SCANIN SYSTEM

A privacy focused data collection, asset tracking, and big data analytics platform to help you get the business data essential to making smart, informed decisions. 

The ScanIn System is a highly scalable, privacy-focused RFID based tracking to track a students' path through the university and aid in capital planning, thus leveraging large data sets to predict changes in workflow.

ScanIn System is designed to provide a complete heat map of RFID tags. While our local partners enable us, the platform is designed to be fully functional on its own, addressing the security needs of many institutions that are already operating in this space. These schools will benefit from having all their data aggregated and stored in a central location, where it can be utilized for planning purposes without compromising student privacy. With access to detailed information about how people move through campus, they’ll be better equipped to make informed decisions about capital spending decisions, further supporting student success with each new innovation.

Features

Smarter Spending

We provide administrators the data they need to quantify large infrastructure spending on campuses.

Privacy Focused

Using our technology, a tag is only accessible at a certain location when a scanner picks it up, not all the time

Data Aggregation

All data is aggregated into a beautiful modern UI to view any time of the day to make your life easier.

How does RFID protect students’ privacy?

How does it work?

RFID systems are made up of three parts: a scanning antenna, a transceiver, and a transponder. Every student, instructor, or parent associated with the institution is often given an
RFID card. Certain antennae are placed around the school campus to check for these cards every time this area is entered, such as the library, a classroom, or the school in general.

A well-planned system of power and communication connections will connect the antennas to RFID readers and a power supply. The RFID scanners are then linked to a computer, where the data is recorded and processed in a database. This computer will be linked to a student
information system, such as Cluster, where you will be able to handle this data in any way you see fit.

Principles of Privacy and Confidentiality

Protecting user privacy and confidentiality has always been an important aspect of libraries’ intellectual freedom mission. The right to free inquiry guaranteed by the First Amendment is
dependent on the capacity to read and obtain information without interference from the government or any third parties. Librarians have a professional and ethical commitment to protecting users’ privacy and confidentiality, as well as to preventing the illegal use of personally identifiable information.

RFID Tag Varieties:-

RFID tags are constructed using an integrated circuit, an antenna, and a substrate. The RFID inlay is the component of an RFID tag that encodes identification information.
RFID tags are classified into two types: active RFID and passive RFID. An active RFID tag has its own power source, which is usually a battery. A passive RFID tag, on the other hand, does
not require batteries; rather, it is powered by the reading antenna’s electromagnetic wave, which produces a current in the RFID tag’s antenna. There are also semi-passive RFID tags, which
use a battery to power the circuitry while the RFID reader powers communication.

hardware
89%
comunications
46%
software
100%
end point
77%