Dallmeier, initPRO Solution Combines RFID Data With Video Surveillance

The registration of a filled supermarket trolley directly at the checkout via RFID transponders, without customers having to place all items on the conveyor belt, is, at the moment, still a long way off. The idea of integrating RFID data into video images however has now become a reality for the first time.

This application has been made possible through the close cooperation between Regensburg based company Dallmeier and initPRO. The two firms collaborate within the Network for Innovative Logistics.

The Network for Innovative Logistics, abbreviated NIL, has made it its goal to provide comprehensive IT logistics solutions and services for manufacturing, warehousing and transportation. The initiative is sponsored by the Federal Ministry of Economics and Technology. In all seven companies as well as both of Regensburg's universities pool competences from all areas of the logistics chain and together develop new solutions and innovative products.

Within the scope of the NIL project the two companies Dallmeier and initPRO work on the integration of RFID data into video images.

The developmental work conducted by initPRO relied on already existing documented interfaces by Dallmeier. Thereby, Dallmeier’s wide experience in the area of video surveillance as well as initPRO’s know-how regarding RFID were incorporated into the work.

Armin Biersack, who is in charge of the project at Dallmeier, was very satisfied.

"We have worked together very closely and so, together, we were able to create a solution that can be practically used in a variety of applications," he said.

For the very first time, data which are transmitted by the RFID tag such as date, time or serial number can be integrated into the video image. For this purpose the RFID reader sends data to the Dallmeier recorder via Ethernet. The data is then displayed within the management software PView, either in or next to the video image.

An important area of application for this technology is the documentation of the transfer of risk with providers of logistics services. So as to be able to definitively allocate later reclamations for transport damages or losses, the flow of goods is completely documented throughout the logistics centre, right up to the moment when the goods are handed over to the parcel shipment company or the forwarding agent.

Thereby, the parcels are scanned when they come in and when they go out. Additionally, they are captured by a high-resolution colour camera. The registered process data is saved by the digital recording system, together with the image data, in order to ensure that images and parcel data can later be clearly matched.

“Meanwhile, the scanning of the goods is more and more frequently expanded by RFID technology,” said Norbert Jungbauer, managing director at initPRO. “This saves time as the goods no longer have to be registered manually but can be booked automatically and in seconds by reading devices. Therefore, it is important to be able to also integrate RFID data into the video images so that parcels and whole pallets can be conclusively identified in the future."

The technology is used wherever there is stock rotation. Hence, application areas besides logistics include the retail sector or the manufacturing industry. Beyond that, many more fields of use are on the cards. Once RFID tags are integrated in to ID cards and/or passports persons can be greeted with a video image upon entering a building. Likewise, it will be possible to immediately check whether or not an ID is used fraudulently. Another conceivable application is ensuring compliance with fire regulations through integrated PeopleCounting.

Featured

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

  • Report: Cyber Attackers Continue to Turn to AI-Based Tools to Avoid Detection

    Comcast Business recently released its 2025 Cybersecurity Threat Report, a comprehensive analysis of 34.6 billion cybersecurity events detected between June 1,2024 and May 31, 2025. Now in its third year, the report offers business leaders a unique perspective into the evolving threat landscape and provides actionable insights to help organizations strengthen their defenses and align cybersecurity with business risk. Read Now

  • Axis Communications Creates AI-powered Video Surveillance Orchestra

    What if cameras could not only see the world, but interpret it—and respond like orchestra musicians reading sheet music: instantly, precisely, and in perfect harmony? That’s what global network technology leader Axis Communications set to find out. Read Now

  • Just as Expected

    GSX produced a wonderful tradeshow earlier this week. Monday was surprisingly strong in the morning, and the afternoon wasn’t bad at all. That’s Monday’s results and asking attendees to travel on Sunday. Just a quick hint, no one wants to give up their weekend to travel and set up an exhibit booth. I’m just saying. Read Now

    • Industry Events
    • GSX
  • NOLA: The Crescent City

    Twenty years later we finds ourselves in New Orleans. Twenty years ago the aftermath of Hurricane Katrina forced exhibitors and attendees to look elsewhere for tradeshow floor space. Read Now

    • Industry Events
    • GSX

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities