1 / 42

AC100

TA100T. AC100. AC100 Plus. TA100/TA100 DIY. TIME ATTENDANCE MODELS. Time Attendance Models can gather and process information about employees’ attendance using fingerprints, passwords and various cards.

breck
Download Presentation

AC100

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. TA100T AC100 AC100 Plus TA100/TA100 DIY

  2. TIME ATTENDANCE MODELS Time Attendance Models can gather and process information about employees’ attendance using fingerprints, passwords and various cards. The models are not designed to control the door access and, therefore, cannot be connected to door lock system. The main benefit of the Time Attendance models is the prevention of body-punching among employees and recording their attendance with ease and accuracy without the need to manually keying in data. • Advantages of Time Attendance Models • Require low cost compared to other models • Come with stylish and contemporary designs • Easy to install – can be installed on the wall or on the customized flexible stand • Integrate various verification methods – fingerprints, passwords, RFID ID/ HID/ MIFARE cards • Support large number of users and have huge transaction storage capacity • Include useful time attendance features like siren, work codes, receipts printing, extended user ID and DIY attendance report

  3. USEFULFEATURES OF TIME ATTENDANCE MODELS Scheduled Siren / Bells • Can be set to ring bell/siren at scheduled times (for example schedules to notify employees to check in, go for lunch, change shifts etc.) • There are 2 types of schedules that can be preset • Daily schedules– 25 schedules for a day (repetitive everyday) • Weekly schedules–140 schedules for a week (20 schedules everyday day for a week) Work Codes • Work codes predefined by the administrator can be used to define reason for unusual clocking (for example: emergency leave – code 15, going to meet client – code 23 etc) • Easy access to software by administrator or authorized person (for example to predefine the work codes, print report etc.)

  4. USEFUL FEATURES OF TIME ATTENDANCE MODELS Extended user ID • Have extended user ID that range from 5 digits to 9 digits depending on model (the longer user ID allows representation of a wider range of information (for example departments, floors, divisions, dates of enrolment etc.) Printing Receipt • Can print receipt of transaction by connecting to a printer with serial port (for example the terminal can be set to print a receipt after each user verification) • The information printed on the receipt includes user ID, date and time verified and work code. • The printing can be done in 4 different types of format

  5. USEFUL FEATURES OF TIME ATTENDANCE MODEL DIY time attendance report • The time attendance record can be generated and printed out without the need for computer or software. • Administrator registers new users at the terminal that stores the keyed in information • Each time going in or out the users press key button according to work code that defines coming to work, going to lunch, resume from lunch, go home, etc. • Working time is calculated by terminal automatically • The report that shows users’ attendance record can be saved into USB flash disc or directly printed by connecting to the printer.

  6. VERIFICATION METHODS OF TIME ATTENDANCE MODELS Fingerprint matching – 1:1 and 1:N verification Keying in Password – the password length is maximum 5-digits Card Reading – RFID, EM ID, MIFARE and HID cards • RFID card / EM ID card – 64 bits 125kHz (optional to read front 10-digits, last 8-digits or last 5-digits of card) • MIFARE card – MF IC50/70, 13.56MHz (store fingerprints into cards as privacy, optional to store 4 ~ 10 fingerprint in a single card) • HID card – 26-bits HID 1325 Various verification combinations • Fingerprint only, Fingerprint and RFID Card, Fingerprint and MIFARE etc. - Various verification methods and combinations increase security and allow to integrate with or upgrade the existing system (e.g., a system based on RFID cards)

  7. TCP/IP RS232 RS485 DATA TRANSMITION Most common types of connection • TCP/IP (support multiple terminals and widely used in network structures) • RS232 (conventional 9-pin serial port for short distance connection, but not suitable for network structures) • RS485 (With additional devises, supports long distance connection (up to1km) and network structures) Connection without wire • USB flash disk (without connecting by wire, data between terminal • and PC is transferred by USB flash disk)

  8. TA100 FEATURES AND BENEFITS • Supports 1500 or 2800 fingerprint templates depending on the model • Verification by fingerprint, password and cards • Types of supported Cards (TA103R) • RFID / HID / MIFARE • Combination of verification methods (TA103R) • Card only, Card and Fingerprint, Card and Password • Communication by: • TCP/IP, RS232, RS485 and USB flash disk • Time attendance features • Sirens, work codes, receipt printing, extended user ID • Target: Factories, small and medium offices, training centers, schools, retail outlets etc.

