RCG valuable asset tracking management system helps bank PC management

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

There are a large number of important fixed assets in banks and other financial institutions, such as important equipment, instruments, and devices, especially laptops that store a large number of confidential important data. The traditional management method of these equipments is to manage the asset information through manual and simple manual entry and recording. These methods have been relatively backward due to their insurmountable fundamental flaws, resulting in the equipment management personnel’s accurate quantity, status, and status of the equipment. Information such as real-time location cannot be fully controlled in time, and even the discovery and tracking of missing equipment often lags behind for a long time. Therefore, how to realize the comprehensive tracking and management of valuable assets by introducing existing high-tech security measures has become an important task for banks and other financial institutions.

Problems and challenges

A domestic bank distributes laptops to employees to carry important bank data. Whether these laptops are in a safe place and whether they are in the hands of the correct custodian is what the bank wants to know in real time. Due to the large number of employees, it is obviously inconvenient to register personnel and notebooks in each area. If the notebook is lost due to internal personnel, and the responsible person cannot be found, it will cause immeasurable losses to the bank.

For banks and other financial institutions, the information in the notebook or the data in the mobile storage device must be absolutely safe and reliable. Therefore, how to use an advanced and reliable technology as a solution is an urgent need. However, there are not many effective methods that can meet theft prevention security at present. The main ones are: connect to a designated place through a steel cable; apply a sensor alarm lock, or through the design of the laptop itself. Once someone steals the laptop, the laptop will leave the original. When there is a location, the system itself automatically alarms and so on.

It is true that these methods can solve the theft of some laptops or mobile storage devices to some extent. However, many financial institutions have already installed advanced security facilities, such as access control, cameras, infrared, etc., without certain permits, and outsiders cannot enter the company’s key locations to carry out theft. Therefore, financial institutions are more concerned about how to better prevent the loss of equipment or data under the premise of allowing internal personnel to bring out the notebook equipment.

solution

In response to the problems and needs raised by the bank, RCG Hongba Digital Group, a leading RFID, biometric product and security system solution provider in the Asia-Pacific region, recommended its valuable asset tracking solutions that have been successfully applied abroad to the bank , And adjusted the plan according to the actual situation of the bank.

Through the understanding of the bank’s workflow, RCG worked with the bank to determine a demand analysis.

First, it is necessary to clarify the flow of all designated notebooks. If a loss occurs, it is required to know where it is in real time.

Second, if there are confidential information in the notebook, it is required to do: if unauthorized personnel bring out the designated area, the background system will automatically alarm.

In response to the above requirements, RCG uses the “Enterprise Resource Tracking System” developed by active radio frequency identification technology to effectively track the flow of equipment.

By sticking a special active radio frequency tag on each notebook, and installing an active radio frequency reader at a designated location, the 24-hour uninterrupted effective monitoring of all equipment in each designated location is realized. The entire system can be used without changing the previous personnel’s entry and exit habits, that is, no need to install an access control system, no need to punch in and operate, use active radio frequency tags to read long distances, strong anti-interference performance, etc., as long as the personnel normally carry laptops and move around. Access to storage devices can automatically determine whether the device has been registered and whether it is abnormal access through the logic preset by the system. Once an abnormality occurs, the system will alarm in real time.

Figure 1. Schematic diagram of omnidirectional antenna signal range

620)this.style.width=620;” border=0>

As shown in the figure above, the effective range of the reader’s antenna is a circular area centered on it. The effective radius of this area can be adjusted as needed, ranging from 1 meter to 30 meters. This area range is the system identification range.

Figure 2. Schematic diagram of directional antenna signal range

620)this.style.width=620;” border=0>

According to the actual situation on the spot, the reader can also choose the effective range of the antenna in a directional area, the distance of this area can be adjusted as needed, the directional angle is 150 degrees, and the range is from 1 meter to 100 meters. This area range is the system identification range.

