RFID technology is rapidly gaining ground in the access control industry. One
area where it can provide significant advantages is in vehicle access control.
Cars, trucks, or other vehicles‐‐even forklifts in warehouse environments‐‐can
be tagged with passive RFID transmitters. When a restricted area, or a parking
lot entrance, is approached, a reader at the site accesses the tag. If the
vehicle is authorized, the gate opens and it is allowed to pass.
Parking lot operators, whether public or private, face a number of challenges
1. The inability to accurately and intelligently identify, collect and
record the data of the vehicles that enter and leave the parking lot then
processing this data to better analyze traffic patterns and facilitate client
2. Need to increase the security (and user integrity) of the parking lot.
3. Adding human resources, especially in peak traffic times that burdens
operating costs and reduces profitability.
4. Line-ups created for parking payments, especially during peak traffic times
that reduces the service levels to customers.
Aadi has launched an intelligent parking control management system that
integrates RFID technology, automatic control technology and applications
software. The RFID tag on the vehicle will be able to automate the in and out
privileges of the subscriber and then transfer this data to the enterprise
software for the above‐mentioned benefits of traffic analysis that allow you to
optimize the human resources needed for traffic flow in and out. For customer
payment, the RFID tag can be read to debit a pre‐pay system or charge the
parking services against a credit card. All of this will facilitate customers
entering and leaving and this improves service levels and increases capacity in
the parking lot. These benefits will drive higher revenues.
This intelligent parking lot system is composed of RFID tags (for the vehicles),
readers stationed around entry and exit points, applications software (that can
be customized for your specific needs) and then networked using TCP/IP network
communication protocol. The system is flexible to allow a human interference, if
necessary, to be able to accommodate unusual events such as when the non‐tagged