H A R D W A R E / S O F T W A R E
Access Control and Attendance
Systems
S Y S T E M O V E R V I E W
TAMS Attendance System
Hardware
Hardware Features
ď‚— Capable of supporting various communication protocols, it can be used in numerous
application areas.
ď‚— - TCP/IP : compatible with access manager(OPTION)
- RS-485: Functions with your company’s custom controller
- Wiegand
â–· In : Functions with card readers currently in use
â–· Out : Provides various portions of formats, User ID or Card ID output
 Suitable for employees’ work hour management with the function keys provided
ď‚— - Provides four separate keys/ keys can be used in combination
(starting work and finishing work, going out, returning to work, etc)
ď‚— Enhanced user configuration feature (ID digits, sensor option, operation mode, etc)
ď‚— Enhanced User Convenience
ď‚— - Auto-on
- Provides Shortcut ID / Group Matching Feature
- LCD : 2 line graphic LCD (supports various languages)
- LED : Status LED 2 each, Authentication result LED 1 each
- Voice Guide : Voice Output
ď‚— Supports various authentication media, making it possible to configure as required by different
security methods.
ď‚— - Fingerprint/Password/RF card (option: HID, MIFARE), combined use is possible
Technical Specifications
Item Description
Material Fingerprint Access Controller
Size Optical Type
Sensor type Optical Optical
Resolution 500 DPI
Authentication Mode Mode 1:1, 1:N, Short ID Matching
Fact Password, RF card (HID,
MIFARE compatible)
Time Less than 1 second
Operation Mode SO Stand-alone
NS Server matching
Environment Temperature -20 ~ 60 [oC]
Power 12 / 24 [V]
Maximum no. of registrations 2,000 Users (1 fingerprint per 1
user)
Log 3,000 ea
Authentication Rate FRR : 1/1,000 , FAR : 1/100,000
Function Key F1,F2,F3,F4
Communication TCP/IP, Wiegand Input / Output,
RS-485
Certification MIC, CE, FCC
Software
ď‚— Efficient management of:
 Employees
 Visitors
 Vendors
 Inwards
ď‚— Compatible to work with:
 Biometric
 RFID
 User name and Password
ď‚— Compatible with multiple hardware
ď‚— Cost efficient
Software Features
ď‚— Capture:
 Fingerprint (1 or 2 fingers)
 RFID information
 Username and password
 Webcam image of person
 Webcam image of belongings
ď‚— Generate visitor access permission slip automatically
ď‚— Intimate the employee whom a visitor has come to
meet
Software Features
ď‚— Virtually unlimited number of finger print storage
capability
ď‚— Virtually indefinite period reports(1 day, 1 week, 1 month,
1 year, N years, period FROM - TO)
ď‚— Real time alert engine
ď‚— Robust Alert Engine:
 Email notification on rule violation
 SMS notification on rule violation
 Screen popup at security
 Hooter or Visual alerts
ď‚— Single software setup
ď‚— One time software setup cost
ď‚— A sophisticated client server software
General System Layout
Finger
Print
Scanner
Processing
machine (PC)
Camera
Capture Image
(On Trigger)
Receive Image
Receive Identity
Send user information to server
SERVER
Store the attendance information in database
Generate and Email REPORTS
Continuously check for rule violation.
Take action
Office Network (LAN)
RFID
Scanner
System snapshots
System snapshots
System snapshots
S Y S T E M A R C H I T E C T U R E
Visitor Management System
Finger
Print
Scanne
r
Processing
machine (PC)
Camera
Capture Image
(On Trigger)
Receive ImageReceive Finger Print
The processing machine is connected
to the employee database and visitor
records database. When a person swipes
Finger, a popup display is presented on
the attached screen where the registration
page is visible. (If the person had been here
earlier then the fields would be auto filled).
Image will be captured by the attached webcam.
A record for this visit will be stored. A message
will be transmitted over LAN to the person whom
the visitor has come to meet
Employee 1
workstation
(PC)
Employee 2
workstation
(PC)
Employee 4
workstation
(PC)
Employee 5
workstation
(PC)
The concerned persons display shows a pop
up message with the image of the visitor. The
Employee can then take one of the following
actions:
1. ACCEPT
2. REJECT
3. FORWARD
This selection by the employees on the pop-up
on his screen will be received by the security guard.
Based on Employees willingness, a temporary
Card will be issued to the visitor.
If the employee forwards the visiting request to some
Other employee, a request message similar to the one
Received by this employee will be generated and sent to
the new employee.
Office Network (LAN)
General System Layout
FPS
SERVER
1. Finger Swipe
Detected
2. Server checks in the DB
whether it is a new visitor.
-> If it is a new visitor then a
form is presented to the
security guard for entering
the details.
-> If old visitor, then the history
is shown and the same form is
auto filled. The security guard
can check the details along with
the stored photo and select
another employee.
-> If an office employee who has
forgotten / lost his RFID tag. Action
may be taken as per company policies
Under such circumstances.
