SlideShare a Scribd company logo
Check-in/Check-out application
Components of System
Hardware components
• laptops
• RFID Tags
• RFID Reader
• Desktop reader.
Application components
• Services
• Window app
RFID Tag
Working
• Admin as to provide his ID and Password in Tagging station.
• First he/she as to scan the RFID tag through Desktop reader.
• Each laptop details is tagged with RFID Tag , and updated on database
for future scope.
Desktop Reader
Welcome
To
Check-incheck-out application
@@@@
Admin@123
Login
Copyright@AOPL
ID :
Password :
Welcome Mr./Mrs./Miss: Admin
Start tagging Here View Laptop Status Reports Permission Logout
Welcome Mr./Mrs./Miss: Admin
Start tagging Here View Laptop Status Reports Permission Logout
Laptop serial number:
Hard disk size:
RAM size:
Category:
Location:
Tag ID:
123xxxxxxxxx89
1TB
4GB
Submit
Note: This is just an example of an Tagging application
xxxxxxxxxxxxxxxxxxxxxxxxxx Scan
Meeting room
• And enters following details as below:
• Laptop serial number.
• Hard disk size.
• RAM size.
• Category.
• Location.
• Tag ID.
• By clicking on Submit the information is updated to database.
Welcome Mr./Mrs./Miss: Admin
Start tagging Here View Laptop Status Reports Permission Logout
Laptop Serial Number Tag ID number Status of Laptop Backup
123xxxxxxxxxxxxxxxx01 ABxxxxxxxxxx123 Yes
123xxxxxxxxxxxxxxxx02 ABxxxxxxxxxx124 Yes
123xxxxxxxxxxxxxxxx03 ABxxxxxxxxxx125 No
123xxxxxxxxxxxxxxxx04 ABxxxxxxxxxx126 No
123xxxxxxxxxxxxxxxx05 ABxxxxxxxxxx127 No
123xxxxxxxxxxxxxxxx06 ABxxxxxxxxxx128 Yes
Welcome Mr./Mrs./Miss: Admin
Start tagging Here View Laptop Status Reports Permission Logout
Note: Reports will be generated as
client requirement
Welcome Mr./Mrs./Miss: Admin
Start tagging Here View Laptop Status Reports Permission Logout
Laptop Serial Number Backup taken Timing will be displayed here
123xxxxxxxxxxxxxxxx01 HH:MM:SS
123xxxxxxxxxxxxxxxx02 HH:MM:SS
123xxxxxxxxxxxxxxxx03 HH:MM:SS
123xxxxxxxxxxxxxxxx04 HH:MM:SS
123xxxxxxxxxxxxxxxx05 HH:MM:SS
123xxxxxxxxxxxxxxxx06 HH:MM:SS
Scan
Scan
Scan
Scan
Scan
Scan
RFID Reader
Check-in/Check-out
• When employee comes in and takes laptop , Default status of laptop
will be “No” also from admin.
• If employee as taken complete backup from laptop, She/he as inform
admin.
• Then admin can change the status of laptop to “Yes”, now employee
can go out.
• If employee as not informed admin and status not changed, then
siren alarm will be activated.
Thank you
Asset Online Pvt.Ltd.
#388,Bluemoon x, Lnt. 9th main, sector 7, HSR layout, Bangalore-560102.
Mob no: 8884622046

More Related Content

What's hot

Teamliftss rfid based_asset_management_system
Teamliftss rfid based_asset_management_system Teamliftss rfid based_asset_management_system
Teamliftss rfid based_asset_management_system
Venkatesa Prasad
 
RFID based Waste Management system
RFID based Waste Management system RFID based Waste Management system
RFID based Waste Management system
AOPL
 
Zebra Waste Management Presentation
Zebra Waste Management PresentationZebra Waste Management Presentation
Zebra Waste Management PresentationYash Kajve
 
Aadhaar
AadhaarAadhaar
Image Guidelines: Office Equipments
Image Guidelines: Office EquipmentsImage Guidelines: Office Equipments
Image Guidelines: Office Equipments
SellOnFlipkart
 
Rfid parking for chaotic free parking
Rfid parking for chaotic free parkingRfid parking for chaotic free parking
Rfid parking for chaotic free parking
nephsystem
 
Rfid parking solution
Rfid parking solutionRfid parking solution
Rfid parking solution
nephsystem
 
Rfid and gsm based attendence system
Rfid and gsm based attendence systemRfid and gsm based attendence system
Rfid and gsm based attendence system
Karthik Kumar
 
Convert2Pdf Scanning software for MFP
Convert2Pdf Scanning software for MFP Convert2Pdf Scanning software for MFP
Convert2Pdf Scanning software for MFP
Lembit
 
