It is possible to read the UHF band RFID tags attached to products and managed assets when passing through the RFID smart gate, allowing for the detection of unauthorized removal.
★Application Areas: - Monitoring of loaned items in libraries and rental shops - Prevention of unauthorized removal of important assets (confidential documents, contracts, etc.) - Theft prevention of high-priced items - Prevention of mix-ups with pharmaceuticals and medical devices
Inquire About This Product
basic information
- By performing RFID tag reading control and filtering processing at the gate side, the design reduces network load. - Up to 10 RFID smart gates can be controlled by a single control PC. - RFID tags that pass through are read to detect unauthorized removal. - When unauthorized removal is detected, warnings are issued via LED lamps, buzzers, or voice alerts. - In addition to warnings at the gate, pop-up displays can also be shown on the control PC. - Control is possible to emit radio waves only when a person passes by, using a human sensor (radio wave emission can be turned ON/OFF with a button in the control application).
Price range
Delivery Time
※The delivery time may vary depending on the quantity, so please feel free to contact us.
Applications/Examples of results
- Monitoring of borrowed items at libraries and rental shops - Unauthorized removal of important assets (confidential documents, contracts, etc.) - Prevention of shoplifting of high-priced items - Prevention of mix-ups of pharmaceuticals and medical devices
catalog(2)
Download All CatalogsNews about this product(1)
Company information
We will enhance our manufacturing capabilities that can be used with peace of mind, and contribute to the efficiency of customer operations (DX) in the social infrastructure sector, where labor shortages are becoming serious, by providing our unique data collection platform for objects, centered around our expertise in technologies such as RFID. (1) Application of UHF band RFID tags, along with technology for detailed management of items using our own antennas and RFID readers/writers, as well as management technology for the handling of tools and keys and asset inventory. (2) Wireless (LTE, WiFi, BLE) connection with various sensors (human presence, temperature and humidity, current, GPS, weight) through various interfaces (LAN, RS232C, RS485, Zigbee), enabling wireless sensor technology applicable indoors, outdoors, and in vehicles. (3) Development of facial recognition terminal "Noctua" and access control management system to enhance security in offices and buildings. (4) LTE-compatible edge control technology equipped with IoT interfaces such as LAN, serial (RS232C, RS485), USB, and running Linux applications.