SlideShare uma empresa Scribd logo
1 de 8
© 2009 S3Edge Inc. All Rights Reserved. 1
Overview
• Scenario
• Application Screens
• Companion video (see below)
© 2009 S3Edge Inc. All Rights Reserved. 2
Scenario
• Employees carrying laptops that they are authorized for
should be allowed entry after due verification.
• Step1: Configure SpotLight server [not shown in video]
– Upload employee details including pictures into SpotLight.
– Tag laptop with an RFID tag. Associate with owner using SpotLight.
– Synchronize the data with the handheld.
– Issue the handheld to the security guard.
• Step2: Start verification process [video]
– When a car approaches the entry/exit gate, pictures of the laptop
owners automatically pop in the handheld (even if the laptop is in
the car boot).
– Guard verifies the picture in the handheld, with the person in the
laptop and
• Hits “Verified-OK” if the owner matches.
• Hits “Verified-Invalid” if there is a mismatch.
– Information is recorded for display in the SpotLight portal and
reports
© 2009 S3Edge Inc. All Rights Reserved.
»APPLICATION SCREENS
© 2009 S3Edge Inc. All Rights Reserved. 4
SpotLight Mobile – Verify Application
4
Pick “Verify
Asset”
application
© 2009 S3Edge Inc. All Rights Reserved. 5
Pick Verification Zone
5
Select gate being
watched (here, it is gate
at Building1)
© 2009 S3Edge Inc. All Rights Reserved. 6
Waiting for employee /
laptop
© 2009 S3Edge Inc. All Rights Reserved. 7
Guard being shown the
picture of the Laptop
“HP N-61” owner.
Guard can choose to
verify – OK or Invalid.
© 2009 S3Edge Inc. All Rights Reserved. 8
Hardware – 2.45 GHz Active RFID reader and tags

Mais conteúdo relacionado

Semelhante a Spotlight For Laptop Tracking

FLEETCAM 3g PP June 2016
FLEETCAM 3g PP June 2016FLEETCAM 3g PP June 2016
FLEETCAM 3g PP June 2016
Sanda Paliso
 

Semelhante a Spotlight For Laptop Tracking (20)

P series quick installation manual
P series quick installation manualP series quick installation manual
P series quick installation manual
 
Sdl cctv sms v_ 4.0
Sdl cctv sms v_ 4.0Sdl cctv sms v_ 4.0
Sdl cctv sms v_ 4.0
 
UbiBot AQS1 User Manual.pdf
UbiBot AQS1 User Manual.pdfUbiBot AQS1 User Manual.pdf
UbiBot AQS1 User Manual.pdf
 
Digital video recorder
Digital video recorderDigital video recorder
Digital video recorder
 
Vc sn tool introduce
Vc sn tool introduceVc sn tool introduce
Vc sn tool introduce
 
Blackvue DR400G-HD manual_eng _v1.5
Blackvue DR400G-HD manual_eng _v1.5Blackvue DR400G-HD manual_eng _v1.5
Blackvue DR400G-HD manual_eng _v1.5
 
Blackvue dr400 g-hd_manual_e0
Blackvue dr400 g-hd_manual_e0Blackvue dr400 g-hd_manual_e0
Blackvue dr400 g-hd_manual_e0
 
3 Review
3 Review3 Review
3 Review
 
Usability Testing on Mobile Devices - No More Excuses!
Usability Testing on Mobile Devices - No More Excuses!Usability Testing on Mobile Devices - No More Excuses!
Usability Testing on Mobile Devices - No More Excuses!
 
FLEETCAM 3g PP June 2016
FLEETCAM 3g PP June 2016FLEETCAM 3g PP June 2016
FLEETCAM 3g PP June 2016
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
 
Mobile security part 2
Mobile security part 2Mobile security part 2
Mobile security part 2
 
Knox Configure Sales Deck
Knox Configure Sales DeckKnox Configure Sales Deck
Knox Configure Sales Deck
 
IBM Mobile Quality Assurance Open Beta Study Group Session 3 (Instrumenting...
IBM Mobile Quality Assurance   Open Beta Study Group Session 3 (Instrumenting...IBM Mobile Quality Assurance   Open Beta Study Group Session 3 (Instrumenting...
IBM Mobile Quality Assurance Open Beta Study Group Session 3 (Instrumenting...
 
