SlideShare a Scribd company logo
1 of 16
Download to read offline
www.avi-infosys.com
ISO
9001:2008
Certifie
d
IT Solutions P
rovider
Product
Catalouge
World Class
Biometric Solutions
AVI INFOSYS - Profile
AVI INFOSYS is an ISO 9001:2008 Certified
Biometric Solutions Provider Company based in
Dubai, United Arab Emirates.
“AVI INFOSYS” is pleased to respond to Clients Project
Requirements for Comprehensive and Total Integrated
Solution for Enterprise-Wide Management Information
Systems. Our review of the Market Place indicates that
many Vendors can provide the Automated Systems;
however only a few, such as “AVI INFOSYS” is Capable
of Assisting Client in Plans, Develops and Implements
of such a Highly Complex Biometric Security
Management & Information Technology Projects.
“AVI INFOSYS” business is to Partner with Clients
to achieve Breakthrough Performance through the
intelligent use of the Technologies. “AVI INFOSYS”
provides:
	 Business and Information Technology Consulting
	 Reusable and Customized Software
	 System Integration Services in Biometric Field for
	 Medium to Large Local, Regional and International
	 Organizations
“AVI INFOSYS” has successfully Developed, Integrated
and Delivered Systems to Clients, including several in
the Middle East; our successful accomplishments are
based on four corporate strengths.
	 Partnership based of Trust
	 Dedication to deliver on Commitments
	 Focused Industry Expertise
	 Linking People, Processes, Organizations and
Technologies The Achievement of Breakthrough
Performance requires
	 Forward Looking & Practical Ideas for Improving
Business Processes
	 Intelligent use of Technology to enable Improved
Processes
	 Committed, Trained People in Appropriately Aligned
Organizations
“AVI INFOSYS” is a leader in Partnering with clients
to achieve breakthrough performance through the
intelligent use of Information Technology. “AVI
INFOSYS” is Trusted and Valued by clients for the
High Quality Services and Commitment to deliver real
results.
2
3
“AVI INFOSYS” products and Services
	 Biometric Fingerprint Identification Solutions
	 Biometric Access Control Solutions.
	 Smartcard based Prepaid and Loyalty Rewards
Systems
	 Web based Time Attendance Software and Solu-
tions
	 Smartcard /RFID Card based Solutions
	 Enterprise Firewall Solutions
	 Secure Networking, Network Security
	 Biometric Based Access Control / Encryption Solu-
tions Smartcard Production and Printing Services
	 Secured VPN Solutions
	 IT Infrastructure Security Solutions
	 Special Capabilities & Expertise
	 Enterprise - Wide Information Systems (EIS)
	 Management Information Systems (MIS)
	 Decision Support Systems (DSS)
	 Preventive Maintenance Management Systems
(PMMS)
	 Hospitality Information Systems (Hospital &
Hotel) - (HIS)
	 Industries cover by “AVI INFOSYS” Applications
& Software Development Solutions
	 Government
	 Financial Institutions / Banks
	 Industrials / Productions
	 Hospitality (Hospitals & Hotels)
	 Educational (University & School)
	 Construction & Contracting
	 Legal, Library & Case-Handling
	 Multi Offices Organizations
	 Increase security - Provide a convenient and low-
cost additional tier of security.
	 Reduce fraud by employing hard-to-forge
technologies and materials. For e.g. Minimise the
opportunity for ID fraud, buddy punching.
	 Eliminate problems caused by lost IDs or forgotten
passwords by using physiological attributes. For
e.g. Prevent unauthorised use of lost, stolen or
“borrowed” ID cards.
	 Reduce password administration costs.
	 Replace hard-to-remember passwords which may
be shared or observed.
	 Integrate a wide range of biometric solutions and
technologies, customer applications and databases
into a robust and scalable control solution for facility
and network access
	 Offer significant cost savings or increasing ROI
in areas such as Loss Prevention or Time &
Attendance.
	 Unequivocally link an individual to a transaction or
event.
4
Management & Technology Solutions
		State-of -the-Art Technology
		Open Systems Architecture & Environment
		Portable on any Platform and Scalable
		Adaptable to Newer Technology
		Integrating information: Technology, Systems and
Management
“AVI INFOSYS” assists clients in…
	 Responding to Competition
	 Gaining or Maintaining Market Leadership
	 Achieving Grater Efficiencies
	 Dramatically Improving Performance
Putting It All Together
IN the complexity of todays Information Technology,
many elements must come into play before an integral
whole is achieved. These elements vary in emphasis
from business to business, but to the solution provider
each has vital role in the final product: choice of
hardware and peripherals, communications setup,
networking, RDBMS, operating system, Arabization,
understanding of requirements and - foremost - the
users.
“AVI INFOSYS” has the experience and track record to
prove it. We have kept abreast with the ever-evolving
technology. We have migrated / converted systems from
proprietary to open platform, from 3GLs to RDBMS
and CASE Tools, and from simple networks to client-
server architecture.
“AVI INFOSYS” Successes
Our successes are based on achieving real result for
the clients, maintaining a High Standard of customer
satisfaction and establishing Long-Term client
relationships.
“AVI INFOSYS” has assist clients in making Intelligent
Investment on Information Technology, deriving the
highest returns possible and helps clients to understand
the changes they needs to make their organizations to
operate efficiently and effectively.
Our Approach and Methodology
The following processes (We called it “A Dozen of
Success”) will be adopted by “AVI INFOSYS” toward
Developing the IT Strategy for the clients…
1.	 Define High Level business objectives
2.	 Assess current Information System (IS) support
and services
3.	 Determine future IS support and services
required
4.	 Evaluate potential contribution of IS department
and involved units
5.	 Analyse gap between current and future systems
6.	 Prioritise development and produce plan
7.	 Implement improved methods for Development
8.	 Implement improved Project Management
methods
9.	 Plan immediate Developments
10.	 Implementation
11.	 Educate and Trains end- users and
administrators
12.	 Maintain Customer Support and Services.
5
AVI-FTA-507
AVI-TEC™ Fingerprint based Time
Attendance Systems:
Features:
		Simple and durable device with a robust inbuilt
optical scanner
		Records up to 50000 / 80000 / 100000 transaction
records
		User Capacity - 1500 / 2000 / 2500 identities
		Free SDK Available for Software Customization
		Supports multiple companies of one organization
at a single location
		Supports one company at multiple locations.
		Supports multiple input units installed for one
company
		Company Rules, Time Management Parameters
can be easily customized on the device
		Easy to manage Employees, Departments and
Multiple Shifts
		Supports leave management
		Flexibility of Reports generated by the Software
- Daily Attendance Statistics Report, Attendance
General Report, Staff On- Duty/Off Duty Report
Department Attendance Report, etc.
		Data available in excel/html/ASCII format for
further calculation
		Seamless integration with various Accounting and
Payroll Packages
Technical Specifications:
Size 185¨L~123W~43(H)mm
User Capacity 1500 / 2500/5000
Transaction Storage 50000/80000/125000
Algorithm version 2005 Version new algorithm
Hardware platform ZEM100
Communications RS232, RS485, TCP/ IP (UDP Protocol)
Power 5V 2A POE: Power Over Ethernet (Optional)
Identification time <=2s
FAR <= 0.0001%
FRR <= 1%
Operating Temperature 0 C- 45C
Operating Humidity 20%-80%
Sensor Error free Optical Sensor
Language
English , Simplified Chinese, Traditional Chinese ,other Languages Optional: Simple
access control (Electro control Directness relay output 3A/12VDC)
Benefits:
	 Built in strong U.S.A Intel32bit fingerprint
embedded standalone module (ZEM100),it is easy
to integrate with various systems
	 Support finger 360 degree identification, easy
to use. Sensor window cotton improving image
quality, accepts dry, wet fingers
	 CMOS automated exposure and intelligent
compensation improved image quality
	 Adjusting image distortion, assure fingerprint
matching consistency
	 Suggesting customers cooperating as ODM or
OEM, providing system analysis, mould-making,
circuit design, producing-assembly, package
design, etc, linear service
6
AVI-FTA-508
AVI-TEC™ Fingerprint & RFID Based
Time Attendance System.
Features:
		Supports both - Fingerprint & RFID (Smartcards)
for attendance recording purposes
	 Records up to 50000 / 80000 / 100000 transaction
records
	 User Capacity - 1500 / 2000 / 2500 identities
	 Free SDK Available for Software Customization
	 Supports multiple companies of one organization
at a single location.
	 Supports one company at multiple locations.
	 Supports multiple input units installed for one
company.
	 Company Rules, Time Management Parameters
can be easily customized on the device
	 Easy to manage Employees, Departments and
Multiple Shifts
	 Supports leave management
	 Data available in excel/html/ASCII format for
further calculation
Technical Specifications:
Size 185¨L~123W~43(H)mm
User Capacity 1500 / 2500
Transaction Storage 50000
Algorithm version 2005 Version new algorithm
Hardware platform ZEM100
Communications RS232, RS485, TCP/ IP (UDP Protocol)
Power 5V 2A POE: Power Over Ethernet (Optional)
Identification time <=2s
FAR <= 0.0001%
FRR <= 1%
Operating Temperature 0 C- 45C
Operating Humidity 20%-80%
Sensor Error free Optical Sensor
Language English , Simplified Chinese, Traditional Chinese ,other Languages Optional: Simple
access control (Electro control Directness relay output 3A/12VDC)
iGuard™ Biometrics Fingerprint/PIN/Smartcard based
Time Attendance and Access Control System
with Web based Software
iGuard™ Technology Overview
Each iGuard™ Biometric / Smart Card Security Appliance has a built-
in Web Server enables all the computers in the corporate network
to directly simultaneously access the device using any Internet
Browser, such as Microsoft Internet Explorer Netscape Navigator.
	 Flexibility of Reports generated by the Software
- Daily Attendance Statistics Report, Attendance
General Report, Staff On- Duty/Off Duty Report
Department Attendance Report, etc.
	 Seamless integration with various Accounting and
Payroll Packages
7
Different computer platforms such as Apple Macintosh, Microsoft Windows Linux
machines can access the device. No additional software is required. So whether you
are in an airport lounge or a hotel room, you can always check if your employees
are already in the office or not, and you can even control, modify or disable their
access rights to your office remotely via internet connection provided your iGuard
Biometric / Smart Card Security Appliance is connected to an external IP address
