Our Automatic Identification products offer tools designed to identify locate and track your people and assets right from the desktop. From protecting office computers to monitoring personnel and inventory movements, these products now bring total visibility to your operations.
Based on its patented RFID (Radio Frequency Identification) line, the product provides a single-system approach to a variety of automatic monitoring and tracking applications, including:
- Asset Management
- Personnel & Vehicle Access Control
- Personnel Monitoring
- Production and Process Control
- Inventory Tracking
Network Architecture - leverage existing corporate LAN /WAN/VPN for efficient data collection and control across the entire enterprise
Flexible Configuration - detect and identify tagged assets, people and vehicles at specific control points or monitor within broad coverage zones
Automatic Operation - hands free, long range identification supports both static and dynamic tracking, as well as covert monitoring applications
Easy to Integrate - interfaces with existing systems via industry standard interfaces, including Wiegand output for access control and alarm panel contact points
Single System Solution - multiple tag types and activation options support a variety of applications for enterprise-wide visibility and enhanced business operations
How the System Works
The System uses small, battery powered tags that, when automatically activated at control points throughout a facility, broadcast to receivers networked on the existing corporate LAN /WAN, VPN or Internet. Unlike other wireless identification and location systems, this unique dual-frequency operation and advanced capabilities allow tags to be activated and tracked in a variety of useful ways to support multiple controls.
Tags awakened by low cost activators transmit not only their unique identification code, but location and status information as well. Tag signals are picked up by network receivers up to 100 feet away, thus allowing a single receiver to collect tag data from a number of activation points. This flexible control point architecture allows users to automatically activate tags at specific locations within the facility to support applications, such as access control and perimeter control. These read points can also be grouped into control zones to locate an asset or person within a specific zone, as well as monitor movement between zones.
The receiver network also collects information from tags activated by other means, such as removal of an asset tag with tamper detection or a personnel tag with a built in distress call or panic button. These tags intermittently transmit alarm signals on a continuous basis, allowing security personnel to locate and monitor the incident as the tag moves through the coverage area. Omni-directional network transceivers, capable of two-way tag communication, support wide area polling and tag activation, enabling both static and dynamic tracking of tagged asset and inventory, as well as employee notification and location determination.
Tag identification and location information is instantly forwarded over the network to a host computer running the software to provide real-time management solutions via powerful reporting, display, and decision and control functions. Alert signals can also be tied into existing alarm, access control and surveillance systems.
The system, combined with the software, leverages the corporate LAN to provide today's e-managers with valuable tools for improving productivity, physical security, life safety and inventory visibility. Linked assets and people can be tracked and located within close proximity, thus providing an automatic, non-invasive asset protection solution while enabling freedom of movement.