Electronic asset tagging: objects that speak for themselves

November 2003 Asset Management

South Africa is a country with exceptionally high crime rates, and petty crime in office buildings is no exception. Last year, as much as 63% of total reported security breaches were due to theft of IT equipment1. For security managers, this is an ongoing source of frustration. Larger objects (such as desktop PCs, for example) are fairly easy to spot, and subsequently difficult to steal. But what about smaller items? You cannot search everyone leaving the building, on the off chance that they might be pilfering company assets.

Would it not be nice if your assets were able to speak for themselves? Sounding a warning, for example, if moved to an inappropriate location, or surreptitiously removed from the building. Imagine if you could record every physical movement of every company asset, without a second's additional labour or paperwork. Asset tagging technology makes all this possible.

It is all on the label

Electronic asset tagging allows items of value to be fitted with a tag that indicates when normally static items (works of art, computer network servers, etc) are being moved or when portable items (laptop computers, etc) are being removed from a particular area or building. These systems are based on radio signal (RFID) transmissions. The tag will either transmit an alarm signal when it detects movement of a fixed asset, or if the tag on a portable asset is detected at the perimeter/exit of an area.

How does it work?

Asset tagging is based on a technology known as RFID (radio frequency identification). RFID is an information acquisition technology (much like bar codes, magnetic stripes or voice data entry), in that it provides an automatic way to collect information quickly, easily, and without human error. It is, however, rather more powerful, as it does not require contact or line of sight - and could, therefore, be used to identify an object inside a box or suitcase. RFID is also not sensitive to harsh dirty environments. It consists of a sensing device, which transmits a radio frequency signal to a specially designed tag, which then responds with another signal.

The process in detail

* A tag is attached to an object (such as a person, vehicle, laptop or asset), and encoded with identification information about the object in question.

* As the tagged object approaches an antenna, the antenna broadcasts a radio frequency signal toward it.

* The tag modifies the signal by adding its identification code, and reflects it back to the antenna.

* The antenna transmits the returning signal to the RF module, where it is preconditioned before being sent to the reader.

* The reader interprets the ID code from the signal and performs validation based on user-defined criteria. It can also append useful information (such as time and date) to the code.

* ID codes are then transmitted to a host computer or other data-logging device.

Potential applications

Asset tagging technology and RFID promises to deliver a host of exciting applications for the corporate market. Aside from attachment (as tags) to assets and objects, they can also be embedded into credit card size security badges, for contactless user identification. This type of monitoring would provide an additional level of security in high risk areas in case of any emergency evacuation.

Other applications include warehouse and storage, parcel and container tracking, stock control/inventory, airline baggage or passenger tagging and supply chain management.

The holistic approach

Asset tagging is simply another component of the holistic solutions available to companies who are serious about their security. Applied appropriately, asset tagging solutions (and accompanying reporting) become exponentially more powerful when integrated into a full system incorporating, for example, video surveillance, alarm management, access control and full reporting services.

Reference

1. Source: KPMG 2002 Global Information Security Survey.

For more information contact Jose Machado, Siemens Southern Africa, 011 652 2149, www.siemens.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

250 000 connected vehicles in Africa
Asset Management Transport (Industry) Logistics (Industry) IoT & Automation
Wialon, the global fleet digitalisation platform created by software developer Gurtam, announced it has reached a record number of 250 000 fleet vehicles and assets connected in Africa.

Read more...
Managing stock efficiently and cost-effectively
Asset Management Infrastructure Logistics (Industry)
Rina Redelinghuys, customer services executive at Cquential, a member of the Argility Technology Group, examines stock management across various industries, including retail, fast-moving consumer goods, food and dairy, automotive, apparel, industrial, accessories, paint and chemicals, and pharmaceuticals.

Read more...
AI making South African roads safer
Asset Management Transport (Industry) AI & Data Analytics
Driver fatigue is a significant contributor to road accidents globally. While reliable statistics for South Africa are hard to come by, it has been estimated that fatigue is a factor in 25% - 30% of fatal crashes.

Read more...
Simplified fire and facilities management from one screen
Fire & Instrument Services Facilities & Building Management Fire & Safety Asset Management
Fire & Instrument Services (F&IS) and Scansoft are simplifying the complexities of facilities management, including fire safety, with iBMS Adrenaline, an integrated building and facilities management system enabling companies to monitor, control, and manage system hardware through a single interface.

Read more...
Three-quarters of cars sold in 2023 had embedded telematics
IoT & Automation Asset Management
A new research report from the IoT analyst firm, Berg Insight, shows the number of telematics service subscribers using embedded systems will grow at a compound annual growth rate (CAGR) of 14,6% 2023 to 2028.

Read more...
Vivotek unveils new AI RealSight Engine
AI & Data Analytics Asset Management
Vivotek has announced an upgrade to its AI security solution that transforms images captured by network cameras into clear, visible facial images under any lighting conditions. Even in backlit environments, facial expressions are rendered clearly.

Read more...
Natural catastrophes and fire risks top concerns
Security Services & Risk Management Asset Management Residential Estate (Industry)
Natural disasters are the highest risk in the real estate industry, followed by fire and explosions, and then business interruption. Estates must prioritise risk management and take proactive measures to safeguard their assets, employees, and reputation.

Read more...
Building a solid foundation
Alwinco Security Services & Risk Management Asset Management Residential Estate (Industry)
Understanding the roles of a Risk Assessor and a Risk Manager is like building a solid and secure foundation in the security world. Andre Mundell makes it easy to understand.

Read more...
Simplify AARTO compliance for fleets
Guardian Eye IoT & Automation Asset Management Transport (Industry) Logistics (Industry)
While there are challenges around the management and implementation of the AARTO Amendment Act, there are also benefits that need to be understood today to ensure compliance and value tomorrow.

Read more...
Logistics operators stand up to safety challenges
Logistics (Industry) Asset Management Transport (Industry)
The second annual Webfleet Road Safety Report for 2023 outlines common safety factors, challenges and solutions that South African transport operators face; deteriorating roads, poor vehicle maintenance, congestion and driver fatigue are common challenges.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.