Guard tour patrol system

Last updated

A guard tour patrol system is a system for logging the rounds of employees in a variety of situations such as security guards patrolling property, technicians monitoring climate-controlled environments, and correctional officers [1] checking prisoner living areas. It helps ensure that the employee makes their appointed rounds at the correct intervals and can offer a record for legal or insurance reasons. Such systems have existed for many years using mechanical watchclock-based systems (watchman clocks/guard tour clocks/patrol clocks). Computerized systems were first introduced in Europe in the early 1980s, and in North America in 1986. [2] Modern systems are based on handheld data loggers and RFID sensors. The system provides a means to record the time when the employee reaches certain points on their tour. Checkpoints or watchstations are commonly placed at the extreme ends of the tour route and at critical points such as vaults, specimen refrigerators, vital equipment, and access points. Some systems are set so that the interval between stations is timed so if the employee fails to reach each point within a set time, other staff are dispatched to ensure the employee's well-being. An example of a modern set-up might work as follows: the employee carries a portable electronic sensor (PES) or electronic data collector which is activated at each checkpoint. Checkpoints can consist of iButton semiconductors, magnetic strips, proximity microchips such as RFIDs or NFC- or optical barcodes. The data collector stores the serial number of the checkpoint with the date and time. Later, the information is downloaded from the collector into a computer where the checkpoint's serial number will have an assigned location (i.e. North Perimeter Fence, Cell Number 1, etc.). Data collectors can also be programmed to ignore duplicate checkpoint activations that occur sequentially or within a certain time period. Computer software used to compile the data from the collector can print out summaries that pinpoint missed checkpoints or patrols without the operator having to review all the data collected. Because devices can be subject to misuse, some have built-in microwave, g-force, and voltage detection.

Contents

System composition

It combines readers, tags and software.

Guard patrol reader

The first Guard tour system were the touch readers with software. Upon further development, more working modes for the readers became available. Such as RFID and GPS. And the communication of readers and software was connected with USB cables or download stations. For USB connection, the Pogo Pin connection is very popular. Because the contacts with gold-plating are very stable and waterproof.

Newer, light-weight guard touring systems utilize QR codes or barcodes rather than expensive electronic components. A mobile phone app is used to scan (take a photo) of the QR code which creates a time stamp in the system.

Guard patrol tags

The reader needs to read the tags to record the information, such as the time and tag's ID. Then upload the information to software to get the report.

Guard patrol software

There are three types of guard patrol software. They are desktop, local network client-server, and web-based versions. The desktop version can only work on one computer. The local network client server type can work using the local area network. The web-based version can work everywhere with internet access. In the analog age, the device used for this purpose was the watchclock. [3] Watchclocks often had a paper or light cardboard disk placed inside for each 24-hour period. The user would carry the clock to each checkpoint, where a numbered key could be found (typically chained in place). The key would be inserted into the clock where it would imprint the disk. At the end of the shift or 24-hour period an authorized person (usually a supervisor) would unlock the watchclock and retrieve the disk. As development of guard tour system, the device can work with more functions. Such as send data real-time by GPRS to software and GPS location and tracking mode. In software, we set up the Patrol Department, Patrol Route, Guard, Checkpoint, Event and Patrol Plan in general, depending on the software purchased. The software will then have specific tours set for officers to complete, being able to indicate whether the inspection was completed properly or not, with the ability to note a specific temperature of an inspection, or make any kind of notes necessary. Guard Tour software systems seem to be becoming the norm in tracking tours for officers.

New touring solutions rely on cloud-based Software as a Service (SaaS) combined with mobile or fixed on-site devices. These offer the advantages of lower installation and maintenance costs, forgoing the need for hardware, software upgrades, data backups and computer maintenance. On-site systems need all the usual software patches, backups and periodic hardware replacement. In operation, the role of the watchclock system, described above, has largely been replaced by some combination of GPS, RFID/NFC, or QR coded labels. Users prove that they have visited particular locations or performed tasks by scanning these tags or via GPS generated maps. These technologies result in lower costs, while increasing the flexibility of the systems to handle changes or new uses. This is important when routes change, or if a solution is needed on short notice. Tag-based touring systems typically utilize a mobile phone or tablet app to scan the tags and then upload that information along with a time stamp, phone's location information, and optionally other information the guard enters into the app on the phone. These systems provide instant access to tour information as it is uploaded by the application or device carried by the user, rather than requiring the officer to return to an upload station.

