Your SlideShare is downloading. ×
Visitor and vendor access management system
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Visitor and vendor access management system

2,400
views

Published on

An intelligent networked security system to manage who enters your premise. No more do you need to call your employees off their desks to security cabin to escort the visitors. Let the employee see …

An intelligent networked security system to manage who enters your premise. No more do you need to call your employees off their desks to security cabin to escort the visitors. Let the employee see who has come and authenticate his entry. Raise an alarm if the visitor does not leave premise within stipulated time after his meeting is over. Keep a record of all the visitors and whom they had come to meet.

Published in: Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
2,400
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. H A R D W A R E / S O F T W A R E Access Control and Attendance Systems
  • 2. S Y S T E M O V E R V I E W TAMS Attendance System
  • 3. Hardware
  • 4. Hardware Features  Capable of supporting various communication protocols, it can be used in numerous application areas.  - TCP/IP : compatible with access manager(OPTION) - RS-485: Functions with your company’s custom controller - Wiegand ▷ In : Functions with card readers currently in use ▷ Out : Provides various portions of formats, User ID or Card ID output  Suitable for employees’ work hour management with the function keys provided  - Provides four separate keys/ keys can be used in combination (starting work and finishing work, going out, returning to work, etc)  Enhanced user configuration feature (ID digits, sensor option, operation mode, etc)  Enhanced User Convenience  - Auto-on - Provides Shortcut ID / Group Matching Feature - LCD : 2 line graphic LCD (supports various languages) - LED : Status LED 2 each, Authentication result LED 1 each - Voice Guide : Voice Output  Supports various authentication media, making it possible to configure as required by different security methods.  - Fingerprint/Password/RF card (option: HID, MIFARE), combined use is possible
  • 5. Technical Specifications Item Description Material Fingerprint Access Controller Size Optical Type Sensor type Optical Optical Resolution 500 DPI Authentication Mode Mode 1:1, 1:N, Short ID Matching Fact Password, RF card (HID, MIFARE compatible) Time Less than 1 second Operation Mode SO Stand-alone NS Server matching Environment Temperature -20 ~ 60 [oC] Power 12 / 24 [V] Maximum no. of registrations 2,000 Users (1 fingerprint per 1 user) Log 3,000 ea Authentication Rate FRR : 1/1,000 , FAR : 1/100,000 Function Key F1,F2,F3,F4 Communication TCP/IP, Wiegand Input / Output, RS-485 Certification MIC, CE, FCC
  • 6. Software  Efficient management of:  Employees  Visitors  Vendors  Inwards  Compatible to work with:  Biometric  RFID  User name and Password  Compatible with multiple hardware  Cost efficient
  • 7. Software Features  Capture:  Fingerprint (1 or 2 fingers)  RFID information  Username and password  Webcam image of person  Webcam image of belongings  Generate visitor access permission slip automatically  Intimate the employee whom a visitor has come to meet
  • 8. Software Features  Virtually unlimited number of finger print storage capability  Virtually indefinite period reports(1 day, 1 week, 1 month, 1 year, N years, period FROM - TO)  Real time alert engine  Robust Alert Engine:  Email notification on rule violation  SMS notification on rule violation  Screen popup at security  Hooter or Visual alerts  Single software setup  One time software setup cost  A sophisticated client server software
  • 9. General System Layout Finger Print Scanner Processing machine (PC) Camera Capture Image (On Trigger) Receive Image Receive Identity Send user information to server SERVER Store the attendance information in database Generate and Email REPORTS Continuously check for rule violation. Take action Office Network (LAN) RFID Scanner
  • 10. System snapshots
  • 11. System snapshots
  • 12. System snapshots
  • 13. S Y S T E M A R C H I T E C T U R E Visitor Management System
