Streamlining visitor management

June 2018 Access Control & Identity Management

It is estimated that about five million people reside in organised communities in South Africa. There are 1,9 million homes in organised communities and R800 billion in assets are managed by community managers. This presents a large and obvious target for criminals.

A best practice visitor management system forms part of the whole security equation which includes deterrence, obstruction, identification, detection and response. Identification acts as a deterrent and also assists with detection. Visitor management can allow on-site and remote security teams, and management, to know who is on the premises at all times and to keep an accurate record of who visited whom and when. This is also useful for providing information regarding people on site in the event of an emergency.

“Previously, one had to rely on the archaic physical visitor log book which is disadvantageous due to the fact that handwriting is often illegible, log books do not contain a privacy feature, sign-in is time consuming, visitor’s credentials and background must be manually verified and there is no photograph available, making verification of identity difficult,” says Excellent ID’s Riaan van den Berg. One way of ensuring that only visitors with verifiable identification are permitted to enter residential estates and business premises is the scanning of drivers’ licences using 2D barcode scanning technology.

When a visitor arrives at a security controlled area such as a business park or residential estate, the visitor must always consent to their identity being verified by the body providing conditional access. When the visitor refuses to identify themselves, the right of access can be denied by the security officer on duty. When the visitor hands over their driver’s licence for the purposes of identification, they are then consenting to be identified using their licence.

The machine-readable component (barcode) of the South African driver’s licence (SADL) contains the visible information displayed on the card, with the exception of the fingerprint image and the driver’s signature image. The driver’s photograph, as reflected on the front of the card, is embedded in the 2D barcode and all data is encrypted. In order to decrypt the data string, a decryption algorithm is used by solution providers.

Using a 2D SADL barcode scanner to assist in visitor management, the following benefits are evident: information is accurately captured; the data can be stored, tracked and reported; the sign-in process is quick and easy; visitors can be pre-registered; photo identification is readily available and verifiable.

The latest-generation eSkan SADL 2D barcode scanner from EXID incorporates OEM barcode engine technology from Honeywell. Available with an LED-based aimer, the N6600 series integrates Adaptus 6.0 technology for 1D and 2D scanning performance. The scanner reads barcodes and OCR fonts, even for hard-to-read codes like the SADL barcode and those on mobile phone screens.

For more information, contact EXID, +27 (0)12 548 0940, [email protected], www.exid.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Gallagher Security launches Augmented Reality Training in Australia
Gallagher Training & Education Access Control & Identity Management
Gallagher Security has announced the latest addition to its innovative suite of training solutions, Augmented Reality Training, demonstrating its continued commitment to innovation and improving access to security training opportunities.

Read more...
Fluss launches the next wave of IoT solutions
IoT & Automation Access Control & Identity Management News & Events
Fluss has announced its newest IoT product; Fluss+ continues to allow users to manage access from anywhere globally and brings with it all the advantages of Wi-Fi connectivity.

Read more...
The future of digital identity in South Africa
Editor's Choice Access Control & Identity Management
When it comes to accessing essential services, such as national medical care, grants and the ability to vote in elections to shape national policy, a valid identity document is critical.

Read more...
Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...