Model: TA100 http://www.fingertecindia.com Email: sales@fingertecindia.com.

Slides:



Advertisements
Similar presentations
Access Control with Advanced Facial Recognition Technology The Face ID 3 gives users a contactless and hassle-free verification option. SALES TRAINING|
Advertisements

CUT COSTS & INCREASE EFFICIENCY
Computer time and attendance system for small business with up to 50 employees. 3 terminal types to chose from. Install your self, or have our technicians.
Staff Attendance Made Easy with FingerTec Fingerprint Solution
12 November 2002Digital Identity Forum – London Biometrics and ID Bill Perry Independent Consultant Phone:
Michal Bodlák. Referred to as mobile money, mobile money transfer, and mobile wallet generally refer to payment services operated under financial regulation.
© Copyright 2008 FingerTec Worldwide. All Rights Reserved. Model: M2/R2
The Industry’s First Multi-Modal, Multi-Factor Biometric Patient Identification System. 1 ©2010 M2SYS Technology. All rights reserved. RightPatient™ Biometrics.
Click to edit Master subtitle style Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.
1.7.2.G1 © Family Economics & Financial Education – Revised May 2005 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take Charge.
15 Tactical Improvements to IT Security Virtual Keyboard, Two Factor Authentication, Active Confirmation and FAA Access to CPS Online Ganesh Reddy.
BIOMETRICS: Libraries have begun to see the value of biometrics. M.G. SELVI Technical Officer Center of Advanced Study in Crystallography and Biophysics,
Copyright © 2006 Exportech Portugal. All rights reserved.
Security, Guaranteed By Biometrics The new generation of access control and time & attendance products WRS Technology Services Authorized Reseller San.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
Increased Security, while protecting Privacy ? True or False ? Christer Bergman, President and CEO, Precise Biometrics.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Usable Biometrics Ashley Brooks Usability and Privacy Cranor, Reiter, and Hong April 11, 2006.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Restricted © Siemens AG 2013 All rights reserved.siemens.com/answers Multifactor Iris Recognition Biometric Reader.
Karthiknathan Srinivasan Sanchit Aggarwal
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
BornholmsTrafikken April 2004 Peter Havskov Christensen, M.Sc.
WELCOME TO: ABOUT US ORANGE TECHNOLAB PRIVATE LIMITED, formerly known as Orange Web Technologies, an ISO 9001:2008 Certified.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
1 Card Scanning Solutions SigniShell CSSN – Card Scanning Solutions THE ULTIMATE SIGNATURE CAPTURE & AUTHENTICATION SOLUTION.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
The solution is at your fingertips!. BARTEX 2000 Corp. BARTEX brings You integrated security solutions using the most advanced technology available in.
Three Basic Identification Methods of password Possession (“something I have”) Possession (“something I have”) Keys Passport Smart Card Knowledge (“Something.
A New Kind of Timesheet Brings Biometrics to Main Street Neal Katz Vice President Count Me In, LLC Mt. Prospect, IL
BioLynx™... Ensuring Employees are paid for actual time worked and Facilities’ access is audited and controlled.
BIOMETRICS.
WELCOME TO: ABOUT US ORANGE TECHNOLAB PRIVATE LIMITED, formerly known as Orange Web Technologies, an ISO 9001:2008 Certified.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Authentication Technology
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
G53SEC 1 Authentication and Identification Who? What? Where?
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
 Biometrics refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
WELCOME.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Access Control / Authenticity Michael Sheppard 11/10/10.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
Securing Online Banking By Ben White CS 591. Who Federal Financial Institutions Examination Council What To authenticate the identity of retail and commercial.
BIOMETRICS.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Why Physical Biometrics is rapidly Replacing Traditional Methods of Identification at the Workplace.
ATTENDANCE MANAGEMENT SYSTEM. PRODUCT DESCRIPTION Attendance Management System: is a user-friendly, flexible and full featured employee attendance management.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
enterprise Software Solutions Lab Pvt Ltd
Biometrics.
© Copyright 2008 FingerTec Worldwide. All Rights Reserved.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.
CUT COSTS & INCREASE EFFICIENCY
Biometrics.
Staff Attendance Made Easy with FingerTec Fingerprint Solution
Faculty of Science IT Department Lecturer: Raz Dara MA.
Smart Business for eGeneration Companies
X7– Fingerprint Access Control terminal
Smart Business for eGeneration Companies
Presentation transcript:

Model: TA100 http://www.fingertecindia.com Email: sales@fingertecindia.com

BIOMETRICS

© Copyright 2006 FingerTec Worldwide. All Rights Reserved. What is Biometrics? Is the science and technology of authentication by measuring the person's physiological or behavioral features Fingerprint is one of the most common used physiological characteristics No two humans have ever been found to have identical fingerprints, thus fingerprints are widely believed to be unique © Copyright 2006 FingerTec Worldwide. All Rights Reserved.

