SlideShare une entreprise Scribd logo
1  sur  18
H A R D W A R E / S O F T W A R E
Access Control and Attendance
Systems
S Y S T E M O V E R V I E W
TAMS Attendance System
Hardware
Hardware Features
 Capable of supporting various communication protocols, it can be used in numerous
application areas.
 - TCP/IP : compatible with access manager(OPTION)
- RS-485: Functions with your company’s custom controller
- Wiegand
▷ In : Functions with card readers currently in use
▷ Out : Provides various portions of formats, User ID or Card ID output
 Suitable for employees’ work hour management with the function keys provided
 - Provides four separate keys/ keys can be used in combination
(starting work and finishing work, going out, returning to work, etc)
 Enhanced user configuration feature (ID digits, sensor option, operation mode, etc)
 Enhanced User Convenience
 - Auto-on
- Provides Shortcut ID / Group Matching Feature
- LCD : 2 line graphic LCD (supports various languages)
- LED : Status LED 2 each, Authentication result LED 1 each
- Voice Guide : Voice Output
 Supports various authentication media, making it possible to configure as required by different
security methods.
 - Fingerprint/Password/RF card (option: HID, MIFARE), combined use is possible
Technical Specifications
Item Description
Material Fingerprint Access Controller
Size Optical Type
Sensor type Optical Optical
Resolution 500 DPI
Authentication Mode Mode 1:1, 1:N, Short ID Matching
Fact Password, RF card (HID,
MIFARE compatible)
Time Less than 1 second
Operation Mode SO Stand-alone
NS Server matching
Environment Temperature -20 ~ 60 [oC]
Power 12 / 24 [V]
Maximum no. of registrations 2,000 Users (1 fingerprint per 1
user)
Log 3,000 ea
Authentication Rate FRR : 1/1,000 , FAR : 1/100,000
Function Key F1,F2,F3,F4
Communication TCP/IP, Wiegand Input / Output,
RS-485
Certification MIC, CE, FCC
Software
 Efficient management of:
 Employees
 Visitors
 Vendors
 Inwards
 Compatible to work with:
 Biometric
 RFID
 User name and Password
 Compatible with multiple hardware
 Cost efficient
Software Features
 Capture:
 Fingerprint (1 or 2 fingers)
 RFID information
 Username and password
 Webcam image of person
 Webcam image of belongings
 Generate visitor access permission slip automatically
 Intimate the employee whom a visitor has come to
meet
Software Features
 Virtually unlimited number of finger print storage
capability
 Virtually indefinite period reports(1 day, 1 week, 1 month,
1 year, N years, period FROM - TO)
 Real time alert engine
 Robust Alert Engine:
 Email notification on rule violation
 SMS notification on rule violation
 Screen popup at security
 Hooter or Visual alerts
 Single software setup
 One time software setup cost
 A sophisticated client server software
General System Layout
Finger
Print
Scanner
Processing
machine (PC)
Camera
Capture Image
(On Trigger)
Receive Image
Receive Identity
Send user information to server
SERVER
Store the attendance information in database
Generate and Email REPORTS
Continuously check for rule violation.
Take action
Office Network (LAN)
RFID
Scanner
System snapshots
System snapshots
System snapshots
S Y S T E M A R C H I T E C T U R E
Visitor Management System
Finger
Print
Scanne
r
Processing
machine (PC)
Camera
Capture Image
(On Trigger)
Receive ImageReceive Finger Print
The processing machine is connected
to the employee database and visitor
records database. When a person swipes
Finger, a popup display is presented on
the attached screen where the registration
page is visible. (If the person had been here
earlier then the fields would be auto filled).
Image will be captured by the attached webcam.
A record for this visit will be stored. A message
will be transmitted over LAN to the person whom
the visitor has come to meet
Employee 1
workstation
(PC)
Employee 2
workstation
(PC)
Employee 4
workstation
(PC)
Employee 5
workstation
(PC)
The concerned persons display shows a pop
up message with the image of the visitor. The
Employee can then take one of the following
actions:
1. ACCEPT
2. REJECT
3. FORWARD
This selection by the employees on the pop-up
on his screen will be received by the security guard.
Based on Employees willingness, a temporary
