Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Unattended Equipment Loan System?

Cliff posted more than 9 years ago | from the break-free-from-the-checkout-desk dept.

Hardware Hacking 63

captnitro asks: "I run a small media lab for a department at a large public university. We have about 120 faculty and and equal number of graduate students who from time to time need things like digital cameras, video equipment, projectors, EyeOne units, and so on. (While there is a central location on campus for students, faculty and staff to get some of this equipment, we stock a few specialized pieces that our faculty need.) Since I'm out of the office a lot, I'm looking for a clever way of loaning out equipment that doesn't involve me being there and is secure enough that our administrators deem it "theft resistant" enough to implement. I've looked into small safes with PINs, or card readers (all faculty have IDs with magstripes), blah blah blah, but most of these are prohibitively expensive, so I'm thinking of hacking something together myself.. though I have no idea how I'd do that. Any thoughts?" Solutions could range from the clever and mixed tech (cheap locked boxes with combinations sent through encrypted e-mail), through high tech (use of the existing ID cards system) to unlock delivery boxes. If you were going to set up a system like this, how would you do it?

cancel ×
This is a preview of your comment

No Comment Title Entered

Anonymous Coward 1 minute ago

No Comment Entered


Not possible. (-1)

skinfitz (564041) | more than 9 years ago | (#11775445)

You are loaning out things that people can pick up and walk away with. How are you going to stop theft..? The biggest problem with loaning portable equipment is not loaning out the equipment, it's making sure it comes back in one piece if at all.

Not all problems have a technological solution. This is one of them. Well, not until we have functional artificial intelligence built into artificial life forms that can do everything humans can.

How I would solve the problem? Hire someone to look after the gear and deal with loans.

Re:Not possible. (1, Interesting)

Anonymous Coward | more than 9 years ago | (#11775479)

[quote] You are loaning out things that people can pick up and walk away with. How are you going to stop theft..?[/quote] That's just silly. You stop theft by knowing exactly who took the gear. Most thieves prefer not to leave their identity.

Re:Not possible. (0)

Anonymous Coward | more than 9 years ago | (#11775504)

I don't know about you but I've had people borrow equipment only to have it 'stolen' from them by burglars. We strongly suspect this to be a lie, but try proving it.

Re:Not possible. (0)

Anonymous Coward | more than 9 years ago | (#11775599)

"That's not my problem, it's yours. Return the equipment or pay for it!"


Re:Not possible. (1)

Fizzl (209397) | more than 9 years ago | (#11775903)

Simply ask them for a copy of their police report of when they filed the burglary.
This is required when someone loses some company property here.

Re:Not possible. (1)

alienw (585907) | more than 9 years ago | (#11777006)

Dude, it's an AUTOMATED system. How do you figure out who borrowed it last? Who is going to verify the person's ID? This is just asking for abuse.

Psychology (4, Interesting)

snooo53 (663796) | more than 9 years ago | (#11777179)

I have to disagree. There are psychological ways of stopping theft that are probably more effective than technical ways (or at least complementary to them). Anyone determined enough can find a way around technical safeguards... your goal should be to make them stand out like a purple cow!

-I think the best is simply putting whatever solution you have in a highly visible area, like in a commons area. It's rare that you see a car broken into right in front of the entrance to a store, where everyone can see it.

-Lock it up at the end of the night, by putting a cage around it.

-Put a sign up, "This automated rental system generously donated by (whomever gave you a few bucks to implement this)".

-Have a loud alarm that sounds if it is broken into.

-Put up a camera inside, and have one in a separate location facing the person so everyone who uses it can be identified. Or at least a sign saying "This machine under electronic surveillance".

The key here is not to making it technically impossible to steal something, but to strongly discourage it. And to make it more likely to identify someone who does manage to break into it. You know those signs around military areas that say "Use of deadly force authorized"? Do you really think they put them up because they intend to shoot to kill everyone who wanders in there? Absolutely not. Psychology is a very powerful tool- use it however you can.

Re:Psychology (1)

nine-times (778537) | more than 9 years ago | (#11779738)

The key here is not to making it technically impossible to steal something, but to strongly discourage it.

Good point, especially since that's pretty much how "security" works. You make the prospect of doing something "bad" seem scary and dangerous to those who don't know what they're doing. For those who do know what they're doing, you're just hoping the risk:reward ratio will be high enough that they won't bother.

