Upload
ajay-antony
View
127
Download
3
Tags:
Embed Size (px)
Citation preview
Biometrics Fingerprint Technology
Biometrics Fingerprint Technoloy India Time Attendance IndiaBiometric Biometric security services Biometric solutions Biometric technology Biometric fingerprint Biometric companies Biometric fingerprint Biometric research Biometric books biometric tutorials biometric india biometric access biometric contact pune bioaccess biometric products fingerprint india time attendance fingerprint access control time cards biometric identification biometric research biometric solutions biometric services biometrics Biometrics India USA America Europe Japan UK Germany france uae singapore Time a
Why Fingerprints? | History of Fingerprint Technology | Fingerprint Identification Process | Fingerprint Application
:: Why Fingerprints?
With increasingly urgent need for reliable security, biometrics is being spotlighted as the authentication method for the next generation. Among numerous biometric technologies, fingerprint authentication has been in use for the longest time and bears more advantages than other biometric technologies do.
Fingerprint authentication is possibly the most sophisticated method of all biometric technologies and has been thoroughly verified through various applications. Fingerprint authentication has particularly proved its high efficiency and further enhanced the technology in criminal investigation for more than a century.
Even features such as a person’s gait, face, or signature may change with passage of time and may be fabricated or imitated. However, a fingerprint is completely unique to an individual and stayed unchanged for lifetime. This exclusivity demonstrates that fingerprint authentication is far more accurate and efficient than any other methods of authentication.
Also, a fingerprint may be taken and digitalized by relatively compact and cheap devices and takes only a small capacity to store a large database of information. With these strengths, fingerprint authentication has long been a major part of the security market and continues to be more competitive than others in today’s world.
:: History of Fingerprint Technology
The beginning of fingerprints goes back to as early as the ancient times. According to historical findings, fingerprints were used on clay tablets for business transactions in ancient Babylon. In China, thumb prints were found on clay seals. But it was in the 19th century that the results of scientific studies were published and fingerprint technology began to be considered more seriously.
Using the1800’s scientific studies as a foundation, fingerprint technology was already in use by the beginning of the 20th century. In 1924, FBI(Federal Bureau of Investigation) is already known to have maintained more than 250 million civil files of fingerprints for the purpose of criminal investigation and the identification of unknown casualties. In the late 1960's, fingerprint technology met a great turning point when it gave birth to 'live-scan,' a method to obtain a fingertip image without the use of print ink. When the FBI announced that it planned to stop using paper fingerprint cards inside their new Integrated AFIS (IAFIS) site, it was actually announcing the remarkable breakthrough of today's live-scan technology.
But fingerprint identification technology did not stop as a forensic method only. It was officially used for business purposes in 1968 at one security corporation in Wall Street. Fingerprints are now being used as a secure and effective authentication method in numerous fields, including financial, medical, e-commerce and entrance control applications. Modern applications of fingerprint technology rely in large part on the development of exceptionally compact fingerprint sensors.
top
:: Fingerprint Identification Process
Fingerprint identification process consists of two essential procedures: enrollment and authentication. Taking the following steps completes each procedure:
As shown in the diagram above, fingerprint identification system compares the input fingerprint image and previously registered data to determine the genuineness of a fingerprint. All the steps described above affect the efficiency of the entire system, but the computational load of the
following steps can be reduced to a great extent by acquiring a good-quality fingerprint image in the first step.
Step 1. Image Acquisition
Real-time image acquisition method is roughly classified into optical and non-optical. Optical method relies on the total reflection phenomenon on the surface of glass or reinforced plastic where the fingertip is in contact. The sensor normally consists of an optical lens and a CCD module or CMOS image sensor. In contrast, semiconductor sensors, as a typical example of non-optical sensors, exploit electrical characteristics of a fingertip such as capacitance. Ultrasonic wave, heat, and pressure are also utilized to obtain images with the non-optical fingerprint sensors. Non-optical sensors are said to be relatively more suitable for massive production and size reduction such as in the integration with mobile devices. Detailed comparison is found in Table 1.
Optical Non-optical
Measuring Method
lightpressure, heat, capacitance, ultrasonic wave
Strength
highly-stable performancephysical/electrical durabilityhigh-quality image
low cost with mass production compact size integrated with low-power application
Weakness
relatively high costlimit to size-reductionrelatively easy to fool with a finger trace or fake finger
physical/electrical weaknessperformance sensitive to the outer environment(temperature, dryness of a finger)
Application
entrance, time, and attendance controlbanking servicePC security
PC securitye-commerce authenticationmobile devices & smart cards
Step 2. Feature Extraction
There are two main ways to compare an input fingerprint image and registered fingerprint data. One is to compare an image with another image directly. The other is to compare the so-called 'features' extracted from each fingerprint image. The latter is called feature-based/minutia-based matching. Every finger has a
unique pattern formed by a flow of embossed lines called “ridges” and hollow regions between them called “valleys.” As seen in the Picture 2 below, ridges are represented as dark lines, while valleys are bright.
Step 3. Matching
The matching step is classified into 1:1 and 1:N matching according to its purpose and/or the number of reference templates. 1:1 matching is also called personal identification or verification. It is a procedure in which a user claims his/her identity by means of an ID and proves it with a fingerprint. The comparison occurs only once between the input fingerprint image and the selected one from the database following the claim by the user.