Card will be issued to the visitor.
If the employee forwards the visiting request to some
Other employee, a request message similar to the one
Received by this employee will be generated and sent to
the new employee.
Office Network (LAN)
General System Layout
FPS
SERVER
1. Finger Swipe
Detected
2. Server checks in the DB
whether it is a new visitor.
-> If it is a new visitor then a
form is presented to the
security guard for entering
the details.
-> If old visitor, then the history
is shown and the same form is
auto filled. The security guard
can check the details along with
the stored photo and select
another employee.
-> If an office employee who has
forgotten / lost his RFID tag. Action
may be taken as per company policies
Under such circumstances.
Cam
3. Capture the image
of the visitor and
store in the database
Employee
1 PC
4. Server generates a request for the host employee for this visitor
5. Employee sends back an acknowledgement to the server
Employee
X PC
6. If the employee said:
ACCEPT: The security guard generates a temporary card with the photograph
of the visitor on it and sends the visitor in to meet the host employee.
* Once the host employee meets the visitor and his meeting is over, he
sends a message to the server, stating that his meeting is over.
* The server generates a prompt at security cabin about this.
* If the security guard does not respond with a “visitor Left Office” message
within the stipulated time frame then the server raises an alert.
REJECT: The security guard makes an entry for this visitor in the DB with a rejected
remark and sends him back as the permission is not granted.
FORWARD: The host employee can forward this visitors request to some other host
employee. The new host employee can then follow the same routine. He will also
be intimated about who forwarded the request to him.
8. All these transactions should be stored in a DB.
Functional Flow Diagram
Regular Visitor
Employee
1 PC
OR
9. REPORTS
FPS
SERVER
1. Finger Swipe
Detected
2. Server checks in the DB
whether it is a new visitor.
-> If it is a new visitor then a
form is presented to the
security guard for entering
the details.
-> If old visitor, then the history
is shown and the same form is
auto filled. The security guard
can check the details along with
the stored photo and select
another employee.
Cam
3. Capture the image
of the visitor and
store in the database
Employee
1 PC
5. Server acknowledges the arrival of the client the host employee.
4. Critical Client: Employee fills up the form and sends it to server
before the visitors arrival.
The window opens and remain at security gate where
the client is expected.
When the client reaches, his finger print is captured, image
is grabbed and pass is generated based on the information
that host employee had provided.
This allows saving time for the client as the registration
process is avoided.
6. All these transactions should be stored in a DB.
Functional Flow Diagram
Critical Client Visitor
S Y S T E M A R C H I T E C T U R E
Vendor Attendance System
General System Layout
Finger
Print
Scanner
Processing
machine (PC)
Camera
Capture Image
(On Trigger)
Receive Image
Receive Identity
-> The processing machine is connected
to the visitor records database.
-> When a person swipes Finger or flashes
RFID card, a popup display is presented on
the attached screen where the registration
page is visible.
SERVER
-> Server maintains the attendance record for
all the visiting vendors. When a new vendor
Employee comes in and marks his identity a
record is filled for his entry / exit along with
the current time.
Office Network (LAN)
RFID
Scanner
-> If the person had been here earlier then the
fields would be auto filled.
-> Image will be captured by the attached webcam.
-> A record for this visit will be stored.
-> A message will be transmitted over LAN to
the server for making an Entry for this persons
attendance.
-> Server checks the employee attendance against
the stored rules and may raise an alert if there is
Any violation (Like an employee coming on a day
of holiday etc).
-> Server may also raise an alert under circumstances
Where the employee registers himself while coming
in, but forgets to mark his entry while leaving.

