An intelligent networked security system to manage who enters your premise. No more do you need to call your employees off their desks to security cabin to escort the visitors. Let the employee see who has come and authenticate his entry. Raise an alarm if the visitor does not leave premise within stipulated time after his meeting is over. Keep a record of all the visitors and whom they had come to meet.
4. Hardware Features
Capable of supporting various communication protocols, it can be used in numerous
application areas.
- TCP/IP : compatible with access manager(OPTION)
- RS-485: Functions with your company’s custom controller
- Wiegand
▷ In : Functions with card readers currently in use
▷ Out : Provides various portions of formats, User ID or Card ID output
Suitable for employees’ work hour management with the function keys provided
- Provides four separate keys/ keys can be used in combination
(starting work and finishing work, going out, returning to work, etc)
Enhanced user configuration feature (ID digits, sensor option, operation mode, etc)
Enhanced User Convenience
- Auto-on
- Provides Shortcut ID / Group Matching Feature
- LCD : 2 line graphic LCD (supports various languages)
- LED : Status LED 2 each, Authentication result LED 1 each
- Voice Guide : Voice Output
Supports various authentication media, making it possible to configure as required by different
security methods.
- Fingerprint/Password/RF card (option: HID, MIFARE), combined use is possible
5. Technical Specifications
Item Description
Material Fingerprint Access Controller
Size Optical Type
Sensor type Optical Optical
Resolution 500 DPI
Authentication Mode Mode 1:1, 1:N, Short ID Matching
Fact Password, RF card (HID,
MIFARE compatible)
Time Less than 1 second
Operation Mode SO Stand-alone
NS Server matching
Environment Temperature -20 ~ 60 [oC]
Power 12 / 24 [V]
Maximum no. of registrations 2,000 Users (1 fingerprint per 1
user)
Log 3,000 ea
Authentication Rate FRR : 1/1,000 , FAR : 1/100,000
Function Key F1,F2,F3,F4
Communication TCP/IP, Wiegand Input / Output,
RS-485
Certification MIC, CE, FCC
6. Software
Efficient management of:
Employees
Visitors
Vendors
Inwards
Compatible to work with:
Biometric
RFID
User name and Password
Compatible with multiple hardware
Cost efficient
7. Software Features
Capture:
Fingerprint (1 or 2 fingers)
RFID information
Username and password
Webcam image of person
Webcam image of belongings
Generate visitor access permission slip automatically
Intimate the employee whom a visitor has come to
meet
8. Software Features
Virtually unlimited number of finger print storage
capability
Virtually indefinite period reports(1 day, 1 week, 1 month,
1 year, N years, period FROM - TO)
Real time alert engine
Robust Alert Engine:
Email notification on rule violation
SMS notification on rule violation
Screen popup at security
Hooter or Visual alerts
Single software setup
One time software setup cost
A sophisticated client server software
9. General System Layout
Finger
Print
Scanner
Processing
machine (PC)
Camera
Capture Image
(On Trigger)
Receive Image
Receive Identity
Send user information to server
SERVER
Store the attendance information in database
Generate and Email REPORTS
Continuously check for rule violation.
Take action
Office Network (LAN)
RFID
Scanner
13. S Y S T E M A R C H I T E C T U R E
Visitor Management System
14. Finger
Print
Scanne
r
Processing
machine (PC)
Camera
Capture Image
(On Trigger)
Receive ImageReceive Finger Print
The processing machine is connected
to the employee database and visitor
records database. When a person swipes
Finger, a popup display is presented on
the attached screen where the registration
page is visible. (If the person had been here
earlier then the fields would be auto filled).
Image will be captured by the attached webcam.