Re:Psychology (0)

Anonymous Coward | more than 9 years ago | (#11780553)

You know those signs around military areas that say "Use of deadly force authorized"? Do you really think they put them up because they intend to shoot to kill everyone who wanders in there?


Re:Psychology (0)

Anonymous Coward | more than 9 years ago | (#11782914)

> You know those signs around military areas that say "Use of deadly force authorized"? Do you really think they put them up because they intend to shoot to kill everyone who wanders in there?

Cross one of those lines and find out.

I suspect we won't be reading about it on Slashdot unless you left your l:p in your will with specific instructions.

simple solutions are the best (1)

RMH101 (636144) | more than 9 years ago | (#11775483)

leave the keys with security, who are there 24x7. get them to authenticate (i.e. look at their ID card) and unlock the kit.
get them to sign an agreement that their department gets billed if they bring it back late, as well.

Re:simple solutions are the best (0)

Anonymous Coward | more than 9 years ago | (#11775611)

se-cu-ri-ty ? What (or who) are you talking about?

Re:simple solutions are the best (1)

RMH101 (636144) | more than 9 years ago | (#11811983)

in that case, do nothing: just wait. give it a few months and there won't BE any kit to loan.

RTFS! (3, Interesting)

biglig2 (89374) | more than 9 years ago | (#11775552)

Did you read what he was asking at all?

He wants to have the equipment available to people who have authenticated themselves.

If the people abuse it after that, it's a seperate problem.

By your theory, we should secure our boxes by delting all the accounts, since if you have an account a bad person might log in and do something bad to our box!

Re:RTFS! (2, Insightful)

gstoddart (321705) | more than 9 years ago | (#11779883)

He wants to have the equipment available to people who have authenticated themselves.

If the people abuse it after that, it's a seperate problem.

Well, I seriously doubt you're going to get a long-term viable solution that leaves it up to the honour of the people if there is no-one in attendance.

I know that even in corporate offices where you need a swipe-card to get into the cube farm, things will disappear from peoples desks. When your co-workers might steal your laptop, an honour-system for borrowing the really cool kit is going to hurt.

I advise the draconian/inconvenient policy, or in about six months you'll no longer have stuff to track for lending.

Re:RTFS! (1)

Random832 (694525) | more than 9 years ago | (#11781075)

who are you replying to? you should quote - apparently slashdot deleted the comment you're replying to

Pay Someone (4, Insightful)

miyako (632510) | more than 9 years ago | (#11775603)

Seems to me that the easiest solution would be to higher someone, say a student, to work checking stuff out. Any sort of authentication system that's based on the id cards is suseptible to theft if someone steals someone else's id card. Having a system where someone can email a request for equipment might be workable, but I suspect that it would end up costing quite a bit of money just for that many safes, plus the hassle of resetting the combination every time someone checks something out. One thing you might consider is just putting a card reader on the door that's tied to the lock, and then putting a security camera in the room. Even if you don't have the time to actually go through all the tapes, being on camera can be somewhat of a deturrent.
Also remember that any system you implement to check out equipment also has to make it easy to return equipment. This means that automated solutions need to not rest combinations or whatever until the equipment is returned.
Also, if you choose to go with a technology solution, remember that even if it seems expensive, think of the cost of the equipment that could be stolen, or the cost of paying someone to man the desk.

Re:Pay Someone (3, Insightful)

bbrack (842686) | more than 9 years ago | (#11776275)

The school I attended had a 3-4 people that could check out projectors/laptops/etc.

The first was sys admin for the department's computers. The others were the 2-3 students that ran the stockroom (EE, so all the students needed to check out scopes/supplies for their labs).

Even if your department doesn't already have students working in this capacity, if the department you work in has >120 faculty, it should not be difficult to justify a $5/hour student assistant.

For checking things out, it was a simple checkout sheet that the person checking things out would put their name/id number on, and they and the person manning the stockroom would sign. The solution may not be high-tech, but it does have the benefit of helping out a few students with some extra money (which they always need), and keeping you more involved with students (which is the kind of thing that will improve the chances the students recommending your school, assuming you are fairly nice to them)

Re:Pay Someone (0)

Anonymous Coward | more than 9 years ago | (#11777132)

Yeah, a student worker is definitely the way to go. That's the beauty of working at a university - the student body provides cheap labor :) Just put in a camera to make sure the student and his/her buddies don't steal from you, too...