Cam
3. Capture the image
of the visitor and
store in the database
Employee
1 PC
4. Server generates a request for the host employee for this visitor
5. Employee sends back an acknowledgement to the server
Employee
X PC
6. If the employee said:
ACCEPT: The security guard generates a temporary card with the photograph
of the visitor on it and sends the visitor in to meet the host employee.
* Once the host employee meets the visitor and his meeting is over, he
sends a message to the server, stating that his meeting is over.
* The server generates a prompt at security cabin about this.
* If the security guard does not respond with a “visitor Left Office” message
within the stipulated time frame then the server raises an alert.
REJECT: The security guard makes an entry for this visitor in the DB with a rejected
remark and sends him back as the permission is not granted.
FORWARD: The host employee can forward this visitors request to some other host
employee. The new host employee can then follow the same routine. He will also
be intimated about who forwarded the request to him.
8. All these transactions should be stored in a DB.
Functional Flow Diagram
Regular Visitor
Employee
1 PC
OR
9. REPORTS
FPS
SERVER
1. Finger Swipe
Detected
2. Server checks in the DB
whether it is a new visitor.
-> If it is a new visitor then a
form is presented to the
security guard for entering
the details.
-> If old visitor, then the history
is shown and the same form is
auto filled. The security guard
can check the details along with
the stored photo and select
another employee.
Cam
3. Capture the image
of the visitor and
store in the database
Employee
1 PC
5. Server acknowledges the arrival of the client the host employee.
4. Critical Client: Employee fills up the form and sends it to server
before the visitors arrival.
The window opens and remain at security gate where
the client is expected.
When the client reaches, his finger print is captured, image
is grabbed and pass is generated based on the information
that host employee had provided.
This allows saving time for the client as the registration
process is avoided.
6. All these transactions should be stored in a DB.
Functional Flow Diagram
Critical Client Visitor
S Y S T E M A R C H I T E C T U R E
Vendor Attendance System
General System Layout
Finger
Print
Scanner
Processing
machine (PC)
Camera
Capture Image
(On Trigger)
Receive Image
Receive Identity
-> The processing machine is connected
to the visitor records database.
-> When a person swipes Finger or flashes
RFID card, a popup display is presented on
the attached screen where the registration
page is visible.
SERVER
-> Server maintains the attendance record for
all the visiting vendors. When a new vendor
Employee comes in and marks his identity a
record is filled for his entry / exit along with
the current time.
Office Network (LAN)
RFID
Scanner
-> If the person had been here earlier then the
fields would be auto filled.
-> Image will be captured by the attached webcam.
-> A record for this visit will be stored.
-> A message will be transmitted over LAN to
the server for making an Entry for this persons
attendance.
-> Server checks the employee attendance against
the stored rules and may raise an alert if there is
Any violation (Like an employee coming on a day
of holiday etc).
-> Server may also raise an alert under circumstances
Where the employee registers himself while coming
in, but forgets to mark his entry while leaving.

Visitor and vendor access management system

  • 1.
    H A RD W A R E / S O F T W A R E Access Control and Attendance Systems
  • 2.
    S Y ST E M O V E R V I E W TAMS Attendance System
  • 3.
  • 4.
    Hardware Features  Capableof supporting various communication protocols, it can be used in numerous application areas.  - TCP/IP : compatible with access manager(OPTION) - RS-485: Functions with your company’s custom controller - Wiegand ▷ In : Functions with card readers currently in use ▷ Out : Provides various portions of formats, User ID or Card ID output  Suitable for employees’ work hour management with the function keys provided  - Provides four separate keys/ keys can be used in combination (starting work and finishing work, going out, returning to work, etc)  Enhanced user configuration feature (ID digits, sensor option, operation mode, etc)  Enhanced User Convenience  - Auto-on - Provides Shortcut ID / Group Matching Feature - LCD : 2 line graphic LCD (supports various languages) - LED : Status LED 2 each, Authentication result LED 1 each - Voice Guide : Voice Output  Supports various authentication media, making it possible to configure as required by different security methods.  - Fingerprint/Password/RF card (option: HID, MIFARE), combined use is possible
  • 5.
    Technical Specifications Item Description MaterialFingerprint Access Controller Size Optical Type Sensor type Optical Optical Resolution 500 DPI Authentication Mode Mode 1:1, 1:N, Short ID Matching Fact Password, RF card (HID, MIFARE compatible) Time Less than 1 second Operation Mode SO Stand-alone NS Server matching Environment Temperature -20 ~ 60 [oC] Power 12 / 24 [V] Maximum no. of registrations 2,000 Users (1 fingerprint per 1 user) Log 3,000 ea Authentication Rate FRR : 1/1,000 , FAR : 1/100,000 Function Key F1,F2,F3,F4 Communication TCP/IP, Wiegand Input / Output, RS-485 Certification MIC, CE, FCC
  • 6.
    Software  Efficient managementof:  Employees  Visitors  Vendors  Inwards  Compatible to work with:  Biometric  RFID  User name and Password  Compatible with multiple hardware  Cost efficient
  • 7.
    Software Features  Capture: Fingerprint (1 or 2 fingers)  RFID information  Username and password  Webcam image of person  Webcam image of belongings  Generate visitor access permission slip automatically  Intimate the employee whom a visitor has come to meet
  • 8.