  9. TA100 DIY • Supports 800 fingerprint templates • Verification by fingerprint and password • Time attendance features • Siren • Communication by: • TCP/IP and USB flash disk • Do-It-Yourself (DIY) concept • Target: small workshop and factories, small offices, retails outlets, food stalls FEATURES AND BENEFITS

  10. AC102 Plus • Enhanced with better Fingerprint Scanner • URU Scanner • Better capturing image • Higher sensitivity • Supports 1500 fingerprint templates • Verification by fingerprint and/or password • Communication by: • TCP/IP, RS232, RS485 and USB flash disk • Time attendance features • Work codes and receipt printing. • Target: Factories, small and medium offices, training centers, schools, retails outlets etc. FEATURES AND BENEFITS

  11. R2i M2/R2 AC900 Q2 AC800 Plus

  12. ACCESS CONTROL AND TIME ATTENDANCE MODELS Access Control and Time Attendance models provide a complete solution for both door access control and employees’ time attendance recording. Target market: small and medium offices, warehouses, retails outlets, training centers, schools, institutes etc. • Benefits • Complete solution for both Time Attendance and Access Control • Stylish and robust design • Easy installation (wall mounted design, flexible support stand, direct to door lock system, or with AdapTec AC) • Various verification methods – fingerprints, passwords and RFID/ HID/ MIFARE cards • Large users capacity and transaction storage • Integrated useful time attendance features – work codes, receipts printing, extended users ID, short message display • Integrated useful access control features – antipassback, door sensor, alarm output, tamper switch, duress option, master-slave concept.

  13. USEFUL FEATURES OF TIME ATTENDANCE MODELS Work Codes – used to describe reason for unusual clocking Receipt printing – to issue receipt for users after access verification Extended user ID – extended to 9 digits to allow representation of a wider information Short Message Display • Allows to publish short messages on the screen - Public message – displayed to all users - Personal message – displayed to selected users only • The massage can be set for a certain time period and after the predefined date, the message will be automatically deleted. • Useful to pass information to all employee during access and verification (e.g., “Replacement Holiday on Monday”, “Happy birthday to Allan” etc.)

  14. Company anniversary today. Free Lunch in canteen Happy Birthday from Administration User places finger on the scanner for verification Edmond places finger on the Scanner for verification Short Message Displaying Public message - To display message to users after verification User is verified Edmond is verified Personal message - To display message to selected users after verification

  15. USEFUL FEATURES OF ACCESS CONTROL Door Sensor • In case the door is opened without verification or force opened, the terminal triggers alarm system. • If the door is not closed for certain predefined time, the terminal will alert the user and trigger alarm if the user ignores the alert (to set up this function, a door sensor and connection to alarm system are required) Tamper Switch • Terminal will trigger alarm system through release of tamper switch in case an unauthorized person tries to dismantle or tamper it

  16. USEFUL ACCESS CONTROL FEATURES Duress option • User is authorized to trigger alarm during emergency • Do not require a special password, only a duress finger or password • The duress finger or password - Enrolled during registration - To be used only in emergency cases to trigger alarm system Alarm output • 2 types of signals, NO (normally open) and NC (normally closed) • Must be connected to alarm system

  17. USEFUL ACCESS CONTROL FEATURES Antipassback • Requires 2 terminals to guard the entrance • User must be verified when coming in or going out • If user missed verification, the terminal blocks user and displays “Antipassback” • This feature prevents tail gating • System software generates Entry-Exit report that shows user’s coming in and going out time slots in pairs Master-slave • Requires 2 terminals to guard the entrance • User must be verified to open the door, but the terminal does not block users in case of missed verification • This feature prevents unauthorized person to come in or leave the guarded zone. • The slave terminal is with optical scanner and without LCD or keypad • Easy installation – requires a cable to link slave terminal to master terminal • Provides a complete access control system with low cost

  18. ENROLLMENT & VERIFICATION METHODS Fingerprint - 1:1 verification and 1:N verification Password - maximum 5-digits Card reading – RFID/EM ID, MIFARE and HID cards • RFID card/ EM ID cards – 64-bits 125kHz (optional to read front 10-digits, last 8-digits or last 5-digits of card) • MIFARE card – MF IC50/70, 13.56MHz (store fingerprints into cards as privacy, optional to store 4 ~ 10 fingerprints in a single card) • HID card – 26-bits HID 1325 Verification combinations • Fingerprint only, Fingerprint and RFID Card, Fingerprint and MIFARE etc. - Various verification methods and combinations increase security and allow to integrate with or upgrade the existing system (e.g., a system based on RFID cards)

