bio metrics fingerprint technology.1

61
Biometrics Fingerprint Technology Biometrics Fingerprint Technoloy India Time Attendance IndiaBiometric Biometric security services Biometric solutions Biometric technology Biometric fingerprint Biometric companies Biometric fingerprint Biometric research Biometric books biometric tutorials biometric india biometric access biometric contact pune bioaccess biometric products fingerprint india time attendance fingerprint access control time cards biometric identification biometric research biometric solutions biometric services biometrics Biometrics India USA America Europe Japan UK Germany france uae singapore Time a Why Fingerprints? | History of Fingerprint Technology | Fingerprint Identification Process | Fingerprint Application :: Why Fingerprints? With increasingly urgent need for reliable security, biometrics is being spotlighted as the authentication method for the next generation. Among numerous biometric technologies, fingerprint authentication has been in use for the longest time and bears more advantages than other biometric technologies do. Fingerprint authentication is possibly the most sophisticated method of all biometric technologies and has been thoroughly verified through various applications. Fingerprint authentication has particularly proved its high efficiency and further enhanced the technology in criminal investigation for more than a century. Even features such as a person’s gait, face, or signature may

Upload: ajay-antony

Post on 10-Sep-2014

120 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Bio Metrics Fingerprint Technology.1

Biometrics Fingerprint Technology

 

Biometrics Fingerprint Technoloy India Time Attendance IndiaBiometric Biometric security services Biometric solutions Biometric technology Biometric fingerprint Biometric companies Biometric fingerprint Biometric research Biometric books biometric tutorials biometric india biometric access biometric contact pune bioaccess biometric products fingerprint india time attendance fingerprint access control time cards biometric identification biometric research biometric solutions biometric services biometrics Biometrics India USA America Europe Japan UK Germany france uae singapore Time a 

 

Why Fingerprints?  |   History of Fingerprint Technology  |   Fingerprint Identification Process  |   Fingerprint Application

 :: Why Fingerprints?

With increasingly urgent need for reliable security, biometrics is being spotlighted as the authentication method for the next generation. Among numerous biometric technologies, fingerprint authentication has been in use for the longest time and bears more advantages than other biometric technologies do.

Fingerprint authentication is possibly the most sophisticated method of all biometric technologies and has been thoroughly verified through various applications. Fingerprint authentication has particularly proved its high efficiency and further enhanced the technology in criminal investigation for more than a century.

Even features such as a person’s gait, face, or signature may change with passage of time and may be fabricated or imitated. However, a fingerprint is completely unique to an individual and stayed unchanged for lifetime. This exclusivity demonstrates that fingerprint authentication is far more accurate and efficient than any other methods of authentication.

Also, a fingerprint may be taken and digitalized by relatively compact and cheap devices and takes only a small capacity to store a large database of information. With these strengths, fingerprint authentication has long been a major part of the security market and continues to be more competitive than others in today’s world.

:: History of Fingerprint Technology

Page 2: Bio Metrics Fingerprint Technology.1

The beginning of fingerprints goes back to as early as the ancient times. According to historical findings, fingerprints were used on clay tablets for business transactions in ancient Babylon. In China, thumb prints were found on clay seals. But it was in the 19th century that the results of scientific studies were published and fingerprint technology began to be considered more seriously.

Using the1800’s scientific studies as a foundation, fingerprint technology was already in use by the beginning of the 20th century. In 1924, FBI(Federal Bureau of Investigation) is already known to have maintained more than 250 million civil files of fingerprints for the purpose of criminal investigation and the identification of unknown casualties. In the late 1960's, fingerprint technology met a great turning point when it gave birth to 'live-scan,' a method to obtain a fingertip image without the use of print ink. When the FBI announced that it planned to stop using paper fingerprint cards inside their new Integrated AFIS (IAFIS) site, it was actually announcing the remarkable breakthrough of today's live-scan technology.

But fingerprint identification technology did not stop as a forensic method only. It was officially used for business purposes in 1968 at one security corporation in Wall Street. Fingerprints are now being used as a secure and effective authentication method in numerous fields, including financial, medical, e-commerce and entrance control applications. Modern applications of fingerprint technology rely in large part on the development of exceptionally compact fingerprint sensors.

  top

::  Fingerprint Identification Process

Fingerprint identification process consists of two essential procedures: enrollment and authentication. Taking the following steps completes each procedure:

As shown in the diagram above, fingerprint identification system compares the input fingerprint image and previously registered data to determine the genuineness of a fingerprint. All the steps described above affect the efficiency of the entire system, but the computational load of the

Page 3: Bio Metrics Fingerprint Technology.1

following steps can be reduced to a great extent by acquiring a good-quality fingerprint image in the first step.

Step 1. Image Acquisition

Real-time image acquisition method is roughly classified into optical and non-optical. Optical method relies on the total reflection phenomenon on the surface of glass or reinforced plastic where the fingertip is in contact. The sensor normally consists of an optical lens and a CCD module or CMOS image sensor. In contrast, semiconductor sensors, as a typical example of non-optical sensors, exploit electrical characteristics of a fingertip such as capacitance. Ultrasonic wave, heat, and pressure are also utilized to obtain images with the non-optical fingerprint sensors. Non-optical sensors are said to be relatively more suitable for massive production and size reduction such as in the integration with mobile devices. Detailed comparison is found in Table 1. 

