Due to security reason, government sectors, foreign institutions and private enterprises start to check ID, driver and vehicle license in public or private locations in order to identify the visitors and vehicles in South Africa. The government is working with software provider ATEC Systems and Technologies (ATEC) and handheld computer manufacturer Shenzhen Chainway Information Technology (Chainway) to spread a high-tech access control management across the country.
In South Africa, driver license prints 2D barcode and fingerprint on the back side, national ID card is encoded with a RFID chip, and vehicle license contains a 2D barcode. Chainway engineer Peng Zhenzhen said, “In some cases, they also need to take high resolution photos of drivers, so we equip our handheld computer with 2D barcode scanner, fingerprint sensor, HF RFID reader and camera.” The device is pocket-size with a pistol hold, singer-handed operations are easily realized in various fields of mobility application.
ATEC’s visitor management system BioScan is based on Chainway handheld computers, which scan and capture vehicle and occupant information for visitors to an access controlled site. Encrypted 2D barcode on the driver license contains holder’s full personal information, including name, birth date, gender, photo, ID number, license restrictions, and validity period. Handheld computers capture and decrypt this information to see if this license is effective. Holder’s photo can also be shown on the device. Security personnel further see if the holder is actually the driver behind the wheel. Only the effective driver license is used by the accredited individual can this driver pass; otherwise, the access will be denied.
Now no hand-written paper records, all data is sent and stored wirelessly onto the database. In the PC terminal, administrators can log in the system to see the collecting data and access control information. It shows time and place of which driver accesses to which entrance, and which driver is denied to which entrance for what reason. This back-end data offers materials for further analysis and future inquiry.
Security has been enhanced since this system was applied. “The building where I work has this access control system. We get our ID card scanned at the entrance and exit gate. ” One office lady is relieved, “I feel secure.” ID card is encoded with an encrypted HF RFID chip which also contains the card holder’s personal information.
Computer-assisted data collection builds a foundation of accurate information that streamlines processing requirements and eliminates redundant data entry and the need for clerical support. It also facilitates rapid and easy information sharing among multiple departments, agencies, and organizations.