RFID application
RFID application RFID application
RFID application
To Yin
 
Barrister Overview - Call Center Services
Barrister Overview - Call Center ServicesBarrister Overview - Call Center Services
Barrister Overview - Call Center Services
Barrister Global Services Network
 
RFID attendance system
RFID attendance systemRFID attendance system
RFID attendance systemA.k. Goverdhan
 
Newgen Account Opening Solution on Cloud
Newgen Account Opening Solution on CloudNewgen Account Opening Solution on Cloud
Newgen Account Opening Solution on Cloud
Newgen Software Technologies Limited
 
Nimesh thakor
Nimesh thakorNimesh thakor
Nimesh thakor
nn7046
 
Latest Web based Access Management Software - Resilient Technologies
Latest Web based Access Management Software - Resilient TechnologiesLatest Web based Access Management Software - Resilient Technologies
Latest Web based Access Management Software - Resilient Technologies
Reslient Technologies
 
Security access control system using rfid
Security access control system using rfidSecurity access control system using rfid
Security access control system using rfidEcwayt
 
Logistics Optimization using Mobility
Logistics Optimization using MobilityLogistics Optimization using Mobility
Logistics Optimization using Mobility
Tranzlogix Solutions
 
Famhost Family of Enterprise Apps
Famhost Family of Enterprise AppsFamhost Family of Enterprise Apps
Famhost Family of Enterprise Apps
Paul Farmer
 

What's hot (18)

Teamliftss rfid based_asset_management_system
Teamliftss rfid based_asset_management_system Teamliftss rfid based_asset_management_system
Teamliftss rfid based_asset_management_system
 
RFID based Waste Management system
RFID based Waste Management system RFID based Waste Management system
RFID based Waste Management system
 
Zebra Waste Management Presentation
Zebra Waste Management PresentationZebra Waste Management Presentation
Zebra Waste Management Presentation
 
Aadhaar
AadhaarAadhaar
Aadhaar
 
Image Guidelines: Office Equipments
Image Guidelines: Office EquipmentsImage Guidelines: Office Equipments
Image Guidelines: Office Equipments
 
Rfid parking for chaotic free parking
Rfid parking for chaotic free parkingRfid parking for chaotic free parking
Rfid parking for chaotic free parking
 
Rfid parking solution
Rfid parking solutionRfid parking solution
Rfid parking solution
 
Rfid and gsm based attendence system
Rfid and gsm based attendence systemRfid and gsm based attendence system
Rfid and gsm based attendence system
 
Convert2Pdf Scanning software for MFP
Convert2Pdf Scanning software for MFP Convert2Pdf Scanning software for MFP
Convert2Pdf Scanning software for MFP
 
RFID application
RFID application RFID application
RFID application
 
Barrister Overview - Call Center Services
Barrister Overview - Call Center ServicesBarrister Overview - Call Center Services
Barrister Overview - Call Center Services
 
RFID attendance system
RFID attendance systemRFID attendance system
RFID attendance system
 
Newgen Account Opening Solution on Cloud
Newgen Account Opening Solution on CloudNewgen Account Opening Solution on Cloud
Newgen Account Opening Solution on Cloud
 
Nimesh thakor
Nimesh thakorNimesh thakor
Nimesh thakor
 
Latest Web based Access Management Software - Resilient Technologies
Latest Web based Access Management Software - Resilient TechnologiesLatest Web based Access Management Software - Resilient Technologies
Latest Web based Access Management Software - Resilient Technologies
 
Security access control system using rfid
Security access control system using rfidSecurity access control system using rfid
Security access control system using rfid
 
Logistics Optimization using Mobility
Logistics Optimization using MobilityLogistics Optimization using Mobility
Logistics Optimization using Mobility
 
Famhost Family of Enterprise Apps
Famhost Family of Enterprise AppsFamhost Family of Enterprise Apps
Famhost Family of Enterprise Apps
 

Similar to rfid based check incheck-out only for laptops

Router configuracion acuse 512
Router configuracion acuse 512Router configuracion acuse 512
Router configuracion acuse 512
Neftali Morillo
 
16 AVR Instruction Encoding.pdf
16 AVR Instruction Encoding.pdf16 AVR Instruction Encoding.pdf
16 AVR Instruction Encoding.pdf
Huzaifa747109
 
Acer Predator GX-792 Manual / User Guide
Acer Predator GX-792 Manual / User GuideAcer Predator GX-792 Manual / User Guide
Acer Predator GX-792 Manual / User Guide
manualsheet
 
