Top Banner
Proposal for Asset Security & Management Solution for Client Name, Location Technical Proposal For Asset Management & Security Solution For Contact Person: Phone Company Name Page 1 of 23
23

7107799 Proposal for Asset Tracking

Sep 22, 2014

Download

Documents

omthakur77
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 7107799 Proposal for Asset Tracking

Proposal for Asset Security & Management Solution for Client Name, Location

Technical Proposal

For

Asset Management & Security Solution

For

Contact Person:

Phone

Company Name

Location

Page 1 of 19

Page 2: 7107799 Proposal for Asset Tracking

Proposal for Asset Security & Management Solution for Client Name, Location

HCL PROFILEHCL PROFILE

HCL Infosystems Limited is one of the pioneers in the Indian IT market, with its origins in 1976.

For over quarter of a century, HCL has developed and implemented solutions for multiple

market segments, across a range of technologies in India. HCL has been in the forefront in

introducing new technologies and solutions, now HCL is amongst the top 20 business houses in

India with 14000+ employees spread across 38 countries and revenue of around 14 billion US

dollars.

HCL Infosystems Ltd. is the Internet Infrastructure initiative of the HCL group, India’s premier

information technology group. Through the pioneering presence of the HCL group companies

the vast experience of the markets, HCL Infosystems has propelled itself to the path of “Total

Technology Integration”.

HCL Infosystems has established state-of-the-art ATM / Frame-Relay IP based network

infrastructure across 43 cities in the country and offers an entire range of managed services. Its

portfolio of services includes Virtual Private Networks (VPNs), Broadband Internet access;

Hosting Co-location Services; Designing and deploying Disaster Recovery solutions and Business

Continuity solutions; Application services; Managed Security services and NOC services.

Page 2 of 19

Page 3: 7107799 Proposal for Asset Tracking

Proposal for Asset Security & Management Solution for Client Name, Location

All these services are delivered with a turnkey approach that includes delivering Infosystems’s

core services, third party hardware and network provisioning, maintenance activities and

project management.

HCL Infosystems comes with the promise of delivering the committed ‘Quality of Service’

backed by significant investments in infrastructure, network management solutions and its

round the clock centralized Customer Support Call Center. This holds even more when we

consider the leverage Infosystems draws from its parent company’s unparalleled experience in

networking.

HCL’s Customer Support

We have the highest regard for our esteem customers, and to meet this, we have geared up

ourselves with following services across the country:

Page 3 of 19

Page 4: 7107799 Proposal for Asset Tracking

Proposal for Asset Security & Management Solution for Client Name, Location

We organize customer’s meets all over the country to have the first hand interaction,

which enable us to interact with our customers and review their feedback one to one.

We also strive to improve our services standards for more customer satisfaction.

We have the key-client concept, where in we constantly monitor the upkeep of our

products, being used for achieving highest level of service standards. The parameters

governed by this (viz. Up-time, Preventive Maintenance Schedule etc.) are appraised by

specialized team at the regional office and Head office. Further, these clients are

provided with an Up Time Certificate authenticated by the respective user department

and these are sent by the President & CEO himself.

We have across the country –

Number of Machines 50,000 (All products including photocopier)

10,000 (Telecom products alone)

Number of Software Solutions 1,000

Number of Professionals 14,000

Number of Trained Engineers 5,000

Number of Offices 170 cities

Number of Service Centres 360

Customer Satisfaction 9 out of 10 *

ISO Certification ISO 9001:2000 & ISO 14001:2004

* Survey done by

With trained engineers around 360 locations around India, we are able to provide better

customer support and reach well above the industrial customer satisfaction level standards.

HCL is itself synonymous with customer satisfaction, we are proud to offer the best solutions

and services anywhere in India.

Page 4 of 19

Page 5: 7107799 Proposal for Asset Tracking

Proposal for Asset Security & Management Solution for Client Name, Location

The best in the “Corporate Users expectation and Satisfaction Survey 2003” - Voice & Data

Magazine.

HCL has been ranked No.5 among India’s Top 5 groups impacting the dynamics of the IT Industry - DataQuest

“The Most Responsive Company, 2005”– IT Hardware Category by the Economic Times - Avaya Global Connect

Page 5 of 19

Page 6: 7107799 Proposal for Asset Tracking

Proposal for Asset Security & Management Solution for Client Name, Location

HCL’s Presence in IndiaHCL’s Presence in India

Page 6 of 19

Page 7: 7107799 Proposal for Asset Tracking

Proposal for Asset Security & Management Solution for Client Name, Location

RFID Solution for (Client)

Overview

Radio Frequency Identification (RFID) is the technology in Asset Security and Management applications.