Optical Non-optical

Measuring Method

lightpressure, heat, capacitance, ultrasonic wave

Strength

highly-stable performancephysical/electrical durabilityhigh-quality image

low cost with mass production compact size integrated with low-power application

Weakness

relatively high costlimit to size-reductionrelatively easy to fool with a finger trace or fake finger

physical/electrical weaknessperformance sensitive to the outer environment(temperature, dryness of a finger)

Application

entrance, time, and attendance controlbanking servicePC security

PC securitye-commerce authenticationmobile devices & smart cards

Step 2. Feature Extraction

There are two main ways to compare an input fingerprint image and registered fingerprint data. One is to compare an image with another image directly. The other is to compare the so-called 'features' extracted from each fingerprint image. The latter is called feature-based/minutia-based matching. Every finger has a

Page 4: Bio Metrics Fingerprint Technology.1

unique pattern formed by a flow of embossed lines called “ridges” and hollow regions between them called “valleys.” As seen in the Picture 2 below, ridges are represented as dark lines, while valleys are bright.

Step 3. Matching

The matching step is classified into 1:1 and 1:N matching according to its purpose and/or the number of reference templates. 1:1 matching is also called personal identification or verification. It is a procedure in which a user claims his/her identity by means of an ID and proves it with a fingerprint. The comparison occurs only once between the input fingerprint image and the selected one from the database following the claim by the user.

On the contrary, 1:N matching denotes a procedure where the system determines the user's identity by comparing the input fingerprint with the information in the database without asking for the user's claim. A good example of this is AFIS(Automated Fingerprint Identification System) frequently used in criminal investigation.

The output result of the matching step is whether or not the input fingerprint is identical to the one being compared in the database. Then how could the accuracy of the matching procedure be represented in number? The simplest measures are FRR(False Reject Rate) and FAR(False Accept Rate). The former is the rate of genuine user's rejection and the latter is the rate of impostor's acceptance.

 

::  Fingerprint Application

Markets for fingerprint technology include entrance control and door-lock applications,

Page 5: Bio Metrics Fingerprint Technology.1

fingerprint identification mouses, fingerprint mobile phones, and many others. The fingerprint markets are classified as follows:

As the advanced technology enables even more compact fingerprint sensor size, the range of application is extended to the mobile market. Considering the growing phase of the present mobile market, its potential is the greatest of all application markets.

References

[1] International Biometric Group,「Biometric Market Report 2000-2005」, 2001.

[2] Anil K. Jain, Lin Hong, Sharath Pankanti, Ruud Bolle,「An Identity Authentication System Using Fingerprints」, 1997.

[3] http://onin.com/fp/fphistory.html

ttendance india access control india biometric india security india Fingerprint india Precise Biometrics Biometric Biometrics Security Biometrics Information Bio Biometrics india

Biometric Fingerprint scanner Time attendance Access control OEM modules security Time cards SDK USB finger print sensor Authentication Identification Verification Biometrics time

attendance Biometrics access control Fingerprint time attendance Fingerprint access control Proximity RFID smart cards Software Hardware free low cost cheapest products Solutions

project services development matching recognition

Page 6: Bio Metrics Fingerprint Technology.1

Biometrics Information

 

Why Biometrics?   |    Classification of biometrics   |    Issues

  :: Why Biometrics?

Biometrics authenticates and determines an individual’s identity by utilizing the uniqueness of his or her biological and behavioral characteristics. Other authentication methods often used are PIN method and Token (ID Card) method. Biometrics is superior to PIN or Token methods in the following ways: 

1) Increased SecurityBiometrics offers superior security than PIN or ID Card. Biometric methods do not involve danger of information exposure like PIN and ID Card do and unauthorized persons cannot attempt to steal or make a guess at private information.

2) Increased ConvenienceToday, people have to remember many passwords. They should be able to provide their passwords whenever they use their credit cards or log into various sites on the Internet. Uniform passwords can lead to serious dangers if exposed. However, biometrics does not require us to remember our passwords.

 :: Classification of Biometrics

Biometrics can be classified according to the type of biometric data used, e.g., face, iris, voice, signature, or hand geometry identification. However, all these methods take the same authentication process. The biometric authentication process is as described below:

Page 7: Bio Metrics Fingerprint Technology.1

Among all available biometric technologies, fingerprint identification is the most popular one. This is due to the fact that fingerprint identification is far more efficient than others, especially considering how economical it is.

 top

::  Issues

1) Standardization Active efforts are being made to standardize various core biometric technologies mainly available in the U.S. and Europe. Major standardization methods for biometric identifications are as follows:

a) BAPIThis standard was developed by I/O Software in 1998. Being O/S, computer platform, and sensor device independent, it was designed to support the development of applications. Some of the features include the unification of encryption method, standardized programming environment, and support for the client-server applications.

b) HA-APIThis method was first introduced in December 1997 at the 10th U.S. Biometric Consortium held by National Registry Inc. a company sponsored by the U.S. Ministry of National Defense. Thinking that biometrics would be useful in computer security, the U.S. Ministry of National Defense supported the development. However, they failed to secure companies to work on the project.

Page 8: Bio Metrics Fingerprint Technology.1

c) BioAPICompaq was the first company to form BioAPI Consortium, which consisted of 6 companies with a goal to standardize industrial biometric identification API in April 1998. In December of the same year, and in March the following year, BAPI and HA-API were included in new BioAPI. BioAPI Consortium was constituted by various groups, including 78 companies who are biometric identification developers and medical/financial/ governmental users. BioAPI has recently been adopted as ANSI/INCITS 358, American standard.