Temperature Screening Kiosk Droid820covid19 User Manual
Temperature Screening Kiosk Droid820covid19 User ManualTemperature Screening Kiosk Droid820covid19 User Manual
Temperature Screening Kiosk Droid820covid19 User Manual
AOK Displays
 
03 workshop
 03 workshop 03 workshop
03 workshop
Ziyuan Chen
 
39245147 intro-es-i
39245147 intro-es-i39245147 intro-es-i
39245147 intro-es-iEmbeddedbvp
 
Mikrotik router documentation ( Prepare by Mr. Chetra PO )
Mikrotik router documentation ( Prepare by Mr. Chetra PO )Mikrotik router documentation ( Prepare by Mr. Chetra PO )
Mikrotik router documentation ( Prepare by Mr. Chetra PO )
Chetra PO
 
7328 tech info_sheets
7328 tech info_sheets7328 tech info_sheets
7328 tech info_sheets
Xeroxmagdi
 
Ddns management system user's manual v1.0 20120301
Ddns management system user's manual v1.0 20120301Ddns management system user's manual v1.0 20120301
Ddns management system user's manual v1.0 20120301
Eason Lai
 
Extra performance out of thin air
Extra performance out of thin airExtra performance out of thin air
Extra performance out of thin air
Konstantine Krutiy
 
M3000 Data Sheet
M3000 Data SheetM3000 Data Sheet
M3000 Data Sheetpfarwell
 
Acer Swift 7 SF713-51-M90J Manual / User Guide
Acer Swift 7 SF713-51-M90J Manual / User GuideAcer Swift 7 SF713-51-M90J Manual / User Guide
Acer Swift 7 SF713-51-M90J Manual / User Guide
manualsheet
 
Acer Predator 15 Laptop - G9-593-77WF manual PDF download (English) / User ...
  Acer Predator 15 Laptop - G9-593-77WF manual PDF download (English) / User ...  Acer Predator 15 Laptop - G9-593-77WF manual PDF download (English) / User ...
Acer Predator 15 Laptop - G9-593-77WF manual PDF download (English) / User ...
manualsheet
 
Getting Started
Getting StartedGetting Started
Getting StartedVideoguy
 
Kcam4 user manual_4.0.25
Kcam4 user manual_4.0.25Kcam4 user manual_4.0.25
Kcam4 user manual_4.0.25
abhaygupta03
 
Casino online system arplc
Casino online system   arplcCasino online system   arplc
Casino online system arplc
Adrian Ponce de Leon
 
Versa cloud slide-deck-02-technical-introduction
Versa cloud slide-deck-02-technical-introductionVersa cloud slide-deck-02-technical-introduction
Versa cloud slide-deck-02-technical-introduction
Roberto C. Mayer
 
01c. Starting A Router
01c.  Starting A  Router01c.  Starting A  Router
01c. Starting A Router
Nghiep Lam
 
User manual acer notebook
User manual acer notebookUser manual acer notebook
User manual acer notebook
Shenzhen shangqishi limit
 

Similar to rfid based check incheck-out only for laptops (20)

Router configuracion acuse 512
Router configuracion acuse 512Router configuracion acuse 512
Router configuracion acuse 512
 
16 AVR Instruction Encoding.pdf
16 AVR Instruction Encoding.pdf16 AVR Instruction Encoding.pdf
16 AVR Instruction Encoding.pdf
 
Acer Predator GX-792 Manual / User Guide
Acer Predator GX-792 Manual / User GuideAcer Predator GX-792 Manual / User Guide
Acer Predator GX-792 Manual / User Guide
 
Temperature Screening Kiosk Droid820covid19 User Manual
Temperature Screening Kiosk Droid820covid19 User ManualTemperature Screening Kiosk Droid820covid19 User Manual
Temperature Screening Kiosk Droid820covid19 User Manual
 
03 workshop
 03 workshop 03 workshop
03 workshop
 
39245147 intro-es-i
39245147 intro-es-i39245147 intro-es-i
39245147 intro-es-i
 
Mikrotik router documentation ( Prepare by Mr. Chetra PO )
Mikrotik router documentation ( Prepare by Mr. Chetra PO )Mikrotik router documentation ( Prepare by Mr. Chetra PO )
Mikrotik router documentation ( Prepare by Mr. Chetra PO )
 
7328 tech info_sheets
7328 tech info_sheets7328 tech info_sheets
7328 tech info_sheets
 
Ddns management system user's manual v1.0 20120301
Ddns management system user's manual v1.0 20120301Ddns management system user's manual v1.0 20120301
Ddns management system user's manual v1.0 20120301
 
Extra performance out of thin air
Extra performance out of thin airExtra performance out of thin air
Extra performance out of thin air
 
M3000 Data Sheet
M3000 Data SheetM3000 Data Sheet
M3000 Data Sheet
 
Acer Swift 7 SF713-51-M90J Manual / User Guide
Acer Swift 7 SF713-51-M90J Manual / User GuideAcer Swift 7 SF713-51-M90J Manual / User Guide
Acer Swift 7 SF713-51-M90J Manual / User Guide
 
Acer Predator 15 Laptop - G9-593-77WF manual PDF download (English) / User ...
  Acer Predator 15 Laptop - G9-593-77WF manual PDF download (English) / User ...  Acer Predator 15 Laptop - G9-593-77WF manual PDF download (English) / User ...
Acer Predator 15 Laptop - G9-593-77WF manual PDF download (English) / User ...
 