It is a form of identification that is contact-less and does not require line of sight. The technology has

been in use in other sectors for more than 20 years. The RFID tags are placed in books and generally

covered with a property sticker. Antennas of different sizes, based on application, are used to read the

tags and manage the various office functions.

The RFID Solution is a revolutionary application of automatic identification and data capture (AIDC)

technology. In an office environment, RFID technology resembles a traditional barcode system in that it

provides a means of assigning an ID to an item and reading that ID to perform circulation transactions or

to take inventory. But while RFID technology resembles a traditional barcode system in application, the

HCL RFID Solution is far superior in performance—plus it offers built-in security.

How the HCL RFID Solution Works

HCL has partnered with Feig/TAGSYS/, leading manufacturers of RFID hardware, to bring you the latest

in RFID technology. A standard RFID system consists of four main parts:

RFID Tags - Flexible, paper-thin smart labels that are applied directly

to library items. Each RFID tag contains a tiny chip, which is both

readable and writable and can store information to identify items in

your collection. In library applications, it also stores a security bit and

if needed, information to support sorting systems.

Passive (this is what mostly used now)

Tags are inactive until the reader’s interrogation signal “wakes” them up

Cheap, but short range only

Semi-passive

Page 7 of 19

Page 8: 7107799 Proposal for Asset Tracking

Proposal for Asset Security & Management Solution for Client Name, Location

On-board battery, but cannot initiate communication

Can serve as sensors, collect information from environment: for example,

“smart dust” for military applications

More expensive, longer range

Active

On-board battery, can initiate communication

Readers – A

handheld or

EAS Gates

programmed to

capture radio

waves signals

omitted by the

RFID Tags. The

devices are responsible for the security and circulation of resources as programmed in the

server, it will alarm if the resource is taken out without proper process.

Database: all the information related to RFID tags and corresponding information about the

resource/books/member is stored in the database which is stored in a centralized location a

PC or a Server. The software installed in the server verifies the tag reading captured by the

Reader (Transceiver).

Page 8 of 19

Page 9: 7107799 Proposal for Asset Tracking

Proposal for Asset Security & Management Solution for Client Name, Location

Advantages of an RFID System over a Traditional Barcode

System

The HCL RFID Solution provides numerous advantages over traditional

barcode systems. Here are just a few of the benefits:

Features RFID BarcodeRead more than one item at a time × Read while item is moving × Programmable × Line of site read not required × Life guarantee (100,000 reads) × Sturdy in harsh environments Might want to consider use of the term “environmentally hardened”, this term is becoming more common place in USA electronics markets. (I am not certain of global acceptance of this term)

×

Able to resist water damage × Built in security ‐ × Inventory tool without handling items × Able to locate specific items on shelves × Use with borrower self checks units Use with automated sorting and handling systems ×

Particulars RFID Barcode Physical Size Tags range in size from a postage

stamp to a book. The aspect ratio of a Tag's length vs width is very flexible and not a significant factor for the Reader.

Bar codes are larger than the smallest tag and very sensitive to the aspect ratio for presentation to a scanner. The ratio of a bar code's length vs width is critical to its operation.

Page 9 of 19

Page 10: 7107799 Proposal for Asset Tracking

Proposal for Asset Security & Management Solution for Client Name, Location

Lifespan Tags have no moving parts and are embedded in protective material for an indestructible case and multi-year lifespan.

Bar Codes have unlimited shelf life but are subject to degradation with handling.

Harsh Environments Tags may be placed in extreme environments and perform to specification. They are very robust to handling, sensitive to environment, and generally degrade once used, stored or handled in a non-office environment.

Product Codes Digital data is stored on the Tag and provides for a significant capability to encode: 1) Tag originator 2) User data as needed by the segment or application 3) Serial number as needed by the segment/application Major vertical markets like Retail have standards which are excellent at coding product type and manufacturer. Additional information beyond these basic parameters is not feasible because the size of the Bar Code becomes too large.

Counterfeiting Tags are produced with a unique identity code (UIC) or serial number from the manufacturer. This is embedded digitally on the microchip and may not be changed, therefore, making them extremely resistant to counterfeiting.

Bar Codes may easily be duplicated and attached to products and are, therefore, easily counterfeited.