A record for this visit will be stored. A message
will be transmitted over LAN to the person whom
the visitor has come to meet
Employee 1
workstation
(PC)
Employee 2
workstation
(PC)
Employee 4
workstation
(PC)
Employee 5
workstation
(PC)
The concerned persons display shows a pop
up message with the image of the visitor. The
Employee can then take one of the following
actions:
1. ACCEPT
2. REJECT
3. FORWARD
This selection by the employees on the pop-up
on his screen will be received by the security guard.
Based on Employees willingness, a temporary
Card will be issued to the visitor.
If the employee forwards the visiting request to some
Other employee, a request message similar to the one
Received by this employee will be generated and sent to
the new employee.
Office Network (LAN)
General System Layout
15. FPS
SERVER
1. Finger Swipe
Detected
2. Server checks in the DB
whether it is a new visitor.
-> If it is a new visitor then a
form is presented to the
security guard for entering
the details.
-> If old visitor, then the history
is shown and the same form is
auto filled. The security guard
can check the details along with
the stored photo and select
another employee.
-> If an office employee who has
forgotten / lost his RFID tag. Action
may be taken as per company policies
Under such circumstances.
Cam
3. Capture the image
of the visitor and
store in the database
Employee
1 PC
4. Server generates a request for the host employee for this visitor
5. Employee sends back an acknowledgement to the server
Employee
X PC
6. If the employee said:
ACCEPT: The security guard generates a temporary card with the photograph
of the visitor on it and sends the visitor in to meet the host employee.
* Once the host employee meets the visitor and his meeting is over, he
sends a message to the server, stating that his meeting is over.
* The server generates a prompt at security cabin about this.
* If the security guard does not respond with a “visitor Left Office” message
within the stipulated time frame then the server raises an alert.
REJECT: The security guard makes an entry for this visitor in the DB with a rejected
remark and sends him back as the permission is not granted.
FORWARD: The host employee can forward this visitors request to some other host
employee. The new host employee can then follow the same routine. He will also
be intimated about who forwarded the request to him.
8. All these transactions should be stored in a DB.
Functional Flow Diagram
Regular Visitor
Employee
1 PC
OR
9. REPORTS
16. FPS
SERVER
1. Finger Swipe
Detected
2. Server checks in the DB
whether it is a new visitor.
-> If it is a new visitor then a
form is presented to the
security guard for entering
the details.
-> If old visitor, then the history
is shown and the same form is
auto filled. The security guard
can check the details along with
the stored photo and select
another employee.
Cam
3. Capture the image
of the visitor and
store in the database
Employee
1 PC
5. Server acknowledges the arrival of the client the host employee.
4. Critical Client: Employee fills up the form and sends it to server
before the visitors arrival.
The window opens and remain at security gate where
the client is expected.
When the client reaches, his finger print is captured, image
is grabbed and pass is generated based on the information
that host employee had provided.
This allows saving time for the client as the registration
process is avoided.
6. All these transactions should be stored in a DB.
Functional Flow Diagram
Critical Client Visitor
17. S Y S T E M A R C H I T E C T U R E
Vendor Attendance System
18. General System Layout
Finger
Print
Scanner
Processing
machine (PC)
Camera
Capture Image
(On Trigger)
Receive Image
Receive Identity
-> The processing machine is connected
to the visitor records database.
-> When a person swipes Finger or flashes
RFID card, a popup display is presented on
the attached screen where the registration
page is visible.
SERVER
-> Server maintains the attendance record for
all the visiting vendors. When a new vendor
Employee comes in and marks his identity a
record is filled for his entry / exit along with
the current time.
Office Network (LAN)
RFID
Scanner
-> If the person had been here earlier then the
fields would be auto filled.
-> Image will be captured by the attached webcam.
-> A record for this visit will be stored.
-> A message will be transmitted over LAN to
the server for making an Entry for this persons
attendance.
-> Server checks the employee attendance against
the stored rules and may raise an alert if there is
Any violation (Like an employee coming on a day
of holiday etc).
-> Server may also raise an alert under circumstances
Where the employee registers himself while coming
in, but forgets to mark his entry while leaving.