Two-dimensional supply chain

March 2018 Retail (Industry), Access Control & Identity Management

When goods leave a retail warehouse and are delivered to a retail outlet, two of the challenges are ensuring that the driver assigned to the delivery vehicle is actually the one driving the vehicle, and that the quantity of goods dispatched matches the quantity of goods received.

According to Riaan van den Berg, MD of Excellent ID (EXID), the 2D barcode reader is the ideal technology for verifying the identity of a driver using their South African Driver’s Licence (SADL), and for ensuring the correct quantity of goods is received.

He points out that not only can a 2D scanner be used for deliveries and collections by retailer-owned vehicle drivers, but are also becoming increasingly popular with courier and logistics companies. When courier companies collect goods from a client, they can use a 2D barcode scanner to scan the unique barcode allocated to a consignment of goods. A big plus with 2D barcode scanners is that they not only read the newer 2D barcodes, but they can also read the old 1D barcodes.

The EXID eSkan 2D barcode scanner.
The EXID eSkan 2D barcode scanner.

A 2D barcode can store more information than a traditional 1D (linear) barcode, such as the batch’s assigned location, for increased traceability. With information stored directly in the barcode rather than in a database over a network, retailers can conduct on-the-spot audits with a laptop and a 2D scanner. 2D barcodes can also store information, like batch production date, expiration dates, scheduled ship date, number of products in a batch.

Van den Berg says that a 2D barcode scanner is the ideal tool for supply chains, when linked to customer-specific logistics management and inventory control software. “2D barcode scanners have been designed to cater for identification verification of the vehicles entering and exiting premises, for access control and for asset management. Therefore, they can be used to link the driver (and his SADL) to the vehicle’s licence disc. The odometer reading of the vehicle can be monitored by entering the reading when leaving the dispatch area, on entering the delivery area and then on its return to the original dispatch area.

The benefits of using 2D barcode scanners is that verification is guaranteed through the electronic capture of information in the barcode. This effectively streamlines the delivery/collection process, allowing for a faster through-flow of delivery vehicle traffic. Additionally, since everything is now on an electronic record, one can quickly refer back to the data. Since the times of departure and arrival of a driver are recorded, incident reports are instantaneous.

Van den Berg believes that a number of factors could be considered as best practice for identification verification in the retail sector. Devices should be portable, simple to use, splash-proof and robust enough to continuously operate in the demanding South African environment.

2D barcode scanners should have a long battery life since they will be used frequently and they should not be too heavy or large. An ideal device size is 120 x 70 x 50 mm and with a weight of approximately 175 grams. The software and any captured data should be resident on the device, but should be accessible only by the owner of the system, to ensure complete security and confidentiality.

Weighing less than a packet of coconut biscuits, the EXID eSkan 2D reader is a locally-designed and manufactured mobile SADL reader, which can also read third-party 1D and 2D barcodes. When partnered with Janus software, the eSkan allows retailers to quickly determine exactly who is on site, for accurate mustering purposes. The eSkan complies with both the OSH Act and PoPI Act (password protected) for decoding and storing confidential information.

For more information, contact EXID, +27 (0)12 548 0940, shaun@exid.co.za, www.exid.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
Smarter access, stronger defence
Secutel Technologies Security Services & Risk Management Access Control & Identity Management Retail (Industry)
The holiday season brings excitement, increased foot traffic and, unfortunately, a spike in criminal activity targeting retail environments. Taking a proactive approach to security is essential in ensuring staff and assets remain safe.

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.