or your network is available through a VPN connection that is reachable from your
location.
iGuard™ Super Master is a back-end server of iGuard™. With Super Master
installed, the maximum no. of users of iGuard™ Master / Slave network will be increased to 5000 or up. And, Super
Master is designed base on the iGuard™ patented embedded Web Server technologies, which enables all computers,
such as Apple Macintosh, PCs & Unix machines, in the corporate computer network to setup, maintain and access
the information of the device simultaneously using the well-known Internet Browser.
iGuard™ Features Multi Factor Authentication:
With iGuard, users can be authenticated and verified
through Fingerprint, Smartcard or Password. And
depending on the different time period, you can set
up the iGuard that the users can just simply presents
his smartcard to get authorized (such as during high-
traffic period), or requires the high-security fingerprint
verification (such as after office hours or during
weekends and holidays).
Access Rights:
When you can easily and conveniently assign different
access rights to your employees, you can plan your
security better and maximize the effectiveness of the
human resources. And with the built-in Web Server
technology, iGuard empowers you to manage the
access rights of each individual employees or a group
of employees easily anytime, anywhere using any web-
enabled computers or mobile devices. For example,
you can assign the staff members of the marketing
department the rights to get in the office premises
during weekdays from nine to five only, or prevent a
particular employee from entering the computer server
room. Reports: iGuard includes three built-in reports:
Access Log, Attendance Report & Daily In/Out report,
that can be accessed via any web-enabled computer
with web browser. Should more sophisticated reports
be required, such as for the payroll purposes, the
information can be downloaded and saved in Microsoft
Excel format and in plain text format. In addition, the
access records can be saved in any PC in the network
in the popular ODBC database format in real-time
manner, and other applications can conveniently
obtain the information from the ODBC (the required
software, iServer is available free-of-charge in our
download page)
Economical:
All the necessary hardware and software is built-in
to the device, including the hardware to connect the
system to the corporate network. All you need to do is to
plug-in the popular RJ-45 network cable to the back of
the device. No other hardware and wiring is necessary.
In contrast, all other existing security systems use the
old RS232 & RS485 wiring system to connect to the
dedicated computers (not to the corporate network),
and it usually involves a lot of extra wiring works.
8
Small Footprint:
iGuard is a wall-mounted unit elegantly designed with extremely small
footprint. In fact, it is the smallest stand-alone biometrics device available
in the market today. It can be mounted easily and conveniently without
requiring a lot of space.
Simplicity:
iGuard is an Internet-Ready Security System, and is the first and the only
network appliance security product in the market that uses TCP/IP as the
protocol to communicate with other iGuards and the outside world. The
protocol enables the device to directly connect to the corporate network
via the existing cable wiring. And since the TCP/IP protocol is the Internet
protocol, it allows all computers in the corporate network to access the
device using the Internet Browser software. As a result, users do not need
to learn to use a new software to access and administer the device, and
most users can start using the device in minutes. In contrast, all other
similar security systems use proprietary protocol & wiring, and proprietary
software is required to access these systems and for compatibility purposes,
iGuard also supports conventional interfaces including Wiegand, RS-485
& RS-232.
How it works as an Access Control System
iGuard analyzes & compares a persons fingerprint
against the previously enrolled record. If the two
fingerprints match, the person is authenticated. And if
the time is within the authorized period for entry, the
device will signal release the electric door lock.
The iGuard Security System analyzes and compares
a persons fingerprint against the previously enrolled
record. If the two fingerprints match, the person is
authenticated. And if the time is within the authorized
period for entry, the device will signal and release the
electric door lock.
		Access Time restriction - you can define the
authorized time for each individual or for a group of
individuals.
		Terminal restriction - you can specify who has the
rights to access a particular terminal. It is useful in
a multi-device environment, where multiple doors
are controlled by different devices.
		Password/Fingerprint Access - you can define the
period in which password can be used instead of
fingerprint for access. This is particularly useful
if you want to just use password to access during
normal office hours, but to restrict the access to
authorized people only after office hours.
The Access Control Mode controls the employees from
entering the business premises. The system controls
the electronic door strike to lock / unlock the door.
Users can be assigned to different departments and
the authorized time for members in each department
can also be controlled. In a multi-device environment,
the access rights for each department in accessing
different terminals can also be assigned.
STEP 1
Enter Employee ID
STEP 2
Place the thumb on the
sensor
STEP 3
The door is unlocked
if authenticated
We are currently using SecuGen®
SDA03M sensor for LM520-FOSC
(FBI Certified, FIPS 201/PIV
Compliant, GSA APL Listed).
A new model with SDA04 sensor
(FBI Certified, FIPS 201/PIV
Compliant, GSA APL Listed) will be
introduced in mid. 2010 to address
the high end market.
The SecuGen SDA03M is very
rugged, accurate, and affordable
as it is designed for long-lasting
performance in high traffic and
tough environments.
“Lucky Technology has deployed
earlier generations of the iGuard
with the United States Air
Force and the US Army and in
Afghanistan and thousands of
schools, universities and business
buildings worldwide,” stated Wayne
Wilkerson, President of Lucky
Technology’s US Operations.
SecuGen’s OEM sensors are used
by device manufacturers all over
the world and are widely recognized
as among the most effective and
affordable solutions for successfully
integrating fingerprint capture and
matching into third party devices.
9
How it works - as a Time Attendance System
When configured as a Time Attendance System, a user
can specify whether he/she is clocking-in or clocking-
out. By using fingerprints to determine identity,
buddy-punching problems can be totally eliminated
as well as other fraud. Attendance of each employee
is printed on the attendance report. The attendance
report is particularly useful for payroll purposes. Wages
and salaries can be paid according to the employees
worked hours, overtime etc. Wages and salaries can
be integrated with a smart card or automatic deposit
payroll system.
FP = Fingerprint Only iGuard
SC = Smart Card Only iGuard
FSC = Fingerprint and Smartcard iGuard
iGuard™ Power and Strike Units
iGuard™ Network Appliance
Power Options
Overview
The AL400ULX power supply converts a 115VAC /
60Hz input, to a 4 amp of continuous supply current
@ 12VDC or 3 amp of continuous supply current at
24VDC power limited output, (see specifications).
How it works
Main iGuard
Entrance Door
Access Log Report
Time/
Attendance
iGuard
Working Area
Secure Area
(Access to designated
personnel only)
High Secure Area
(Access to designated
personnel only)
Technical Specifications
	 RF contactless operates at 13.56 MHz
	 Standard NXP Mifare Card
	 1K bytes,15 sectors, 48 bytes each
	 R/W is protected by encryption key, 48 bit triple DES
	 Raw data is scrambled by 64 bit DES.
	 High Security, suitable for all applications.
	 Free sectors can be reserved for multiple any purposes
	 Print your own brand on this card
Smartcards for iGuard™ readers
10
SC Series is an import proximity T&A and A&C system, as it adopts
proximity communication PSK and encrypt professional proximity
card to check ID, which is much safer and more credible than those
without encrypt proximity cards. Recheck the 5 PIN inputted by card
holder, which is a senior and safe equipment, achieve the professional
management of automatic and modern C&A and T&A.
In the operation process, SC Series could offer 3 different manners. The
first one is the most convenient one--use proximity card directly; the
second way is to use both card and 5 No.¡¯s code, which is the most
precise one; the third way is the most simplest--use 1-5 No.¡¯s code.
iGuard™ Technical Specifications:
FP / SC / FSC Super Master
Power 12VDC, 600mA 12VDC, 800mA
Fingerprint Sensor Yes / n/a / Yes n/a
Contactless Smart Card reader writer (built-
in) n/a / Yes/ Yes n/a
Web and Database Server Built-in
Network Security (SSL) Optional
Auto Data Synchronization (i.e., master / slave
configuration) Yes
Maximum Transaction Records stored 10,000 20,000
Static / Dynamic IP Assignment Yes(Support existing DHCP Server)
Non-volatile memory 16MB
Computer Supported (with Internet Browser)
Macintosh, Windows 95/98/NT/ME/XP, Linux
and Unix Machine
Valid Characters for Employee ID 0-9, A-B(maximum - 8 characters
Display 20 x 2 LCD with Backlight n/a
LCD Multi-Lingual Yes n/a
Two Finger Enrollment Yes
Fingerprint Sensor Type Capacitive n/a
Fingerprint Sensor Resolution 500dpi n/a
Fingerprint Sensor scan area (mm) 12 x 15 n/a
Image Capture Time < sec. n/a
Verification Time < 1 sec. n/a
False Rejection Rate < 1 % n/a
False Acceptance Rate < 0.01% n/a
Auto-match Count 30 n/a
Network Protocol TCP/IP, Wiegand, RS485, RS232 (Optional)
Network Interface Ethernet (100-Base T)
Real Time Clock Last for approx. 2 days without power
External Controls
Door Strike
Open-Door Switch
Break-in Alarm
Door Status n/a
Dimension (mm) 105(W) x 38(D) x 150(H) 254(W) x 193
AVI-SC 509
AVI-TEC™ SC Series is a core RFID Access Control & Time Attendance system
11
When the user is threaten to open the door, a kind of intimidating card or code could be used to output a soundless
alarm signal through auto-dial machine which was connected with the alarm system. The anti-pass function is
optional, which can prevent those person who has no authorization but through following others enter the room. SC
Series¡¯ input and output interface could be used for linking other exterior system accessories.
System Specification:
		User Capacity: 30000; Transaction Capacity: 50000
		With 10 cm Proximity Reader and LCD inside
		Standalone or contacted PC with RS232 or RS485 or TCP/IP
		Download records with U-Disk
