RFID expands its security credentials

May 2015 Asset Management, News & Events, Integrated Solutions, Security Services & Risk Management, Editor's Choice

Swift is a South African company that has developed a host of innovative solutions integrating RFID, specifically Active RFID and sensor technologies. The company has a long history in the RFID market with many success stories behind it.

Traditional RFID systems are passive, meaning they are powered when held up to a reader; Active RFID has a battery built in, which means they are self powered and can function at longer distances, creating new opportunities for the technology.

Hi-Tech Security Solutions spoke with Swift’s Hennie Vorster to learn what the company was doing and to gain a better understanding of how Active RFID has and will make a difference in the world of security.

History

The story begins long before Swift was formed into a company. In 2006, Vorster and the company he was then with were tasked with using RFID to improve operations at a mine. The task was to reduce injuries to staff in the mines as well as the downtime caused by accidents, which left miners injured, sometimes fatally injured. Every mine is responsible for its miners’ safety and when a fatal incident occurs, the mine is required to shut down the area until an investigation is completed.

The mining industry is heavily regulated and there is no way around the process of shutting down a shaft while an investigation is conducted into a fatal injury. After surveying the underground environment, however, Vorster was able to devise a plan using active RFID technology that would ensure that miners were safer.

The mine in question saw many injuries due to the conditions in which the miners worked, as well as mistakes and carelessness by the miners themselves. The solution devised was to put RFID readers at critical points underground and connect them to a central controlling computer. The miners were equipped with tags which could be read at a distance, and which would inform the central computer if and when the miners were in a dangerous area.

The RFID units were installed in blast proof housings which meant there was no need to remove it from the face when blasting occurred. The system could also be used to conduct shaft clearance to ensure that miners were in a safe area prior to blasting.

The result of this project saw zero injuries or fatalities during the implemented period. The system was recommended for mine-wide implementation by the project team.

Locomotive damage

In 2008, another mine approached Vorster and his team with yet another problem that was causing fatalities, serious injury, damage to equipment and downtime. This particular mine had a long rail system underground and locomotives were used to ferry rocks from blasting sites to the dumping areas. The problems they faced included the fact that there was one rail track that was used to support two-way traffic. Furthermore, there were work areas along the tracks and enormous ventilation doors that had to be opened and closed as the locomotives went through.

While there were areas where one rail convoy could pull off the main tracks to let a locomotive coming from the opposite direction through, as with all the issues faced, there was no early warning that one was approaching. Bends on the tracks were also blind, creating yet another danger area.

The solution Vorster and his team came up with was to place RFID beacons at all the danger areas – for example, at the ventilation doors, the work areas etc. They also installed a controller in each locomotive. Each of these beacons was given a unique identifier to identify what kind of danger area it was. The range was set to 100 m which meant that the locomotive drivers would be warned well in time when approaching a door or a bend, as well as when another locomotive was approaching in the opposite direction. This made it possible to avoid collisions and unnecessary wastes of time and possible personnel injuries. In the case of a work area or a rock fall on or near the tracks – which people would immediately start clearing – the miners used a portable unit that would alert drivers of the human obstruction in advance, giving them enough time to stop.

Here again, the mine had no incidents after the system was installed. Moreover, the company could stop replacing ventilation doors as the drivers had time to stop before they reached them. On average the mine was replacing 30 ventilation doors a month due to accidents. This alone was a cost saving to the mine. The system was run on the underground power system which provided lighting to the miners, but the beacons had built in batteries to ensure work continued even if there was a power failure.

Labour consent

Vorster says an important part of the process was talking to the miners and their union (NUM) to obtain approval and acceptance to install the system. He says it is important to let them know that the RFID tags workers carry are not there for punitive purposes – to check who’s where, when – but for the safety of the miners.

Knowing there are miners in a danger area, or working on the tracks is critical to protecting them. Simply by carrying an RFID tag/portable warning unit, miners can be sure they are safe while working. As the system could also be used for shaft clearance shift supervisors will know if everyone who went down the shaft came back up at the end of their shift. The system had such potential for enhancing miners’ safety that it was approved by NUM.

