Id-Time is a software with facial recognition that provides robust work hours tracking and allows controlling over entry and exit not only on the premises but also in individual workspaces. The solution enriches time and attendance systems (TAS) with facial recognition and increases trustworthiness.
- Reliable time and attendance tracking
- Movement tracking at the facility
- Increased productivity through discipline
WHAT BENEFITS DOES THE ID-TIME USERS GET?
Tools for reliable time attendance using tablets, cameras and terminals:
RELIABLE attendance and violation reports
SIMPLE data import and export tools for a quick start
CSV import and export for easy integration with external systems
CONVENIENT API for integration with external systems like ERP, CRM, WFM, TAS
CONFIGURABLE USER FIELDS for importing data from integrated external systems
A wide range of supported TABLETS and TERMINALS for cost-efficient implementations
HOW DOES IT WORK?
to install Id-Time
IDENTIFICATION ALGORITHMS ARE BECOMING MORE ADVANCED
We are constantly improving Id-Time and other solutions, making recognition systems more accurate and faster. Each updated release includes new functional and technological options that make the users’ work more convenient and efficient.
Software updates and technical support are provided as part of the support certificate.
The solution deployed on a tablet easily provides information about employees’ tracking on the territory or individual work areas.
The solution provides facial recognition for employees’ work hours tracking using IP cameras installed at the entrance and exit.
Сameras installed in the organization control zones can be connected additionally.
The solution allows operators and administrators to generate/create reports in the interface, export them to XLSX or CSV files, and send them to emails or external systems.
The solution allows you to create the following reports:
- General attendance report
- Tardiness report
- Report on exceeding the number of entries/exits
- Daily report
- Report on system compromise attempts
The Solution provides simple tools for importing employees’ photos and other necessary information for the profile database and starting the system up, and for exporting profile data for use in external systems, such as export and import from/into folders.
A particular mechanism of data exchange using CSV files, which synchronizes data, provides easy integration with external systems, and enables integration of the solution with personnel record systems.
Unlike RFID cards, the solution uses a biometric identifier of an employee or a visitor, unique and inalienable, that cannot be lost or transferred to another person. Identification of employees or visitors of an organization using facial recognition personalizes attendance record and avoids unauthorized card usage, providing increased efficiency of time and attendance systems.
The solution allows checking medical documents for the work permit in case of an additional requirement. Any document with a number and expiration date is checked during identification. If the document is missing or expired, the solution automatically notifies the operator.
The solution may send alerts for entry/exit incidents, compromise attempts, security violations, locations, etc. The integrated notification system allows the distribution of messages to operators by groups and personally for precise and rapid response to incidents. Notifications can be delivered by email, SMS, or as dialogue windows in the operator’s workplace.
Thanks to the universal app, the solution allows using any tablets or terminals that comply with the technical requirements. A specially developed application for Android devices ensures easy installation and stable operation of the solution. Using tablets substantially reduces the total cost of ownership.
The solution operates only with biometric templates to perform identification operations. Reverse conversion of biometric template to employee photo image is impossible.
Data exchange in the solution is carried out by encrypted transmission protocols, which are https and wss.