Contenu connexe

Tendances

Visitor management system
Visitor management systemVisitor management system
Visitor management systemRohit Talukdar
 
HIPLA – Visitor Management System
HIPLA – Visitor Management SystemHIPLA – Visitor Management System
HIPLA – Visitor Management Systemhipla2k19
 
Hotel Management System Suite
Hotel  Management  System  SuiteHotel  Management  System  Suite
Hotel Management System SuiteACCENT Trading
 
Hotel management system v2
Hotel management system v2Hotel management system v2
Hotel management system v2Yudhi Aprianto
 
Hotel Management System
Hotel Management SystemHotel Management System
Hotel Management Systemcolimmy
 
Bellsofts Secured Maverick Enterprise Visitor Management
Bellsofts Secured Maverick Enterprise Visitor ManagementBellsofts Secured Maverick Enterprise Visitor Management
Bellsofts Secured Maverick Enterprise Visitor Managementarun_nair
 
Online Hotel Reservation System PPT
Online Hotel Reservation System PPTOnline Hotel Reservation System PPT
Online Hotel Reservation System PPTsurabhi shinde
 
Hotel Management Software Presentation
Hotel Management Software PresentationHotel Management Software Presentation
Hotel Management Software PresentationVision Raval
 
VAMS (Visitor Authentication Management System)
VAMS (Visitor Authentication  Management System)VAMS (Visitor Authentication  Management System)
VAMS (Visitor Authentication Management System)Vaishali Dhamale
 
Hotel+management+system
Hotel+management+systemHotel+management+system
Hotel+management+systemsonikaushal
 
Features of Hotel Management Software - Pure Automate
Features of Hotel Management Software - Pure AutomateFeatures of Hotel Management Software - Pure Automate
Features of Hotel Management Software - Pure AutomatePure Weblopment Limited
 

Tendances (17)

eFACiLiTY Visitor Management System
eFACiLiTY Visitor Management SystemeFACiLiTY Visitor Management System
eFACiLiTY Visitor Management System
 
Headcount Management
Headcount Management Headcount Management
Headcount Management
 
Project presentation
Project presentation Project presentation
Project presentation
 
Visitor management system
Visitor management systemVisitor management system
Visitor management system
 
HIPLA – Visitor Management System
HIPLA – Visitor Management SystemHIPLA – Visitor Management System
HIPLA – Visitor Management System
 
Hotel Management System Suite
Hotel  Management  System  SuiteHotel  Management  System  Suite
Hotel Management System Suite
 
Hotel management system v2
Hotel management system v2Hotel management system v2
Hotel management system v2
 
Hotel Management System
Hotel Management SystemHotel Management System
Hotel Management System
 
Bellsofts Secured Maverick Enterprise Visitor Management
Bellsofts Secured Maverick Enterprise Visitor ManagementBellsofts Secured Maverick Enterprise Visitor Management
Bellsofts Secured Maverick Enterprise Visitor Management
 
Online Hotel Reservation System PPT
Online Hotel Reservation System PPTOnline Hotel Reservation System PPT
Online Hotel Reservation System PPT
 
Hotel Management Software Presentation
Hotel Management Software PresentationHotel Management Software Presentation
Hotel Management Software Presentation
 
VAMS (Visitor Authentication Management System)
VAMS (Visitor Authentication  Management System)VAMS (Visitor Authentication  Management System)
VAMS (Visitor Authentication Management System)
 
Hotel+management+system
Hotel+management+systemHotel+management+system
Hotel+management+system
 
Features of Hotel Management Software - Pure Automate
Features of Hotel Management Software - Pure AutomateFeatures of Hotel Management Software - Pure Automate
Features of Hotel Management Software - Pure Automate
 
PROPERTY MANAGEMENT SYSTEM
PROPERTY MANAGEMENT SYSTEMPROPERTY MANAGEMENT SYSTEM
PROPERTY MANAGEMENT SYSTEM
 
Hotel management system
Hotel management systemHotel management system
Hotel management system
 
M-Brokrage
M-BrokrageM-Brokrage
M-Brokrage
 

Similaire à Visitor and vendor access management system

Fingerprint Attendance System
Fingerprint Attendance SystemFingerprint Attendance System
Fingerprint Attendance Systemsandeep pawar
 
Opis softera i ModulaENVlada
Opis softera i ModulaENVladaOpis softera i ModulaENVlada
Opis softera i ModulaENVladaZoran Perisic
 
ppt_project_group_2.ppt amnd project report
ppt_project_group_2.ppt amnd project reportppt_project_group_2.ppt amnd project report
ppt_project_group_2.ppt amnd project reportsobanmoriwala1
 