Related Research Articles

<span class="mw-page-title-main">Telemetry</span> Data and measurements transferred from a remote location to receiving equipment for monitoring

Telemetry is the in situ collection of measurements or other data at remote points and their automatic transmission to receiving equipment (telecommunication) for monitoring. The word is derived from the Greek roots tele, 'remote', and metron, 'measure'. Systems that need external instructions and data to operate require the counterpart of telemetry: telecommand.

<span class="mw-page-title-main">Barcode</span> Optical machine-readable representation of data

A barcode or bar code is a method of representing data in a visual, machine-readable form. Initially, barcodes represented data by varying the widths, spacings and sizes of parallel lines. These barcodes, now commonly referred to as linear or one-dimensional (1D), can be scanned by special optical scanners, called barcode readers, of which there are several types. Later, two-dimensional (2D) variants were developed, using rectangles, dots, hexagons and other patterns, called matrix codes or 2D barcodes, although they do not use bars as such. 2D barcodes can be read using purpose-built 2D optical scanners, which exist in a few different forms. 2D barcodes can also be read by a digital camera connected to a microcomputer running software that takes a photographic image of the barcode and analyzes the image to deconstruct and decode the 2D barcode. A mobile device with a built-in camera, such as smartphone, can function as the latter type of 2D barcode reader using specialized application software.

Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID system consists of a tiny radio transponder, a radio receiver and transmitter. When triggered by an electromagnetic interrogation pulse from a nearby RFID reader device, the tag transmits digital data, usually an identifying inventory number, back to the reader. This number can be used to track inventory goods.

<span class="mw-page-title-main">Barcode reader</span> Electronic device

A barcode reader or barcode scanner is an optical scanner that can read printed barcodes, decode the data contained in the barcode to a computer. Like a flatbed scanner, it consists of a light source, a lens and a light sensor for translating optical impulses into electrical signals. Additionally, nearly all barcode readers contain decoder circuitry that can analyse the barcode's image data provided by the sensor and send the barcode's content to the scanner's output port.

<span class="mw-page-title-main">QR code</span> Type of matrix barcode

A QR code is a type of two-dimensional matrix barcode, invented in 1994, by Japanese company Denso Wave for labelling automobile parts. A barcode is a machine-readable optical image that contains information specific to the labelled item. In practice, QR codes contain data for a locator, an identifier, and web tracking. To efficiently store data, QR codes use four standardized modes of encoding (i) numeric, (ii) alphanumeric, (iii) byte or binary, and (iv) kanji.

<span class="mw-page-title-main">Time clock</span>

A time clock, sometimes known as a clock card machine or punch clock or time recorder, is a device that records start and end times for hourly employees at a place of business.

Object hyperlinking is a term that refers to extending the Internet to objects and locations in the real world. Object hyperlinking aims to extend the Internet to the physical world by attaching tags with URLs to tangible objects or locations. These object tags can then be read by a wireless mobile device and information about objects and locations retrieved and displayed.

<span class="mw-page-title-main">Bag tag</span> Ticket attached to luggage for identification

Bag tags, also known as baggage tags, baggage checks or luggage tickets, have traditionally been used by bus, train, and airline carriers to route checked luggage to its final destination. The passenger stub is typically handed to the passenger or attached to the ticket envelope:

  1. to aid the passenger in identifying their bag among similar bags at the destination baggage carousel;
  2. as proof—still requested at a few airports—that the passenger is not removing someone else's bag from the baggage reclaim hall; and
  3. as a means for the passenger and carrier to identify and trace a specific bag that has gone astray and was not delivered at the destination. The carriers' liability is restricted to published tariffs and international agreements.
<span class="mw-page-title-main">Tracking system</span>

A tracking system, also known as a locating system, is used for the observing of persons or objects on the move and supplying a timely ordered sequence of location data for further processing.

In the distribution and logistics of many types of products, track and trace or tracking and tracing concerns a process of determining the current and past locations of a unique item or property. Mass serialization is the process that manufacturers go through to assign and mark each of their products with a unique identifier such as an Electronic Product Code (EPC) for track and trace purposes. The marking or "tagging" of products is usually completed within the manufacturing process through the use of various combinations of human readable or machine readable technologies such as DataMatrix barcodes or RFID.

Time and attendance systems (T&A) are used to track and monitor when employees start and stop work. A time and attendance system enables an employer to monitor their employees working hours and late arrivals, early departures, time taken on breaks and absenteeism. It also helps to control labor costs by reducing over-payments, which are often caused by paying employees for time that are not working, and eliminates transcription error, interpretation error and intentional error. T&A systems can also be used to ensure compliance with labor regulations regarding proof of attendance.

