Home Internet of Things Aerospace Apparel Energy Defense Health Care Logistics Manufacturing Retail

Bergische Security Co. Gains Visibility Via NFC

The firm uses NFC-enabled mobile phones and RFID tags to monitor security guards at its client sites.
By Claire Swedberg
With the solution in place, Bergische Security applies Enaikoon's NFC RFID tags, made with NXP Semiconductors' Mifare 1K classic chips, at key locations within its clients' facilities. The tags are small, says Marie Dennis, Enaikoon's international account manager, and are placed in such a way that they will have little visual impact for those using the building. Bergische Security supplies its officers with Samsung Galaxy Mini 2 NFC-enabled mobile phones. For each phone, a user must download Enaikoon's InViu NFC-tracker app from Google Play Web site. After the phone reads a tag, the NFC-tracker app uploads the tag ID number to Enaikoon's server, where the InViu software interprets the data and creates a record of each read for management, either for its own use or to share with clients.

The tracking begins when an officer enters one of Bergische Security's service vehicles, in order to drive to the assigned client's site. As the vehicle starts to move, GPS data from that vehicle is received by the Enaikoon software, indicating when the vehicle has departed. Upon arriving at the work site, the officer begins completing the necessary rounds, walking through the facility at pre-arranged intervals. The guard inputs a personal PIN into the mobile phone to link his or her ID with that phone, and taps the phone against each NFC tag passed. Each tag is encoded with a unique ID number that the InViu server's software links to data regarding that tag's location. After reading the ID number, the phone then forwards that ID, along with the user's PIN, to the InViu server, where the phone and tag IDs are linked and stored.

Enaikoon's Marie Dennis
Security management can then review details indicating when a specific guard was at a particular location, either during that same shift, or for historical purposes—for example, to prove the guard's movements to a client.

Bergische Security can configure the software to expect each tag to be read within a specified span of time, and to issue an alert in the event that an exception occurs. For instance, if a tag is not read, indicting that a guard may have missed a checkpoint on his or her rounds, the software will send a text or e-mail message to authorized parties. Moreover, Dennis says, if a guard calls in with a problem, the system displays where that individual was most recently located, based on the RFID read data, in order to help identify his or her location.

Login and post your comment!

Not a member?

Signup for an account now to access all of the features of RFIDJournal.com!

Case Studies Features Best Practices How-Tos
Live Events Virtual Events Webinars
Simply enter a question for our experts.
RFID Journal LIVE! RFID in Health Care LIVE! LatAm LIVE! Brasil LIVE! Europe RFID Connect Virtual Events RFID Journal Awards Webinars Presentations