SlideShare une entreprise Scribd logo
1  sur  31
Télécharger pour lire hors ligne
Company                      Axis Software Pvt Ltd, India
Products                     Biometric ATMs, PIN based ATMs, Kiosks, POS, Cashless ATMs
Date                         10/05/10




       Product Photographs
       (ATMs, Kiosks, POS)




                             Axis Software Private Limited
       1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
                                  www.axistech.com
TABLE OF CONTENTS


1.   COMPANY PROFILE

2.   AXIS PRODUCT CONFIGURATION DOCUMENT

        a) Standard ATMs

        b) Optional features available with axis ATMs

        c) Cashless ATM

        d) Kiosks

        e) POS

        f) Retro Fit Kit

3.   TERMS AND CONDITIONS

4.   AXIS SUPPORT POLICY




                           Axis Software Private Limited
     1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
                                www.axistech.com
1. COMPANY PROFILE
  1. Name of the Company    Axis Software Pvt. Ltd.
                            Registered under the Companies Act in 1993
  2. Brand Name             AXIS
  3. Nature of Business     Design, Develop, Manufacture & Marketing of Biometric ATMs,
                            PIN Based ATMs, Cashless ATMs, Kiosk & POS

  4. Product Lines

  a)Transaction Terminals         •   Biometric ATM
                                  •   PIN Based ATM
                                  •   Cashless ATM
                                  •   Kiosk
                                  •   Point of Sale (POS)
                                  •   Retro Fit Kit
                                  •   Time and Attendance System
                                  •   Access Control System

    b) Fixed and Wireless         •   Fixed Line ATM Terminals
       Products                   •   Wireless ATM Terminals
                                  •   Mobile ATM Terminals
                                  •   Bill Payment Kiosk
                                  •   Passbook Printing Kiosk
                                  •   Fund Transfer Kiosk
                                  •   Check Depositing Kiosk
                                  •   Ticketing Kiosk
                                  •   Information Kiosk
                                  •   Fixed Line POS terminals
                                  •   Wireless POS terminals
                                  •   Biometric POS

                                  •   Biometric Authentication Software
    c) Software Products
                                  •   Time and Track Software
                                  •   Kiosk Monitoring Software
                                  •   Remote Monitoring Software
                                  •   WOSA XFS/ J XFS




                             Axis Software Private Limited
       1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
                                  www.axistech.com
5. Technology Expertise      •   Hardware & software customization for ATMs, Kiosks,
                                 Cashless ATMs, POS, Time and Attendance system,
                                 EMV, application development experience on various
                                 Card based technologies
                             •   Research, design & development Encryption
                                 (Symmetric & Asymmetric) Biometrics
                             •   Wide experience in product development &
                                 prototyping
                          We export our products to various countries in APAC, EMEA &
6. Exports                USA




                           Axis Software Private Limited
     1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
                                www.axistech.com
COMPANY PROFILE in detail:
Headquartered in Pune (India) and founded in April 2000, Axis is a technology-driven
Company, developing innovative products and solutions that increase user confidence in the
electronic infrastructure, increase service efficiency and build new delivery channels through
the application of intelligent technologies -both software and hardware- using biometrics,
encryption and related technologies.
Axis’ areas of focus are PIN based and Biometric based ATMs, Kiosks for various transaction
applications (Funds Transfer, Check-cashing, Ticketing, loan Application etc.), Attendance and
Access Control Systems (both logical and physical), Large database systems for National ID,
Voter Identification and Criminal Justice (Police) systems, having its expertise in card based
technologies.
Axis has designed a full-featured ATM, called -Automated Banking Machine or ABM for an
American financial institution. The ABM has other banking features like funds-transfer, check
truncation (cashing), loan application, loan disbursal and currency and coin acceptance and
disbursal. Axis has also developed an innovative product called the Biometric Retrofit Kit for
ATMs/kiosks. This kit converts a regular ATM to a Biometric base, either fingerprint or iris,
ATM. This very easy to deploy kit is very affordably priced.

Axis is generally considered the first in the world to have developed a biometric, EFT switch
based authentication, full-featured ATM. Axis has successfully tested these ATMs/kiosks and is
currently deploying them, inter alias, through Citibank. If you are deploying ATMs/kiosks for
the first time then you should seriously consider our Biometric based ATMs/kiosks that require
no expensive back-end infrastructure, like EFT switch and HSM, and can be deployed almost
overnight at a fraction of the cost of regular PIN based ATMs/kiosks. You do not need to invest
in cards, expensive PIN management software and helpdesks for lost cards and forgotten
PINs. A user can be registered in minutes and start using the ATM immediately.

How do we make this possible?
  • Complete in-house research, design, development & manufacturing
  • Very short overall product development cycle
  • Wide experience in product development including prototyping & injection molding
  • Required skills for developing advanced financial systems
  • Linux / Microsoft / Embedded Platforms

Axis is ISO: 9001:2000 certified. Axis has several patents applied for in the USPTO and
employs close to 100 employees with a strong focus on R&D and innovation.

Advantages of Axis ATMs:
   • High transaction security
   • Very low total cost of ownership
   • Low operating cost
   • Easy to use
   • Quick and easy to deploy
   • High customer convenience
   • Alternative authentications – biometrics, in addition to PINATMs can operate in Switch
      or Switch-less mode with minimal changes to existing infrastructure


                             Axis Software Private Limited
       1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
                                  www.axistech.com
2. Axis Product Configuration Document

  A) Axis Standard ATMs:

  1. AX 811 with Standard features

     Type: Stand Alone

     Access: Front Loading

     Emulation: NDC Compliant

     Authentication 1: PIN

     Authentication 2: Biometric

     Processor & Memory: Intel CHIP Set

     Media Reader / Writer: Combination DVD Read / CD
     Write

     Speakers: Dual 4W

     Card Reader: Magnetic / DIP

     PIN Pad and Menu Keys: EPP + 8 FDKs

     Display: 10” Colour TFT LCD

     Security Lock Type: Single Mechanical Combination Lock

     Cash Cassette Configuration: 1 Cassette

     Each Cassette Capacity: 1000 Notes

     Consumer Printer: 35 Column Thermal

     Electronic Journal: Available




                           Axis Software Private Limited
     1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
                                www.axistech.com
2. AX 811 E with Standard features

   Type: Stand Alone

   Access: Front Loading

   Emulation: NDC Compliant

   Authentication 1: PIN

   Authentication 2: Biometric

   Processor & Memory: Intel CHIP Set

   Media Reader / Writer: Combination DVD Read / CD
   Write

   Speakers: Dual 4W

   Card Reader: Magnetic / DIP

   PIN Pad and Menu Keys: EPP + 8 FDKs

   Display: 10” Colour TFT LCD

   Safe: 6mm or UL 291 Level 1 Compliant

   Security Lock Type: Single Mechanical Combination Lock

   Cash Cassette Configuration: 1 Cassette

   Each Cassette Capacity: 1000 Notes

   Consumer Printer: 35 Column Thermal

   Electronic Journal: Available




                         Axis Software Private Limited
   1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
                              www.axistech.com
3. AX 821 with Standard features

   Type: Stand Alone

   Access: Front Loading

   Emulation: NDC Compliant

   Authentication 1: PIN

   Authentication 2: Biometric

   Processor & Memory: Intel CHIP Set

   Media Reader / Writer: Combination DVD Read /
   CD Write

   Speakers: Dual 4W

   Card Reader: Magnetic / DIP

   PIN Pad and Menu Keys: EPP + 8 FDKs

   Display: 10” Colour TFT LCD

   Safe: 6mm or UL 291 Level 1 Compliant

   Security Lock Type: Digital Combination with Time Delay + Mechanical Lock

   Cash Cassette Configuration: 2 Cassettes

   Each Cassette Capacity: 1700 Notes

   Consumer Printer: 35 Column Thermal

   Electronic Journal: Available

   Camera: Optional




                         Axis Software Private Limited
   1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
                              www.axistech.com
4. AX 825 with Standard features

   Type: Through The Wall

   Access: Rear Loading

   Emulation: NDC Compliant

   Authentication 1: PIN

   Authentication 2: Biometric

   Processor & Memory: Intel CHIP Set

   Media Reader / Writer: Combination DVD Read /
   CD Write

   Speakers: Dual 4W

   Card Reader: Magnetic / DIP

   PIN Pad and Menu Keys: EPP + 8 FDKs

   Display: 15” Colour TFT LCD

   Safe: 6mm or UL 291 Level 1 Compliant

   Security Lock Type: Digital Combination with Time Delay + Mechanical Lock

   Cash Cassette Configuration: 2 Cassettes

   Each Cassette Capacity: 2500 Notes

   Consumer Printer: 35 Column Thermal

   Electronic Journal: Available

   Camera: Optional




                         Axis Software Private Limited
   1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
                              www.axistech.com
5. AX 835 with Standard features

   Type: Through The Wall

   Access: Rear Loading

   Emulation: NDC Compliant

   Authentication 1: PIN

   Authentication 2: Biometric

   Processor & Memory: Intel CHIP Set

   Media Reader / Writer: Combination DVD Read /
   CD Write

   Speakers: Dual 4W

   Card Reader: Magnetic / DIP

   PIN Pad and Menu Keys: EPP + 8 FDKs

   Display: 15” Colour TFT LCD

   Safe: 6mm or UL 291 Level 1 Compliant

   Security Lock Type: Digital Combination with Time Delay + Mechanical Lock

   Cash Cassette Configuration: 3 Cassettes

   Each Cassette Capacity: 2500 Notes

   Consumer Printer: 35 Column Thermal

   Electronic Journal: Available

   Camera: Optional




                         Axis Software Private Limited
   1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
                              www.axistech.com
6. AX 831 with Standard features

   Type: Lobby Type

   Access: Front Loading

   Emulation: NDC Compliant

   Authentication 1: PIN

   Authentication 2: Biometric

   Processor & Memory: Intel CHIP Set

   Media Reader / Writer: Combination DVD Read / CD
   Write

   Speakers: Dual 4W

   Card Reader: Magnetic / DIP

   PIN Pad and Menu Keys: EPP + 8 FDKs

   Display: 15” Colour TFT LCD

   Safe: 6mm or UL 291 Level 1 Compliant

   Security Lock Type: Digital Combination with Time Delay + Mechanical Lock

   Cash Cassette Configuration: 3 Cassettes

   Each Cassette Capacity: 2500 Notes

   Consumer Printer: 35 Column Thermal

   Electronic Journal: Available

   Camera: Optional




                         Axis Software Private Limited
   1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
                              www.axistech.com
7. AX 831 E with Standard features