Android Application for Mobile Attendance using NFC
Android Application for Mobile Attendance using NFCAndroid Application for Mobile Attendance using NFC
Android Application for Mobile Attendance using NFCIRJET Journal
 
Remote Network Monitoring System
Remote Network Monitoring SystemRemote Network Monitoring System
Remote Network Monitoring SystemSidharth Goel
 
PASSPORT SCANNER
PASSPORT SCANNER PASSPORT SCANNER
PASSPORT SCANNER haritha456
 
ID Scanning solutions
ID Scanning solutionsID Scanning solutions
ID Scanning solutionsNirmalEK
 
Software Requirement Specification Of Hotel Management System
Software Requirement Specification Of Hotel Management SystemSoftware Requirement Specification Of Hotel Management System
Software Requirement Specification Of Hotel Management SystemUttam Singh Chaudhary
 
In C programming please CSCI 4534 Operating Systems Program.pdf
In C programming please CSCI 4534 Operating Systems Program.pdfIn C programming please CSCI 4534 Operating Systems Program.pdf
In C programming please CSCI 4534 Operating Systems Program.pdfankitsrivastava681882
 
E-License System With RTO Controle Room Management System
E-License System With RTO Controle Room Management SystemE-License System With RTO Controle Room Management System
E-License System With RTO Controle Room Management SystemIRJET Journal
 
Centers for Disease Control and Prevention
Centers for Disease Control and PreventionCenters for Disease Control and Prevention
Centers for Disease Control and PreventionPatrick Montgomery
 
Global e payment system ppt
Global e payment system pptGlobal e payment system ppt
Global e payment system pptSalman Khaja
 
CONFidence 2015: SCADA and mobile: security assessment of the applications th...
CONFidence 2015: SCADA and mobile: security assessment of the applications th...CONFidence 2015: SCADA and mobile: security assessment of the applications th...
CONFidence 2015: SCADA and mobile: security assessment of the applications th...PROIDEA
 
NetWatcher Customer Overview
NetWatcher Customer OverviewNetWatcher Customer Overview
NetWatcher Customer OverviewScott Suhy
 
Office Security System
Office Security SystemOffice Security System
Office Security SystemIJMER
 

Similaire à Visitor and vendor access management system (20)

Fingerprint Attendance System
Fingerprint Attendance SystemFingerprint Attendance System
Fingerprint Attendance System
 
Opis softera i ModulaENVlada
Opis softera i ModulaENVladaOpis softera i ModulaENVlada
Opis softera i ModulaENVlada
 
Nac2500
Nac2500Nac2500
Nac2500
 
NAC2500
NAC2500NAC2500
NAC2500
 
ppt_project_group_2.ppt amnd project report
ppt_project_group_2.ppt amnd project reportppt_project_group_2.ppt amnd project report
ppt_project_group_2.ppt amnd project report
 
Presentation
PresentationPresentation
Presentation
 
Android Application for Mobile Attendance using NFC
Android Application for Mobile Attendance using NFCAndroid Application for Mobile Attendance using NFC
Android Application for Mobile Attendance using NFC
 
Remote Network Monitoring System
Remote Network Monitoring SystemRemote Network Monitoring System
Remote Network Monitoring System
 
PASSPORT SCANNER
PASSPORT SCANNER PASSPORT SCANNER
PASSPORT SCANNER
 
ID Scanning solutions
ID Scanning solutionsID Scanning solutions
ID Scanning solutions
 
Software Requirement Specification Of Hotel Management System
Software Requirement Specification Of Hotel Management SystemSoftware Requirement Specification Of Hotel Management System
Software Requirement Specification Of Hotel Management System
 
ATM (1)
ATM (1)ATM (1)
ATM (1)
 
In C programming please CSCI 4534 Operating Systems Program.pdf
In C programming please CSCI 4534 Operating Systems Program.pdfIn C programming please CSCI 4534 Operating Systems Program.pdf
In C programming please CSCI 4534 Operating Systems Program.pdf
 
E-License System With RTO Controle Room Management System
E-License System With RTO Controle Room Management SystemE-License System With RTO Controle Room Management System
E-License System With RTO Controle Room Management System
 
