|
strengthens the daily routine operation in best available technical choice with fuzzy RSSI technology via power level measures of beacon signals.
|
|
|
|
|
supports access control at much higher distance tolerance than with just plugged identity cards or tokens, but at no expense in access security.
|
|
|
|
|
fuzzy RSSI guessing with power levels goes far beyond choke point locating as with fixed RFID reader positions.
|
|
|
|
|
location information is obtained from repetitive measurement, and is checked repetitively for initial or persistent choice of destination.
|
|
|
|
|
co-locates staff at any work position and enables soft handover between staff with equivalent access rights.
|
|
|
|
|
requires only just one Bluetooth® Screentenna at each work position monitor.
|
|
|
|
|
fully serves and requires nothing additional with handheld screens of PDA or tablet type.
|
|
|
|
|
token equips all valuable assets and all types of transportation aids equips all types of handheld scanners with low energy transponders that enable fuzzy locating at each trigger event and/or on motion.
|
|
|
|
|
strictly connects the data acquisition with persistent order data and prevents from blunt staff monitoring.
|
|
|
|
|
finally alerts, if there might be a organizational error or when there might occur an error in the order data or even if someone might not adhere to the given regime.
|
|
|
|
|
makes easy to recognize what, when, where and why something happens and even who refuses to comply.
|
|
|
|
|
provides location information at reasonably low cost, requiring just a minimum of infrastructure.
|
|
|
|