   Type: Stand Alone

   Access: Front Loading

   Emulation: NDC Compliant

   Authentication 1: PIN

   Authentication 2: Biometric

   Processor & Memory: Intel CHIP Set

   Media Reader / Writer: Combination DVD Read /
   CD Write

   Speakers: Dual 4W

   Card Reader: Magnetic / DIP

   PIN Pad and Menu Keys: EPP + 8 FDKs

   Display: 10” Colour TFT LCD

   Safe: 6mm or UL 291 Level 1 Compliant

   Security Lock Type: Digital Combination with Time Delay + Mechanical Lock

   Cash Cassette Configuration: 3 Cassettes

   Each Cassette Capacity: 2500 Notes

   Consumer Printer: 35 Column Thermal

   Electronic Journal: Available

   Envelop Depositor: Available

   Camera: Optional




                         Axis Software Private Limited
   1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
                              www.axistech.com
8. AX 841 (ABM) with Standard features
   Type: Stand Alone

   Access: Front Loading

   Emulation: NDC Compliant

   Authentication 1: PIN

   Authentication 2: Biometric

   Processor & Memory: Intel CHIP Set

   Media Reader / Writer: Combination DVD
   Read / CD Write

   Speakers: Dual 4W

   Card Reader: Magnetic / DIP

   PIN Pad and Menu Keys: EPP + 8 FDKs

   Display: 10” Colour TFT LCD

   Safe: 6mm or UL 291 Level 1 Compliant

   Security Lock Type: Digital Combination
   with Time Delay + Mechanical Lock

   Cash Cassette Configuration: 3 Cassettes (Multiple up to 4)

   Each Cassette Capacity: 2500 Notes

   Cash Deposit: Available

   Coin Deposit: Available

   Coin Dispense: Available

   Check Scanner: Check 21 Compliant

   Consumer Printer: 35 Column Thermal

   Electronic Journal: Available

   Envelop Depositor: Available



                         Axis Software Private Limited
   1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
                              www.axistech.com
B) Optional Features Available with Axis ATMs

                     AX     AX     AX      AX     AX      AX        AX          AX
   Features
                     811   811E    821     825    835     831      831E         841
    Number of
 Cassettes up to 8                                                       
  EMV Compliant
   Card Reader                                                           
  Motorized Card
     Reader                                                              
   Hybrid Card
     Reader                                                              
  Touch Screen
                                                                         
  UL 291 Level 1
    Compliant                                                            
 UL 291 Business
 Hours compliant                                                         
  Check Scanner
                                                                         
 Bar Code Reader
                                                                         
  Coin Acceptor
                                                                         
  Coin Dispenser
                                                                         
  Cash Acceptor
                                                                         
    Fingerprint
    Biometric                                                            
  IRIS Biometric
                                                                         
  Face Biometric
                                                                         
     Camera
                                                                         
                            Axis Software Private Limited
      1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
                                 www.axistech.com
C) Cashless ATM


                                        Type: Wall Mount

                                        Access: Front Loading

                                        Emulation: NDC Compliant

                                        Authentication 1: PIN

                                        Authentication 2: Biometric

                                        Processor & Memory: Intel CHIP Set

                                        Speakers: Dual 4W

                                        Card Reader: Magnetic / DIP

                                        PIN Pad and Menu Keys: EPP + 8 FDKs

                                        Display: 6.4” Colour TFT LCD

                                        Consumer Printer: 35 Column Thermal

                                        Camera: Available

                                        Size: 400 X 190 X 60

                                        Power: 60W




                          Axis Software Private Limited
    1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
                               www.axistech.com
D) KIOSKS

1. Bill Payment Kiosk

   Model: AX 731
   Access: Rear Loading
   Processor: Intel Chipset
   RAM: 512 MB
   HDD: 40 GB or Higher
   Display: 15” Colour TFT LCD with Touch Screen
   Speakers: Dual 4W
   Authentication: PIN based with EPP – TDES
   Card Reader: Magnetic / Dip Type
   Check Scanner: MICR
   Cash Acceptor: 4 Way Acceptance with 1200 notes capacity
   Barcode Reader: Code 128 Compliant (Optional)
   Shell: 2mm Thickness
   Safe for Cash Acceptor: 6 mm Thickness
   Shell Lock: Mechanical Lock
   Consumer Printer: 35 Column Thermal

2. Passbook Printing Kiosk

   Model: AX 731
   Access: Rear Loading
   Processor: Intel Chipset
   RAM: 512 MB
   HDD: 40 GB or Higher
   Display: 15” Colour TFT LCD with Touch Screen
   Speakers: Dual 4W
   Authentication: PIN based with EPP – TDES
   Card Reader: Magnetic / Dip Type
   Check Scanner: MICR (Optional)
   Shell: 2mm Thickness
   Safe for Cash Acceptor: 6 mm
   Shell Lock: Mechanical Lock
   Passbook Printer: Automatic document alignment & edge
   ensign, Thicker passbook handling up to 2.2mm




                        Axis Software Private Limited
  1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
                             www.axistech.com
3. Check Acceptor Kiosk

   Model: AX 731
   Access: Rear Loading
   Processor: Intel Chipset
   RAM: 512 MB
   HDD: 40 GB or Higher
   Display: 15” Colour TFT LCD with Touch Screen
   Speakers: Dual 4W
   Authentication: PIN based with EPP – TDES
   Check Scanner 1: MICR with Truncation
   Check Scanner 2: MICR
   Shell: 2mm Thickness
   Check Drop Area: 3 mm thickness
   Speakers: Dual 4W
   Keyboard: Full Metal keyboard with touch-pad
   Soft Keyboard: Optional
   Camera: Optional
   Shell Lock: Mechanical Lock
   Consumer Printer: 35 Column Thermal


4. Information Kiosk

   Model: AX 731
   Access: Front Loading
   Processor: Intel Chipset
   RAM: 512 MB
   HDD: 40 GB or Higher
   Display: 15” Colour TFT LCD with Touch Screen
   Speakers: Dual 4W
   Authentication: PIN based with EPP – TDES
   Speakers: Dual 4W
   Keyboard: Full Metal keyboard with touch-pad
   Soft Keyboard: Optional
   Camera: Optional
   Shell Lock: Mechanical Lock
   Consumer Printer: 35 Column Thermal




                        Axis Software Private Limited
  1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
                             www.axistech.com
5. Fund Transfer Kiosk

   Model: AX 731
   Access: Rear Loading
   Processor: Intel Chipset
   RAM: 512 MB
   HDD: 40 GB or Higher
   Display: 15” Colour TFT LCD with Touch Screen
   Speakers: Dual 4W
   Authentication: PIN based with EPP – TDES
   Speakers: Dual 4W
   Cash Acceptor: 4 Way note acceptor
   Card Reader: Magnetic / DIP
   Coin Acceptor: Optional
   Check Scanner 1: MICR
   Check Scanner 2: MICR Truncation
   Keyboard: Full Metal keyboard with touch pad
   Soft Keyboard: Optional
   Camera: Optional
   Shell Lock: Mechanical Lock
   Consumer Printer: 35 Column Thermal

6. Ticketing Kiosk

   Model: AX 731
   Access: Rear Loading
   Processor: Intel Chipset
   RAM: 512 MB
   HDD: 40 GB or Higher
   Display: 15” Colour TFT LCD with Touch Screen
   Speakers: Dual 4W
   Authentication: Numeric Keypad
   Speakers: Dual 4W
   Cash Acceptor: 4 Way note acceptor
   Card Reader: Magnetic / DIP
   Coin Acceptor: Optional
   Camera: Optional
   Shell Lock: Mechanical Lock
   Consumer Printer: 35 Column Thermal

7. And Many More in the List as per client
   requirement.




                         Axis Software Private Limited
   1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
                              www.axistech.com
E) Axis POS:


1. Axis POS AX 901




2. Axis Bio-POS AX 911




                        Axis Software Private Limited
  1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
                             www.axistech.com
F) RETROFIT KIT
Retro Fit Kit ATM (AX-801)

Axis Biometric Retrofit Kits for ATMs:

Axis has developed an innovative new product called the Biometric Retrofit Kit for ATMs. This
kit converts a regular ATM to a biometric based, either fingerprint or iris, ATM. This very easy
to deploy kit is very affordably priced. This kit has generated a huge interest among financial
institutions. This device can convert your standard ATMs to Biometric ATMs. Retro Fit Kit can
be integrated with existing standard ATMs to make them more secure with fingerprint
authentication technology. The functionality of the ATM remains the same with an added
advantage of Biometrics. Various combinations of PIN number, cards, & biometrics can be
used for authentication depending upon the security levels.

Robust and fault tolerant. Can operate in non air-conditioned Environment Quick and easy to
deploy. Can start using within hours of Installation User-friendly Displays, Optional Touch
Screen Dynamic interfaces - Intelligent audio, visual & silent alerts Compatible with popular
ATM switches. Advanced image processing and pattern recognition algorithms for Fingerprint
verification

Technical Details:

Protocol Support: Supports NDC Protocol

Device Supports: Audio: Online audio instructions

Fingerprint Scanner: Optical

Display: Two Lines LCD

Operating Humidity: 90 % RH

Operating System: Linux




                             Axis Software Private Limited
       1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
                                  www.axistech.com
3. TERMS & CONDITIONS
1. PAYMENT TERMS

100% as advance along with the purchase order

2. DELIVERY PERIOD

Delivery is subject to Force Majeure conditions, for which Axis shall not be responsible Delivery
of the ordered equipment, shall be within 4-6 weeks subject to Axis receiving a confirmed order
with advance payment specifying the configuration and site location

3. DUTIES & TAXES

The above rates of hardware and software are exclusive of any other applicable local taxes. All
such taxes are extra and will be payable at actual by the buyer

4. INSTALLATION & TRAINING

Installation:

Axis engineers will install the ATM Hardware and Software at the buyer’s site @US$250.00 per
ATM. The buyer will have to bear the to-and-fro economy class air travel charges, food & local
stay for two Axis installation engineers. Due to some conditions/reasons, if the buyer is not able
to get the installation done or is unable to provide the required resources (in terms of ATM
installation) to Axis engineers within 15 day’s, then it will be assumed that the delay in ATM
installation is caused by the buyer & that the buyer will have to pay an extra charge US$100.00
per day per engineer.

