7107799 proposal for asset tracking
TRANSCRIPT
Proposal for Asset Security & Management Solution for Client Name, Location
Technical Proposal
For
Asset Management & Security Solution
For
Contact Person:
Phone
Company Name
Location
Page 1 of 19
Proposal for Asset Security & Management Solution for Client Name, Location
HCL PROFILEHCL PROFILE
HCL Infosystems Limited is one of the pioneers in the Indian IT market, with its origins in 1976.
For over quarter of a century, HCL has developed and implemented solutions for multiple
market segments, across a range of technologies in India. HCL has been in the forefront in
introducing new technologies and solutions, now HCL is amongst the top 20 business houses in
India with 14000+ employees spread across 38 countries and revenue of around 14 billion US
dollars.
HCL Infosystems Ltd. is the Internet Infrastructure initiative of the HCL group, India’s premier
information technology group. Through the pioneering presence of the HCL group companies
the vast experience of the markets, HCL Infosystems has propelled itself to the path of “Total
Technology Integration”.
HCL Infosystems has established state-of-the-art ATM / Frame-Relay IP based network
infrastructure across 43 cities in the country and offers an entire range of managed services. Its
portfolio of services includes Virtual Private Networks (VPNs), Broadband Internet access;
Hosting Co-location Services; Designing and deploying Disaster Recovery solutions and Business
Continuity solutions; Application services; Managed Security services and NOC services.
Page 2 of 19
Proposal for Asset Security & Management Solution for Client Name, Location
All these services are delivered with a turnkey approach that includes delivering Infosystems’s
core services, third party hardware and network provisioning, maintenance activities and
project management.
HCL Infosystems comes with the promise of delivering the committed ‘Quality of Service’
backed by significant investments in infrastructure, network management solutions and its
round the clock centralized Customer Support Call Center. This holds even more when we
consider the leverage Infosystems draws from its parent company’s unparalleled experience in
networking.
HCL’s Customer Support
We have the highest regard for our esteem customers, and to meet this, we have geared up
ourselves with following services across the country:
Page 3 of 19
Proposal for Asset Security & Management Solution for Client Name, Location
We organize customer’s meets all over the country to have the first hand interaction,
which enable us to interact with our customers and review their feedback one to one.
We also strive to improve our services standards for more customer satisfaction.
We have the key-client concept, where in we constantly monitor the upkeep of our
products, being used for achieving highest level of service standards. The parameters
governed by this (viz. Up-time, Preventive Maintenance Schedule etc.) are appraised by
specialized team at the regional office and Head office. Further, these clients are
provided with an Up Time Certificate authenticated by the respective user department
and these are sent by the President & CEO himself.
We have across the country –
Number of Machines 50,000 (All products including photocopier)
10,000 (Telecom products alone)
Number of Software Solutions 1,000
Number of Professionals 14,000
Number of Trained Engineers 5,000
Number of Offices 170 cities
Number of Service Centres 360
Customer Satisfaction 9 out of 10 *
ISO Certification ISO 9001:2000 & ISO 14001:2004
* Survey done by
With trained engineers around 360 locations around India, we are able to provide better
customer support and reach well above the industrial customer satisfaction level standards.
HCL is itself synonymous with customer satisfaction, we are proud to offer the best solutions
and services anywhere in India.
Page 4 of 19
Proposal for Asset Security & Management Solution for Client Name, Location
The best in the “Corporate Users expectation and Satisfaction Survey 2003” - Voice & Data
Magazine.
HCL has been ranked No.5 among India’s Top 5 groups impacting the dynamics of the IT Industry - DataQuest
“The Most Responsive Company, 2005”– IT Hardware Category by the Economic Times - Avaya Global Connect
Page 5 of 19
Proposal for Asset Security & Management Solution for Client Name, Location
HCL’s Presence in IndiaHCL’s Presence in India
Page 6 of 19
Proposal for Asset Security & Management Solution for Client Name, Location
RFID Solution for (Client)
Overview
Radio Frequency Identification (RFID) is the technology in Asset Security and Management applications.
It is a form of identification that is contact-less and does not require line of sight. The technology has
been in use in other sectors for more than 20 years. The RFID tags are placed in books and generally
covered with a property sticker. Antennas of different sizes, based on application, are used to read the
tags and manage the various office functions.