How to publish your NAS on the Internet?
How to publish your NAS on the Internet?How to publish your NAS on the Internet?
How to publish your NAS on the Internet?
 
Getting Started
Getting StartedGetting Started
Getting Started
 
Kcam4 user manual_4.0.25
Kcam4 user manual_4.0.25Kcam4 user manual_4.0.25
Kcam4 user manual_4.0.25
 
Casino online system arplc
Casino online system   arplcCasino online system   arplc
Casino online system arplc
 
Versa cloud slide-deck-02-technical-introduction
Versa cloud slide-deck-02-technical-introductionVersa cloud slide-deck-02-technical-introduction
Versa cloud slide-deck-02-technical-introduction
 
01c. Starting A Router
01c.  Starting A  Router01c.  Starting A  Router
01c. Starting A Router
 
User manual acer notebook
User manual acer notebookUser manual acer notebook
User manual acer notebook
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 

rfid based check incheck-out only for laptops

  • 2. Components of System Hardware components • laptops • RFID Tags • RFID Reader • Desktop reader. Application components • Services • Window app
  • 4. Working • Admin as to provide his ID and Password in Tagging station. • First he/she as to scan the RFID tag through Desktop reader. • Each laptop details is tagged with RFID Tag , and updated on database for future scope.
  • 7. Welcome Mr./Mrs./Miss: Admin Start tagging Here View Laptop Status Reports Permission Logout
  • 8. Welcome Mr./Mrs./Miss: Admin Start tagging Here View Laptop Status Reports Permission Logout Laptop serial number: Hard disk size: RAM size: Category: Location: Tag ID: 123xxxxxxxxx89 1TB 4GB Submit Note: This is just an example of an Tagging application xxxxxxxxxxxxxxxxxxxxxxxxxx Scan Meeting room
  • 9. • And enters following details as below: • Laptop serial number. • Hard disk size. • RAM size. • Category. • Location. • Tag ID. • By clicking on Submit the information is updated to database.
  • 10. Welcome Mr./Mrs./Miss: Admin Start tagging Here View Laptop Status Reports Permission Logout Laptop Serial Number Tag ID number Status of Laptop Backup 123xxxxxxxxxxxxxxxx01 ABxxxxxxxxxx123 Yes 123xxxxxxxxxxxxxxxx02 ABxxxxxxxxxx124 Yes 123xxxxxxxxxxxxxxxx03 ABxxxxxxxxxx125 No 123xxxxxxxxxxxxxxxx04 ABxxxxxxxxxx126 No 123xxxxxxxxxxxxxxxx05 ABxxxxxxxxxx127 No 123xxxxxxxxxxxxxxxx06 ABxxxxxxxxxx128 Yes
  • 11. Welcome Mr./Mrs./Miss: Admin Start tagging Here View Laptop Status Reports Permission Logout Note: Reports will be generated as client requirement
  • 12. Welcome Mr./Mrs./Miss: Admin Start tagging Here View Laptop Status Reports Permission Logout Laptop Serial Number Backup taken Timing will be displayed here 123xxxxxxxxxxxxxxxx01 HH:MM:SS 123xxxxxxxxxxxxxxxx02 HH:MM:SS 123xxxxxxxxxxxxxxxx03 HH:MM:SS 123xxxxxxxxxxxxxxxx04 HH:MM:SS 123xxxxxxxxxxxxxxxx05 HH:MM:SS 123xxxxxxxxxxxxxxxx06 HH:MM:SS Scan Scan Scan Scan Scan Scan
  • 14. Check-in/Check-out • When employee comes in and takes laptop , Default status of laptop will be “No” also from admin. • If employee as taken complete backup from laptop, She/he as inform admin. • Then admin can change the status of laptop to “Yes”, now employee can go out. • If employee as not informed admin and status not changed, then siren alarm will be activated.
  • 15. Thank you Asset Online Pvt.Ltd. #388,Bluemoon x, Lnt. 9th main, sector 7, HSR layout, Bangalore-560102. Mob no: 8884622046