		Identification: Standalone proximity card, proximity+5 bits code, 1 to 5 bits PIN number.
		Users can set up threatened alarm and code by themselves.
		Access Control: 50 Time Zone, 5Grouping, 10 Combination, support many fingerprint access.
		Operated in night with 16 bits backlight keyboard.
		Authentication: UL, CE, FCC, MIC
	 The Hardware Design adopts international fashionable POE, applying
professional anti-static and anti-jamming protection. All input/output
are designed with over-voltage & circuit protection, illegal-dismantle
alarm & professional alarm system, voltage control & compliable
surveillance system. Besides, it’s completely waterproof. All these
advantages make an excellent performance.
Card Holders 30000 cards
Transaction Capacity 50000 records
CPU 64bit ZK6001 Microprocessor
Hardware ZEM500(Embedded Linux O/S)
Aceess Mode Card Only, PIN Only, Card+PIN
Read Range 10-15 cm
I/O Interface RS232/485
Baud Rate 9600-115Kbps programmable
Ethernet 10/100M
Wiegand I/O any bit
USB Mini-USB 2.0 port
Access Control Function 50time zones, 5groups, 10open door conbination, supports multi-users enter.
TTL for connecting to lock, door sensor, exit button, alarm
LCD Panel LCD Panel: 4 line, 16 character each line(User name, ID number, time, date,
states)
Keypad 4*4 metal keypad with 4 function keys
Audio Visual Indicator Red LED(Access denied)/ Green LED(Access granted) with Audible Beep
Housing Material ABS ¡¤ Power Requirement: 12V DC, 400mA
Power Requirement 12V DC, 400mA
Operating Temperature 0¡ãC-45¡ãC Operating Humidity: 20%-80%
Optional Webserver, Antipass-back, Multi-language display
Technical Specification
12
Technical Specifications:
Hardware platform ZEM500
Operating system Linux
User capacity 1500
Transaction capacity 50000
Sensor ZK Sensor
Algorithm version 2007 Version ZK new algorithm
Access Control 50 Time Zone, 5 Grouping, 10 Combination, Holiday Management, support
many fingerprints access, support standalone work
Communicational TCP/IP or RS232 and RS485
Keyboard and Display LCD with 80 character and figure keypad
Power 12 V
Identification speed < =2 seconds
FRR <=1%
FAR <=0.0001%
Temperature operating 0 degree centigrade - 45 degree centigrade
Humidity operating 20%-80%
Language Simplified Chinese, Traditional Chinese, English, Other Languages
Standard Wire Doorbell, Wiegand OUT, Wiegand IN
Optional ID/HID/Mifare card, Web server, USB host, Short message, Work code, RIS,
Antipass-back
AVI-FP-ID-510
AVI-TEC™ Fingerprint based Time Attendance
& Access Control Systems:
Features:
		Simple and durable device with a robust inbuilt
optical scanner
	 Records up to 50000 transaction records
	 User Capacity - 1500 identities
	 Free SDK Available for Software Customization
	 Supports multiple companies of one organization
at a single location
	 Supports one company at multiple locations.
	 Supports multiple input units installed for one
company.
	 Company Rules, Time Management Parameters
can be easily customized on the device
	 Easy to manage Employees, Departments and
Multiple Shifts
	 Supports leave management
	 Flexibility of Reports generated by the Software
- Daily Attendance Statistics Report, Attendance
General Report, Staff On- Duty/Off Duty Report
Department Attendance Report, etc.
	 Data available in excel/html/ASCII format for
further calculation
	 Seamless integration with various Accounting and
Payroll Packages
13
BioLook algorithm Technical Specifications
Recommended minimal image size 640 x 480 pixels
Multiple faces detection time
(using 640 x 480 image) 0.07 sec.
Single face processing time
(after detecting all faces) 0.13 sec.
Matching speed 100,000 faces/sec.
Size of one record in the database 2.3 Kbytes
Maximum database size unlimited
Benefits:
	 Built in strong U.S.A Intel32bit fingerprint embedded standalone module (ZEM100),it is easy to integrate with
various systems
	 Support finger 360 degree identification, easy to use. Sensor window cotton improving image quality, accepts
dry, wet fingers
	 CMOS automated exposure and intelligent compensation improved image quality.
	 Adjusting image distortion, assure fingerprint matching consistency
	 Suggesting customers cooperating as ODM or OEM, providing system analysis, mould-making, circuit design,
producing-assembly, package design, etc, linear service
Features:
	 Simultaneous multiple face processing. BioLook
performs fast and accurate detection of multiple
faces in live video streams and still images. All
faces on the current frame are detected in 0.07
sec. and then each face is processed in 0.13 sec.
	 Live face detection. A conventional face
identification system can be easily cheated by
placing a photo of another person in front of a
camera. BioLook is able to prevent this kind of
security breach by determining whether a face in a
video stream belongs to a real human or is a photo.
	 Face image quality determination. A quality
threshold can be used during face enrolment to
ensure that only the best quality face template will
be stored into database.
	 Tolerance to face posture. BIOLOOK has certain
tolerance to face posture that assures face
enrolment convenience: rotation of a head can
be up to 10 degrees from frontal in each direction
(nodded up/down, rotated left/right, tilted left/right).
	 Multiple samples of the same face. Biometric
template record can contain multiple face samples
belonging to the same person. These samples
can be enrolled with different face postures and
expressions, from different sources and in different
time thus allowing to improve matching quality.
	 Identification capability. BIOLOOK functions can
be used in 1-to-1 matching (verification), as well
as 1-to-many mode (identification).
BioLook
Face Recognition Solution
14
Software versions Available for below Hardware
Devices.
1.	 AVI-TEC Biometric and RFID Devices
2.	 ZK Software Biometric and RFID Devices
3.	 iGuard TM Biometric and Smartcard Devices
User Management
	 Make multiple users per company/branch/
department/shift
	 User Access Rights Configuration for Data Safety
and Software Access Control
	 Creation of Admin. User and Normal users in
Software.
Company / Branch / Department Management
		Manage data of multiple companies, branches and
departments
		Feature to upload company logo and Name to be
shown in all report formats
Shift Management
	 Create multiple shifts per branch per day
	 Configure late arrival and overtime calculations
	 Manage Lunch and Tea breaks timings.
	 System can manage both day and night shifts in 24
hours rotation.
	 Provision of Straight / Split Shifts
Holidays and Leave Management
	 Manage the information of all allowed HOLIDAYS
per year.
	 Manage Leave Applications, their approval or
rejection status
	 Assign allowed leaves and unpaid leaves will be
deducted from salary
Employee Management
	 Manage all details of each employee per
department along with Photo upload feature
	 Assign Shifts so created to employees and
Departments
	 Manage Employee Transfer / Resignation
	 Search Engine for all data of Employees.
Payroll Configuration
	 Manage Allowances and Deductions
	 Bank Setup for Each Employee/Company/
Department
	 Fast face matching. The BIOLOOK 3.2 face
template matching algorithm compares 100,000
faces per second.*
	 Compact face features template. A face features
template occupies only 2.3 Kilobytes, thus
BIOLOOK-based applications can handle large
face databases.
	 Features generalization mode. This mode
generates the collection of the generalized face
features from several images of the same subject.
Then, each face image is processed, features
are extracted, and the collections of features are
analyzed and combined into a single generalized
features collection, which is written to the
database. This way, the enrolled feature template
is more reliable and the face recognition quality
increases considerably.
RFID and Mifare Cards for
Time Attendance & Access Control Devices
TimeTracker
Time Attendance/Payroll & HRMS Software:
Technical Specifications
	 Frequency 125 kHz / 13.56 MHz
	 EM Marin : EM4102 EM4450 / Mifare:
Ultralight, Mini, Classic, Desfire I-Code: SL1, SLI
	 NXP (Philips) : Hitag 1, 2, S
	 Infineon : Mifare: NRG
	 Atmel : Temic 5557, 5567
	 Legic : Prime: MIM256, MIM1024 Advant:
ATC128, ATC256, ATC512, ATC1024, ATC2048,
ATC4096
15
	 Employee Salary Generation
	 Maintain required details of Transaction Year
	 Manage Allowances and Deductions
	 Bank Setup for Each Employee/Company/
Department
	 Employee Salary Generation
	 Maintain required details of Transaction Year
	 Generates TAX Forms. (completely customizable if
Applicable)
	 Generates Documents handling & Expiry Passport,
Visa, Heath, Insurance Cards etc.
	 Automatic Gratuity and PF calculations based on
different country Labor laws and regulations.
Machine Configuration
	 Active Monitoring - watch details of employee
entering / exiting office directly on your screen
	 Manage multiple machines in one TA software
Manual Entry of Attendance
	 Manage attendance of employees who are out of
office for office work by manual entry
	 Manage employee tour details
Daily Analytical Reports
	 Daily Attendance Report
	 Early Arrival Report
	 Late Arrival Report
	 Early Departure Report
	 Overtime Report
	 Daily Absence Report
Master Reports
	 Company / Branch / Department
	 Shift Master Report
	 Holiday and Leave Report
Contractor Management
	 Manage Data of Contractors and details of contract
signed
	 Manages count of number of workers coming daily
on work
Monthly Analytical Reports
	 Monthly Attendance Summary
	 Employee Summary Report
	 Individual Employee Monthly Attendance Report
	 Individual Department Monthly Attendance
Report
	 Detail Present Report with total overtime
calculations
Payroll Reports
	 Salary Package Report
	 Permanent Employee Monthly Salary Report
	 Monthly Salary Report of employees on Contract
	 Bonus Details Report
	 Bonus Summary Report
	 Generation of Lateness and Absentees MEMO.
	 Generation of Salary Slip in prescribed format.
	 Overtime Report
	 Payable Summary
	 Payment of Wages and Tax Statement if applicable
	 Allowances and Deductions Master
	 Annual Leave Dues Per Employee
	 Annual Air Ticket control per Employee
	 Document Control with On-Screen, Reports,
Email Alerts
	 Online Alerts and reports on Screen/Email on
Documents handling
	 Expiry (Passport, Visa, Heath, Car Registration,
Insurance Cards Etc.)
Total Automation
OUR PROJECTS SPEAK FOR ITSELF... IT’S EASY TO SEE WHY?OUR PROJECTS SPEAK FOR ITSELF... IT’S EASY TO SEE WHY?
www.avi-infosys.com
U.A.E TOLL FREE 800 AVI (800-284)
Master Suite B # 1203, Pent House Office
Bel Rasheed Twin Towers,
Al Quasis- III
Damuscus Street
PO BOX: 26813
Dubai, United Arab Emirates
Tel :	 04 258 8260
Fax :	 04 2588270
Email :	info@avi-infosys.com
Web :	 www.avi-infosys.com
ISO
9001:2008
Certifie
d
IT Solutions P
rovider
INTERNATIONAL OPERATIONS

