power discharge4. On-ATM transmitter/reader tampering or power discharge5. Guard’s device misplaced, lost or left at home6. Guard leaves device in the ATM room and leaves ATM room without the device7. Communications network outage8. Device transmission interference9. ATM power outage10. ATM communications infrastructure outageComparison of Solutions GPS RFID BluetoothCost of On-ATM device None Medium MediumCost of On-guard device High Low LowReliability of communication in ATM Low High MediumReliability of communication outside ATM High Low MediumOn-guard device theft High Low LowOn-ATM transmitter/reader theft None High HighOn-guard device tampering High None MediumOn-ATM transmitter/reader tampering None High HighGuard’s device misplaced High Medium MediumEffect of guard leaving device in the ATM Low High HighCommunications network outage High Medium MediumDevice transmission interference None High LowEffect of ATM power outage None High HighEffect of ATM communications infrastructure outage None Medium MediumEffect of ATM power infrastructure outage None High HighRange of communication High Low Medium* If the solution uses ATM communications infrastructure 3
  4. 4. Proposed SolutionBluetooth.Solution DiagramInstallation Parameter ValueMaximum dimensions of ATM room 15 meters x 15 meters (2500 square feet)Location of Bluetooth reader Mounted on top of an ATM machineProgrammable range of Bluetooth Reader 2 meters – 30 metersSignal interference, if any Brick walls of the ATM reduce range to 15 metersPower to the Bluetooth Reader From the ATM machine’s powerLocations of seating or guard’s presence Anywhere within the programmable range (15 m)Installation and maintenance Included as part of the NorthStar package 4
  5. 5. Usage  When the security guard carrying the Bluetooth tag enters the invisible area covered by the Bluetooth reader in the ATM, the Bluetooth reader detects the tag, its owner and entry time, and sends that information, instantly, to NorthStar’s servers  Alternatively, when the security guard carrying the Bluetooth tag leaves the invisible area covered by the Bluetooth reader in the ATM, the Bluetooth reader detects the tag, its owner and entry time, and sends that information, instantly, to NorthStar’s servers  Information is sent over GPRS to NorthStar’s servers, which in turn instantly figures out whether the entry/exit is authorized or unauthorized, based on the guard’s shift timing, number of entries and exits, etc.  If any anomalous conditions are detected, such as multiple contiguous entries or exits, or unauthorized exits during shift hours or unauthorized entries after shift hours, NorthStar instantly sends SMS alerts to 1 or more pre-configured mobile numbers  If the communication network is temporarily unavailable, the Bluetooth reader caches data in its internal flash memory until the network becomes available once again 5
  6. 6. About Magnasoft and NorthStar About NorthStar NorthStar is an integrated, wed-based tracking & monitoring solution that ensures the safety & security of vehicles, people & assets while they travel. It is backed by SOA-based technologies & powerful tools that include the powerful PostgreSQL & PostGIS servers, Apache Tomcat, Spring & Java from Sun. With dozens of enterprise customers & thousands of users across the country, NorthStar is India’s most mature, time-tested, robust & reliable safety, well-being, identification & tracking system. It has been used in well-known enterprises & schools all over India. This is a "peace-of-mind solution" that takes into account concerns of users, a NorthStar is created by Magnasoft Consulting India Pvt. Ltd. Incorporated in year 2000, Magnasoft combines the power of GIS technology with extensive subject matter expertise to implement powerful spatial technology solutions that integrate seamlessly with the IT framework of organizations. From data capture & conversion to application development, from enterprise integration to Photogrammetry, Magnasoft covers the complete gamut of spatial systems. Magnasoft is mentored and supported by Global Technology Ventures, a premier venture capital company. Contact W: http://northstar.ws E: northstar@magnasoft.com P: 1-800-1-200-COP (1-800-1-200-267) M: 0-99-80-200-885 Office: +91 (80) 6547-4847 Address: 33/1 Lalbagh Road, Bangalore 560027, India 6

×