SlideShare uma empresa Scribd logo
1 de 18
H A R D W A R E / S O F T W A R E
Access Control and Attendance
Systems
S Y S T E M O V E R V I E W
TAMS Attendance System
Hardware
Hardware Features
 Capable of supporting various communication protocols, it can be used in numerous
application areas.
 - TCP/IP : compatible with access manager(OPTION)
- RS-485: Functions with your company’s custom controller
- Wiegand
▷ In : Functions with card readers currently in use
▷ Out : Provides various portions of formats, User ID or Card ID output
 Suitable for employees’ work hour management with the function keys provided
 - Provides four separate keys/ keys can be used in combination
(starting work and finishing work, going out, returning to work, etc)
 Enhanced user configuration feature (ID digits, sensor option, operation mode, etc)
 Enhanced User Convenience
 - Auto-on
- Provides Shortcut ID / Group Matching Feature
- LCD : 2 line graphic LCD (supports various languages)
- LED : Status LED 2 each, Authentication result LED 1 each
- Voice Guide : Voice Output
 Supports various authentication media, making it possible to configure as required by different
security methods.
 - Fingerprint/Password/RF card (option: HID, MIFARE), combined use is possible
Technical Specifications
Item Description
Material Fingerprint Access Controller
Size Optical Type
Sensor type Optical Optical
Resolution 500 DPI
Authentication Mode Mode 1:1, 1:N, Short ID Matching
Fact Password, RF card (HID,
MIFARE compatible)
Time Less than 1 second
Operation Mode SO Stand-alone
NS Server matching
Environment Temperature -20 ~ 60 [oC]
Power 12 / 24 [V]
Maximum no. of registrations 2,000 Users (1 fingerprint per 1
user)
Log 3,000 ea
Authentication Rate FRR : 1/1,000 , FAR : 1/100,000
Function Key F1,F2,F3,F4
Communication TCP/IP, Wiegand Input / Output,
RS-485
Certification MIC, CE, FCC
Software
 Efficient management of:
 Employees
 Visitors
 Vendors
 Inwards
 Compatible to work with:
 Biometric
 RFID
 User name and Password
 Compatible with multiple hardware
 Cost efficient
Software Features
 Capture:
 Fingerprint (1 or 2 fingers)
 RFID information
 Username and password
 Webcam image of person
 Webcam image of belongings
 Generate visitor access permission slip automatically
 Intimate the employee whom a visitor has come to
meet
Software Features
 Virtually unlimited number of finger print storage
capability
 Virtually indefinite period reports(1 day, 1 week, 1 month,
1 year, N years, period FROM - TO)
 Real time alert engine
 Robust Alert Engine:
 Email notification on rule violation
 SMS notification on rule violation
 Screen popup at security
 Hooter or Visual alerts
 Single software setup
 One time software setup cost
 A sophisticated client server software
General System Layout
Finger
Print
Scanner
Processing
machine (PC)
Camera
Capture Image
(On Trigger)
Receive Image
Receive Identity
Send user information to server
SERVER
Store the attendance information in database
Generate and Email REPORTS
Continuously check for rule violation.
Take action
Office Network (LAN)
RFID
Scanner
System snapshots
System snapshots
System snapshots
S Y S T E M A R C H I T E C T U R E
Visitor Management System
Finger
Print
Scanne
r
Processing
machine (PC)
Camera
Capture Image
(On Trigger)
Receive ImageReceive Finger Print
The processing machine is connected
to the employee database and visitor
records database. When a person swipes
Finger, a popup display is presented on
the attached screen where the registration
page is visible. (If the person had been here
earlier then the fields would be auto filled).
Image will be captured by the attached webcam.
A record for this visit will be stored. A message
will be transmitted over LAN to the person whom
the visitor has come to meet
Employee 1
workstation
(PC)
Employee 2
workstation
(PC)
Employee 4
workstation
(PC)
Employee 5
workstation
(PC)
The concerned persons display shows a pop
up message with the image of the visitor. The
Employee can then take one of the following
actions:
1. ACCEPT
2. REJECT
3. FORWARD
This selection by the employees on the pop-up
on his screen will be received by the security guard.
Based on Employees willingness, a temporary
