Square One biometric system secures DCC's Jesus Dome

November 2005 Access Control & Identity Management

A computerised biometric fingerprint recognition system has been installed for the Durban Christian Centre (DCC) to secure access to some sections of the huge, octagonal, dome-structured, church building adjacent to the N3 freeway at Berea, Durban, and at the same time provide a time and attendance register for staff.

The aluminium roof of the building, known as the Jesus Dome, is the largest of its kind in the southern hemisphere and the third largest in the world. The sheer size of the building led management to examine options for secure entry and exit for staff and for the control of entry into certain administrative sections of the building.

Square One Solutions Group, the JSE-listed IT-based business enabling solutions provider, was approached to develop a solution for the DCC.

"After studying the needs of the DCC, we proposed a biometric access control system based upon three Dex optical biometric reader units which control and secure access to the required areas as well as provide a computerised time and attendance register for the staff complement of about 50 people," says Dean Johnstone, manager biometric solutions at Square One.

Two of the biometric readers were placed at the DCC's main entrance and exit with the third located at the access point to the church's administrative centre. They have rugged keypads, back-lit LCD displays and steel casings. Johnstone adds that employees then had to enrol by presenting an index finger for scanning into the biometric management system.

"This enabled us to create individual user templates for each employee and these were then selectively uploaded to the three biometric readers. For example, only the templates of staff with duties that would require them to enter the administrative section were uploaded to the administrative office biometric reader."

To gain access, each staff member has a unique pin code that is entered into the reader and this code is then authenticated by placing the 'enrolled index finger' on the optical scanner. The reader only permits entry if the code and fingerprint match.

Every time a member of staff presents a pin code and fingerprint to gain entry the transaction is date and time stamped automatically and stored in the system computer. This data can be extracted from the computer to track staff time and attendance.

"Reports can be generated on demand," says Johnstone. "The report displays logs of the times and dates staff entered and exited the premises. Reports can also be customised to individuals, to secure areas and to specific time and date fields. For example a report for all employees that entered 'Zone 3' between 15h00 and 17h00 on a specific date can be generated, or a report could specify a particular individual and display all entry and exit times for the past week, month or year."

For more information contact Dawn Alexander, Square One Solutions Group, 021 464 4000, www.squareonegroup.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Physical security evolving beyond security teams
ATG Digital Access Control & Identity Management
The landscape of physical security is undergoing a major shift. Traditionally, selecting access control and visitor management solutions fell squarely on the shoulders of security professionals, but today includes legal, IT, technical operations and more.

Read more...
A passwordless future?
Access Control & Identity Management
The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals.

Read more...