On the contrary, 1:N matching denotes a procedure where the system determines the user's identity by comparing the input fingerprint with the information in the database without asking for the user's claim. A good example of this is AFIS(Automated Fingerprint Identification System) frequently used in criminal investigation.
The output result of the matching step is whether or not the input fingerprint is identical to the one being compared in the database. Then how could the accuracy of the matching procedure be represented in number? The simplest measures are FRR(False Reject Rate) and FAR(False Accept Rate). The former is the rate of genuine user's rejection and the latter is the rate of impostor's acceptance.
:: Fingerprint Application
Markets for fingerprint technology include entrance control and door-lock applications,
fingerprint identification mouses, fingerprint mobile phones, and many others. The fingerprint markets are classified as follows:
As the advanced technology enables even more compact fingerprint sensor size, the range of application is extended to the mobile market. Considering the growing phase of the present mobile market, its potential is the greatest of all application markets.
References
[1] International Biometric Group,「Biometric Market Report 2000-2005」, 2001.
[2] Anil K. Jain, Lin Hong, Sharath Pankanti, Ruud Bolle,「An Identity Authentication System Using Fingerprints」, 1997.
[3] http://onin.com/fp/fphistory.html
ttendance india access control india biometric india security india Fingerprint india Precise Biometrics Biometric Biometrics Security Biometrics Information Bio Biometrics india
Biometric Fingerprint scanner Time attendance Access control OEM modules security Time cards SDK USB finger print sensor Authentication Identification Verification Biometrics time
attendance Biometrics access control Fingerprint time attendance Fingerprint access control Proximity RFID smart cards Software Hardware free low cost cheapest products Solutions
project services development matching recognition
Biometrics Information
Why Biometrics? | Classification of biometrics | Issues
:: Why Biometrics?
Biometrics authenticates and determines an individual’s identity by utilizing the uniqueness of his or her biological and behavioral characteristics. Other authentication methods often used are PIN method and Token (ID Card) method. Biometrics is superior to PIN or Token methods in the following ways:
1) Increased SecurityBiometrics offers superior security than PIN or ID Card. Biometric methods do not involve danger of information exposure like PIN and ID Card do and unauthorized persons cannot attempt to steal or make a guess at private information.
2) Increased ConvenienceToday, people have to remember many passwords. They should be able to provide their passwords whenever they use their credit cards or log into various sites on the Internet. Uniform passwords can lead to serious dangers if exposed. However, biometrics does not require us to remember our passwords.
:: Classification of Biometrics
Biometrics can be classified according to the type of biometric data used, e.g., face, iris, voice, signature, or hand geometry identification. However, all these methods take the same authentication process. The biometric authentication process is as described below:
Among all available biometric technologies, fingerprint identification is the most popular one. This is due to the fact that fingerprint identification is far more efficient than others, especially considering how economical it is.
top
:: Issues
1) Standardization Active efforts are being made to standardize various core biometric technologies mainly available in the U.S. and Europe. Major standardization methods for biometric identifications are as follows:
a) BAPIThis standard was developed by I/O Software in 1998. Being O/S, computer platform, and sensor device independent, it was designed to support the development of applications. Some of the features include the unification of encryption method, standardized programming environment, and support for the client-server applications.
b) HA-APIThis method was first introduced in December 1997 at the 10th U.S. Biometric Consortium held by National Registry Inc. a company sponsored by the U.S. Ministry of National Defense. Thinking that biometrics would be useful in computer security, the U.S. Ministry of National Defense supported the development. However, they failed to secure companies to work on the project.
c) BioAPICompaq was the first company to form BioAPI Consortium, which consisted of 6 companies with a goal to standardize industrial biometric identification API in April 1998. In December of the same year, and in March the following year, BAPI and HA-API were included in new BioAPI. BioAPI Consortium was constituted by various groups, including 78 companies who are biometric identification developers and medical/financial/ governmental users. BioAPI has recently been adopted as ANSI/INCITS 358, American standard.
2) Multimodal Biometrics There has been heated researches made to have multimodal biometrics be a method that overcomes the limitations of unimodal biometric technologies. Multimodal biometrics is recommended as a way to improve user authentication through biometrics of greater reliability.
a) Multiple SensorsA single biometric feature can be extracted through different sensors. For instance, we can use optics-, ultrasound-, and semiconductor-based sensors.
b) Multiple BiometricsA number of biometric features can be captured simultaneously for authentication. For example, facial and fingerprint identification can be used at the same time. However, this method is not recommended due to its high cost.
c) Multiple Units of the Same BiometricVarious units can be used for one biometric feature. Multiple units can often be provided by natural human physical structure such as through the user’s two irises and ten fingerprints. A disadvantage to this method is that it can make a user uncomfortable when capturing his or her biometric feature samples. The process can also take a long time.
d) Multiple InstancesThis means that pieces of biometric information of one feature are taken at different instances by one sensor. One example of this method is to capture a fingerprint a number of times with a sensor or to sample a voice or a face multiple times for later use.
e) Multiple Representation and Matching Algorithms for the Same Biometric Input Signal Multimodal biometrics requires more time to work with the information and develop an appropriate system than a unimodal biometrics does since several modules are put in use.
