SlideShare a Scribd company logo
1 of 6
Download to read offline
ATM Security Guard Monitoring
Solution using Magnasoft NorthStar


AUTHOR: K UNAL ASHAR

D ATE: 15-J ANUARY-2012



Table of Contents
Business Problem ....................................................................................................................................... 2
Solutions ..................................................................................................................................................... 2
   Solution Options ...................................................................................................................................... 2
      1.       GPS............................................................................................................................................. 2
      2.       RFID ............................................................................................................................................ 2
      3.       Bluetooth ..................................................................................................................................... 2
   Solution Components .............................................................................................................................. 2
Problems in the solutions ............................................................................................................................ 3
Comparison of Solutions ............................................................................................................................. 3
Proposed Solution....................................................................................................................................... 4
   Solution Diagram ..................................................................................................................................... 4
      Installation............................................................................................................................................ 4
      Usage .................................................................................................................................................. 5




                                                                                                                                                                1
Business Problem
Security guards hired by 3rd party security firms are placed inside or next to ATM rooms belonging to
banks. These security guards need to be in close proximity of the room/ATM machine during their entire
shift, so as to prevent any theft or tampering.

The security firm managing the guards needs a way to ensure that the guards are always at their post,
and be alerted if the guards leave their posts.



Solutions

Solution Options
1. GPS
   The guard carries a small, battery powered GPS device that tracks his location 24x7. The location of
   the guard and any movement away from his post are remotely monitored by the security agency over
   the web, and are also sent as instant alerts over SMS to the security firm.

2. RFID
   The ATM machine is fitted with a long range RFID (smartcard) reader that is powered by the ATM
   machine’s power source. The security guard carries a RFID (smartcard) badge or tag that can be
   read over long distances. When the security guard comes in close proximity of the ATM room, the
   RFID reader detects the presence of the guard’s tag, and an SMS alert is sent to the security firm. If
   the security guard leaves the proximity of the ATM room, the RFID reader detects the absence of the
   guard’s tag, and an SMS alert is sent to the security firm.

3. Bluetooth
   The ATM machine is fitted with a long range Bluetooth transmitter that is powered by the ATM
   machine’s power source. The security guard carries a Bluetooth reader or tag that can be read over
   long distances. When the security guard comes in close proximity of the ATM room, the Bluetooth
   transmitter detects the presence of the guard’s tag, and an SMS alert is sent to the security firm. If the
   security guard leaves the proximity of the ATM room, the Bluetooth transmitter detects the absence of
   the guard’s tag, and an SMS alert is sent to the security firm.

Solution Components
1.    ATM machines
2.    ATM room or building (brick and/or glass)
3.    Security guard
4.    Security guard’s optional weapon
5.    Plastic or metal chair placed in or near the ATM machine or room
6.    On-ATM monitoring device
7.    On-guard monitoring device
8.    24x7 power to ATM
9.    Location of the ATM (in remote areas without cellular coverage)
10.   ATM machine communication infrastructure




                                                                                                           2
Problems in the solutions
1.    On-guard device theft
2.    On-ATM transmitter/reader theft
3.    On-guard device tampering or power discharge
4.    On-ATM transmitter/reader tampering or power discharge
5.    Guard’s device misplaced, lost or left at home
6.    Guard leaves device in the ATM room and leaves ATM room without the device
7.    Communications network outage
8.    Device transmission interference
9.    ATM power outage
10.   ATM communications infrastructure outage



Comparison of Solutions
                                                              GPS            RFID    Bluetooth
Cost of On-ATM device                                         None          Medium    Medium
Cost of On-guard device                                       High           Low        Low
Reliability of communication in ATM                           Low            High     Medium
Reliability of communication outside ATM                      High           Low      Medium
On-guard device theft                                         High           Low        Low
On-ATM transmitter/reader theft                               None           High       High
On-guard device tampering                                     High           None     Medium
On-ATM transmitter/reader tampering                           None           High       High
Guard’s device misplaced                                      High          Medium    Medium
Effect of guard leaving device in the ATM                     Low            High       High
Communications network outage                                 High          Medium    Medium
Device transmission interference                              None           High       Low
Effect of ATM power outage                                    None           High       High
Effect of ATM communications infrastructure outage            None          Medium    Medium
Effect of ATM power infrastructure outage                     None           High       High
Range of communication                                        High           Low      Medium

* If the solution uses ATM communications infrastructure




                                                                                             3
Proposed Solution
Bluetooth.

Solution Diagram
Installation




                   Parameter                                       Value
Maximum dimensions of ATM room             15 meters x 15 meters (2500 square feet)
Location of Bluetooth reader               Mounted on top of an ATM machine
Programmable range of Bluetooth Reader     2 meters – 30 meters
Signal interference, if any                Brick walls of the ATM reduce range to 15 meters
Power to the Bluetooth Reader              From the ATM machine’s power
Locations of seating or guard’s presence   Anywhere within the programmable range (15 m)
Installation and maintenance               Included as part of the NorthStar package




