Any Time & Attendance software would not be complete unless it is paired up with some kind of punch clock. We offer 4 different types of clocks: Hand Reader, Fingerprint Reader, Face Reader and Card Reader. Each type of device uses different technology to identify employee. Some time clocks feature multiple recognition technologies, such as fingerprint add facial recognition.
Hand Reader uses hand geometry to verify employee, it can be used in any type of environment including where employees’ hands are often dirty or wet.
Fingerprint Reader, just like HandPunch uses biometric technology to identify an employee, it will ensure that “buddy punching” is eliminated. This type of clocks are best suited for a cleaner type of environment, where employees’ hands do not get too dirty. All our fingerprint readers have built-in Proximity/RFID card reader and password identification methods. Some models include a face and recognition as well.
Face Recognition is another biometric time clock where employees are identified by their facial features. This is the newest and upcoming recognition method becoming more and more popular. If employee’s hands are dirty or wet, it will not be affected by the recognition. All of our face recognition readers include build in Proximity/RFID card reader and some come in combination with fingerprint reader.
Card Reader, is the least expensive reader and it can be used in any type of environment. But, it does not eliminate “buddy punching” and require extra expense when cards are lost or damaged.
Below is a chart comparing Hand Reader, Fingerprint Reader, Face Reader and Proximity Card Reader:
HandPunch | Fingerprint Reader | Face Reader | Card Reader | |
---|---|---|---|---|
Primary Recognition Technology | Hand Geometry | Fingerprint scanning | Face scanning | RFID HID Barcode Magnetic Stripe |
Additional Recognition Technology | – | Face Reader Password RFID/HID |
Fingerprint Reader Password RFID/HID |
– |
Eliminates Buddy Punching | – | |||
Connection | ||||
Ethernet | Optional | |||
Serial | ||||
Phone Modem | Optional | – | – | – |
USB | – | |||
Device Usability | ||||
Vulnerable to wet or dirty hands | No | Yes | No | No |
Can be used outdoors | Yes | No | No | No |
Setup | ||||
Installation | Easy to Moderate | Easy | Easy | Easy |
Configuration | Easy | Easy | Easy | Easy |
Price | From $$955.00 | From $$955.00 | From $$955.00 | From $$955.00 |
Stop wasting your time – and money – tracking employee time and attendance
Hand Geometry
Hand geometry measures the size and shape of a person’s hand, including length, width, thickness and surface area. When the user places his or her hand on the platen of a device like the Schlage HandPunch, the device scans the hand to determine if the profile stored in the system matches the hand on the platen. In many cases, a swipe card or PIN may also be required to allow access.
- No fingerprints or palm print is stored in the device
- Data is not shared with any outside agencies or companies
- Verification takes place in about one second
- Unauthorized access is eliminated since credentials cannot be duplicated
- Since the “credential” cannot be lost or stolen there is no cost to replace lost, damaged or stolen cards or keys
- Hand geometry accurately identifies the user even if his or her hand is dirty, wet or injured, or if the device is damp, dusty or dirty
Fingerprint Scanning
Fingerprint scanning measures minutiae which include certain visible aspects of fingerprints such as ridges, ridge endings, and bifurcation (forking) or ridges. Image below shows core points on different fingerprint patterns.
- No actual image of the fingerprint is stored, only the minutiae-based template
- Data is not shared with any outside agencies or companies
- Verification takes place in less than 2 seconds
- Unauthorized access is eliminated since credentials cannot be duplicated
- Since the “credential” cannot be lost or stolen there is no cost to replace lost, damaged or stolen cards or keys
Face Recogntion
Facial recognition works by comparing selected facial features from the image during registration with the one stored in a template.
- No actual image of the face is stored, only binary representation which cannot be converted back to image
- Data is not shared with any outside agencies or companies
- Verification takes place in less than 2 seconds
- Unauthorized access is eliminated since credentials cannot be duplicated
- Since the “credential” cannot be lost or stolen there is no cost to replace lost, damaged or stolen cards or keys
RFID/Proximty
Each Proximity card has a unique identification number, at least 26 bits long. When user enrolled, a specific proximity card is associated with his employee id. Employee simply flashes card in front of the reader and is identified.
Proximity card reader can be integrated with fingerprint reader, allowing companies to user fingerprint or proximity cards to identify user.