For that reason, if a unimodal method can assure the users of high enough dependability in a given circumstance, it may not be necessary to employ a multimodal biometric method. If the greatest degree of reliability is required, however, it may become necessary to adopt a multimodal biometric method in order to ensure any possible advancement.
top
Biometrics Information Fingerprint Information Time Attendance Information Biometric security services Information Biometric technology Biometric companies Information Biometric research Information Biometric books biometric tutorials biometric biometric access biometric
contact pune services Precise Time attendance Access control OEM modules Information Authentication Identification Verification Information Proximity Information RFID Information
smart cards Information Software Hardware free low cost cheapest products Solutions project services development matching recognition.
Hamster
USB Optical Fingerprint Scanner Live Scan fingerprinting
:: Introduction Fingerprint Recognition Hamster is a fingerprint scanner for a computer Security featuring superior performance, accuracy, durability based on unique Fingerprint Biometric Technology. It can be plugged into a computer separately with your mouse. It is very safe and convenient device for security instead of password that is vulnerable to fraud and is hard to remember.
Use Hamster with your choice of compatible biometric software for authentication, identification and verification functions that let your fingerprints act like digital passwords that cannot be lost, forgotten or stolen.
Live scan fingerprint scanner ,Secugen scanner, fingerprint software development kit, fingerprint sdk, integration development software, Keyboard Fingerprint Scanner, Fingerprint Scanning, Fingerprint Scanner, Macintosh Dos Fingerprint Scanner Fingerprint Scanner Software, Fingerprint Scanners For Computers, fingerprint scanner, Secugen scanner, fingerprint software development kit, fingerprint sdk, integration development software, Keyboard Fingerprint Scanner, Fingerprint Scanning, Fingerprint Scanner,
:: Features Fast and Perfect Authentication through excellent Algorithm. Compact, lightweight and portable. High-performance, maintenance-free optical fingerprint scanner.
Resistance to scratches, impact, vibration and electrostatic shock. Latent print image removal (does not accept prints left behind). Encryption of fingerprint templates.
:: Applications
Personal computer / workstation security. Network / enterprise security. e-commerce / e-business. Electronic transactions. Banking and financial systems. Medical information systems. Any password-based application.
:: Technical Specifications
Fingerprint Sensor OPP 01
Dimensions25.3(W) x 40.7(L) x 67.7(H) mm
Scanner Resolution 500 dpi
Verification Time Less than 1 second
Operating Temperature 0° to 40°C
Operating Humidity < 90% relative, non-condensing
Supply voltage 5 V from USB port
Interface USB 1.1
Supported Operating Systems Windows 98/Me/NT4/2000/XP
Certifications EMI,FCC,CE,MIC
:: Software Included in the CD :: Software package (Security Program for Desktop PC SecuEnterprise Standard. Windows Logon. Screen Saver. Folder Encryption /Decryption. Event viewer.:: Visual Basic OCX evaluation SDK.:: Drivers.FRT
Biometrics Fingerprint Time Attendance system
:: Introduction Hardware
Fingerprint Recognition Terminal (Hamster) is a Biometrics Fingerprint recognition based Time Attendance system with TCP/IP networking capabilities.Hamster consists of a robust standalone Fingerprint terminal with LCD, Keypad, Fingerprint scanner, 800MHz processor, memory, communication and storage capabilities. Hamster does not depend on computer or external resources for its operations though it can work together with multiple Hamsters to provide centralized database and management capabilities.Hamster is equipped robust Optical Fingerprint scanner with high quality fingerprint scanning and long life. It is not a low cost semiconductor scanner which is mainly for personnel use and cannot handle heavy scanning like in Time Attendance systems.Hamster includes easy to use feature rich Time Attendance management software called Time-TRONIX TA. This is browser based software with easy to use graphical interfaces and context help. Time-TRONIX TA software can be installed on a single computer, LAN or Internet
Time attendance terminal Time attendance recorder solutions software time clock time and attendance time recording systems Fingerprint scanner India Fingerprint recognition Biometric identification Biometrics fingerprint Id solution lathem timecard timekeeper payclock timecards timesheet timelog softtime etime timetracker kronos mjr 7000 timecentre synel worktime timemaster timelot payroll timewolf rapidprint clocks zeiterfassung unitime clock timetrack journyx timesoft tc100 480f q plus timesheets timeslips punchclock clocking fastime infotronics tr510 timeregistration urenregistratie clockcard amano .
:: Technology Foolproof security with
advanced fingerprint minutiae matching
Fast verification speed of less than one second
1:1and 1:N matching
Supports both Verification and Identification modes
:: Economic Low cost Easy to install and use
Battery backup available
:: Hardware features Hamster is a system with its
own processing and storage capabilities. At the same time it support fast 10/100 base-T Ethernet TCP/IP networking with ability to network with central server and use both on system or on server processing/databases.
It is based on proven optical fingerprint scanning technology with 3D Live finger detection.
Surface of the scanner is scratch-resistant and it is not possible to scratch it even with a blade or nail, this gives good quality fingerprint scanning throughout the life of the scanner. Other scanners even with protective layers develop scratches over time and the quality of scanning degrade. Scanner is also free of any electrostatic problems.