<span class="mw-page-title-main">ShotCode</span>

ShotCode is a circular barcode created by High Energy Magic of Cambridge University. It uses a dartboard-like circle, with a bullseye in the centre and datacircles surrounding it. The technology reads databits from these datacircles by measuring the angle and distance from the bullseye for each.

<span class="mw-page-title-main">High Capacity Color Barcode</span>

High Capacity Color Barcode (HCCB) is a technology developed by Microsoft for encoding data in a 2D "barcode" using clusters of colored triangles instead of the square pixels conventionally associated with 2D barcodes or QR codes. Data density is increased by using a palette of 4 or 8 colors for the triangles, although HCCB also permits the use of black and white when necessary. It has been licensed by the ISAN International Agency for use in its International Standard Audiovisual Number standard, and serves as the basis for the Microsoft Tag mobile tagging application.

<span class="mw-page-title-main">Payment terminal</span> Device for eletronic fund transfers

A payment terminal, also known as a point of sale (POS) terminal, credit card machine, PIN pad, EFTPOS terminal, is a device which interfaces with payment cards to make electronic funds transfers. The terminal typically consists of a secure keypad for entering PIN, a screen, a means of capturing information from payments cards and a network connection to access the payment network for authorization.

Mobile tagging is the process of providing data read from tags for display on mobile devices, commonly encoded in a two-dimensional barcode, using the camera of a camera phone as the reader device. The contents of the tag code is usually a URL for information addressed and accessible through Internet.

Touchatag was an RFID service for consumers, application developers and operators/enterprises created by Alcatel-Lucent. Consumers could use RFID tags to trigger what touchatag called Applications, which could include opening a webpage, sending a text message, shutting down the computer, or running a custom application created through the software's API, via the application developer network. Touchatag applications were also compatible with NFC enabled phones like the Nokia 6212. TikiTag was launched as an open beta on October 1, 2008. And it was rebranded to touchatag on February 15, 2009. Touchatag also sold RFID hardware, like a starter package with 1 USB RFID reader and 10 RFID tags (stickers), for which the client software was compatible with Windows XP and Vista, along with Mac OS X 10.4 and up. Touchatag was carried by Amazon.com, ThinkGeek, Firebox.com and getDigital.de along with Touchatag's own Online Store. Touchatag also marketed their products' underlying technology for enterprise and operator solutions. Touchatag announced an agreement with Belgacom PingPing on jointly developing the contactless market and announced a commercial pilot with Accor Services. On June 27, 2012, the Touchatag team has announced the shutdown of the project. inviting users to use IOTOPE "a similar open source Internet Of Things service" which itself has no apparent activity since November 2012.

Asset tracking refers to the method of tracking physical assets, either by scanning barcode labels attached to the assets or by using tags using GPS, BLE, LoRa, or RFID which broadcast their location. These technologies can also be used for indoor tracking of persons wearing a tag.

Inventory management software is a software system for tracking inventory levels, orders, sales and deliveries. It can also be used in the manufacturing industry to create a work order, bill of materials and other production-related documents. Companies use inventory management software to avoid product overstock and outages. It is a tool for organizing inventory data that before was generally stored in hard-copy form or in spreadsheets.

ISO/IEC 20248Automatic Identification and Data Capture Techniques – Data Structures – Digital Signature Meta Structure is an international standard specification under development by ISO/IEC JTC 1/SC 31/WG 2. This development is an extension of SANS 1368, which is the current published specification. ISO/IEC 20248 and SANS 1368 are equivalent standard specifications. SANS 1368 is a South African national standard developed by the South African Bureau of Standards.

Barcode library or Barcode SDK is a software library that can be used to add barcode features to desktop, web, mobile or embedded applications. Barcode library presents sets of subroutines or objects which allow to create barcode images and put them on surfaces or recognize machine-encoded text / data from scanned or captured by camera images with embedded barcodes. The library can support two modes: generation and recognition mode, some libraries support barcode reading and writing in the same way, but some libraries support only one mode.

References

  1. "Paper on Law, Safety and Justice Capital Improvement Program, King County Washington, Page 6" (PDF). Archived from the original (PDF) on 2008-09-24. Retrieved 2008-11-24.
  2. Clark, Bill; Robert R. Macdonald (March 1991). "High-Tech Touring". Security Management. 35 (3): 25.
  3. The Detex Watchman's Clock Album, Philip Haselton. Accessed May 24, 2007.