Dynamic Updates Tags may be written to and offer on board memory to retain information. This feature may be used to store a product calibration history, preventive maintenance, etc. Updates may be made within the blink of an eye and automatically without human intervention. Once a Bar Code is printed it remains frozen. The

Once a Bar Code is printed it remains frozen. The Code and the process of attaching the BC is not supportive of real time updates. It is a labor intensive process to update any information on a BC once printed.

Page 10 of 19

Page 11: 7107799 Proposal for Asset Tracking

Proposal for Asset Security & Management Solution for Client Name, Location

Code andTraceable The combination of UIC (unique

identification code), user data, serial number and on-board memory makes it possible to track, recall, or document the life span of a single item. For example, with livestock this means that the birthplace of the animal, its vaccine history, feed lots, slaughter house, processor, etc may all be tracked. This kind of information supports a complete pedigree for an item attached to the Tag.

BC is limited to an entire class of products and unable to drill down to a unique item. It is not feasible to recall, track or document a single item.

Scanning RFID - Offers a range from inches to hundreds of feet and does not require line of sight. This means that individual Tags placed within a carton, packed in a box and stored on a pallet may be read. You do not have to open each box and present the individual item. BC - Offers a range over inches and requires line of sight to read the code.

The Bar Code must be presented to the scanner in an orientation and distance that is very limited. Individual reading requires that each box on a pallet be opened and the item pulled for presentation to the scanner.

Simultaneous Scanning

RFID - Standards have algorithms to support simultaneous reading of Tags at one time.

Limited to one bar code at a time. Unable to support simultaneous reads.

Cost High volume Tags are currently 25 cents each with the potential to continue to drop per the experience curve. High volume bar codes are less then a penny. In this scenario the labor savings from items like physical counts, etc. give RFID greater feasibility.

This is a clear advantage for BC unless you expand cost to be fully loaded.

Reusable Yes No

Page 11 of 19

Page 12: 7107799 Proposal for Asset Tracking

Proposal for Asset Security & Management Solution for Client Name, Location

RFID System Components and Applications

RFID Tags

An RFID tag is the most important link in any RFID system. It

has the ability to store information relating to the specific

item to which they are attached, rewrite again without any

requirement for contact or line of sight. Data within a tag may

provide identification for an item, proof of ownership, original

storage location, loan status and history.

RFID Tag consists of an integrated circuit and an antenna

combined to form a transponder. RFID tags collect the energy to operate from a Radio Frequency (RF)

field emitted by a reader device; therefore they do not need a battery. When energized by a radio signal

from a fixed position reader or handheld scanner, the tag returns the stored information in order that

the item to which it is attached can be easily located.

The chip also has a "multi-read" function, which means that several tags can be read at once.

RFID tags have been specifically designed to be affixed into different like media, including books, CDs,

DVDs and tapes. In asset management as there are different types of items need to be monitor, we

would suggest different kinds of tags for different items for example a tag for PC / Laptop will be

different from the tags which are used for furniture items, and tags used for individual tracking will be

different from used for the folder/documents/paper tracking.

It is thin, flexible and thus can be laminated between paper and plastic. With special method to attach to

books, patron is totally unaware that the tag is there.

KEY BENEFITS:1. No line of sight needed 2. Allows to check-out and check-in several items simultaneously 3. Information directly attached to product 4. Performing both identification and antitheft in one single operation

Page 12 of 19

Page 13: 7107799 Proposal for Asset Tracking

Proposal for Asset Security & Management Solution for Client Name, Location

5. Different shape and sizes available 6. Able to tag almost anything 7. Accelerate scanning and identifying

Handheld RFID Reader

Handheld Reader can be used to manage the inventory and trace the lost / missing inventory item. RFID handheld reader will be able to search by reading the RFID tag pasted on the different asset.

Phase Target: Quick inventory Look up the misplace material Search for certain material

KEY BENEFITS:1. Changes inventory process: 2. No more book handling: just take the reader inside the room to perform an instant inventory. 3. Accuracy: asset identification numbers are registered in the Shelf-Management Reader. The

data is then downloaded to the central database. 4. The fastest inventory you have ever made: 20 items per second. 5. User friendly: 6. Light weight 7. Wand allows easy reading of high and low areas8. Saves time and resources: 9. Implementers indicate a 75% reduction in human resources required for inventory management

activities.

RFID Reader and Antenna

RFID Reader and antenna will be installed at different location within the office or

outside the office as per requirement. RFID Antenna along with the ERP solution

will help us to track the item available. RFID Reader and Antenna will be installed

at strategic location in such a way that the reading range of the antenna will cover

complete location. Number of RFID reader and antenna will depend on the size of

the room, etc.

