Controlling visitor access on mines

October 2018 Mining (Industry), Access Control & Identity Management, Products

Visitors to mining facilities, quarries and processing plants need to be carefully screened to ensure that their entry into the premises is valid. Concurrently, their identity needs to be verified to ensure that they are indeed the person they claim to be. By not confirming these two elements, mining operations are opening themselves up to potential security risks.

According to ExcellentID’s Riaan van den Berg, a best practice visitor management system should form part of the whole security equation, which includes deterrence, obstruction, identification, detection and response. “By being able to accurately identify people entering one’s property, there is an automatic deterrent to illegal entry. Furthermore, verifiable identification assists with detection.”

By instituting a visitor management system, on-site and remote security teams are able to determine who is on the premises at all times and to keep an accurate record of who visited whom and when. “In addition to providing heightened security, this is also helpful from an occupational health and safety perspective, since it is able provide management with critical information regarding people on site in the event of an emergency,” adds Van den Berg.

One way of ensuring that only visitors with verifiable identification are permitted to enter mining facilities is the scanning of drivers’ licences using proven 2D barcode scanning technology.

The machine readable component (barcode) of the South African driver’s licence (SADL) contains the visible information displayed on the card, with the exception of the fingerprint image and the driver’s signature image. The driver’s photograph, as reflected on the front of the card, is embedded in the 2D barcode and all data is encrypted. In order to decrypt the data string, a decryption algorithm is used by solution providers.

The latest-generation eSkan SADL 2D barcode scanner from EXID incorporates cutting-edge OEM barcode engine technology from Honeywell. Available with an LED-based aimer, the N6600 series integrates Adaptus 6.0 technology for unparalleled 1D and 2D scanning performance. The scanner quickly and accurately reads barcodes and OCR fonts with motion tolerance, even for hard-to-read codes like the SADL barcode.

“Since the data contained in the SADL 2D barcode is captured by the Department of Home Affairs (DHA) it is considered to be valid and verifiable. By a simple process of deduction, one can then assume that any data that is captured by a reputable SADL 2D barcode reader from the SADL barcode is both valid and verifiable,” Van den Berg points out.

For more information contact ExcellentID, 086 107 7776, shaun@exid.co.za, www.exid.co.za


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Access authentication with a wave
May 2019, IDEMIA , Editor's Choice, Access Control & Identity Management, Integrated Solutions, Financial (Industry), Commercial (Industry)
Financial organisations are making the move to contactless fingerprint biometrics in order to meet the increasing burden of regulatory and compliance demands.

Read more...
Face to face with Suprema FaceLite
May 2019, Suprema , Editor's Choice, Access Control & Identity Management, News, Products
Suprema has announced the launch of FaceLite, the new generation compact face recognition terminal designed for enterprise access control as well as time and attendance applications.

Read more...
ASSA ABLOY showcases latest digital access solutions
May 2019, ASSA ABLOY South Africa , Editor's Choice, Access Control & Identity Management, News
ASSA ABLOY hosted a breakfast at the Country Club Johannesburg in Woodmead on 2 April, to showcase the company’s latest and greatest digital access solutions.

Read more...
Keyless access control launched in Africa
May 2019, FS-Systems , News, Access Control & Identity Management, Agriculture (Industry)
FS-Systems launches a cutting-edge keyless access control solution for the critical infrastructure environment across the African market.

Read more...
Know your customer/criminal
May 2019, ZKTeco , Financial (Industry), Access Control & Identity Management
Biometric facial recognition is becoming the most powerful way to prevent bank robberies and fraud.

Read more...
Moisture detection and the dangers of digital disruption
May 2019 , Fire & Safety, Products
When it comes to protecting businesses against disruption, water damage poses a significant threat, especially in the modern age where electrical systems are ingrained in almost every aspect of daily life.

Read more...
Effective intruder detection: more important than ever
May 2019, Powell Tronics , Perimeter Security, Alarms & Intruder Detection, Products
While intruder detection systems abound, not all solutions are created equal. Ensuring that their intruder detection system is with them for the long haul is something that all end-users desire.

Read more...
New Paxton audio monitor
May 2019, Paxton Access , Products, Access Control & Identity Management
Paxton has launched the Net2 Entry audio monitor, bringing a simple, cost-effective option to the Net2 Entry range.

Read more...
Intelligent ceiling detector
May 2019, Regal Distributors SA , Perimeter Security, Alarms & Intruder Detection, Products, Agriculture (Industry)
The RISCO Industrial LuNAR Grade 3 is an intelligent ceiling detector with bidirectional remote control, a mounting height of up to 8,6 m and a coverage area of up to 18 m in diameter.

Read more...
Outdoor detector with low false alarm rate
May 2019, Regal Distributors SA , Perimeter Security, Alarms & Intruder Detection, Products
The RISCO wired Beyond detector is the company’s next generation in outdoor detection, featuring an updated, sleek design.

Read more...