Hamster is very powerful system with 800MHz processing power close to computers. This allow Hamster to support fast 1:N matching where employees are not required to enter ID before matching fingers. Most other fingerprint system though claim to support 1:N matching (fingerprint only) but this is very slow hence they are always used in 1:1 matching (ID + fingerprint). Hamster can offer more then 100 fingerprint matches per second.
Fingerprint scanner has been practically tested with wet fingers, greasy fingers, smeared fingers, oily fingers and gives consistent performance for most practical situations.
Fingerprint scanner has finger guide which makes it easy for employees to give finger scan.
Hamster has a auto-scanning mode in which users are not required even press ENTER key to to activate scanner. This along with other options can give you very fast transactions to avoid queuing up in morning and evening IN/OUT.
:: Specifications
Specifications Dimensions (in cms) 20(W)*30(H)*16(D) Color Silver
Case Metallic
Scanner resolution
500dpi
Scanner Optical, Scratch/Impact resistant
Matching 1:1, 1:N(recommended)
Verification speed
<1sec
FRR 0.01% FAR Under 0.001%
Enrollment 2000 users, two fingers per user
Transactions 200,000 transaction records
LCD Alphanumeric 16x4Sound Buzzer included Keypad 25 keys, non-tactile
Access control
12VDC Relay optional
Power220-240V AC or 115V AC
Interface with PC
Ethernet, cross cable
Network Interface
10/100 Base-T Ethernet TCP/IP
Temperature range
-10°C - 60°C
Humidity Under 90%RH
Software Time Attendance software included
:: Introduction Software The Time Attendance Software tracks employees' time and provides a daily reconciliation of time records as reports or for further processing by payroll software. As a result, the software cuts down on administrative time, safeguards from error, and saves a substantial amount of money that could have been lost due to mishandled time cards and employees punching in for each other. It is a complete and a cost effective solution for T&A and security.
Prepare employee muster
Monitor employee attendance
Track vacation & sick time
Schedule employees
Provide flexible shifts
Automate time rounding policies
Quickly retrieve historical data
Print any of numerous reports
Link with payroll software
And much, much more
:: Software Modules
Company: to enter company or facility details and address
Departments: to create and manage various departments for department wise attendance monitoring
Employee: Employee registration and management
Shift management: to enter complex shift information, including overnight shift information and overtime schedules
Calendar: company holidays and calendar
Leave management: To allocate and track employee leaves, multiple leave types is supported
Administration: Admin functions, importing logs, logs editing and processing
Reports: Number of useful reports are available in HTML and text formats
:: Payroll interface
The Time-TRONIX TA software can be easily interfaced with your existing Payroll software. All payroll software accept standard time attendance data produced by Time-TRONIX TA software. This data is provided in MS-access or text format. Most payroll software will accept text data.
Reports
A variety of reports can be produced to give you the information you need in a format you can use. Following standard reports are available:
Attendance Report Time Attendance Report
Lateness Report
Overtime Report
Overnight Report
Leave Report
Absence Report
Exception Report
Shift Roster Report
Clocking Report
Staff Not Working Report
Staff Not Clocking Report
:: Software (Time Attendance only) features
Time-TRONIX TA software is easy to install and use on windows platform.
You can install it on a single computer or on your LAN server to access it from anywhere in the organization. It is also possible to install it on the web server.
Time-TRONIX TA software is developed to offer standard Time attendance features and reports.
The software has been developed in Active Server pages with large part of the source code kept open to allow experienced administrators and developers to add custom features easily, if required.
has a dedicated team to develop and support Time-TRONIX
TA. We intend to develop it into a comprehensive Time Attendance software with support for wide industries, hence we consider integrating custom features free of cost for our clients, if required.
:: More....
The fingerprint data is encrypted and secure
Comes with assured warranty, support and service
Device is manufactured in India
:: How it worksInstallation
Hamster comes preconfigured and ready to use. Provide power supply to the system and start using.
It has no fingerprints registered in the database and show "Database Empty" message on pressing ENTER key and scanning finger.
First finger registered by pressing MENU key automatically becomes top administrator.
Once the admin is registered more users can only be registered after verifying admin fingers. Admin can also give admin rights to other users.
Plug your Ethernet LAN network cable into network port provided in Hamster.
You can change few settings and configure Hamster to work with your Ethernet LAN network. It is also possible to configure it to use central database residing on your server in case you have multiple Hamster machines. To do this you can connect standard keyboard and CRT monitor to Hamster and do configurations the way you do with a computer.
Before registering employees fingerprints, install Time-TRONIX TA Time Attendance (TA) software software on your office computer or server.
Enter company, department, shift, calendar and other details particular to your company.
Enter employee information to generate unique ID for each employee.
Register fingerprints of each employee with his unique ID on the Hamster using admin features with MENU key.
Use
Employee enters the office and press enter key and place his finger on the scanner.
Hamster scans his finger and matches the scanned fingerprint with the database of registered
fingers stored in its memory
Employee is identified and success sound is played along with SUCCESS [#ID] message on the LCD and green LED blinks
Employee's IN time is recorded with date and time in the Hamster database itself
When employee leaves the office his OUT time is recorded in the same way
Administration
Hamster is connected to the company's 10/100 base-T Ethernet network and its data is accessible anywhere on the LAN. Hamster can be assigned its own IP address.
