Danish Industries Safeguards Its Offices Via RFID Integrated With Cameras, Glass-Breakage Detectors
Schneider Electric provided its I/Net software, along with Idesco's high-frequency readers to manage access to interior and exterior doorways, cameras and other security components.
Feb 26, 2013—When Danish Industries, a trade organization and employers' association, expanded its headquarter in Copenhagen, it needed a new access-control system, as well as intrusion alarms and security video cameras. Rather than utilizing independent systems to control who enters the building, manage the video streaming of cameras and issue alerts to security guards if an intruder enters, the company opted to deploy an integrated solution comprising RFID readers installed at doorways, as well as a single software system that also manages camera-based data and alarms. The solution was provided by Schneider Electric, using Idesco high-frequency (HF) RFID interrogators designed for access-control applications.
While expanding its headquarters by adding several stories to its existing facility, Danish Industries stripped the old system out of the structure to update its functionality. The company required an access-control solution to manage 245 external and internal doors and 55 security cameras, as well as an alerting system for use in the event of an intrusion.
Pelco division, throughout the building, at egresses and in hallways, in order to provide video footage of what occurred within those public areas. The company also provided Idesco's Access 8 CD 2.0 Slim Pin readers, installed at both exterior and interior doorways requiring secure access, as well as 13.56 MHz HF RFID cards carried by all parties authorized to access the building.
When an individual is assigned a 13.56 MHz card made with an NXP Semiconductors Mifare DESFire chip and complying with the ISO 14443-A standard, that card's unique ID number is linked to the person's name, title and access authorization in the I/Net software, according to Anders Aagaard, Schneider's building business system leader.
Upon arrival at the office, an individual presents his card to the Idesco reader, which captures the card's unique ID number, forwards that information via a wired connection to the software—which then determines whether that person is authorized to access the building—and triggers the release of the door's locking mechanism. If the doorway to that individual's office or department also requires access authorization, he then follows the process once more.
The I/Net software stores each transaction with a time and date stamp, and also stores video images from each location, such as an entryway or hallway. Therefore, if someone were, for instance, to report that his card was stolen and used by the thief to access the building, management could simply log onto the software, look up that individual's card history, and find the time and location of that accessing event. The company could then request video imagery for that specific date and time, and thus confirm the identity of the person using the card.
Login and post your comment!
Not a member?
Signup for an account now to access all of the features of RFIDJournal.com!
SEND IT YOUR WAY
RFID JOURNAL EVENTS
ASK THE EXPERTS
Simply enter a question for our experts.