© Copyright 2008 FingerTec Worldwide. All Rights Reserved. Model: M2/R2

Slides:



Advertisements
Similar presentations
Access Control with Advanced Facial Recognition Technology The Face ID 3 gives users a contactless and hassle-free verification option. SALES TRAINING|
Advertisements

CUT COSTS & INCREASE EFFICIENCY
Computer time and attendance system for small business with up to 50 employees. 3 terminal types to chose from. Install your self, or have our technicians.
Staff Attendance Made Easy with FingerTec Fingerprint Solution
The Industry’s First Multi-Modal, Multi-Factor Biometric Patient Identification System. 1 ©2010 M2SYS Technology. All rights reserved. RightPatient™ Biometrics.
Model: TA
Time to Switch to Biometrics
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
1 Cypak core technology New convenient security solutions for online gaming Combat fraud and keep your customer happy.
Click to edit Master subtitle style Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.
BIOMETRICS: Libraries have begun to see the value of biometrics. M.G. SELVI Technical Officer Center of Advanced Study in Crystallography and Biophysics,
Copyright © 2006 Exportech Portugal. All rights reserved.
Security, Guaranteed By Biometrics The new generation of access control and time & attendance products WRS Technology Services Authorized Reseller San.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
Increased Security, while protecting Privacy ? True or False ? Christer Bergman, President and CEO, Precise Biometrics.
What is Biometrics?  Biometrics is referred as an authentication system that measures the physiological and individual characteristics of a human being.
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
LP 400. General Issues faced by Business Organizations:  Attendance Proxy through “buddy punching”  Errors when computing time  Cost of paper time.
Biometrics: Identity Verification in a Networked World
Usable Biometrics Ashley Brooks Usability and Privacy Cranor, Reiter, and Hong April 11, 2006.
Marjie Rodrigues
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Restricted © Siemens AG 2013 All rights reserved.siemens.com/answers Multifactor Iris Recognition Biometric Reader.
Karthiknathan Srinivasan Sanchit Aggarwal
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
BornholmsTrafikken April 2004 Peter Havskov Christensen, M.Sc.
Authentication Approaches over Internet Jia Li
1 Card Scanning Solutions SigniShell CSSN – Card Scanning Solutions THE ULTIMATE SIGNATURE CAPTURE & AUTHENTICATION SOLUTION.
Access Control with Advanced Facial Recognition Technology
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
The solution is at your fingertips!. BARTEX 2000 Corp. BARTEX brings You integrated security solutions using the most advanced technology available in.
» Jun 9, 2003 Speaker Verification Secure AND Efficient, Deployments in Finance and Banking Jonathan Moav Director of Marketing
A New Kind of Timesheet Brings Biometrics to Main Street Neal Katz Vice President Count Me In, LLC Mt. Prospect, IL
BioLynx™... Ensuring Employees are paid for actual time worked and Facilities’ access is audited and controlled.
WELCOME TO: ABOUT US ORANGE TECHNOLAB PRIVATE LIMITED, formerly known as Orange Web Technologies, an ISO 9001:2008 Certified.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
G53SEC 1 Authentication and Identification Who? What? Where?
Biometrics Authentication Technology
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
G53SEC 1 Authentication and Identification Who? What? Where?
 Biometrics refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Copyright © 2008 FingerTec Worldwide Limited. All rights reserved
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Access Control / Authenticity Michael Sheppard 11/10/10.
Securing Online Banking By Ben White CS 591. Who Federal Financial Institutions Examination Council What To authenticate the identity of retail and commercial.
BIOMETRICS.
Biometrics and Security Colin Soutar, CTO Bioscrypt Inc. 10th CACR Information Security Workshop May 8th, 2002.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
Why Physical Biometrics is rapidly Replacing Traditional Methods of Identification at the Workplace.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
enterprise Software Solutions Lab Pvt Ltd
BIOMETRICS Libraries have begun to see the value of biometrics M. G
Biometrics.
© Copyright 2008 FingerTec Worldwide. All Rights Reserved.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Time Clock Express Improve Workforce Productivity Clermont, Fl, USA
Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.
CUT COSTS & INCREASE EFFICIENCY
Biometrics.
Staff Attendance Made Easy with FingerTec Fingerprint Solution
Faculty of Science IT Department Lecturer: Raz Dara MA.
X7– Fingerprint Access Control terminal
Smart Business for eGeneration Companies
Presentation transcript:

© Copyright 2008 FingerTec Worldwide. All Rights Reserved. Model: M2/R2

© Copyright 2008 FingerTec Worldwide. All Rights Reserved.2 CONTENTS BIOMETRICS What is Biometrics? Why Biometrics? WHY FINGERPRINT? Why Fingerprint? Benefits of Fingerprint Comparison Delivering Peace of Mind FINGERTEC M2/R2 Awards Features System Integration TCMS V2 Time Attendance Management System Benefits of TCMS V2 Features of TCMS V2 Sample Report Minimum PC Requirements Product FAQs

© Copyright 2008 FingerTec Worldwide. All Rights Reserved. BIOMETRICS

© Copyright 2008 FingerTec Worldwide. All Rights Reserved.4 What Is Biometrics ? Is the science and technology of authentication by measuring the person's physiological or behavioral features Fingerprints is one of the most common used physiological characteristics No two humans have ever been found to have identical fingerprints, thus fingerprints are widely believed to be unique

© Copyright 2008 FingerTec Worldwide. All Rights Reserved.5 Why Biometrics? Security solutions are based on something you know- PIN, password have- Key, smart card are- Self, biometrics The best combination of security and convenience involves biometrics

© Copyright 2008 FingerTec Worldwide. All Rights Reserved. WHY FINGERPRINT?

© Copyright 2008 FingerTec Worldwide. All Rights Reserved.7 Why Fingerprint? Reliable Unique Cost Saving Identification Convenience Acceptance Why Fingerprint

© Copyright 2008 FingerTec Worldwide. All Rights Reserved.8 Benefits of Fingerprint Improve Discipline / Punctuality Higher Security Level Increase Productivity Eliminates Buddy Clocking Irrefutable Audit Trails Reports / No Argument Eliminates Cards / No recurrence cost Benefits

© Copyright 2008 FingerTec Worldwide. All Rights Reserved.9 Key Pad Access (Pass Key) Card AccessFingerprint (M2/R2) Fraud Punching YES NO Unauthorized Access YES NO Stolen / LostYES NO Hidden CostYES NO Short Life Span YES NO Comparison

© Copyright 2008 FingerTec Worldwide. All Rights Reserved.10 Key Pad Access (Pass Key) Card AccessFingerprint (M2/R2) Link To Computer YES Time SavedYES / NO YES Ease Calculation YES / NO YES Low Maintenance YES / NO YES Comparison …continue

© Copyright 2008 FingerTec Worldwide. All Rights Reserved.11 Delivering Peace of Mind Touch-and-go concept [Easy and Convenient] High security and Reliable Affordable without hidden costs High return on investment High value and low maintenance expenses Easy to integrate with RFID cards (R2 model) Robust casing material to prevent vandalism

© Copyright 2008 FingerTec Worldwide. All Rights Reserved. Model: M2/R2 FINGERTEC ® M2/R2

© Copyright 2008 FingerTec Worldwide. All Rights Reserved.13 SECUTECH Innovation (Taiwan) Award 2002 “Best Security Equipment” EXPO S&T 2003 Silver Medal (Invention/Innovation) MSC APICTA Awards 2002 “Best Security System Solution” Awards

© Copyright 2008 FingerTec Worldwide. All Rights Reserved.14 Features Can cater for up to 3000 fingerprint templates Equipped with voice greeting in muti languages Storage capacity of 120,000 transactions Fast fingerprint identification time [<= 2 secs] False acceptance rate of less than % Easy to install and setup, emphasize on DIY concept Door access features Antipassback enabled

© Copyright 2008 FingerTec Worldwide. All Rights Reserved.15 Technical Specification of M2/R2 M2R2 Casing materialZinc AlloyAcrylonitrile Butadiene Styrene (ABS) Dimension (L x H x W) mm93 x 188 x 48 Verification methodsFingerprint (1:1, 1:N) & PasswordFingerprint (1:1, 1:N), Password & RFID Card Identification time, sec<2 Recommended templates per user ID 2 fingerprint templates Fingerprint placementAny angle FAR (%)0.0001% FRR (%)0.01% Transaction storage120,000 Fingerprint templates capacity3,000 Communication methodsTCP/IP, RS232, RS485, USB flash disk Baud rates (bps) Wiegand input and outputWiegand 26-bit input and output Operating temperature (ºC) Operating humidity (%)20~80