  • 14. Finger Print Scanne r Processing machine (PC) Camera Capture Image (On Trigger) Receive ImageReceive Finger Print The processing machine is connected to the employee database and visitor records database. When a person swipes Finger, a popup display is presented on the attached screen where the registration page is visible. (If the person had been here earlier then the fields would be auto filled). Image will be captured by the attached webcam. A record for this visit will be stored. A message will be transmitted over LAN to the person whom the visitor has come to meet Employee 1 workstation (PC) Employee 2 workstation (PC) Employee 4 workstation (PC) Employee 5 workstation (PC) The concerned persons display shows a pop up message with the image of the visitor. The Employee can then take one of the following actions: 1. ACCEPT 2. REJECT 3. FORWARD This selection by the employees on the pop-up on his screen will be received by the security guard. Based on Employees willingness, a temporary Card will be issued to the visitor. If the employee forwards the visiting request to some Other employee, a request message similar to the one Received by this employee will be generated and sent to the new employee. Office Network (LAN) General System Layout
  • 15. FPS SERVER 1. Finger Swipe Detected 2. Server checks in the DB whether it is a new visitor. -> If it is a new visitor then a form is presented to the security guard for entering the details. -> If old visitor, then the history is shown and the same form is auto filled. The security guard can check the details along with the stored photo and select another employee. -> If an office employee who has forgotten / lost his RFID tag. Action may be taken as per company policies Under such circumstances. Cam 3. Capture the image of the visitor and store in the database Employee 1 PC 4. Server generates a request for the host employee for this visitor 5. Employee sends back an acknowledgement to the server Employee X PC 6. If the employee said: ACCEPT: The security guard generates a temporary card with the photograph of the visitor on it and sends the visitor in to meet the host employee. * Once the host employee meets the visitor and his meeting is over, he sends a message to the server, stating that his meeting is over. * The server generates a prompt at security cabin about this. * If the security guard does not respond with a “visitor Left Office” message within the stipulated time frame then the server raises an alert. REJECT: The security guard makes an entry for this visitor in the DB with a rejected remark and sends him back as the permission is not granted. FORWARD: The host employee can forward this visitors request to some other host employee. The new host employee can then follow the same routine. He will also be intimated about who forwarded the request to him. 8. All these transactions should be stored in a DB. Functional Flow Diagram Regular Visitor Employee 1 PC OR 9. REPORTS
  • 16. FPS SERVER 1. Finger Swipe Detected 2. Server checks in the DB whether it is a new visitor. -> If it is a new visitor then a form is presented to the security guard for entering the details. -> If old visitor, then the history is shown and the same form is auto filled. The security guard can check the details along with the stored photo and select another employee. Cam 3. Capture the image of the visitor and store in the database Employee 1 PC 5. Server acknowledges the arrival of the client the host employee. 4. Critical Client: Employee fills up the form and sends it to server before the visitors arrival. The window opens and remain at security gate where the client is expected. When the client reaches, his finger print is captured, image is grabbed and pass is generated based on the information that host employee had provided. This allows saving time for the client as the registration process is avoided. 6. All these transactions should be stored in a DB. Functional Flow Diagram Critical Client Visitor
  • 17. S Y S T E M A R C H I T E C T U R E Vendor Attendance System
  • 18. General System Layout Finger Print Scanner Processing machine (PC) Camera Capture Image (On Trigger) Receive Image Receive Identity -> The processing machine is connected to the visitor records database. -> When a person swipes Finger or flashes RFID card, a popup display is presented on the attached screen where the registration page is visible. SERVER -> Server maintains the attendance record for all the visiting vendors. When a new vendor Employee comes in and marks his identity a record is filled for his entry / exit along with the current time. Office Network (LAN) RFID Scanner -> If the person had been here earlier then the fields would be auto filled. -> Image will be captured by the attached webcam. -> A record for this visit will be stored. -> A message will be transmitted over LAN to the server for making an Entry for this persons attendance. -> Server checks the employee attendance against the stored rules and may raise an alert if there is Any violation (Like an employee coming on a day of holiday etc). -> Server may also raise an alert under circumstances Where the employee registers himself while coming in, but forgets to mark his entry while leaving.