Compare Time Clocks

Any Time & Attendance software would not be complete unless it is paired up with some kind punch clock. We offer 3 different types of clocks: Hand Reader, Fingerprint Reader and Card Reader.  Each type of device uses different technology to identify employee and has its own pros and cons.

For example, Hand Reader uses hand geometry to verify employee, it can be used in any type of environment including where employees’ hands are often dirty or wet. But, it is more expensive than fingerprint or card reader.

Fingerprint Reader, just like HandPunch uses biometric technology to identify an employee, it will ensure that “buddy punching” is eliminated and it is much less expensive.  But this reader is best for office type of environment.  If workers hands are dirty, fingerprint reader might not identify this person.

Card Reader on the other hand, is the least expensive reader and it can be used in any type of environment.  But, it does not eliminate “buddy punching” and require extra expense when cards are lost or damaged.

Below is a chart comparing Hand Reader, Fingerprint Reader and Proximity Card Reader:

HandPunch Fingerprint Reader Card Reader
Recognition Technology Hand Geometry Fingerprint scanning RFID
Eliminates Buddy Punching Yes Yes No
Connection
Ethernet Optional By Default By Default
Serial By Default By Default By Default
Modem Optional Not available Not available
USB Not available Optional Optional
Device Usability
Vulnerable to wet or dirty hands No Yes No
Can be used outdoors Yes No No
Setup
Installation Easy to Moderate Easy Easy
Configuration Easy Easy Easy
Price From $[HP1000_price] From $[U300C-ID_price] From $[US10CR_price]

Hand Geometry

Hand geometry measures the size and shape of a person’s hand, including length, width, thickness and surface area. When the user places his or her hand on the platen of a device like the Schlage HandPunch, the device scans the hand to determine if the profile stored in the system matches the hand on the platen. In many cases, a swipe card or PIN may also be required to allow access.

  • No fingerprints or palm print is stored in the device
  • Data is not shared with any outside agencies or companies
  • Verification takes place in about one second
  • Unauthorized access is eliminated since credentials cannot be duplicated
  • Since the “credential” cannot be lost or stolen there is no cost to replace lost, damaged or stolen cards or keys
  • Hand geometry accurately identifies the user even if his or her hand is dirty, wet or injured, or if the device is damp, dusty or dirty

Fingerprint Scanning

Fingerprint scanning

Fingerprint scanning measures minutiae which include certain visible aspects of fingerprints such as ridges, ridge endings, and bifurcation (forking) or ridges. Image below shows core points on different fingerprint patterns.

Fingerprint_Patterns
A core point is defined as the topmost point on the innermost upward re-curving ridge line. Special minutiae based algorithm extracts key minutiae points from a live image at the time of acquisition and convert the data into a unique mathematical template comparable to a 60-digit password. This unique template is then encrypted and stored. The next time a new fingerprint image for an individual is scanned by the FRD, another template is created and the two templates are compared to verify user’s identity.

  • No actual image of the fingerprint is stored, only the minutiae-based template
  • Data is not shared with any outside agencies or companies
  • Verification takes place in less than 2 seconds
  • Unauthorized access is eliminated since credentials cannot be duplicated
  • Since the “credential” cannot be lost or stolen there is no cost to replace lost, damaged or stolen cards or keys

RFID

Each Proximity card has a unique identification number, at least 26 bits long.  When user enrolled, a specific proximity card is associated with his employee id.  Employee simply flashes card in front of the reader and is identified.
Proximity card reader can be integrated with fingerprint reader, allowing companies to user fingerprint or proximity cards to identify user.