Clockwatch Time-and-Attendance Software

Time-and-Attendance systems are a low-cost, customizable time-tracking solution. *Anviz* hardware features keypad, LCD display and your selection of proximity, or biometric options. Hardware also includes features for optional access control at a door or gate.

Some readers may also be used in dual reader applications. Dual card-readers permit the use of separate card-reader devices for ENTRY and EXIT.


Time-and-Attendance readers feature a card-reader option.
The readers can also utilize an Ethernet TCP/IP interface for communication with a host computer. Using your Windows software or other application software, the host computer can perform actions such as adding employees; configuring terminals; monitoring card access; viewing hours; and more. Optional access control is available for controlling access to doors and/or gates. The system is customizable to suit your needs. The low-cost *ANVIZ* terminal may be purchased directly from the supplier – *Itatec*.

The terminal …

  •  is compatible with dual-reader applications and comes with optional door or gate access control
  •  is completely customizable
  •  has an on-board, battery-backed employee database
  • offers CSV output files which are compatible with database and spreadsheet applications

There is also a biometric fingerprint reader option, proffering:

  • selectable access modes – either card-and-fingerprint fingerprint only or card-only
  •  communications options
  •  firmware upgrade capability

Most of these systems, at a fraction of the cost, offer features found in more sophisticated end products. This low initial outlay is made possible because terminal units are purchased directly from the core-partner and South African distributor. So you will be purchasing the best at a very reasonable price. This is a huge advantage!.

Biometric Access Control Systems

In earlier days, password systems were introduced mainly for security. Over time, hackers found ways to break the password security systems. Subsequently, identity cards were developed. In some companies this system is still being used. However, security issues arise when restricted locations or confidential resources require careful control. Identity card readers cannot fulfill this need. Thus more secure security systems are needed. Market demand has moved toward biometric access control systems based on physical and behavioral characteristics. Physical traits appertain to the shape of one’s body; fingerprints; palm print; and face recognition (face recognition includes the distance between the two eyes, the distance between the nose and ear, the size of the nose, any facial blot or blemish etc.). The latest technology uses eye retina scanners.
Behavioral traits include typing rhythm which requires the person to type some words, thereby identifying the person based on his/her typing rhythm. Another behavioral trait is voice. There are many systems that utilize physical and behavioral traits.

How Biometric Access Control Systems Operate

The biometric access control system works on verification. A single system can consider more than one trait, which means that the system verifies all physical criteria. The biometric access control system identifies the person who wants to access secure resources then matches this with data stored in a database.  On the basis of this data, the system verifies who the person is. If this data is not verified, the person is allowed access to the secure premises or resources. Biometric systems can also identify a particular person in a group of people, verifying data in the same way as above. When a match occurs, the system alerts the administrator.

Great Investment

This system is a great investment. It only requires a once-off payment and no maintenance is necessary – no hidden costs! This system requires the end-user creates a database by first entering the data of authorized persons. This data must match that on the database to allow authorised persons access to the secure resource(s). The security level of biometric access control systems is very high compared to systems based on password or identity cards. Biometric systems would require duplicating biometric traits to hack, which is very hard, in-fact nearly impossible. Therefore this type of system provides the highest level of security.

These days biometric access control systems are popular worldwide. Even biometric passports have become a trend. Biometric access control systems are very fast and great to use in areas that are always filled with people.

Time And Attendance Management System

With thousands and thousands of employees working in many companies around the world, the need for an efficient organizational system or programs is vital.

There are many companies offering time management solutions that replace paper-based calculations. The monitoring of employee work hours for the entire organization and the control of various important statistics, such as accrued benefits, can now be electronically calculated.

However, many employees resent the introduction of these systems – replacing old habits is even harder than replacing software or paper-based timekeeping methods!

Benefits of using a Time-and-Attendance Management System

Think of a time sheet or an employee card-based attendance system found in most organizations… the objective is to determine the attendance and time spent at work for each employee.

