Any Time & Attendance software would not be complete unless it is paired up with some kind of punch clock. We offer 4 different types of clocks: Hand Reader, Fingerprint Reader, Face Reader and Card Reader.  Each type of device uses different technology to identify employee.  Some time clocks feature multiple recognition technologies, such as fingerprint add facial recognition.

Hand Reader uses hand geometry to verify employee, it can be used in any type of environment including where employees’ hands are often dirty or wet.

Fingerprint Reader, just like HandPunch uses biometric technology to identify an employee, it will ensure that “buddy punching” is eliminated.  This type of clocks are best suited for a cleaner type of environment, where employees’ hands do not get too dirty.  All our fingerprint readers have built-in Proximity/RFID card reader and password identification methods.  Some models include a face and recognition as well.

Face Recognition is another biometric time clock where employees are identified by their facial features.  This is the newest and upcoming recognition method becoming more and more popular.  If employee’s hands are dirty or wet, it will not be affected by the recognition. All of our face recognition readers include build in Proximity/RFID card reader and some come in combination with fingerprint reader.

Card Reader, is the least expensive reader and it can be used in any type of environment.  But, it does not eliminate “buddy punching” and require extra expense when cards are lost or damaged.

Below is a chart comparing Hand Reader, Fingerprint Reader, Face Reader and Proximity Card Reader:

HandPunch Fingerprint Reader Face Reader Card Reader
Primary Recognition Technology Hand Geometry Fingerprint scanning Face scanning RFID
HID
Mifare
Barcode
Magnetic Stripe
Additional Recognition Technology Face Reader
Password
RFID/HID/Mifare
Fingerprint Reader
Password
RFID/HID/Mifare
Eliminates Buddy Punching x
Connection
Ethernet Optional
Serial
Phone Modem Optional x x x
USB x
Device Usability
Vulnerable to wet or dirty hands No Yes No No
Can be used outdoors Yes No No No
Setup
Installation Easy to Moderate Easy Easy Easy
Configuration Easy Easy Easy Easy
Price From $955 From $445 From $0 From $395

Hand Geometry

Hand geometry measures the size and shape of a person’s hand, including length, width, thickness and surface area. When the user places his or her hand on the platen of a device like the Schlage HandPunch, the device scans the hand to determine if the profile stored in the system matches the hand on the platen. In many cases, a swipe card or PIN may also be required to allow access.

  • No fingerprints or palm print is stored in the device
  • Data is not shared with any outside agencies or companies
  • Verification takes place in about one second
  • Unauthorized access is eliminated since credentials cannot be duplicated
  • Since the “credential” cannot be lost or stolen there is no cost to replace lost, damaged or stolen cards or keys
  • Hand geometry accurately identifies the user even if his or her hand is dirty, wet or injured, or if the device is damp, dusty or dirty

Fingerprint Scanning

Fingerprint scanning measures minutiae which include certain visible aspects of fingerprints such as ridges, ridge endings, and bifurcation (forking) or ridges. Image below shows core points on different fingerprint patterns.

Fingerprint_Patterns
A core point is defined as the topmost point on the innermost upward re-curving ridge line. Special minutiae based algorithm extracts key minutiae points from a live image at the time of acquisition and convert the data into a unique mathematical template comparable to a 60-digit password. This unique template is then encrypted and stored. The next time a new fingerprint image for an individual is scanned by the FRD, another template is created and the two templates are compared to verify user’s identity.

  • No actual image of the fingerprint is stored, only the minutiae-based template
  • Data is not shared with any outside agencies or companies
  • Verification takes place in less than 2 seconds
  • Unauthorized access is eliminated since credentials cannot be duplicated
  • Since the “credential” cannot be lost or stolen there is no cost to replace lost, damaged or stolen cards or keys

Face Recogntion

Facial recognition works by comparing selected facial features from the image during registration with the one stored in a template.

  • No actual image of the face is stored, only binary representation which cannot be converted back to image
  • Data is not shared with any outside agencies or companies
  • Verification takes place in less than 2 seconds
  • Unauthorized access is eliminated since credentials cannot be duplicated
  • Since the “credential” cannot be lost or stolen there is no cost to replace lost, damaged or stolen cards or keys

RFID/Proximty

Each Proximity card has a unique identification number, at least 26 bits long.  When user enrolled, a specific proximity card is associated with his employee id.  Employee simply flashes card in front of the reader and is identified.
Proximity card reader can be integrated with fingerprint reader, allowing companies to user fingerprint or proximity cards to identify user.