Products
We, at Hiphen Solutions, provide various models of these Bio Metric Attendance and Access Control Systems, which can use fingerprint recognition as well as RF cards and passwords. These also come in various user-capacities. The Info-Attendance Series we sell and support can be configured with electro magnetic locks for Access Control with support for SMS and e-mail notifications during an alarm event.
Biometrics comprises methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In computer science, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance.
Hiphen products will help to prevent:
Unauthorized Access
Theft & Vandalism
Personal Violence
Impersonation during Examination
Biometric characteristics can be divided in two main classes
- Physiological are related to the shape of the body. Examples include, but are not limited to fingerprint, face recognition, DNA, Palm print, hand geometry, iris recognition, which has largely replaced retina, and odour/scent.
- Behavioral are related to the behavior of a person. Examples include, but are not limited to typing rhythm, gait, and voice. Some researchers have coined the term behaviometrics for this class of biometrics.
Strictly speaking, voice is also a physiological trait because every person has a different vocal tract, but voice recognition is mainly based on the study of the way a person speaks, commonly classified as behavioral.
It is possible to understand if a human characteristic can be used for biometrics in terms of the following parameters:
- Universality – each person should have the characteristic.
- Uniqueness – is how well the biometric separates individuals from another.
- Permanence – measures how well a biometric resists aging and other variance over time.
- Collectability – ease of acquisition for measurement.
- Performance – accuracy, speed, and robustness of technology used.
- Acceptability – degree of approval of a technology.
- Circumvention – ease of use of a substitute.
A biometric system can operate in the following two modes
- Verification – A one to one comparison of a captured biometric with a stored template to verify that the individual is who he claims to be. Can be done in conjunction with a smart card, username or ID number.
- Identification – A one to many comparison of the captured biometric against a biometric database in attempt to identify an unknown individual. The identification only succeeds in identifying the individual if the comparison of the biometric sample to a template in the database falls within a previously set threshold
The first time an individual uses a biometric system is called an enrollment. During the enrollment, biometric information from an individual is stored. In subsequent uses, biometric information is detected and compared with the information stored at the time of enrollment. Note that it is crucial that storage and retrieval of such systems themselves be secure if the biometric system is to be robust. The first block (sensor) is the interface between the real world and the system; it has to acquire all the necessary data. Most of the times it is an image acquisition system, but it can change according to the characteristics desired.
The second block performs all the necessary pre-processing: it has to remove artifacts from the sensor, to enhance the input (e.g. removing background noise), to use some kind of normalization, etc. In the third block necessary features are extracted. This step is an important step as the correct features need to be extracted in the optimal way.
A vector of numbers or an image with particular properties is used to create a template. A template is a synthesis of the relevant characteristics extracted from the source. Elements of the biometric measurement that are not used in the comparison algorithm are discarded in the template to reduce the filesize and to protect the identity.
If enrollment is being performed, the template is simply stored somewhere (on a card or within a database or both). If a matching phase is being performed, the obtained template is passed to a matcher that compares it with other existing templates, estimating the distance between them using any algorithm (e.g. Hamming distance). The matching program will analyze the template with the input. This will then be output for any specified use or purpose (e.g. entrance in a restricted area).
Biometric Security
The ultimate aim of authentication technology is to provide access to an authorised person only. In today’s environment, Bio Metric Security gives you an advanced and powerful tool to achieve higher levels of security and control. Bio Metric Access and Attendance Systems are advanced products wherein fingerprint recognition is optimized along with optical and software application.
We, at Hiphen Solutions, provide various models of these Bio Metric Attendance and Access Control Systems, which can use fingerprint recognition as well as RF cards and passwords. These also come in various user-capacities. The Info-Attendance Series we sell and support can be configured with electro magnetic locks for Access Control with support for SMS and e-mail notifications during an alarm event.
Hiphen products will help to prevent:
Unauthorized Access
Theft & Vandalism
Personal Violence
Impersonation during Examination
Hiphen have also promised to adhere to a ‘Support & Service Commitment’ which means that you have the peace of mind that you will receive a professional, second to none service beginning with your initial enquiry, through purchasing and installation of product(s) and of course a comprehensive after sales service.
Highlights
- Secure and Easy to Use
- Multiple Authentication types: Fingerprint, Smart Cards / Key Fobs, PIN codes and facial recognition
- Network capable for use in multi-unit environments
- Single enrollment location in multi-unit environment
- Administration via Web Browser
- Four levels of administration
- Controlled access by Groups and/or Time & Date
- Full featured reporting
ID Cards
Our ID badge system can provide valuable information as to the identity of the holder, i.e. photograph, name, title, card number and School logo to give a sense of belonging. We can also provide systems based on smart cards. The chip in the smart card allows other personal information to be stored on the card, such as medical, meal or library usage.
Both the Access Control and Time & Attendance systems use cards or tags to identify the user.
The cards can be printed to order, with your University Logo, the students name, title, number and photo.
Cards can be used as an ID tag for the students – encouraging the students to wear the card as recognition of their status and position. It will help when are in contact with the public.
iClock 990
IClock 990 is a standalone fingerprint T&A + Access Control system System, IN and OUT status, also low price with good performance, designed specially in the purpose of popularizing the fingerprint products. It could store 1500 fingerprint templates and 50000 transaction records. It will bring you much profits because of its low price.
Technical Specifications
- Users: 3000/10000 Fingerprints
- Transaction: 50,000/80,000 Logs
- CPU: 32bit High End Microprocessor
- Sensor: 500 dpi Optical Sensor / Secugen Sensor (Optional)
- Identification speed: <=2 Sec
- FAR: <=0.0001%
- FRR: <=1% FRR: <=1%
Smart Acces8000
Recommended Product Information
Smart Acces8000 is a latest time attendance and access control terminal with 8”TFT display, offering unparalleled performance using an advanced algorithm for reliability, precision and excellent matching speed.
The Smart Acces8000 features the fastest commercial-based fingerprint matching algorithm and high-performance, high-image quality optical fingerprint sensor. The 8” TFT can display more information vividly, including user photo, fingerprint image quality and verification result etc. 8 function keys are the shortcuts to change the attendance status, work-code or to browse the short message, and can be defined as required. TCP/IP communication is standard and makes sure the data transmission between terminal and PC can be easily done within several seconds.
The camera can capture the image of the user. Backup battery can provide more than 4 hours power supply when power input fails down.