                                                                                              4
Usage




       When the security guard carrying the Bluetooth tag enters the invisible area covered by the
        Bluetooth reader in the ATM, the Bluetooth reader detects the tag, its owner and entry time, and
        sends that information, instantly, to NorthStar’s servers
       Alternatively, when the security guard carrying the Bluetooth tag leaves the invisible area covered
        by the Bluetooth reader in the ATM, the Bluetooth reader detects the tag, its owner and entry
        time, and sends that information, instantly, to NorthStar’s servers
       Information is sent over GPRS to NorthStar’s servers, which in turn instantly figures out whether
        the entry/exit is authorized or unauthorized, based on the guard’s shift timing, number of entries
        and exits, etc.
       If any anomalous conditions are detected, such as multiple contiguous entries or exits, or
        unauthorized exits during shift hours or unauthorized entries after shift hours, NorthStar instantly
        sends SMS alerts to 1 or more pre-configured mobile numbers
       If the communication network is temporarily unavailable, the Bluetooth reader caches data in its
        internal flash memory until the network becomes available once again




                                                                                                           5
About Magnasoft and NorthStar


  About NorthStar

  NorthStar is an integrated, wed-based tracking & monitoring solution that ensures the safety & security of
  vehicles, people & assets while they travel. It is backed by SOA-based technologies & powerful tools that
  include the powerful PostgreSQL & PostGIS servers, Apache Tomcat, Spring & Java from Sun.

  With dozens of enterprise customers & thousands of users across the country, NorthStar is India’s most
  mature, time-tested, robust & reliable safety, well-being, identification & tracking system. It has been used
  in well-known enterprises & schools all over India.

  This is a "peace-of-mind solution" that takes into account concerns of users, a

  NorthStar is created by Magnasoft Consulting India Pvt. Ltd. Incorporated in year 2000, Magnasoft
  combines the power of GIS technology with extensive subject matter expertise to implement powerful
  spatial technology solutions that integrate seamlessly with the IT framework of organizations. From data
  capture & conversion to application development, from enterprise integration to Photogrammetry,
  Magnasoft covers the complete gamut of spatial systems.

  Magnasoft is mentored and supported by Global Technology Ventures, a premier venture capital company.

  Contact

  W: http://northstar.ws

  E: northstar@magnasoft.com

  P: 1-800-1-200-COP       (1-800-1-200-267)
  M: 0-99-80-200-885

  Office: +91 (80) 6547-4847

  Address: 33/1 Lalbagh Road, Bangalore 560027, India




                                                                                                                  6

More Related Content

More from NorthStar Magnasoft

NorthStar for School Bus Fleet Owners
NorthStar for School Bus Fleet OwnersNorthStar for School Bus Fleet Owners
NorthStar for School Bus Fleet OwnersNorthStar Magnasoft
 
Requirements for School Buses in India - Government of India, Automotive Indu...
Requirements for School Buses in India - Government of India, Automotive Indu...Requirements for School Buses in India - Government of India, Automotive Indu...
Requirements for School Buses in India - Government of India, Automotive Indu...NorthStar Magnasoft
 
School bus safety rules, guidelines & tips
School bus safety rules, guidelines & tipsSchool bus safety rules, guidelines & tips
School bus safety rules, guidelines & tipsNorthStar Magnasoft
 
School Bus and Child Accidents in India
School Bus and Child Accidents in IndiaSchool Bus and Child Accidents in India
School Bus and Child Accidents in IndiaNorthStar Magnasoft
 
New School Bus Safety Rules by TN govt
New School Bus Safety Rules by TN govtNew School Bus Safety Rules by TN govt
New School Bus Safety Rules by TN govtNorthStar Magnasoft
 
NorthStar School Bus Child Safety Brochure Hyderabad
NorthStar School Bus Child Safety Brochure HyderabadNorthStar School Bus Child Safety Brochure Hyderabad
NorthStar School Bus Child Safety Brochure HyderabadNorthStar Magnasoft
 
NorthStar Hyderabad RTO school bus safety event 15-6-2012
NorthStar Hyderabad RTO school bus safety event 15-6-2012NorthStar Hyderabad RTO school bus safety event 15-6-2012
NorthStar Hyderabad RTO school bus safety event 15-6-2012NorthStar Magnasoft
 
Maharashtra RTO School bus policy
Maharashtra RTO School bus policyMaharashtra RTO School bus policy
Maharashtra RTO School bus policyNorthStar Magnasoft
 
