SlideShare une entreprise Scribd logo
1  sur  8
Using RFID to Track Assets




     www.vicinityrfid.com
   Automatically track and secure assets with little or no
    human intervention.
   Constant and accurate visibility.
   Asset available when needed.
   Unauthorised movement of asset is tracked immediately.
   No line of sight required.
   Fast and Easy check in/out of Assets.
   Asset movement and status.
   Increased efficiency and employee productivity.
   Security concerns are addressed.
   Low Maintenance cost.
   Overall reduction in Cost.


                                    www.vicinityrfid.com
   Organizations deals with enormous numbers of
    movable assets that keep circulating in and out
    side the premises.
   The cost value of asset may be insignificant but the
    vital business information stored in them.
   Manual system of monitoring the assets.
   Traceability is an enormous concern because of
    time spent adds the cost to the organisation.
   No or less accountability.
   Duplication of Assets.



                                  www.vicinityrfid.com
Line of sight not required.
Digital data capture.
Offline transactions.
Scalability.
Data Security.
Anti-Collision (Multiple tag read).
Multifunctional.
Electronic Article Surveillance.
Tracks different type of assets.
Real time reports.
No or very less human intervention.
Low maintenance cost.
Improvement in efficiency and productivity.

                                www.vicinityrfid.com
Transponder


                                                                 Host-System
                                             RFID Reader




Transponders or Tags are affixed on assets and the person carrying the asset
The system authenticates the asset with the user and gives the appropriate signal



                                              www.vicinityrfid.com
UHF Gen 2 Tags (shapes may differ for different
type of assets and application)
UHF RFID system consisting of
 Long Range Readers
 Hand Held Reader (Optional)
  Gate Antenna (EAS)
 Alarm System
Encoder and printer
Software for Multiple Applications
   RFID tags are attached to all Assets.
   Check In/Out Antennas and Readers are placed such a
    way so as to form an RFID grid with in the premises or
    storage area.
   Hand Held terminals to locate the fixed or semi-
    movable asset
   VRF Central Asset Tracking System (web based
    application) installed on the server.
   Alarm to be generated in case of unauthorized
    movement of asset.
   Records of asset movement/transfer and history.
   Scalable to multiple site scenario (Optional).
   Integration with any other application or business
    process (optional).



                                    www.vicinityrfid.com
   Reduced manual errors.
   Automated tracking, monitoring and
    validation.
   Reduced cost and Improved productivity.
   Works with existing Ethernet/LAN network.
   Real time update and display of documents.
   Improved security.




                             www.vicinityrfid.com   8

Contenu connexe

Tendances

RFID & Government Issued Documentation
RFID & Government Issued DocumentationRFID & Government Issued Documentation
RFID & Government Issued Documentation
moonocturne
 
RFID Technology and Internet of Things
RFID Technology and Internet of ThingsRFID Technology and Internet of Things
RFID Technology and Internet of Things
Dmitri Shiryaev
 
ACTAtek corporate presentation march 2013
ACTAtek corporate presentation march 2013ACTAtek corporate presentation march 2013
ACTAtek corporate presentation march 2013
Aurangzeb Mufti
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
Alexander Decker
 
Intelligent Wireless Sensor Network based Monitoring for Process Automation
Intelligent Wireless Sensor Network based Monitoring for Process AutomationIntelligent Wireless Sensor Network based Monitoring for Process Automation
Intelligent Wireless Sensor Network based Monitoring for Process Automation
Dharmik Rana
 

Tendances (18)

05 SIVA - Emerging Trends in Analytics - mobile and real time computational...
05 SIVA - Emerging Trends in Analytics -  mobile and real  time computational...05 SIVA - Emerging Trends in Analytics -  mobile and real  time computational...
05 SIVA - Emerging Trends in Analytics - mobile and real time computational...
 
