top of page

For the accurate work of the security service, it is very important to control the timeliness and the completeness of patrolling by the guard of his route. As a rule, they have a clear plan and schedule for going around the premises. Today's popular systems of GPS control or control by base stations of cellular communications cannot solve the problem. Since indoors, especially in the depths of a large building on the lower floors, GPS signal reception is not possible and all these methods do not work. Therefore, the route bypass control systems called Hot Point were specially developed.

The essence of this method is to read certain marks attached to control points.

In accordance with the plan of the facility, certain marks are set at control points. The numeric code of the tag is entered into the program on the dispatching computer. On the dispatch computer, a schedule is formed for bypassing control points along different routes by different guards. Then, in the process of patrolling, the guard passing along the protected perimeter at a certain point at a certain time applies the scanner to the tag and reads its code. The scanner remembers this event. At the end of the shift, it is enough for the security guard to hand over his scanner for processing to the dispatcher, where, using a special program, the data from the scanner will be read and compared with the bypass schedule stored in memory.

For the convenience of work, scanners are made with the possibility of using cellular communications to transmit events via the Internet directly to the dispatching computer. Thus, it becomes possible to control the work of the guards in real time. 

Company INFORMBURO

Atyrau Azattyk Avenue  96b office 502

E-mail: informbyuro@yandex.ru

tel. (7122)451533, 451532, 451537

To solve a different range of tasks, different types of labels are used. For most tasks, it is enough to have passive tags that mark a product or equipment. The passive tag consists of an antenna and a small chip that allows the scanner to read a unique number hardwired into the chip's memory. Very often, some brief additional information can be added to such a passive label, and then such a label turns, as it were, into a product passport. The data can be read from such a reading at a short distance from 5 cm to 50 cm. When using industrial scanners, the reading radius increases to 1-2 meters. That allows you to control the passage of goods through the gate or the passage of vehicles through the barrier. In everyday life, we often encounter passive tags in the form of an intercom key.

An active label is usually placed on expensive equipment and allows you to periodically update information in memory using a scanner. - add some data. In this case, as a rule, the possibility of deleting or erasing previously entered data is excluded. Similar types of tags are used for marking units in aviation or in hazardous critical industries, where great attention is paid to quality control and service intervals. checks and other important information. It turns out that the unit maintenance form is stored on the unit itself. At the same time, it remains possible with the help of a scanner to transfer the same information to a central database. This double counting guarantees reliability and personal maintenance records. The active tag in its design is very similar to a plastic bank card or a discount card for a store that can work at some distance from the scanner

NFC technology is part of RFID technology, NFC is not just active tags, it is actually a miniature smart card that can contain a lot of different information and, of course, work in write and read mode.

But for such advanced functionality, you have to pay with a very small radius of action. In fact, touching the label on the scanner is required. Externally  NFC tags look like RFID key fobs less often as stickers. The scope of NFC technology is closer to people since many smartphones support NFC technology and therefore the user does not need to buy a separate specialized scanner. With the help of NFC tags, they usually "tag" their pets or baggage at the airport in case of loss.

An NFC tag can be an invaluable help when caring for house plants, as it can remember the watering date and provide the necessary information for caring for a plant or your pet in a cage.

The main advantage of RFID technologies is a contactless way to read information from certain tags. Therefore,   for   control requires tags, usually with a unique code and a scanner, to read information at a distance of 5 cm to 1 meter.

Some tags can work not only for reading but also for writing information. Here are examples of use:

1. Control of the passage of the perimeter by the guards. The guard has a scanner. Moving according to the schedule,  from the point to the point, he applies it to the mark and makes marks. At the end of the day, by connecting the scanner to a computer, you can get a detailed report on the passage of the perimeter.

2. Equipment maintenance control.  An operator with a scanner approaches the equipment and performs work. At the end of work , the operator enters the job code on the scanner and  applies the scanner to the label. If the tag is capable of storing information, it will remember who did what and when. The same information will remain in the scanner. If the scanner has a communication module,_cc781905-5cde-3194 -bb3b-136bad5cf58d_then it will automatically send information  about the work done to the server, etc.

3. Control in the hospital . A nurse with a scanner makes rounds of patients and performs various procedures. A label is fixed on the beds of patients. Touching her scanner, the nurse remembers in her scanner whom and when she served. Then the information from the scanner goes to the server. At at the end of the day, the nurse submits the scanner for processing, or the linked scanner automatically transfers each connection to the tag.

4. Control in the hotel. The maid cleans the rooms and bathrooms of the hotel. Each time, with the help of a scanner, she touches the tags installed inside the hotel room. At the end of the shift, she hands over the scanner for processing. The program will see results of its work.

5. Control of livestock in grazing.  Currently, almost all cattle are marked with special tags. Tags that are attached to the ear like earrings. As a rule, these are not just tags, but tags containing a chip with an RFID tag. Ear tags with a price of 100 tenge must contain an RFID chip. Also, this WM-5000 scanner can register subcutaneous marks that are more often used for horses and domestic animals. Therefore, it is possible to organize animal control before sending to the pasture and at the end after arriving in the village. It is enough for the shepherd to apply the scanner to the tag of the animal and thereby fix the moment of control. Then, after processing, these data will clearly show which animal passed the control and when. This is convenient for reporting and objectivity of livestock control in the herd. 

All these methods are more convenient to perform with the help of "named" "personal" scanners. If this is not possible, the use of nominal RFID tokens is provided. In this case, first you need to touch the scanner to your "name" token, and then to the mark on the object. 

Possible even this option:- 

Using defined tokens that will specify the action type. For example, for guards, the token is "everything is OK" or the token is "violation".

bottom of page