Professional Documents
Culture Documents
Proposal For Asset Tracking
Proposal For Asset Tracking
Technical Proposal
For
Asset Management & Security
Solution
For
Contact Person:
Phone
Company Name
Location
Page 1 of 19
Proposal for Asset Security & Management Solution for Client Name, Location
HCL PROFILE
HCL Infosystems Limited is one of the pioneers in the Indian IT market, with
its origins in 1976. For over quarter of a century, HCL has developed and
implemented solutions for multiple market segments, across a range of
technologies in India. HCL has been in the forefront in introducing new
technologies and solutions, now HCL is amongst the top 20 business houses
in India with 14000+ employees spread across 38 countries and revenue of
around 14 billion US dollars.
HCL Infosystems Ltd. is the Internet Infrastructure initiative of the HCL group,
India’s premier information technology group. Through the pioneering
presence of the HCL group companies the vast experience of the markets,
HCL Infosystems has propelled itself to the path of “Total Technology
Integration”.
All these services are delivered with a turnkey approach that includes
delivering Infosystems’s core services, third party hardware and network
provisioning, maintenance activities and project management.
Page 3 of 19
Proposal for Asset Security & Management Solution for Client Name, Location
We have the highest regard for our esteem customers, and to meet this, we
have geared up ourselves with following services across the country:
• We organize customer’s meets all over the country to have the first
hand interaction, which enable us to interact with our customers and
review their feedback one to one. We also strive to improve our
services standards for more customer satisfaction.
* Survey done by
With trained engineers around 360 locations around India, we are able to
provide better customer support and reach well above the industrial
Page 4 of 19
Proposal for Asset Security & Management Solution for Client Name, Location
HCL has been ranked No.5 among India’s Top 5 groups impacting the
dynamics of the IT Industry - DataQuest
Page 5 of 19
Proposal for Asset Security & Management Solution for Client Name, Location
Page 6 of 19
Proposal for Asset Security & Management Solution for Client Name, Location
Overview
• Readers –
A handheld
or EAS
Gates
programmed to capture radio waves signals omitted by the RFID Tags. The
devices are responsible for the security and circulation of resources as
programmed in the server, it will alarm if the resource is taken out without
proper process.
• Database: all the information related to RFID tags and corresponding
information about the resource/books/member is stored in the database
which is stored in a centralized location a PC or a Server. The software
installed in the server verifies the tag reading captured by the Reader
(Transceiver).
Page 8 of 19
Proposal for Asset Security & Management Solution for Client Name, Location
Page 9 of 19
Proposal for Asset Security & Management Solution for Client Name, Location
Page 10 of 19
Proposal for Asset Security & Management Solution for Client Name, Location
Page 11 of 19
Proposal for Asset Security & Management Solution for Client Name, Location
RFID Tags
An RFID tag is the most important link in any RFID
system. It has the ability to store information
relating to the specific item to which they are
attached, rewrite again without any requirement
for contact or line of sight. Data within a tag may
provide identification for an item, proof of
ownership, original storage location, loan status
and history.
The chip also has a "multi-read" function, which means that several tags can
be read at once.
Page 12 of 19
Proposal for Asset Security & Management Solution for Client Name, Location
RFID tags have been specifically designed to be affixed into different like media,
including books, CDs, DVDs and tapes. In asset management as there are different
types of items need to be monitor, we would suggest different kinds of tags for
different items for example a tag for PC / Laptop will be different from the tags
which are used for furniture items, and tags used for individual tracking will be
different from used for the folder/documents/paper tracking.
It is thin, flexible and thus can be laminated between paper and plastic. With special
method to attach to books, patron is totally unaware that the tag is there.
KEY BENEFITS:
1. No line of sight needed
2. Allows to check-out and check-in several items simultaneously
3. Information directly attached to product
4. Performing both identification and antitheft in one single operation
5. Different shape and sizes available
6. Able to tag almost anything
7. Accelerate scanning and identifying
Phase Target:
Quick inventory
Look up the misplace material
Search for certain material
KEY BENEFITS:
1. Changes inventory process:
2. No more book handling: just take the reader inside the room to perform an
instant inventory.
3. Accuracy: asset identification numbers are registered in the Shelf-
Management Reader. The data is then downloaded to the central database.
4. The fastest inventory you have ever made: 20 items per second.
5. User friendly:
6. Light weight
7. Wand allows easy reading of high and low areas
8. Saves time and resources:
Page 13 of 19
Proposal for Asset Security & Management Solution for Client Name, Location
EAS Gates
RFID EAS Gate is the anti-theft part of the RFID Asset Management System using
the same RFID tags embedded in the office
items. Each lane is able to track items of 1
meter or more and would trigger the alarm
system when an un-borrowed item passed
through them. The alarm will sound and lights
on the gate will flash as patron staff through
with the office material.
Page 14 of 19
Proposal for Asset Security & Management Solution for Client Name, Location
Armed RFID tags, the alarm will sound on the gate. It has option to trigger a Camera
to record patrons who trigger the alarm to the Surveillance Station.
Theft detection is an integral feature of the chip within the tag. It is a stand-alone
technology, which operates independently of the library database.
FEATURES:
1. Detect EAS Armed RFID tags
2. Multi-item detection
3. Able to integrate camera with the gate (Option)
4. Gale to integrate with Surveillance Station (Option)
KEY BENEFITS:
1. Single technology is required for both inventory and theft management of the
office.
2. Office staff is alerted immediately when un-borrowed items passes through
the theft detection gates.
3. Would-be thieves are deterred by the physical presence of the gates.
4. Number of patrons passing through the gantry is captured by a counter on
the gates Alarm volume can be easily controlled.
How the RFID Security System will work for Client Name, Location
After tags have be programmed with unique ID number and related information is
updated in the ERP system, tags will be pasted or tied, accordingly to the type of
asset.
Page 15 of 19
Proposal for Asset Security & Management Solution for Client Name, Location
RFID Reader with Antenna will be installed at strategic location in the office, once
the same is done whole RFID operation will be activated for testing.
Page 16 of 19
Proposal for Asset Security & Management Solution for Client Name, Location
Security of Asset will be handling by the EAS Gates installed at the strategic doors
in the campus. With the help of the ERP solution asset/items can be defined as “Free
to move item” “Restricted items” so that when ever any unauthorized person is
taking out any “Restricted item” the gates will raise the alarm and video will record
all the movement. Whereas in “Free to move items” items it will not give any
“alarm” and record the details of the person and send the same to the ERP solution
(integration required).
Page 17 of 19
Proposal for Asset Security & Management Solution for Client Name, Location
The Security will raise “Alarm” if anybody is taking any asset which is not authorized
to be taken out of the location or by the person. The camera installed will record the
person either authorized or unauthorized according to the configuration /
integration with ERP. There will be continuous flow of RFID signal on the gate.
Reader and Antenna will continuously send the reading of the tags to the ERP
solution, so that concern person and note / track/generate report on the movement
/ availability /location of the item with in the campus. The same can be used to
track any item, user have to enter the unique id of the RFID tag pasted on the item
and send command to the Central EPR solution, ERP solution will revert back with
the information on the location/ availability of the item (integration required)
Integration
Integration with ERP solution will be done according to the requirement of the client,
different reports, and security aspects.
Page 18 of 19
Proposal for Asset Security & Management Solution for Client Name, Location
Deliverables*
RFID Tags
RFID Member Card
Handheld Reader
EAS Gate
Reader and Antenna
Integration
* The Quantity and integration will depend on the requirement of the client. On
the basis of requirement the commercial will generate.
Page 19 of 19