RFID & Government Issued Documentation
RFID & Government Issued DocumentationRFID & Government Issued Documentation
RFID & Government Issued Documentation
 
RFID Technology and Internet of Things
RFID Technology and Internet of ThingsRFID Technology and Internet of Things
RFID Technology and Internet of Things
 
World's Most Secure Privacy Phones
World's Most Secure Privacy PhonesWorld's Most Secure Privacy Phones
World's Most Secure Privacy Phones
 
CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
 
ACTAtek corporate presentation march 2013
ACTAtek corporate presentation march 2013ACTAtek corporate presentation march 2013
ACTAtek corporate presentation march 2013
 
Active Ingrid Management
Active Ingrid ManagementActive Ingrid Management
Active Ingrid Management
 
Internet of Things and its Enabling Technologies - RFID
Internet of Things  and its Enabling Technologies - RFIDInternet of Things  and its Enabling Technologies - RFID
Internet of Things and its Enabling Technologies - RFID
 
SmarRack DCAM Solution
SmarRack DCAM SolutionSmarRack DCAM Solution
SmarRack DCAM Solution
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system
 
U level asset tracking system
U level asset tracking systemU level asset tracking system
U level asset tracking system
 
Iot intro
Iot introIot intro
Iot intro
 
Importance Of Using RFID Wristbands
Importance Of Using RFID WristbandsImportance Of Using RFID Wristbands
Importance Of Using RFID Wristbands
 
Shining a Light on Shadow Devices
Shining a Light on Shadow DevicesShining a Light on Shadow Devices
Shining a Light on Shadow Devices
 
Blcok Armour Digital Vault
Blcok Armour Digital VaultBlcok Armour Digital Vault
Blcok Armour Digital Vault
 
Intelligent Wireless Sensor Network based Monitoring for Process Automation
Intelligent Wireless Sensor Network based Monitoring for Process AutomationIntelligent Wireless Sensor Network based Monitoring for Process Automation
Intelligent Wireless Sensor Network based Monitoring for Process Automation
 
RFID Based Library Management System
RFID Based Library Management SystemRFID Based Library Management System
RFID Based Library Management System
 

Similaire à Vrfid Asset Management

Microsoft Biz Talk Rfid 2009 – Connecting The Extreme Edge To The Cloud
Microsoft Biz Talk Rfid 2009 – Connecting The Extreme Edge To The CloudMicrosoft Biz Talk Rfid 2009 – Connecting The Extreme Edge To The Cloud
Microsoft Biz Talk Rfid 2009 – Connecting The Extreme Edge To The Cloud
rsnarayanan
 
Event Presentation
Event PresentationEvent Presentation
Event Presentation
caumike
 
ashok mule rfid presentation
ashok mule   rfid presentationashok mule   rfid presentation
ashok mule rfid presentation
Akash Maurya
 
Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002  Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002
Akash Maurya
 
SMART CITY 3 novembre
SMART CITY 3 novembre SMART CITY 3 novembre
SMART CITY 3 novembre
canaleenergia
 

Similaire à Vrfid Asset Management (20)

Inven track 2.0
Inven track 2.0Inven track 2.0
Inven track 2.0
 
Dolphin RFID Pvt. Ltd. Profile
Dolphin RFID Pvt. Ltd. ProfileDolphin RFID Pvt. Ltd. Profile
Dolphin RFID Pvt. Ltd. Profile
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
Stockare RFID Solutions - RFID Applications
Stockare RFID Solutions - RFID ApplicationsStockare RFID Solutions - RFID Applications
Stockare RFID Solutions - RFID Applications
 
Rfid technology next generation application solutions
Rfid technology next generation application solutionsRfid technology next generation application solutions
Rfid technology next generation application solutions
 
RFID Based Asset Management Solution
RFID Based Asset Management SolutionRFID Based Asset Management Solution
RFID Based Asset Management Solution
 
Microsoft Biz Talk Rfid 2009 – Connecting The Extreme Edge To The Cloud
Microsoft Biz Talk Rfid 2009 – Connecting The Extreme Edge To The CloudMicrosoft Biz Talk Rfid 2009 – Connecting The Extreme Edge To The Cloud
Microsoft Biz Talk Rfid 2009 – Connecting The Extreme Edge To The Cloud
 
RFID PPT
RFID PPTRFID PPT
RFID PPT
 
Event Presentation
Event PresentationEvent Presentation
Event Presentation
 
ashok mule rfid presentation
ashok mule   rfid presentationashok mule   rfid presentation
ashok mule rfid presentation
 
RFID Emergency Evacuation
RFID Emergency Evacuation RFID Emergency Evacuation
RFID Emergency Evacuation
 
Aut Presentation V3
Aut Presentation V3Aut Presentation V3
Aut Presentation V3
 
Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002  Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002
 