Training at Axis Software premises Pune, India:

A 4-day Axis Certified ATM Training is available at our Technical Training Workshop at Pune
@ US$ 500.00 per buyer personal for a maximum of three buyer personnel, which includes:

ATM Administration and Transaction Analysis

First Level Maintenance and ATM Replenishment Training

ATM Troubleshooting Procedures

ATM Startup and Shutdown

ATM Diagnostics

Customer’s Fingerprint Registration Procedure


                             Axis Software Private Limited
       1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
                                  www.axistech.com
ATM software Flow & System study

Travel Conveyance and Accommodation at Pune is to be borne by the buyer. Please inquire
with Axis for the training schedules.

Training at buyer’s site or other convenient location:

If in case this training is required at the buyer’s site or some other convenient location by the
buyer, US$ 1,500.00 will be charged per day. The buyer will have to bear the to-and-fro
economy class air travel charges of the installation engineer. We will also provide an on-site
ATM procedures training for two bank personnel at the ATM site once the ATM is installed.

Note: All the above are payable in advance.

5. WARRANTY

The equipment supplied by Axis shall be warranted against defects for a period as follows:

12 months from date of delivery / dispatch. Our warranty shall not apply to goods which have
been altered or repaired or damaged after installation by anyone except our authorized
Employees, nor shall it apply if the goods have been damaged by power fluctuations, abuse,
negligence, customer modification, misapplication, lightning, water damage or any other natural
calamities. Our obligation and liabilities hereunder shall not be enforceable until our goods
have been fully paid for. Our warranty is limited to the original purchaser only.

6. AMC (annual maintenance contract) CHARGES

After Warranty, AMC @ 13% and 15% of the total order value will be charged for the first and
second year respectively, payable at the beginning of the contract period.

7. OTHER CONDITIONS

Certification: Any product certification required for shipment, will be bare by the buyer

Exclusion of work: Any sort of civil and electrical work, conducted for the buyer would perform
main power supply to the system

Quotation validity: Thirty (30) days from the date of this quotation Purchase Order should
favor Axis Software Pvt. Ltd., Pune

8. JURISDICTION - Any future disputes that may arise out of this proposal are subject to the
jurisdiction of courts at Pune, India only.




                             Axis Software Private Limited
       1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
                                  www.axistech.com
4. AXIS Support Policy
Axis uses world-class and new components for all its products. As a result, AXIS’ products are
working even in rural India, where the temperatures soar up to 480 C and it is very dusty, for 4
to 5 years without any major preventive or remedial maintenance requirement. Axis
recommends that moving parts require minimum support and hence the remedial and
preventive maintenance will be significantly low if components with moving parts are avoided.
For instance: a Dip Card Reader is much more efficient and needs less maintenance than a
Motorized Card Reader. The major maintenance issues with the Cash Dispenser are
associated with the removal of currency bills that are jammed. Axis products are designed in
such a way that all components are easy to reach and service. Bank personnel trained by Axis
can easily accomplish a bill jam removal.

AXIS believes in training the deployer for the maintenance of its products so that the deployer
gets maximum uptime from them. Case in point is if there is a paper jam and a support person
is to be deployed by AXIS, and then it might take the support engineer to reach the site in a
day, or more in some cases, which would result in expensive down time. Alternatively, if
deplorer’s personnel are trained, the situation can be remedied in a matter of a few minutes,
resulting in dramatically increasing the uptime of the service the buyer wishes to provide.

All of the above significantly reduce the Total Cost of Ownership of Axis products resulting in
quicker payback for the investment made and also the increase in the confidence levels of the
users of the services because of very high uptimes.

The deployer also saves a lot of money on the subsequent Annual Maintenance Costs, as they
get mitigated due to larger role being played by the deployer. There is also a greater sense of
ownership amongst the deployer’s personnel resulting in overall better service experiences for
the user.

AXIS provides training to deployer’s personnel free of cost if the deployer purchases a total of
at least 50 ATM units.

AXIS’ Online and Telephonic support is available round the clock for guidance if so required
post training.

Axis maintains spares for at least duration of 5 (five) years after the delivery of the products.




                             Axis Software Private Limited
       1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
                                  www.axistech.com
KEY AXIS PRODUCTS & BIOMETRICS

Time N’ Track
It is a family of powerful microprocessor based Time & Attendance and Access Control
system enabled with the latest Biometrics, encryption and smart card technology. The
System supports a very friendly user interface and advanced policy software. The SBC
supports various biometric technologies and sensors.
DesCop
It’s a Biometrics based desktop protection system from Axis, which secures your computer
from unauthorized use. You can control access to your sensitive files and prevent them from
falling into the wrong hands. DesCop offers comprehensive data security protection with:
•        Logon/Screensaver System
•        Logging on to the network
•        File encryption system
•        File/Folder/Drive/Application locking system
•        Encryption of the file while sending it over the network
•        Effective user management
Access can be controlled through any one or a combination of Password, Biometrics or Smart
Card and can also be added to the toolbar of applications such as Internet Explorer, Microsoft
office, Outlook, etc.
BioEnable
BioEnable is a software integration kit, which allows an easy integration of the “Axis Biometrics
Authentication Suite” with your Enterprise or E-Business applications. Your employees,
customers or clients can easily log into your computer networks, whether web-based or other,
to access accounts, confidential files, applications, and privileged content. And have their
identity biometrically authenticated to gain access to service without the hassle of remembering
passwords or pins and without compromising the security of your business.
BioEnterprise
Corporates can provide secure access to their enterprise applications such as ERP software,
Banking & Finance applications and Internet servers, quickly without any integration.
BioEnterprise provides a new layer of security over passwords. It verifies the user's identity and
allows quick access to one, some or all applications at once. NO matter where your
employees log on from, they can quickly and easily access authorized files and company
information.
BioExchange
BioExchange allows you to exchange documents securely in an organization. You can secure
any document with a right click of your mouse. Once secured, it can be opened; only by you
and the peoples to whom you have authorized to open it. BioExchange provides unique
integration of
Bio PKI
BioPKI provides efficient and tested framework for secure transactions and exchange of data
across networks. BioPKI patches certain drawbacks, which PKI has such as, mobility problem,
storage of private key, and physical access to machine storing your private key. With BioPKI,
your private key is generated only when you give your biometric and you can transact safely
from any machine anywhere in the world.



                             Axis Software Private Limited
       1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
                                  www.axistech.com
ASAT (Axis Semi Automated Teller)
ASAT is a biometric based semi automated transaction system for Banks, Financial Institutes,
Government Organizations and Corporates. ASAT allows banks to automate branch operations
without investing in huge electronic network infrastructure like ATMs. ASAT consists of a
biometric authentication terminal installed outside the teller counter. Customers enter account
number and verify biometric to withdraw money instead of going through the manual process of
filling withdrawal slips, signature verification and repetitive cash counting by the teller.

ACC (Automated Cheque Clearance)
Axis provides an innovative patent pending product that offers a secured, efficient platform for
Corporate Banking. The current cheque clearance authentication process is manual, time
consuming and prone to human errors. It is also very tedious as it involves checking
authentication directives (Business Logic) and matching signatures on the cheque with that in
the database in order to grant clearance. Axis Automated Cheque Clearance (ACC) adds
another layer to signature authentication with an annotation, which is coupled with biometric
authentication.

In ACC, an annotation is printed on the cheque, which stores confidential information such as
signatory details, cheque information and fingerprints of the signatories. When a cheque comes
in for clearance the Axis System with the banker just scans the annotation and matches the
data with that in the database and authentication is done. At the same time other authorizations
are also ascertained like whether signatories are authorized to sign, whether the amount they
are authorized to sign is not exceeded etc.




All biometric systems operate in a similar fashion. First, the system captures a sample of the
biometric characteristic (ie.enrollment process). During enrollment, some biometric systems
may require a number of samples in order to build a profile of the biometric characteristic.
Unique features are then extracted and converted by the system into a mathematical code.


                             Axis Software Private Limited
       1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
                                  www.axistech.com
This sample is then stored as the biometric template for the enrollee. The template can reside
on a computer database, smart card or barcode.

In addition, the biometric system may require a trigger, or a means of matching the template to
the person, for e.g. a PIN is keyed-in to access the template, or a smart card storing the tem-
plate is inserted into a card reader. In either case, the end user interacts with the biometric sys-
tem for a second time to have his or her identity checked. A new biometric sample is then
taken and this is compared with the template. If the template and the new sample match, the
end user is granted access. This is the basic premise of biometrics - that a person has a
sample of their biometric data captured and the biometric system decides if it matches with an-
other sample.

The following four-stage process illustrates the way our biometric systems operate:
Capture - a physical or behavioral sample is captured by the system during
enrollment
Extraction -unique data is extracted from the sample and a template is created
Comparison -the template is then compared with a new sample
Matching - the system then decides if the features extracted from the new sample are
matching or not.




                             Axis Software Private Limited
       1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
                                  www.axistech.com
Fingerprint Verification




Basics

Fingerprints are one of those bizarre twists of nature. Human beings happen to have built-in,
easily accessible identity cards. You have a unique design, which represents you alone,
literally at your fingertips. How did this happen? People have tiny ridges of skin on their fingers
because this particular adaptation was extremely advantageous to the ancestors of the human
species. The pattern of ridges and "valleys" on fingers make it easier for the hands to grip
things, in the same way a rubber tread pattern helps a tire grip the road. The other function of
fingerprints is a total coincidence. Like everything in the human body, these ridges form
through a combination of genetic and environmental factors. The genetic code in DNA gives
general orders on the way skin should form in a developing fetus, but the specific way it forms
is a result of random events.

The exact position of the fetus in the womb at a particular moment and the exact composition
and density of surrounding amniotic fluid decides how every individual ridge will form. So, in
addition to the countless things that go into deciding your genetic make-up in the first place,
there are innumerable environmental factors influencing the formation of the fingers. Just like
the weather conditions that form clouds or the coastline of a beach, the entire development
process is so chaotic that, in the entire course of human history, there is virtually no chance of
the same exact pattern forming twice.

Consequently, fingerprints are a unique marker for a person, even an identical twin. And while
two prints may look basically the same at a glance, a trained investigator or an advanced piece
of software can pick out clear, defined differences. This is the basic idea of fingerprint analysis,
in both crime investigation and security. A fingerprint scanner's job is to take the place of a
human analyst by collecting a print sample and comparing it to other samples on record. In the
next few sections, we'll find out how scanners do this.

Verification

There are a variety of approaches to fingerprint verification. Some of them try to emulate the
traditional police method of matching minutiae, others are straight pattern matching devices,
and some adopt a unique approach all of their own, including moiré fringe patterns and


                               Axis Software Private Limited
         1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
                                    www.axistech.com
ultrasonic. Some of them can detect when a live finger is presented, some cannot. There are a
greater variety of fingerprint devices available than any other biometric at present.