Administrator imports log data in time attendance software, he may edit few records if required or remove invalid entries.
This data is then processed further to generate data for reports
More complex scenarios with lunch IN/OUT, tea breaks, overtime are also supported.
Reports can be generated and printed using the software
Data required for payroll can be exported and fed to payroll software
:: Benefits
Hamster eliminates proxy punching, very easy with card based time attendance systems. Card based systems only ensure that the card was punched or swiped and does not ensure physical presence of the person which is a major loophole. Fingerprint system ensure physical presence of the employee.
Hamster is developed with needs of medium and large size companies in mind with large electronic infrastructure, complex architectures, dedicated administration free functioning and easy integration with existing resources.
Hamster help you significantly reduce administrative costs associated with issuing and managing cards, timesheets or attendance registers.
Time-TRONIX TA is a robust and reliable system. Since it is a complex high-end system it does require service and support.
Physical Access Control
We provide Biometrics access control, Door Access Control, access control in India, doorlocks, access control, Fingerprints acccess control, biometric door lock, security door control, access control, fingerprint door locks, fingerprint recognition, fingerprint access control, door locks security, access control locks, biometric access fingerprint, access control, doorlocks, biometric door lock, security door control, access control, fingerprint door locks, fingerprint recognition, fingerprint access control, door locks security, access control locks, fingerprint door locks, biometric access, Electric Bolt locks, time clocks.
Managing access to resources is assuming increasing importance for organizations everywhere, from small entrepreneurial companies to large corporate enterprises and government bodies of all sizes. Even the most neutral organization now recognizes the danger of a security breach.
How it works :
To the user, an access control system is composed of three elements:
A card or biometric (an identity credential) that is presented to a the door reader.
The door reader which indicated whether the card or biometrics is valid and entry is authorized.
A door or gate which is unlocked when entry is authorized.
.: Related Products :.
Physical Access Control
We provide Biometrics access control, Door Access Control, access control in India, doorlocks, access control, Fingerprints acccess control, biometric door lock, security door control, access control, fingerprint door locks, fingerprint recognition, fingerprint access control, door locks security, access control locks, biometric access fingerprint, access control, doorlocks, biometric door lock, security door control, access control, fingerprint door locks, fingerprint recognition, fingerprint access control, door locks security, access control locks, fingerprint door locks, biometric access, Electric Bolt locks, time clocks.
Managing access to resources is assuming increasing importance for organizations everywhere, from small entrepreneurial companies to large corporate enterprises and government bodies of all sizes. Even the most neutral organization now recognizes the danger of a security breach.
How it works :
To the user, an access control system is composed of three elements:
A card or biometric (an identity credential) that is presented to a the door reader.
The door reader which indicated whether the card or biometrics is valid and entry is authorized.
A door or gate which is unlocked when entry is authorized.
.: Related Products :.
BIO API SDK
BioAPI SDK
:: Introduction
BioAPI Consortium established in U.S.A. in 1998 developed BioAPI CBEFF Format under the
collaboration with Biometric Consortium, IBIA (The International Biometric Industry
Association), NIST (The National Institute of Standards and Technology) and related
associations. NIST subsequently published BioAPI Specification Version 1.1 in March, 2001
after BioAPI Version 1.0 in March, 2000.
BioAPI Specification Version 1.1 was adopted as the norm of ANSI in February,2002. BioAPI
indicates standard API commonly deployed in biometric field, providing the method of criteria
for a convenient connection between assorted biometric devices and various type of application
programs. BioAPI SDK is the Biometric Service Provider Module compatible with International
Standard of BioAPI and the sole BSP acquired CBEFF Format ID form IBIA in domestic
biometric market. It not only maintains all the capabilities and merits of SDK as it includes
utmost API technology and high level User Interface of that but also enables software application
developers quickly and easily to integrate fingerprint authentication system into the application
of their choice due to a perfect compatibility with BioAPI.
EFM Series
EFM Series is a embedded development platform for Fingerprint recognition based standalone products:.Biometrics Biometric Fingerprint Fingerprint recognition Fingerprint terminal Fingerprint identification fingerprint recognition fingerprint security Fingerprint terminal access fingerprint software fingerprint time attendance fingerprint identification fingerprint access control fingerprint access security fingerprint technique fingerprint india fingerprint module fingerprint development desktop fingerprint fingerprint development kit fingerprint identification fingerprint security fingerprint n.
Embedded Time Attendance system with integrated card interfaces
Access Control systems
Door locks, Safes, Lockers
Electronic control systems
more..
EFM platform include the following core building blocks:.
Multiple OEM Fingerprint Standalone Modules
8051 single board computers
Rabbit Semiconductor based embedded TCP/IP dev. system
Card readers
Features:.
Complete embedded platform for robust products
Optical fingerprint sensors for reliability
Multiple module to select from as per your application needs
Full development support and reference designs
Low cost
Quick development and product launches
About Biometrics Technology ...About Fingerprint Technology ...
