print

TokLoc® Compatibility

is compatible in the ISM wireless bands and channel schemes.       
usage is free of licensing in the European Union.       
utilises BlueTooth® 2.45 GHz wireless systems for small and simple tokens.        
requires no exclusive usage of frequencies or channels.        
complies with standardisation of IEEE and ISO.        
prefers standardised components and is compatible with usual BlueTooth® units.        
uses instead of simple dongles the TokLoc® BlueTooth® Screentenna.        
requires for distinction of instances just one BlueTooth® unit per object.        
needs a minimal operational setup of infrastructure on the basis of existing standards.        
starts on the basis of simple common and mandatory prerequisites: All subscribed shall wear a TokLoc® token. Objects of interest shall be labelled or tagged with Tags working as TokLoc® tokens. Then TokLoc® functions operate autonomously and dependent to the actual contiguity.        
works on the basis that BlueTooth® identity gets read on approach to an equipped work position.        
primarily serves for access control on approach and at access.        
defines the work position as the operational theatre and ignores remote objects and persons.        
recognises the presence of a token in contiguity through common inquiry or directed paging.        
concept goes far beyond index locating as with fixed RFID reader positions. Contiguity information is obtained from repetitive enquiry or paging.       
implementation may be matched with directly related sequences of video records at choke points. Video recording at work positions with individuals is generally not supported.        
stipulates neither real time tracking nor any retrospective tracing.        
performs much better than with choke point or handheld reading of passive RFID tags.        
makes the most of physics and logics with wireless locating.        
works on the basis that BlueTooth® token get recognised in the contiguity or on approach to equipped work positions and with reading the identities.        
recognises well the limitations of physics and the limitations of components.        
makes no assumptions on operational conditions but just takes the physical restrictions and the technology limits into account.        
in addition to scanning and detecting infers the results of the applied technologies to one comprehensive access control regime.        

Copyright © 2009 ReadPost Gesellschaft mbH