Potentially capable of good accuracy (low instances of false acceptance) fingerprint devices
can also suffer from usage errors among insufficiently disciplined users (higher instances of
false rejection) such as might be the case with large user bases. One must also consider the
transducer / user interface and how this would be affected by large scale usage in a variety of
environments. Fingerprint verification may be a good choice for in house systems where
adequate explanation and training can be provided to users and where the system is operated
within a controlled environment.

It is not surprising that the workstation access application area seems to be based almost
exclusively around fingerprints, due to the relatively low cost, small size (easily integrated into
keyboards) and ease of integration.

Matching

Among all the biometric techniques, fingerprint-based identification is the oldest method, which
has been successfully used in numerous applications. Everyone is known to have unique,
immutable fingerprints. A fingerprint is made of a series of ridges and furrows on the surface of
the finger. The uniqueness of a fingerprint can be determined by the pattern of ridges and
furrows as well as the minutiae points. Minutiae points are local ridge characteristics that occur
at either a ridge bifurcation or a ridge ending. Fingerprint matching techniques can be placed
into two categories: minutiae-based and correlation based. Minutiae-based techniques first find
minutiae points and then map their relative placement on the finger. However, there are some
difficulties when using this approach. It is difficult to extract the minutiae points accurately when
the fingerprint is of low quality.

Also this method does not take into account the global pattern of ridges and furrows. The
correlation-based method is able to overcome some of the difficulties of the minutiae-based
approach. However, it has some of its own shortcomings. 8Correlation-based techniques
require the precise location of a registration point and are affected by image translation and
rotation.




                             Axis Software Private Limited
       1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
                                  www.axistech.com
Fingerprint matching based on minutiae has problems in matching different sized
(unregistered) minutiae patterns. Local ridge structures cannot be completely characterized by
minutiae. We are trying an alternate representation of fingerprints, which will capture more local
information and yield a fixed length code for the fingerprint. The matching will then hopefully
become a relatively simple task of calculating the Euclidean distance will between the two
codes. A commercial fingerprint-based authentication system requires a very low False Reject
Rate (FAR) for a given False Accept Rate (FAR). This is very difficult to achieve with any one
technique. We are investigating methods to pool evidence from various matching techniques to
increase the overall accuracy of the system. In a real application, the sensor, the acquisition
system and the variation in performance of the system over time is very critical. We are also
field testing our system on a limited number of users to evaluate the system performance over
a period of time.



Classification

Large volumes of fingerprints are collected and stored everyday in a wide range of applications
including forensics, access control, and driver license registration. An automatic recognition of
people based on fingerprints requires that the input fingerprint be matched with a large number
of fingerprints in a database (FBI database contains approximately 70 million fingerprints!). To
reduce the search time and computational complexity, it is desirable to classify these
fingerprints in an accurate and consistent manner so that the input fingerprint is required to be
matched only with a subset of the fingerprints in the database




                             Axis Software Private Limited
       1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
                                  www.axistech.com
Fingerprint classification is a technique to assign a fingerprint into one of the several pre-
specified types already established in the literature, which can provide an indexing mechanism.
Fingerprint classification can be viewed as a coarse level matching of the fingerprints. An input
fingerprint is first matched at a coarse level to one of the pre-specified types and then, at a finer
level, it is compared to the subset of the database containing that type of fingerprints only. We
have developed an algorithm to classify fingerprints into five classes, namely, whorl, right loop,
left loop, arch, and tented arch. The algorithm separates the number of ridges present in four
directions (0 degree, 45 degree, 90 degree, and 135 degree) by filtering the central part of a
fingerprint with a bank of Gabor filters. This information is quantized to generate a Finger Code,
which is used for classification.

Our classification is based on a two-stage classifier, which uses a K-nearest neighbor classifier
in the first stage and a set of neural networks in the second stage. The classifier is tested on
4,000 images in the NIST-4 database.
For the five-class problem, classification accuracy of 90% is achieved. For the four-class
problem (arch and tented arch combined into one class), we are able to achieve a classification
accuracy of 94.8%. By incorporating a reject option, the classification accuracy can be
increased to 96% for the five-class classification and to 97.8% for the four-class classification
when 30.8% of the images are rejected.

Image Enhancement
A critical step in automatic fingerprint matching is to automatically and reliably extract minutiae
from the input fingerprint images. However, the performance of a minutiae extraction algorithm
relies heavily on the quality of the input fingerprint images. In order to ensure that the
performance of an automatic fingerprint identification/verification system will be robust with
respect to the quality of the fingerprint images, it is essential to incorporate a fingerprint
enhancement algorithm in the minutiae extraction module. We have developed a fast
fingerprint enhancement algorithm, which can adaptively improve the clarity of ridge and furrow
structures of input fingerprint images based on the estimated local ridge orientation and
frequency. We have evaluated the performance of the image enhancement algorithm using the
goodness index of the extracted minutiae and the accuracy of an online fingerprint verification
system. Experimental results show that incorporating the enhancement algorithms improves
both the goodness index and the verification accuracy.
                             Axis Software Private Limited
       1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
                                  www.axistech.com
Scanners: (Optical Scanner)
A fingerprint scanner system has two basic jobs - it needs to get an image of your Finger, and it
needs to determine whether the pattern of ridges and valleys in this image matches the pattern
of ridges and valleys in pre-scanned images. There are a number of different ways to get an
image of somebody's finger. The most common methods today are optical scanning and
capacitance scanning. Both types come up with the same sort of image, but they go about it in
completely different ways.

The heart of an optical scanner is a charge-coupled device (CCD), the same light sensor
system used in digital cameras and camcorders. A CCD is simply an array of light-sensitive
diodes called photo sites, which generate an electrical signal in response to light photons. Each
photo site records a pixel, a tiny dot representing the light that hit that spot. Collectively, the
light and dark pixels form an image of the scanned scene (a finger, for example). Typically, an
analog-to-digital converter in the scanner system processes the analog electrical signal to
generate a digital representation of this image. See How Digital Cameras Work for details on
CCDs and digital conversion.

The scanning process starts when you place your finger on a glass plate, and a CCD camera
takes a picture. The scanner has its own light source, typically an array of light-emitting diodes,
to illuminate the ridges of the finger. The CCD system actually generates an inverted image of
the finger, with darker areas representing more reflected light (the ridges of the finger) and
lighter areas representing less reflected light (the valleys between the ridges). Before
comparing the print to stored data, the scanner processor makes sure the CCD has captured a
clear image. It checks the average pixel darkness, or the overall values in a small sample, and
rejects the scan if the overall image is too dark or too light.

If the image is rejected, the scanner adjusts the exposure time to let in more or less light, and
then tries the scan again. If the darkness level is adequate, the scanner system goes on to
check the image definition (how sharp the fingerprint scan is). The processor looks at several

Straight lines moving horizontally and vertically across the image. If the fingerprint image has
good definition, a line running perpendicular to the ridges will be made up of alternating
sections of very dark pixels and very light pixels. If the processor finds that the image is crisp
and properly exposed, it proceeds to comparing the captured fingerprint with fingerprints on
file.


Disclaimer: Axis® is a registered trademark owned by Axis Soft.pvt.ltd. Other brands and names mentioned herein
may be the trademarks of their respective owners. Neither the whole nor any part of the information contained in, or
the product described in, this document may be adapted or reproduced in any form without the prior written
permission of the copyright holder. The product described in this document is subject to continuous developments
and improvements. Axis Soft.pvt.ltd gives all particulars of the product and its use contained in this document in
good faith. However, all warranties implied or expressed, including but not limited to implied warranties of
merchantability, or fitness for purpose, are excluded. This document is intended only to assist the reader in the use
of the product. Axis Soft.pvt.ltd shall not be liable for any loss or damage arising from the use of any information in
this document, or any error or omission in such information, or the use or inability to use the product.




                               Axis Software Private Limited
         1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
                                    www.axistech.com

Contenu connexe

Tendances (20)

Smart Card to the Cloud for Convenient, Secured NFC Payment
Smart Card to the Cloud for Convenient, Secured NFC PaymentSmart Card to the Cloud for Convenient, Secured NFC Payment
Smart Card to the Cloud for Convenient, Secured NFC Payment
 
APG82 product presentation by Advanced Card Systems Ltd
APG82 product presentation by Advanced Card Systems LtdAPG82 product presentation by Advanced Card Systems Ltd
APG82 product presentation by Advanced Card Systems Ltd
 
Inside .NET Smart Card Operating System
Inside .NET Smart Card Operating SystemInside .NET Smart Card Operating System
Inside .NET Smart Card Operating System
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
 
RFID BASED SMART CARD READER
RFID BASED SMART CARD READERRFID BASED SMART CARD READER
RFID BASED SMART CARD READER
 
Smart card to the cloud for convenient, secured nfc payment
Smart card to the cloud for convenient, secured nfc paymentSmart card to the cloud for convenient, secured nfc payment
Smart card to the cloud for convenient, secured nfc payment
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Smart cards & RFID-Anant Patel
Smart cards & RFID-Anant PatelSmart cards & RFID-Anant Patel
Smart cards & RFID-Anant Patel
 
smart card
smart cardsmart card
smart card
 
Smart Card Technology
Smart Card TechnologySmart Card Technology
Smart Card Technology
 
Smart Cards Evolution
Smart Cards EvolutionSmart Cards Evolution
Smart Cards Evolution
 
Smart card
Smart cardSmart card
Smart card
 
Smart card
Smart cardSmart card
Smart card
 
clone sim card
clone sim cardclone sim card
clone sim card
 
Smart cards
Smart cards Smart cards
Smart cards
 
Smart card technologya
Smart card technologyaSmart card technologya
Smart card technologya
 
Smart card
Smart cardSmart card
Smart card
 
SMART CARD
SMART CARDSMART CARD
SMART CARD
 
Smart Card Technology
Smart Card TechnologySmart Card Technology
Smart Card Technology
 
Smart cards
Smart cardsSmart cards
Smart cards
 

En vedette

Non Management Staff Training
Non Management Staff TrainingNon Management Staff Training
Non Management Staff TrainingTuba Khalid
 
Babbitt material ppt
Babbitt material pptBabbitt material ppt
Babbitt material pptSeminar Links
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPTsravya raju
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyAlfred Oboi
 
Seminar on night vision technology ppt
Seminar on night vision technology pptSeminar on night vision technology ppt
Seminar on night vision technology pptdeepakmarndi
 

En vedette (6)

Non Management Staff Training
Non Management Staff TrainingNon Management Staff Training
Non Management Staff Training
 
Babbitt material ppt
Babbitt material pptBabbitt material ppt
Babbitt material ppt
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Ceramic Bearing ppt
Ceramic Bearing pptCeramic Bearing ppt
Ceramic Bearing ppt
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
Seminar on night vision technology ppt
Seminar on night vision technology pptSeminar on night vision technology ppt
Seminar on night vision technology ppt
 

Similaire à company product

AET60 product presentation by Advanced Card Systems Ltd.
AET60 product presentation by Advanced Card Systems Ltd.AET60 product presentation by Advanced Card Systems Ltd.
AET60 product presentation by Advanced Card Systems Ltd.Advanced Card Systems Ltd.
 
