How Electronic locks can double as a checkpoint system
What is a Checkpoint System?
Many security systems make use of a checkpoint system. Checkpoints are fixed infrastructure that security personnel interact with to prove their presence. There are a number of use-cases for this type of deployment but a common one is for security guards on a patrol route.
In this instance, the guard would use the checkpoints to prove their presence at various points along the patrol route. The checkpoint system would record and report the times that the guard interacted with it.
This means that security management can get a top-down view of many security rounds at one time, and be notified if routes are incomplete.
What does this mean for Electronic Access Systems.
Many electronic access systems will record identity and timestamps, and will include provisions for communicating that information into a central repository. This means that businesses using electronic access systems have everything they need for simple proof of presence - the default behaviour of these systems will mean that simply unlocking a door will serve as proof of presence.
How would it work?
If your business is secured with a digitized access solution, your security personnel would be issued with electronic keys that grant access to the relevant areas. Setting up a checkpoint system only requires an additional logic layer in the security software that specifies a number of locks as checkpoints to the keys that the guards are carrying.
A manager would specify the order and intervals between these locks, and would be notified about checkpoint routine failures. Checkpoint locks needn't open for guards either, all you would need is a door in a hallway to create a checkpoint in your route.
Some access systems may even provide dedicated terminals for checkpoints, but would still integrate that data into whatever management software comes with that system.
What does this mean for you?
If you or your business make use of security routes, checkpoints are a natural extention to get more real-time information about when these routines fail. If you already use a checkpoint system, and are thinking about getting an electronic access system, you may want to look for a system that supports checkpoint integration.
Many businesses maintain and pay for dedicated checkpoint systems, but did you know that these features can often be integrated in electronic access systems?