Wireless technology empowers visitor management

April 2014 Access Control & Identity Management

As the concern for security with regards to visitor and contractor management to an establishment is quickly taking a priority in the risk assessments of business parks and residential estates, the challenge has always been how to balance the need for useable information through a disciplined methodology of processing individuals at facility entrances, without negatively affecting the flow of valid users onto or offsite. Technology has enabled bespoke visitor management solutions to deal with the shortcomings of the manual book system employed by many facilities worldwide over the past few years.

Portable licence capture devices, for example, enabled to decode the South African National Driver’s Licence and the South African Vehicle registration disc, have proven themselves to be an indispensable asset at facility entrances with their ability to be integrated to the site’s access control system. Integration to these units has allowed for the accurate capture of visitor details into the site’s access control database through Wi-Fi or Bluetooth technology. The data captured by these devices includes the name, surname, ID number, photo and telephone number of the main visitor, the make, model and licence plate details of the vehicle entering the facility as well as the visitor’s destination. No longer will the visitor system have countless records of B. Atman going to see S. Uperman in building X.

When used in conjunction with a Bluetooth printer, security can issue the unauthorised visitors with a small printed docket with an access code and facility details to be used onsite.

One-time PIN

One-time PINs or visitor personal access code systems use an Internet to GSM service to request a personal access code (PAC) for authorised visitors. Codes are requested by registered users by sending an SMS to a WASP short code system (e.g. 36060) with the visitor’s details. The WASP system replies with an SMS containing a random code which the registered user can then forward to their visitor to use at the entrance of the facility.

To add to the security of the facility, the system will SMS the user once the visitor enters the facility and the code used by the visitor is only valid for a single entry and exit thus eliminating any tailgating or re-use of the same code.

In addition to the SMS option, some systems have incorporated a Web interface that runs both in an intranet and Internet environment. With the same principles applying to this Web interface as it does to the SMS system, users log in using their registered email address and can request single or multiple PACs for their visitors.

On-the-go-enrolment allows the visitor’s information to be captured via integration to the facility’s intercom or CCTV surveillance system. Pre-authorised proximity cards are issued to the visitor to be used at the entry readers and to drop it into an Exit Drop Box to exit the site. All transactions are recorded on both the CCTV and the access control system.

A new trend with this type of visitor management is the linking of a number plate recognition system to the facility’s access control system. The NPR system captures and populates the access system with the vehicle’s details and prompts the system for visitor detail enrolment.

Portable biometrics

Portable biometric enrolment technology will be available imminently and will radically improve the in-lane enrolment process with minimal inconvenience to the prospective visitor. This biometric technology will take visitor management to a whole new level of security.

John Powell, MD of Powell Tronics.
John Powell, MD of Powell Tronics.

Historically these solutions were both costly and inflexible resulting in prospective users battling with the return on such a grand investment. As technology has in general become more easily available and affordable, major improvements in functionality and the undefined capabilities of customisation have opened the doors for various integrations to cater for all aspects of the business from security to marketing. A need from management requiring important statistical information from their access systems, can now be retrieved from these devices and their relevant integrations.

Ultimately, with the amount of variations to the standard access control and visitor management systems available, organisations should establish their business requirements and from there liaise with service providers that partner with knowledgeable distributors that are equipped to assist them with this challenging risk facing their customers.

For more information contact Powell Tronics, 0861 787 2537, marketing@powelltronics.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Luxury residential access
Access Control & Identity Management Residential Estate (Industry)
Clifftown Shore is an exclusive collection of 51 luxury 1, 2 and 3-bedroom seafront apartments and penthouses set within a protected conservation park area, served by CAME’s XiP system and door entry system.

Read more...
From identity to insight
neaMetrics Access Control & Identity Management
Identity outlives technology. When it is trusted, it becomes a foundation for insight and scale. When it is not, every system built on it inherits the risk. Identity quality matters, at both human and system levels, and getting it right is what allows security to endure.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Holding all the cards
neaMetrics Suprema SMART Security Solutions Technews Publishing Access Control & Identity Management
After so many years of offering alternatives to card technology for access control, one could be forgiven for assuming we are all using biometrics or mobile credentials for all our physical and digital access requirements.

Read more...
Inside the RealScan SG10
neaMetrics Access Control & Identity Management Products & Solutions
The SG10 was optimised for speed at every stage, from capture to processing. The result is faster fingerprint acquisition and near-instant response for operators.

Read more...
Unified, AI-powered security platform
Suprema neaMetrics Access Control & Identity Management Surveillance Products & Solutions
Suprema recently announced the launch of BioStar X, its advanced unified security platform. BioStar X unifies biometric access control and video surveillance into a single, scalable platform.

Read more...
Directory of access and identity management suppliers 2025
Access Control & Identity Management
The Directory of Access and Identity Management Suppliers 2026 includes the details of companies that provide products, advice and services to the access control and identity management market.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.