2) Multimodal Biometrics There has been heated researches made to have multimodal biometrics be a method that overcomes the limitations of unimodal biometric technologies. Multimodal biometrics is recommended as a way to improve user authentication through biometrics of greater reliability.

a) Multiple SensorsA single biometric feature can be extracted through different sensors. For instance, we can use optics-, ultrasound-, and semiconductor-based sensors.

b) Multiple BiometricsA number of biometric features can be captured simultaneously for authentication. For example, facial and fingerprint identification can be used at the same time. However, this method is not recommended due to its high cost.

c) Multiple Units of the Same BiometricVarious units can be used for one biometric feature. Multiple units can often be provided by natural human physical structure such as through the user’s two irises and ten fingerprints. A disadvantage to this method is that it can make a user uncomfortable when capturing his or her biometric feature samples. The process can also take a long time.

d) Multiple InstancesThis means that pieces of biometric information of one feature are taken at different instances by one sensor. One example of this method is to capture a fingerprint a number of times with a sensor or to sample a voice or a face multiple times for later use.

e) Multiple Representation and Matching Algorithms for the Same Biometric Input Signal Multimodal biometrics requires more time to work with the information and develop an appropriate system than a unimodal biometrics does since several modules are put in use.

Page 9: Bio Metrics Fingerprint Technology.1

For that reason, if a unimodal method can assure the users of high enough dependability in a given circumstance, it may not be necessary to employ a multimodal biometric method. If the greatest degree of reliability is required, however, it may become necessary to adopt a multimodal biometric method in order to ensure any possible advancement.

 top

Biometrics Information Fingerprint Information Time Attendance Information Biometric security services Information Biometric technology Biometric companies Information Biometric research Information Biometric books biometric tutorials biometric  biometric access biometric

contact pune services   Precise Time attendance Access control OEM modules Information Authentication Identification Verification Information Proximity Information RFID Information

smart cards Information Software Hardware free low cost cheapest products Solutions project services development matching recognition.  

  Hamster  

  USB Optical Fingerprint  Scanner Live Scan fingerprinting

:: Introduction Fingerprint Recognition Hamster is a fingerprint scanner for a computer Security featuring superior performance, accuracy, durability based on unique Fingerprint Biometric Technology. It can be plugged into a computer separately with your mouse. It is very safe and convenient device for security instead of password that is vulnerable to fraud and is hard to remember.

Use Hamster with your choice of compatible biometric software for authentication, identification and verification functions that let your fingerprints act like digital passwords that cannot be lost, forgotten or stolen.

Live scan fingerprint scanner ,Secugen scanner, fingerprint software development kit, fingerprint sdk, integration development software, Keyboard Fingerprint Scanner, Fingerprint Scanning, Fingerprint Scanner, Macintosh Dos Fingerprint Scanner Fingerprint Scanner Software, Fingerprint Scanners For Computers, fingerprint scanner, Secugen scanner, fingerprint software development kit, fingerprint sdk, integration development software, Keyboard Fingerprint Scanner, Fingerprint Scanning, Fingerprint Scanner,  

:: Features   Fast and Perfect Authentication through excellent Algorithm. Compact, lightweight and portable. High-performance, maintenance-free optical fingerprint scanner.

Page 10: Bio Metrics Fingerprint Technology.1

Resistance to scratches, impact, vibration and electrostatic shock. Latent print image removal (does not accept prints left behind). Encryption of fingerprint templates.

 :: Applications

Personal computer / workstation security. Network / enterprise security. e-commerce / e-business. Electronic transactions. Banking and financial systems. Medical information systems. Any password-based application.

 :: Technical Specifications

Fingerprint Sensor OPP 01

Dimensions25.3(W) x 40.7(L) x 67.7(H) mm

Scanner Resolution 500 dpi

Verification Time Less than 1 second

Operating Temperature 0° to 40°C

Operating Humidity < 90% relative, non-condensing

Supply voltage 5 V from USB port

Interface USB 1.1

Supported Operating Systems Windows 98/Me/NT4/2000/XP

Certifications EMI,FCC,CE,MIC

 

:: Software Included in the CD :: Software package (Security Program for Desktop PC   SecuEnterprise Standard.   Windows Logon.   Screen Saver.   Folder Encryption /Decryption.   Event viewer.:: Visual Basic OCX evaluation SDK.:: Drivers.FRT  

Biometrics Fingerprint Time Attendance system

Page 11: Bio Metrics Fingerprint Technology.1

:: Introduction Hardware

Fingerprint Recognition Terminal (Hamster) is a Biometrics Fingerprint recognition based Time Attendance system with TCP/IP networking capabilities.Hamster consists of a robust standalone Fingerprint terminal with LCD, Keypad, Fingerprint scanner, 800MHz processor, memory, communication and storage capabilities. Hamster does not depend on computer or external resources for its operations though it can work together with multiple Hamsters to provide centralized database and management capabilities.Hamster is equipped robust Optical Fingerprint scanner with high quality fingerprint scanning and long life. It is not a low cost semiconductor scanner which is mainly for personnel use and cannot handle heavy scanning like in Time Attendance systems.Hamster includes easy to use feature rich Time Attendance management software called Time-TRONIX TA. This is browser based software with easy to use graphical interfaces and context help. Time-TRONIX TA software can be installed on a single computer, LAN or Internet

Time attendance terminal Time attendance recorder solutions software time clock time and attendance time recording systems Fingerprint scanner India Fingerprint recognition Biometric identification Biometrics fingerprint Id solution  lathem timecard timekeeper payclock timecards timesheet timelog softtime etime timetracker kronos mjr 7000 timecentre synel worktime timemaster timelot payroll timewolf rapidprint clocks zeiterfassung unitime clock timetrack journyx timesoft tc100 480f q plus timesheets timeslips punchclock clocking fastime infotronics tr510 timeregistration urenregistratie clockcard amano .

 

:: Technology Foolproof security with

advanced fingerprint minutiae matching

Fast verification speed of less than one second

1:1and 1:N matching

Supports both Verification and Identification modes

:: Economic Low cost Easy to install and use

Battery backup available

:: Hardware features Hamster is a system with its

Page 12: Bio Metrics Fingerprint Technology.1

own processing and storage capabilities. At the same time it support fast 10/100 base-T Ethernet TCP/IP networking with ability to network with central server and use both on system or on server processing/databases. 