The RFID Solution is a revolutionary application of automatic identification and data capture (AIDC)
technology. In an office environment, RFID technology resembles a traditional barcode system in that it
provides a means of assigning an ID to an item and reading that ID to perform circulation transactions or
to take inventory. But while RFID technology resembles a traditional barcode system in application, the
HCL RFID Solution is far superior in performance—plus it offers built-in security.
How the HCL RFID Solution Works
HCL has partnered with Feig/TAGSYS/, leading manufacturers of RFID hardware, to bring you the latest
in RFID technology. A standard RFID system consists of four main parts:
RFID Tags - Flexible, paper-thin smart labels that are applied directly
to library items. Each RFID tag contains a tiny chip, which is both
readable and writable and can store information to identify items in
your collection. In library applications, it also stores a security bit and
if needed, information to support sorting systems.
Passive (this is what mostly used now)
Tags are inactive until the reader’s interrogation signal “wakes” them up
Cheap, but short range only
Semi-passive
Page 7 of 19
Proposal for Asset Security & Management Solution for Client Name, Location
On-board battery, but cannot initiate communication
Can serve as sensors, collect information from environment: for example,
“smart dust” for military applications
More expensive, longer range
Active
On-board battery, can initiate communication
Readers – A
handheld or
EAS Gates
programmed to
capture radio
waves signals
omitted by the
RFID Tags. The
devices are responsible for the security and circulation of resources as programmed in the
server, it will alarm if the resource is taken out without proper process.
Database: all the information related to RFID tags and corresponding information about the
resource/books/member is stored in the database which is stored in a centralized location a
PC or a Server. The software installed in the server verifies the tag reading captured by the
Reader (Transceiver).
Page 8 of 19
Proposal for Asset Security & Management Solution for Client Name, Location
Advantages of an RFID System over a Traditional Barcode
System
The HCL RFID Solution provides numerous advantages over traditional
barcode systems. Here are just a few of the benefits:
Features RFID BarcodeRead more than one item at a time × Read while item is moving × Programmable × Line of site read not required × Life guarantee (100,000 reads) × Sturdy in harsh environments Might want to consider use of the term “environmentally hardened”, this term is becoming more common place in USA electronics markets. (I am not certain of global acceptance of this term)
×
Able to resist water damage × Built in security ‐ × Inventory tool without handling items × Able to locate specific items on shelves × Use with borrower self checks units Use with automated sorting and handling systems ×
Particulars RFID Barcode Physical Size Tags range in size from a postage
stamp to a book. The aspect ratio of a Tag's length vs width is very flexible and not a significant factor for the Reader.
Bar codes are larger than the smallest tag and very sensitive to the aspect ratio for presentation to a scanner. The ratio of a bar code's length vs width is critical to its operation.
Page 9 of 19
Proposal for Asset Security & Management Solution for Client Name, Location
Lifespan Tags have no moving parts and are embedded in protective material for an indestructible case and multi-year lifespan.
Bar Codes have unlimited shelf life but are subject to degradation with handling.
Harsh Environments Tags may be placed in extreme environments and perform to specification. They are very robust to handling, sensitive to environment, and generally degrade once used, stored or handled in a non-office environment.
Product Codes Digital data is stored on the Tag and provides for a significant capability to encode: 1) Tag originator 2) User data as needed by the segment or application 3) Serial number as needed by the segment/application Major vertical markets like Retail have standards which are excellent at coding product type and manufacturer. Additional information beyond these basic parameters is not feasible because the size of the Bar Code becomes too large.
Counterfeiting Tags are produced with a unique identity code (UIC) or serial number from the manufacturer. This is embedded digitally on the microchip and may not be changed, therefore, making them extremely resistant to counterfeiting.
Bar Codes may easily be duplicated and attached to products and are, therefore, easily counterfeited.
Dynamic Updates Tags may be written to and offer on board memory to retain information. This feature may be used to store a product calibration history, preventive maintenance, etc. Updates may be made within the blink of an eye and automatically without human intervention. Once a Bar Code is printed it remains frozen. The
Once a Bar Code is printed it remains frozen. The Code and the process of attaching the BC is not supportive of real time updates. It is a labor intensive process to update any information on a BC once printed.