Card will be issued to the visitor.
If the employee forwards the visiting request to some
Other employee, a request message similar to the one
Received by this employee will be generated and sent to
the new employee.
Office Network (LAN)
General System Layout
FPS
SERVER
1. Finger Swipe
Detected
2. Server checks in the DB
whether it is a new visitor.
-> If it is a new visitor then a
form is presented to the
security guard for entering
the details.
-> If old visitor, then the history
is shown and the same form is
auto filled. The security guard
can check the details along with
the stored photo and select
another employee.
-> If an office employee who has
forgotten / lost his RFID tag. Action
may be taken as per company policies
Under such circumstances.
Cam
3. Capture the image
of the visitor and
store in the database
Employee
1 PC
4. Server generates a request for the host employee for this visitor
5. Employee sends back an acknowledgement to the server
Employee
X PC
6. If the employee said:
ACCEPT: The security guard generates a temporary card with the photograph
of the visitor on it and sends the visitor in to meet the host employee.
* Once the host employee meets the visitor and his meeting is over, he
sends a message to the server, stating that his meeting is over.
* The server generates a prompt at security cabin about this.
* If the security guard does not respond with a “visitor Left Office” message
within the stipulated time frame then the server raises an alert.
REJECT: The security guard makes an entry for this visitor in the DB with a rejected
remark and sends him back as the permission is not granted.
FORWARD: The host employee can forward this visitors request to some other host
employee. The new host employee can then follow the same routine. He will also
be intimated about who forwarded the request to him.
8. All these transactions should be stored in a DB.
Functional Flow Diagram
Regular Visitor
Employee
1 PC
OR
9. REPORTS
FPS
SERVER
1. Finger Swipe
Detected
2. Server checks in the DB
whether it is a new visitor.
-> If it is a new visitor then a
form is presented to the
security guard for entering
the details.
-> If old visitor, then the history
is shown and the same form is
auto filled. The security guard
can check the details along with
the stored photo and select
another employee.
Cam
3. Capture the image
of the visitor and
store in the database
Employee
1 PC
5. Server acknowledges the arrival of the client the host employee.
4. Critical Client: Employee fills up the form and sends it to server
before the visitors arrival.
The window opens and remain at security gate where
the client is expected.
When the client reaches, his finger print is captured, image
is grabbed and pass is generated based on the information
that host employee had provided.
This allows saving time for the client as the registration
process is avoided.
6. All these transactions should be stored in a DB.
Functional Flow Diagram
Critical Client Visitor
S Y S T E M A R C H I T E C T U R E
Vendor Attendance System
General System Layout
Finger
Print
Scanner
Processing
machine (PC)
Camera
Capture Image
(On Trigger)
Receive Image
Receive Identity
-> The processing machine is connected
to the visitor records database.
-> When a person swipes Finger or flashes
RFID card, a popup display is presented on
the attached screen where the registration
page is visible.
SERVER
-> Server maintains the attendance record for
all the visiting vendors. When a new vendor
Employee comes in and marks his identity a
record is filled for his entry / exit along with
the current time.
Office Network (LAN)
RFID
Scanner
-> If the person had been here earlier then the
fields would be auto filled.
-> Image will be captured by the attached webcam.
-> A record for this visit will be stored.
-> A message will be transmitted over LAN to
the server for making an Entry for this persons
attendance.
-> Server checks the employee attendance against
the stored rules and may raise an alert if there is
Any violation (Like an employee coming on a day
of holiday etc).
-> Server may also raise an alert under circumstances
Where the employee registers himself while coming
in, but forgets to mark his entry while leaving.

