Visitor management refers to tracking the usage of a public building or site. By gathering increasing amounts of information, a Visitor Management System can record the usage of the facilities by specific visitors and provide documentation of visitor’s where about Proponents of an information rich visitor management system point to increased school security as one substantial benefit. As more parents demand action from the schools that will protect children from sexual predators, some school districts are turning to modern visitor management systems that not only track a visitor’s stay, but also check the visitor’s information against national and local criminal databases. Basic computer or electronic visitor management systems use a computer network to monitor and record visitor information.
An electronic visitor management system improves upon most of the negative points of a pen and paper system.Visitor ID can be checked against national and local databases, as well as in-house databases for potential security problems.
Another alternative to visitor management software is an on-line, web based visitor management system offered as a service. Visitor management software for schools allows administrators to screen visitors upon entrance, often checking for ender status, and restrict access to unauthorized entrants. Visitor management software for the real estate industry allows landlords and managers to remotely control and monitor access rights without the need to pass physical keys and key cards to new tenants. Visitor management software for commercial offices allows facilities managers to automate their building's reception area with advocates of this type of system claiming a variety of benefits, including both security and privacy. Many modern visitor management systems are tablet-based.
Dustbucket GAtTe is placed at the entry gate while host app, is installed on smart phones of the host.
Kiosk greets a visitor and asks to enter phone number. The system validates the phone number. In case of a new visitor, visitor will get an authentication OTP on the phone number entered. The old/regular visitor skips this procedure altogether. Upon validating the OTP, the visitor is prompted to pose for a photo and subsequently is asked to enter name, company details, vehicle no. and things carrying by visitor.
The next step is to choose the name of the person visitor wishes to visit by picking name from a directory seen on the screen. At this point, cloud computing based engine is triggered, which establishes a two way communication channel between the smart phone of the host chosen by the visitor and the kiosk. At this time, host gets a notification on his smart phone displaying the visitor’s mobile no., name & the photo just clicked. host has a choice to accept the visitor, reject the visitor, speak with the visitor or send a message to the visitor.
Call To Action
Get started with your free estimate.