Page 10 of 19
Proposal for Asset Security & Management Solution for Client Name, Location
Code andTraceable The combination of UIC (unique
identification code), user data, serial number and on-board memory makes it possible to track, recall, or document the life span of a single item. For example, with livestock this means that the birthplace of the animal, its vaccine history, feed lots, slaughter house, processor, etc may all be tracked. This kind of information supports a complete pedigree for an item attached to the Tag.
BC is limited to an entire class of products and unable to drill down to a unique item. It is not feasible to recall, track or document a single item.
Scanning RFID - Offers a range from inches to hundreds of feet and does not require line of sight. This means that individual Tags placed within a carton, packed in a box and stored on a pallet may be read. You do not have to open each box and present the individual item. BC - Offers a range over inches and requires line of sight to read the code.
The Bar Code must be presented to the scanner in an orientation and distance that is very limited. Individual reading requires that each box on a pallet be opened and the item pulled for presentation to the scanner.
Simultaneous Scanning
RFID - Standards have algorithms to support simultaneous reading of Tags at one time.
Limited to one bar code at a time. Unable to support simultaneous reads.
Cost High volume Tags are currently 25 cents each with the potential to continue to drop per the experience curve. High volume bar codes are less then a penny. In this scenario the labor savings from items like physical counts, etc. give RFID greater feasibility.
This is a clear advantage for BC unless you expand cost to be fully loaded.
Reusable Yes No
Page 11 of 19
Proposal for Asset Security & Management Solution for Client Name, Location
RFID System Components and Applications
RFID Tags
An RFID tag is the most important link in any RFID system. It
has the ability to store information relating to the specific
item to which they are attached, rewrite again without any
requirement for contact or line of sight. Data within a tag may
provide identification for an item, proof of ownership, original
storage location, loan status and history.
RFID Tag consists of an integrated circuit and an antenna
combined to form a transponder. RFID tags collect the energy to operate from a Radio Frequency (RF)
field emitted by a reader device; therefore they do not need a battery. When energized by a radio signal
from a fixed position reader or handheld scanner, the tag returns the stored information in order that
the item to which it is attached can be easily located.
The chip also has a "multi-read" function, which means that several tags can be read at once.
RFID tags have been specifically designed to be affixed into different like media, including books, CDs,
DVDs and tapes. In asset management as there are different types of items need to be monitor, we
would suggest different kinds of tags for different items for example a tag for PC / Laptop will be
different from the tags which are used for furniture items, and tags used for individual tracking will be
different from used for the folder/documents/paper tracking.
It is thin, flexible and thus can be laminated between paper and plastic. With special method to attach to
books, patron is totally unaware that the tag is there.
KEY BENEFITS:1. No line of sight needed 2. Allows to check-out and check-in several items simultaneously 3. Information directly attached to product 4. Performing both identification and antitheft in one single operation
Page 12 of 19
Proposal for Asset Security & Management Solution for Client Name, Location
5. Different shape and sizes available 6. Able to tag almost anything 7. Accelerate scanning and identifying
Handheld RFID Reader
Handheld Reader can be used to manage the inventory and trace the lost / missing inventory item. RFID handheld reader will be able to search by reading the RFID tag pasted on the different asset.
Phase Target: Quick inventory Look up the misplace material Search for certain material
KEY BENEFITS:1. Changes inventory process: 2. No more book handling: just take the reader inside the room to perform an instant inventory. 3. Accuracy: asset identification numbers are registered in the Shelf-Management Reader. The
data is then downloaded to the central database. 4. The fastest inventory you have ever made: 20 items per second. 5. User friendly: 6. Light weight 7. Wand allows easy reading of high and low areas8. Saves time and resources: 9. Implementers indicate a 75% reduction in human resources required for inventory management
activities.
RFID Reader and Antenna
RFID Reader and antenna will be installed at different location within the office or
outside the office as per requirement. RFID Antenna along with the ERP solution
will help us to track the item available. RFID Reader and Antenna will be installed
at strategic location in such a way that the reading range of the antenna will cover
complete location. Number of RFID reader and antenna will depend on the size of
the room, etc.