Child attendance using RFID - A case study
Child attendance using RFID - A case studyChild attendance using RFID - A case study
Child attendance using RFID - A case studyNorthStar Magnasoft
 
Business presentation for automobiles
Business presentation for automobilesBusiness presentation for automobiles
Business presentation for automobilesNorthStar Magnasoft
 

More from NorthStar Magnasoft (13)

NorthStar for School Bus Fleet Owners
NorthStar for School Bus Fleet OwnersNorthStar for School Bus Fleet Owners
NorthStar for School Bus Fleet Owners
 
Requirements for School Buses in India - Government of India, Automotive Indu...
Requirements for School Buses in India - Government of India, Automotive Indu...Requirements for School Buses in India - Government of India, Automotive Indu...
Requirements for School Buses in India - Government of India, Automotive Indu...
 
School bus safety rules, guidelines & tips
School bus safety rules, guidelines & tipsSchool bus safety rules, guidelines & tips
School bus safety rules, guidelines & tips
 
School Bus and Child Accidents in India
School Bus and Child Accidents in IndiaSchool Bus and Child Accidents in India
School Bus and Child Accidents in India
 
New School Bus Safety Rules by TN govt
New School Bus Safety Rules by TN govtNew School Bus Safety Rules by TN govt
New School Bus Safety Rules by TN govt
 
NorthStar School Bus Child Safety Brochure Hyderabad
NorthStar School Bus Child Safety Brochure HyderabadNorthStar School Bus Child Safety Brochure Hyderabad
NorthStar School Bus Child Safety Brochure Hyderabad
 
NorthStar Hyderabad RTO school bus safety event 15-6-2012
NorthStar Hyderabad RTO school bus safety event 15-6-2012NorthStar Hyderabad RTO school bus safety event 15-6-2012
NorthStar Hyderabad RTO school bus safety event 15-6-2012
 
Maharashtra RTO School bus policy
Maharashtra RTO School bus policyMaharashtra RTO School bus policy
Maharashtra RTO School bus policy
 
Child attendance with NorthStar
Child attendance with NorthStarChild attendance with NorthStar
Child attendance with NorthStar
 
Child attendance using RFID - A case study
Child attendance using RFID - A case studyChild attendance using RFID - A case study
Child attendance using RFID - A case study
 
NorthStar Brochure
NorthStar BrochureNorthStar Brochure
NorthStar Brochure
 
Asset management in india
Asset management in indiaAsset management in india
Asset management in india
 
Business presentation for automobiles
Business presentation for automobilesBusiness presentation for automobiles
Business presentation for automobiles
 