  19. RS232 TCP/IP RS485 DATA TRANSMITION Most common types of connection • TCP/IP (support multiple terminals and widely used in network structures) • RS232 (conventional 9-pin serial port for short distance connection, but not suitable for network structures) • RS485 (With additional devises, supports long distance connection (up to1km) and network structures) Connection without wire • USB flash disk (without connecting by wire, data between terminal • and PC is transferred by USB flash disk) Professional wiring types • Wiegand 26-bits input-output (to work with 3rd party controller or device)

  20. AC900 FEATURES AND BENEFITS • Slim and stylish design • Supports 1500 or 2800 fingerprint templates • Verification by fingerprint and/or password • Communication • TCP/IP, RS232 and RS485 • Wiegand 26-bits output • Time attendance features • Work Codes, receipt printing and extended user ID • Access control features • Door sensor, tamper switch, duress option and alarm output • Target market: small and medium offices, warehouses, retail outlets, training centers, schools, institute etc

  21. R2 FEATURES AND BENEFITS • Slim and stylish design • Supports 3000 fingerprint templates • Verification by fingerprint, password and RFID/ HID/ MIFARE cards • Combination of verification methods • Fingerprint or card only, Card and Fingerprint, Card and Password, etc. • Communication • TCP/IP, RS232, RS485 and USB flash disk • Wiegand 26-bits input-output • Time attendance features • Work Codes, receipt printing, extended user ID, short message display • Access control features • Door sensor, tamper switch, duress option, alarm output, Antipassback, master-slave concept • Target market: small and medium offices, warehouses, retail outlets, training centers, schools, institute etc.

  22. M2 FEATURES AND BENEFITS • Robust design – zinc alloy casing • Supports 3000 fingerprint templates • Verification by fingerprint and/ or password • Combination of verification methods • Fingerprint only, fingerprint and password etc. • Communication • TCP/IP, RS232, RS485 and USB flash disk • Wiegand 26-bits input-output • Time attendance features • Work Codes, receipt printing , short message display, extended user ID • Access control features • Door sensor, tamper switch, duress option, alarm output and Antipassback, master-slave concept • Target market: small and medium offices, warehouses, retail outlets, training centers, schools, institute etc.

  23. R2i FEATURES AND BENEFITS • Purely fingerprint capturing station (No storage for fingerprint templates or transaction logs) • Verification station for RFID/ HID/ MIFARE cards • Suitable as slave unit to work with R2, M2, Kadex, i-Kiosk 100 and i-Kiosk 100 Plus • Captured fingerprint is send to the master for verification (data stored in the master unit) • Door lock system controlled by master unit • Simple connection – only a special cable to connect from R2i to the master unit, without extra power cable or wiring. • Target market:small and medium offices, warehouses, retail outlets, training centers, schools, institute etc

  24. Timeline 100 Kadex

  25. Timeline 100 • Supports 10,000 cards • Verification by Cards and/or Password • RFID / HID/ MIFARE cards • Communication • TCP/IP, RS232, RS485 and USB flash disk • Time attendance features • Sirens, work codes and receipt printing. • Target: Factories, offices, training centers, schools, retails outlets etc. FEATURES AND BENEFITS

  26. Kadex FEATURES AND BENEFITS • Supports 30,000 cards & 100,000 logs • Verification by RFID/HID/MIFARE Cards and Password verification • Combinations of verification • Fingerprint only, fingerprint and password, etc. • Communication • TCP/IP, RS232, RS485 and USB flash disk • Wiegand 26-bits input-output • Time attendance features • Work Codes, receipt printing, short message display, extended user ID • Access control features • Door sensor, tamper switch, duress option, alarm output Antipassback, master-slave concept • Target market: small and medium offices, warehouses, retails outlets, training centers, schools, institute etc

  27. Q2i/TA200 Plus i-Kiosk 100 i-Kiosk 100 Plus

  28. MULTIMEDIA MODELS • Multimedia models are the latest development to go into a new era of biometric industry • Come with 3.5” or 8.0” 65k TFT LCD screen – for better visual effects • Photo display - allows to add in company photo or advertisement as wallpaper or screen saver • Movies playback – to display company advertisement video during idle mode • Run on LINUX platform – fast processing and embedded with more powerful features • Interactive display and icons – easy and convenient to operate • Shortcut key buttons – fast access to most frequent used option • Photo capturing during user enrollment & verification – to be used as a reference • Multimedia features – photo displaying, short messaging and music playback • Supporting Cards – RFID/ HID/MIFARE cards • Optional with WiFi or GPRS connection

  29. Photo displaying and music playback • For example to display company photo or music during idle mode or display company information