It is based on proven optical fingerprint scanning technology with 3D Live finger detection. 

Surface of the scanner is scratch-resistant and it is not possible to scratch it even with a blade or nail, this gives good quality fingerprint scanning throughout the life of the scanner. Other scanners even with protective layers develop scratches over time and the quality of scanning degrade. Scanner is also free of any electrostatic problems. 

Hamster is very powerful system with 800MHz processing power close to  computers. This allow Hamster to support fast 1:N matching where employees are not required to enter ID before matching fingers. Most other fingerprint system though claim to support 1:N matching (fingerprint only) but this is very slow hence they are always used in 1:1 matching (ID + fingerprint). Hamster can offer more then 100 fingerprint matches per second.

Page 13: Bio Metrics Fingerprint Technology.1

 

Fingerprint scanner has been practically tested with wet fingers, greasy fingers, smeared fingers, oily fingers and gives consistent performance for most practical situations. 

Fingerprint scanner has finger guide which makes it easy for employees to give finger scan. 

Hamster has a auto-scanning mode in which users  are not required even press ENTER key to to activate scanner. This along with other options can give you very fast transactions to avoid queuing up in morning and evening IN/OUT.

 :: Specifications

Specifications  Dimensions (in cms) 20(W)*30(H)*16(D) Color Silver

Case Metallic

Scanner resolution

500dpi

Scanner Optical, Scratch/Impact resistant

Matching 1:1, 1:N(recommended)

Verification speed

<1sec

FRR 0.01% FAR Under 0.001%

Page 14: Bio Metrics Fingerprint Technology.1

Enrollment 2000 users, two fingers per user

Transactions 200,000 transaction records

LCD Alphanumeric 16x4Sound Buzzer included Keypad 25 keys, non-tactile

Access control

12VDC Relay optional

Power220-240V AC or 115V AC

Interface with PC

Ethernet, cross cable

Network Interface

10/100 Base-T Ethernet TCP/IP

Temperature range

-10°C - 60°C

Humidity Under 90%RH

Software Time Attendance software included

:: Introduction Software The Time Attendance Software tracks employees' time and provides a daily reconciliation of time records as reports or for further processing by payroll software. As a result, the software cuts down on administrative time, safeguards from error, and saves a substantial amount of money that could have been lost due to mishandled time cards and employees punching in for each other. It is a complete and a cost effective solution for T&A and security.

  Prepare employee muster

Page 15: Bio Metrics Fingerprint Technology.1

Monitor employee attendance

Track vacation & sick time

Schedule employees

Provide flexible shifts

Automate time rounding policies

Quickly retrieve historical data

Print any of numerous reports

Link with payroll software

And much, much more

 :: Software Modules

Company: to enter company or facility details and address 

Departments: to create and manage various departments for department wise attendance monitoring 

Employee: Employee registration and management 

Shift management: to enter complex shift information, including overnight shift information and overtime schedules 

Calendar: company holidays and calendar 

Page 16: Bio Metrics Fingerprint Technology.1

Leave management: To allocate and track employee leaves, multiple leave types is supported 

Administration: Admin functions, importing logs, logs editing and processing 

Reports: Number of useful reports are available in HTML and text formats

 :: Payroll interface

 The Time-TRONIX TA software can be easily interfaced with your existing Payroll software. All payroll software accept standard time attendance data produced by Time-TRONIX TA software. This data is provided in MS-access or text format. Most payroll software will accept text data.

Reports

A variety of reports can be produced to give you the information you need in a format you can use. Following standard reports are available:

Attendance Report Time Attendance Report

Lateness Report

Overtime Report

Overnight Report

Leave Report

Page 17: Bio Metrics Fingerprint Technology.1

Absence Report

Exception Report

Shift Roster Report

Clocking Report

Staff Not Working Report

Staff Not Clocking Report

 

:: Software (Time Attendance only)  features

Time-TRONIX TA software is easy to install and use on windows platform. 

You can install it on a single computer or on your LAN server to access it from anywhere in the organization. It is also possible to install it on the web server. 

Time-TRONIX TA software is developed to offer standard Time attendance features and reports. 

The software has been developed in Active Server pages with large part of the source code kept open to allow experienced administrators and developers to add custom features easily, if required. 

has a dedicated team to develop and support Time-TRONIX

Page 18: Bio Metrics Fingerprint Technology.1

TA. We intend to develop it into a comprehensive Time Attendance software with support for wide industries, hence we consider integrating custom features free of cost for our clients, if required.

 

:: More....

The fingerprint data is encrypted and secure

Comes with assured warranty, support and service

Device is manufactured in India

:: How it worksInstallation

Hamster comes preconfigured and ready to use. Provide power supply to the system and start using.

It has no fingerprints registered in the database and show "Database Empty" message on pressing ENTER key and scanning finger.

First finger registered by pressing MENU key automatically becomes top administrator.

Once the admin is registered more users can only be registered after verifying admin fingers. Admin can also give admin rights to other users.

Page 19: Bio Metrics Fingerprint Technology.1

Plug your Ethernet LAN network cable into network port provided in Hamster.

You can change few settings and configure Hamster to work with your Ethernet LAN network. It is also possible to configure it to use central database residing on your server in case you have multiple Hamster machines. To do this you can connect standard keyboard and CRT monitor to Hamster and do configurations the way you do with a computer.

Before registering employees fingerprints, install Time-TRONIX TA Time Attendance (TA) software software on your office computer or server.

Enter company, department, shift, calendar and other details particular to your company.

Enter employee information to generate unique ID for each employee.