More Related Content

What's hot

Company Presentation
Company PresentationCompany Presentation
Company Presentationwebhostingguy
 
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDFEMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDFFaleh M.
 
Transcendent EAM CMMS Overview
Transcendent EAM CMMS OverviewTranscendent EAM CMMS Overview
Transcendent EAM CMMS OverviewChris Kluis
 
Ivanti Identity Director 2020.1.
Ivanti Identity Director 2020.1.Ivanti Identity Director 2020.1.
Ivanti Identity Director 2020.1.Ivanti
 
Sample - Midmarket Solution At-a-Glance
Sample - Midmarket Solution At-a-GlanceSample - Midmarket Solution At-a-Glance
Sample - Midmarket Solution At-a-GlanceGayle Westbrook
 
Software defined infrastructure
Software defined infrastructureSoftware defined infrastructure
Software defined infrastructuremdscomputers
 
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...Symantec
 
Cisco on Cisco. Defining the NG Cloud & Data Center Services
Cisco on Cisco. Defining the NG Cloud & Data Center ServicesCisco on Cisco. Defining the NG Cloud & Data Center Services
Cisco on Cisco. Defining the NG Cloud & Data Center ServicesCisco Russia
 
Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowresHai Nguyen
 
What's New with Ivanti Service Desk
What's New with Ivanti Service DeskWhat's New with Ivanti Service Desk
What's New with Ivanti Service DeskIvanti
 
IPS Corporate Presentation
IPS Corporate PresentationIPS Corporate Presentation
IPS Corporate PresentationNauman Akbar
 
imtechspherebrochure
imtechspherebrochureimtechspherebrochure
imtechspherebrochureSteve Tester
 
IT Pillars Profile
IT Pillars ProfileIT Pillars Profile
IT Pillars ProfileIT Pillars
 
Panorama IT Introduction V1.2
Panorama IT Introduction V1.2Panorama IT Introduction V1.2
Panorama IT Introduction V1.2sabrodiesel2000
 
Broadview-Networks-Brochure
Broadview-Networks-BrochureBroadview-Networks-Brochure
Broadview-Networks-BrochurePat McMichael
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - finalOracleIDM
 

What's hot (20)

Company Presentation
Company PresentationCompany Presentation
Company Presentation
 
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDFEMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
 
Sisoft Анкара
Sisoft АнкараSisoft Анкара
Sisoft Анкара
 
VDD Introduction-EN
VDD Introduction-ENVDD Introduction-EN
VDD Introduction-EN
 
Transcendent EAM CMMS Overview
Transcendent EAM CMMS OverviewTranscendent EAM CMMS Overview
Transcendent EAM CMMS Overview
 
Ivanti Identity Director 2020.1.
Ivanti Identity Director 2020.1.Ivanti Identity Director 2020.1.
Ivanti Identity Director 2020.1.
 
Sample - Midmarket Solution At-a-Glance
Sample - Midmarket Solution At-a-GlanceSample - Midmarket Solution At-a-Glance
Sample - Midmarket Solution At-a-Glance
 
Software defined infrastructure
Software defined infrastructureSoftware defined infrastructure
Software defined infrastructure
 
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
 
Cisco on Cisco. Defining the NG Cloud & Data Center Services
Cisco on Cisco. Defining the NG Cloud & Data Center ServicesCisco on Cisco. Defining the NG Cloud & Data Center Services
Cisco on Cisco. Defining the NG Cloud & Data Center Services
 
Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowres
 
What's New with Ivanti Service Desk
What's New with Ivanti Service DeskWhat's New with Ivanti Service Desk
What's New with Ivanti Service Desk
 
IPS Corporate Presentation
IPS Corporate PresentationIPS Corporate Presentation
IPS Corporate Presentation
 
Erzam profl oct18
Erzam profl oct18Erzam profl oct18
Erzam profl oct18
 
imtechspherebrochure
imtechspherebrochureimtechspherebrochure
imtechspherebrochure
 
IT Pillars Profile
IT Pillars ProfileIT Pillars Profile
IT Pillars Profile
 
Panorama IT Introduction V1.2
Panorama IT Introduction V1.2Panorama IT Introduction V1.2
Panorama IT Introduction V1.2
 
Broadview-Networks-Brochure
Broadview-Networks-BrochureBroadview-Networks-Brochure
Broadview-Networks-Brochure
 
NewStar NIMS Profile
NewStar NIMS ProfileNewStar NIMS Profile
NewStar NIMS Profile
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 

Similar to ISO 9001 Biometric Solutions Provider Catalog

Paradigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementParadigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementJulie Beuselinck
 
Mukesh infoserve
Mukesh infoserveMukesh infoserve
Mukesh infoservePixel
 
Company Profile
Company ProfileCompany Profile
Company ProfileITB001
 
Corporate Presentation Manam Infotech
Corporate Presentation Manam InfotechCorporate Presentation Manam Infotech
Corporate Presentation Manam InfotechManam Infotech
 
Gateway Corporate Presentation
Gateway Corporate PresentationGateway Corporate Presentation
Gateway Corporate PresentationRavi Krishna
 
Smart Service Desk EMEA - www.SmartServiceDesk.co Solutions PinkVerified - I...
Smart Service Desk EMEA - www.SmartServiceDesk.co Solutions  PinkVerified - I...Smart Service Desk EMEA - www.SmartServiceDesk.co Solutions  PinkVerified - I...
Smart Service Desk EMEA - www.SmartServiceDesk.co Solutions PinkVerified - I...Adil M
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operationsElasticsearch
 
