RFID NEWS

RFID technology confidential asset entry and exit management

The RFID Asset MANAGEMENT system is based on RFID technology to control the information process of data collection of assets. Because there are many types of assets, various types of RFID electronic tags need to be used to control different assets. By writing the Stored asset data in the RFID electronic tags, the entire life cycle of assets can be realized, including warehousing, maintenance, inventory, and allocation. Management, real-time monitoring and management of important assets, and RFID technology to manage the entry and exit of confidential assets.


Real-time positioning and monitoring of valuables/confidential assets, alarms when leaving the supervision area; automatic reading when passing through Access Control points, automatic alarms for unauthorized entry and exit; automatic online inventory or quick inventory and search through handheld devices; RFID positioning management system uses active sound and light /Semi-active electronic tags realize positioning, search, inventory and entry and exit management.


Deployment of RFID confidential valuable asset management equipment

Valuable asset positioning: To achieve precise positioning of assets/pallets, low-frequency scalers and fixed readers need to be deployed, with coverage as shown in the figure below. The coverage area of the low-frequency scaler is a circular area with a radius of 3-5m, and the reader covers a fan-shaped area with a radius of 80m.


Asset inventory: Asset inventory uses RFID tablets. Users can achieve 100% reading of asset electronic tags by holding the RFID tablet. Users can also use the tablet to find specific assets. Users can also use a fixed reader in the background to achieve one-key point clicks.

Asset entry and exit: By deploying access-controlled calibration readers inside and outside the entrance, 100% reading of asset tags can be achieved. Alerts for abnormal asset entry and exit. (If you need to locate the room entry and exit, see the appendix)


Application process: Asset locating/searching. The user selects specific asset information on the asset management background or RFID tablet and clicks to search. The corresponding asset tag location is displayed on the tablet or system background. Asset electronic tags sound and light alarms.

Asset inventory: Users can achieve real-time inventory of all electronic tag data with one click in the asset background.


Physical inventory: Users can carry out physical inventory with an RFID handheld device. The user downloads the data to be inventoried through the handheld device. Asset tags within the range are read, and the tablet displays the corresponding asset information. The user can compare the asset information with the physical object.

Asset entry and exit: When assets pass through the access-controlled fixed reader, the access-controlled reader can be 100% read. The system records the incoming and outgoing information of assets in the background. When assets enter and exit abnormally, the access control point will sound and light alarms, electronic tags will sound and light alarms, and abnormal entry and exit records will be recorded in the background.


The RFID fixed asset management system can operate assets such as receiving, returning, allocating, repairing, borrowing, and returning, and control RFID information in various links, reducing the loss of fixed assets. The use of each asset can be traced. The access channel through the RFID fixed asset management system is equipped with an RFID Reader and writer, which can automatically read the asset's RFID electronic tags in and out, and alarm for abnormal asset entry and exit. Abnormal entry and exit records are recorded in the background to ensure the safety of valuable assets.


CATEGORIES

CONTACT US

Contact: Adam

Phone: +86 18205991243

E-mail: sale1@rfid-life.com

Add: No.987,Innovation Park,Huli District,Xiamen,China

Scan the qr codeclose
the qr code