Register fingerprints of each employee with his unique ID on the Hamster using admin features with MENU key.

Use

Employee enters the office and press enter key and place his finger on the scanner.

Hamster scans his finger and matches the scanned fingerprint with the database of registered

Page 20: Bio Metrics Fingerprint Technology.1

fingers stored in its memory

Employee is identified and success sound is played along with SUCCESS [#ID] message on the LCD  and green LED blinks

Employee's IN time is recorded with date and time in the Hamster database itself

When employee leaves the office his OUT time is recorded in the same way

Administration

Hamster is connected to the company's  10/100 base-T Ethernet network and its data is accessible anywhere on the LAN. Hamster can be assigned its own IP address.

Administrator imports log data in time attendance software, he may edit few records if required or remove invalid entries.

This data is then processed further to generate data for reports

More complex scenarios with lunch IN/OUT, tea breaks, overtime are also supported.

Reports can be generated and printed using the software

Data required for payroll can be exported and fed to payroll software

 :: Benefits

Page 21: Bio Metrics Fingerprint Technology.1

Hamster eliminates proxy punching, very easy with card based time attendance systems. Card based systems only ensure that the card was punched or swiped and does not ensure physical presence of the person which is a major loophole. Fingerprint system ensure physical presence of the employee. 

Hamster is developed with needs of medium and large size companies in mind with large electronic infrastructure, complex architectures, dedicated administration free functioning and easy integration with existing resources. 

Hamster help you significantly reduce administrative costs associated with issuing and managing cards, timesheets or attendance registers. 

Time-TRONIX TA is a robust and reliable system. Since it is a complex high-end system it does require service and support.

Physical Access Control

We provide Biometrics access control, Door Access Control, access control in India, doorlocks, access control, Fingerprints acccess control, biometric door lock, security door control, access control, fingerprint door locks, fingerprint recognition, fingerprint access control, door locks security, access control locks, biometric access fingerprint, access control, doorlocks, biometric door lock, security door control, access control, fingerprint door locks, fingerprint recognition, fingerprint access control, door locks security, access control locks, fingerprint door locks, biometric access, Electric Bolt locks, time clocks.

 

Page 22: Bio Metrics Fingerprint Technology.1

 

Managing access to resources is assuming increasing importance for organizations everywhere, from small entrepreneurial companies to large corporate enterprises and government bodies of all sizes. Even the most neutral organization now recognizes the danger of a security breach. 

How it works : 

To the user, an access control system is composed of three elements:

A card or biometric (an identity credential) that is presented to a the door reader.

The door reader which indicated whether the card or biometrics is valid and entry is authorized.

A door or gate which is unlocked when entry is authorized.

.: Related Products :. 

  

Page 24: Bio Metrics Fingerprint Technology.1

Physical Access Control

We provide Biometrics access control, Door Access Control, access control in India, doorlocks, access control, Fingerprints acccess control, biometric door lock, security door control, access control, fingerprint door locks, fingerprint recognition, fingerprint access control, door locks security, access control locks, biometric access fingerprint, access control, doorlocks, biometric door lock, security door control, access control, fingerprint door locks, fingerprint recognition, fingerprint access control, door locks security, access control locks, fingerprint door locks, biometric access, Electric Bolt locks, time clocks.

 

 

Managing access to resources is assuming increasing importance for organizations everywhere, from small entrepreneurial companies to large corporate enterprises and government bodies of all sizes. Even the most neutral organization now recognizes the danger of a security breach. 

How it works : 

To the user, an access control system is composed of three elements:

A card or biometric (an identity credential) that is presented to a the door reader.

The door reader which indicated whether the card or biometrics is valid and entry is authorized.

A door or gate which is unlocked when entry is authorized.

Page 26: Bio Metrics Fingerprint Technology.1

BIO API SDK

BioAPI SDK

:: Introduction

BioAPI Consortium established in U.S.A. in 1998 developed BioAPI CBEFF Format under the

collaboration with Biometric Consortium, IBIA (The International Biometric Industry

Association), NIST (The National Institute of Standards and Technology) and related

associations. NIST subsequently published BioAPI Specification Version 1.1 in March, 2001

after BioAPI Version 1.0 in March, 2000.

Page 27: Bio Metrics Fingerprint Technology.1

BioAPI Specification Version 1.1 was adopted as the norm of ANSI in February,2002.  BioAPI

indicates standard API commonly deployed in biometric field, providing the method of criteria

for a convenient connection between assorted biometric devices and various type of application

programs. BioAPI SDK is the Biometric Service Provider Module compatible with International

Standard of BioAPI and  the sole BSP acquired CBEFF Format ID form IBIA in domestic

biometric market. It not only maintains all the capabilities and merits of SDK as it includes

utmost API technology and high level User Interface of that but also enables software application

developers quickly and easily to integrate fingerprint authentication system into the application

of their choice  due to a perfect compatibility with BioAPI.

  EFM Series

 

EFM Series is a embedded development platform for Fingerprint recognition based standalone products:.Biometrics Biometric Fingerprint Fingerprint recognition Fingerprint terminal Fingerprint identification fingerprint recognition fingerprint security Fingerprint terminal access fingerprint software fingerprint time attendance fingerprint identification fingerprint access control fingerprint access security fingerprint technique fingerprint india fingerprint module fingerprint development desktop fingerprint fingerprint development kit fingerprint identification fingerprint security fingerprint n.

 

Embedded Time Attendance system with integrated card interfaces

Access Control systems

Door locks, Safes, Lockers

Electronic control systems

more..

EFM platform include the following core building blocks:.

Multiple OEM Fingerprint Standalone Modules

Page 28: Bio Metrics Fingerprint Technology.1

8051 single board computers

Rabbit Semiconductor based embedded TCP/IP dev. system

Card readers

Features:.

