Biometrics Time Attendance System

Biometric Products

Biometrics are physical or behavioral characteristics unique to an individual, such as a finger or palm print, iris pattern or face image. Because each individual has unique biometric data, solutions based on biometrics offer a better and more accurate means of ensuring program integrity. By matching patterns of individuals against databases of records, our customers are better able to protect and secure citizens from crime and theft made possible by fraudulent identities. Though Id cards and passwords serve as excellent safeguards, but they are not immaculate in terms of safety and can be tampered and falsified.

SISIT Security System & Services in Biometrics:
SISIT Security System has turnkey solutions for virtually any environment. At SISIT we integrate tightly with databases containing records to optimize the speed and accuracy of matches.

We use the most advanced and the best of authentication and identification systems in the field of biometrics which includes the following:


Facial Recognition
In addition to taking video footage, surveillance cameras ,capture the overall facial structure, including the distance between eyes, nose, mouth and jaw edge. This image is instantly analyzed and compared to database records. A user usually stands within two feet of the camera and most of the time is required to perform some human facial movement, like smiling or ‘ blinking to prevent the use of a mold or fake face. The decision is typically made in less than 5 seconds.

Retina Scan
Retinal scanning analyzes the very unique layer of blood vessels at the back of the eye. Scanning uses a low-intensity tight source and an optical coupler. A person is required to keep his head still, look closely in the device and focus on a green light while scanning is performed. The white process takes lo-ls seconds. Since there is no known way to reproduce a retina, and one from a dead person would weaken too seoon, no additional precautions are taken to prevent faking a living human. There is no need to remove glasses.

Iris Recognition
Another method of eye recognition is iris-analysis of more than zoo points in the colored tissue surrounding the pupil. In this case user can be either close to the video camera or 2 feet away, depending on the device.
Iris recognition does not use infrared light beams, so it is safer to an eye. The identification is done in less than s seconds and may use tight shone to watch for pupil dilation to prevent users from fooling the system. There is no need to remove glasses.

Voice Recognition
People speak a pass phrase into a microphone to validate their identities.Another revet of security can be added by requiring a user to reproduce low and high sound frequencies. Both validation procedures typically take less than five seconds.

Vascular Recognition
Face or hand vein thickness and their locations are considered unique enough to identify a person. An infrared scan from a curved reader device performs a vascular scanning process and then compares it to the database records to find a match.

Hand Geometry
As a user places a hand on a metal plate, the system takes more than go measurements of the length, width, thickness and surface of the hand – and fingers. It is a simple, fast and accurate procedure. The drawback is that this scan is unable to tell the difference between a living, fake or dead hand, if pressure is property applied. For optimum security, it is best to combine hand geometry with another method authentication process.

Finger Print
A user gently places fingers against a small reader device. Characteristics such as whorls, arches, and loops are recorded along with-the patterns of ridges. furrows, and minutiae. Depending on the security level in the organization, fingerprinting may require a match of six or seven identical points, while law enforcement agencies may prefer a match of twelve or more.

Acess Control Systems

AC -200 / 400 is developed to manage entrance security, work place time and attendance, over-work time verification and other situation requiring the presence of the authorized personnel. BF-880 supports various I/O protocols. Within 1 Card Reader, 128 X 64 pixel LCD screen, 10 push buttons, 6 function keys, and 1 buzzer. These equipments make AC series equipments user-friendly.
Features

  • Audible indicators
  • Support 100 holidays
  • Master / Slave function
  • Big size LCD with back – light
  • Support 8/32 department, 8/32 designations
  • Support 255 time sets, 255 time zones, 200 groups
  • Low power consumption, low cost of system maintenance
  • Support Wiegand ¡BRS-485 (for read only)
  • Use of stand-alone modules and working in conjunction with an ACU.
  • 2 / 4 Door Access – Controller

Face Scanner

Next Generation Face Recognition Technology

  • High performance face recognition by Suprema’s proprietary algorithm
  • Unparalleled image processing performance using both visual camera and IR camera
  • Intelligent adaptive/active LED illumination for increased accuracy

Powerful Dual-CPU Architecture
  • 1.1 GHz DSP dedicated to face recognition
  • 667MHz RISC for device operation

4.3″ Touchscreen LCD & Intuitive GUI
  • Ultra wide 4.3” WVGA touch screen LCD
  • Solid and scratch-free surface for extra durability
  • Fully customizable, intuitive and user friendly GUI

Distributed IP Access Control System
  • Provides reader and controller features in one device
  • TCP/IP, WiFi and PoE(Power over Ethernet)

Video Phone Interface
  • Provides built-in camera, microphone and speaker
  • Supports both IP based video phones and analog video phones
  • BioStar VideoPhone software to support single/multi operator interphone systems
  • Provides 2-channel RS485, RS232, Wiegand and USB
  • Provides 4 inputs and 2 output relays
  • Optional I/O ports for further expansion (Secure I/O)

Fingerprint Based

F52 RFID and Fingerprint Time Attendance System supports fingerprint, card and passwords identification models. A1 PC, operating system software and F52 attendance management to connect, on attendance data processing, obtained the appropriate time and attendance reports.

  • Fingerprint,Card,Password;
  • Time Attendance,Access Control
  • TCP/IP,U Disk,RS232
  • Capacity:2000 Fingerprint,50000 Logs

RFID+Fingerprint

F52 RFID and Fingerprint Time Attendance System supports fingerprint, card and passwords identification models. A1 PC, operating system software and F52 attendance management to connect, on attendance data processing, obtained the appropriate time and attendance reports.

  • Fingerprint,Card,Password;
  • Time Attendance,Access Control
  • TCP/IP,U Disk,RS232
  • Capacity:2000 Fingerprint,50000 Logs

RIFD

F52 RFID and Fingerprint Time Attendance System supports fingerprint, card and passwords identification models. A1 PC, operating system software and F52 attendance management to connect, on attendance data processing, obtained the appropriate time and attendance reports.

  • Fingerprint,Card,Password;
  • Time Attendance,Access Control
  • TCP/IP,U Disk,RS232
  • Capacity:2000 Fingerprint,50000 Logs