Comparison:
Optical vs. Capacitive (Semiconductor) Fingerprint Sensors
We develop customized products for its clients based on this
platform and offer the complete platform or sub-components to other developers/VARs along with support.
biometrics, fingerprint capture, fingerprint reader, low cost ,Biometrics India, USA, America, Europe, Japan, UK, Germany, Precise Biometrics Biometric Biometrics Security Biometrics Information Bio, Biometrics india, Biometric, Fingerprint scanner, Time attendance, Access control, OEM modules, security, Time cards, SDK, USB finger print sensor, Authentication, Identification, Verification, Biometrics time attendance, Biometrics access control, Fingerprint time attendance, Fingerprint access control, Proximity, RFID, smart cards, Software, Hardware, free, low cost, cheapest, products, Solutions, project, services, development, matching, recognitio
.: Related Products :.
FSM900
FSM5000
FDA01
FIM01
Home EFM Series
We provide fingerprint sensors India India, USA, America, Europe, Japan, UK, Germany, france, uae, singapore, Time Attendance, Access Control products, time recorders, time attendance, access control products,, time office reports, time attendance equipment, time attendance software, solutions, time keeping systems, time clock software, systems, time office, security, safe, intruder alarm, proximity, Biometrics time attendance, Biometrics access control, Fingerprint time attendance, Fingerprint access control, Proximity, RFID, smart cards, Software, Hardware, free, low cost, cheapest, products, Solutions, project, services, development, matching. EFM Series is a embedded development platform for Fingerprint recognition based standalone products:.
Embedded Time Attendance system with integrated card interfaces
Access Control systems
Door locks, Safes, Lockers
Electronic control systems
more..
EFM platform include the following core building blocks:.
Multiple OEM Fingerprint Standalone Modules
8051 single board computers
Rabbit Semiconductor based embedded TCP/IP dev. system
Card readers
Features:.
Complete embedded platform for robust products
Optical fingerprint sensors for reliability
Multiple module to select from as per your application needs
Full development support and reference designs
Low cost
Quick development and product launches
About Biometrics Technology ...About Fingerprint Technology ...
Comparison:
Optical vs. Capacitive (Semiconductor) Fingerprint Sensors
We develop customized products for its clients based on this platform and offer the complete platform or sub-components to other developers/VARs along with support.
.: Related Products :. FDA01
High speed recognition. Applicable to various product through simple but robust hardware design technology.
FIM01
100 user support fingerprint Module FSM900
Standalone OEM Fingerprint Module with Optical scanner, 1000 fingerprint storage capacity and Serial host interface.
FSM5000
Low cost Standalone Fingerprint Module with only 150 fingerprint storage capacity.
Home Time Attendance Recorders
We provide Time attendance Time attendance recorders solutions Verification Time keeping systems Biometrics fingerprint recognitions Time Attendance Fingerprint security Fingerprint Time Attendance Time Card system time clock software Smart card proxy punching Time attendance systems Fingerprint readers Fingerprint Fingerprint sensors Fingerprint identification Fingerprint scanning Fingerprint sensor technology Biometric fingerprint Fingerprint access control Biometrics Time attendance access control biometric security Fingerprint Precise Biometrics Time Attendance Security.
"Time is money”, this statement has never been truer, and time is indeed the most valuable resource. Accurate and efficient time and labor management is vital to any organization's success. Most companies do not really appreciate the losses that can occur without proper time and attendance accounting.
How it works :
About Biometrics Technology ...About Fingerprint Technology ...
.: Related Products :.
Time-TRONIX Desktop
SDK Pro. 3.0
SDK Pro.3.0 Software
:: Introduction
SDK Professional Version 3.0 is the Software Development Kit, a combination of existing BSP
(Biometric Solution Provider) SDK and 1:N fingerprint recognition engine for not only a regular
fingerprint application but also an application using fingerprint DB of large capacity with high
fingerprint search speed.
It provides High Level API (Application Programming Interface) which help application
software easily and quickly made and UI (User Interface) of wizard type so that it saves time and
efforts to develop an application. It is operated on various platform, supporting diverse OS and
development languages and connected to fingerprint recognition device which is manufactured
based on remarkable hardware design technology. It not only offers optimal conditions for
solution development but also guarantees fast speed of fingerprint search and high recognition
ratio.
Software Development kit, Software development, Development kit, Software, Software development kit, development kit, software development tools, Development tools, Software development India, Software progress, Kit, Software programming, Software progress, Software application tools, Embedded software development, Software development pune, software developments, software progress kit, S/W development kit, development
:: Features
- Provides the most optimized API for the fingerprint recognition software development.
- Easily applicable to client/server and web environments.
- Provides fingerprint registration and authentication Wizard for a convenient management of
users
- Makes UI Customization possible by providing user interface designed as skin concept to
minimize the cost of UI development and time
- The built-in encryption function using the 128-bit encryption algorithm provides enhanced
security to prevent data fabrication or falsification.
- Performs fingerprint DB search of large capacity with high speed of 10,000 fingerprints/sec.
due to adopting indexing algorithm not comparison in order.
- Easily integrated with any system as I:N search function is programmed using ANSI C.
