Skip to content

Hardware

Data Collection Hardware

GuardChecker uses commercially available smartphones to record security guard performance.

Benefit from our 15 years of Verification Experience. Click here to set up a 10-minute consultation with our Founder.

GuardChecker uses commercially available smartphones to record security guard performance

  • Historically GuardChecker used barcode scanners, various wands/pipes (iButton readers), biometric scanners, QR code readers, and several others. Now, we focus on digital devices (smartphones and tablets).
  • Our proprietary data collection software will work on most commercially available smartphones, Android or iPhone.
  • Choosing the proper smartphone is important – It should be rugged and able to read Near Field Communication (NFC) tags.
  • Before purchasing a smartphone, we recommend that our clients coordinate with our staff to confirm it will perform as advertised.

Beginning GuardChecker Operations

Oversight will help you set up your mobile devices in the most efficient manner. We will help you install the Data Collection App on those devices. We will help you work through any data transmission issues.

Smartphones permit GuardChecker to be more comprehensive.

The Smartphone will perform just like a traditional reader (pipe, wand, etc) plus do much, much more. Here are a few of the features that make smartphones more effective.

  • Smartphones can send data directly, no need for cumbersome, time-consuming downloading using a separate computer.
  • Each submission can be accompanied by a GPS location where the scan took place.
  • Can serve as the “site phone”.
  • Can send collected data as soon as it is recorded.
  • Can take pictures to further explain actions and observations.

GuardChecker’s data collection app records data from multiple sources.

  • Strategically placed NFC tags
  • Client specific structured messages
  • Free form content: either through voice or text.
  • Pictures

Another smartphone advantage is that the collected data can be sent in real time directly to the client’s secure section of our cloud based software. There is no need to go through the download/upload process using a computer. Since each activity is prioritized, this real time capability permits email alerts to be sent to key managers when “critical” scans are recorded. In addition to sending the data immediately, the client has the option to send “on demand” to take advantage of available Wi-Fi hotspots. This reduces the demand of a data plan.

Near Field Communication tags are more secure and easier to scan.

Technology continues to evolve, but now the best checkpoint technology is Near Field Communication (NFC) tags.

  • NFC tags are quick and easy to read in all lighting conditions.
  • NFC tags can be read by many different smartphones.
  • Unlike barcodes and QR codes, NFC tags cannot be copied.