Personnel Verification and Identification Solution
For general contractors, knowing exactly who is on a construction site at any given time helps reduce costly security and safety risks. Being able to quickly and accurately identify and verify the authenticity of everyone entering a job site is possible with AB&R’s Verif-ID visitor verification and identification solution.
Managing visitors at any facility can be challenging. Those challenges seem to multiply at large construction sites. Large construction sites have a high volume of workers, contractors, developers, investors and delivery drivers who are continually entering and exiting the site. Not knowing exactly who is on the job site at any given time presents some serious health and security risks.
There have been many solutions developed over the years to help manage visitors on a construction site.
For years, paper and pencil was a popular solution to contractor/employee/visitor management. The main flaw in this scenario, aside from carpal tunnel syndrome, is that there is no way to verify that the person on the list is in fact the person attempting to enter the site.
In recent years, many attempts at automating the process have been developed including some popular web-based programs. The problem with accessing the web for each visitor is the amount of time it takes. A seemingly innocuous 10 seconds per visitor can seem like a lifetime when a line of hundreds of construction workers are waiting at the gate at 6:30 in the morning.
In the end, most contractors found it easier to simply allow visitors to freely enter the site, which presents a whole new set of health and safety challenges.
Hands on workshops available click here
Some of the largest and most prestigious general contractors in the United States use AB&R’s ID-Verify visitor verification and identification software to screen, badge and track every person entering the job site. As a result, these general contractors can process visitors in and out of the job site quickly, screen against unwanted visitors, manage the flow and number of deliveries, and monitor all visitor access.
A security guard can scan a visitor’s ID badge and verify that the face on the badge matches the face in the database in less than a second. ID badges can be made for new visitors/workers on demand in less than a minute at the guard shack.
| ||AB&R ID-Verify Software – Loaded onto mobile computers for scanning employees and contractors on and off the site. This program connects directly to the SQL Server database real time via a local “Wi-Fi” network.|
| ||Microsoft SQL Database – Stores barcode information, first name, last name, company name, status (e.g. active, restricted, entry denied), location (on-site or off-site), and badge photograph.|
| ||ID Card Printers – Set up in the guard shack, or at any location, for on-demand printing of ID badges.|
| ||Handheld Mobile Computer – Utilized by security personnel for scanning badges and communicating information in real time back to the database for verification.|
| ||Wireless Network – All of the wireless components necessary to get network connectivity to all specified locations (guard shacks, contractor trailer, etc.). This typically includes two access points configured to provide both WLAN access and a wireless backhaul bridge from the remote locations (i.e. guard shack).|
Features and Benefits:
Typically speaking, installation and integration of the AB&R Verif-ID system takes 2-3 days which includes the entire wireless infrastructure set-up and the initial creation of the employee badges.
What used to take 7-10 seconds per visitor to scan and verify using a web based system now takes less than a second per visitor.
Special features can be included to flag personnel in real time to deny access or report to the contractor’s office.
Some contractors are less concerned with scanning workers as they leave at the end of the day. In these cases, a system reset can be performed in the middle of the night that sets everyone’s status back to “off site.”
Complete customization and integration into existing information systems can be done as well.