System USES wireless radio time attendance clock technology, with induction card as mediators for identification. Induction IC card and called radio frequency card, and the communication between host without contact, also need not power, through the electromagnetic field on energy and data transfer. When a induction card on the host card read range, the card within the coil in the excitation signal "induction next produce weak current, as a card in the power of the microprocessor, the card within the processor will card information through a modulation signal send out, the host induction to the signal and translated into digital signal, thus and storage of personal information check, the functio
Will a person's employee time clock down into the computer for processing fingerprint identification is the first step. Fingerprint data generation usually have two kinds of methods: one kind is known as the early fingerprint identification often use the method of ink and paper [3]. For example: the finger into ink, then click on the paper, combine the three dimensional fingerprint into two-dimensional mark, again through the camera shooting down to deal with. Due to the ink will be bled makes all or part of the fingerprint image blur, this method is not reliable. And fingers on paper the different every time strength caused by the elastic deformation is different also, have mark will have change. This method has a major disadvantage is time-consuming, and therefore should not be used for the automatic fingerprint classification system. Another kind of method is more effective and reliable optical data generation method [4]. For example, as shown in figure 2 shows, using isosceles rectangular prism of total reflection characteristics for contrast good fingerprint image.
Along with the iris time and attendance systems accuracy and recognition degree continuously improve, biological recognition technology will be applied to a wide range of areas, and meet the different characteristics of biology, to realize the more powerful security protection ability. According to Unisys Asia Pacific national security development department manager John Kendall says that, although the iris scanning technology has not been widely used, become the mainstream identification technology, but there have been many countries applied in the id card in the project. ZDNet recently told the reporters, Kendall said: "India and Mexico has put iris (scan) and fingerprint as a backup (identity recognition technology), and compared with two or three years is a huge progress."
Some biometric time clock does not support large network layer 3 switches. Roll machine to set TCPIP communication parameters: IP address and subnet mask, gateway, communication password, meaning with computer. If attendance machine directly and computer connection need to use peer line connection. TCPIP communication should pay attention to check on work attendance in the software of roll machine set the IP address and PORT (PORT) to and roll machine of the same set. Under normal circumstances, in the computer can ping to roll machine IP.The average company's attendance system, roll machine and software are can realize communication, is also supporting, sometimes connection is not, there is a specific reason: parameter Settings is wrong, line impassability, etc. Set up parameters, on line, roll machine general can connect with computer, here, all put no detailed introduction, I wish that could help you solve practical use process encounter of the difficult problems, such as have not known.nal operation.
Recent Comments