User Manual
Total Building Solution (TBS)
68
Building Technologies 049_Archives_and_Libraries_A6
V10271399_a_en.doc
Fire Safety & Security Products 03.2009
5.5 RFID People and Asset Tracing
The RFID People and Asset Tracing is a real-time location system that protects
valuable assets in archives and libraries by the use of active RFID wireless tags.
Scenarios based on location and motion of the monitored assets allow for flexible
security needs.
5.5.1 Risks
– Valuable goods in archives and libraries gets stolen
– Valuable goods gets lost or can’t be found within the premises
– Assets within archives and libraries needs to be located quickly
– Equipment (e.g. laptop) and further assets within the premises get stolen
– Valuable goods should only be handled and transferred by the authorized per-
son
– Personnel left in the building in case of evacuation.
5.5.2 Solution description
To offset these risks, the customer can use small active RFID wireless emitters
(called “tags”) either attached to an object (valuable good) or worn by a person.
The active RFID tags can be located by ceiling-mounted readers, which transmit
the position to the server. Scenarios based on location, motion or the activation of
the button on the tag allow for flexible security needs. Tags are protected against
tampering, battery powered, feature infrared and RFID transmission as well as a
motion detector.
5.5.3 Applications
– Prevent theft of valuable goods stored in archives and libraries – pre-alert at de-
partment exit, full alert to guards + video activation at building/archive doors.
– Find valuable goods, files and equipment quickly – e.g. for consultation of a file,
for planned maintenance, etc. Staff spends typically up to 1 hour searching a
“lost” piece of equipment or good.
– When an asset from the archive or the library is currently used / consulted by an
authorized person find the location and identify the person that checked it out
– Protect further assets and equipments within the premises by applying asset
tags (e.g. laptops of the staff, etc.)
– Optimize processes – using data mining, determine excessive waiting times,
bottlenecks, layout optimizations.
– Optimize investment – using effective usage data, reduce equipment park, opti-
mize leasing/renting contracts, introduce internal billing of equipment based on
effective usage time.
– Object protection – at fairs, in museums, to protect expensive artworks, proto-
types, etc.
– Long-distance access control – with a range of 15m indoors and 150m outdoors,
tags can open doors / gates.
– 24/7 personnel safety monitoring & supervision
– People count (possibly only when all personnel wears an asset or identity badge
tag) – e.g. for evacuation scenarios.