2. Dolphin Group of Companies
DOLPHIN EMT NU SOLUTIONS DOLPHIN RFID
DOLPHIN The RFID Experts Slide No : 2
3. DOLPHIN RFID Profile
•Provides customized end to end solutions requiring special RFIDq g p
hardware and software
• Partners with best of breed RFID OEM’s for RFID Hardware
•Developed and successfully deployed Specialized RFID
Middleware in the
fieldfield
•RFID Hardware deployments led by RF Professionals.
DOLPHIN The RFID Experts Slide No : 3
Many More
……
4. RFID Overview
RFID allows data to be transmitted by a
product containing an RFID tag microchip,
which is read by an RFID reader
RFID Technology – Key Advantages
No contact or line-of-sight required to read
d twhich is read by an RFID reader.
The data transmitted can provide
identification or location info about the
data
Simultaneous & multiple tag reads, 10s to
1000s in short time intervals
W k i h h i t ( d tidentification or location info about the
product, or specifics such as date of
manufacture, date of last servicing,
material composition etc.
Works in harsh environments (compared to
bar code, optical scan technologies)
withstands extreme temperatures, acid
baths etc.
DOLPHIN The RFID Experts Slide No : 4
Can be read through the human body,
clothing and non-metallic materials
7. Component of a RFID Solution
PRINTER
TAG
MIDDLEWARE
BUSINESS LOGIC
END USER
APPLICATION
READER
DOLPHIN The RFID Experts Slide No : 7
RFID Middleware can be set according to Business
Requirements
12. Laptop Authentication Desk ….
Laptop with UHF tag
RFID UHF Tag
inside Bag
UHF RFID
Reader
g
Access Control
Card RFID Client
Access Control/USB
Reader
Application
Reader
Tower Light
Indicator
DOLPHIN The RFID Experts Slide No : 12
13. Laptop/Assets Identification & Authentication
System Using RFID Portals
Monitor
Search
AuditAudit
DOLPHIN The RFID Experts Slide No : 13
14. Basic Requirement for Cross Authentication Logic ….
John
IT
User Identification
No 1
No 2
DOLPHIN The RFID Experts Slide No : 14
Laptop/Asset IdentificationNo 2
15. Ways to get User Identification Information ….
John
IT
1 7
User Identification
Integration with Existing
Access Control SoftwareHandKey Reader
2 6
3 54
DOLPHIN The RFID Experts Slide No : 15
HID Proximity Mifare Card HID iClass
Biometric Reader
UHF Card
16. Ways to add UHF Identification Tag added with existing Access Card….
DOLPHIN The RFID Experts Slide No : 16
17. Ways to get Laptop Identification Information …. Various size options
with UHF Technology ..
Dolphin RFID
DOLPHIN The RFID Experts Slide No : 17
18. Unauthorized Laptop/Asset Detection can generate Alarm with Tower
Indicator, SMS, Email and Video Recorder (DVR) Integrations …
On Alarm Audio-Visual Indication via Tower Light
SMS to Authorities and Laptop owner
Email to Authorities and Laptop owner
DOLPHIN The RFID Experts Slide No : 18
Interface to CCTV for initiating recording – Pre and Post Event
19. Authentication Monitoring Screen …
List of Assets Assigned
to user …. (2 Nos)
Currently Detectedy
will be shown in
GREEEN
Assigned but NOT
Detected will be
shown in BLUE
Unauthorized Asset detected will generate
DOLPHIN The RFID Experts Slide No : 19
g
Alarm Audio-Visual Indication via Tower Light
20. Alarm Panel ….
Owner for the
Detected Asset will
be shown in
GREEEN withGREEEN with
Contact Details
Unauthorized Asset
detected with Person
will be indicated in RED
with Details
Auto SMS and/or Email can be
configured for Alarm … else Operator
can send them manually from alarm
panel. Acknowledgement can be made
DOLPHIN The RFID Experts Slide No : 20
pa e c o edge e t ca be ade
compulsory to have operator inputs on
all Alarms…
22. Thank You!!!
Open for Questions
Thank You!Thank You!
Presenter Name : Sachin Joshi
Designation : Head Business & IT
Email ID: sachinj@dolphinrfid.in
DOLPHIN The RFID Experts Slide No : 22
Ph: +9120 26158200
Mobile: +91981473127