PSI corporate profile
PSI corporate profilePSI corporate profile
PSI corporate profilesanirudha
 
00_GSS_pres samples_033115
00_GSS_pres samples_03311500_GSS_pres samples_033115
00_GSS_pres samples_033115Lisa A. F
 
GTL Corporate Presentation
GTL Corporate PresentationGTL Corporate Presentation
GTL Corporate Presentationsourav1981
 
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...Omega Peripherals
 
Nexsign Biometric Authentication
Nexsign Biometric AuthenticationNexsign Biometric Authentication
Nexsign Biometric AuthenticationSamsung SDS America
 
PSI Corporate Profile
PSI Corporate ProfilePSI Corporate Profile
PSI Corporate Profilemike_vincent
 
Company profile pegasus all lock
Company profile pegasus all lockCompany profile pegasus all lock
Company profile pegasus all lockkevin me
 

Similar to ISO 9001 Biometric Solutions Provider Catalog (20)

Portfolio Presentation Ashraf information Technologies 2020
Portfolio Presentation   Ashraf information Technologies  2020 Portfolio Presentation   Ashraf information Technologies  2020
Portfolio Presentation Ashraf information Technologies 2020
 
Paradigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementParadigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access Management
 
Mukesh infoserve
Mukesh infoserveMukesh infoserve
Mukesh infoserve
 
Company Profile
Company ProfileCompany Profile
Company Profile
 
Corporate Presentation Manam Infotech
Corporate Presentation Manam InfotechCorporate Presentation Manam Infotech
Corporate Presentation Manam Infotech
 
Gateway Corporate Presentation
Gateway Corporate PresentationGateway Corporate Presentation
Gateway Corporate Presentation
 
Smart Service Desk EMEA - www.SmartServiceDesk.co Solutions PinkVerified - I...
Smart Service Desk EMEA - www.SmartServiceDesk.co Solutions  PinkVerified - I...Smart Service Desk EMEA - www.SmartServiceDesk.co Solutions  PinkVerified - I...
Smart Service Desk EMEA - www.SmartServiceDesk.co Solutions PinkVerified - I...
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operations
 
PSI corporate profile
PSI corporate profilePSI corporate profile
PSI corporate profile
 
00_GSS_pres samples_033115
00_GSS_pres samples_03311500_GSS_pres samples_033115
00_GSS_pres samples_033115
 
Unlock the full potential of IoT
Unlock the full potential of IoT Unlock the full potential of IoT
Unlock the full potential of IoT
 
Gateway Technolabs Corporate Presentation
Gateway Technolabs Corporate PresentationGateway Technolabs Corporate Presentation
Gateway Technolabs Corporate Presentation
 
GTL Corporate Presentation
GTL Corporate PresentationGTL Corporate Presentation
GTL Corporate Presentation
 
COMPANY PROFILE
COMPANY PROFILECOMPANY PROFILE
COMPANY PROFILE
 
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
 
Gtl Corporate Presentation
Gtl Corporate PresentationGtl Corporate Presentation
Gtl Corporate Presentation
 
Nexsign Biometric Authentication
Nexsign Biometric AuthenticationNexsign Biometric Authentication
Nexsign Biometric Authentication
 
Sutedjo - Introduction to Cloud
Sutedjo - Introduction to CloudSutedjo - Introduction to Cloud
Sutedjo - Introduction to Cloud
 
PSI Corporate Profile
PSI Corporate ProfilePSI Corporate Profile
PSI Corporate Profile
 
Company profile pegasus all lock
Company profile pegasus all lockCompany profile pegasus all lock
Company profile pegasus all lock
 

More from securitysytem

CCTV UAE, Waterproof CCTV Cameras UAE
CCTV UAE, Waterproof CCTV Cameras UAE CCTV UAE, Waterproof CCTV Cameras UAE
CCTV UAE, Waterproof CCTV Cameras UAE securitysytem
 
CCTV UAE, Waterproof CCTV Cameras UAE
CCTV UAE, Waterproof CCTV Cameras UAE CCTV UAE, Waterproof CCTV Cameras UAE
CCTV UAE, Waterproof CCTV Cameras UAE securitysytem
 
CCTV UAE, DVR CCTV Camera, IP Camera UAE
CCTV UAE, DVR CCTV Camera, IP Camera UAECCTV UAE, DVR CCTV Camera, IP Camera UAE
CCTV UAE, DVR CCTV Camera, IP Camera UAEsecuritysytem
 
CCTV UAE, DVR CCTV Camera, 4channel DVR UAE
CCTV UAE, DVR CCTV Camera, 4channel DVR UAECCTV UAE, DVR CCTV Camera, 4channel DVR UAE
CCTV UAE, DVR CCTV Camera, 4channel DVR UAEsecuritysytem
 
Electronic door lock avi fp id 516
Electronic door lock avi fp id 516Electronic door lock avi fp id 516
Electronic door lock avi fp id 516securitysytem
 
Cctv camera avi vis 2354
Cctv camera avi vis 2354Cctv camera avi vis 2354
Cctv camera avi vis 2354securitysytem
 
Javelin Card Printers, Javelin ID Card Printer Ribbons, UAE, Dubai, India, Af...
Javelin Card Printers, Javelin ID Card Printer Ribbons, UAE, Dubai, India, Af...Javelin Card Printers, Javelin ID Card Printer Ribbons, UAE, Dubai, India, Af...
Javelin Card Printers, Javelin ID Card Printer Ribbons, UAE, Dubai, India, Af...securitysytem
 
Cctv camera avi vis 2322
Cctv camera avi vis 2322Cctv camera avi vis 2322
Cctv camera avi vis 2322securitysytem
 

More from securitysytem (11)

CCTV UAE, Waterproof CCTV Cameras UAE
CCTV UAE, Waterproof CCTV Cameras UAE CCTV UAE, Waterproof CCTV Cameras UAE
CCTV UAE, Waterproof CCTV Cameras UAE
 
CCTV UAE, Waterproof CCTV Cameras UAE
CCTV UAE, Waterproof CCTV Cameras UAE CCTV UAE, Waterproof CCTV Cameras UAE
CCTV UAE, Waterproof CCTV Cameras UAE
 
CCTV UAE, DVR CCTV Camera, IP Camera UAE
CCTV UAE, DVR CCTV Camera, IP Camera UAECCTV UAE, DVR CCTV Camera, IP Camera UAE
CCTV UAE, DVR CCTV Camera, IP Camera UAE
 
CCTV UAE, DVR CCTV Camera, 4channel DVR UAE
CCTV UAE, DVR CCTV Camera, 4channel DVR UAECCTV UAE, DVR CCTV Camera, 4channel DVR UAE
CCTV UAE, DVR CCTV Camera, 4channel DVR UAE
 
Electronic door lock avi fp id 516
Electronic door lock avi fp id 516Electronic door lock avi fp id 516
Electronic door lock avi fp id 516
 
Cctv camera avi vis 2354
Cctv camera avi vis 2354Cctv camera avi vis 2354
Cctv camera avi vis 2354
 
Javelin Card Printers, Javelin ID Card Printer Ribbons, UAE, Dubai, India, Af...
Javelin Card Printers, Javelin ID Card Printer Ribbons, UAE, Dubai, India, Af...Javelin Card Printers, Javelin ID Card Printer Ribbons, UAE, Dubai, India, Af...
Javelin Card Printers, Javelin ID Card Printer Ribbons, UAE, Dubai, India, Af...
 
Cctv camera avi vis 2322
Cctv camera avi vis 2322Cctv camera avi vis 2322
Cctv camera avi vis 2322
 
I guard flyer
I guard flyerI guard flyer
I guard flyer
 
Cctv camera-2355
Cctv camera-2355Cctv camera-2355
Cctv camera-2355
 
Cctv camera-2322
Cctv camera-2322Cctv camera-2322
Cctv camera-2322
 

Recently uploaded

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Recently uploaded (20)