NBS_Profilo.pptx
NBS_Profilo.pptxNBS_Profilo.pptx
NBS_Profilo.pptx
 
Kalimucho Research Project, OW2con11, Nov 24-25, Paris
Kalimucho Research Project, OW2con11, Nov 24-25, ParisKalimucho Research Project, OW2con11, Nov 24-25, Paris
Kalimucho Research Project, OW2con11, Nov 24-25, Paris
 
Sdl cctv sms v_ 5.0
Sdl cctv sms v_ 5.0Sdl cctv sms v_ 5.0
Sdl cctv sms v_ 5.0
 
Knox Manage Sales Deck
Knox Manage Sales DeckKnox Manage Sales Deck
Knox Manage Sales Deck
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and Technology
 
Hack#29 - Mi Home IP Camera System
Hack#29 - Mi Home IP Camera SystemHack#29 - Mi Home IP Camera System
Hack#29 - Mi Home IP Camera System
 

Mais de Anush Kumar (8)

Auto-ID in the Blood Supply Chain
Auto-ID in the Blood Supply ChainAuto-ID in the Blood Supply Chain
Auto-ID in the Blood Supply Chain
 
Rfid Based Roi For Corporate Asset & Personnel Tracking
Rfid Based Roi For Corporate Asset & Personnel TrackingRfid Based Roi For Corporate Asset & Personnel Tracking
Rfid Based Roi For Corporate Asset & Personnel Tracking
 
Rfid Based Roi For Vertically Integrated Manufacturers
Rfid Based Roi For Vertically Integrated ManufacturersRfid Based Roi For Vertically Integrated Manufacturers
Rfid Based Roi For Vertically Integrated Manufacturers
 
Mit Enterprise Forum 0309 Final
Mit Enterprise Forum 0309 FinalMit Enterprise Forum 0309 Final
Mit Enterprise Forum 0309 Final
 
Soa204 Kawasaki Final
Soa204 Kawasaki FinalSoa204 Kawasaki Final
Soa204 Kawasaki Final
 
Rtvs Meaning In Life
Rtvs   Meaning In LifeRtvs   Meaning In Life
Rtvs Meaning In Life
 
Recall Problem Statement
Recall Problem StatementRecall Problem Statement
Recall Problem Statement
 
RFID 2.0 & S3Edge RTVS
RFID 2.0 & S3Edge RTVSRFID 2.0 & S3Edge RTVS
RFID 2.0 & S3Edge RTVS
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 

Spotlight For Laptop Tracking

  • 1. © 2009 S3Edge Inc. All Rights Reserved. 1 Overview • Scenario • Application Screens • Companion video (see below)
  • 2. © 2009 S3Edge Inc. All Rights Reserved. 2 Scenario • Employees carrying laptops that they are authorized for should be allowed entry after due verification. • Step1: Configure SpotLight server [not shown in video] – Upload employee details including pictures into SpotLight. – Tag laptop with an RFID tag. Associate with owner using SpotLight. – Synchronize the data with the handheld. – Issue the handheld to the security guard. • Step2: Start verification process [video] – When a car approaches the entry/exit gate, pictures of the laptop owners automatically pop in the handheld (even if the laptop is in the car boot). – Guard verifies the picture in the handheld, with the person in the laptop and • Hits “Verified-OK” if the owner matches. • Hits “Verified-Invalid” if there is a mismatch. – Information is recorded for display in the SpotLight portal and reports
  • 3. © 2009 S3Edge Inc. All Rights Reserved. »APPLICATION SCREENS
  • 4. © 2009 S3Edge Inc. All Rights Reserved. 4 SpotLight Mobile – Verify Application 4 Pick “Verify Asset” application
  • 5. © 2009 S3Edge Inc. All Rights Reserved. 5 Pick Verification Zone 5 Select gate being watched (here, it is gate at Building1)
  • 6. © 2009 S3Edge Inc. All Rights Reserved. 6 Waiting for employee / laptop
  • 7. © 2009 S3Edge Inc. All Rights Reserved. 7 Guard being shown the picture of the Laptop “HP N-61” owner. Guard can choose to verify – OK or Invalid.
  • 8. © 2009 S3Edge Inc. All Rights Reserved. 8 Hardware – 2.45 GHz Active RFID reader and tags