For laptop anti-theft, the system includes two different security measures:


(1) Entry and exit monitoring

For the control of entrances and exits, it is only necessary to install an RFID reader (including an antenna) at key and unique entrances and exits, including building entrances and regional entrances and exits. The system only monitors personnel and assets entering and exiting these critical ports. Corresponding to the RFID tag worn by the entering personnel, the system can detect the signal sent by the tag at a long distance, and display the corresponding information in the database in real time, such as: personnel number, name, entry time, etc. Once someone takes a laptop with confidential information out of the door, the system will prompt an alarm. The alarm interface will keep flashing, an alarm will sound, and related information will be displayed. As shown below:

Figure 3 Layout of the entrance and exit reader

620)this.style.width=620;” border=0>

How to pick up the notebook and take it out of the designated area

Before each notebook is sent to employees, the system requires information registration. In addition to the active radio frequency label attached to the notebook, each employee who receives the notebook will also receive another personnel label. Enter the basic information of the employee and the notebook. At the same time, the employee label information is required to correspond to the label ID pasted on the notebook. Whenever an employee walks through the door with a reader with a laptop, the reader and antenna that control the area will transmit the collected information of the tag and its own number to the back-end system. The back-end system stores the position information of all readers and antennas.

When the notebook needs to be taken out of the designated area, the system will not alarm if only the personnel and the two corresponding labels of the notebook exit the entrance at the same time; if only the ID of a single notebook label is discovered by the system, or the personnel has taken out the designated notebook, The system will automatically alarm. At the same time, the notebook’s tag ID, area location, and the person ID of the person who brought it out will be displayed on the screen.

Figure 4 Schematic diagram of alarm

620)this.style.width=620;” border=0>

(2) Anti-tearing alarm function

The active asset tag provided by RCG can also provide tearing alarm function. If someone tries to remove the active radio frequency tag on the device, once the tag leaves the surface of the attached asset, the tag will send out an alarm signal in real time, and the system screen will display an alarm screen to notify the security personnel to take the next action. As shown below:

Figure 5 System alarm interface

620)this.style.width=620;” border=0>

The related notebook information, device ID number, in which area is read, the alarm interface will be displayed.

620)this.style.width=620;” border=0>

System function introduction:

-Map import, initialization of personnel tags, asset tags and reader location information

-Personnel and asset authority setting;

-Security level setting of the monitoring area;

-Area monitoring and entry and exit monitoring; after an illegal person enters a certain area, or when a certain asset leaves a specific area, the system can issue an alarm;

-Assets are logically bound to corresponding personnel to realize the linkage between people and assets.

When assets are carried in and out by unbound persons, they are deemed illegal and the system will automatically issue an alarm.

The entire system uses active radio frequency identification technology to monitor laptops or mobile storage devices. The surface of important equipment is affixed with radio frequency asset tags for identification, and RFID readers are used as the core equipment for information collection and transmission.

System Features

Ensure the safety of enterprise property, and verify the responsible person quickly and accurately.

Multi-region, multi-site, multi-floor equipment tracking is automatically realized, without real-time monitoring by management personnel, and does not affect the normal work of personnel.

The positioning accuracy and monitoring range of the reader can be flexibly adjusted according to management requirements (radius 1-30 meters).

The label has a long service life, and the active radio frequency label has a service life of at least 5 years.

Provides real-time records of all personnel and equipment entering and exiting, automatically prompting the alarm status, and each record will be marked and displayed and highlighted.

According to the individual needs of customers, we can provide more in-depth services, such as: preventing valuable equipment from being taken out; extended applications based on personnel location information, providing basic data to display the location of the tag holder based on the collected information, and statistical analysis of the movement of personnel Routes, etc.; according to the identity of the personnel, personalized services can be automatically provided for them.

The RCG valuable asset tracking management solution uses an asset management monitoring system that uses RFID electronic tags, wireless smart radio frequency networks and mobile positioning technology to monitor and count the location, movement status, and real-time status information of important equipment such as laptops in real time and time. Analyze and trigger follow-up actions based on the relevant status of the equipment, which greatly facilitates financial institutions to understand the location and working status of the equipment of interest anytime and anywhere, meets the all-round monitoring and supervision of important equipment assets, and significantly improves financial institutions’ access to important equipment The efficiency and precision of management.

This system can also be applied to government, museums, military and other companies or institutions that have a lot of precious assets.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare