Access Control time attendence, Biometrics UAE

Page 1

fi e

ISO

P

9001:2008

er

Cer ti

S olutions

vid

www.avi-infosys.com

IT

ro

d

World Class Biometric Solutions

Product Catalouge


AVI INFOSYS - Profile

AVI INFOSYS is an ISO 9001:2008 Certified Biometric Solutions Provider Company based in Dubai, United Arab Emirates. “AVI INFOSYS” is pleased to respond to Clients Project Requirements for Comprehensive and Total Integrated Solution for Enterprise-Wide Management Information Systems. Our review of the Market Place indicates that many Vendors can provide the Automated Systems; however only a few, such as “AVI INFOSYS” is Capable of Assisting Client in Plans, Develops and Implements of such a Highly Complex Biometric Security Management & Information Technology Projects. “AVI INFOSYS” business is to Partner with Clients to achieve Breakthrough Performance through the intelligent use of the Technologies. “AVI INFOSYS” provides: Business and Information Technology Consulting Reusable and Customized Software System Integration Services in Biometric Field for Medium to Large Local, Regional and International Organizations

“AVI INFOSYS” has successfully Developed, Integrated and Delivered Systems to Clients, including several in the Middle East; our successful accomplishments are based on four corporate strengths.

Partnership based of Trust Dedication to deliver on Commitments Focused Industry Expertise Linking People, Processes, Organizations and Technologies The Achievement of Breakthrough Performance requires Forward Looking & Practical Ideas for Improving Business Processes Intelligent use of Technology to enable Improved Processes Committed, Trained People in Appropriately Aligned Organizations “AVI INFOSYS” is a leader in Partnering with clients to achieve breakthrough performance through the intelligent use of Information Technology. “AVI INFOSYS” is Trusted and Valued by clients for the High Quality Services and Commitment to deliver real results.

2


Increase security - Provide a convenient and lowcost additional tier of security. Reduce fraud by employing hard-to-forge technologies and materials. For e.g. Minimise the opportunity for ID fraud, buddy punching. Eliminate problems caused by lost IDs or forgotten passwords by using physiological attributes. For e.g. Prevent unauthorised use of lost, stolen or “borrowed” ID cards. Reduce password administration costs. Replace hard-to-remember passwords which may be shared or observed. Integrate a wide range of biometric solutions and technologies, customer applications and databases into a robust and scalable control solution for facility and network access

“AVI INFOSYS” products and Services Biometric Fingerprint Identification Solutions Biometric Access Control Solutions. Smartcard based Prepaid and Loyalty Rewards Systems Web based Time Attendance Software and Solutions Smartcard /RFID Card based Solutions Enterprise Firewall Solutions Secure Networking, Network Security Biometric Based Access Control / Encryption Solutions Smartcard Production and Printing Services Secured VPN Solutions IT Infrastructure Security Solutions Special Capabilities & Expertise Enterprise - Wide Information Systems (EIS) Management Information Systems (MIS) Decision Support Systems (DSS)

Offer significant cost savings or increasing ROI in areas such as Loss Prevention or Time & Attendance. Unequivocally link an individual to a transaction or event.

Preventive Maintenance Management Systems (PMMS) Hospitality Information Systems (Hospital & Hotel) - (HIS) Industries cover by “AVI INFOSYS” Applications & Software Development Solutions Government Financial Institutions / Banks Industrials / Productions Hospitality (Hospitals & Hotels) Educational (University & School) Construction & Contracting Legal, Library & Case-Handling Multi Offices Organizations

3


Management & Technology Solutions State-of -the-Art Technology Open Systems Architecture & Environment Portable on any Platform and Scalable Adaptable to Newer Technology Integrating information: Technology, Systems and Management

“AVI INFOSYS” assists clients in…

Responding to Competition Gaining or Maintaining Market Leadership Achieving Grater Efficiencies Dramatically Improving Performance

“AVI INFOSYS” has assist clients in making Intelligent Investment on Information Technology, deriving the highest returns possible and helps clients to understand the changes they needs to make their organizations to operate efficiently and effectively.