Why Biometrics? Security solutions are based on something you know - PIN, password have - Key, smart card are - Self, biometrics The best combination of security and convenience involves biometrics.

FINGERPRINT

Why Fingerprint? Why Fingerprint? Unique Identification Acceptance Cost Saving Convenience Reliable

Benefits of Fingerprint Higher Security Level Eliminates Buddy Clocking Eliminates Cards / No recurrence cost Benefits Increase Productivity Irrefutable Audit Trails Reports / No Argument Improve Discipline / Punctuality

Fingerprint (TA100 Series) Comparison of Systems …continue Punch Card Machine Card Access Fingerprint (TA100 Series) Fraud Punching YES NO Stolen / Transferable Hidden Cost Short Life Span

Fingerprint (TA100 Series) Comparison of Systems …continue Punch Card Machine Card Access Fingerprint (TA100 Series) Link To Computer NO YES Time Saved YES / NO Ease Calculation Low Maintenance

Delivering Peace of Mind Touch-and-go concept [Easy and Convenient] High security and reliable Affordable without hidden costs High return on investment High value and low maintenance expenses

Model: TA100 TA100 SERIES

© Copyright 2006 FingerTec Worldwide. All Rights Reserved. Features Can cater for up to 1500 fingerprint templates Equipped with voice greeting Storage capacity of 100,000 transactions Fast fingerprint identification time [<= 2 secs] False acceptance rate of less than 0.0001% Easy to install and setup, emphasize on DIY concept © Copyright 2006 FingerTec Worldwide. All Rights Reserved.

Suitable for the following industries: Retail outlets Offices Restaurants Schools Hotels Factories Security guard tour places And others …. © Copyright 2006 FingerTec Worldwide. All Rights Reserved.

© Copyright 2006 FingerTec Worldwide. All Rights Reserved. System Integration © Copyright 2006 FingerTec Worldwide. All Rights Reserved.

© Copyright 2006 FingerTec Worldwide. All Rights Reserved. System Communication © Copyright 2006 FingerTec Worldwide. All Rights Reserved.

Benefits of TCMS V2 TCMS V2 Manage multiple Fingertec® Readers Support up to 6 columns of working times Control users’ accessibilities via different doors. Backup user fingerprints Download Transactions TCMS V2 Irrefutable Audit Trails Reports / No Argument Export transactions Generate report Support various Working hours, rotational shift, overnight shift, multiple shift etc © Copyright 2006 FingerTec Worldwide. All Rights Reserved.

© Copyright 2006 FingerTec Worldwide. All Rights Reserved. Features of TCMS V2 Time Attendance and Management System Supports overnight shift Supports flexi time User friendly interface © Copyright 2006 FingerTec Worldwide. All Rights Reserved.

© Copyright 2006 FingerTec Worldwide. All Rights Reserved. Features of TCMS V2 …continue Produces the following report: Time & Attendance Overtime report Lateness report Early out report Rest day & Off day report Leave report Absenteeism report Failed to clock in/out report Transaction report © Copyright 2006 FingerTec Worldwide. All Rights Reserved.

© Copyright 2006 FingerTec Worldwide. All Rights Reserved. Features of TCMS V2 Access control Time Zones & Group Time Zones To control users accessibility to each door by time Able to gather users into same group Special report to monitor staff movement by individual or by door Staff movement analysis Terminal Activity report Terminal transaction © Copyright 2006 FingerTec Worldwide. All Rights Reserved.

CORRECTION REPORT The Correction Report is a report to indicate outstanding clocking activities for admin personnel to take corrective measures.

TARDINESS REPORT The Tardiness Report is a report showing daily activities of a staff detailing lateness and overtime taken.

OVERTIME APPROVAL WORKSHEET The Overtime Approval Worksheet reveals the worksheet of a user and approval given for that particular person for working overtime.

The Attendance Summary is a summarized report of staff attendance.

The Day by Day Analysis is a report of attendance summarized daily.

MONTH BY MONTH ANALYSIS The Month by Month Analysis is a report of attendance summarized by month.