Centers for Disease Control and Prevention
Centers for Disease Control and PreventionCenters for Disease Control and Prevention
Centers for Disease Control and Prevention
 
ACTAtek 3 Introduction
ACTAtek 3 IntroductionACTAtek 3 Introduction
ACTAtek 3 Introduction
 
Global e payment system ppt
Global e payment system pptGlobal e payment system ppt
Global e payment system ppt
 
CONFidence 2015: SCADA and mobile: security assessment of the applications th...
CONFidence 2015: SCADA and mobile: security assessment of the applications th...CONFidence 2015: SCADA and mobile: security assessment of the applications th...
CONFidence 2015: SCADA and mobile: security assessment of the applications th...
 
NetWatcher Customer Overview
NetWatcher Customer OverviewNetWatcher Customer Overview
NetWatcher Customer Overview
 
Office Security System
Office Security SystemOffice Security System
Office Security System
 

Dernier

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Dernier (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

Visitor and vendor access management system

  • 1. H A R D W A R E / S O F T W A R E Access Control and Attendance Systems
  • 2. S Y S T E M O V E R V I E W TAMS Attendance System
  • 4. Hardware Features  Capable of supporting various communication protocols, it can be used in numerous application areas.  - TCP/IP : compatible with access manager(OPTION) - RS-485: Functions with your company’s custom controller - Wiegand ▷ In : Functions with card readers currently in use ▷ Out : Provides various portions of formats, User ID or Card ID output  Suitable for employees’ work hour management with the function keys provided  - Provides four separate keys/ keys can be used in combination (starting work and finishing work, going out, returning to work, etc)  Enhanced user configuration feature (ID digits, sensor option, operation mode, etc)  Enhanced User Convenience  - Auto-on - Provides Shortcut ID / Group Matching Feature - LCD : 2 line graphic LCD (supports various languages) - LED : Status LED 2 each, Authentication result LED 1 each - Voice Guide : Voice Output  Supports various authentication media, making it possible to configure as required by different security methods.  - Fingerprint/Password/RF card (option: HID, MIFARE), combined use is possible
  • 5. Technical Specifications Item Description Material Fingerprint Access Controller Size Optical Type Sensor type Optical Optical Resolution 500 DPI Authentication Mode Mode 1:1, 1:N, Short ID Matching Fact Password, RF card (HID, MIFARE compatible) Time Less than 1 second Operation Mode SO Stand-alone NS Server matching Environment Temperature -20 ~ 60 [oC] Power 12 / 24 [V] Maximum no. of registrations 2,000 Users (1 fingerprint per 1 user) Log 3,000 ea Authentication Rate FRR : 1/1,000 , FAR : 1/100,000 Function Key F1,F2,F3,F4 Communication TCP/IP, Wiegand Input / Output, RS-485 Certification MIC, CE, FCC
  • 6. Software  Efficient management of:  Employees  Visitors  Vendors  Inwards  Compatible to work with:  Biometric  RFID  User name and Password  Compatible with multiple hardware  Cost efficient
  • 7. Software Features  Capture:  Fingerprint (1 or 2 fingers)  RFID information  Username and password  Webcam image of person  Webcam image of belongings  Generate visitor access permission slip automatically  Intimate the employee whom a visitor has come to meet
  • 8. Software Features  Virtually unlimited number of finger print storage capability  Virtually indefinite period reports(1 day, 1 week, 1 month, 1 year, N years, period FROM - TO)  Real time alert engine  Robust Alert Engine:  Email notification on rule violation  SMS notification on rule violation  Screen popup at security  Hooter or Visual alerts  Single software setup  One time software setup cost  A sophisticated client server software
  • 9. General System Layout Finger Print Scanner Processing machine (PC) Camera Capture Image (On Trigger) Receive Image Receive Identity Send user information to server SERVER Store the attendance information in database Generate and Email REPORTS Continuously check for rule violation. Take action Office Network (LAN) RFID Scanner
  • 13. S Y S T E M A R C H I T E C T U R E Visitor Management System