© Copyright 2008 FingerTec Worldwide. All Rights Reserved.16 Technical Specification of M2/R2 M2R2 Operating voltage (V)Idle:DC 12V 0.5A ; Max:DC 12V 4A EM lock driving output (V)DC 12V 3A Alarm outputNO/NC *Card typeEM RFID card, Code: 64 bits, Resonance Frequency: 125kHz *Card operating temperature (ºC)-10~50 *Card reading distance (mm)~50 *Card Storage Capacity65534 Multimedia featureIndividual short message display after users’ verification Greeting voiceEnglish (Standard), (Upon Request - Indonesian, Chinese, French, Russian, Italy, Thai, Spanish, Farsi & Arabic) Display language (Reader)English (Standard), (Upon Request - Indonesian, Chinese, Spanish, Thai, Farsi, Arabic & Portuguese) Software LanguageEnglish, Chinese, Indonesian, Thai, Vietnamese, German, Farsi, Arabic, Spanish, Russian, Malay & Portuguese * FingerTec® R2 model only

© Copyright 2008 FingerTec Worldwide. All Rights Reserved.17 Suitable for the following industries: Retail outlets Offices Restaurants Schools Hotels Factories Security guard tour places And others ….

© Copyright 2008 FingerTec Worldwide. All Rights Reserved.18 System Integration

© Copyright 2008 FingerTec Worldwide. All Rights Reserved.19 System Communication

© Copyright 2008 FingerTec Worldwide. All Rights Reserved.

21 Benefits of TCMS V2 Generate report Manage multiple Fingertec® Readers Export transactions Download Transactions Irrefutable Audit Trails Reports / No Argument Support up to 6 columns of working times TCMS V2 Backup user fingerprints Support various Working hours, rotational shift, overnight shift, multiple shift etc Control users’ accessibilities via different doors.

© Copyright 2008 FingerTec Worldwide. All Rights Reserved.22 Features of TCMS V2 Time Attendance and Management System Supports overnight shift Supports flexi time User friendly interface

© Copyright 2008 FingerTec Worldwide. All Rights Reserved.23 Features of TCMS V2 Produces the following report: Time & Attendance Overtime report Lateness report Early out report Rest day & Off day report Leave report Absenteeism report Failed to clock in/out report Transaction report …continue

© Copyright 2008 FingerTec Worldwide. All Rights Reserved. CORRECTION REPORT The Correction Report is a report to indicate outstanding clocking activities for admin personnel to take corrective measures.

© Copyright 2008 FingerTec Worldwide. All Rights Reserved. TARDINESS REPORT The Tardiness Report is a report showing daily activities of a staff detailing lateness and overtime taken.

© Copyright 2008 FingerTec Worldwide. All Rights Reserved. OVERTIME APPROVAL WORKSHEET The Overtime Approval Worksheet reveals the worksheet of a user and approval given for that particular person for working overtime.

© Copyright 2008 FingerTec Worldwide. All Rights Reserved. ATTENDANCE SUMMARY The Attendance Summary is a summarized report of staff attendance.

© Copyright 2008 FingerTec Worldwide. All Rights Reserved. DAY BY DAY ANALYSIS The Day by Day Analysis is a report of attendance summarized daily.

© Copyright 2008 FingerTec Worldwide. All Rights Reserved. MONTH BY MONTH ANALYSIS The Month by Month Analysis is a report of attendance summarized by month.

© Copyright 2008 FingerTec Worldwide. All Rights Reserved. ON LEAVE REPORT The On Leave Report is a report listing of leaves that have been taken by staff.

© Copyright 2008 FingerTec Worldwide. All Rights Reserved. ELECTRONIC TIME CARD The Electronic Time Card is a report of detailed activities of a staff in a month.

© Copyright 2008 FingerTec Worldwide. All Rights Reserved. DAILY ATTENDANCE LISTING The Daily Attendance Listing is a listing of staff attendance based on the date required.

© Copyright 2008 FingerTec Worldwide. All Rights Reserved. DUTY CALENDAR The Duty Calendar is a calendar of workday holiday, restday and offday based on a specified group.