ON LEAVE REPORT The On Leave Report is a report listing of leaves that have been taken by staff.

ELECTRONIC TIME CARD The Electronic Time Card is a report of detailed activities of a staff in a month.

DAILY ATTENDANCE LISTING The Daily Attendance Listing is a listing of staff attendance based on the date required.

DUTY CALENDAR The Duty Calendar is a calendar of workday holiday, restday and offday based on a specified group.

ATTENDANCE SHEET The Attendance Sheet is a comprehensive report detailing activities of all staff in a month.

GROSS WAGES REPORT The Gross Wages Report is the gross calculation of worked hours of all staff based on their pay rate.

STAFF MOVEMENT ANALYSIS The Staff Movement Analysis is a transaction record of individual staff by user ID.

TERMINAL ACTIVITY REPORT The Terminal Activity Report is a transaction record of staff by reader.

TERMINAL TRANSACTION LISTING The Terminal Transaction Listing is a record of all transaction data downloaded from every reader.

Minimum PC Requirements Microsoft Windows 98 Second Edition, Windows Millennium, Windows 2000, Windows XP and Vista At least 256 MB RAM Pentium III 450 MHZ Disk free space at least 250 MB © Copyright 2006 FingerTec Worldwide. All Rights Reserved.

Product FAQs

© Copyright 2006 FingerTec Worldwide. All Rights Reserved. Product FAQs Do FingerTec® readers meet international standards? FingerTec® readers comply with FCC (Federal Communications & Commission) and CE (Conformité Européene akan European Conformity) . How many fingerprints can I enroll in one reader? Each reader can store enrollment of up to 1,500 fingerprint templates (Model TA102). Assuming each user enrolls one fingerprint, a reader can store up to 1,500 users. If each user enrolls two fingerprints, a reader can contain 750 users. If my company has more than one reader, do I have to perform enrollment in all of the readers in order to use them? No. You only need to enroll once in a reader and the saved fingerprint template can be uploaded to other readers through PC. © Copyright 2006 FingerTec Worldwide. All Rights Reserved.

© Copyright 2006 FingerTec Worldwide. All Rights Reserved. Product FAQs …continue If I hurt the enrolled finger, would I still be able to scan it? Assuming that the injury is severe: You can use your backup finger to scan, if you have 2 fingers enrolled. You can use your password to clock in, if password is enrolled. If the injury is minor, you can use 1:1 method to clock in. If I have trouble scanning my finger, what should I do? Dry your finger if it is wet. Wet finger could disrupt readings. Moisturize your finger if it is too dry, particularly for those who are working in air conditioned environment. Use 1:1 scanning method rather than 1:N method. In a case where I cannot enroll any of the 10 fingers, what should I do? In this extreme case, you can still enroll using password instead of a fingerprint. © Copyright 2006 FingerTec Worldwide. All Rights Reserved.

© Copyright 2006 FingerTec Worldwide. All Rights Reserved. Product FAQs …continue In case of a power failure, can a reader still function? Yes, if the reader is wired to a backup power supply pack. The standard standby time for a power supply pack is 3-5 hours, depending on the usage. No, if the reader is not wired up to a backup power supply pack. What happen to the stored transactions, fingerprint templates and data on the reader when a power failure occurs? All stored information will remain safe in the reader and can be used as usual as soon as the power resumes.   What if the transaction storage reaches its maximum capacity? The reader will still store the most recent transactions and will discard the earliest transactions on record, once it reaches its 30,000 transactions buffer. © Copyright 2006 FingerTec Worldwide. All Rights Reserved.

© Copyright 2006 FingerTec Worldwide. All Rights Reserved. Product FAQs …continue A user can be alerted by a warning sound being set inside a reader. A user can download the transactions from the reader using software and the software will automatically clear the transaction buffer. Can the software be integrated with any payroll system? Yes. It can be integrated with any payroll systems that can accept import of Excel or text file. Can TCMS V2 be integrated with other third party Time and Attendance software? The data from TCMS V2 can be exported to Excel or text file format and be exported to third party Time and Attendance system. What are the basic reports that the software generate?The TCMS V2 is able to generate a 6-columns report which includes Clock-In, Clock-Out, Lunch-In, Lunch Out, Break and OT reports. © Copyright 2006 FingerTec Worldwide. All Rights Reserved.

GMI TRACK RECORDS

Thank You http://www.fingertecindia.com Email: sales@fingertecindia.com