AET63 product presentation by Advanced Card Systems Ltd.
AET63 product presentation by Advanced Card Systems Ltd.AET63 product presentation by Advanced Card Systems Ltd.
AET63 product presentation by Advanced Card Systems Ltd.Advanced Card Systems Ltd.
 
SMARTGUARD SYSTEMS PROFILE
SMARTGUARD SYSTEMS PROFILESMARTGUARD SYSTEMS PROFILE
SMARTGUARD SYSTEMS PROFILEGURUDAS
 
Cidway Corporate Access 06 2009 Full
Cidway Corporate Access 06 2009 FullCidway Corporate Access 06 2009 Full
Cidway Corporate Access 06 2009 Fulllfilliat
 
How to Easily Upgrade to a Next-Generation Transit Payment System
How to Easily Upgrade to a Next-Generation Transit Payment SystemHow to Easily Upgrade to a Next-Generation Transit Payment System
How to Easily Upgrade to a Next-Generation Transit Payment SystemFEIG Electronics
 
pPOS Project Presentation_v1
pPOS  Project Presentation_v1pPOS  Project Presentation_v1
pPOS Project Presentation_v1FLORIN SUCIU
 
Vanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapVanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapHai Nguyen
 
2009 Hashkiosk Presentation
2009 Hashkiosk Presentation2009 Hashkiosk Presentation
2009 Hashkiosk Presentationsurajitfa
 
MULTI K - Kiosk from ONLINET
MULTI K - Kiosk from ONLINETMULTI K - Kiosk from ONLINET
MULTI K - Kiosk from ONLINETONLINET Group
 
Mtel Cash Mobile Commerce Suite
Mtel Cash Mobile Commerce SuiteMtel Cash Mobile Commerce Suite
Mtel Cash Mobile Commerce Suitewatsongallery
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
 
Smart Cards, ePassports, and open source
Smart Cards, ePassports, and open sourceSmart Cards, ePassports, and open source
Smart Cards, ePassports, and open sourceMartijn Oostdijk
 
Plutus credit debit solution
Plutus credit debit solutionPlutus credit debit solution
Plutus credit debit solutionpinelabsblog
 
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXP
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXPdroidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXP
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXPDroidcon Berlin
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryNarudom Roongsiriwong, CISSP
 
Ask Corporate2009
Ask   Corporate2009Ask   Corporate2009
Ask Corporate2009claren65
 

Similaire à company product (20)

AET60 product presentation by Advanced Card Systems Ltd.
AET60 product presentation by Advanced Card Systems Ltd.AET60 product presentation by Advanced Card Systems Ltd.
AET60 product presentation by Advanced Card Systems Ltd.
 
AET63 product presentation by Advanced Card Systems Ltd.
AET63 product presentation by Advanced Card Systems Ltd.AET63 product presentation by Advanced Card Systems Ltd.
AET63 product presentation by Advanced Card Systems Ltd.
 
SMARTGUARD SYSTEMS PROFILE
SMARTGUARD SYSTEMS PROFILESMARTGUARD SYSTEMS PROFILE
SMARTGUARD SYSTEMS PROFILE
 
NFC PAD Overview.
NFC PAD Overview.NFC PAD Overview.
NFC PAD Overview.
 
Cidway Corporate Access 06 2009 Full
Cidway Corporate Access 06 2009 FullCidway Corporate Access 06 2009 Full
Cidway Corporate Access 06 2009 Full
 
How to Easily Upgrade to a Next-Generation Transit Payment System
How to Easily Upgrade to a Next-Generation Transit Payment SystemHow to Easily Upgrade to a Next-Generation Transit Payment System
How to Easily Upgrade to a Next-Generation Transit Payment System
 
pPOS Project Presentation_v1
pPOS  Project Presentation_v1pPOS  Project Presentation_v1
pPOS Project Presentation_v1
 
Vanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapVanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmap
 
Hospitality+Healthcare
Hospitality+HealthcareHospitality+Healthcare
Hospitality+Healthcare
 
2009 Hashkiosk Presentation
2009 Hashkiosk Presentation2009 Hashkiosk Presentation
2009 Hashkiosk Presentation
 
MULTI K - Kiosk from ONLINET
MULTI K - Kiosk from ONLINETMULTI K - Kiosk from ONLINET
MULTI K - Kiosk from ONLINET
 
Mtel Cash Mobile Commerce Suite
Mtel Cash Mobile Commerce SuiteMtel Cash Mobile Commerce Suite
Mtel Cash Mobile Commerce Suite
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
ekey+ Presentation
ekey+ Presentationekey+ Presentation
ekey+ Presentation
 
Smart Cards, ePassports, and open source
Smart Cards, ePassports, and open sourceSmart Cards, ePassports, and open source
Smart Cards, ePassports, and open source
 
Plutus credit debit solution
Plutus credit debit solutionPlutus credit debit solution
Plutus credit debit solution
 
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXP
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXPdroidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXP
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXP
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment Industry
 
Ask Corporate2009
Ask   Corporate2009Ask   Corporate2009
Ask Corporate2009
 
EMV 201 EMF June 2016
EMV 201 EMF June 2016EMV 201 EMF June 2016
EMV 201 EMF June 2016
 

Dernier

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Dernier (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