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

ISO 9001 Biometric Solutions Provider Catalog

  • 2. AVI INFOSYS - Profile AVI INFOSYS is an ISO 9001:2008 Certified Biometric Solutions Provider Company based in Dubai, United Arab Emirates. “AVI INFOSYS” is pleased to respond to Clients Project Requirements for Comprehensive and Total Integrated Solution for Enterprise-Wide Management Information Systems. Our review of the Market Place indicates that many Vendors can provide the Automated Systems; however only a few, such as “AVI INFOSYS” is Capable of Assisting Client in Plans, Develops and Implements of such a Highly Complex Biometric Security Management & Information Technology Projects. “AVI INFOSYS” business is to Partner with Clients to achieve Breakthrough Performance through the intelligent use of the Technologies. “AVI INFOSYS” provides: Business and Information Technology Consulting Reusable and Customized Software System Integration Services in Biometric Field for Medium to Large Local, Regional and International Organizations “AVI INFOSYS” has successfully Developed, Integrated and Delivered Systems to Clients, including several in the Middle East; our successful accomplishments are based on four corporate strengths. Partnership based of Trust Dedication to deliver on Commitments Focused Industry Expertise Linking People, Processes, Organizations and Technologies The Achievement of Breakthrough Performance requires Forward Looking & Practical Ideas for Improving Business Processes Intelligent use of Technology to enable Improved Processes Committed, Trained People in Appropriately Aligned Organizations “AVI INFOSYS” is a leader in Partnering with clients to achieve breakthrough performance through the intelligent use of Information Technology. “AVI INFOSYS” is Trusted and Valued by clients for the High Quality Services and Commitment to deliver real results. 2
  • 3. 3 “AVI INFOSYS” products and Services Biometric Fingerprint Identification Solutions Biometric Access Control Solutions. Smartcard based Prepaid and Loyalty Rewards Systems Web based Time Attendance Software and Solu- tions Smartcard /RFID Card based Solutions Enterprise Firewall Solutions Secure Networking, Network Security Biometric Based Access Control / Encryption Solu- tions Smartcard Production and Printing Services Secured VPN Solutions IT Infrastructure Security Solutions Special Capabilities & Expertise Enterprise - Wide Information Systems (EIS) Management Information Systems (MIS) Decision Support Systems (DSS) Preventive Maintenance Management Systems (PMMS) Hospitality Information Systems (Hospital & Hotel) - (HIS) Industries cover by “AVI INFOSYS” Applications & Software Development Solutions Government Financial Institutions / Banks Industrials / Productions Hospitality (Hospitals & Hotels) Educational (University & School) Construction & Contracting Legal, Library & Case-Handling Multi Offices Organizations Increase security - Provide a convenient and low- cost additional tier of security. Reduce fraud by employing hard-to-forge technologies and materials. For e.g. Minimise the opportunity for ID fraud, buddy punching. Eliminate problems caused by lost IDs or forgotten passwords by using physiological attributes. For e.g. Prevent unauthorised use of lost, stolen or “borrowed” ID cards. Reduce password administration costs. Replace hard-to-remember passwords which may be shared or observed. Integrate a wide range of biometric solutions and technologies, customer applications and databases into a robust and scalable control solution for facility and network access Offer significant cost savings or increasing ROI in areas such as Loss Prevention or Time & Attendance. Unequivocally link an individual to a transaction or event.
  • 4. 4 Management & Technology Solutions State-of -the-Art Technology Open Systems Architecture & Environment Portable on any Platform and Scalable Adaptable to Newer Technology Integrating information: Technology, Systems and Management “AVI INFOSYS” assists clients in… Responding to Competition Gaining or Maintaining Market Leadership Achieving Grater Efficiencies Dramatically Improving Performance Putting It All Together IN the complexity of todays Information Technology, many elements must come into play before an integral whole is achieved. These elements vary in emphasis from business to business, but to the solution provider each has vital role in the final product: choice of hardware and peripherals, communications setup, networking, RDBMS, operating system, Arabization, understanding of requirements and - foremost - the users. “AVI INFOSYS” has the experience and track record to prove it. We have kept abreast with the ever-evolving technology. We have migrated / converted systems from proprietary to open platform, from 3GLs to RDBMS and CASE Tools, and from simple networks to client- server architecture. “AVI INFOSYS” Successes Our successes are based on achieving real result for the clients, maintaining a High Standard of customer satisfaction and establishing Long-Term client relationships. “AVI INFOSYS” has assist clients in making Intelligent Investment on Information Technology, deriving the highest returns possible and helps clients to understand the changes they needs to make their organizations to operate efficiently and effectively. Our Approach and Methodology The following processes (We called it “A Dozen of Success”) will be adopted by “AVI INFOSYS” toward Developing the IT Strategy for the clients… 1. Define High Level business objectives 2. Assess current Information System (IS) support and services 3. Determine future IS support and services required 4. Evaluate potential contribution of IS department and involved units 5. Analyse gap between current and future systems 6. Prioritise development and produce plan 7. Implement improved methods for Development 8. Implement improved Project Management methods 9. Plan immediate Developments 10. Implementation 11. Educate and Trains end- users and administrators 12. Maintain Customer Support and Services.
  • 5. 5 AVI-FTA-507 AVI-TEC™ Fingerprint based Time Attendance Systems: Features: Simple and durable device with a robust inbuilt optical scanner Records up to 50000 / 80000 / 100000 transaction records User Capacity - 1500 / 2000 / 2500 identities Free SDK Available for Software Customization Supports multiple companies of one organization at a single location Supports one company at multiple locations. Supports multiple input units installed for one company Company Rules, Time Management Parameters can be easily customized on the device Easy to manage Employees, Departments and Multiple Shifts Supports leave management Flexibility of Reports generated by the Software - Daily Attendance Statistics Report, Attendance General Report, Staff On- Duty/Off Duty Report Department Attendance Report, etc. Data available in excel/html/ASCII format for further calculation Seamless integration with various Accounting and Payroll Packages Technical Specifications: Size 185¨L~123W~43(H)mm User Capacity 1500 / 2500/5000 Transaction Storage 50000/80000/125000 Algorithm version 2005 Version new algorithm Hardware platform ZEM100 Communications RS232, RS485, TCP/ IP (UDP Protocol) Power 5V 2A POE: Power Over Ethernet (Optional) Identification time <=2s FAR <= 0.0001% FRR <= 1% Operating Temperature 0 C- 45C Operating Humidity 20%-80% Sensor Error free Optical Sensor Language English , Simplified Chinese, Traditional Chinese ,other Languages Optional: Simple access control (Electro control Directness relay output 3A/12VDC) Benefits: Built in strong U.S.A Intel32bit fingerprint embedded standalone module (ZEM100),it is easy to integrate with various systems Support finger 360 degree identification, easy to use. Sensor window cotton improving image quality, accepts dry, wet fingers CMOS automated exposure and intelligent compensation improved image quality Adjusting image distortion, assure fingerprint matching consistency Suggesting customers cooperating as ODM or OEM, providing system analysis, mould-making, circuit design, producing-assembly, package design, etc, linear service
  • 6. 6 AVI-FTA-508 AVI-TEC™ Fingerprint & RFID Based Time Attendance System. Features: Supports both - Fingerprint & RFID (Smartcards) for attendance recording purposes Records up to 50000 / 80000 / 100000 transaction records User Capacity - 1500 / 2000 / 2500 identities Free SDK Available for Software Customization Supports multiple companies of one organization at a single location. Supports one company at multiple locations. Supports multiple input units installed for one company. Company Rules, Time Management Parameters can be easily customized on the device Easy to manage Employees, Departments and Multiple Shifts Supports leave management Data available in excel/html/ASCII format for further calculation Technical Specifications: Size 185¨L~123W~43(H)mm User Capacity 1500 / 2500 Transaction Storage 50000 Algorithm version 2005 Version new algorithm Hardware platform ZEM100 Communications RS232, RS485, TCP/ IP (UDP Protocol) Power 5V 2A POE: Power Over Ethernet (Optional) Identification time <=2s FAR <= 0.0001% FRR <= 1% Operating Temperature 0 C- 45C Operating Humidity 20%-80% Sensor Error free Optical Sensor Language English , Simplified Chinese, Traditional Chinese ,other Languages Optional: Simple access control (Electro control Directness relay output 3A/12VDC) iGuard™ Biometrics Fingerprint/PIN/Smartcard based Time Attendance and Access Control System with Web based Software iGuard™ Technology Overview Each iGuard™ Biometric / Smart Card Security Appliance has a built- in Web Server enables all the computers in the corporate network to directly simultaneously access the device using any Internet Browser, such as Microsoft Internet Explorer Netscape Navigator. Flexibility of Reports generated by the Software - Daily Attendance Statistics Report, Attendance General Report, Staff On- Duty/Off Duty Report Department Attendance Report, etc. Seamless integration with various Accounting and Payroll Packages
