© 2009 S3Edge Inc. All Rights Reserved. 1
Overview
• Scenario
• Application Screens
• Companion video (see below)
© 2009 S3Edge Inc. All Rights Reserved. 2
Scenario
• Employees carrying laptops that they are authorized for
should be allowed entry after due verification.
• Step1: Configure SpotLight server [not shown in video]
– Upload employee details including pictures into SpotLight.
– Tag laptop with an RFID tag. Associate with owner using SpotLight.
– Synchronize the data with the handheld.
– Issue the handheld to the security guard.
• Step2: Start verification process [video]
– When a car approaches the entry/exit gate, pictures of the laptop
owners automatically pop in the handheld (even if the laptop is in
the car boot).
– Guard verifies the picture in the handheld, with the person in the
laptop and
• Hits “Verified-OK” if the owner matches.
• Hits “Verified-Invalid” if there is a mismatch.
– Information is recorded for display in the SpotLight portal and
reports
© 2009 S3Edge Inc. All Rights Reserved.
»APPLICATION SCREENS
© 2009 S3Edge Inc. All Rights Reserved. 4
SpotLight Mobile – Verify Application
4
Pick “Verify
Asset”
application
© 2009 S3Edge Inc. All Rights Reserved. 5
Pick Verification Zone
5
Select gate being
watched (here, it is gate
at Building1)
© 2009 S3Edge Inc. All Rights Reserved. 6
Waiting for employee /
laptop
© 2009 S3Edge Inc. All Rights Reserved. 7
Guard being shown the
picture of the Laptop
“HP N-61” owner.
Guard can choose to
verify – OK or Invalid.
© 2009 S3Edge Inc. All Rights Reserved. 8
Hardware – 2.45 GHz Active RFID reader and tags

Spotlight For Laptop Tracking

  • 1.
    © 2009 S3EdgeInc. All Rights Reserved. 1 Overview • Scenario • Application Screens • Companion video (see below)
  • 2.
    © 2009 S3EdgeInc. All Rights Reserved. 2 Scenario • Employees carrying laptops that they are authorized for should be allowed entry after due verification. • Step1: Configure SpotLight server [not shown in video] – Upload employee details including pictures into SpotLight. – Tag laptop with an RFID tag. Associate with owner using SpotLight. – Synchronize the data with the handheld. – Issue the handheld to the security guard. • Step2: Start verification process [video] – When a car approaches the entry/exit gate, pictures of the laptop owners automatically pop in the handheld (even if the laptop is in the car boot). – Guard verifies the picture in the handheld, with the person in the laptop and • Hits “Verified-OK” if the owner matches. • Hits “Verified-Invalid” if there is a mismatch. – Information is recorded for display in the SpotLight portal and reports
  • 3.
    © 2009 S3EdgeInc. All Rights Reserved. »APPLICATION SCREENS
  • 4.
    © 2009 S3EdgeInc. All Rights Reserved. 4 SpotLight Mobile – Verify Application 4 Pick “Verify Asset” application
  • 5.
    © 2009 S3EdgeInc. All Rights Reserved. 5 Pick Verification Zone 5 Select gate being watched (here, it is gate at Building1)
  • 6.
    © 2009 S3EdgeInc. All Rights Reserved. 6 Waiting for employee / laptop
  • 7.
    © 2009 S3EdgeInc. All Rights Reserved. 7 Guard being shown the picture of the Laptop “HP N-61” owner. Guard can choose to verify – OK or Invalid.
  • 8.
    © 2009 S3EdgeInc. All Rights Reserved. 8 Hardware – 2.45 GHz Active RFID reader and tags