SlideShare a Scribd company logo
IDEA BACKGROUND
Hey, let me
show you my
Laptop ID Card
Yes Sir! That
matches
Take my ID
Card Thank You
Ohh! This is
such a pain
Time Consuming
Peak-time rush, Manual process is time consuming and takes 40 - 60 seconds per employee (entry & exit)
Single Gate Use
Becomes very difficult in bigger facility like SEZ to enter and exit from the same gate
No Data Logging
No logging of data at a central place corresponding to employee entry and exit
Security Loophole
Physical id cards if lost by employee, may create a security loophole
Long Process
Generation of ID card is a long process and this is also against our ‘Go Green’ initiative
NFC BASED SOLUTION
3
2
4
Employee touches
the NFC Reader
1
Server
? Authentication
Status
5
Permission
Granted
Permission Denied
Transaction Log
Data Store
Success
Failure
The Laptop details
are displayed on
the monitor with
employee photo
Didn’t Work
Verification
Mobile App / Manual
?Serial
Number
Match
6
Cool!
Wow! I don’t
need to have
laptop ID card
Now that’s
called smart.
Isn’t it?
Yes
No
COST BENEFIT ANALYSIS
EASE FOR
EMPLOYEES
&
PRODUCTIVIT
Y
MORE
SECURED
INFRASTRUCT
URE
REDUCED
COST
EXPANDED
COVERAGE
To
Other Processes
NFC READER
REDUC
ED
COST
S/W
INSTALLATION
S/W
DEVELOPMENT
78% Cycle Time Reduction
10 Sec Authentication $
NFC TAG
$ 0.5 Million
Productivity Gain
FUTURE SCOPE
PARKING
ACCESS
ATTENDANCE
IDENTITY The solution can replace manual
identity verification
Transaction logs can be used for
employee attendance
NFC capability can also be extended
to provide gate pass access
Parking entries can be maintained
with the transaction logs
Near Field Communications (NFC) - Technology of the future
Big companies are already
using it
NFC Technology is prevalent
in various countries for
contactless transactions
NFC is a short range
wireless RFID Technology
Very limited use of NFC
technology as this is still in
emerging phase
Proud Employees

More Related Content

Viewers also liked

Александр Зимин, Onboarding в мобильном приложении: первое впечатление — всё,...
Александр Зимин, Onboarding в мобильном приложении: первое впечатление — всё,...Александр Зимин, Onboarding в мобильном приложении: первое впечатление — всё,...
Александр Зимин, Onboarding в мобильном приложении: первое впечатление — всё,...
Mail.ru Group
 
Actividad lúdica en el aula
Actividad lúdica en el aulaActividad lúdica en el aula
Actividad lúdica en el aula
Salvador Ramírez Luna
 
Juego grupal
Juego grupalJuego grupal
Juego grupal
ulaestudiante
 
Cv infographic part 2
Cv infographic part 2Cv infographic part 2
Cv infographic part 2
Europe Language Jobs
 
CSUN 2017 - ACT Now: Accessibility Conformance Testing for WCAG
CSUN 2017 - ACT Now: Accessibility Conformance Testing for WCAGCSUN 2017 - ACT Now: Accessibility Conformance Testing for WCAG
CSUN 2017 - ACT Now: Accessibility Conformance Testing for WCAG
Mary Jo Mueller
 
Disruptive Innovation : Capitalizing on Wearables - Bryan O'Rourke IHRSA 2017
Disruptive Innovation : Capitalizing on Wearables - Bryan O'Rourke IHRSA 2017Disruptive Innovation : Capitalizing on Wearables - Bryan O'Rourke IHRSA 2017
Disruptive Innovation : Capitalizing on Wearables - Bryan O'Rourke IHRSA 2017
Bryan K. O'Rourke
 
Cmse501 fall2014 sylabbus
Cmse501 fall2014 sylabbusCmse501 fall2014 sylabbus
Cmse501 fall2014 sylabbus
Chair52
 
Tumores de esófago
Tumores de esófagoTumores de esófago
Tumores de esófago
Mario Flores Iriarte
 
[주간IT뉴스] 그룹웨어 다우오피스가 전하는 이주의 IT뉴스 3월 둘째주
[주간IT뉴스] 그룹웨어 다우오피스가 전하는 이주의 IT뉴스 3월 둘째주[주간IT뉴스] 그룹웨어 다우오피스가 전하는 이주의 IT뉴스 3월 둘째주
[주간IT뉴스] 그룹웨어 다우오피스가 전하는 이주의 IT뉴스 3월 둘째주
소비자 만족도 1위 그룹웨어,다우오피스
 

Viewers also liked (10)

Александр Зимин, Onboarding в мобильном приложении: первое впечатление — всё,...
Александр Зимин, Onboarding в мобильном приложении: первое впечатление — всё,...Александр Зимин, Onboarding в мобильном приложении: первое впечатление — всё,...
Александр Зимин, Onboarding в мобильном приложении: первое впечатление — всё,...
 