company product

  • 1. Company Axis Software Pvt Ltd, India Products Biometric ATMs, PIN based ATMs, Kiosks, POS, Cashless ATMs Date 10/05/10 Product Photographs (ATMs, Kiosks, POS) Axis Software Private Limited 1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100 www.axistech.com
  • 2. TABLE OF CONTENTS 1. COMPANY PROFILE 2. AXIS PRODUCT CONFIGURATION DOCUMENT a) Standard ATMs b) Optional features available with axis ATMs c) Cashless ATM d) Kiosks e) POS f) Retro Fit Kit 3. TERMS AND CONDITIONS 4. AXIS SUPPORT POLICY Axis Software Private Limited 1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100 www.axistech.com
  • 3. 1. COMPANY PROFILE 1. Name of the Company Axis Software Pvt. Ltd. Registered under the Companies Act in 1993 2. Brand Name AXIS 3. Nature of Business Design, Develop, Manufacture & Marketing of Biometric ATMs, PIN Based ATMs, Cashless ATMs, Kiosk & POS 4. Product Lines a)Transaction Terminals • Biometric ATM • PIN Based ATM • Cashless ATM • Kiosk • Point of Sale (POS) • Retro Fit Kit • Time and Attendance System • Access Control System b) Fixed and Wireless • Fixed Line ATM Terminals Products • Wireless ATM Terminals • Mobile ATM Terminals • Bill Payment Kiosk • Passbook Printing Kiosk • Fund Transfer Kiosk • Check Depositing Kiosk • Ticketing Kiosk • Information Kiosk • Fixed Line POS terminals • Wireless POS terminals • Biometric POS • Biometric Authentication Software c) Software Products • Time and Track Software • Kiosk Monitoring Software • Remote Monitoring Software • WOSA XFS/ J XFS Axis Software Private Limited 1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100 www.axistech.com
  • 4. 5. Technology Expertise • Hardware & software customization for ATMs, Kiosks, Cashless ATMs, POS, Time and Attendance system, EMV, application development experience on various Card based technologies • Research, design & development Encryption (Symmetric & Asymmetric) Biometrics • Wide experience in product development & prototyping We export our products to various countries in APAC, EMEA & 6. Exports USA Axis Software Private Limited 1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100 www.axistech.com
  • 5. COMPANY PROFILE in detail: Headquartered in Pune (India) and founded in April 2000, Axis is a technology-driven Company, developing innovative products and solutions that increase user confidence in the electronic infrastructure, increase service efficiency and build new delivery channels through the application of intelligent technologies -both software and hardware- using biometrics, encryption and related technologies. Axis’ areas of focus are PIN based and Biometric based ATMs, Kiosks for various transaction applications (Funds Transfer, Check-cashing, Ticketing, loan Application etc.), Attendance and Access Control Systems (both logical and physical), Large database systems for National ID, Voter Identification and Criminal Justice (Police) systems, having its expertise in card based technologies. Axis has designed a full-featured ATM, called -Automated Banking Machine or ABM for an American financial institution. The ABM has other banking features like funds-transfer, check truncation (cashing), loan application, loan disbursal and currency and coin acceptance and disbursal. Axis has also developed an innovative product called the Biometric Retrofit Kit for ATMs/kiosks. This kit converts a regular ATM to a Biometric base, either fingerprint or iris, ATM. This very easy to deploy kit is very affordably priced. Axis is generally considered the first in the world to have developed a biometric, EFT switch based authentication, full-featured ATM. Axis has successfully tested these ATMs/kiosks and is currently deploying them, inter alias, through Citibank. If you are deploying ATMs/kiosks for the first time then you should seriously consider our Biometric based ATMs/kiosks that require no expensive back-end infrastructure, like EFT switch and HSM, and can be deployed almost overnight at a fraction of the cost of regular PIN based ATMs/kiosks. You do not need to invest in cards, expensive PIN management software and helpdesks for lost cards and forgotten PINs. A user can be registered in minutes and start using the ATM immediately. How do we make this possible? • Complete in-house research, design, development & manufacturing • Very short overall product development cycle • Wide experience in product development including prototyping & injection molding • Required skills for developing advanced financial systems • Linux / Microsoft / Embedded Platforms Axis is ISO: 9001:2000 certified. Axis has several patents applied for in the USPTO and employs close to 100 employees with a strong focus on R&D and innovation. Advantages of Axis ATMs: • High transaction security • Very low total cost of ownership • Low operating cost • Easy to use • Quick and easy to deploy • High customer convenience • Alternative authentications – biometrics, in addition to PINATMs can operate in Switch or Switch-less mode with minimal changes to existing infrastructure Axis Software Private Limited 1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100 www.axistech.com
  • 6. 2. Axis Product Configuration Document A) Axis Standard ATMs: 1. AX 811 with Standard features Type: Stand Alone Access: Front Loading Emulation: NDC Compliant Authentication 1: PIN Authentication 2: Biometric Processor & Memory: Intel CHIP Set Media Reader / Writer: Combination DVD Read / CD Write Speakers: Dual 4W Card Reader: Magnetic / DIP PIN Pad and Menu Keys: EPP + 8 FDKs Display: 10” Colour TFT LCD Security Lock Type: Single Mechanical Combination Lock Cash Cassette Configuration: 1 Cassette Each Cassette Capacity: 1000 Notes Consumer Printer: 35 Column Thermal Electronic Journal: Available Axis Software Private Limited 1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100 www.axistech.com
  • 7. 2. AX 811 E with Standard features Type: Stand Alone Access: Front Loading Emulation: NDC Compliant Authentication 1: PIN Authentication 2: Biometric Processor & Memory: Intel CHIP Set Media Reader / Writer: Combination DVD Read / CD Write Speakers: Dual 4W Card Reader: Magnetic / DIP PIN Pad and Menu Keys: EPP + 8 FDKs Display: 10” Colour TFT LCD Safe: 6mm or UL 291 Level 1 Compliant Security Lock Type: Single Mechanical Combination Lock Cash Cassette Configuration: 1 Cassette Each Cassette Capacity: 1000 Notes Consumer Printer: 35 Column Thermal Electronic Journal: Available Axis Software Private Limited 1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100 www.axistech.com
  • 8. 3. AX 821 with Standard features Type: Stand Alone Access: Front Loading Emulation: NDC Compliant Authentication 1: PIN Authentication 2: Biometric Processor & Memory: Intel CHIP Set Media Reader / Writer: Combination DVD Read / CD Write Speakers: Dual 4W Card Reader: Magnetic / DIP PIN Pad and Menu Keys: EPP + 8 FDKs Display: 10” Colour TFT LCD Safe: 6mm or UL 291 Level 1 Compliant Security Lock Type: Digital Combination with Time Delay + Mechanical Lock Cash Cassette Configuration: 2 Cassettes Each Cassette Capacity: 1700 Notes Consumer Printer: 35 Column Thermal Electronic Journal: Available Camera: Optional Axis Software Private Limited 1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100 www.axistech.com
  • 9. 4. AX 825 with Standard features Type: Through The Wall Access: Rear Loading Emulation: NDC Compliant Authentication 1: PIN Authentication 2: Biometric Processor & Memory: Intel CHIP Set Media Reader / Writer: Combination DVD Read / CD Write Speakers: Dual 4W Card Reader: Magnetic / DIP PIN Pad and Menu Keys: EPP + 8 FDKs Display: 15” Colour TFT LCD Safe: 6mm or UL 291 Level 1 Compliant Security Lock Type: Digital Combination with Time Delay + Mechanical Lock Cash Cassette Configuration: 2 Cassettes Each Cassette Capacity: 2500 Notes Consumer Printer: 35 Column Thermal Electronic Journal: Available Camera: Optional Axis Software Private Limited 1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100 www.axistech.com
  • 10. 5. AX 835 with Standard features Type: Through The Wall Access: Rear Loading Emulation: NDC Compliant Authentication 1: PIN Authentication 2: Biometric Processor & Memory: Intel CHIP Set Media Reader / Writer: Combination DVD Read / CD Write Speakers: Dual 4W Card Reader: Magnetic / DIP PIN Pad and Menu Keys: EPP + 8 FDKs Display: 15” Colour TFT LCD Safe: 6mm or UL 291 Level 1 Compliant Security Lock Type: Digital Combination with Time Delay + Mechanical Lock Cash Cassette Configuration: 3 Cassettes Each Cassette Capacity: 2500 Notes Consumer Printer: 35 Column Thermal Electronic Journal: Available Camera: Optional Axis Software Private Limited 1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100 www.axistech.com
  • 11. 6. AX 831 with Standard features Type: Lobby Type Access: Front Loading Emulation: NDC Compliant Authentication 1: PIN Authentication 2: Biometric Processor & Memory: Intel CHIP Set Media Reader / Writer: Combination DVD Read / CD Write Speakers: Dual 4W Card Reader: Magnetic / DIP PIN Pad and Menu Keys: EPP + 8 FDKs Display: 15” Colour TFT LCD Safe: 6mm or UL 291 Level 1 Compliant Security Lock Type: Digital Combination with Time Delay + Mechanical Lock Cash Cassette Configuration: 3 Cassettes Each Cassette Capacity: 2500 Notes Consumer Printer: 35 Column Thermal Electronic Journal: Available Camera: Optional Axis Software Private Limited 1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100 www.axistech.com
  • 12. 7. AX 831 E with Standard features Type: Stand Alone Access: Front Loading Emulation: NDC Compliant Authentication 1: PIN Authentication 2: Biometric Processor & Memory: Intel CHIP Set Media Reader / Writer: Combination DVD Read / CD Write Speakers: Dual 4W Card Reader: Magnetic / DIP PIN Pad and Menu Keys: EPP + 8 FDKs Display: 10” Colour TFT LCD Safe: 6mm or UL 291 Level 1 Compliant Security Lock Type: Digital Combination with Time Delay + Mechanical Lock Cash Cassette Configuration: 3 Cassettes Each Cassette Capacity: 2500 Notes Consumer Printer: 35 Column Thermal Electronic Journal: Available Envelop Depositor: Available Camera: Optional Axis Software Private Limited 1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100 www.axistech.com
  • 13. 8. AX 841 (ABM) with Standard features Type: Stand Alone Access: Front Loading Emulation: NDC Compliant Authentication 1: PIN Authentication 2: Biometric Processor & Memory: Intel CHIP Set Media Reader / Writer: Combination DVD Read / CD Write Speakers: Dual 4W Card Reader: Magnetic / DIP PIN Pad and Menu Keys: EPP + 8 FDKs Display: 10” Colour TFT LCD Safe: 6mm or UL 291 Level 1 Compliant Security Lock Type: Digital Combination with Time Delay + Mechanical Lock Cash Cassette Configuration: 3 Cassettes (Multiple up to 4) Each Cassette Capacity: 2500 Notes Cash Deposit: Available Coin Deposit: Available Coin Dispense: Available Check Scanner: Check 21 Compliant Consumer Printer: 35 Column Thermal Electronic Journal: Available Envelop Depositor: Available Axis Software Private Limited 1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100 www.axistech.com
  • 14. B) Optional Features Available with Axis ATMs AX AX AX AX AX AX AX AX Features 811 811E 821 825 835 831 831E 841 Number of Cassettes up to 8         EMV Compliant Card Reader         Motorized Card Reader         Hybrid Card Reader         Touch Screen         UL 291 Level 1 Compliant         UL 291 Business Hours compliant         Check Scanner         Bar Code Reader         Coin Acceptor         Coin Dispenser         Cash Acceptor         Fingerprint Biometric         IRIS Biometric         Face Biometric         Camera         Axis Software Private Limited 1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100 www.axistech.com
  • 15. C) Cashless ATM Type: Wall Mount Access: Front Loading Emulation: NDC Compliant Authentication 1: PIN Authentication 2: Biometric Processor & Memory: Intel CHIP Set Speakers: Dual 4W Card Reader: Magnetic / DIP PIN Pad and Menu Keys: EPP + 8 FDKs Display: 6.4” Colour TFT LCD Consumer Printer: 35 Column Thermal Camera: Available Size: 400 X 190 X 60 Power: 60W Axis Software Private Limited 1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100 www.axistech.com
  • 16. D) KIOSKS 1. Bill Payment Kiosk Model: AX 731 Access: Rear Loading Processor: Intel Chipset RAM: 512 MB HDD: 40 GB or Higher Display: 15” Colour TFT LCD with Touch Screen Speakers: Dual 4W Authentication: PIN based with EPP – TDES Card Reader: Magnetic / Dip Type Check Scanner: MICR Cash Acceptor: 4 Way Acceptance with 1200 notes capacity Barcode Reader: Code 128 Compliant (Optional) Shell: 2mm Thickness Safe for Cash Acceptor: 6 mm Thickness Shell Lock: Mechanical Lock Consumer Printer: 35 Column Thermal 2. Passbook Printing Kiosk Model: AX 731 Access: Rear Loading Processor: Intel Chipset RAM: 512 MB HDD: 40 GB or Higher Display: 15” Colour TFT LCD with Touch Screen Speakers: Dual 4W Authentication: PIN based with EPP – TDES Card Reader: Magnetic / Dip Type Check Scanner: MICR (Optional) Shell: 2mm Thickness Safe for Cash Acceptor: 6 mm Shell Lock: Mechanical Lock Passbook Printer: Automatic document alignment & edge ensign, Thicker passbook handling up to 2.2mm Axis Software Private Limited 1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100 www.axistech.com
  • 17. 3. Check Acceptor Kiosk Model: AX 731 Access: Rear Loading Processor: Intel Chipset RAM: 512 MB HDD: 40 GB or Higher Display: 15” Colour TFT LCD with Touch Screen Speakers: Dual 4W Authentication: PIN based with EPP – TDES Check Scanner 1: MICR with Truncation Check Scanner 2: MICR Shell: 2mm Thickness Check Drop Area: 3 mm thickness Speakers: Dual 4W Keyboard: Full Metal keyboard with touch-pad Soft Keyboard: Optional Camera: Optional Shell Lock: Mechanical Lock Consumer Printer: 35 Column Thermal 4. Information Kiosk Model: AX 731 Access: Front Loading Processor: Intel Chipset RAM: 512 MB HDD: 40 GB or Higher Display: 15” Colour TFT LCD with Touch Screen Speakers: Dual 4W Authentication: PIN based with EPP – TDES Speakers: Dual 4W Keyboard: Full Metal keyboard with touch-pad Soft Keyboard: Optional Camera: Optional Shell Lock: Mechanical Lock Consumer Printer: 35 Column Thermal Axis Software Private Limited 1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100 www.axistech.com
