Finger Print Door Lock System
The fingerprint lock is the latest, high security product that gives us the advantage of no combination to remember, no keys to find, nor to change, and no lock to replace in case we lost our keys. Fingerprint recognition is the most practical option because of its safety, reliability and the cost effectiveness.
Fingerprint door lock is one of the most favorable security products, based upon fingerprint analysis procedure. These devices can secure our assets as well as people living in the house as they offer excellent replacements to traditional locks and keys. Due to increasing crime rate, we can depend upon fingerprint door lock to give security at our doorsteps.
Finger Print Time Attendance System
Method: Fingerprint, Fingrprint+Password, Fingerprint+RFID, Fingrprint+Password+RFID
Biometrics can be used for authentication of persons for use in Access Control / Time & Attendance. Biometrics can also be employed as a replacement for passwords and / or cards in computer security system. With biometrics, there is no need for password maintenance or changes. A biometric cannot be lost or forgotten, so there is no need to reset passwords. Even applications where positive match is required through 1:N identification like checking of professional Blood donors, spot checking of personnel in high security areas, etc..
Proximity and Smart Card Reader
Proximity cards and readers are the most commonly used Access Control system these days. The name proximity is derived from the fact that there is no direct contact between the card and the sensor unlike some of the older technologies.
The proximity card can read from the range of 4" to 2 feet depending on the type of reader used (either short or long range). The cards are available in 26 bit or 32 bit weigh and formats.
The card emits a signal, which is read by the card reader. Every card has a unique number and comes with a facility code, which is unique to the particular facility. These will be linked to the employee register to obtain daily and monthly reports.
The card is programmed in the system, and when the card is swiped it is checked for authenticity and the access is granted. This in turn actuates various access devices/barriers.