Visitor Management System
CEO, Director

RFID Based Visitor Monitoring System (VMS) would allow complete hands-free access control, monitoring the whereabouts of visitor. The access tag can be read up to 10 meters from the RFID reader, which usually eliminates the need to handle the tag or to walk very close to the reader. The proposed system is based on UHF RFID readers, supported with antennas at gate and transaction sections, and visitor pass/identification cards containing RFID-transponders which are able to electronically store information that can be read without the physical contact with the help of radio medium.

RFID-based equipment monitoring and tracking system is an integrated system that offers an effective solution of managing items especially for large scale environment. It combines the RFID technology and security devices to ensure the items are always been monitored and secured. The system enables the organization to track and monitor selected individual to access locations, permit movement, record the important data and also enable the viewing of record via internet. This paper introduces the distinctive components of RFID technology and focuses on its core competencies, scalability and security. It will be then supplemented by a detailed synopsis of an investigation conducted to test the feasibility and practicality of RFID technology. RFID is a wireless automatic identification that is gaining attention and is considered by some to emerge as one of the pervasive computing technologies in history. As the technology grows very rapidly, RFID has received considerable worldwide attention and widely used in monitoring and tracking ranging from human identification to product identification. Previous research has successfully indicated that RFID has been increasingly expanded in various fields such as retail supply chain, asset tracking, postal and courier services, education, construction industry, medical etc. Developments in RFID technology continue to yield larger memory capacities, wider reading ranges, and faster processing. It is highly unlikely that the technology will ultimately replace barcode. However, RFID will continue to grow in its established niches where barcode or other optical technologies are not effective, such as in the chemical container industry and livestock industry. RFID enables tracking and monitoring of items over distances that range from about a centimeter to hundreds of meters. RFID can track inventories, mobile equipment, and people in real time as the tagged item travels around the organization. Tracking of mobile equipment can include wheelchairs, infusion pumps, and blood supplies. Given that organization personnel fail to locate such mobile assets anywhere from 15 to 20 percent of the time because of misplacement, the value of RFID tracking can be seen. Information storage capacity is much less limited than with bar codes, with as much as 2 kilobytes of data stored by a microchip in a RFID tag.

RFID vs Bar code

RFID technology is more sophisticated than the bar code. This is because of the following facts:
  • It will be embedded and read with no requirement for line of sight
  • Tags can be reprogrammed easily
  • Capable of working in suitable and harsh environments
  • Ready to carry 96 bits of information – compare with 16 bits for bar code
  • Fraud controlling increases
  • Cloning become non-existence
  • Improves antitheft protection
  • Better efficiency
  • Cost saving
  • Tags
  • Simultaneous multi-tag reading
  • High speed data capture
  • Possibility of having a unique ID
  • Portable database
  • Profit enhancement
  • Reducing counterfeiting
  • Tracking work-in progress
  • Reducing administrative errors
  • Reducing rework

RFID System Components and Connectivity

A conventional RFID system is made up of four components mainly, 1. RFID Reader 2. RFID Antenna 3. RFID transponder (or tag) electronically programmed with unique data 4. Host computer with appropriate application software RFID systems consists of an antenna and a transceiver, which read the radio frequency and transfer the information to a processing device, and a transponder or tag, which is an integrated circuit containing the RF circuitry and information to be transmitted. The system requires the usage of RF active readers able to communicate with the main station using 3 different communication mediums: serial cable, LAN cable, and WLAN antenna.

Principle of Operation

A radio-frequency identification system combines inexpensive, programmable tags with a computerized radio detector. When the tag comes to within a few feet of the detector, the detector reads data carried in the tag via radio waves. A detector can work in a system with any number of tags, from a handful to millions. RFID equipment has myriad uses including inventory tracking, secure building access and retail-theft control. RFID methods utilize radio waves to accomplish this. At a simple level, RFID systems consist of three components: an RFID tag or smart label, an RFID reader, and an antenna. RFID tags contain an integrated circuit and an antenna, which are used to transmit data to the RFID reader (also called an interrogator). The reader then converts the radio waves to a more usable form of data. Information collected from the tags is then transferred through a communications interface to a host computer system, where the data can be stored in a database and analyzed later. A RFID reader is a network connected device (fixed or mobile) with an antenna that sends power as well as data and commands to the tags. The RFID reader acts like an access point for RFID tagged items so that the tags' data can be made available to several applications.

System Architecture

The basic architecture of an RFID system consists of a tag that includes an antenna and a chip, a reader equipped with antenna and a transceiver, and a workstation to host the Middleware and database. System architecture comprises of I. Hardware Architecture II. Software Architecture

Hardware Architecture

To satisfy the system functional and non-functional requirements, the Electronic Product Code (EPC) Gen2 passive RFID tag and Ultra High Frequency (UHF) reader will be selected.The wireless access point that links the tag reader with the monitoring station and database server will also selected. the system hardware architecture. Multiple tag readers are added to enable the system track the employee while she/he is on the move.

Software Architecture

The software architecture consists of a communication driver that handles all communication functions done at the server side, an Application Programming Interface (API) that handles and analyzes the data, a friendly GUI and a database that saves all readings and client information. The design also deals with the issues (reliable data transfer) of multi node environment. To make sure reliable data transfer between server and reader node. This project will facilitate the users in numerous ways like time saving in generate pass, security, reporting and many more. Building an automated tracking application by integrating web services guarantee many benefits, such as reduce clerical task and ease the management burden. The RFID-based equipment tracking system is an integrated system that offers an effective solution of managing items especially for large scale environment. It combines the RFID technology and security devices to ensure the items are always been monitored and secured. The system enables the organization to give pass to selected individual to access locations, record the important data and also enable the viewing of record via internet/intranet. The working procedure of the proposed RFID System is described below.

  • To develop software this will act as a middleware between server and the reader.
  • To develop the connection between server and the reader
  • To read the data onto the tags
  • To extract or read data from tags, decode that data and make it usable for further processing
  • To develop a graphical user interface (GUI) which will display the details of a visitor by displaying IN and OUT timings and on the basis of that not only it will be useful for report generation on daily and monthly basis
  • To store the data in database and create various input/output log files.

Work Flow

The system is developed in a modular-based method. The system software is mainly consisting of following two modules.

  • Recorder
  • Administrator
Recorder module is responsible for controlling RFID readers, getting detected tags from readers, authorizing and storing them into Tag Log file/Database. The recorder application is mainly responsible for controlling RFID Readers, taking the raw data from the authorized tags through RFID readers, filtering data & storing relevant data into the Tag Log file/Database. This data would be used to generate various types of reports of visitors. This also continuously monitors the presence of visitors and displays the time and name of the tag holder. This application communicates with readers via LAN. Administrator module is responsible for employee registration, visitor registration, and access point installation. The administrator has the access to update, add and delete the records.