Wireless access to remote sites

Access & Identity Management Handbook 2014 Access Control & Identity Management

The Supra TRACcess system, available from Transaction Control Technologies (TCT), makes it possible to manage access control in sensitive widespread areas. The wireless system reduces the risks and expenses associated with managing physical keys.

Malcolm Thomas, MD at TCT
Malcolm Thomas, MD at TCT

Malcolm Thomas, MD at TCT, explained that key custodians would be issued with a pager-sized keypad which contains the custodian’s credentials with multiple layers of security built in. “PIN codes are issued via SMS for either daily use or as a once-off PIN for limited use. In essence, custodians will use this keypad as their key to any number of remote sites.”

Keyholder permissions are managed by administrators from the TRACcess Manager software. This means that administrators can grant and revoke keyholder and site permissions centrally, from any secure Internet connection.

Once the PIN is acquired, it is entered into the TRACkey, which is subsequently clipped into the bezel of the locking device to activate or deactivate the lock. The system transmits encrypted information for all communications. “The system is very versatile and can be used for safe/vault locks, door locks, padlocks and even to lock manhole covers. Anything that normally requires a lock and key, can in fact make use of the TRACcess system,” said Thomas.

Thomas pointed out that it is possible to perform a full audit trail on both the key(pad) and the lock. “You simply upload data by placing the key in the bezel of the lock on site or information can be extracted from the TRACkey in a centralised control room. The docking of the key in the programming base at the end of a shift or a defined period of time automatically uploads all transactions which allows management to generate reports on the user’s activities.” The latest developments in TRACcess adopt display keys and e-keys with significantly enhanced features with e-keys (typically a smartphone) instantly updating all movements/audit trail to the central system.

The high-end TRACcess system is popular with the banking sector. “There are over 12 000 ATMs throughout South Africa equipped with TRACcess. The levels of security that the system provides are unsurpassed in the industry,” said Thomas.

Other applications include the telecommunications industry. “In this instance, where for example a number of cellular providers share a common high point, general access could be available at the main gate, while the individual proprietary cabinets could be secured with TRACcess. Smaller applications with low quantities can use the bureau service, thereby removing the need for an owned central system,” he added.

The system is manufactured according to military specifications, making it suitable for use in temperature ranges of -40 up to +80°C, with the further ability to withstand humidity and water. These factors make it the ideal unit to use in even the most arduous outdoor conditions.

A duress feature is built into the system, whereby the user will enter a code whereby the system will automatically slow the unlocking process down to allow a reaction unit to reach site. Alternatively, the system will not issue a code at all. Advantages of this system include the fact that no cabling or power supply is required, since power is provided by the key, making this ideal for even remote and widespread sites. Risk is substantially reduced since keys are useless if stolen. “This brings up another important selling point. With traditional locking systems, great expense is incurred in replacing keys that have been lost or stolen from custodians. Because the TRACcess key cannot be used without the encrypted 11-digit code, it is not attractive to criminals. The TRACcess system is a risk-free augmentation to existing access systems and permits access control to be cost effectively implemented where it was not possible or feasible to do so conventionally,” Thomas concluded.

For more information contact Darren Thomas, Transaction Control Technologies (TCT), +27 (0)11 888 1210, [email protected]



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Smart intercoms are transforming access control
Access Control & Identity Management Products & Solutions
Smart intercoms have emerged as a pivotal tool in modern access control. They provide a seamless and secure way to manage entry points without the need for traditional security guards to validate visitors before granting them access.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...
Invixium acquires Triax Technologies
News & Events Access Control & Identity Management
Invixium has announced it has acquired Triax Technologies to expand its biometric solutions with AI-based RTLS (Real-Time Location Systems) offering for improved safety and productivity at industrial sites and critical infrastructure.

Read more...
ControliD's iDFace receives ICASA certification
Impro Technologies News & Events Access Control & Identity Management
The introduction of Control iD's iDFace facial biometric reader, backed by mandatory ICASA certification, underscores the commitment to quality, compliance, and innovation.

Read more...
The future of workplace access
HID Global Access Control & Identity Management
Mobile credentials are considerably more secure than physical access control, because they eliminate the need for physical cards or badges, support multiple security protocols, and add layers of protection on top of basic card encryption.

Read more...
Integrated, mobile access control
SA Technologies Entry Pro Technews Publishing Access Control & Identity Management
SMART Security Solutions spoke to SA Technologies to learn more about what is happening in the estate access world and what the company offers the residential estate market.

Read more...
Bespoke access for prime office space
Paxton Access Control & Identity Management Residential Estate (Industry)
Nicol Corner is home to a six-star fitness club, prime office space, and an award-winning rooftop restaurant. It is also the first building in South Africa to have its glass façade fully incorporate fritted glazing, saving 35% on energy consumption.

Read more...
Next-generation facial recognition access control system
Enkulu Technologies Products & Solutions Access Control & Identity Management Residential Estate (Industry)
With a modern and innovative design, iDFace is the ideal device for monitoring and controlling people entering and exiting a building using facial recognition technology, including liveness detection, for enhanced security.

Read more...
Long-distance vehicle identification
STid Security Products & Solutions Access Control & Identity Management Residential Estate (Industry)
The STid SPECTRE reader can identify vehicles up to 14 metres away, across four traffic lanes, ensuring secure access to an estate without disrupting the traffic flow.

Read more...