Mais conteúdo relacionado

Mais procurados

Visitor management system
Visitor management systemVisitor management system
Visitor management systemRohit Talukdar
 
HIPLA – Visitor Management System
HIPLA – Visitor Management SystemHIPLA – Visitor Management System
HIPLA – Visitor Management Systemhipla2k19
 
Hotel Management System Suite
Hotel  Management  System  SuiteHotel  Management  System  Suite
Hotel Management System SuiteACCENT Trading
 
Hotel management system v2
Hotel management system v2Hotel management system v2
Hotel management system v2Yudhi Aprianto
 
Hotel Management System
Hotel Management SystemHotel Management System
Hotel Management Systemcolimmy
 
Bellsofts Secured Maverick Enterprise Visitor Management
Bellsofts Secured Maverick Enterprise Visitor ManagementBellsofts Secured Maverick Enterprise Visitor Management
Bellsofts Secured Maverick Enterprise Visitor Managementarun_nair
 
Online Hotel Reservation System PPT
Online Hotel Reservation System PPTOnline Hotel Reservation System PPT
Online Hotel Reservation System PPTsurabhi shinde
 
Hotel Management Software Presentation
Hotel Management Software PresentationHotel Management Software Presentation
Hotel Management Software PresentationVision Raval
 
VAMS (Visitor Authentication Management System)
VAMS (Visitor Authentication  Management System)VAMS (Visitor Authentication  Management System)
VAMS (Visitor Authentication Management System)Vaishali Dhamale
 
Hotel+management+system
Hotel+management+systemHotel+management+system
Hotel+management+systemsonikaushal
 
Features of Hotel Management Software - Pure Automate
Features of Hotel Management Software - Pure AutomateFeatures of Hotel Management Software - Pure Automate
Features of Hotel Management Software - Pure AutomatePure Weblopment Limited
 

Mais procurados (17)

eFACiLiTY Visitor Management System
eFACiLiTY Visitor Management SystemeFACiLiTY Visitor Management System
eFACiLiTY Visitor Management System
 
Headcount Management
Headcount Management Headcount Management
Headcount Management
 
Project presentation
Project presentation Project presentation
Project presentation
 
Visitor management system
Visitor management systemVisitor management system
Visitor management system
 
HIPLA – Visitor Management System
HIPLA – Visitor Management SystemHIPLA – Visitor Management System
HIPLA – Visitor Management System
 
Hotel Management System Suite
Hotel  Management  System  SuiteHotel  Management  System  Suite
Hotel Management System Suite
 
Hotel management system v2
Hotel management system v2Hotel management system v2
Hotel management system v2
 
Hotel Management System
Hotel Management SystemHotel Management System
Hotel Management System
 
Bellsofts Secured Maverick Enterprise Visitor Management
Bellsofts Secured Maverick Enterprise Visitor ManagementBellsofts Secured Maverick Enterprise Visitor Management
Bellsofts Secured Maverick Enterprise Visitor Management
 
Online Hotel Reservation System PPT
Online Hotel Reservation System PPTOnline Hotel Reservation System PPT
Online Hotel Reservation System PPT
 
Hotel Management Software Presentation
Hotel Management Software PresentationHotel Management Software Presentation
Hotel Management Software Presentation
 
VAMS (Visitor Authentication Management System)
VAMS (Visitor Authentication  Management System)VAMS (Visitor Authentication  Management System)
VAMS (Visitor Authentication Management System)
 
Hotel+management+system
Hotel+management+systemHotel+management+system
Hotel+management+system
 
Features of Hotel Management Software - Pure Automate
Features of Hotel Management Software - Pure AutomateFeatures of Hotel Management Software - Pure Automate
Features of Hotel Management Software - Pure Automate
 
PROPERTY MANAGEMENT SYSTEM
PROPERTY MANAGEMENT SYSTEMPROPERTY MANAGEMENT SYSTEM
PROPERTY MANAGEMENT SYSTEM
 
Hotel management system
Hotel management systemHotel management system
Hotel management system
 
M-Brokrage
M-BrokrageM-Brokrage
M-Brokrage
 

Semelhante a Visitor and vendor access management system

Fingerprint Attendance System
Fingerprint Attendance SystemFingerprint Attendance System
Fingerprint Attendance Systemsandeep pawar
 
Opis softera i ModulaENVlada
Opis softera i ModulaENVladaOpis softera i ModulaENVlada
Opis softera i ModulaENVladaZoran Perisic
 
ppt_project_group_2.ppt amnd project report
ppt_project_group_2.ppt amnd project reportppt_project_group_2.ppt amnd project report
ppt_project_group_2.ppt amnd project reportsobanmoriwala1
 