  30. Company anniversary today. Free Lunch in canteen Happy Birthday from Administration User places finger on the Scanner for verification Edmond places finger on the Scanner for verification Short Message Displaying Public message - To display message to users after verification User is verified Edmond is verified Personal message - To display message to selected users after verification

  31. TA200 Plus FEATURES AND BENEFITS • Supports 1500 fingerprint templates • Verification by fingerprint, password and cards • Supporting Cards – RFID/ MIFARE/ HID • Communication – TCP/IP, RS232, RS485, USB flash disk and WiFi/GPRS • Time attendance features • Work Codes, receipt printing, short message display, extended user ID • Multimedia features – short message display, photo display • Target market:small and medium offices, retail outlets, training centers, institute etc.

  32. Q2i FEATURES AND BENEFITS • Upgraded version of TA200Plus • Supports 1500 fingerprint templates • Verification by fingerprint, password and cards • Supporting Cards – RFID/ MIFARE/ HID • Communication – TCP/IP, RS232, RS485, USB flash disk, WiFi/GPRS • Time attendance features • Work Codes, receipt printing , short message display, extended user ID • Access control features • Door sensor, tamper switch, duress option, alarm output, Antipassback, master-slave concept • Multimedia features – short message display, photo display • Target market: small and medium offices, warehouses, retail outlets, chain stores, training centers, schools, institute etc.

  33. i-Kiosk 100 FEATURES AND BENEFITS • Unique design with 3.5” TFT color LCD display • Supports 1500 fingerprint templates • Verification by fingerprint, password and cards • Supporting Cards – RFID/ MIFARE/ HID • Communication – TCP/IP, RS232, RS485, USB flash disk, WiFi/GPRS • Time attendance features • Work Codes, receipt printing , short message display, extended user ID • Access control features • Door sensor, tamper switch, duress option, alarm output, Antipassback, master-slave concept • Multimedia features – short message display, photo display • Target market: medium and big offices, warehouses, retail outlets, chain stores, training centers, schools, institute etc.

  34. i-Kiosk 100 Plus FEATURES AND BENEFITS • Ultramodern design with 8.0” TFT color LCD display • Supports 1500 fingerprint templates • Verification by fingerprint, password and cards • Supporting Cards – RFID/ MIFARE/ HID • Communication – TCP/IP, RS232, RS485, USB flash disk, WiFi/GPRS • Time attendance features • Work Codes, receipt printing , short message display, extended user ID • Access control features • Door sensor, tamper switch, duress option, alarm output, Antipassback, master-slave concept • Multimedia features – short message display, photo display, movie playback • Target market: medium and big offices, warehouses, retail outlets, chain stores, training centers, schools, institute etc.

  35. Keylock 6600 Keylock 6600A Keylock 7700 H2i

  36. ACCESS CONTROL MODELS • Function as a simple door access control without transaction logs storage • Low cost solution to control door access • Simple installation, without wiring or PC connection (Can be installed directly to the existing door holes of the conventional knob door lock)

  37. H2i FEATURES AND BENEFITS • FingerPrint Optical Scanner without LCD or keypad • Comes with Card writer/reader for RFID/HID/MIFARE cards • Simple handling – 2 buttons and voice guiding instructions • Supports 1500 fingerprint templates and 30000 transaction logs • Used as a simple access control terminal • For coming in-going out control system, 2 units of H2i are required at the door access • Works as a slave terminal for master terminal • Can be linked to computer with USB cable to download/upload data and configurations

  38. Keylock 6600 Keylock 6600A FEATURES AND BENEFITS • Mechanical fingerprint door lock • Supports 75~150 fingerprints and 78 Passwords • Powered by four 1.5V alkaline batteries • Features mechanical key and extra power input for backup battery • Used as simple door control (no transactions record) • Can be installed as a replacement of conventional knob lock (using same door holes)

  39. Keylock 7700 FEATURES AND BENEFITS • Mechanical fingerprint door lock with LCD display and voice greetings • Support 450 fingerprints, 240 Passwords and MIFARE card • Powered by four 1.5V alkaline batteries • Features mechanical key and extra power input for backup battery • Keep transaction 50000 transaction logs that can be downloaded into software for analysis • Can be installed as a replacement of conventional knob lock (using same door holes)

  40. OFIS OFIS TA

  41. OFIS OFIS TA FEATURES AND BENEFITS • Online FingerPrint Identification System • For software developer to develop security login system to replace conventional password system • Supports various programming languages • Comes with a sample • Server-Client package • Can operate with TCMS V2 • As desktop station to capture users’ attendance • As enrollment and verification station

More Related