Actividad lúdica en el aula
Actividad lúdica en el aulaActividad lúdica en el aula
Actividad lúdica en el aula
 
Juego grupal
Juego grupalJuego grupal
Juego grupal
 
Cv infographic part 2
Cv infographic part 2Cv infographic part 2
Cv infographic part 2
 
CSUN 2017 - ACT Now: Accessibility Conformance Testing for WCAG
CSUN 2017 - ACT Now: Accessibility Conformance Testing for WCAGCSUN 2017 - ACT Now: Accessibility Conformance Testing for WCAG
CSUN 2017 - ACT Now: Accessibility Conformance Testing for WCAG
 
Disruptive Innovation : Capitalizing on Wearables - Bryan O'Rourke IHRSA 2017
Disruptive Innovation : Capitalizing on Wearables - Bryan O'Rourke IHRSA 2017Disruptive Innovation : Capitalizing on Wearables - Bryan O'Rourke IHRSA 2017
Disruptive Innovation : Capitalizing on Wearables - Bryan O'Rourke IHRSA 2017
 
Cmse501 fall2014 sylabbus
Cmse501 fall2014 sylabbusCmse501 fall2014 sylabbus
Cmse501 fall2014 sylabbus
 
Tumores de esófago
Tumores de esófagoTumores de esófago
Tumores de esófago
 
2017.03.09
2017.03.092017.03.09
2017.03.09
 
[주간IT뉴스] 그룹웨어 다우오피스가 전하는 이주의 IT뉴스 3월 둘째주
[주간IT뉴스] 그룹웨어 다우오피스가 전하는 이주의 IT뉴스 3월 둘째주[주간IT뉴스] 그룹웨어 다우오피스가 전하는 이주의 IT뉴스 3월 둘째주
[주간IT뉴스] 그룹웨어 다우오피스가 전하는 이주의 IT뉴스 3월 둘째주
 

Similar to LaptopVerify_Show

QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
Bernd Ruecker
 
Service Design & Service Blueprints
Service Design & Service BlueprintsService Design & Service Blueprints
Service Design & Service Blueprints
Susan Price
 
Few RFID security solutions concepts..
Few RFID security solutions concepts..Few RFID security solutions concepts..
Few RFID security solutions concepts..Vineet M Srivastav
 
Presentation For Biometric Security (Old Ms Office Version)
Presentation For Biometric Security (Old Ms Office Version)Presentation For Biometric Security (Old Ms Office Version)
Presentation For Biometric Security (Old Ms Office Version)zodiacbiosecurity
 
Applied Recognition Face Biometrics Presentation for Silicon Halton Meetup
Applied Recognition Face Biometrics Presentation for Silicon Halton MeetupApplied Recognition Face Biometrics Presentation for Silicon Halton Meetup
Applied Recognition Face Biometrics Presentation for Silicon Halton Meetup
Rick Stomphorst
 
Ara - Visitor Management System
Ara - Visitor Management SystemAra - Visitor Management System
Ara - Visitor Management System
Ara Heptagon
 
20 Minutes on Desktop Analytics: Top Uses in the Contact Center
20 Minutes on Desktop Analytics:  Top Uses in the Contact Center 20 Minutes on Desktop Analytics:  Top Uses in the Contact Center
20 Minutes on Desktop Analytics: Top Uses in the Contact Center
Cicero, Inc.
 
20 Minutes on Desktop Analytics: Top Uses in the Back Office
20 Minutes on Desktop Analytics:  Top Uses in the Back Office 20 Minutes on Desktop Analytics:  Top Uses in the Back Office
20 Minutes on Desktop Analytics: Top Uses in the Back Office
Cicero, Inc.
 
SSL Impersonation in 5 minutes or less!
SSL Impersonation in 5 minutes or less!SSL Impersonation in 5 minutes or less!
SSL Impersonation in 5 minutes or less!
Chris John Riley
 
Mobile payment solutions pp.
Mobile payment solutions pp. Mobile payment solutions pp.
Mobile payment solutions pp. Gary Diego
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 edited
Santu Chall
 
Tna biometric time & attendance solutions
Tna biometric time & attendance solutionsTna biometric time & attendance solutions
Tna biometric time & attendance solutions
kevin me
 
Digitize Safety with Field ID
Digitize Safety with Field IDDigitize Safety with Field ID
Digitize Safety with Field ID
Field-ID
 
CIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You Eat
CloudIDSummit
 
CIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You Eat
CloudIDSummit
 
Security Checklist: how iOS can help protecting your data.
Security Checklist: how iOS can help protecting your data.Security Checklist: how iOS can help protecting your data.
Security Checklist: how iOS can help protecting your data.
Tomek Cejner
 
Just Enough Authentication
Just Enough AuthenticationJust Enough Authentication
Just Enough Authentication
ForgeRock Identity Tech Talks
 
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
IRJET Journal
 
20 Minutes on Desktop Analytics: Employee Performance & Operational Efficiency
20 Minutes on Desktop Analytics:  Employee Performance & Operational Efficiency20 Minutes on Desktop Analytics:  Employee Performance & Operational Efficiency
20 Minutes on Desktop Analytics: Employee Performance & Operational Efficiency
Cicero, Inc.
 