1. Tracking of RFID tags in it’s reading range. 2. Reports can be generated with the help of ERP.
a. Number of items available in a particular room based on the RFID Reader installed in the room.
Page 13 of 19
Proposal for Asset Security & Management Solution for Client Name, Location
b. To track any movement of item from room to another 3. Also help in tracking/finding the exact location of the individual in the office4. Check the movement of files/document from sensitive areas and raise “alarm” if required.
EAS Gates
RFID EAS Gate is the anti-theft part of the RFID Asset Management System using the same RFID tags
embedded in the office items. Each lane is able to track
items of 1 meter or more and would trigger the alarm
system when an un-borrowed item passed through them.
The alarm will sound and lights on the gate will flash as
patron staff through with the office material.
The EAS Anti-Theft Gate is used to detect RFID tag that is
equipped with EAS (Electronic Article Surveillance). It can
detect the RFID tags within 1 meter range without interference of magnetic items, upon detecting of
Armed RFID tags, the alarm will sound on the gate. It has option to trigger a Camera to record patrons
who trigger the alarm to the Surveillance Station.
Theft detection is an integral feature of the chip within the tag. It is a stand-alone technology, which
operates independently of the library database.
FEATURES:1. Detect EAS Armed RFID tags 2. Multi-item detection 3. Able to integrate camera with the gate (Option) 4. Gale to integrate with Surveillance Station (Option)
KEY BENEFITS:1. Single technology is required for both inventory and theft management of the office. 2. Office staff is alerted immediately when un-borrowed items passes through the theft detection
gates. 3. Would-be thieves are deterred by the physical presence of the gates. 4. Number of patrons passing through the gantry is captured by a counter on the gates Alarm
volume can be easily controlled.
Page 14 of 19
Proposal for Asset Security & Management Solution for Client Name, Location
How the RFID Security System will work for Client Name, Location
After tags have be programmed with unique ID number and related information is updated in the ERP
system, tags will be pasted or tied, accordingly to the type of asset.
Fig: Tagging of Items
RFID Reader with Antenna will be installed at strategic location in the office, once the same is done
whole RFID operation will be activated for testing.
Page 15 of 19
Proposal for Asset Security & Management Solution for Client Name, Location
Fig: Integration of RFID and ERP
Once the system is operated RFID tags according to their type will omit signals if active tags are used,
RFID Antenna / Reader will omit signal to catch the signal from passive tags.
Figure: Communication between RFID Tags and Reader
Security of Asset will be handling by the EAS Gates installed at the strategic doors in the campus. With
the help of the ERP solution asset/items can be defined as “Free to move item” “Restricted items” so
that when ever any unauthorized person is taking out any “Restricted item” the gates will raise the
alarm and video will record all the movement. Whereas in “Free to move items” items it will not give
Page 16 of 19
Proposal for Asset Security & Management Solution for Client Name, Location
any “alarm” and record the details of the person and send the same to the ERP solution (integration
required).
Fig: Security Gate Function
The Security will raise “Alarm” if anybody is taking any asset which is not authorized to be taken out of
the location or by the person. The camera installed will record the person either authorized or
unauthorized according to the configuration / integration with ERP. There will be continuous flow of
RFID signal on the gate.
Page 17 of 19
Proposal for Asset Security & Management Solution for Client Name, Location
Fig: Online Asset Tacking System
Reader and Antenna will continuously send the reading of the tags to the ERP solution, so that concern
person and note / track/generate report on the movement / availability /location of the item with in the
campus. The same can be used to track any item, user have to enter the unique id of the RFID tag pasted
on the item and send command to the Central EPR solution, ERP solution will revert back with the
information on the location/ availability of the item (integration required)
Integration
Integration with ERP solution will be done according to the requirement of the client, different reports,
and security aspects.
Deliverables*
RFID Tags
RFID Member Card
Handheld Reader
EAS Gate
Page 18 of 19
Proposal for Asset Security & Management Solution for Client Name, Location
Reader and Antenna
Integration
* The Quantity and integration will depend on the requirement of the client. On the basis of requirement the
commercial will generate.
Page 19 of 19