By harnessing the speed of computers, hours worked by the staff are quickly and accurately calculated and time sheets effortlessly generated. Anomaly reports such as days absent, late coming and abuse of paid breaks can be easily programmed into the calculations.

Reliable and Easy to Use

Our in-house time-and-attendance software – *Clockwatch* – has evolved over more than ten years. On-going feedback from some of the hundreds of users is incorporated and applied to refine and constantly improve our software – giving you the best value for your money.

Easy to Upload into most Payroll Systems

After time sheets have been generated, the hours worked are ready to be imported into your Payroll program. *Clockwatch* seamlessly integrate with “Brilliant”, “Softline Pastel”, “VIP”, “Paymaster”, “Payslip”, “Q-Data”, “Easipay”, “Accsys”, “Paywise”, and many others that are continually being offered in the market place.

No Irregularities

Clocking data is stored on your computer. All changes are highlighted on the time sheets for you and your employees to check. Any irregularity is matched exactly to the employee or software administrator through unique identifying methods (e.g. fingerprint or bar-coded cards).

Accurate Calculation

*Clockwatch* software accurately calculates every addition or change to an employee’s time sheet – for every day, week or month – whenever your company rules and work parameters are changed or compromised.
Time-sheets are easily comprehended by employees and administrative staff. Salary payments are accurately imported into your payroll package and can be compared to the employees’ time sheets should there be a query.
Employees are happy that they are being paid for the actual hours worked and companies are happy that hours worked are accurately calculated and no employee will be short- or over-paid.

The Sagem Biometrics Fingerprint Reader

The Sagem biometric fingerprint reader has amazing features. Getting it will definitely be a worthy investment.

These readers are available at Itatec. View our products or contact us for more information regarding Sagem and our products.

Here Are Its Features

It has a 500 DPI optical fingerprint sensors, MI fare card reader built into recommended model allowing a secondary entry method if desired. This reader is able to operate independently of the Biometric server software. There are individually adjustable false-acceptance rates for each Sagem Biometric reader and there are also outdoor and false finger detection models available.

Biometrics consist of automated methods of recognizing a person based on unique physical characteristic. Each type of biometric system, while different in application, contains at least one similarity: the biometric ID must be based upon a distinguishable human attribute such as a person’s fingerprint, iris, voice pattern or even facial pattern. Today Biometric fingerprint readers are by far the most popular form of biometric access security used, with a variety of access control systems on the market intended for general and mass market usage. Long gone are the huge bulky Biometric fingerprint scanners; now a Biometric fingerprint reader can be small enough to be incorporated into a laptop for security.

A fingerprint is made of a series of ridges and grooves. Once a Biometric fingerprint is captured the system locates the minutia points. These minutia points occur where the lines of the ridges begin, end, branch off and merge with other ridge lines. These points are then mapped and a line is drawn between each point. This creates a map of how each point relates to the other points. The map is then stored as a data stream called a minutia template in a database for future comparison with other presented fingerprints. It is important to note that during the entire process no fingerprint images are stored on the system and a fingerprint image cannot be recreated from the minutia template.

Facial Recognition

Traditionally, identity verification has relied on something you know, such as a password, or something you have, such as a card or pin access device. Biometrics is unique in that it is based on the physical characteristics of an individual. Biometric facial recognition is just one type of biometrics identification. Other types include iris scanning, fingerprint, and voice recognition. Given that portrait photos are already part of the current identification system for photo cards, it is simple to merge this with a biometric access system.

Techniques In Biometric Facial Recognition

The first one is the facial geometry which uses geometrical characteristics of the face. It sometimes uses several cameras, like 3D or 2D, in order to get better accuracy. There is also skin pattern recognition which is the visual skin print and facial thermo gram that uses an infrared camera to map the face temperatures. To prevent a fake face or mole from faking out the system, many systems now require the user to smile, blink, or otherwise move in a way that is human before verifying. The system can be used to compare the photograph taken when a person enters the premises, against the images stored in the centralised security system.