  • 14. Finger Print Scanne r Processing machine (PC) Camera Capture Image (On Trigger) Receive ImageReceive Finger Print The processing machine is connected to the employee database and visitor records database. When a person swipes Finger, a popup display is presented on the attached screen where the registration page is visible. (If the person had been here earlier then the fields would be auto filled). Image will be captured by the attached webcam. A record for this visit will be stored. A message will be transmitted over LAN to the person whom the visitor has come to meet Employee 1 workstation (PC) Employee 2 workstation (PC) Employee 4 workstation (PC) Employee 5 workstation (PC) The concerned persons display shows a pop up message with the image of the visitor. The Employee can then take one of the following actions: 1. ACCEPT 2. REJECT 3. FORWARD This selection by the employees on the pop-up on his screen will be received by the security guard. Based on Employees willingness, a temporary Card will be issued to the visitor. If the employee forwards the visiting request to some Other employee, a request message similar to the one Received by this employee will be generated and sent to the new employee. Office Network (LAN) General System Layout
  • 15. FPS SERVER 1. Finger Swipe Detected 2. Server checks in the DB whether it is a new visitor. -> If it is a new visitor then a form is presented to the security guard for entering the details. -> If old visitor, then the history is shown and the same form is auto filled. The security guard can check the details along with the stored photo and select another employee. -> If an office employee who has forgotten / lost his RFID tag. Action may be taken as per company policies Under such circumstances. Cam 3. Capture the image of the visitor and store in the database Employee 1 PC 4. Server generates a request for the host employee for this visitor 5. Employee sends back an acknowledgement to the server Employee X PC 6. If the employee said: ACCEPT: The security guard generates a temporary card with the photograph of the visitor on it and sends the visitor in to meet the host employee. * Once the host employee meets the visitor and his meeting is over, he sends a message to the server, stating that his meeting is over. * The server generates a prompt at security cabin about this. * If the security guard does not respond with a “visitor Left Office” message within the stipulated time frame then the server raises an alert. REJECT: The security guard makes an entry for this visitor in the DB with a rejected remark and sends him back as the permission is not granted. FORWARD: The host employee can forward this visitors request to some other host employee. The new host employee can then follow the same routine. He will also be intimated about who forwarded the request to him. 8. All these transactions should be stored in a DB. Functional Flow Diagram Regular Visitor Employee 1 PC OR 9. REPORTS
  • 16. FPS SERVER 1. Finger Swipe Detected 2. Server checks in the DB whether it is a new visitor. -> If it is a new visitor then a form is presented to the security guard for entering the details. -> If old visitor, then the history is shown and the same form is auto filled. The security guard can check the details along with the stored photo and select another employee. Cam 3. Capture the image of the visitor and store in the database Employee 1 PC 5. Server acknowledges the arrival of the client the host employee. 4. Critical Client: Employee fills up the form and sends it to server before the visitors arrival. The window opens and remain at security gate where the client is expected. When the client reaches, his finger print is captured, image is grabbed and pass is generated based on the information that host employee had provided. This allows saving time for the client as the registration process is avoided. 6. All these transactions should be stored in a DB. Functional Flow Diagram Critical Client Visitor
  • 17. S Y S T E M A R C H I T E C T U R E Vendor Attendance System
  • 18. General System Layout Finger Print Scanner Processing machine (PC) Camera Capture Image (On Trigger) Receive Image Receive Identity -> The processing machine is connected to the visitor records database. -> When a person swipes Finger or flashes RFID card, a popup display is presented on the attached screen where the registration page is visible. SERVER -> Server maintains the attendance record for all the visiting vendors. When a new vendor Employee comes in and marks his identity a record is filled for his entry / exit along with the current time. Office Network (LAN) RFID Scanner -> If the person had been here earlier then the fields would be auto filled. -> Image will be captured by the attached webcam. -> A record for this visit will be stored. -> A message will be transmitted over LAN to the server for making an Entry for this persons attendance. -> Server checks the employee attendance against the stored rules and may raise an alert if there is Any violation (Like an employee coming on a day of holiday etc). -> Server may also raise an alert under circumstances Where the employee registers himself while coming in, but forgets to mark his entry while leaving.