© Copyright 2008 FingerTec Worldwide. All Rights Reserved. ATTENDANCE SHEET The Attendance Sheet is a comprehensive report detailing activities of all staff in a month.

© Copyright 2008 FingerTec Worldwide. All Rights Reserved. GROSS WAGES REPORT The Gross Wages Report is the gross calculation of worked hours of all staff based on their pay rate.

© Copyright 2008 FingerTec Worldwide. All Rights Reserved. STAFF MOVEMENT ANALYSIS The Staff Movement Analysis is a transaction record of individual staff by user ID.

© Copyright 2008 FingerTec Worldwide. All Rights Reserved. TERMINAL ACTIVITY REPORT The Terminal Activity Report is a transaction record of staff by reader.

© Copyright 2008 FingerTec Worldwide. All Rights Reserved. TERMINAL TRANSACTION LISTING The Terminal Transaction Listing is a record of all transaction data downloaded from every reader.

© Copyright 2008 FingerTec Worldwide. All Rights Reserved.39 Minimum PC Requirements Microsoft Windows 98 Second Edition, Windows Millennium, Windows 2000 and Windows XP At least 256 MB RAM Pentium III 450 MHZ Disk free space at least 250 MB

© Copyright 2008 FingerTec Worldwide. All Rights Reserved. Product FAQs

© Copyright 2008 FingerTec Worldwide. All Rights Reserved.41 Product FAQs 1.Do FingerTec® readers meet international standards? FingerTec® readers comply with FCC (Federal Communications & Commission), CE (Conformité Européene akan European Conformity) and UKAS (United Kingdom Accreditation Service) seals of approval. 2.How many fingerprints can I enroll in one reader? Each reader can store enrollment of up to 3,000 fingerprint templates Assuming each user enrolls one fingerprint, a reader can store up to 3,000 users. If each user enrolls two fingerprints, a reader can contain 1,500 users. 3.If my company has more than one reader, do I have to perform enrollment in all of the readers in order to use them? No. You only need to enroll once in a reader and the saved fingerprint template can be uploaded to other readers through PC.

© Copyright 2008 FingerTec Worldwide. All Rights Reserved.42 Product FAQs 4.If I hurt the enrolled finger, would I still be able to scan it? Assuming that the injury is severe: a.You can use your backup finger to scan, if you have 2 fingers enrolled. b.You can use your password to clock in, if password is enrolled. If the injury is minor, you can use 1:1 method to clock in. 5.If I have trouble scanning my finger, what should I do? a.Dry your finger if it is wet. Wet finger could disrupt readings. b.Moisturize your finger if it is too dry, particularly for those who are working in air conditioned environment. c.Use 1:1 scanning method rather than 1:N method. 6.In a case where I cannot enroll any of the 10 fingers, what should I do? In this extreme case, you can still enroll using password instead of a fingerprint. …continue

© Copyright 2008 FingerTec Worldwide. All Rights Reserved.43 Product FAQs 7.In case of a power failure, can a reader still function? a.Yes, if the reader is wired to AdapTec, power supply with backup battery. The standard standby time for a power supply pack is 3-5 hours, depending on the usage. b.No, if the reader is not wired up to a backup power supply pack. 8.What happen to the stored transactions, fingerprint templates and data on the reader when a power failure occurs? All stored information will remain safe in the reader and can be used as usual as soon as the power resumes. 9.What if the transaction storage reaches its maximum capacity? a.The reader will still store the most recent transactions and will discard the earliest transactions on record, once it reaches its 120,000 transactions buffer. …continue

© Copyright 2008 FingerTec Worldwide. All Rights Reserved.44 Product FAQs b.A user can be alerted by a warning sound being set inside a reader. c.A user can download the transactions from the reader using software and the software will automatically clear the transaction buffer. 10.What are the basic reports that the software generate? The TCMS V2 is able to generate a 6-columns report which includes Clock-In, Clock-Out, Lunch-In and Lunch Out reports, OT IN & OT OUT. …continue