Recently uploaded

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 

ATM Bank security guard monitoring

  • 1. ATM Security Guard Monitoring Solution using Magnasoft NorthStar AUTHOR: K UNAL ASHAR D ATE: 15-J ANUARY-2012 Table of Contents Business Problem ....................................................................................................................................... 2 Solutions ..................................................................................................................................................... 2 Solution Options ...................................................................................................................................... 2 1. GPS............................................................................................................................................. 2 2. RFID ............................................................................................................................................ 2 3. Bluetooth ..................................................................................................................................... 2 Solution Components .............................................................................................................................. 2 Problems in the solutions ............................................................................................................................ 3 Comparison of Solutions ............................................................................................................................. 3 Proposed Solution....................................................................................................................................... 4 Solution Diagram ..................................................................................................................................... 4 Installation............................................................................................................................................ 4 Usage .................................................................................................................................................. 5 1
  • 2. Business Problem Security guards hired by 3rd party security firms are placed inside or next to ATM rooms belonging to banks. These security guards need to be in close proximity of the room/ATM machine during their entire shift, so as to prevent any theft or tampering. The security firm managing the guards needs a way to ensure that the guards are always at their post, and be alerted if the guards leave their posts. Solutions Solution Options 1. GPS The guard carries a small, battery powered GPS device that tracks his location 24x7. The location of the guard and any movement away from his post are remotely monitored by the security agency over the web, and are also sent as instant alerts over SMS to the security firm. 2. RFID The ATM machine is fitted with a long range RFID (smartcard) reader that is powered by the ATM machine’s power source. The security guard carries a RFID (smartcard) badge or tag that can be read over long distances. When the security guard comes in close proximity of the ATM room, the RFID reader detects the presence of the guard’s tag, and an SMS alert is sent to the security firm. If the security guard leaves the proximity of the ATM room, the RFID reader detects the absence of the guard’s tag, and an SMS alert is sent to the security firm. 3. Bluetooth The ATM machine is fitted with a long range Bluetooth transmitter that is powered by the ATM machine’s power source. The security guard carries a Bluetooth reader or tag that can be read over long distances. When the security guard comes in close proximity of the ATM room, the Bluetooth transmitter detects the presence of the guard’s tag, and an SMS alert is sent to the security firm. If the security guard leaves the proximity of the ATM room, the Bluetooth transmitter detects the absence of the guard’s tag, and an SMS alert is sent to the security firm. Solution Components 1. ATM machines 2. ATM room or building (brick and/or glass) 3. Security guard 4. Security guard’s optional weapon 5. Plastic or metal chair placed in or near the ATM machine or room 6. On-ATM monitoring device 7. On-guard monitoring device 8. 24x7 power to ATM 9. Location of the ATM (in remote areas without cellular coverage) 10. ATM machine communication infrastructure 2
  • 3. Problems in the solutions 1. On-guard device theft 2. On-ATM transmitter/reader theft 3. On-guard device tampering or power discharge 4. On-ATM transmitter/reader tampering or power discharge 5. Guard’s device misplaced, lost or left at home 6. Guard leaves device in the ATM room and leaves ATM room without the device 7. Communications network outage 8. Device transmission interference 9. ATM power outage 10. ATM communications infrastructure outage Comparison of Solutions GPS RFID Bluetooth Cost of On-ATM device None Medium Medium Cost of On-guard device High Low Low Reliability of communication in ATM Low High Medium Reliability of communication outside ATM High Low Medium On-guard device theft High Low Low On-ATM transmitter/reader theft None High High On-guard device tampering High None Medium On-ATM transmitter/reader tampering None High High Guard’s device misplaced High Medium Medium Effect of guard leaving device in the ATM Low High High Communications network outage High Medium Medium Device transmission interference None High Low Effect of ATM power outage None High High Effect of ATM communications infrastructure outage None Medium Medium Effect of ATM power infrastructure outage None High High Range of communication High Low Medium * If the solution uses ATM communications infrastructure 3
  • 4. Proposed Solution Bluetooth. Solution Diagram Installation Parameter Value Maximum dimensions of ATM room 15 meters x 15 meters (2500 square feet) Location of Bluetooth reader Mounted on top of an ATM machine Programmable range of Bluetooth Reader 2 meters – 30 meters Signal interference, if any Brick walls of the ATM reduce range to 15 meters Power to the Bluetooth Reader From the ATM machine’s power Locations of seating or guard’s presence Anywhere within the programmable range (15 m) Installation and maintenance Included as part of the NorthStar package 4
  • 5. Usage  When the security guard carrying the Bluetooth tag enters the invisible area covered by the Bluetooth reader in the ATM, the Bluetooth reader detects the tag, its owner and entry time, and sends that information, instantly, to NorthStar’s servers  Alternatively, when the security guard carrying the Bluetooth tag leaves the invisible area covered by the Bluetooth reader in the ATM, the Bluetooth reader detects the tag, its owner and entry time, and sends that information, instantly, to NorthStar’s servers  Information is sent over GPRS to NorthStar’s servers, which in turn instantly figures out whether the entry/exit is authorized or unauthorized, based on the guard’s shift timing, number of entries and exits, etc.  If any anomalous conditions are detected, such as multiple contiguous entries or exits, or unauthorized exits during shift hours or unauthorized entries after shift hours, NorthStar instantly sends SMS alerts to 1 or more pre-configured mobile numbers  If the communication network is temporarily unavailable, the Bluetooth reader caches data in its internal flash memory until the network becomes available once again 5
  • 6. About Magnasoft and NorthStar About NorthStar NorthStar is an integrated, wed-based tracking & monitoring solution that ensures the safety & security of vehicles, people & assets while they travel. It is backed by SOA-based technologies & powerful tools that include the powerful PostgreSQL & PostGIS servers, Apache Tomcat, Spring & Java from Sun. With dozens of enterprise customers & thousands of users across the country, NorthStar is India’s most mature, time-tested, robust & reliable safety, well-being, identification & tracking system. It has been used in well-known enterprises & schools all over India. This is a "peace-of-mind solution" that takes into account concerns of users, a NorthStar is created by Magnasoft Consulting India Pvt. Ltd. Incorporated in year 2000, Magnasoft combines the power of GIS technology with extensive subject matter expertise to implement powerful spatial technology solutions that integrate seamlessly with the IT framework of organizations. From data capture & conversion to application development, from enterprise integration to Photogrammetry, Magnasoft covers the complete gamut of spatial systems. Magnasoft is mentored and supported by Global Technology Ventures, a premier venture capital company. Contact W: http://northstar.ws E: northstar@magnasoft.com P: 1-800-1-200-COP (1-800-1-200-267) M: 0-99-80-200-885 Office: +91 (80) 6547-4847 Address: 33/1 Lalbagh Road, Bangalore 560027, India 6