  • 18. 5. Fund Transfer Kiosk Model: AX 731 Access: Rear Loading Processor: Intel Chipset RAM: 512 MB HDD: 40 GB or Higher Display: 15” Colour TFT LCD with Touch Screen Speakers: Dual 4W Authentication: PIN based with EPP – TDES Speakers: Dual 4W Cash Acceptor: 4 Way note acceptor Card Reader: Magnetic / DIP Coin Acceptor: Optional Check Scanner 1: MICR Check Scanner 2: MICR Truncation Keyboard: Full Metal keyboard with touch pad Soft Keyboard: Optional Camera: Optional Shell Lock: Mechanical Lock Consumer Printer: 35 Column Thermal 6. Ticketing Kiosk Model: AX 731 Access: Rear Loading Processor: Intel Chipset RAM: 512 MB HDD: 40 GB or Higher Display: 15” Colour TFT LCD with Touch Screen Speakers: Dual 4W Authentication: Numeric Keypad Speakers: Dual 4W Cash Acceptor: 4 Way note acceptor Card Reader: Magnetic / DIP Coin Acceptor: Optional Camera: Optional Shell Lock: Mechanical Lock Consumer Printer: 35 Column Thermal 7. And Many More in the List as per client requirement. Axis Software Private Limited 1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100 www.axistech.com
  • 19. E) Axis POS: 1. Axis POS AX 901 2. Axis Bio-POS AX 911 Axis Software Private Limited 1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100 www.axistech.com
  • 20. F) RETROFIT KIT Retro Fit Kit ATM (AX-801) Axis Biometric Retrofit Kits for ATMs: Axis has developed an innovative new product called the Biometric Retrofit Kit for ATMs. This kit converts a regular ATM to a biometric based, either fingerprint or iris, ATM. This very easy to deploy kit is very affordably priced. This kit has generated a huge interest among financial institutions. This device can convert your standard ATMs to Biometric ATMs. Retro Fit Kit can be integrated with existing standard ATMs to make them more secure with fingerprint authentication technology. The functionality of the ATM remains the same with an added advantage of Biometrics. Various combinations of PIN number, cards, & biometrics can be used for authentication depending upon the security levels. Robust and fault tolerant. Can operate in non air-conditioned Environment Quick and easy to deploy. Can start using within hours of Installation User-friendly Displays, Optional Touch Screen Dynamic interfaces - Intelligent audio, visual & silent alerts Compatible with popular ATM switches. Advanced image processing and pattern recognition algorithms for Fingerprint verification Technical Details: Protocol Support: Supports NDC Protocol Device Supports: Audio: Online audio instructions Fingerprint Scanner: Optical Display: Two Lines LCD Operating Humidity: 90 % RH Operating System: Linux Axis Software Private Limited 1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100 www.axistech.com
  • 21. 3. TERMS & CONDITIONS 1. PAYMENT TERMS 100% as advance along with the purchase order 2. DELIVERY PERIOD Delivery is subject to Force Majeure conditions, for which Axis shall not be responsible Delivery of the ordered equipment, shall be within 4-6 weeks subject to Axis receiving a confirmed order with advance payment specifying the configuration and site location 3. DUTIES & TAXES The above rates of hardware and software are exclusive of any other applicable local taxes. All such taxes are extra and will be payable at actual by the buyer 4. INSTALLATION & TRAINING Installation: Axis engineers will install the ATM Hardware and Software at the buyer’s site @US$250.00 per ATM. The buyer will have to bear the to-and-fro economy class air travel charges, food & local stay for two Axis installation engineers. Due to some conditions/reasons, if the buyer is not able to get the installation done or is unable to provide the required resources (in terms of ATM installation) to Axis engineers within 15 day’s, then it will be assumed that the delay in ATM installation is caused by the buyer & that the buyer will have to pay an extra charge US$100.00 per day per engineer. Training at Axis Software premises Pune, India: A 4-day Axis Certified ATM Training is available at our Technical Training Workshop at Pune @ US$ 500.00 per buyer personal for a maximum of three buyer personnel, which includes: ATM Administration and Transaction Analysis First Level Maintenance and ATM Replenishment Training ATM Troubleshooting Procedures ATM Startup and Shutdown ATM Diagnostics Customer’s Fingerprint Registration Procedure Axis Software Private Limited 1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100 www.axistech.com
  • 22. ATM software Flow & System study Travel Conveyance and Accommodation at Pune is to be borne by the buyer. Please inquire with Axis for the training schedules. Training at buyer’s site or other convenient location: If in case this training is required at the buyer’s site or some other convenient location by the buyer, US$ 1,500.00 will be charged per day. The buyer will have to bear the to-and-fro economy class air travel charges of the installation engineer. We will also provide an on-site ATM procedures training for two bank personnel at the ATM site once the ATM is installed. Note: All the above are payable in advance. 5. WARRANTY The equipment supplied by Axis shall be warranted against defects for a period as follows: 12 months from date of delivery / dispatch. Our warranty shall not apply to goods which have been altered or repaired or damaged after installation by anyone except our authorized Employees, nor shall it apply if the goods have been damaged by power fluctuations, abuse, negligence, customer modification, misapplication, lightning, water damage or any other natural calamities. Our obligation and liabilities hereunder shall not be enforceable until our goods have been fully paid for. Our warranty is limited to the original purchaser only. 6. AMC (annual maintenance contract) CHARGES After Warranty, AMC @ 13% and 15% of the total order value will be charged for the first and second year respectively, payable at the beginning of the contract period. 7. OTHER CONDITIONS Certification: Any product certification required for shipment, will be bare by the buyer Exclusion of work: Any sort of civil and electrical work, conducted for the buyer would perform main power supply to the system Quotation validity: Thirty (30) days from the date of this quotation Purchase Order should favor Axis Software Pvt. Ltd., Pune 8. JURISDICTION - Any future disputes that may arise out of this proposal are subject to the jurisdiction of courts at Pune, India only. Axis Software Private Limited 1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100 www.axistech.com
  • 23. 4. AXIS Support Policy Axis uses world-class and new components for all its products. As a result, AXIS’ products are working even in rural India, where the temperatures soar up to 480 C and it is very dusty, for 4 to 5 years without any major preventive or remedial maintenance requirement. Axis recommends that moving parts require minimum support and hence the remedial and preventive maintenance will be significantly low if components with moving parts are avoided. For instance: a Dip Card Reader is much more efficient and needs less maintenance than a Motorized Card Reader. The major maintenance issues with the Cash Dispenser are associated with the removal of currency bills that are jammed. Axis products are designed in such a way that all components are easy to reach and service. Bank personnel trained by Axis can easily accomplish a bill jam removal. AXIS believes in training the deployer for the maintenance of its products so that the deployer gets maximum uptime from them. Case in point is if there is a paper jam and a support person is to be deployed by AXIS, and then it might take the support engineer to reach the site in a day, or more in some cases, which would result in expensive down time. Alternatively, if deplorer’s personnel are trained, the situation can be remedied in a matter of a few minutes, resulting in dramatically increasing the uptime of the service the buyer wishes to provide. All of the above significantly reduce the Total Cost of Ownership of Axis products resulting in quicker payback for the investment made and also the increase in the confidence levels of the users of the services because of very high uptimes. The deployer also saves a lot of money on the subsequent Annual Maintenance Costs, as they get mitigated due to larger role being played by the deployer. There is also a greater sense of ownership amongst the deployer’s personnel resulting in overall better service experiences for the user. AXIS provides training to deployer’s personnel free of cost if the deployer purchases a total of at least 50 ATM units. AXIS’ Online and Telephonic support is available round the clock for guidance if so required post training. Axis maintains spares for at least duration of 5 (five) years after the delivery of the products. Axis Software Private Limited 1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100 www.axistech.com
  • 24. KEY AXIS PRODUCTS & BIOMETRICS Time N’ Track It is a family of powerful microprocessor based Time & Attendance and Access Control system enabled with the latest Biometrics, encryption and smart card technology. The System supports a very friendly user interface and advanced policy software. The SBC supports various biometric technologies and sensors. DesCop It’s a Biometrics based desktop protection system from Axis, which secures your computer from unauthorized use. You can control access to your sensitive files and prevent them from falling into the wrong hands. DesCop offers comprehensive data security protection with: • Logon/Screensaver System • Logging on to the network • File encryption system • File/Folder/Drive/Application locking system • Encryption of the file while sending it over the network • Effective user management Access can be controlled through any one or a combination of Password, Biometrics or Smart Card and can also be added to the toolbar of applications such as Internet Explorer, Microsoft office, Outlook, etc. BioEnable BioEnable is a software integration kit, which allows an easy integration of the “Axis Biometrics Authentication Suite” with your Enterprise or E-Business applications. Your employees, customers or clients can easily log into your computer networks, whether web-based or other, to access accounts, confidential files, applications, and privileged content. And have their identity biometrically authenticated to gain access to service without the hassle of remembering passwords or pins and without compromising the security of your business. BioEnterprise Corporates can provide secure access to their enterprise applications such as ERP software, Banking & Finance applications and Internet servers, quickly without any integration. BioEnterprise provides a new layer of security over passwords. It verifies the user's identity and allows quick access to one, some or all applications at once. NO matter where your employees log on from, they can quickly and easily access authorized files and company information. BioExchange BioExchange allows you to exchange documents securely in an organization. You can secure any document with a right click of your mouse. Once secured, it can be opened; only by you and the peoples to whom you have authorized to open it. BioExchange provides unique integration of Bio PKI BioPKI provides efficient and tested framework for secure transactions and exchange of data across networks. BioPKI patches certain drawbacks, which PKI has such as, mobility problem, storage of private key, and physical access to machine storing your private key. With BioPKI, your private key is generated only when you give your biometric and you can transact safely from any machine anywhere in the world. Axis Software Private Limited 1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100 www.axistech.com
  • 25. ASAT (Axis Semi Automated Teller) ASAT is a biometric based semi automated transaction system for Banks, Financial Institutes, Government Organizations and Corporates. ASAT allows banks to automate branch operations without investing in huge electronic network infrastructure like ATMs. ASAT consists of a biometric authentication terminal installed outside the teller counter. Customers enter account number and verify biometric to withdraw money instead of going through the manual process of filling withdrawal slips, signature verification and repetitive cash counting by the teller. ACC (Automated Cheque Clearance) Axis provides an innovative patent pending product that offers a secured, efficient platform for Corporate Banking. The current cheque clearance authentication process is manual, time consuming and prone to human errors. It is also very tedious as it involves checking authentication directives (Business Logic) and matching signatures on the cheque with that in the database in order to grant clearance. Axis Automated Cheque Clearance (ACC) adds another layer to signature authentication with an annotation, which is coupled with biometric authentication. In ACC, an annotation is printed on the cheque, which stores confidential information such as signatory details, cheque information and fingerprints of the signatories. When a cheque comes in for clearance the Axis System with the banker just scans the annotation and matches the data with that in the database and authentication is done. At the same time other authorizations are also ascertained like whether signatories are authorized to sign, whether the amount they are authorized to sign is not exceeded etc. All biometric systems operate in a similar fashion. First, the system captures a sample of the biometric characteristic (ie.enrollment process). During enrollment, some biometric systems may require a number of samples in order to build a profile of the biometric characteristic. Unique features are then extracted and converted by the system into a mathematical code. Axis Software Private Limited 1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100 www.axistech.com