1. Tracking of RFID tags in it’s reading range. 2. Reports can be generated with the help of ERP.

a. Number of items available in a particular room based on the RFID Reader installed in the room.

Page 13 of 19

Page 14: 7107799 Proposal for Asset Tracking

Proposal for Asset Security & Management Solution for Client Name, Location

b. To track any movement of item from room to another 3. Also help in tracking/finding the exact location of the individual in the office4. Check the movement of files/document from sensitive areas and raise “alarm” if required.

EAS Gates

RFID EAS Gate is the anti-theft part of the RFID Asset Management System using the same RFID tags

embedded in the office items. Each lane is able to track

items of 1 meter or more and would trigger the alarm

system when an un-borrowed item passed through them.

The alarm will sound and lights on the gate will flash as

patron staff through with the office material.

The EAS Anti-Theft Gate is used to detect RFID tag that is

equipped with EAS (Electronic Article Surveillance). It can

detect the RFID tags within 1 meter range without interference of magnetic items, upon detecting of

Armed RFID tags, the alarm will sound on the gate. It has option to trigger a Camera to record patrons

who trigger the alarm to the Surveillance Station.

Theft detection is an integral feature of the chip within the tag. It is a stand-alone technology, which

operates independently of the library database.

FEATURES:1. Detect EAS Armed RFID tags 2. Multi-item detection 3. Able to integrate camera with the gate (Option) 4. Gale to integrate with Surveillance Station (Option)

KEY BENEFITS:1. Single technology is required for both inventory and theft management of the office. 2. Office staff is alerted immediately when un-borrowed items passes through the theft detection

gates. 3. Would-be thieves are deterred by the physical presence of the gates. 4. Number of patrons passing through the gantry is captured by a counter on the gates Alarm

volume can be easily controlled.

Page 14 of 19

Page 15: 7107799 Proposal for Asset Tracking

Proposal for Asset Security & Management Solution for Client Name, Location

How the RFID Security System will work for Client Name, Location

After tags have be programmed with unique ID number and related information is updated in the ERP

system, tags will be pasted or tied, accordingly to the type of asset.

Fig: Tagging of Items

RFID Reader with Antenna will be installed at strategic location in the office, once the same is done

whole RFID operation will be activated for testing.

Page 15 of 19

Page 16: 7107799 Proposal for Asset Tracking

Proposal for Asset Security & Management Solution for Client Name, Location

Fig: Integration of RFID and ERP

Once the system is operated RFID tags according to their type will omit signals if active tags are used,

RFID Antenna / Reader will omit signal to catch the signal from passive tags.

Figure: Communication between RFID Tags and Reader

Security of Asset will be handling by the EAS Gates installed at the strategic doors in the campus. With

the help of the ERP solution asset/items can be defined as “Free to move item” “Restricted items” so

that when ever any unauthorized person is taking out any “Restricted item” the gates will raise the

alarm and video will record all the movement. Whereas in “Free to move items” items it will not give

Page 16 of 19

Page 17: 7107799 Proposal for Asset Tracking

Proposal for Asset Security & Management Solution for Client Name, Location

any “alarm” and record the details of the person and send the same to the ERP solution (integration

required).

Fig: Security Gate Function

The Security will raise “Alarm” if anybody is taking any asset which is not authorized to be taken out of

the location or by the person. The camera installed will record the person either authorized or

unauthorized according to the configuration / integration with ERP. There will be continuous flow of

RFID signal on the gate.

Page 17 of 19

Page 18: 7107799 Proposal for Asset Tracking

Proposal for Asset Security & Management Solution for Client Name, Location

Fig: Online Asset Tacking System

Reader and Antenna will continuously send the reading of the tags to the ERP solution, so that concern

person and note / track/generate report on the movement / availability /location of the item with in the

campus. The same can be used to track any item, user have to enter the unique id of the RFID tag pasted

on the item and send command to the Central EPR solution, ERP solution will revert back with the

information on the location/ availability of the item (integration required)

Integration

Integration with ERP solution will be done according to the requirement of the client, different reports,

and security aspects.

Deliverables*

RFID Tags

RFID Member Card

Handheld Reader

EAS Gate

Page 18 of 19

Page 19: 7107799 Proposal for Asset Tracking

Proposal for Asset Security & Management Solution for Client Name, Location

Reader and Antenna

Integration

* The Quantity and integration will depend on the requirement of the client. On the basis of requirement the

commercial will generate.

Page 19 of 19