contain any type and length of information about IT
asset.
For automatic scanning, the staff access card
needs to be equipped with RFID tags as well as the
IT asset. In this scenario (figure 6), when an
employee leaves a room with an asset, the UHF
reader will scan the staff as well as the asset tag.
This data will be sent to the middleware and
onwards to the PDML files and ‘asset movement
database’. The data from staff will then be related to
the data from the asset and a ‘check-out’ entry will
be created in a database that can be interfaced with
other existing systems so that this information is
available to all the related systems. As mentioned in
the earlier scenario, the identity of the staff will be
matched with the IT asset and if they don’t match
then alarms will be raised and relevant procedures
invoked. When the employee enters the room with
the asset, the staff and asset tags will be scanned
again and a ‘check-in’ entry will be made. The UHF
paper and filmic inlays are very thin and their
compact nature makes their application very
flexible. These tags have been used successfully for
baggage identification in the airline industry. As
mentioned earlier, due to their compact nature, it is
possible to enclose the tags in the barcode labels
such the tags are concealed and the barcode is
visible. This will prevent possible tampering of tags.
Figure 6: Automatic Scanning with UHF Tags.
If manual scanning option is south then as
explained in the manual scanning option for HF tags,
there need to be a RFID reader and an access card
scanner available at the exit door. When a staff
member exist the room with an IT asset, he/she will
have to manually scan the access card and the RFID
reader will automatically read the card. The data
thus captured will be matched to see if the person
carrying the IT assets is the one whom the asset has
been assigned. If not, an alarm will be raised.
Therefore, anybody who wants to take the asset out
of the room will have to ensure that the asset is
‘issued’ to them.
Apart form these options there is a third option
available under this category, which uses microwave
tags. The UHF range microwave tags operating at
the frequency of 2.45 GHz can also be used for asset
tracking. They have longer read ranges than the
UHF 860-960 MHz range tags. The use of the 2.45
GHz frequency for the purpose of radiolocation is
permitted in Australia according to the Australian
Communications Authority. Due to the long range
nature of tags, the tags may be read in multiple
positions. Using this feature of the long-range tags
and with multiple antennas connected to readers at
appropriate positions, tracking of assets on the entire
floor is possible. This will result in real-time
tracking of assets and staff who take those assets.
These tags also employ the EPC standard and so, all
the information about the personnel and assets has to
be stored in a database separately and identified
using the EPC. Hyper-X and Balogh RFID solutions
offered by Electro-com in Australia use these long
range tags.
5.3 Third Option
The third option includes active tags. These tags are
powered by batteries and can be automatically
activated at control points in a building. They can
broadcast non line-of-sight to small receivers
networked on the existing corporate LAN/WAN,
VPN or Internet over IP. They operate on dual
frequencies, one to activate the tag and the other for
transmission of data. They can be used for real-time
tracking of assets in the building. The read points
can also be grouped into zones to locate an asset or
person within a specific zone, as well as monitor
movement between zones. The memory on these
tags allows storage of a unique code and other
information like location, status information, etc. In
this scenario (figure 7a&b) a tagged personnel enter
the premises, access may be granted without swiping
a card or entering a code using active tags embedded
on their access/identity cards. The active tags, using
their battery power, transmit data at every control
point like a beacon, which is forwarded to the
reader. So when an employee enters a room, the
tracking system will detect him based on the data
transmitted by his access card.
Using the asset tracking system, assets can be
assigned to authorised staff. A work-request system
RFID
Reader
RFIDHost&
Database
RFID
Enabled
AccessCard
RFID Asset
Tag
Asset
Employee
ICEIS 2009 - International Conference on Enterprise Information Systems
146