Android Application for Mobile Attendance using NFC
Android Application for Mobile Attendance using NFCAndroid Application for Mobile Attendance using NFC
Android Application for Mobile Attendance using NFCIRJET Journal
 
Remote Network Monitoring System
Remote Network Monitoring SystemRemote Network Monitoring System
Remote Network Monitoring SystemSidharth Goel
 
PASSPORT SCANNER
PASSPORT SCANNER PASSPORT SCANNER
PASSPORT SCANNER haritha456
 
ID Scanning solutions
ID Scanning solutionsID Scanning solutions
ID Scanning solutionsNirmalEK
 
Software Requirement Specification Of Hotel Management System
Software Requirement Specification Of Hotel Management SystemSoftware Requirement Specification Of Hotel Management System
Software Requirement Specification Of Hotel Management SystemUttam Singh Chaudhary
 
In C programming please CSCI 4534 Operating Systems Program.pdf
In C programming please CSCI 4534 Operating Systems Program.pdfIn C programming please CSCI 4534 Operating Systems Program.pdf
In C programming please CSCI 4534 Operating Systems Program.pdfankitsrivastava681882
 
E-License System With RTO Controle Room Management System
E-License System With RTO Controle Room Management SystemE-License System With RTO Controle Room Management System
E-License System With RTO Controle Room Management SystemIRJET Journal
 
Centers for Disease Control and Prevention
Centers for Disease Control and PreventionCenters for Disease Control and Prevention
Centers for Disease Control and PreventionPatrick Montgomery
 
Global e payment system ppt
Global e payment system pptGlobal e payment system ppt
Global e payment system pptSalman Khaja
 
CONFidence 2015: SCADA and mobile: security assessment of the applications th...
CONFidence 2015: SCADA and mobile: security assessment of the applications th...CONFidence 2015: SCADA and mobile: security assessment of the applications th...
CONFidence 2015: SCADA and mobile: security assessment of the applications th...PROIDEA
 
NetWatcher Customer Overview
NetWatcher Customer OverviewNetWatcher Customer Overview
NetWatcher Customer OverviewScott Suhy
 
Office Security System
Office Security SystemOffice Security System
Office Security SystemIJMER
 

Semelhante a Visitor and vendor access management system (20)

Fingerprint Attendance System
Fingerprint Attendance SystemFingerprint Attendance System
Fingerprint Attendance System
 
Opis softera i ModulaENVlada
Opis softera i ModulaENVladaOpis softera i ModulaENVlada
Opis softera i ModulaENVlada
 
Nac2500
Nac2500Nac2500
Nac2500
 
NAC2500
NAC2500NAC2500
NAC2500
 
ppt_project_group_2.ppt amnd project report
ppt_project_group_2.ppt amnd project reportppt_project_group_2.ppt amnd project report
ppt_project_group_2.ppt amnd project report
 
Presentation
PresentationPresentation
Presentation
 
Android Application for Mobile Attendance using NFC
Android Application for Mobile Attendance using NFCAndroid Application for Mobile Attendance using NFC
Android Application for Mobile Attendance using NFC
 
Remote Network Monitoring System
Remote Network Monitoring SystemRemote Network Monitoring System
Remote Network Monitoring System
 
PASSPORT SCANNER
PASSPORT SCANNER PASSPORT SCANNER
PASSPORT SCANNER
 
ID Scanning solutions
ID Scanning solutionsID Scanning solutions
ID Scanning solutions
 
Software Requirement Specification Of Hotel Management System
Software Requirement Specification Of Hotel Management SystemSoftware Requirement Specification Of Hotel Management System
Software Requirement Specification Of Hotel Management System
 
ATM (1)
ATM (1)ATM (1)
ATM (1)
 
In C programming please CSCI 4534 Operating Systems Program.pdf
In C programming please CSCI 4534 Operating Systems Program.pdfIn C programming please CSCI 4534 Operating Systems Program.pdf
In C programming please CSCI 4534 Operating Systems Program.pdf
 
E-License System With RTO Controle Room Management System
E-License System With RTO Controle Room Management SystemE-License System With RTO Controle Room Management System
E-License System With RTO Controle Room Management System
 