Re:Pay Someone (0)

Anonymous Coward | more than 9 years ago | (#11780360)

What if I want to lower someone, say into a pit of lava, for using "higher" instead of "hire"? Can I get a geology student to do that?

Re:Pay Someone (1)

magarity (164372) | more than 9 years ago | (#11787059)

higher someone ... to work checking stuff out.

I dunno if it's possible; that job sounds pretty low on the totem pole, so to speak.

RFID tags? (1)

Aggrajag (716041) | more than 9 years ago | (#11775609)

I guess they could be used to track the movement of your equipment.

Re:RFID tags? (1)

magarity (164372) | more than 9 years ago | (#11787080)

they could be used to track the movement of your equipment.Yes, if you can get a reader within a few feet of wherever a would-be theif has stashed it. RFID tags work well to tell when they move from a secure location through a sensor equipped door. Once you get out into an open area, like a college campus, they disappear for all practical purposes.

Q-cat. (3, Insightful)

Neck_of_the_Woods (305788) | more than 9 years ago | (#11775613)

You guy remember those? I have seen many ways people have used them to do inventory.

http://cuecatastrophe.com/mirrors/Default.asp?pg =3

I would do a 3 step process here. I will assume you have mag strip access to rooms on these cards. Should not be to much of a strech to have one set up on a storage door for access. Here you have a access control list for that door and limit your pool of people with access.

Then barcode all the equipment, set up a little web site that allows people to "request" to check out a piece of equipment online. Use the qcat, after getting past the access list for room access at the door, they scan the piece they are checking out. This time stamps the equipment for you as a check out and return. When they return the equipement they scan it again, and this removes it from the webpage as a "checked out" iteam. Thus giving a running list on the website of things that are "in".

Finally, set up a cheap webcam (thinkgeek has for 200 that is ip based with webserver) to write to disk on a computer in anouther room. This is your safty net for "nothing was scanned, but we have billy bob on tape slinking out with the digital camera. Here are the door scan logs from 12:03 am, and here are the logs where he did not scan it out. Also, he did not request this iteam via the web page. Get a ROPE!"

I think this pretty much covers your ass, gives them access to the equipment, and allows for an automated check in, check out, and what is "in stock".

Best of luck.

Re:Q-cat. (0)

Anonymous Coward | more than 9 years ago | (#11779912)

And who do you blame when someone scans something out, but also sneaks a few things out in their pockets? I like your idea, but with the size of electronics today, it would be easy to hide them from view of the camera. One way I can see around this problem is to put each item into an individual lockbox, then have a key chained outside the room, then it would be difficult to sneak anything out, and you would notice anoyon trying to open boxes while in the room.

Low-tech solution (2, Insightful)

Tux2000 (523259) | more than 9 years ago | (#11775660)

Get an assistant (some first-year student), and pay him a few bucks for doing your job.


Re:Low-tech solution (2, Informative)

biryokumaru (822262) | more than 9 years ago | (#11775779)

dude, as a college freshman, i can whole heartedly say that that job would kick ass, and i'd do it fer just about minimum wage!

Re:Low-tech solution (1)

tverbeek (457094) | more than 9 years ago | (#11777822)

This is precisely the sort of thing that the phrase "student employee" was coined for. You don't need to pay them much, because for the most part they'd be doing their homework, surfing porn, or whatever else they'd be doing during that time. So you get a cheap but intelligent "authentication and monitoring system", they get a few extra bucks for beer and pizza, the folks checking stuff out get more personal service than some goldbergian encrypted-keys-and-biometrics system... everybody wins.

it can be done (2, Informative)

jjshoe (410772) | more than 9 years ago | (#11775715)

Yes, find the problems with what he's asking and completely ignore the question.

1) Magstrip reader (no link) -- used to read the id of someone at the door
2) Computer (no link) -- used to tell who is at the door.
3) Electronic door strike (http://www.audioimpact.net/EDS300_EDS300_ELECTRON IC_DOOR_STRIKE.asp [audioimpact.net] -- When validated by the pc current is sent to the door strike to unlock the room
4) Webcam (no link) -- takes pictures of whoever is entering using motion sensing software

Issues -- power outage -- room remains locked. Entrance can be aqquired by using a key.