Our Approach and Methodology The following processes (We called it “A Dozen of Success”) will be adopted by “AVI INFOSYS” toward Developing the IT Strategy for the clients… 1. Define High Level business objectives 2. Assess current Information System (IS) support and services

Putting It All Together IN the complexity of todays Information Technology, many elements must come into play before an integral whole is achieved. These elements vary in emphasis from business to business, but to the solution provider each has vital role in the final product: choice of hardware and peripherals, communications setup,

networking, RDBMS, operating system, Arabization, understanding of requirements and - foremost - the users. “AVI INFOSYS” has the experience and track record to prove it. We have kept abreast with the ever-evolving technology. We have migrated / converted systems from proprietary to open platform, from 3GLs to RDBMS and CASE Tools, and from simple networks to clientserver architecture.

“AVI INFOSYS” Successes Our successes are based on achieving real result for the clients, maintaining a High Standard of customer satisfaction and establishing Long-Term client relationships. 4

3. Determine future IS support and services required 4. Evaluate potential contribution of IS department and involved units 5. Analyse gap between current and future systems 6. Prioritise development and produce plan 7. Implement improved methods for Development 8. Implement improved Project Management methods 9. Plan immediate Developments 10. Implementation 11. Educate and Trains end- users and administrators 12. Maintain Customer Support and Services.


AVI-FTA-507

AVI-TEC™ Fingerprint based Time Attendance Systems: Features: Simple and durable device with a robust inbuilt optical scanner Records up to 50000 / 80000 / 100000 transaction records User Capacity - 1500 / 2000 / 2500 identities Free SDK Available for Software Customization Supports multiple companies of one organization at a single location Supports one company at multiple locations. Supports multiple input units installed for one company Company Rules, Time Management Parameters can be easily customized on the device Easy to manage Employees, Departments and Multiple Shifts Supports leave management Flexibility of Reports generated by the Software - Daily Attendance Statistics Report, Attendance General Report, Staff On- Duty/Off Duty Report Department Attendance Report, etc. Data available in excel/html/ASCII format for further calculation Seamless integration with various Accounting and Payroll Packages

Benefits: Built in strong U.S.A Intel32bit fingerprint embedded standalone module (ZEM100),it is easy to integrate with various systems Support finger 360 degree identification, easy to use. Sensor window cotton improving image quality, accepts dry, wet fingers CMOS automated exposure and intelligent compensation improved image quality Adjusting image distortion, assure fingerprint matching consistency Suggesting customers cooperating as ODM or OEM, providing system analysis, mould-making, circuit design, producing-assembly, package design, etc, linear service

Technical Specifications: Size

185¨L~123W~43(H)mm

User Capacity

1500 / 2500/5000

Transaction Storage

50000/80000/125000

Algorithm version

2005 Version new algorithm

Hardware platform

ZEM100

Communications

RS232, RS485, TCP/ IP (UDP Protocol)

Power

5V 2A POE: Power Over Ethernet (Optional)

Identification time

<=2s

FAR

<= 0.0001%

FRR

<= 1%

Operating Temperature

0 C- 45C

Operating Humidity

20%-80%

Sensor

Error free Optical Sensor

Language

English , Simplified Chinese, Traditional Chinese ,other Languages Optional: Simple access control (Electro control Directness relay output 3A/12VDC) 5


AVI-FTA-508

AVI-TEC™ Fingerprint & RFID Based Time Attendance System. Features: Supports both - Fingerprint & RFID (Smartcards) for attendance recording purposes Records up to 50000 / 80000 / 100000 transaction records User Capacity - 1500 / 2000 / 2500 identities Free SDK Available for Software Customization Supports multiple companies of one organization at a single location. Supports one company at multiple locations. Supports multiple input units installed for one company. Company Rules, Time Management Parameters can be easily customized on the device Easy to manage Employees, Departments and Multiple Shifts Supports leave management Data available in excel/html/ASCII format for further calculation

Flexibility of Reports generated by the Software - Daily Attendance Statistics Report, Attendance General Report, Staff On- Duty/Off Duty Report Department Attendance Report, etc. Seamless integration with various Accounting and Payroll Packages

Technical Specifications: Size

185¨L~123W~43(H)mm

User Capacity

1500 / 2500

Transaction Storage

50000

Algorithm version

2005 Version new algorithm

Hardware platform

ZEM100

Communications

RS232, RS485, TCP/ IP (UDP Protocol)

Power

5V 2A POE: Power Over Ethernet (Optional)

Identification time

<=2s

FAR

<= 0.0001%

FRR

<= 1%

Operating Temperature

0 C- 45C

Operating Humidity

20%-80%

Sensor

Error free Optical Sensor

Language

English , Simplified Chinese, Traditional Chinese ,other Languages Optional: Simple access control (Electro control Directness relay output 3A/12VDC)

iGuard™ Biometrics Fingerprint/PIN/Smartcard based Time Attendance and Access Control System with Web based Software iGuard™ Technology Overview Each iGuard™ Biometric / Smart Card Security Appliance has a builtin Web Server enables all the computers in the corporate network to directly simultaneously access the device using any Internet Browser, such as Microsoft Internet Explorer Netscape Navigator. 6


Different computer platforms such as Apple Macintosh, Microsoft Windows Linux machines can access the device. No additional software is required. So whether you are in an airport lounge or a hotel room, you can always check if your employees are already in the office or not, and you can even control, modify or disable their access rights to your office remotely via internet connection provided your iGuard Biometric / Smart Card Security Appliance is connected to an external IP address or your network is available through a VPN connection that is reachable from your location. iGuard™ Super Master is a back-end server of iGuard™. With Super Master installed, the maximum no. of users of iGuard™ Master / Slave network will be increased to 5000 or up. And, Super Master is designed base on the iGuard™ patented embedded Web Server technologies, which enables all computers, such as Apple Macintosh, PCs & Unix machines, in the corporate computer network to setup, maintain and access the information of the device simultaneously using the well-known Internet Browser.

iGuard™ Features Multi Factor Authentication: With iGuard, users can be authenticated and verified through Fingerprint, Smartcard or Password. And depending on the different time period, you can set up the iGuard that the users can just simply presents his smartcard to get authorized (such as during hightraffic period), or requires the high-security fingerprint verification (such as after office hours or during weekends and holidays).

Access Rights: When you can easily and conveniently assign different access rights to your employees, you can plan your security better and maximize the effectiveness of the human resources. And with the built-in Web Server technology, iGuard empowers you to manage the access rights of each individual employees or a group of employees easily anytime, anywhere using any webenabled computers or mobile devices. For example, you can assign the staff members of the marketing department the rights to get in the office premises during weekdays from nine to five only, or prevent a particular employee from entering the computer server room. Reports: iGuard includes three built-in reports:

Access Log, Attendance Report & Daily In/Out report, that can be accessed via any web-enabled computer with web browser. Should more sophisticated reports be required, such as for the payroll purposes, the information can be downloaded and saved in Microsoft Excel format and in plain text format. In addition, the access records can be saved in any PC in the network in the popular ODBC database format in real-time manner, and other applications can conveniently obtain the information from the ODBC (the required software, iServer is available free-of-charge in our download page)

Economical: All the necessary hardware and software is built-in to the device, including the hardware to connect the system to the corporate network. All you need to do is to plug-in the popular RJ-45 network cable to the back of the device. No other hardware and wiring is necessary. In contrast, all other existing security systems use the old RS232 & RS485 wiring system to connect to the dedicated computers (not to the corporate network), and it usually involves a lot of extra wiring works.

7


Small Footprint: iGuard is a wall-mounted unit elegantly designed with extremely small footprint. In fact, it is the smallest stand-alone biometrics device available in the market today. It can be mounted easily and conveniently without requiring a lot of space.

Simplicity: iGuard is an Internet-Ready Security System, and is the first and the only network appliance security product in the market that uses TCP/IP as the protocol to communicate with other iGuards and the outside world. The protocol enables the device to directly connect to the corporate network via the existing cable wiring. And since the TCP/IP protocol is the Internet protocol, it allows all computers in the corporate network to access the device using the Internet Browser software. As a result, users do not need to learn to use a new software to access and administer the device, and most users can start using the device in minutes. In contrast, all other similar security systems use proprietary protocol & wiring, and proprietary software is required to access these systems and for compatibility purposes, iGuard also supports conventional interfaces including Wiegand, RS-485 & RS-232.

STEP 1 Enter Employee ID

STEP 2 Place the thumb on the sensor

STEP 3 The door is unlocked if authenticated

How it works as an Access Control System iGuard analyzes & compares a persons fingerprint against the previously enrolled record. If the two fingerprints match, the person is authenticated. And if the time is within the authorized period for entry, the device will signal release the electric door lock. The iGuard Security System analyzes and compares a persons fingerprint against the previously enrolled record. If the two fingerprints match, the person is authenticated. And if the time is within the authorized period for entry, the device will signal and release the electric door lock. Access Time restriction - you can define the authorized time for each individual or for a group of individuals. Terminal restriction - you can specify who has the rights to access a particular terminal. It is useful in 8

We are currently using SecuGen® SDA03M sensor for LM520-FOSC (FBI Certified, FIPS 201/PIV Compliant, GSA APL Listed). A new model with SDA04 sensor (FBI Certified, FIPS 201/PIV Compliant, GSA APL Listed) will be introduced in mid. 2010 to address the high end market. The SecuGen SDA03M is very rugged, accurate, and affordable as it is designed for long-lasting performance in high traffic and tough environments. “Lucky Technology has deployed earlier generations of the iGuard with the United States Air Force and the US Army and in Afghanistan and thousands of schools, universities and business buildings worldwide,” stated Wayne Wilkerson, President of Lucky Technology’s US Operations. SecuGen’s OEM sensors are used by device manufacturers all over the world and are widely recognized as among the most effective and affordable solutions for successfully integrating fingerprint capture and matching into third party devices.

a multi-device environment, where multiple doors are controlled by different devices. Password/Fingerprint Access - you can define the period in which password can be used instead of fingerprint for access. This is particularly useful if you want to just use password to access during normal office hours, but to restrict the access to authorized people only after office hours. The Access Control Mode controls the employees from entering the business premises. The system controls the electronic door strike to lock / unlock the door. Users can be assigned to different departments and the authorized time for members in each department can also be controlled. In a multi-device environment, the access rights for each department in accessing different terminals can also be assigned.


How it works - as a Time Attendance System When configured as a Time Attendance System, a user can specify whether he/she is clocking-in or clockingout. By using fingerprints to determine identity, buddy-punching problems can be totally eliminated as well as other fraud. Attendance of each employee is printed on the attendance report. The attendance report is particularly useful for payroll purposes. Wages and salaries can be paid according to the employees worked hours, overtime etc. Wages and salaries can be integrated with a smart card or automatic deposit payroll system.

FP = Fingerprint Only iGuard SC = Smart Card Only iGuard FSC = Fingerprint and Smartcard iGuard iGuard™ Power and Strike Units iGuard™ Network Appliance Power Options

Overview The AL400ULX power supply converts a 115VAC / 60Hz input, to a 4 amp of continuous supply current @ 12VDC or 3 amp of continuous supply current at 24VDC power limited output, (see specifications).

How it works Main iGuard

Working Area

Time/ Attendance iGuard

Secure Area

(Access to designated personnel only)

Entrance Door

High Secure Area (Access to designated personnel only)

Access Log Report

Smartcards for iGuard™ readers

Technical Specifications RF contactless operates at 13.56 MHz Standard NXP Mifare Card 1K bytes,15 sectors, 48 bytes each R/W is protected by encryption key, 48 bit triple DES Raw data is scrambled by 64 bit DES. High Security, suitable for all applications. Free sectors can be reserved for multiple any purposes Print your own brand on this card

9


iGuard™ Technical Specifications: FP / SC / FSC

Super Master

Power

12VDC, 600mA

12VDC, 800mA

Fingerprint Sensor

Yes / n/a / Yes

n/a

Contactless Smart Card reader writer (builtin)

n/a / Yes/ Yes

n/a

Web and Database Server

Built-in

Network Security (SSL)

Optional

Auto Data Synchronization (i.e., master / slave configuration) Yes Maximum Transaction Records stored

10,000

Static / Dynamic IP Assignment

Yes(Support existing DHCP Server)

Non-volatile memory

16MB

Computer Supported (with Internet Browser)

Macintosh, Windows 95/98/NT/ME/XP, Linux and Unix Machine

Valid Characters for Employee ID

0-9, A-B(maximum - 8 characters

Display

20 x 2 LCD with Backlight

n/a

LCD Multi-Lingual

Yes

n/a

Two Finger Enrollment

Yes

Fingerprint Sensor Type

Capacitive

n/a

Fingerprint Sensor Resolution

500dpi

n/a

Fingerprint Sensor scan area (mm)

12 x 15

n/a

Image Capture Time

< sec.

n/a

Verification Time

< 1 sec.

n/a

False Rejection Rate

<1%

n/a

False Acceptance Rate

< 0.01%

n/a

Auto-match Count

30

n/a

Network Protocol

TCP/IP, Wiegand, RS485, RS232 (Optional)

Network Interface

Ethernet (100-Base T)

Real Time Clock

Last for approx. 2 days without power

External Controls

Door Strike Open-Door Switch Break-in Alarm Door Status

n/a

Dimension (mm)

105(W) x 38(D) x 150(H)

254(W) x 193

AVI-SC 509

AVI-TEC™ SC Series is a core RFID Access Control & Time Attendance system SC Series is an import proximity T&A and A&C system, as it adopts proximity communication PSK and encrypt professional proximity card to check ID, which is much safer and more credible than those without encrypt proximity cards. Recheck the 5 PIN inputted by card holder, which is a senior and safe equipment, achieve the professional management of automatic and modern C&A and T&A. In the operation process, SC Series could offer 3 different manners. The first one is the most convenient one--use proximity card directly; the second way is to use both card and 5 No.¡¯s code, which is the most precise one; the third way is the most simplest--use 1-5 No.¡¯s code. 10

20,000


When the user is threaten to open the door, a kind of intimidating card or code could be used to output a soundless alarm signal through auto-dial machine which was connected with the alarm system. The anti-pass function is optional, which can prevent those person who has no authorization but through following others enter the room. SC Series¡¯ input and output interface could be used for linking other exterior system accessories.

System Specification: User Capacity: 30000; Transaction Capacity: 50000 With 10 cm Proximity Reader and LCD inside Standalone or contacted PC with RS232 or RS485 or TCP/IP Download records with U-Disk Identification: Standalone proximity card, proximity+5 bits code, 1 to 5 bits PIN number. Users can set up threatened alarm and code by themselves. Access Control: 50 Time Zone, 5Grouping, 10 Combination, support many fingerprint access. Operated in night with 16 bits backlight keyboard. Authentication: UL, CE, FCC, MIC The Hardware Design adopts international fashionable POE, applying professional anti-static and anti-jamming protection. All input/output are designed with over-voltage & circuit protection, illegal-dismantle alarm & professional alarm system, voltage control & compliable surveillance system. Besides, it’s completely waterproof. All these advantages make an excellent performance.

Technical Specification Card Holders

30000 cards

Transaction Capacity

50000 records

CPU

64bit ZK6001 Microprocessor

Hardware

ZEM500(Embedded Linux O/S)

Aceess Mode

Card Only, PIN Only, Card+PIN

Read Range

10-15 cm

I/O Interface

RS232/485

Baud Rate

9600-115Kbps programmable

Ethernet

10/100M

Wiegand I/O

any bit

USB

Mini-USB 2.0 port

Access Control Function

50time zones, 5groups, 10open door conbination, supports multi-users enter. TTL for connecting to lock, door sensor, exit button, alarm

LCD Panel

LCD Panel: 4 line, 16 character each line(User name, ID number, time, date, states)

Keypad

4*4 metal keypad with 4 function keys

Audio Visual Indicator

Red LED(Access denied)/ Green LED(Access granted) with Audible Beep

Housing Material

ABS ¡¤ Power Requirement: 12V DC, 400mA

Power Requirement

12V DC, 400mA

Operating Temperature

0¡ãC-45¡ãC Operating Humidity: 20%-80%

Optional

Webserver, Antipass-back, Multi-language display 11


AVI-FP-ID-510

AVI-TEC™ Fingerprint based Time Attendance & Access Control Systems: Features: Simple and durable device with a robust inbuilt optical scanner Records up to 50000 transaction records User Capacity - 1500 identities Free SDK Available for Software Customization Supports multiple companies of one organization at a single location Supports one company at multiple locations. Supports multiple input units installed for one company. Company Rules, Time Management Parameters can be easily customized on the device Easy to manage Employees, Departments and Multiple Shifts Supports leave management Flexibility of Reports generated by the Software - Daily Attendance Statistics Report, Attendance General Report, Staff On- Duty/Off Duty Report Department Attendance Report, etc. Data available in excel/html/ASCII format for further calculation

Seamless integration with various Accounting and Payroll Packages

Technical Specifications:

12

Hardware platform

ZEM500

Operating system

Linux

User capacity

1500

Transaction capacity

50000

Sensor

ZK Sensor

Algorithm version

2007 Version ZK new algorithm

Access Control

50 Time Zone, 5 Grouping, 10 Combination, Holiday Management, support many fingerprints access, support standalone work

Communicational

TCP/IP or RS232 and RS485

Keyboard and Display

LCD with 80 character and figure keypad

Power

12 V

Identification speed

< =2 seconds

FRR

<=1%

FAR

<=0.0001%

Temperature operating

0 degree centigrade - 45 degree centigrade

Humidity operating

20%-80%

Language

Simplified Chinese, Traditional Chinese, English, Other Languages

Standard

Wire Doorbell, Wiegand OUT, Wiegand IN

Optional

ID/HID/Mifare card, Web server, USB host, Short message, Work code, RIS, Antipass-back


Benefits: Built in strong U.S.A Intel32bit fingerprint embedded standalone module (ZEM100),it is easy to integrate with various systems Support finger 360 degree identification, easy to use. Sensor window cotton improving image quality, accepts dry, wet fingers CMOS automated exposure and intelligent compensation improved image quality. Adjusting image distortion, assure fingerprint matching consistency Suggesting customers cooperating as ODM or OEM, providing system analysis, mould-making, circuit design, producing-assembly, package design, etc, linear service

BioLook

Face Recognition Solution

Features:

BioLook algorithm Technical Specifications Recommended minimal image size

640 x 480 pixels

Multiple faces detection time (using 640 x 480 image)

0.07 sec.

Single face processing time (after detecting all faces)

0.13 sec.

Matching speed

100,000 faces/sec.

Size of one record in the database

2.3 Kbytes

Maximum database size

unlimited

Simultaneous multiple face processing. BioLook performs fast and accurate detection of multiple faces in live video streams and still images. All faces on the current frame are detected in 0.07 sec. and then each face is processed in 0.13 sec. Live face detection. A conventional face identification system can be easily cheated by placing a photo of another person in front of a camera. BioLook is able to prevent this kind of security breach by determining whether a face in a video stream belongs to a real human or is a photo. Face image quality determination. A quality threshold can be used during face enrolment to ensure that only the best quality face template will be stored into database. Tolerance to face posture. BIOLOOK has certain tolerance to face posture that assures face enrolment convenience: rotation of a head can be up to 10 degrees from frontal in each direction (nodded up/down, rotated left/right, tilted left/right). Multiple samples of the same face. Biometric template record can contain multiple face samples belonging to the same person. These samples can be enrolled with different face postures and expressions, from different sources and in different time thus allowing to improve matching quality. Identification capability. BIOLOOK functions can be used in 1-to-1 matching (verification), as well as 1-to-many mode (identification).

13


Fast face matching. The BIOLOOK 3.2 face template matching algorithm compares 100,000 faces per second.* Compact face features template. A face features template occupies only 2.3 Kilobytes, thus BIOLOOK-based applications can handle large face databases. Features generalization mode. This mode generates the collection of the generalized face features from several images of the same subject.

RFID and Mifare Cards for Time Attendance & Access Control Devices

TimeTracker

Time Attendance/Payroll & HRMS Software:

Then, each face image is processed, features are extracted, and the collections of features are analyzed and combined into a single generalized features collection, which is written to the database. This way, the enrolled feature template is more reliable and the face recognition quality increases considerably.

Technical Specifications Frequency 125 kHz / 13.56 MHz EM Marin : EM4102 EM4450 / Mifare: Ultralight, Mini, Classic, Desfire I-Code: SL1, SLI NXP (Philips) : Hitag 1, 2, S Infineon : Mifare: NRG Atmel : Temic 5557, 5567 Legic : Prime: MIM256, MIM1024 Advant: ATC128, ATC256, ATC512, ATC1024, ATC2048, ATC4096

Feature to upload company logo and Name to be shown in all report formats

Shift Management

Create multiple shifts per branch per day Configure late arrival and overtime calculations Manage Lunch and Tea breaks timings. System can manage both day and night shifts in 24 hours rotation. Provision of Straight / Split Shifts

Holidays and Leave Management

Software versions Available for below Hardware Devices. 1. AVI-TEC Biometric and RFID Devices 2. ZK Software Biometric and RFID Devices 3. iGuard TM Biometric and Smartcard Devices

User Management Make multiple users per company/branch/ department/shift User Access Rights Configuration for Data Safety and Software Access Control Creation of Admin. User and Normal users in Software.

Company / Branch / Department Management Manage data of multiple companies, branches and departments 14

Manage the information of all allowed HOLIDAYS per year. Manage Leave Applications, their approval or rejection status Assign allowed leaves and unpaid leaves will be deducted from salary

Employee Management Manage all details of each employee per department along with Photo upload feature Assign Shifts so created to employees and Departments Manage Employee Transfer / Resignation Search Engine for all data of Employees.

Payroll Configuration Manage Allowances and Deductions Bank Setup for Each Employee/Company/ Department


Employee Salary Generation Maintain required details of Transaction Year Manage Allowances and Deductions Bank Setup for Each Employee/Company/ Department Employee Salary Generation Maintain required details of Transaction Year Generates TAX Forms. (completely customizable if Applicable) Generates Documents handling & Expiry Passport, Visa, Heath, Insurance Cards etc. Automatic Gratuity and PF calculations based on different country Labor laws and regulations.

Machine Configuration Active Monitoring - watch details of employee entering / exiting office directly on your screen Manage multiple machines in one TA software

Manual Entry of Attendance Manage attendance of employees who are out of office for office work by manual entry Manage employee tour details

Daily Analytical Reports

Daily Attendance Report Early Arrival Report Late Arrival Report Early Departure Report Overtime Report Daily Absence Report

Master Reports Company / Branch / Department Shift Master Report Holiday and Leave Report

Contractor Management Manage Data of Contractors and details of contract signed Manages count of number of workers coming daily on work

Monthly Analytical Reports

Monthly Attendance Summary Employee Summary Report Individual Employee Monthly Attendance Report Individual Department Monthly Attendance Report Detail Present Report with total overtime calculations

Payroll Reports

Salary Package Report Permanent Employee Monthly Salary Report Monthly Salary Report of employees on Contract Bonus Details Report Bonus Summary Report Generation of Lateness and Absentees MEMO. Generation of Salary Slip in prescribed format. Overtime Report Payable Summary Payment of Wages and Tax Statement if applicable Allowances and Deductions Master Annual Leave Dues Per Employee Annual Air Ticket control per Employee Document Control with On-Screen, Reports, Email Alerts Online Alerts and reports on Screen/Email on Documents handling Expiry (Passport, Visa, Heath, Car Registration, Insurance Cards Etc.)

OUR PROJECTS SPEAK FOR ITSELF... IT’S EASY TO SEE WHY?

Total Automation

15


IT

S olutions

9001:2008

er

ISO

P

vid

Cer ti

d

ro

fi e

www.avi-infosys.com

U.A.E TOLL FREE 800 AVI (800-284) Master Suite B # 1203, Pent House Office Bel Rasheed Twin Towers, Al Quasis- III Damuscus Street PO BOX: 26813 Dubai, United Arab Emirates

INTERNATIONAL OPERATIONS

Tel : 04 258 8260 Fax : 04 2588270 Email : info@avi-infosys.com Web : www.avi-infosys.com


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.