Centers for Disease Control and Prevention
Centers for Disease Control and PreventionCenters for Disease Control and Prevention
Centers for Disease Control and Prevention
 
ACTAtek 3 Introduction
ACTAtek 3 IntroductionACTAtek 3 Introduction
ACTAtek 3 Introduction
 
Global e payment system ppt
Global e payment system pptGlobal e payment system ppt
Global e payment system ppt
 
CONFidence 2015: SCADA and mobile: security assessment of the applications th...
CONFidence 2015: SCADA and mobile: security assessment of the applications th...CONFidence 2015: SCADA and mobile: security assessment of the applications th...
CONFidence 2015: SCADA and mobile: security assessment of the applications th...
 
NetWatcher Customer Overview
NetWatcher Customer OverviewNetWatcher Customer Overview
NetWatcher Customer Overview
 
Office Security System
Office Security SystemOffice Security System
Office Security System
 

Último

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Último (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Visitor and vendor access management system

  • 1. H A R D W A R E / S O F T W A R E Access Control and Attendance Systems
  • 2. S Y S T E M O V E R V I E W TAMS Attendance System
  • 4. Hardware Features  Capable of supporting various communication protocols, it can be used in numerous application areas.  - TCP/IP : compatible with access manager(OPTION) - RS-485: Functions with your company’s custom controller - Wiegand ▷ In : Functions with card readers currently in use ▷ Out : Provides various portions of formats, User ID or Card ID output  Suitable for employees’ work hour management with the function keys provided  - Provides four separate keys/ keys can be used in combination (starting work and finishing work, going out, returning to work, etc)  Enhanced user configuration feature (ID digits, sensor option, operation mode, etc)  Enhanced User Convenience  - Auto-on - Provides Shortcut ID / Group Matching Feature - LCD : 2 line graphic LCD (supports various languages) - LED : Status LED 2 each, Authentication result LED 1 each - Voice Guide : Voice Output  Supports various authentication media, making it possible to configure as required by different security methods.  - Fingerprint/Password/RF card (option: HID, MIFARE), combined use is possible
  • 5. Technical Specifications Item Description Material Fingerprint Access Controller Size Optical Type Sensor type Optical Optical Resolution 500 DPI Authentication Mode Mode 1:1, 1:N, Short ID Matching Fact Password, RF card (HID, MIFARE compatible) Time Less than 1 second Operation Mode SO Stand-alone NS Server matching Environment Temperature -20 ~ 60 [oC] Power 12 / 24 [V] Maximum no. of registrations 2,000 Users (1 fingerprint per 1 user) Log 3,000 ea Authentication Rate FRR : 1/1,000 , FAR : 1/100,000 Function Key F1,F2,F3,F4 Communication TCP/IP, Wiegand Input / Output, RS-485 Certification MIC, CE, FCC
  • 6. Software  Efficient management of:  Employees  Visitors  Vendors  Inwards  Compatible to work with:  Biometric  RFID  User name and Password  Compatible with multiple hardware  Cost efficient
  • 7. Software Features  Capture:  Fingerprint (1 or 2 fingers)  RFID information  Username and password  Webcam image of person  Webcam image of belongings  Generate visitor access permission slip automatically  Intimate the employee whom a visitor has come to meet
  • 8. Software Features  Virtually unlimited number of finger print storage capability  Virtually indefinite period reports(1 day, 1 week, 1 month, 1 year, N years, period FROM - TO)  Real time alert engine  Robust Alert Engine:  Email notification on rule violation  SMS notification on rule violation  Screen popup at security  Hooter or Visual alerts  Single software setup  One time software setup cost  A sophisticated client server software
  • 9. General System Layout Finger Print Scanner Processing machine (PC) Camera Capture Image (On Trigger) Receive Image Receive Identity Send user information to server SERVER Store the attendance information in database Generate and Email REPORTS Continuously check for rule violation. Take action Office Network (LAN) RFID Scanner
  • 13. S Y S T E M A R C H I T E C T U R E Visitor Management System