  • 7. 7 Different computer platforms such as Apple Macintosh, Microsoft Windows Linux machines can access the device. No additional software is required. So whether you are in an airport lounge or a hotel room, you can always check if your employees are already in the office or not, and you can even control, modify or disable their access rights to your office remotely via internet connection provided your iGuard Biometric / Smart Card Security Appliance is connected to an external IP address or your network is available through a VPN connection that is reachable from your location. iGuard™ Super Master is a back-end server of iGuard™. With Super Master installed, the maximum no. of users of iGuard™ Master / Slave network will be increased to 5000 or up. And, Super Master is designed base on the iGuard™ patented embedded Web Server technologies, which enables all computers, such as Apple Macintosh, PCs & Unix machines, in the corporate computer network to setup, maintain and access the information of the device simultaneously using the well-known Internet Browser. iGuard™ Features Multi Factor Authentication: With iGuard, users can be authenticated and verified through Fingerprint, Smartcard or Password. And depending on the different time period, you can set up the iGuard that the users can just simply presents his smartcard to get authorized (such as during high- traffic period), or requires the high-security fingerprint verification (such as after office hours or during weekends and holidays). Access Rights: When you can easily and conveniently assign different access rights to your employees, you can plan your security better and maximize the effectiveness of the human resources. And with the built-in Web Server technology, iGuard empowers you to manage the access rights of each individual employees or a group of employees easily anytime, anywhere using any web- enabled computers or mobile devices. For example, you can assign the staff members of the marketing department the rights to get in the office premises during weekdays from nine to five only, or prevent a particular employee from entering the computer server room. Reports: iGuard includes three built-in reports: Access Log, Attendance Report & Daily In/Out report, that can be accessed via any web-enabled computer with web browser. Should more sophisticated reports be required, such as for the payroll purposes, the information can be downloaded and saved in Microsoft Excel format and in plain text format. In addition, the access records can be saved in any PC in the network in the popular ODBC database format in real-time manner, and other applications can conveniently obtain the information from the ODBC (the required software, iServer is available free-of-charge in our download page) Economical: All the necessary hardware and software is built-in to the device, including the hardware to connect the system to the corporate network. All you need to do is to plug-in the popular RJ-45 network cable to the back of the device. No other hardware and wiring is necessary. In contrast, all other existing security systems use the old RS232 & RS485 wiring system to connect to the dedicated computers (not to the corporate network), and it usually involves a lot of extra wiring works.
  • 8. 8 Small Footprint: iGuard is a wall-mounted unit elegantly designed with extremely small footprint. In fact, it is the smallest stand-alone biometrics device available in the market today. It can be mounted easily and conveniently without requiring a lot of space. Simplicity: iGuard is an Internet-Ready Security System, and is the first and the only network appliance security product in the market that uses TCP/IP as the protocol to communicate with other iGuards and the outside world. The protocol enables the device to directly connect to the corporate network via the existing cable wiring. And since the TCP/IP protocol is the Internet protocol, it allows all computers in the corporate network to access the device using the Internet Browser software. As a result, users do not need to learn to use a new software to access and administer the device, and most users can start using the device in minutes. In contrast, all other similar security systems use proprietary protocol & wiring, and proprietary software is required to access these systems and for compatibility purposes, iGuard also supports conventional interfaces including Wiegand, RS-485 & RS-232. How it works as an Access Control System iGuard analyzes & compares a persons fingerprint against the previously enrolled record. If the two fingerprints match, the person is authenticated. And if the time is within the authorized period for entry, the device will signal release the electric door lock. The iGuard Security System analyzes and compares a persons fingerprint against the previously enrolled record. If the two fingerprints match, the person is authenticated. And if the time is within the authorized period for entry, the device will signal and release the electric door lock. Access Time restriction - you can define the authorized time for each individual or for a group of individuals. Terminal restriction - you can specify who has the rights to access a particular terminal. It is useful in a multi-device environment, where multiple doors are controlled by different devices. Password/Fingerprint Access - you can define the period in which password can be used instead of fingerprint for access. This is particularly useful if you want to just use password to access during normal office hours, but to restrict the access to authorized people only after office hours. The Access Control Mode controls the employees from entering the business premises. The system controls the electronic door strike to lock / unlock the door. Users can be assigned to different departments and the authorized time for members in each department can also be controlled. In a multi-device environment, the access rights for each department in accessing different terminals can also be assigned. STEP 1 Enter Employee ID STEP 2 Place the thumb on the sensor STEP 3 The door is unlocked if authenticated We are currently using SecuGen® SDA03M sensor for LM520-FOSC (FBI Certified, FIPS 201/PIV Compliant, GSA APL Listed). A new model with SDA04 sensor (FBI Certified, FIPS 201/PIV Compliant, GSA APL Listed) will be introduced in mid. 2010 to address the high end market. The SecuGen SDA03M is very rugged, accurate, and affordable as it is designed for long-lasting performance in high traffic and tough environments. “Lucky Technology has deployed earlier generations of the iGuard with the United States Air Force and the US Army and in Afghanistan and thousands of schools, universities and business buildings worldwide,” stated Wayne Wilkerson, President of Lucky Technology’s US Operations. SecuGen’s OEM sensors are used by device manufacturers all over the world and are widely recognized as among the most effective and affordable solutions for successfully integrating fingerprint capture and matching into third party devices.
  • 9. 9 How it works - as a Time Attendance System When configured as a Time Attendance System, a user can specify whether he/she is clocking-in or clocking- out. By using fingerprints to determine identity, buddy-punching problems can be totally eliminated as well as other fraud. Attendance of each employee is printed on the attendance report. The attendance report is particularly useful for payroll purposes. Wages and salaries can be paid according to the employees worked hours, overtime etc. Wages and salaries can be integrated with a smart card or automatic deposit payroll system. FP = Fingerprint Only iGuard SC = Smart Card Only iGuard FSC = Fingerprint and Smartcard iGuard iGuard™ Power and Strike Units iGuard™ Network Appliance Power Options Overview The AL400ULX power supply converts a 115VAC / 60Hz input, to a 4 amp of continuous supply current @ 12VDC or 3 amp of continuous supply current at 24VDC power limited output, (see specifications). How it works Main iGuard Entrance Door Access Log Report Time/ Attendance iGuard Working Area Secure Area (Access to designated personnel only) High Secure Area (Access to designated personnel only) Technical Specifications RF contactless operates at 13.56 MHz Standard NXP Mifare Card 1K bytes,15 sectors, 48 bytes each R/W is protected by encryption key, 48 bit triple DES Raw data is scrambled by 64 bit DES. High Security, suitable for all applications. Free sectors can be reserved for multiple any purposes Print your own brand on this card Smartcards for iGuard™ readers
  • 10. 10 SC Series is an import proximity T&A and A&C system, as it adopts proximity communication PSK and encrypt professional proximity card to check ID, which is much safer and more credible than those without encrypt proximity cards. Recheck the 5 PIN inputted by card holder, which is a senior and safe equipment, achieve the professional management of automatic and modern C&A and T&A. In the operation process, SC Series could offer 3 different manners. The first one is the most convenient one--use proximity card directly; the second way is to use both card and 5 No.¡¯s code, which is the most precise one; the third way is the most simplest--use 1-5 No.¡¯s code. iGuard™ Technical Specifications: FP / SC / FSC Super Master Power 12VDC, 600mA 12VDC, 800mA Fingerprint Sensor Yes / n/a / Yes n/a Contactless Smart Card reader writer (built- in) n/a / Yes/ Yes n/a Web and Database Server Built-in Network Security (SSL) Optional Auto Data Synchronization (i.e., master / slave configuration) Yes Maximum Transaction Records stored 10,000 20,000 Static / Dynamic IP Assignment Yes(Support existing DHCP Server) Non-volatile memory 16MB Computer Supported (with Internet Browser) Macintosh, Windows 95/98/NT/ME/XP, Linux and Unix Machine Valid Characters for Employee ID 0-9, A-B(maximum - 8 characters Display 20 x 2 LCD with Backlight n/a LCD Multi-Lingual Yes n/a Two Finger Enrollment Yes Fingerprint Sensor Type Capacitive n/a Fingerprint Sensor Resolution 500dpi n/a Fingerprint Sensor scan area (mm) 12 x 15 n/a Image Capture Time < sec. n/a Verification Time < 1 sec. n/a False Rejection Rate < 1 % n/a False Acceptance Rate < 0.01% n/a Auto-match Count 30 n/a Network Protocol TCP/IP, Wiegand, RS485, RS232 (Optional) Network Interface Ethernet (100-Base T) Real Time Clock Last for approx. 2 days without power External Controls Door Strike Open-Door Switch Break-in Alarm Door Status n/a Dimension (mm) 105(W) x 38(D) x 150(H) 254(W) x 193 AVI-SC 509 AVI-TEC™ SC Series is a core RFID Access Control & Time Attendance system