Complete embedded platform for robust products

Optical fingerprint sensors for reliability

Multiple module to select from as per your application needs

Full development support and reference designs

Low cost

Quick development and product launches

 

About Biometrics Technology ...About Fingerprint Technology ...

 Comparison:

Optical vs. Capacitive (Semiconductor) Fingerprint Sensors 

    We develop customized products for its clients based on this  

Page 29: Bio Metrics Fingerprint Technology.1

platform and offer the complete platform or sub-components to other developers/VARs along with support.

 biometrics, fingerprint capture, fingerprint reader, low cost ,Biometrics India, USA, America, Europe, Japan, UK, Germany, Precise Biometrics Biometric Biometrics Security Biometrics Information Bio, Biometrics india, Biometric, Fingerprint scanner, Time attendance, Access control, OEM modules, security, Time cards, SDK, USB finger print sensor, Authentication, Identification, Verification, Biometrics time attendance, Biometrics access control, Fingerprint time attendance, Fingerprint access control, Proximity, RFID, smart cards, Software, Hardware, free, low cost, cheapest, products, Solutions, project, services, development, matching, recognitio

 

.: Related Products :.  

FSM900

 FSM5000

  

FDA01

Page 30: Bio Metrics Fingerprint Technology.1

 

FIM01

 

Home EFM Series

We provide fingerprint sensors India India, USA, America, Europe, Japan, UK, Germany, france, uae, singapore, Time Attendance, Access Control products, time recorders, time attendance, access control products,, time office reports, time attendance equipment, time attendance software, solutions, time keeping systems, time clock software, systems, time office, security, safe, intruder alarm, proximity,  Biometrics time attendance, Biometrics access control, Fingerprint time attendance, Fingerprint access control, Proximity, RFID, smart cards, Software, Hardware, free, low cost, cheapest, products, Solutions, project, services, development, matching.  EFM Series is a embedded development platform for Fingerprint recognition based standalone products:. 

Embedded Time Attendance system with integrated card interfaces

Access Control systems

Door locks, Safes, Lockers

Electronic control systems

more..

EFM platform include the following core building blocks:.

Multiple OEM Fingerprint Standalone Modules

8051 single board computers

Page 31: Bio Metrics Fingerprint Technology.1

Rabbit Semiconductor based embedded TCP/IP dev. system

Card readers

Features:.

Complete embedded platform for robust products

Optical fingerprint sensors for reliability

Multiple module to select from as per your application needs

Full development support and reference designs

Low cost

Quick development and product launches

 

About Biometrics Technology ...About Fingerprint Technology ...

 Comparison:

Optical vs. Capacitive (Semiconductor) Fingerprint Sensors

    We develop customized products for its clients based on this platform and offer the complete platform or sub-components to other developers/VARs along with support.

 

Page 32: Bio Metrics Fingerprint Technology.1

 

.: Related Products :. FDA01

High speed recognition. Applicable to various product through simple but robust hardware design technology. 

FIM01

100 user support fingerprint Module FSM900

Standalone OEM Fingerprint Module with Optical scanner, 1000 fingerprint storage capacity and Serial host interface.

FSM5000

Low cost Standalone Fingerprint Module with only 150 fingerprint storage capacity.  

Page 33: Bio Metrics Fingerprint Technology.1

  Home Time Attendance Recorders

We provide Time attendance Time attendance recorders solutions Verification Time keeping systems Biometrics fingerprint recognitions Time Attendance Fingerprint security Fingerprint Time Attendance Time Card system time clock software Smart card  proxy punching Time attendance systems Fingerprint readers Fingerprint Fingerprint sensors Fingerprint identification Fingerprint scanning Fingerprint sensor technology Biometric  fingerprint Fingerprint access control Biometrics Time attendance  access control  biometric  security  Fingerprint  Precise Biometrics Time Attendance  Security. 

 

"Time is money”, this statement has never been truer, and time is indeed the most valuable resource. Accurate and efficient time and labor management is vital to any organization's success. Most companies do not really appreciate the losses that can occur without proper time and attendance accounting.  

How it works :

Page 35: Bio Metrics Fingerprint Technology.1

SDK Pro. 3.0

SDK Pro.3.0 Software

:: Introduction

SDK Professional Version 3.0 is the Software Development Kit, a combination of existing BSP

(Biometric Solution Provider) SDK and 1:N fingerprint recognition engine for not only a regular

fingerprint application but also an application using fingerprint DB of large capacity with high

fingerprint search speed.

It provides High Level API (Application Programming Interface) which help application

software easily and quickly made and UI (User Interface) of wizard type so that it saves time and

efforts to develop an application. It is operated on various platform, supporting diverse OS and

development languages and connected to fingerprint recognition device which is manufactured

based on remarkable hardware design technology. It not only offers optimal conditions for

solution development but also guarantees fast speed of fingerprint search and high recognition

ratio.

Software Development kit, Software development, Development kit, Software, Software development kit, development kit, software development tools, Development tools, Software development India, Software progress, Kit, Software programming, Software progress, Software application tools, Embedded software development, Software development pune, software developments, software progress kit, S/W development kit, development

:: Features

- Provides the most optimized API for the fingerprint recognition software development.

- Easily applicable to client/server and web environments.

Page 36: Bio Metrics Fingerprint Technology.1

- Provides fingerprint registration and authentication Wizard for a convenient management of

users

- Makes UI Customization possible by providing user interface designed as skin concept to

minimize the cost of UI   development and time

- The built-in encryption function using the 128-bit encryption algorithm provides enhanced

security to prevent data fabrication or falsification.