:: Function Device control Fingerprint data capture Minutia extraction Fingerprint registration Fingerprint authentication (1:1, 1:N)* 1:N Matching Engine requires additional license fee
Time-TRONIX Desktop
Time -TRONIX Desktop
:: Introduction Time-TRONIX Desktop
TimeTRONIX Desktop is a complete Biometrics Fingerprint recognition based Time Attendance package for small and medium size companies with less then 100 employees.
TimeTRONIX Desktop consist of a robust USB Optical Fingerprint scanner connected to your standard office computer (preferably at your reception or at entrance with security personnel) and Time attendance management software loaded on the same or other computer on the LAN.
TimeTRONIX Desktop includes robust Optical Fingerprint scanner with high quality fingerprint scanning and long life. It is not a low cost USB semiconductor scanner which is mainly for personnel use and cannot handle heavy use like in Time Attendance systems.
TimeTRONIX Desktop includes easy to use feature rich Time Attendance management software.
This is browser based software with easy to use graphical interfaces and context help. TimeTRONIX software can be installed on a single computer, LAN or Internet.
Fingerprint time attendance fingerprint time attendance USB fingerprint peripherals fingerprint access USB time attendance time attendance access control products time recorders time attendance access control products time office reports time attendance equipment time attendance software solutions time keeping systems time clock software systems time office security safe intruder alarm proximity card smart cards Biometric India Fingerprint India & Time Attendance India access control India security India Biometrics India Biometric Fingerprint scanner Time attendance Access control OEM modules security Time cards SDK USB finger print sensor Authentication Identification Verification Biometrics time attendance
How it works
Installation
Plug the USB fingerprint scanner in office computer
Install drivers
Install TimeTRONIX software package 1
Install TimeTRONIX software package 2
Enter company, department, shift, calendar and other details
Enter employee information to generate unique ID for each employee
Register fingerprints of each employee with his unique ID
Use
Employee enters the office and place his finger on the scanner
Scanner automatically scan his finger and gives it to the computer Software running in the PC matches the scanned fingerprint with the database of registered fingers to identify the employee
Employee is identified and success sound come from the speakers attached to the computer
Employee IN time is recorded with date and time in the log table
When employee leaves the office his OUT time is recorded in the same way
Administration
Administrator imports log data in time attendance software, he may edit few records if required or remove invalid entries.
This data is then processed further to generate data for reports
More complex scenarios with lunch IN/OUT, tea breaks, overtime are also supported.
Reports can be generated and printed using the software
Data required for payroll can be exported and fed to payroll software
Hardware features
Fingerprint scanner provides USB interface for fast fingerprint scanning and processing
It is based on proven optical fingerprint scanning technology with 3D Live finger detection
Surface of the scanner is scratch-resistant and it is not possible to scratch it even with a blade or nail, this gives good quality fingerprint scanning throughout the life of the scanner. Other scanners even with protective layers develop scratches over time and the quality of scanning degrade.
Fingerprint processing and matching happens inside the computer with enormous computing and storing capability. This allow fast 1:N matching, multiple fingers per users and many other features not available in most standalone systems. This also allow you to save cost by using your existing office computer.
Fingerprint scanner has been practically tested with wet fingers, greasy fingers, smeared fingers, oily fingers and gives consistent performance for most practical situations.
Fingerprint scanner has finger guide which makes it easy for employees to give finger scan
Software features
TimeTRONIX software is easy to install and use on windows platform.
You can install it on a single computer or on your LAN server to access it from anywhere in the organization. It is also possible to install it on the web server.
TimeTRONIX software is developed to offer standard Time attendance features and reports.
The software has been developed in Active Server pages with large part of the source code kept open to allow experienced administrators and developers to add custom features easily, if required.
RaviRaj Technologies has a dedicated team to develop and support TimeTRONIX. We intend to develop it into a comprehensive Time Attendance software with support for wide industries, hence we consider integrating custom features free of cost for our clients, if required.
Benefits
TimeTRONIX desktop eliminates proxy punching, very easy with card based time attendance systems. Card based systems only ensure that the card was punched or swiped and does not ensure physical presence of the person which is a major loophole. Fingerprint system ensure physical presence of the employee.
TimeTRONIX desktop is developed with needs of small and medium size companies in mind and they will find it more cost-effective compared to card based systems.
TimeTRONIX help you reduce administrative costs associated with issuing and managing cards, timesheets or attendance registers.
TimeTRONIX is a robust, reliable and service free system. i.e. its robust design does not require regular servicing and you can depend on it for many years without any hardware problems. its low cost lower your risk of owning costly time attendance equipment.
:: Technical Specifications
Features Details
Resolution 500dpi
Sensing area 13.6x16.2mm
Dimensions 21(w)x31(l)x59(h) in mm
Encrypted data size 400bytes
Verification time < 1 sec
Weight 28g
Ambient temperature -40 to 60oC
Scanner type Optical
PC interface USB
:: Introduction Time-TRONIX Software The Time Attendance Software tracks employees' time and provides a daily reconciliation of time records as reports or for further processing by payroll software. As a result, the
software cuts down on administrative time, safeguards from error, and saves a substantial amount of money that could have been lost due to mishandled time cards and employees punching in for each other. It is a complete and a cost effective solution for T&A and security.
