Id-Time with facial recognition provides robust work hours tracking and allows control over entry and exit not only on the premises but also in individual workspaces. The solution enriches time and attendance systems (TAS) with facial recognition and increases trustworthiness.
- Reliable time and attendance tracking
- Movement tracking at the facility
- Increased productivity through discipline
WHAT BENEFITS THE ID-TIME USERS GETS
Tools for reliable time attendance using tablets, cameras and terminals:
RELIABLE attendance and violations reports;
SIMPLE data import and export tools for a quick start;
CSV import and export for easy integration with external systems;
CONVENIENT API for integration with external systems like ERP, CRM, WFM, TAS;
CONFIGURABLE USER FIELDS for importing data from integrated external systems;
A wide range of supported TABLETS and TERMINALS for cost-efficient implementations
HOW DOES IT WORK?
to install the Id-Time
A free demo license is provided for 3 months to experience all the functionality of the solution at your facility
For a demo, please fill out a request or contact our team at email@example.com
IDENTIFICATION ALGORITHMS ARE BECOMING MORE ADVANCED
We are constantly improving Id-Time and other solutions, making recognition systems more accurate and faster. Each updated release includes new functional and technological options that make the users’ work more convenient and efficient.
The support certificate includes software updates and technical support.
The Solution deployed on a tablet will easily provide information about employees’ tracking on the territory or individual work areas.
The Solution provides facial recognition for employees’ work hours tracking using IP cameras installed at the entrance and exit.
Сameras installed in the organization’s control zones can be connected additionally.
The Solution allows operators and administrators (users) to generate/ create reports in the interface, upload them to XLSX or CSV files, and send them to emails or external systems.
The solution allows you to create the following reports:
- General Attendance Report
- Tardiness report
- Report on exceeding the number of entries/exits
- Daily report
- Report on system compromise attempts
The Solution provides simple tools for importing employees’ photos and other necessary information for the profile database and starting the system up, and for exporting profile data for use in external systems, such as export and import from/into folders
A particular mechanism of data exchange using a file (CSV), which allows data synchronization and provides easy integration with external systems, enables integration of the Solution with personnel record systems
Unlike RFID cards, the Solution uses a biometric identifier of an employee or a visitor, unique and inalienable, that cannot be lost or transferred to another person. Identification of employees or visitors of an organization using facial recognition personalizes attendance record and avoids unauthorized card usage, providing increased efficiency of time and attendance systems.
The Solution allows for checking medical documents for the work permit in case of an additional requirement. Any document with a number and expiration date will be checked during identification. If the document is missing or expired, the Solution will automatically notify the operator
The Solution may send alerts for entry/exit incidents, compromise attempts, security violations, locations, etc. The integrated notification system allows the distribution of messages to operators by groups and personally for precise and rapid response to incidents. For delivery can be used Email, SMS, operator window notifications.
Thanks to the universal app, the solution allows the use of any tablets or terminals that comply with the technical requirements. A specially developed application for Android devices will ensure easy installation and stable operation of the solution. Using tablets will substantially reduce the total cost of ownership
The Solution uses only biometric templates to perform identification. A biometric template can’t be reverse engineered to reproduce an employee image
Data exchange in the solution is carried out using encrypted transmission protocols – https and wss
Sign up for our Id-Time product introductory webinar
To get guidance on your project, email us at firstname.lastname@example.org