  • 26. This sample is then stored as the biometric template for the enrollee. The template can reside on a computer database, smart card or barcode. In addition, the biometric system may require a trigger, or a means of matching the template to the person, for e.g. a PIN is keyed-in to access the template, or a smart card storing the tem- plate is inserted into a card reader. In either case, the end user interacts with the biometric sys- tem for a second time to have his or her identity checked. A new biometric sample is then taken and this is compared with the template. If the template and the new sample match, the end user is granted access. This is the basic premise of biometrics - that a person has a sample of their biometric data captured and the biometric system decides if it matches with an- other sample. The following four-stage process illustrates the way our biometric systems operate: Capture - a physical or behavioral sample is captured by the system during enrollment Extraction -unique data is extracted from the sample and a template is created Comparison -the template is then compared with a new sample Matching - the system then decides if the features extracted from the new sample are matching or not. Axis Software Private Limited 1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100 www.axistech.com
  • 27. Fingerprint Verification Basics Fingerprints are one of those bizarre twists of nature. Human beings happen to have built-in, easily accessible identity cards. You have a unique design, which represents you alone, literally at your fingertips. How did this happen? People have tiny ridges of skin on their fingers because this particular adaptation was extremely advantageous to the ancestors of the human species. The pattern of ridges and "valleys" on fingers make it easier for the hands to grip things, in the same way a rubber tread pattern helps a tire grip the road. The other function of fingerprints is a total coincidence. Like everything in the human body, these ridges form through a combination of genetic and environmental factors. The genetic code in DNA gives general orders on the way skin should form in a developing fetus, but the specific way it forms is a result of random events. The exact position of the fetus in the womb at a particular moment and the exact composition and density of surrounding amniotic fluid decides how every individual ridge will form. So, in addition to the countless things that go into deciding your genetic make-up in the first place, there are innumerable environmental factors influencing the formation of the fingers. Just like the weather conditions that form clouds or the coastline of a beach, the entire development process is so chaotic that, in the entire course of human history, there is virtually no chance of the same exact pattern forming twice. Consequently, fingerprints are a unique marker for a person, even an identical twin. And while two prints may look basically the same at a glance, a trained investigator or an advanced piece of software can pick out clear, defined differences. This is the basic idea of fingerprint analysis, in both crime investigation and security. A fingerprint scanner's job is to take the place of a human analyst by collecting a print sample and comparing it to other samples on record. In the next few sections, we'll find out how scanners do this. Verification There are a variety of approaches to fingerprint verification. Some of them try to emulate the traditional police method of matching minutiae, others are straight pattern matching devices, and some adopt a unique approach all of their own, including moiré fringe patterns and Axis Software Private Limited 1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100 www.axistech.com
  • 28. ultrasonic. Some of them can detect when a live finger is presented, some cannot. There are a greater variety of fingerprint devices available than any other biometric at present. Potentially capable of good accuracy (low instances of false acceptance) fingerprint devices can also suffer from usage errors among insufficiently disciplined users (higher instances of false rejection) such as might be the case with large user bases. One must also consider the transducer / user interface and how this would be affected by large scale usage in a variety of environments. Fingerprint verification may be a good choice for in house systems where adequate explanation and training can be provided to users and where the system is operated within a controlled environment. It is not surprising that the workstation access application area seems to be based almost exclusively around fingerprints, due to the relatively low cost, small size (easily integrated into keyboards) and ease of integration. Matching Among all the biometric techniques, fingerprint-based identification is the oldest method, which has been successfully used in numerous applications. Everyone is known to have unique, immutable fingerprints. A fingerprint is made of a series of ridges and furrows on the surface of the finger. The uniqueness of a fingerprint can be determined by the pattern of ridges and furrows as well as the minutiae points. Minutiae points are local ridge characteristics that occur at either a ridge bifurcation or a ridge ending. Fingerprint matching techniques can be placed into two categories: minutiae-based and correlation based. Minutiae-based techniques first find minutiae points and then map their relative placement on the finger. However, there are some difficulties when using this approach. It is difficult to extract the minutiae points accurately when the fingerprint is of low quality. Also this method does not take into account the global pattern of ridges and furrows. The correlation-based method is able to overcome some of the difficulties of the minutiae-based approach. However, it has some of its own shortcomings. 8Correlation-based techniques require the precise location of a registration point and are affected by image translation and rotation. Axis Software Private Limited 1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100 www.axistech.com
  • 29. Fingerprint matching based on minutiae has problems in matching different sized (unregistered) minutiae patterns. Local ridge structures cannot be completely characterized by minutiae. We are trying an alternate representation of fingerprints, which will capture more local information and yield a fixed length code for the fingerprint. The matching will then hopefully become a relatively simple task of calculating the Euclidean distance will between the two codes. A commercial fingerprint-based authentication system requires a very low False Reject Rate (FAR) for a given False Accept Rate (FAR). This is very difficult to achieve with any one technique. We are investigating methods to pool evidence from various matching techniques to increase the overall accuracy of the system. In a real application, the sensor, the acquisition system and the variation in performance of the system over time is very critical. We are also field testing our system on a limited number of users to evaluate the system performance over a period of time. Classification Large volumes of fingerprints are collected and stored everyday in a wide range of applications including forensics, access control, and driver license registration. An automatic recognition of people based on fingerprints requires that the input fingerprint be matched with a large number of fingerprints in a database (FBI database contains approximately 70 million fingerprints!). To reduce the search time and computational complexity, it is desirable to classify these fingerprints in an accurate and consistent manner so that the input fingerprint is required to be matched only with a subset of the fingerprints in the database Axis Software Private Limited 1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100 www.axistech.com
  • 30. Fingerprint classification is a technique to assign a fingerprint into one of the several pre- specified types already established in the literature, which can provide an indexing mechanism. Fingerprint classification can be viewed as a coarse level matching of the fingerprints. An input fingerprint is first matched at a coarse level to one of the pre-specified types and then, at a finer level, it is compared to the subset of the database containing that type of fingerprints only. We have developed an algorithm to classify fingerprints into five classes, namely, whorl, right loop, left loop, arch, and tented arch. The algorithm separates the number of ridges present in four directions (0 degree, 45 degree, 90 degree, and 135 degree) by filtering the central part of a fingerprint with a bank of Gabor filters. This information is quantized to generate a Finger Code, which is used for classification. Our classification is based on a two-stage classifier, which uses a K-nearest neighbor classifier in the first stage and a set of neural networks in the second stage. The classifier is tested on 4,000 images in the NIST-4 database. For the five-class problem, classification accuracy of 90% is achieved. For the four-class problem (arch and tented arch combined into one class), we are able to achieve a classification accuracy of 94.8%. By incorporating a reject option, the classification accuracy can be increased to 96% for the five-class classification and to 97.8% for the four-class classification when 30.8% of the images are rejected. Image Enhancement A critical step in automatic fingerprint matching is to automatically and reliably extract minutiae from the input fingerprint images. However, the performance of a minutiae extraction algorithm relies heavily on the quality of the input fingerprint images. In order to ensure that the performance of an automatic fingerprint identification/verification system will be robust with respect to the quality of the fingerprint images, it is essential to incorporate a fingerprint enhancement algorithm in the minutiae extraction module. We have developed a fast fingerprint enhancement algorithm, which can adaptively improve the clarity of ridge and furrow structures of input fingerprint images based on the estimated local ridge orientation and frequency. We have evaluated the performance of the image enhancement algorithm using the goodness index of the extracted minutiae and the accuracy of an online fingerprint verification system. Experimental results show that incorporating the enhancement algorithms improves both the goodness index and the verification accuracy. Axis Software Private Limited 1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100 www.axistech.com
  • 31. Scanners: (Optical Scanner) A fingerprint scanner system has two basic jobs - it needs to get an image of your Finger, and it needs to determine whether the pattern of ridges and valleys in this image matches the pattern of ridges and valleys in pre-scanned images. There are a number of different ways to get an image of somebody's finger. The most common methods today are optical scanning and capacitance scanning. Both types come up with the same sort of image, but they go about it in completely different ways. The heart of an optical scanner is a charge-coupled device (CCD), the same light sensor system used in digital cameras and camcorders. A CCD is simply an array of light-sensitive diodes called photo sites, which generate an electrical signal in response to light photons. Each photo site records a pixel, a tiny dot representing the light that hit that spot. Collectively, the light and dark pixels form an image of the scanned scene (a finger, for example). Typically, an analog-to-digital converter in the scanner system processes the analog electrical signal to generate a digital representation of this image. See How Digital Cameras Work for details on CCDs and digital conversion. The scanning process starts when you place your finger on a glass plate, and a CCD camera takes a picture. The scanner has its own light source, typically an array of light-emitting diodes, to illuminate the ridges of the finger. The CCD system actually generates an inverted image of the finger, with darker areas representing more reflected light (the ridges of the finger) and lighter areas representing less reflected light (the valleys between the ridges). Before comparing the print to stored data, the scanner processor makes sure the CCD has captured a clear image. It checks the average pixel darkness, or the overall values in a small sample, and rejects the scan if the overall image is too dark or too light. If the image is rejected, the scanner adjusts the exposure time to let in more or less light, and then tries the scan again. If the darkness level is adequate, the scanner system goes on to check the image definition (how sharp the fingerprint scan is). The processor looks at several Straight lines moving horizontally and vertically across the image. If the fingerprint image has good definition, a line running perpendicular to the ridges will be made up of alternating sections of very dark pixels and very light pixels. If the processor finds that the image is crisp and properly exposed, it proceeds to comparing the captured fingerprint with fingerprints on file. Disclaimer: Axis® is a registered trademark owned by Axis Soft.pvt.ltd. Other brands and names mentioned herein may be the trademarks of their respective owners. Neither the whole nor any part of the information contained in, or the product described in, this document may be adapted or reproduced in any form without the prior written permission of the copyright holder. The product described in this document is subject to continuous developments and improvements. Axis Soft.pvt.ltd gives all particulars of the product and its use contained in this document in good faith. However, all warranties implied or expressed, including but not limited to implied warranties of merchantability, or fitness for purpose, are excluded. This document is intended only to assist the reader in the use of the product. Axis Soft.pvt.ltd shall not be liable for any loss or damage arising from the use of any information in this document, or any error or omission in such information, or the use or inability to use the product. Axis Software Private Limited 1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100 www.axistech.com