    Software Features  Virtuallyunlimited number of finger print storage capability  Virtually indefinite period reports(1 day, 1 week, 1 month, 1 year, N years, period FROM - TO)  Real time alert engine  Robust Alert Engine:  Email notification on rule violation  SMS notification on rule violation  Screen popup at security  Hooter or Visual alerts  Single software setup  One time software setup cost  A sophisticated client server software
  • 9.
    General System Layout Finger Print Scanner Processing machine(PC) Camera Capture Image (On Trigger) Receive Image Receive Identity Send user information to server SERVER Store the attendance information in database Generate and Email REPORTS Continuously check for rule violation. Take action Office Network (LAN) RFID Scanner
  • 10.
  • 11.
  • 12.
  • 13.
    S Y ST E M A R C H I T E C T U R E Visitor Management System
  • 14.
    Finger Print Scanne r Processing machine (PC) Camera Capture Image (OnTrigger) Receive ImageReceive Finger Print The processing machine is connected to the employee database and visitor records database. When a person swipes Finger, a popup display is presented on the attached screen where the registration page is visible. (If the person had been here earlier then the fields would be auto filled). Image will be captured by the attached webcam. A record for this visit will be stored. A message will be transmitted over LAN to the person whom the visitor has come to meet Employee 1 workstation (PC) Employee 2 workstation (PC) Employee 4 workstation (PC) Employee 5 workstation (PC) The concerned persons display shows a pop up message with the image of the visitor. The Employee can then take one of the following actions: 1. ACCEPT 2. REJECT 3. FORWARD This selection by the employees on the pop-up on his screen will be received by the security guard. Based on Employees willingness, a temporary Card will be issued to the visitor. If the employee forwards the visiting request to some Other employee, a request message similar to the one Received by this employee will be generated and sent to the new employee. Office Network (LAN) General System Layout
  • 15.
    FPS SERVER 1. Finger Swipe Detected 2.Server checks in the DB whether it is a new visitor. -> If it is a new visitor then a form is presented to the security guard for entering the details. -> If old visitor, then the history is shown and the same form is auto filled. The security guard can check the details along with the stored photo and select another employee. -> If an office employee who has forgotten / lost his RFID tag. Action may be taken as per company policies Under such circumstances. Cam 3. Capture the image of the visitor and store in the database Employee 1 PC 4. Server generates a request for the host employee for this visitor 5. Employee sends back an acknowledgement to the server Employee X PC 6. If the employee said: ACCEPT: The security guard generates a temporary card with the photograph of the visitor on it and sends the visitor in to meet the host employee. * Once the host employee meets the visitor and his meeting is over, he sends a message to the server, stating that his meeting is over. * The server generates a prompt at security cabin about this. * If the security guard does not respond with a “visitor Left Office” message within the stipulated time frame then the server raises an alert. REJECT: The security guard makes an entry for this visitor in the DB with a rejected remark and sends him back as the permission is not granted. FORWARD: The host employee can forward this visitors request to some other host employee. The new host employee can then follow the same routine. He will also be intimated about who forwarded the request to him. 8. All these transactions should be stored in a DB. Functional Flow Diagram Regular Visitor Employee 1 PC OR 9. REPORTS
  • 16.
    FPS SERVER 1. Finger Swipe Detected 2.Server checks in the DB whether it is a new visitor. -> If it is a new visitor then a form is presented to the security guard for entering the details. -> If old visitor, then the history is shown and the same form is auto filled. The security guard can check the details along with the stored photo and select another employee. Cam 3. Capture the image of the visitor and store in the database Employee 1 PC 5. Server acknowledges the arrival of the client the host employee. 4. Critical Client: Employee fills up the form and sends it to server before the visitors arrival. The window opens and remain at security gate where the client is expected. When the client reaches, his finger print is captured, image is grabbed and pass is generated based on the information that host employee had provided. This allows saving time for the client as the registration process is avoided. 6. All these transactions should be stored in a DB. Functional Flow Diagram Critical Client Visitor
  • 17.
    S Y ST E M A R C H I T E C T U R E Vendor Attendance System
  • 18.
    General System Layout Finger Print Scanner Processing machine(PC) Camera Capture Image (On Trigger) Receive Image Receive Identity -> The processing machine is connected to the visitor records database. -> When a person swipes Finger or flashes RFID card, a popup display is presented on the attached screen where the registration page is visible. SERVER -> Server maintains the attendance record for all the visiting vendors. When a new vendor Employee comes in and marks his identity a record is filled for his entry / exit along with the current time. Office Network (LAN) RFID Scanner -> If the person had been here earlier then the fields would be auto filled. -> Image will be captured by the attached webcam. -> A record for this visit will be stored. -> A message will be transmitted over LAN to the server for making an Entry for this persons attendance. -> Server checks the employee attendance against the stored rules and may raise an alert if there is Any violation (Like an employee coming on a day of holiday etc). -> Server may also raise an alert under circumstances Where the employee registers himself while coming in, but forgets to mark his entry while leaving.