Issues -- Damanged equipment -- look at who has checked it out last by checking the mag stripe log and the webcam.

Issues -- Damaged equipment -- "Someone before me broke it", make it well aware that they should test it BEFORE they leave the room with it.

Re:it can be done (3, Insightful)

jim_redwagon (845837) | more than 9 years ago | (#11776844)

Exactly, let's call someone lazy or some other cynical comment instead of actually coming up with something cool and fun to talk about.

It's not like he mentioned Microsoft. ;-)

I personally like the home built approach. Why not have a locked room that can be entered by swiping University ID (these must be in place already in the school). Lockers containing the items to be loaned with magnetic locks line the walls. (Maybe include RFID tags as backup?) Someone out there I am certain can write a simple SW program that uses the persons University UID and PWD (nothing new to learn) to authenicate them. Once in the system, they see the current status of items available to loan, pick what they want from the list (maybe even include a request functionality?) Hit a Submit button and VIOLA! (that's waaaa-laaaaaaa to you) the magnetic lock opens and hey! i can pick up my piece of equipment 24/7.

Now, let's hear how those with the expertise would implement it instead of sniping about off-topic BS.

Re:it can be done (1)

jjshoe (410772) | more than 9 years ago | (#11779074)

RFID still uses electricity. Passive tags need to get power from the reader.

benefits) Each individual item is checked out
drawback) AV equipment and the medium it uses probably shouldn't have exposure to the electromagnet that would keep it locked into place.

admittly i don't know much about the electromagents that are used in door locking situations. wouldn't a power outage cause them to let go?

Re:it can be done (1)

technos (73414) | more than 9 years ago | (#11801106)

Depends on the type of door and they type of lock. Most doors with true magnetic locks (Electromagnet on metal plate) are entry/exit doors. They use a 120v relay coupled electromagnet to pull on a metal plate on the door frame. This design works well for entry/exit doors, because when depowered, it leaves the door open, for people fleeing from a fire, going home, etc.

Most other "magnetic locks" are mixed electromechanical. They use a permanent magnet to hold the door plate, and a 12v solenoid to move the magnet out of the range of the plate. These can either open or close on power-off, by design.

Re:it can be done (1)

Guru2Newbie (536637) | more than 9 years ago | (#11794163)

Hit a Submit button and VIOLA! (that's waaaa-laaaaaaa to you) the magnetic lock opens and hey! i can pick up my piece of equipment 24/7.

That sounds like you're picking up a small stringed instrument in the Music Department (not the French Dept.)

Re:it can be done (1)

jim_redwagon (845837) | more than 9 years ago | (#11812382)

ok, after reading this 3 times, i finally got it and it cracked me up!

nice to see someone with a sense of humor here!

have a great day!

Our uni library has this (2, Insightful)

Kris_J (10111) | more than 9 years ago | (#11775726)

The books have a magnetic security strip and a barcode. You have a swipe-card (I think with a barcode too). You swipe your card, scan the book and the machine then demagnitizes the book. If you don't check it out, the alarm goes off at the door.

Re:Our uni library has this (0)

Anonymous Coward | more than 9 years ago | (#11790861)

yes, but you could attach a tag to the camera with the mag chip (is that what they are called) on it. Also have a security camera so if you find a detached tag lying on the floor you can see who was in there ripping them off of the equipment

Can you say "library"? (4, Insightful)

unitron (5733) | more than 9 years ago | (#11775964)

Yes, I know you asked for an "unattended" solution, but I'm sure that your university is already paying lots of money to run a library where people can go to check out other stuff, so make your stuff part of what people can check out at the library, provided, of course, that they can prove to the library staff that they are authorized to check out these items. Transfer a small amount of your department's budget to the library to cover their extra expense and it'll probably be by far the cheapest way to go and you get to take credit for saving them a lot of money.


Anonymous Coward | more than 9 years ago | (#11776557)

Solve technical problems with technology; solve social problems socially.

There is no technology that is going to remove the possibility of someone walking away with your stuff illegitimately that won't also piss of the people you are serving. No one is going to want to learn another password, another process, and another set of rules and regulations because you are too lazy to do your job or too cheap to pay someone else to do your job.

