Taking aim at number plate ­recognition

February 2017 Access Control & Identity Management, Surveillance, Asset Management

Hi-Tech Security Solutions’ readers were introduced to GateBook, a locally developed visitor management system last year in the Residential Estate Security Handbook. In the original article we noted that one of the GateBook modules is automated number plate recognition (ANPR), which residential or business estates can use to compare cars requesting entry with a hotlist of undesirables which should be denied access to the estate. Alternatively it can be used to simply keep a record of what vehicles entered and exited the estate and the associated driver’s licences that were scanned.

This is useful, but a limited use of ANPR and Grant Hancock, MD of GateBook, believes the process could be expanded to increase security levels on a far wider scale than an estate. He says traditional ANPR is reactionary and allows you to react after the event, not immediately. SNIPR is different.

GateBook’s ANPR system, SNIPR, is connected to the SAPS database of suspicious vehicles as well as many other sources. These sources can be existing databases of vehicles, live camera feeds, handheld devices and so forth. The system is already integrated into Hikvision LPR cameras.

Once a number plate is received by the SNIPR server, it is compared to the plates on file and on the SAPS database. If it turns out to be a suspicious vehicle, the security teams at estates (or shopping malls, business campuses or anywhere there is a constant flow of vehicles), can be prompted to take the relevant action.

The action in this instance is immediate. A vehicle with a number plate that raises an alarm can be prevented from entering an estate or business premises or, to avoid endangering innocent people, it can be allowed to enter until it is confronted by the police or a security team.

SNIPR can be used with different cameras and surveillance systems, it does not require users to buy special equipment. It can also be used with a management system (like GateBook) that provides step-by-step instructions on what process must be followed when a suspicious number plate is recognised.

Hancock explains that SNIPR is not competing with current ANPR systems as it does not read number plates, but the company has written an API that can interpret number plate information from third-party systems. Hancock says GateBook will write integrations to connect to any third-party systems willing to provide number plates to SNIPR.

The system does not record video footage either, only those images associated with the ANPR recognition, and these images are only stored for a short time.

SNIPR has been put through its paces in a number of pilot environments and is being rolled out to a growing number of organisations.

For more information contact GateBook, info@gatebook.co.za, www.gatebook.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Paxton set to launch game-changing new system
Paxton Access Control & Identity Management News & Events
Access control is evolving fast. Installers and end users are looking for systems that are simple to install, easy to manage remotely, and flexible enough to scale. In response, Paxton is exploring how emerging technologies can reshape access control.

Read more...
Genetec launches Cloudlink 2210
Genetec Infrastructure Surveillance
New cloud-managed appliance addresses the practical challenges when adopting a cloud-managed model at scale, including storage costs, support for devices that do not enable direct-to-cloud connectivity, and the need to maintain local operation during connectivity disruptions

Read more...
Enhancing control room operations
iFacts Security Services & Risk Management Surveillance
As South Africa faces complex and more advanced security challenges, the demand for advanced surveillance solutions, including CCTV and security control rooms, continues to surge, but what about the people in front of the screens?

Read more...
The AI goldrush has a credibility problem
Refraime Editor's Choice Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...
Crime behaviour insights more important than ever
Leaderware Editor's Choice Surveillance Training & Education AI & Data Analytics
Behavioural surveillance skills are as essential now as they have ever been, especially in situations where quick evaluation of context is needed. Training operators in behavioural recognition skills is a vital part of control room success.

Read more...
Security’s three defining forces for 2026
Milestone Systems AI & Data Analytics Surveillance IoT & Automation
As we move into 2026, several technology trends that were once mostly confined to research labs and conference keynotes are now becoming part of the daily reality of the security industry.

Read more...
From false alarm filtering to intelligent decision-making
DeepAlert AI & Data Analytics Surveillance
As AI continues to evolve, the most successful surveillance operations will be those that not only reduce nuisance alerts, but also derive meaningful business intelligence from video data.

Read more...
Camera Selection Guide 2026
Camera Selection Guide Surveillance
The Camera Selection Guide 2026 features a range of cameras designed to meet a wide variety of needs and use cases for professional security operations.

Read more...
Storage Selection Guide 2026
Storage Selection Guide Surveillance
The Storage Selection Guide 2026 provides video storage and management options customised for small, medium, and large surveillance operations, ensuring effective support for various security requirements.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.