You are on page 1of 17

General Overview

• Access Control & Attendance recording for a


large distributed enterprises is not a simple
matter.
• There are geographical separation of
sites, multiple offices, difference Business
Rules and Policies at different
locations, Complex Payroll Calculations, etc.
• The more complexity, the more struggle to
standardize and bring control to total
operation and convenience to its employees
• In absence of proper system & controls, buddy
punching, clock-padding, manipulation in
working hours, etc. take place.

© 2013 - Inttelix Security Solutions Pvt. Ltd. www.inttelix.com


More Secured Access Control System
• Automatic access control & monitoring
• Restrict personnel access as per business rules
• Allow clocking-in the employees as well tracking
the employees
• Real-time reporting of Entry/Exit of persons
• Can stop Buddy punching and timing-
manipulations
• Reduce human errors and access to real-time
accurate information
• Detailed reports can be generated in few
seconds
• Provides valuable services to employees and
management & employee/employer interests
protected

© 2013 - Inttelix Security Solutions Pvt. Ltd. www.inttelix.com


Face Recognition Technology Face Recognition
Humans mostly use faces to recognize individuals. Advances
in computing capability now enables similar recognition
automatically. Early face recognition algorithms used simple
geometric models, but the recognition process has now
matured into a science of sophisticated mathematical
representations and matching processes. Major
developments have propelled face recognition technology into
the spotlight.

Face recognition can be used for both verification (1:1), and


Identification (1:N) applications.

Face Template
The heart of the facial recognition system is the Local Feature
Analysis (LFA) algorithm. This is the mathematical technique
the system uses to encode faces. The system maps the face
and creates a "template", a unique numerical ID for that
face.

Once the system has stored a "template", it can compare it to


the thousands or millions of "templates" stored in a database.

© 2013 - Inttelix Security Solutions Pvt. Ltd. www.inttelix.com


Identification vs. Verification
Verification (1:1, one-to-one) - The process of determining a
person's identity by performing matches against one biometric

Face Recognition Technology template that is located upon known ID. 1:1 verification usually
uses tokens like: Card, code, or any other key based indexing.

Identification (1:N, one-to-many) - The process of determining a


person's identity by performing matches against multiple biometric
templates. Identification systems are designed to determine identity
based solely on biometric information. There are two types of
identification systems: positive identification and negative
identification.

Our advanced applications allow our customer full control over


recognition method. We support both 1:1 (verification) an 1:N
(identification) methods.

Performance
Recommended minimal image size 640 x 480 pixels

Multiple faces detection time


0.07 sec.
(using 640 x 480 image)
Single face processing time
0.13 sec.
(after detecting all faces)

Matching speed 100,000 faces/sec.

Maximum database size unlimited

© 2013 - Inttelix Security Solutions Pvt. Ltd. www.inttelix.com


Why Choose Face Recognition over other
Biometrics?
• It is non-intrusive and requires no physical
interaction on behalf of the user
• It is accurate and allows for high enrolment and

Face Recognition Technology •


verification rates
It does not require an expert to interpret the
comparisons
• It can use your existing hardware infrastructure –
existing cameras and image capture devices will
work smoothly
• You can use existing images without having to re-
enrol every user (For ID cards, passports, driver’s
licenses, etc.)
• It is the ONLY biometric that allows you to perform
passive identification in a one-to-many
environment (e.g. Identifying a terrorist in a busy
airport terminal)

© 2013 - Inttelix Security Solutions Pvt. Ltd. www.inttelix.com


Face Recognition Process Flow

© 2013 - Inttelix Security Solutions Pvt. Ltd. www.inttelix.com


• FRS Access is a System based on Face
Recognition Technology, specially designed to
provide irrefutable personal identification /
verification & automatic Access Controls.
• It uses pre-configured & optimized hardware &
software to enroll and verify the persons, store
their Face records, keep logs, real-time images
and interface with other application & systems
• FRS Access provides enhanced security &
superior speed
• Person’s IN & OUT logs are stored in
professional database and this reduces the
physical monitoring by security personnel
• This system also can be used for Time &
Attendance recording

© 2013 - Inttelix Security Solutions Pvt. Ltd. www.inttelix.com


KEY FEATURES
 Visual view of video input
 Visual view of face detection
 History / Enrolled / Suspects view
 Voice alerts during system operation
 Easy to use graphic interface
 Fast and accurate Face verification
 No scope for proxy/buddy punching
 Proper logs of Attendance Data
 Integrate with other HRMS/Payroll/ERPs

© 2013 - Inttelix Security Solutions Pvt. Ltd. www.inttelix.com


APPLICATION FEATURES
 Facial Recognition customizable engine
 Generic video interface
 Real time facial detection & matching
 Enhanced matching mechanism
 Black-list alerts
 Adjustable image processing
 User Management / Time Zones
 Time Attendance feature (multiple In / Out)
 Automation in Access Control
 Log browser including with real-time image
 User Privacy mode - no image savings (optional)
 Data can be exported to any file formats
 Support MS-SQL, MySQL & Oracle DB

© 2013 - Inttelix Security Solutions Pvt. Ltd. www.inttelix.com


SOFWARE INTERFACE
Facial Recognition - Adjustable Attributes
• Matching threshold (determines similarity level of matching)
• Ageing templates (to train the system)
• Matching attempts duration (if matching requires more time)
• IOD (Inter Ocular Distance – distance between the camera and face)
• Liveliness check (to check live face)
• Real time Image storing (optional)

© 2013 - Inttelix Security Solutions Pvt. Ltd. www.inttelix.com


FRS SYSTEM OPTIONS AVAILABLE

Stand-Alone System

FRS Device + FRS Device + FRS Device + FRS Stand Alone


Magnetic Card Reader Code Panel RFID Reader Device

© 2013 - Inttelix Security Solutions Pvt. Ltd. www.inttelix.com


SEQUENCE DIAGRAM

© 2013 - Inttelix Security Solutions Pvt. Ltd. www.inttelix.com


SERVER-CLIENT ARCHITECTURE

© 2013 - Inttelix Security Solutions Pvt. Ltd. www.inttelix.com


SYSTEM LAYOUT IN MULTI-SITES SCENARIO

© 2013 - Inttelix Security Solutions Pvt. Ltd. www.inttelix.com


System Requirement
1. Hardware
a) FRS Box – which comprises of:
i) Camera
iii) LCD Display
iv) Single Channel DVS
v) Buzzer & LED Indicators
vi) Power adapter & cables
b) Entry Level PC with Window 7 Prof.

2. Software
FRS Application with necessary user licenses

© 2013 - Inttelix Security Solutions Pvt. Ltd. www.inttelix.com


Inttelix® Security Solutions Pvt. Ltd. is an organization focuses on Face Recognition Systems &
Biometric Technologies. Inttelix® specializes in Face Recognition Algorithms, Biometric
Hardware, Software Research & Development, OEM and ODM supplies.
Inttelix® is headquartered in India and has subsidiary company in Brazil. We have marketing and
support offices in Delhi & Mumbai and have presence across India & Middle-East through our Resellers
Network

57A, Race Course Road, Coimbatore - 641 018


Tamil Nadu, India
Phone : +91 422 2220845, 2221539

Presence In : Ahmadabad | Baroda | Chennai | Mumbai | New Delhi


Overseas : Brazil | Hong Kong | U.S.A

© 2013 - Inttelix Security Solutions Pvt. Ltd. www.inttelix.com

You might also like