  • 14. Finger Print Scanne r Processing machine (PC) Camera Capture Image (On Trigger) Receive ImageReceive Finger Print The processing machine is connected to the employee database and visitor records database. When a person swipes Finger, a popup display is presented on the attached screen where the registration page is visible. (If the person had been here earlier then the fields would be auto filled). Image will be captured by the attached webcam. A record for this visit will be stored. A message will be transmitted over LAN to the person whom the visitor has come to meet Employee 1 workstation (PC) Employee 2 workstation (PC) Employee 4 workstation (PC) Employee 5 workstation (PC) The concerned persons display shows a pop up message with the image of the visitor. The Employee can then take one of the following actions: 1. ACCEPT 2. REJECT 3. FORWARD This selection by the employees on the pop-up on his screen will be received by the security guard. Based on Employees willingness, a temporary Card will be issued to the visitor. If the employee forwards the visiting request to some Other employee, a request message similar to the one Received by this employee will be generated and sent to the new employee. Office Network (LAN) General System Layout
  • 15. FPS SERVER 1. Finger Swipe Detected 2. Server checks in the DB whether it is a new visitor. -> If it is a new visitor then a form is presented to the security guard for entering the details. -> If old visitor, then the history is shown and the same form is auto filled. The security guard can check the details along with the stored photo and select another employee. -> If an office employee who has forgotten / lost his RFID tag. Action may be taken as per company policies Under such circumstances. Cam 3. Capture the image of the visitor and store in the database Employee 1 PC 4. Server generates a request for the host employee for this visitor 5. Employee sends back an acknowledgement to the server Employee X PC 6. If the employee said: ACCEPT: The security guard generates a temporary card with the photograph of the visitor on it and sends the visitor in to meet the host employee. * Once the host employee meets the visitor and his meeting is over, he sends a message to the server, stating that his meeting is over. * The server generates a prompt at security cabin about this. * If the security guard does not respond with a “visitor Left Office” message within the stipulated time frame then the server raises an alert. REJECT: The security guard makes an entry for this visitor in the DB with a rejected remark and sends him back as the permission is not granted. FORWARD: The host employee can forward this visitors request to some other host employee. The new host employee can then follow the same routine. He will also be intimated about who forwarded the request to him. 8. All these transactions should be stored in a DB. Functional Flow Diagram Regular Visitor Employee 1 PC OR 9. REPORTS
  • 16. FPS SERVER 1. Finger Swipe Detected 2. Server checks in the DB whether it is a new visitor. -> If it is a new visitor then a form is presented to the security guard for entering the details. -> If old visitor, then the history is shown and the same form is auto filled. The security guard can check the details along with the stored photo and select another employee. Cam 3. Capture the image of the visitor and store in the database Employee 1 PC 5. Server acknowledges the arrival of the client the host employee. 4. Critical Client: Employee fills up the form and sends it to server before the visitors arrival. The window opens and remain at security gate where the client is expected. When the client reaches, his finger print is captured, image is grabbed and pass is generated based on the information that host employee had provided. This allows saving time for the client as the registration process is avoided. 6. All these transactions should be stored in a DB. Functional Flow Diagram Critical Client Visitor
  • 17. S Y S T E M A R C H I T E C T U R E Vendor Attendance System
  • 18. General System Layout Finger Print Scanner Processing machine (PC) Camera Capture Image (On Trigger) Receive Image Receive Identity -> The processing machine is connected to the visitor records database. -> When a person swipes Finger or flashes RFID card, a popup display is presented on the attached screen where the registration page is visible. SERVER -> Server maintains the attendance record for all the visiting vendors. When a new vendor Employee comes in and marks his identity a record is filled for his entry / exit along with the current time. Office Network (LAN) RFID Scanner -> If the person had been here earlier then the fields would be auto filled. -> Image will be captured by the attached webcam. -> A record for this visit will be stored. -> A message will be transmitted over LAN to the server for making an Entry for this persons attendance. -> Server checks the employee attendance against the stored rules and may raise an alert if there is Any violation (Like an employee coming on a day of holiday etc). -> Server may also raise an alert under circumstances Where the employee registers himself while coming in, but forgets to mark his entry while leaving.