Portable biometric solutions gain ground

Access & Identity Management Handbook 2018 Access Control & Identity Management, Integrated Solutions, Infrastructure

Portable devices offer a cost-effective and reliable alternative for a number of applications. In remote locations or where employees do not report to a fixed point, such as farms, some construction sites and mines, as well as on residential and business estates, and tertiary education facilities, portability is required to overcome the obstacles in areas where fixed biometric readers cannot be installed.

John Powell, CEO of Powell Tronics.
John Powell, CEO of Powell Tronics.

According to John Powell, CEO of Powell Tronics, the company has experienced an increased demand for the use of bespoke portable solutions in most sectors, but in particular for employee and contractor time and attendance (T&A), student rollcall, mustering and visitor management.

Leveraging a wireless network, portable biometric devices using a variety of Powell Tronics-developed software solutions, provide increased flexibility for users not wishing to be limited to hardwired terminals. Another benefit to portable device deployment, says Powell, is a substantial cost saving, since less infrastructure is required at remote sites. “We see applications where clients have been able to overcome bottleneck issues previously experienced with static devices.”

Powell Tronics has provided the MorphoTablet 2 touchscreen Android biometric tablet device to a number of clients for use in various market sectors. It offers high-speed data transfer and reads fingerprints as well as barcodes.

Morpho’s fingerprint algorithms deliver fast ‘one-to-many’ on device matching, against large databases stored in the device’s internal memory. Powell Tronics has developed a number of software applications that readily interface with the unit, making the combination a seamless interchangeable tool for a number of applications.

One application is the portable meal management system whereby one sets up a number of meal hierarchies which are allocated to specific enrolees. The tablet contains a list of meals and each user’s meal allowance for a particular day. Ideal for canteen-type scenarios, an example of its use would be: Mr A.N. Other has been allocated two meals on that particular day by an operator. When he arrives at the canteen he places his finger on the reader and the system, confirms that he is taking meal 1 of 2 for that day. When he arrives later in the day and follows the same procedure, the system informs him, via the screen, that he is taking meal 2 of 2 for that day. A daily, report can be generated by the operator.

The PT-Rollcall application allows for exam management flexibility of using one device for multiple venues. “One simply opens and closes a session at a particular venue and then moves with the device onto the next exam venue. In terms of exam or other events one can also use the device with PT-Rollcall as an entrance verification tool to venues, thereby disallowing student’s entry into specific venues if they are not enrolled for that particular exam. Web reports are provided to authorised personnel on request,” says Powell.

Powell Tronics’ ATOM Mobile T&A application can be used for remote offline employee enrolments and attendance transactions. When one returns to the main office, the device connects to the main database via Wi-Fi and then all remotely captured data is downloaded.

During emergency evacuation procedures, one of the biggest issues is accountability for employees and visitors. The mustering application developed by Powell Tronics resets at midnight each day and automatically compares a list of people who have entered the premises but who have not left the premises during the 24-hour period. This provides management with an accurate list of those people currently deemed to be on the premises.

This flagged data is sent to the device and allows users to quickly identify whether all people on the list are actually present at the mustering points or not. By identifying exactly where the person was last located on the premises, the system reduces both the time taken to tally records and the logistics and resources required for this task.

Powell says that reports are generated for all of the Powell Tronics solutions used on the portable devices. ATOM Mobile provides an automatic report based on fixed pre-programmed parameters. Mustering reports are based on exceptions and PT-Rollcall provides various layers of reports.

For more information contact Powell Tronics, 0861 787 2537, marketing@powelltronics.com, www.p-tron.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
New commercial and technical appointments at Veeam
News & Events Infrastructure
Veeam Software has announced two senior appointments in its South African business as it continues to invest in local market growth and partner and customer engagement.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.