© Copyright 2008 FingerTec Worldwide. All Rights Reserved. TRACK RECORDS GMI

© Copyright 2008 FingerTec Worldwide. All Rights Reserved.46 List of customers: Australia Accounting & IT Solutions China National Engg Workshop House Germany IMA Ingenieurburo Anton Abele & Partner GMBH Hong Kong Conway Management Ltd. Duty Free Shoppers Hong Kong Ltd. Pet Lover Ltd. India T-Square Tools Pvt. Ltd. Indonesia PT. Jaya Mandiri Sukses Jordan Arabian Steel Pipes Manufacturing Co. L.T.D Bitar Consultats Comprehensive Land Dev. and Investment DHL Foursan Group Informobility Italian Hospital Jordan Book Centre Jordan Venus Factories Co. Jorsal - Crystal Khoury Drug Store Knowledge Horizon Medica National Poultry - Feed Mill Pacific International Lines Philadelphia book gallery Rosary School Shami Global Investments United Telecom Services

© Copyright 2008 FingerTec Worldwide. All Rights Reserved.47 List of customers: Malaysia Angliss Foods Sdn Bhd Arab Malaysian Merchant Bank Ayam Plus Sdn Bhd B.E.S.T Reinsurance BP Laboratory, Ipoh Bukit Rimau Resort Bumiputra Commerce Bank Berhad Cawangan Alam Sekitar, JKR (HQ) CITC Compound Sdn Bhd Danga Bay Sdn Bhd - EKOVEST Holdings Bhd D.G. Kom Sdn Bhd Express Asia.Com Sdn Bhd Genting Highlands Resort Berhad German -Malaysian Institute Hospital Besar Tunkku Jaafar (NS) I-Power Technologies Sdn Bhd Ibu Pejabat Polis Bukit Aman Institut Kefahaman Islam Malaysia (IKIM) Malaysia of Nuclear Technology (MINT) Institut Latihan Kehakiman dan Perundangan (ILKAP) Jabatan Akauntan Negara Malaysia Jabatan Daerah Sri Aman Jabatan Kesihatan Negeri Perak Jabatan Kesihatan Negeri Sembilan Jabatan Pendaftaran Negara K & N Kenanga Berhad Kolej Universiti Teknologi Malaysia (KUSTEM) Lian Bee Bakery Sdn Bhd Markas System Armada (TLDM), Pulau Lumut Mayban Investment Management Met Tube (M) Berhad MTBE - Petronas MTD Construction Sdn Bhd (MTD Capital Berhad) Multiple Technology Sdn Bhd …continue

© Copyright 2008 FingerTec Worldwide. All Rights Reserved.48 List of customers: Malaysia (cont.) Northen Network Sdn Bhd Object Software Connection Sdn Bhd Osram (ISS) (M) Sdn Bhd Poh Kong Jewellery (M) Sdn Bhd Port Dickson Golf Club PUC Founder (MSC) Berhad Pusat Latihan Teknologi (ADTEC) SK Bandar Termerloh Solectron Technology Sdn Bhd Sound & Vision Multimedia SQB Sdn Bhd Sunway Engineering Sdn Bhd Sunway Resort Hotel Tuck Sun Logistics Warehouse and Distribution UiTM – IT Department Universiti Islam Malaysia University Technology Mara (UiTM) University Malaya – Engineering Utusan Melayu Wang Saga Technology Sdn Bhd West Port Berhad Yew Lee Graphic Sdn Bhd YSP Industries Sdn Bhd Papua New Guinea Alotau Stevedoring & Transport Ltd. Pakistan Heating Solutions Mechanical Engineering Workshop House CB Richard Ellis Phils., Inc. Diversity Electrical Electronics & Computer Trade Vitalo Packaging International Inc …continue

© Copyright 2008 FingerTec Worldwide. All Rights Reserved.49 List of customers: Singapore DFS Venture Singapore (Pte) Limited DI Food Services Pte Ltd Holcam Construction Pte Ltd Institute of Chinese Medical Studies Kenstronics (S) Pte Ltd Progress Galvanizing Pte Ltd Sagawa Express Asia Pte Ltd Streets Distributions Pte Ltd Supreme Imaging Pte Ltd Union Inks & Graphics Pte Ltd Walter Agency Pte Ltd Websynergies (S) Pte Ltd Yan Palace Restaurant Holdings Pte Ltd U.A.E. Thakkar Trading Co. L.L.C United States Premiere Career College Venezuela MTSA …continue

© Copyright 2008 FingerTec Worldwide. All Rights Reserved. Thank You