- Performs fingerprint DB search of large capacity with high speed of 10,000 fingerprints/sec.

due to adopting     indexing algorithm not comparison in order.

- Easily integrated with any system as I:N search function is programmed  using ANSI C.

:: Function   Device control  Fingerprint data capture   Minutia extraction  Fingerprint registration  Fingerprint authentication (1:1, 1:N)* 1:N Matching Engine requires additional license fee

Time-TRONIX Desktop 

Time -TRONIX Desktop

:: Introduction Time-TRONIX Desktop  

TimeTRONIX Desktop is a complete Biometrics Fingerprint recognition based Time Attendance package for small and medium size companies with less then 100 employees.

TimeTRONIX Desktop consist of a robust USB Optical Fingerprint scanner connected to your standard office computer (preferably at your reception or at entrance with security personnel) and Time attendance management software loaded on the same or other computer on the LAN.

TimeTRONIX Desktop includes robust Optical Fingerprint scanner with high quality fingerprint scanning and long life. It is not a low cost USB semiconductor scanner which is mainly for personnel use and cannot handle heavy use like in Time Attendance systems.

TimeTRONIX Desktop includes easy to use feature rich Time Attendance management software.

Page 37: Bio Metrics Fingerprint Technology.1

This is browser based software with easy to use graphical interfaces and context help. TimeTRONIX software can be installed on a single computer, LAN or Internet.

Fingerprint time attendance fingerprint time attendance USB fingerprint peripherals fingerprint access USB time attendance time attendance access control products time recorders time attendance access control products time office reports time attendance equipment time attendance software solutions time keeping systems time clock software systems time office security safe intruder alarm proximity card smart cards Biometric India Fingerprint India & Time Attendance India access control India security India Biometrics India Biometric Fingerprint scanner Time attendance Access control OEM modules security Time cards SDK USB finger print sensor Authentication Identification Verification Biometrics time attendance

How it works

Installation

Plug the USB fingerprint scanner in office computer

Install drivers

Install TimeTRONIX software package 1

Install TimeTRONIX software package 2

Enter company, department, shift, calendar and other details

Enter employee information to generate unique ID for each employee

Register fingerprints of each employee with his unique ID

Use

Employee enters the office and place his finger on the scanner

Scanner automatically scan his finger and gives it to the computer Software running in the PC matches the scanned fingerprint with the database of registered fingers to identify the employee

Employee is identified and success sound come from the speakers attached to the computer

Employee IN time is recorded with date and time in the log table

When employee leaves the office his OUT time is recorded in the same way

Page 38: Bio Metrics Fingerprint Technology.1

Administration

Administrator imports log data in time attendance software, he may edit few records if required or remove invalid entries.

This data is then processed further to generate data for reports

More complex scenarios with lunch IN/OUT, tea breaks, overtime are also supported.

Reports can be generated and printed using the software

Data required for payroll can be exported and fed to payroll software

Hardware features

Fingerprint scanner provides USB interface for fast fingerprint scanning and processing

It is based on proven optical fingerprint scanning technology with 3D Live finger detection

Surface of the scanner is scratch-resistant and it is not possible to scratch it even with a blade or nail, this gives good quality fingerprint scanning throughout the life of the scanner. Other scanners even with protective layers develop scratches over time and the quality of scanning degrade.

Fingerprint processing and matching happens inside the computer with enormous computing and storing capability. This allow fast 1:N matching, multiple fingers per users and many other features not available in most standalone systems. This also allow you to save cost by using your existing office computer.

Fingerprint scanner has been practically tested with wet fingers, greasy fingers, smeared fingers, oily fingers and gives consistent performance for most practical situations.

Fingerprint scanner has finger guide which makes it easy for employees to give finger scan

Software features

TimeTRONIX software is easy to install and use on windows platform.

You can install it on a single computer or on your LAN server to access it from anywhere in the organization. It is also possible to install it on the web server.

TimeTRONIX software is developed to offer standard Time attendance features and reports.

Page 39: Bio Metrics Fingerprint Technology.1

The software has been developed in Active Server pages with large part of the source code kept open to allow experienced administrators and developers to add custom features easily, if required.

RaviRaj Technologies has a dedicated team to develop and support TimeTRONIX. We intend to develop it into a comprehensive Time Attendance software with support for wide industries, hence we consider integrating custom features free of cost for our clients, if required.

Benefits

TimeTRONIX desktop eliminates proxy punching, very easy with card based time attendance systems. Card based systems only ensure that the card was punched or swiped and does not ensure physical presence of the person which is a major loophole. Fingerprint system ensure physical presence of the employee.

TimeTRONIX desktop is developed with needs of small and medium size companies in mind and they will find it more cost-effective compared to card based systems.

TimeTRONIX help you reduce administrative costs associated with issuing and managing cards, timesheets or attendance registers.

TimeTRONIX is a robust, reliable and service free system. i.e. its robust design does not require regular servicing and you can depend on it for many years without any hardware problems. its low cost lower your risk of owning costly time attendance equipment.

:: Technical Specifications

Features Details

Resolution 500dpi

Sensing area 13.6x16.2mm

Dimensions 21(w)x31(l)x59(h) in mm

Encrypted data size 400bytes

Verification time < 1 sec

Weight 28g

Ambient temperature -40 to 60oC

Scanner type Optical

PC interface USB

:: Introduction Time-TRONIX Software The Time Attendance Software tracks employees' time and provides a daily reconciliation of time records as reports or for further processing by payroll software. As a result, the

Page 40: Bio Metrics Fingerprint Technology.1

software cuts down on administrative time, safeguards from error, and saves a substantial amount of money that could have been lost due to mishandled time cards and employees punching in for each other. It is a complete and a cost effective solution for T&A and security.