Simplest solution:
1. Put aside 3 hours per week in which you guarantee that you will be in your office.
2. Tell your users, customers, clients, whatever that if they come at those times, they will be able to get the resources you offer; any other time is a gamble.
3. Stick to it.

People will be happy they don't have to track you down anymore; you will be happy because you will spend less time per week babysitting equipment.

Perfect solution (0, Redundant)

DarkKaplah (861495) | more than 9 years ago | (#11776749)

Hire a student to do this. I was a student in a university and I'm rather erked at the number of jobs that used to be for work study, and are now being phased out thanks to half baked tech replacements. A homemade system will never be as secure as having a human being there to verify ID and record who checked out what. A work study student would cost you nothing, and give someone the ability to collect their financial aid. Why are we trying to replace jobs a person could do in a recession?

Re:Perfect solution (1)

jim_redwagon (845837) | more than 9 years ago | (#11776919)

because maybe that money paid could go for:

A new printer

A new scanner

A new whiteboard

A new computer


The world is not here to provide meaningless jobs just because it 'could'. Doesn't anyone see that problem enough in government? Why perpetuate this bloat?

Also, what is one of the main expenses that stores have? EMPLOYEE THEFT! Do you really think that ANYTHING involving a human is 100% secure?

A play in 3 sentences: Hey, here comes that guy I owe $50. Oh, you want this digital camera? Sure, we can call it even.

Re:Perfect solution (0)

Anonymous Coward | more than 9 years ago | (#11782587)

If you're gonna mod, at least watch what the hell you're doing. Redundant? DarkKaplah posted before this one [slashdot.org], which is at 2:Informative.


Student Workers (4, Insightful)

Wog (58146) | more than 9 years ago | (#11776846)

I'm one of the two staffers for my University's Instructional Technology and Campus Media Office (Whew!) and all I can say is: student workers. We keep 10 or so around for 6-10 hours per week. They take requests, make equipment deliveries, and generally follow our every nefarious whim as far as checking out equipment. The university pays them tax-free $5.25/hour. They love it because %90 of the time they can sit and do homework, surf the web, etc.

It's great for us because we're free to work on more involved projects without worrying that Dr. Smith isn't going to get her LaserDisc player on time. Student workers are also neat to have around.. We maintain a very casual, but very efficient, atmosphere in the office.

While what you're doing MAY be possible without human help, I get the feeling that any automated solution will cause you to spend more time babysitting it than doing your job.

Good luck, and don't forget to change the air filters on those projectors!

Depends on social cohesion... (1)

esme (17526) | more than 9 years ago | (#11776852)

I saw a presentation by Gabriele Wienhausen [ucsd.edu] (provost of Sixth College at UCSD) about their "digital playroom". I couldn't find a page for it, but did find a press release [calit2.net] about Sony donating a bunch of stuff.

Basically it's a room that students need to swipe their ids to enter. Once inside, they've got free access to camcorders, digital cameras, lots of computers, etc. I think it's unattended, and open very long hours (24/7 during finals).

The key is making the students feel like the equipment is theirs, so taking it would be stealing from their friends. Otherwise, any unattended system is going to be plagued by theft.


What about damage? (1)

zymurgy_cat (627260) | more than 9 years ago | (#11776939)

While this may sound like a neat project, there's one fundamental problem: You can't assign responsibility for damage. Suppose 3 people check out an item over a week. When the manager/IT guy/whoever checks it and notices damage, how do you know who did it? Obviously, if someone does something apparent, the next user will notice. But even then, the person who broke it can simply say, "Yeah, I noticed that when I checked it out. I forgot to report it."

You still need a human to check stuff in and out and verify the state of the equipment at check out/in. Otherwise, expect everyone to start pointing fingers. You could simply bill everyone, but that would just tick off everyone.

Re:What about damage? (2, Informative)

jim_redwagon (845837) | more than 9 years ago | (#11777168)

What I and a lot of others are missing from the original post. He's not looking for fool-proof. He said 'theft-resistant' for when he's not in his office.

I think you can do a lot here. I posted ealier about the lockers and the software package. After an item is returned, the poster (or to make you happy a work-study student) would go in and inspect the item, make sure it is in working condition, or track down the last user. He could then update it's status so the next person who takes it out knows they are responsible. Now, someone comes in before the item is manually inspected. The display would read something similar to "Item returned but not inspected". If someone so desperately wants to take it out, they ACKNOWLEDGE they are responsible for it, or they put a request in for the item and get an email once it has been inspected.

