How Does RFID Work?
RFID technology is generally a non-contact, automatic identification technology that uses radio signals to identify, track, sort and detect a variety of objects or readings. This can include people, vehicles, goods and assets.
In its simplest form, an RFID system consists of RFID tags (attached to the item to be identified), an interrogator (reader/scanner) either fixed and/or mobile (hand-held), one or more antennae (if using fixed readers), and software to control the reader and capture the asset data.
RFID tags (or labels) are a key component of the technology and are sometimes considered to be enhanced “electronic barcodes”.
Systems that make use of RFID technology are typically composed of three key elements
1. An RFID tag or transponder that carries object-identifying data (such as asset and people identifiers)
2. An RFID tag reader or transceiver and software that reads and writes tag data (either handheld or fixed to doorways)
3. A back-end database, that stores all of the records associated with tag contents (the software)
Each day, millions of people use RFID systems without even knowing. Employee passes, tags for motorway tolls or access to workspaces. They are hidden in passports and electronic car keys. RFID is ubiquitous and increasingly seamless. Nowadays RFID has become almost unavoidable for applications related to access control and logistics.
What Is RFID Security With CCTV?
The deployment and use of RFID technology are growing rapidly across all types of industries. RFID tracking applies technology not only in traditional applications such as assets and inventory tracking. But also in real-time tracking of assets and people in high-security areas or in unmanned locations.
The Hardcat RFID solution triggers CCTV and sends photographs and alerts to the security desk or control room when certain controls are activated.
RFID and Security; Autonomous Solutions
The Hardcat autonomous RFID security solution is a combination of RFID tagging, of both people and assets, which is linked to CCTV cameras for unmanned locations and the Hardcat database software.
The solution is designed to take a photograph of persons entering or leaving a location who do not comply with the requirements of the organisation.
Fixed RFID readers installed at prominent entry and exit points (unmanned or manned locations) will automatically detect assets and people moving in and out of these doorways or chokepoints.
The Hardcat system raises a work order containing the photograph (taken by the CCTV camera) as well as RFID tag details of both the asset(s) and the person entering and leaving high-security locations.
Hardcat RFID Solutions Alert Security Desk
- When a person’s RFID tag and asset RFID tag(s) do not reflect the owner and asset in the Hardcat database
- When the asset(s) RFID tag(s) have no associated owner in the Hardcat database
Motion Detection And CCTV Alerts
- When a person entering/leaving a location is outside working hours
- When a person entering/leaving the location is without a “person” RFID tag
- When a person without the correct tag creates an incident that causes CCTV to take photograph or video
RFID Triggering CCTV – Important In Unmanned Areas
Whether entering an unauthorised location, visiting after normal working hours or carrying assets that are not assigned, Hardcat will trigger an alert and send a work order (with image and RFID data) directly to the security desk/control room for attention.
Hardcat software solutions partnered with RFID technology is your gateway to efficiencies.
Hardcat solutions are highly scalable
and easily configurable – Let’s Talk
Call +61 3 9695 5400