1 / 31

WatchLock Be the first to know

WatchLock Be the first to know. Brussels, July 3-4, 2012. Agenda. Product overview Starcom Setting the lock and monitoring system Some terminology Beta projects. Product overview. WatchLock.

aelwen
Télécharger la présentation

WatchLock Be the first to know

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. WatchLockBe the first to know Brussels, July 3-4, 2012

  2. Agenda Product overview Starcom Setting the lock and monitoring system Some terminology Beta projects

  3. Product overview

  4. WatchLock WatchLock is a unique combination of a high security padlock, GPS locating system and a cellular based communication capabilities that provides real-time event and location information through email, text message and web based application = + +

  5. WatchLock System elements High Security Padlock Communication and positioning Mul-T-Lock C10 Padlock Plastic Housing (IP65) Sensors for status GPS Cellular modem & Antenna SIM Card Battery

  6. Reports and alerts Through SMS or E-mail, and to online application, you are able to get reports for: Pre-scheduled “I am alive” or tracking messages Opening / Closing alerts Location (including in/out of “geo fence”) Missing reporting on the predefined schedule Low battery / battery replaced Impact (optional)

  7. Very simple setup process • Through Installer application, you can define: • The name of the WatchLock • Network information • Frequency of location check and scheduled reporting • Define “geographical fences” (if relevant) • The destination for sending alerts (email / SMS) • All could also be done in a batch mode

  8. Applications On the move • Containers • Service vans • Jewelry and money transportation Gates of wide protected areas • Airports • Ports • Military bases • Large industrial areas Left alone… • Earth movers • Boats • Stores • Warehouses Remote sites • Cellular antennas • Potentially with CLIQ Remote • Water wells • Transformation units

  9. A winning combination of advantages Continuous monitoring of your remote or traveling assets allows quick response to any deviation from routine High level physical security Full audit trail for use in formal documentation Reduce guarding and supervision expenses Prevent theft by both intruders and staff Be the first to know

  10. Important information • Position reading cannot take place without satellite connection (in the future: rough location also through the cellular network) • Reports cannot be sent if: • There is no cellular coverage (information kept in the lock until next connection) • Transmission is blocked by a jammer, aluminum foil etc. But you will get an automatic notification from the server if a report was scheduled but did not arrive after a pre-defined period • Time from event to alert: 2-6 minutes (depending on the network layout) • Minimal recommended size of geographical fence: 250 meters • Packet size for a single alert: 140 bytes • Key control: only HS patented platforms (Interactive+, MT5, MT5+) with local keyways

  11. Watchlock battery life (days) Moving application Report about all events All reports include GPS positioning Tracking (location) according to pre-defined schedule Static application Report about all events No need for GPS reading Send “I am alive” message according to pre-defined schedule * Data is average and based on quality of cellular network and GPS signal reception * Battery consumption increases dramatically in low temperatures

  12. About Starcom

  13. Video

  14. STARCOM The Company • Founded in 2000, privately owned, based in Israel with affiliated offices in Argentina, (South America), Kenya (Africa) and Jordan (Middle East). • Distributes and sells through 113 OEM operators and technology partners in more than 53 countries. • Designs, engineers and supplies innovative h/w and s/w solutions aimed at Telemetries and Fleet Management / Security applications. Constantly • investing in R&D, keeping the company and its solutions up-to-date at the highest technology forefront. • Highly skilled and creative personnel conceiving unique solutions derived from the company’s proven AVL core technology. • We offer 5 lines of products: for Car Locator , for Container Locator, Assets Protection & Management , the as a Personal Tracker. And the KAYLOS as an assets management.

  15. Car Locator HELIOS TRITON RAINBOW WATCHLOCK Be the first to know Personal Tracker Container Locator Assets Protection & Management 15

  16. USA, Mexico, Bahrain, Bolivia, Curacao ,Czech Republic, Ecuador, El Salvador, Liberia, Mongolia, Philippines, Trinidad, Turkey, Uruguay, Panama, Argentina, Colombia, ES, Dominican, Venezuela, Peru, Barbados, Brazil, UK, Spain, Italy, Greece, Ukraine, Romania, Serbia, Bulgaria, Russia , South Africa, Kenya, Nigeria, Ghana, Tanzania, Cameroon, Morocco, Libya, Shout Sudan, UAE, Israel, Jordan, Saud Arabia, Kuwait, Kazakhstan, India, Pakistan, Malaysia, Australia, New Zealand …

  17. Setting the lock and monitoring system

  18. Setting the system Installer application • Installed locally on a computer • Used for setting the lock parameters: • Settings for the cellular network • Tracking frequency • GPS frequency • Should be usually done in the factory for all the locks • Could be copied from one lock to many others (save/load) Web application • Running on all browsers • App for iPhone and Android to be released soon (available as demo) • Used for • Registration of the locks to the user (done in the factory) • Assignment of lock information (name, owner etc) • Setting the monitoring parameters • Obtaining reports

  19. Installer: Helios parameters • Logic • Alert on “power on”

  20. Installer: Watchlock parameters Network information • APN, user name, password • To be obtained from the SIM provider Transmission Frequency • Tracking • GPS • Roaming Yes/No Hardware • Location updates • Filter quick inputs

  21. Transmission rate and battery life Transmission: time between tracking signals (“I am alive”) GPS Peek: time between GPS wake-up Transmission should not be “none” The longer time between events, the longer battery life Use the excel file to calculate time between battery replacement

  22. Battery life calculation • Fill in the cells with red frame • Results in the yellow cells

  23. Web application for monitoring Live demo + hands on

  24. Terminology GPRS – General Packet Radio Services APN – Access Point Name GPS – Global Positioning System Roaming

  25. SIM card The SIM card should be a standard 2G SIM (not micro SIM)or a 3G SIM with 2G enabled GPRS package Active No PIN code Open for roaming if needed For the data package size: Transmission should be calculated as 1K.

  26. Beta projects

  27. Why beta? Customer Verify the value for the customer with a small investment and short cycle time Expectations alignment Understand limitations Check the feasibility of the user scenario Set go – no go criteria Mul-T-Lock selling unit or distributor Create internal knowledge Reduce risk, speed-up sales process Create focus

  28. Beta scope Few locks 2-4 weeks Utilize the people and processes that will eventually use the product daily Written project plan and success criteria (agreed with customer) Project manager from Mul-T-Lock side Paid All beta projects should be approved by HQ (Yoav)

  29. Meeting customer expectations Make sure the customer knows what he gets: Define battery replacement frequency and procedure Battery consumption increases in very low temperature. Successful project in July may fail in January There are ways to block the transmission. The customer should understand this, and also understand the solutions we provide to this risk Understand the entire user scenarios and make sure there are no security holes Set alerts only for what is needed, not for what is possible

  30. Beta project template: general info

  31. Beta project template: Project info

More Related