The Power of Identification Management
The Power of Identification ManagementThe Power of Identification Management
The Power of Identification ManagementViper Web Solutions
 

Similar to LaptopVerify_Show (20)

QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Service Design & Service Blueprints
Service Design & Service BlueprintsService Design & Service Blueprints
Service Design & Service Blueprints
 
Few RFID security solutions concepts..
Few RFID security solutions concepts..Few RFID security solutions concepts..
Few RFID security solutions concepts..
 
Presentation For Biometric Security (Old Ms Office Version)
Presentation For Biometric Security (Old Ms Office Version)Presentation For Biometric Security (Old Ms Office Version)
Presentation For Biometric Security (Old Ms Office Version)
 
Applied Recognition Face Biometrics Presentation for Silicon Halton Meetup
Applied Recognition Face Biometrics Presentation for Silicon Halton MeetupApplied Recognition Face Biometrics Presentation for Silicon Halton Meetup
Applied Recognition Face Biometrics Presentation for Silicon Halton Meetup
 
Ara - Visitor Management System
Ara - Visitor Management SystemAra - Visitor Management System
Ara - Visitor Management System
 
20 Minutes on Desktop Analytics: Top Uses in the Contact Center
20 Minutes on Desktop Analytics:  Top Uses in the Contact Center 20 Minutes on Desktop Analytics:  Top Uses in the Contact Center
20 Minutes on Desktop Analytics: Top Uses in the Contact Center
 
20 Minutes on Desktop Analytics: Top Uses in the Back Office
20 Minutes on Desktop Analytics:  Top Uses in the Back Office 20 Minutes on Desktop Analytics:  Top Uses in the Back Office
20 Minutes on Desktop Analytics: Top Uses in the Back Office
 
SSL Impersonation in 5 minutes or less!
SSL Impersonation in 5 minutes or less!SSL Impersonation in 5 minutes or less!
SSL Impersonation in 5 minutes or less!
 
Mobile payment solutions pp.
Mobile payment solutions pp. Mobile payment solutions pp.
Mobile payment solutions pp.
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 edited
 
Tna biometric time & attendance solutions
Tna biometric time & attendance solutionsTna biometric time & attendance solutions
Tna biometric time & attendance solutions
 
Digitize Safety with Field ID
Digitize Safety with Field IDDigitize Safety with Field ID
Digitize Safety with Field ID
 
CIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You Eat
 
CIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You Eat
 
Security Checklist: how iOS can help protecting your data.
Security Checklist: how iOS can help protecting your data.Security Checklist: how iOS can help protecting your data.
Security Checklist: how iOS can help protecting your data.
 
Just Enough Authentication
Just Enough AuthenticationJust Enough Authentication
Just Enough Authentication
 
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
 
20 Minutes on Desktop Analytics: Employee Performance & Operational Efficiency
20 Minutes on Desktop Analytics:  Employee Performance & Operational Efficiency20 Minutes on Desktop Analytics:  Employee Performance & Operational Efficiency
20 Minutes on Desktop Analytics: Employee Performance & Operational Efficiency
 
The Power of Identification Management
The Power of Identification ManagementThe Power of Identification Management
The Power of Identification Management
 

LaptopVerify_Show

  • 1. IDEA BACKGROUND Hey, let me show you my Laptop ID Card Yes Sir! That matches Take my ID Card Thank You Ohh! This is such a pain Time Consuming Peak-time rush, Manual process is time consuming and takes 40 - 60 seconds per employee (entry & exit) Single Gate Use Becomes very difficult in bigger facility like SEZ to enter and exit from the same gate No Data Logging No logging of data at a central place corresponding to employee entry and exit Security Loophole Physical id cards if lost by employee, may create a security loophole Long Process Generation of ID card is a long process and this is also against our ‘Go Green’ initiative
  • 2. NFC BASED SOLUTION 3 2 4 Employee touches the NFC Reader 1 Server ? Authentication Status 5 Permission Granted Permission Denied Transaction Log Data Store Success Failure The Laptop details are displayed on the monitor with employee photo Didn’t Work Verification Mobile App / Manual ?Serial Number Match 6 Cool! Wow! I don’t need to have laptop ID card Now that’s called smart. Isn’t it? Yes No
  • 3. COST BENEFIT ANALYSIS EASE FOR EMPLOYEES & PRODUCTIVIT Y MORE SECURED INFRASTRUCT URE REDUCED COST EXPANDED COVERAGE To Other Processes NFC READER REDUC ED COST S/W INSTALLATION S/W DEVELOPMENT 78% Cycle Time Reduction 10 Sec Authentication $ NFC TAG $ 0.5 Million Productivity Gain
  • 4. FUTURE SCOPE PARKING ACCESS ATTENDANCE IDENTITY The solution can replace manual identity verification Transaction logs can be used for employee attendance NFC capability can also be extended to provide gate pass access Parking entries can be maintained with the transaction logs Near Field Communications (NFC) - Technology of the future Big companies are already using it NFC Technology is prevalent in various countries for contactless transactions NFC is a short range wireless RFID Technology Very limited use of NFC technology as this is still in emerging phase Proud Employees