Enhanced biometric technology for mines

1 October 2019 Mining (Industry), Access Control & Identity Management

South Africa's mining industry is supported by an extensive and diversified resource base and has since its inception been a cornerstone of South Africa's economy. The changes which have come about in our country make it necessary to prepare the industry for the challenges which are facing all South Africans as we move further into the twenty-first century.

A safe and productive working environment is critical for any operation in the mining sector. Various technology and security companies provide solutions to meet your company’s specific needs to ensure that people, equipment and assets are safe. Biometric identification and authentication are currently used at various mines in South Africa and in the SADC region.

Fingerprint biometrics is still the most widely accepted form of biometrics. However, more mines and large industries are looking at newer technologies. Finger vein detection devices are also becoming more popular in the mining industry. These devices detect the pattern of the blood vessel under the skin simultaneously with a fingerprint match. This new technology offers an unrivalled secure form of identification.

Another recent technology is the 3D facial recognition, which provides a hands-free recognition ideal for the mining industry, entering or exiting a mineshaft is simple, secure and quick. Through biometric technology, mining companies have better control over short-time and overtime hours worked at access points where shift control procedures are executed.

Access control systems can be upgraded to meet one of the most important mining safety requirements – the 'shaft clear for blasting' procedure, by automatically and electronically providing assurance that all personnel have left the area to be blasted. Fingerprint readers can readily be linked to systems including everything from payroll systems to what meal choices staff may make or what certified skills they have, when they are due for leave and even when they are next due for a medical check-up. In the latter case, a miner, for example, won't be allowed underground if his check-up is overdue. These business tools are not just about security but also impact on safety, for complete protection of both employees and assets.

In addition, the technology can improve risk management and ensure compliance with mining safety regulations through the implementation of a management and control system for monitoring and enforcing safety issues relating to personnel working underground such as lamp issue as well as red ticket and competency certificates.

For more information, contact ZKTeco (SA), +27 12 259 1047, [email protected], www.zkteco.co.za


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Biometric security key for phishing-resistant MFA
Products & Solutions Access Control & Identity Management
New FIDO-compliant USB, Bluetooth, and NFC BioKeys with biometric login and centralised management for phishing-resistant, passwordless multifactor authentication (MFA) for enterprise users.

Read more...
Gallagher Security releases OneLink
Gallagher Animal Management Products & Solutions Access Control & Identity Management
Gallagher Security has announced OneLink, a cloud-based solution that makes it faster, easier and more cost-effective to deploy security anywhere in the world, transforming how security can be delivered to remote sites and distributed infrastructure.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
Managing mining physical security risks
Zulu Consulting Security Services & Risk Management Mining (Industry) Facilities & Building Management
[Sponsored] Risk-IO, a web app from Zulu Consulting, is designed to assist risk managers in automating and streamlining enterprise risk management processes, ensuring no steps are skipped and everything is securely documented.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
Gallagher Security expands Digital Badge Programme
News & Events Access Control & Identity Management Training & Education
Following a successful launch and roll out across Australia and Papua New Guinea in 2023, Gallagher announced its Digital Badge programme is now available to channel partners and end users across the rest of APAC IMEA.

Read more...
Integrated Control Technology and Ingram Micro sign distribution agreement
News & Events Access Control & Identity Management
Integrated Control Technology, a global manufacturer of intelligent electronic access control and security solutions, announced it has extended its presence in the Middle East and Africa region by entering a distribution agreement with Ingram Micro.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.