  • 11. 11 When the user is threaten to open the door, a kind of intimidating card or code could be used to output a soundless alarm signal through auto-dial machine which was connected with the alarm system. The anti-pass function is optional, which can prevent those person who has no authorization but through following others enter the room. SC Series¡¯ input and output interface could be used for linking other exterior system accessories. System Specification: User Capacity: 30000; Transaction Capacity: 50000 With 10 cm Proximity Reader and LCD inside Standalone or contacted PC with RS232 or RS485 or TCP/IP Download records with U-Disk Identification: Standalone proximity card, proximity+5 bits code, 1 to 5 bits PIN number. Users can set up threatened alarm and code by themselves. Access Control: 50 Time Zone, 5Grouping, 10 Combination, support many fingerprint access. Operated in night with 16 bits backlight keyboard. Authentication: UL, CE, FCC, MIC The Hardware Design adopts international fashionable POE, applying professional anti-static and anti-jamming protection. All input/output are designed with over-voltage & circuit protection, illegal-dismantle alarm & professional alarm system, voltage control & compliable surveillance system. Besides, it’s completely waterproof. All these advantages make an excellent performance. Card Holders 30000 cards Transaction Capacity 50000 records CPU 64bit ZK6001 Microprocessor Hardware ZEM500(Embedded Linux O/S) Aceess Mode Card Only, PIN Only, Card+PIN Read Range 10-15 cm I/O Interface RS232/485 Baud Rate 9600-115Kbps programmable Ethernet 10/100M Wiegand I/O any bit USB Mini-USB 2.0 port Access Control Function 50time zones, 5groups, 10open door conbination, supports multi-users enter. TTL for connecting to lock, door sensor, exit button, alarm LCD Panel LCD Panel: 4 line, 16 character each line(User name, ID number, time, date, states) Keypad 4*4 metal keypad with 4 function keys Audio Visual Indicator Red LED(Access denied)/ Green LED(Access granted) with Audible Beep Housing Material ABS ¡¤ Power Requirement: 12V DC, 400mA Power Requirement 12V DC, 400mA Operating Temperature 0¡ãC-45¡ãC Operating Humidity: 20%-80% Optional Webserver, Antipass-back, Multi-language display Technical Specification
  • 12. 12 Technical Specifications: Hardware platform ZEM500 Operating system Linux User capacity 1500 Transaction capacity 50000 Sensor ZK Sensor Algorithm version 2007 Version ZK new algorithm Access Control 50 Time Zone, 5 Grouping, 10 Combination, Holiday Management, support many fingerprints access, support standalone work Communicational TCP/IP or RS232 and RS485 Keyboard and Display LCD with 80 character and figure keypad Power 12 V Identification speed < =2 seconds FRR <=1% FAR <=0.0001% Temperature operating 0 degree centigrade - 45 degree centigrade Humidity operating 20%-80% Language Simplified Chinese, Traditional Chinese, English, Other Languages Standard Wire Doorbell, Wiegand OUT, Wiegand IN Optional ID/HID/Mifare card, Web server, USB host, Short message, Work code, RIS, Antipass-back AVI-FP-ID-510 AVI-TEC™ Fingerprint based Time Attendance & Access Control Systems: Features: Simple and durable device with a robust inbuilt optical scanner Records up to 50000 transaction records User Capacity - 1500 identities Free SDK Available for Software Customization Supports multiple companies of one organization at a single location Supports one company at multiple locations. Supports multiple input units installed for one company. Company Rules, Time Management Parameters can be easily customized on the device Easy to manage Employees, Departments and Multiple Shifts Supports leave management Flexibility of Reports generated by the Software - Daily Attendance Statistics Report, Attendance General Report, Staff On- Duty/Off Duty Report Department Attendance Report, etc. Data available in excel/html/ASCII format for further calculation Seamless integration with various Accounting and Payroll Packages
  • 13. 13 BioLook algorithm Technical Specifications Recommended minimal image size 640 x 480 pixels Multiple faces detection time (using 640 x 480 image) 0.07 sec. Single face processing time (after detecting all faces) 0.13 sec. Matching speed 100,000 faces/sec. Size of one record in the database 2.3 Kbytes Maximum database size unlimited Benefits: Built in strong U.S.A Intel32bit fingerprint embedded standalone module (ZEM100),it is easy to integrate with various systems Support finger 360 degree identification, easy to use. Sensor window cotton improving image quality, accepts dry, wet fingers CMOS automated exposure and intelligent compensation improved image quality. Adjusting image distortion, assure fingerprint matching consistency Suggesting customers cooperating as ODM or OEM, providing system analysis, mould-making, circuit design, producing-assembly, package design, etc, linear service Features: Simultaneous multiple face processing. BioLook performs fast and accurate detection of multiple faces in live video streams and still images. All faces on the current frame are detected in 0.07 sec. and then each face is processed in 0.13 sec. Live face detection. A conventional face identification system can be easily cheated by placing a photo of another person in front of a camera. BioLook is able to prevent this kind of security breach by determining whether a face in a video stream belongs to a real human or is a photo. Face image quality determination. A quality threshold can be used during face enrolment to ensure that only the best quality face template will be stored into database. Tolerance to face posture. BIOLOOK has certain tolerance to face posture that assures face enrolment convenience: rotation of a head can be up to 10 degrees from frontal in each direction (nodded up/down, rotated left/right, tilted left/right). Multiple samples of the same face. Biometric template record can contain multiple face samples belonging to the same person. These samples can be enrolled with different face postures and expressions, from different sources and in different time thus allowing to improve matching quality. Identification capability. BIOLOOK functions can be used in 1-to-1 matching (verification), as well as 1-to-many mode (identification). BioLook Face Recognition Solution
  • 14. 14 Software versions Available for below Hardware Devices. 1. AVI-TEC Biometric and RFID Devices 2. ZK Software Biometric and RFID Devices 3. iGuard TM Biometric and Smartcard Devices User Management Make multiple users per company/branch/ department/shift User Access Rights Configuration for Data Safety and Software Access Control Creation of Admin. User and Normal users in Software. Company / Branch / Department Management Manage data of multiple companies, branches and departments Feature to upload company logo and Name to be shown in all report formats Shift Management Create multiple shifts per branch per day Configure late arrival and overtime calculations Manage Lunch and Tea breaks timings. System can manage both day and night shifts in 24 hours rotation. Provision of Straight / Split Shifts Holidays and Leave Management Manage the information of all allowed HOLIDAYS per year. Manage Leave Applications, their approval or rejection status Assign allowed leaves and unpaid leaves will be deducted from salary Employee Management Manage all details of each employee per department along with Photo upload feature Assign Shifts so created to employees and Departments Manage Employee Transfer / Resignation Search Engine for all data of Employees. Payroll Configuration Manage Allowances and Deductions Bank Setup for Each Employee/Company/ Department Fast face matching. The BIOLOOK 3.2 face template matching algorithm compares 100,000 faces per second.* Compact face features template. A face features template occupies only 2.3 Kilobytes, thus BIOLOOK-based applications can handle large face databases. Features generalization mode. This mode generates the collection of the generalized face features from several images of the same subject. Then, each face image is processed, features are extracted, and the collections of features are analyzed and combined into a single generalized features collection, which is written to the database. This way, the enrolled feature template is more reliable and the face recognition quality increases considerably. RFID and Mifare Cards for Time Attendance & Access Control Devices TimeTracker Time Attendance/Payroll & HRMS Software: Technical Specifications Frequency 125 kHz / 13.56 MHz EM Marin : EM4102 EM4450 / Mifare: Ultralight, Mini, Classic, Desfire I-Code: SL1, SLI NXP (Philips) : Hitag 1, 2, S Infineon : Mifare: NRG Atmel : Temic 5557, 5567 Legic : Prime: MIM256, MIM1024 Advant: ATC128, ATC256, ATC512, ATC1024, ATC2048, ATC4096
  • 15. 15 Employee Salary Generation Maintain required details of Transaction Year Manage Allowances and Deductions Bank Setup for Each Employee/Company/ Department Employee Salary Generation Maintain required details of Transaction Year Generates TAX Forms. (completely customizable if Applicable) Generates Documents handling & Expiry Passport, Visa, Heath, Insurance Cards etc. Automatic Gratuity and PF calculations based on different country Labor laws and regulations. Machine Configuration Active Monitoring - watch details of employee entering / exiting office directly on your screen Manage multiple machines in one TA software Manual Entry of Attendance Manage attendance of employees who are out of office for office work by manual entry Manage employee tour details Daily Analytical Reports Daily Attendance Report Early Arrival Report Late Arrival Report Early Departure Report Overtime Report Daily Absence Report Master Reports Company / Branch / Department Shift Master Report Holiday and Leave Report Contractor Management Manage Data of Contractors and details of contract signed Manages count of number of workers coming daily on work Monthly Analytical Reports Monthly Attendance Summary Employee Summary Report Individual Employee Monthly Attendance Report Individual Department Monthly Attendance Report Detail Present Report with total overtime calculations Payroll Reports Salary Package Report Permanent Employee Monthly Salary Report Monthly Salary Report of employees on Contract Bonus Details Report Bonus Summary Report Generation of Lateness and Absentees MEMO. Generation of Salary Slip in prescribed format. Overtime Report Payable Summary Payment of Wages and Tax Statement if applicable Allowances and Deductions Master Annual Leave Dues Per Employee Annual Air Ticket control per Employee Document Control with On-Screen, Reports, Email Alerts Online Alerts and reports on Screen/Email on Documents handling Expiry (Passport, Visa, Heath, Car Registration, Insurance Cards Etc.) Total Automation OUR PROJECTS SPEAK FOR ITSELF... IT’S EASY TO SEE WHY?OUR PROJECTS SPEAK FOR ITSELF... IT’S EASY TO SEE WHY?
  • 16. www.avi-infosys.com U.A.E TOLL FREE 800 AVI (800-284) Master Suite B # 1203, Pent House Office Bel Rasheed Twin Towers, Al Quasis- III Damuscus Street PO BOX: 26813 Dubai, United Arab Emirates Tel : 04 258 8260 Fax : 04 2588270 Email : info@avi-infosys.com Web : www.avi-infosys.com ISO 9001:2008 Certifie d IT Solutions P rovider INTERNATIONAL OPERATIONS