Prepare employee muster
Monitor employee attendance
Track vacation & sick time
Schedule employees
Provide flexible shifts
Automate time rounding policies
Quickly retrieve historical data
Print any of numerous reports
Link with payroll software
And much, much more
:: Software Modules
Company: to enter company or facility details and address
Departments: to create and manage various departments for department wise attendance monitoring
Employee: Employee registration and management
Shift management: to enter complex shift information, including overnight shift information and overtime schedules
Calendar: company holidays and calendar
Leave management: To allocate and track employee leaves, multiple leave types is supported
Administration: Admin functions, importing logs, logs editing and processing
Reports: Number of useful reports are available in HTML and text formats
:: Payroll interface
The Time-TRONIX TA software can be easily interfaced with your existing Payroll software. All payroll software accept standard time attendance data produced by Time-TRONIX TA software. This data is provided in MS-access or text format. Most payroll software will accept text data.
:: Reports
A variety of reports can be produced to give you the information you need in a format you can use. Following standard reports are available:
Attendance Report Time Attendance Report
Lateness Report
Overtime Report
Overnight Report
Leave Report
Absence Report
Exception Report
Shift Roster Report
Clocking Report
Staff Not Working Report
Staff Not Clocking Report
:: Software (Time Attendance only) features Time-TRONIX TA software is easy to install and
use on windows platform.
You can install it on a single computer or on your LAN server to access it from anywhere in the organization. It is also possible to install it on the web server.
Time-TRONIX TA software is developed to offer standard Time attendance features and reports.
The software has been developed in Active Server pages with large part of the source code kept open to allow experienced administrators and developers to add custom features easily, if required.
has a dedicated team to develop and support Time-TRONIX TA. We intend to develop it into a comprehensive Time Attendance software with support for wide industries, hence we consider integrating custom features free of cost for our clients, if required.
:: More.... The fingerprint data is encrypted and secure Comes with assured warranty, support and service Manufactured in India
:: Packaging list for Time-TRONIX Desktop
USB Fingerprint Scanner
Time-TRONIX TA software CD User Manual
:: Applications
Time & Attendance: Offices, Factories, Government etc.
RF Modems & Modules
:: RF Modem/Modules ::
:: Introduction
RF Transceiver modules are OEM products which can be integrated with embedded products. RF transceivers allow embedded products to communicate in short distances specified by the RF frequency and environment with other RF capable devices.
e.g. a Central control panel can communicate with a remote alarm in the same premises through RF transceivers to give alarm signal. This ensure that wiring related problems do not exist in case of emergency.
Wireless platform security cross platform wireless platform network security automation wireless GSM GPRS embedded platform RF Transceiver technology Wireless LAN wireless infrastructure platform selection links standards wireless network wireless networking communication application protocol Biometrics Time attendance access control biometric security Fingerprint access control Proximity RFID smart cards Software Hardware free low cost cheapest products Solutions project services development matching recognition.
Wireless Products
We provide wireless products systems linksys Cisco wifi systems antennas wireless world, at t wireless india, cingular wireless, wireless, wireless phone, wireless plan, wireless network, wireless service, sprint wireless, wireless internet, prepaid wireless, wireless speaker, wireless router, liberty wireless, wireless networking, arch wireless, verizon wireless amphitheater, wireless phone service, wireless weather station, verison wireless, wireless phone plan, nextel wireless, wireless camera, qwest wireless, centennial wireless, broadband wireless, cable wireless, verizon wireless phone, wireless microphone, midwest wireless, wireless headphones, wireless lan, rogers wireless, wireless communication, ringtone for verizon wireless, wireless deal, wireless keyboard, wireless access point, wireless security.
RF transceivers allow embedded products to communicate in short distances specified by the RF frequency and environment with other RF capable devices.
An instantaneous tracking and logging system for autos, trucks, police department, delivery services. This new device combines GPS with GSM cellular technology using a PC/laptop without going through the Internet.
WDT is a sleek, aesthetically crafted Terminal with entrenched features like Built in Printer, Built in Modem ( PSTN/ GSM ), Built in Smart card reader.
GSM is worlds most famous Mobile platform. Mobile phones with SIM cards use GSM technology to help you communicate with your family, friends and business associates.
We also provide wireless headset, wireless mouse, at and t wireless, wireless appliance, t mobile wireless, verizon wireless arena, wireless phone services, cincinnati bell wireless, alltel wireless, verizon wireless music center, prepaid wireless phone, wireless technology, at t wireless phone, virgin wireless, wireless modem, bus card pcmcia wireless, wireless usb adapter, rogers t wireless, wireless at t, singular wireless, cricket wireless, wireless security camera, att t wireless, wireless application, wireless internet service, wireless phone company, sierra wireless, wireless web cam, verizon wireless cell phone, wireless company, wireless accessory, wireless printer, home wireless network, verizon wireless theater, wireless internet access, a t t wireless, wireless web, wireless email, wireless isp, free ringtone verizon wireless, wireless network card, wireless video, a1 wireless, wireless internet provider, wireless intercom, cingular wireless phone, ring tone for verizon wireless, free wireless phone, att wireless phone, wireless card, wireless security system, wireless antenna, verizon wireless plan, wireless access, wireless dog fence, wireless provider, wireless laptop, linksys wireless router, wireless print server, wireless usb.