Swift innovations today

Fast forward to today and we find Vorster and Swift expanding the use of RFID into new areas. From markets such as manufacturing to logistics and even handgun safety. By combining RFID systems with GPS, GPRS, satellite and sensor technology, Swift allows companies in these markets to improve their quality, security and business intelligence.

Swift collects data from its various products via the cloud, from where it is stored in a database to provide real information to businesses to help them optimise their operations and prevent crime.

As an example, Vorster describes a solution to transporting goods via road – although with GPS technology, this applies to global logistics as well. Swift has developed a unique system that prevents anyone opening the cargo doors locally.

Via RFID, the system can track what goods are loaded and unloaded – if the company wants to go this far. Using GPS, the control room can keep track of the vehicle’s location at all times, even setting the route for the driver to follow (Geofenced). If the truck deviates from the route, or moves outside of the area he should be in, the control room knows instantly and can contact the driver or dispatch an armed response team and the police.

Other sensor technology can be installed to measure the way the vehicle is driven, recording speeds (via GPS technology) and so forth to ensure the company has a complete record of each journey.

A unique locking security system with full GPS and cloud connectivity is also available for installation to improve cargo security from point of dispatch to destination.

Due to its security application more information can only be made available on request.

Who fired the shot

Another interesting development from Swift is in the firearms industry. The company has developed a G-Force sensor that can be embedded in the handle of a Glock. This sensor records every time the weapon is fired. If the user is wearing a reader – on their belt, for example – it uploads the event to a central database and also records the event date and time on the central database. If the reader is not present, the weapon will store the information until it comes within range of a reader and then upload its historical data. Vorster says this will allow gun owners to exercise stricter control over their weapons.

Vorster says the integration of the above technologies provides a wide range of opportunities for Swift and its customers to control and collect information from areas that have traditionally been blind spots. From tracking the location and temperature in a container as it is shipped overseas, to using sensors to detect motion, G-Force and more, the application of these on board/embedded technologies are almost endless.

The term The Internet of Things is popular in the media nowadays, and the solutions Swift brings to market are the beginning of our ability to track, monitor and control almost any technology, anywhere in the world. In future issues of Hi-Tech Security Solutions we will be delving into Swift’s bag of innovations to bring you more technical solutions for real problems in a variety of industries.

For more information contact Hennie Vorster, Swift Wireless Intelligent Frequency Technology, +27 (0)79 164 9376, hennie@swiftrfid.com, www.swiftrfid.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Understanding the Shared Responsibility Model
Infrastructure Security Services & Risk Management
While the cloud can certainly be a growth enabler in many ways, it can also introduce new security risks. Companies want to have a clear understanding of where their security duties end and where their cloud service provider’s begin.

Read more...
Data privacy best practices for physical security teams
Genetec Surveillance Integrated Solutions IoT & Automation
Physical security systems produce large amounts of information from video footage, access control records, and licence plate data. Recommendations assist organisations in safeguarding sensitive data, while ensuring effective security operations.

Read more...
Gallagher Security strengthens KwaZulu-Natal presence
Gallagher News & Events Integrated Solutions
Gallagher Security has reinforced its commitment to the KwaZulu-Natal region with its Command the Future event. The full-day event welcomed over 100 channel partners, end users, and consultants, marking Gallagher’s third major event in Durban.

Read more...
Driving down fleet management costs
Asset Management Transport (Industry) Logistics (Industry)
As we move into the latter part of the first quarter of 2026, businesses operating fleets can expect expenses to increase from the procurement stage through to termination, due to various local and international factors.

Read more...
Surveillance & AI roundtable
DeepAlert Lytehouse Refraime SMART Security Solutions Technews Publishing Editor's Choice Surveillance Integrated Solutions AI & Data Analytics
SMART Security Solutions held an online roundtable with a few surveillance experts to explore the intersection of surveillance and AI, gaining insights into the market and how control rooms are evolving.

Read more...
“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.