He wasn't looking to cure cancer here people, just to get some ideas!

rfid (1)

teddlesruss (163540) | more than 9 years ago | (#11777034)

RFID tags are now pretty cheap, and available in stick-on rolls. RFID readers ditto. Your people have swipe cards. Now:

Person with swipe card operates the door to the hitech store room with their swipe card. PC records their entry. Person takes piece of gear with an RFID tag in it and swipes card to exit. PC records their exit, and RFID reader records the RFID of whatever gear they just took out.

Yes it's still possible for a second person to get in when someone else opens the door, or someone could take off the RFID tags somehow, but then every system has some way to get around it.

Internal website calendar/appointment system (2, Interesting)

Linuxathome (242573) | more than 9 years ago | (#11777925)

Sounds like you could use an internal website with a calendar to schedule [google.com] loan times. In fact, I was looking into such a system for my department. Unfortunately, google is inundated with non-open source (read: non-free) software. But if you find one that suits you (or develop a site yourself) you could advertise the "office hours" when you will be there for equipment pickup and allow people to login and sign up for equipment in available time slots. That way, you have a digital record of who has what AND it's automatically logged and blocked off so others can work their schedule around it without involving you (that's the most important part). Make it a policy that if they haven't logged their loan request in the system, then they can't take the equipment. If you have the site developed well enough, then with this policy you minimize ID fraud since the criminal not only has to have the right personal ID card, but the would have to know the login and password for the appointment system.

I realize that I haven't given a suggestion on how to NOT be there in person when lending the equipment out, but I'm in line with the other suggestions that you should hire an underling to do it if you can't do it--that's most cost effective.

In my university, the IDs are now smartcards. Assuming that you also have this system, you could possibly use a smartcard reader for access to a secure room (ask the facility staff to do this). A smartcard reader [google.com] on a PC with a barcode reader (to scan a barcode on the equipment, you do use barcodes for inventory management don't you?) could possibly be used to log the actually equipment transaction without you being there, but that's still insecure and takes staff training, yuck.

Airport/train station lockers? (1)

JohnQPublic (158027) | more than 9 years ago | (#11778099)

I've looked into small safes with PINs, or card readers (all faculty have IDs with magstripes), blah blah blah, but most of these are prohibitively expensive, so I'm thinking of hacking something together myself.

I have no idea what the cost situation is, but have you looked at the sorts of lockers that are (or were, at least before 11 Sept 2001) common in airports and train stations? Not the "drop a quarter in and take away the key" type, they've been around for 50 years or more. Rather, the ones that have interfaces for non-cash transactions. Combined with the smart-cards you've got, and with each item in its own locker, you could probably get a decent system put together from off-the-shelf parts.

Equipment is too high value (1)

Paul Crowley (837) | more than 9 years ago | (#11779793)

I don't think there's a good solution for equipment of the value of the equipment you're talking about.

If you were loaning out stuff that was all worth less than a hundred dollars, I'd have something like this: card swipe on the door, camera watching the whole room and another camera for closeups (both record 24/7 to disk), and electronically closeable rings on shelves. To loan the equipment, just swipe yourself in and pick it up. Your card swipe will unlock the equipment you've booked. Show it to the closeup camera (so that you don't get blamed for any damage already on it) and take it away.

When you return it, show it to the camera again (for the same reason) and lock it back in.

You could add a keypad to the swipe reader.

I don't know of an inexpensive source of electronic locks though - that could be the killer.

Linux koisk, LDAP (1)

Game Genie (656324) | more than 9 years ago | (#11780543)

I'd set up a Linux koisk with a phisically secured connection to lock boxes. Mirror trusted users' data from your university's existing authentication server for authentication. Just make sure to set up your firewall to not accept any external connections.

