Dallmeier, initPRO Solution Combines RFID Data With Video Surveillance

The registration of a filled supermarket trolley directly at the checkout via RFID transponders, without customers having to place all items on the conveyor belt, is, at the moment, still a long way off. The idea of integrating RFID data into video images however has now become a reality for the first time.

This application has been made possible through the close cooperation between Regensburg based company Dallmeier and initPRO. The two firms collaborate within the Network for Innovative Logistics.

The Network for Innovative Logistics, abbreviated NIL, has made it its goal to provide comprehensive IT logistics solutions and services for manufacturing, warehousing and transportation. The initiative is sponsored by the Federal Ministry of Economics and Technology. In all seven companies as well as both of Regensburg's universities pool competences from all areas of the logistics chain and together develop new solutions and innovative products.

Within the scope of the NIL project the two companies Dallmeier and initPRO work on the integration of RFID data into video images.

The developmental work conducted by initPRO relied on already existing documented interfaces by Dallmeier. Thereby, Dallmeier’s wide experience in the area of video surveillance as well as initPRO’s know-how regarding RFID were incorporated into the work.

Armin Biersack, who is in charge of the project at Dallmeier, was very satisfied.

"We have worked together very closely and so, together, we were able to create a solution that can be practically used in a variety of applications," he said.

For the very first time, data which are transmitted by the RFID tag such as date, time or serial number can be integrated into the video image. For this purpose the RFID reader sends data to the Dallmeier recorder via Ethernet. The data is then displayed within the management software PView, either in or next to the video image.

An important area of application for this technology is the documentation of the transfer of risk with providers of logistics services. So as to be able to definitively allocate later reclamations for transport damages or losses, the flow of goods is completely documented throughout the logistics centre, right up to the moment when the goods are handed over to the parcel shipment company or the forwarding agent.

Thereby, the parcels are scanned when they come in and when they go out. Additionally, they are captured by a high-resolution colour camera. The registered process data is saved by the digital recording system, together with the image data, in order to ensure that images and parcel data can later be clearly matched.

“Meanwhile, the scanning of the goods is more and more frequently expanded by RFID technology,” said Norbert Jungbauer, managing director at initPRO. “This saves time as the goods no longer have to be registered manually but can be booked automatically and in seconds by reading devices. Therefore, it is important to be able to also integrate RFID data into the video images so that parcels and whole pallets can be conclusively identified in the future."

The technology is used wherever there is stock rotation. Hence, application areas besides logistics include the retail sector or the manufacturing industry. Beyond that, many more fields of use are on the cards. Once RFID tags are integrated in to ID cards and/or passports persons can be greeted with a video image upon entering a building. Likewise, it will be possible to immediately check whether or not an ID is used fraudulently. Another conceivable application is ensuring compliance with fire regulations through integrated PeopleCounting.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3