SMART CITY 3 novembre
SMART CITY 3 novembre SMART CITY 3 novembre
SMART CITY 3 novembre
 
RFID, a great potential for Operations and SCM
RFID, a great potential for Operations and SCMRFID, a great potential for Operations and SCM
RFID, a great potential for Operations and SCM
 
E2 E Solution 4 Wind Park 1st Draft
E2 E Solution 4 Wind Park 1st DraftE2 E Solution 4 Wind Park 1st Draft
E2 E Solution 4 Wind Park 1st Draft
 
RFID-SECURITY_Vatsalya
RFID-SECURITY_VatsalyaRFID-SECURITY_Vatsalya
RFID-SECURITY_Vatsalya
 
RFID Technology for the Cultural Sector
RFID Technology for the Cultural SectorRFID Technology for the Cultural Sector
RFID Technology for the Cultural Sector
 
Rfid parking for chaotic free parking
Rfid parking for chaotic free parkingRfid parking for chaotic free parking
Rfid parking for chaotic free parking
 
Secureye Asset management
 Secureye Asset management Secureye Asset management
Secureye Asset management
 

Plus de Vicinity RFID Solutions Pvt. Ltd. (6)

RFID in car racing
RFID in car racingRFID in car racing
RFID in car racing
 
Rfid in car racing
Rfid in car racingRfid in car racing
Rfid in car racing
 
Rfid In Vehicle Access
Rfid In Vehicle AccessRfid In Vehicle Access
Rfid In Vehicle Access
 
Vicinity- RFID In Inventory
Vicinity- RFID In InventoryVicinity- RFID In Inventory
Vicinity- RFID In Inventory
 
Vrfid Vehicle Tracking
Vrfid Vehicle TrackingVrfid Vehicle Tracking
Vrfid Vehicle Tracking
 
Vicinity-Future Is RFID
Vicinity-Future Is RFIDVicinity-Future Is RFID
Vicinity-Future Is RFID
 

Dernier

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Dernier (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Vrfid Asset Management

  • 1. Using RFID to Track Assets www.vicinityrfid.com
  • 2. Automatically track and secure assets with little or no human intervention.  Constant and accurate visibility.  Asset available when needed.  Unauthorised movement of asset is tracked immediately.  No line of sight required.  Fast and Easy check in/out of Assets.  Asset movement and status.  Increased efficiency and employee productivity.  Security concerns are addressed.  Low Maintenance cost.  Overall reduction in Cost. www.vicinityrfid.com
  • 3. Organizations deals with enormous numbers of movable assets that keep circulating in and out side the premises.  The cost value of asset may be insignificant but the vital business information stored in them.  Manual system of monitoring the assets.  Traceability is an enormous concern because of time spent adds the cost to the organisation.  No or less accountability.  Duplication of Assets. www.vicinityrfid.com
  • 4. Line of sight not required. Digital data capture. Offline transactions. Scalability. Data Security. Anti-Collision (Multiple tag read). Multifunctional. Electronic Article Surveillance. Tracks different type of assets. Real time reports. No or very less human intervention. Low maintenance cost. Improvement in efficiency and productivity. www.vicinityrfid.com
  • 5. Transponder Host-System RFID Reader Transponders or Tags are affixed on assets and the person carrying the asset The system authenticates the asset with the user and gives the appropriate signal www.vicinityrfid.com
  • 6. UHF Gen 2 Tags (shapes may differ for different type of assets and application) UHF RFID system consisting of Long Range Readers Hand Held Reader (Optional) Gate Antenna (EAS) Alarm System Encoder and printer Software for Multiple Applications
  • 7. RFID tags are attached to all Assets.  Check In/Out Antennas and Readers are placed such a way so as to form an RFID grid with in the premises or storage area.  Hand Held terminals to locate the fixed or semi- movable asset  VRF Central Asset Tracking System (web based application) installed on the server.  Alarm to be generated in case of unauthorized movement of asset.  Records of asset movement/transfer and history.  Scalable to multiple site scenario (Optional).  Integration with any other application or business process (optional). www.vicinityrfid.com
  • 8. Reduced manual errors.  Automated tracking, monitoring and validation.  Reduced cost and Improved productivity.  Works with existing Ethernet/LAN network.  Real time update and display of documents.  Improved security. www.vicinityrfid.com 8