Office Hours (1)

MagicDude (727944) | more than 9 years ago | (#11781502)

I don't know whether your job description would allow this, but you could have a system of "office hours" for checking out and returning equipment. Say something like you'll be in the office from 8-9 in the morning and then again from 4-5 in the afternoon (and maybe during lunchtime too). People can submit their requests by E-Mail or other means ahead of time and you'll have it prepared the next morning, or they can come in during the appointed office hours to make a request in person. Professors do this all the time; it is their job to teach students, but they have other things to do as well, and they don't see it useful to committ their entire schedule to the possibility that a student might want to see them at any given moment. So they make office hours 2-3 times a week. They also tell the students that they are welcome to drop by his office whenever they want, and if he's in he'll answer whatever questions they have, but he doesn't make any garuntees outside of the times he's specifically mentioned.

Re:Office Hours (1)

mehu (92260) | more than 9 years ago | (#11785833)

Our cinema department has something similar to this set up for checkout of cameras, editing equipment, etc. There's an 'edit cage' which is open during set hours (9-11, 12-2, 4-6) and staffed by student workers (not sure if they actually get paid or just get credits). Professors & Grad students (who are apparently more trustworthy) have the keypad code to the door, so they can get/put back stuff whenever (I'm sure there's a camera as well). Everyone else fills out a form of what they're checking out & leaves their ID, which they get back when they give the stuff back, and everything can be accounted for & checked for damage, etc.

As posters above have pointed out, laptops get stolen from "secure" (keycard to enter) offices all the time. Having expensive equipment unattended is just asking for trouble.

not sure the scale of equipment you are looking at (1)

way2trivial (601132) | more than 9 years ago | (#11782345)

But, my off the wall idea is similar to the chains on shopping carts.. around here, you insert a quarter, or some places, a #'d tag into a slot, and the lock pops open, they are mainly used to keep carts from flying all over the lot..
--you don't get your quarter back until you put the cart into another cart or other spot with available chains... they don't have to be quarters.

Do these devices have kensington slots? run the cable on the kensington slot (or weld some cables on) and issue unique tokens/keys that are left behind when someone unlocks an item.. something awol? pull the tag and see who's it is.

in my search for examples to include, I also found this potentially applicable site
http://bike.hampshire.edu/development/summary/ [hampshire.edu] about setting up community bikes & security..
skim it, they cover mechanical to electrical to complex tracking.

4 steps: (1)

La Camiseta (59684) | more than 9 years ago | (#11786192)

  1. Find a student employee that you trust, better yet, find a couple.
  2. Lock the equipment in a cabinet with the only people having keys being you and those whom you trust.
  3. Set up a system whereby everyone who wants to borrow the equipment has to sign it out with either you or one of those individuals whom you trust.
  4. Make sure that you get a copy of some photo ID of them and make them sign a document stating that they take full responsibility for any damages/thefts of the equipment (kind of scares them into taking care of it).

Sure technology is cool and all, but sometimes the old-fashoned ways just work better.

Here's what I did... (1)

igrp (732252) | more than 9 years ago | (#11787406)

I realize I'm a little late here but I did implement a system a while ago, that you may find interesting.

Basically, we needed a way keep track of what employee used what vehicle out of the company car pool at what times (some trusted employees are supposed to have access to the company cars for official business).

I had a safe installed in a dedicated room, inside the office. All employees have RFID and/or swipe cards for access control to the building. There's a seperate card reader that controls access to the room and a surveillance camera inside.

The system works basically by reading an ID number off of a swipe card, then prompting for a PIN (pretty much like an ATM would -- we used a standard PC for that but only the number pad is accessible). The ID # and the PIN are compared to what's stored in a database.

If the PIN matches what's on file for that ID number, the door of the safe opens and a the number is then logged to a read-only system (this is the logging host which is reasonably secure since it's not connected to any network and does nothing but append a logfile). Unsuccessful attempts are also logged. The account lockout counter is set to a reasonably low amount.

All the keys are on keychains that have a magnet on them. If you take a car key out of slot #1 (all the cars are assigned slots), the system logs it. When you return the key, you insert it into the same marked slot (ie. #1), the system registers and, consequently, logs it.

Bear in mind though, that this only works because we have a trusted group of users. You need to be inside the building and inside the safe room, to actually access the keypad. And there's nothing to stop an employee from taking all the keys at once except that the fact that they can easily be identified, terminated, sued and criminally prosecuted.

The system itself is pretty simple. Two old PCs (one database server that does the processing and one logging host). The safe is pretty standard (I don't remember who we bought that magnet system from though).

HTH a bit. :)

Check for New Comments
Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Sign up for Slashdot Newsletters
Create a Slashdot Account