  Prepare employee muster

Monitor employee attendance

Track vacation & sick time

Schedule employees

Provide flexible shifts

Automate time rounding policies

Quickly retrieve historical data

Print any of numerous reports

Link with payroll software

And much, much more

 :: Software Modules

Company: to enter company or facility details and address 

Departments: to create and manage various departments for department wise attendance monitoring 

Employee: Employee registration and management 

Shift management: to enter complex shift information, including overnight shift information and overtime schedules 

Page 41: Bio Metrics Fingerprint Technology.1

Calendar: company holidays and calendar 

Leave management: To allocate and track employee leaves, multiple leave types is supported 

Administration: Admin functions, importing logs, logs editing and processing 

Reports: Number of useful reports are available in HTML and text formats

 :: Payroll interface

 The Time-TRONIX TA software can be easily interfaced with your existing Payroll software. All payroll software accept standard time attendance data produced by Time-TRONIX TA software. This data is provided in MS-access or text format. Most payroll software will accept text data.

:: Reports

A variety of reports can be produced to give you the information you need in a format you can use. Following standard reports are available:

Attendance Report Time Attendance Report

Lateness Report

Overtime Report

Overnight Report

Leave Report

Absence Report

Exception Report

Shift Roster Report

Page 42: Bio Metrics Fingerprint Technology.1

Clocking Report

Staff Not Working Report

Staff Not Clocking Report

 

:: Software (Time Attendance only)  features Time-TRONIX TA software is easy to install and

use on windows platform. 

You can install it on a single computer or on your LAN server to access it from anywhere in the organization. It is also possible to install it on the web server. 

Time-TRONIX TA software is developed to offer standard Time attendance features and reports. 

The software has been developed in Active Server pages with large part of the source code kept open to allow experienced administrators and developers to add custom features easily, if required. 

has a dedicated team to develop and support Time-TRONIX TA. We intend to develop it into a comprehensive Time Attendance software with support for wide industries, hence we consider integrating custom features free of cost for our clients, if required.

 

:: More.... The fingerprint data is encrypted and secure Comes with assured warranty, support and service Manufactured in India

 :: Packaging list for Time-TRONIX Desktop

USB Fingerprint Scanner

Page 43: Bio Metrics Fingerprint Technology.1

Time-TRONIX TA software CD User Manual

 :: Applications  

Time & Attendance: Offices, Factories, Government etc.

RF Modems & Modules

:: RF Modem/Modules ::

:: Introduction

RF Transceiver modules are OEM products which can be integrated with embedded products. RF transceivers allow embedded products to communicate in short distances specified by the RF frequency and environment with other RF capable devices.

e.g. a Central control panel can communicate with a remote alarm in the same premises through RF transceivers to give alarm signal. This ensure that wiring related problems do not exist in case of emergency.

Wireless platform security cross platform wireless platform network security automation wireless  GSM GPRS embedded platform RF Transceiver technology Wireless LAN  wireless infrastructure platform selection links standards wireless network wireless networking communication application protocol  Biometrics  Time attendance  access control  biometric  security  Fingerprint  access control Proximity RFID smart cards Software Hardware free low cost cheapest products Solutions project services development matching recognition.

 

 

Page 44: Bio Metrics Fingerprint Technology.1

Wireless Products

We provide wireless products systems linksys Cisco  wifi systems antennas wireless world, at t wireless india, cingular wireless, wireless, wireless phone, wireless plan, wireless network, wireless service, sprint wireless, wireless internet, prepaid wireless, wireless speaker, wireless router, liberty wireless, wireless networking, arch wireless, verizon wireless amphitheater, wireless phone service, wireless weather station, verison wireless, wireless phone plan, nextel wireless, wireless camera, qwest wireless, centennial wireless, broadband wireless, cable wireless, verizon wireless phone, wireless microphone, midwest wireless, wireless headphones, wireless lan, rogers wireless, wireless communication, ringtone for verizon wireless, wireless deal, wireless keyboard, wireless access point, wireless security.

 

RF transceivers allow embedded products to communicate in short distances specified by the RF frequency and environment with other RF capable devices.

  An instantaneous tracking and logging system for autos, trucks, police department, delivery services. This new device combines GPS with GSM cellular technology using a PC/laptop without going through the Internet.

Page 45: Bio Metrics Fingerprint Technology.1

    WDT is a sleek, aesthetically crafted Terminal with entrenched features like Built in Printer, Built in Modem ( PSTN/ GSM ), Built in Smart card reader.

  GSM is worlds most famous Mobile platform. Mobile phones with SIM cards use GSM technology to help you communicate with your family, friends and business associates.

We also provide wireless headset, wireless mouse, at and t wireless, wireless appliance, t mobile wireless, verizon wireless arena, wireless phone services, cincinnati bell wireless, alltel wireless, verizon wireless music center, prepaid wireless phone, wireless technology, at t wireless phone, virgin wireless, wireless modem, bus card pcmcia wireless, wireless usb adapter, rogers t wireless, wireless at t, singular wireless, cricket wireless, wireless security camera, att t wireless, wireless application, wireless internet service, wireless phone company, sierra wireless, wireless web cam, verizon wireless cell phone, wireless company, wireless accessory, wireless printer, home wireless network, verizon wireless theater, wireless internet access, a t t wireless, wireless web, wireless email, wireless isp, free ringtone verizon wireless, wireless network card, wireless video, a1 wireless, wireless internet provider, wireless intercom, cingular wireless phone, ring tone for verizon wireless, free wireless phone, att wireless phone, wireless card, wireless security system, wireless antenna, verizon wireless plan, wireless access, wireless dog fence, wireless provider, wireless laptop, linksys wireless router, wireless print server, wireless usb.