fbpx
11 Oct 2021
Multimodal Biometrics

اجهزة حضور وانصراف

اجهزة حضور وانصراف

اجهزة بصمة وجه

 

مع هذة الاجهزه اصبحت عملية اداراة وتنظيم اوقات العمل سهلة للغاية بل يمكن ايضا حساب الاجور والمرتبات عن طريقها بكل دقة 

و تعد اجهزة البصمة من اهم ادوات المدير الناجح و اصحاب المشاريع للتحكم الكامل فى عملية الحضور و الانصراف الخاصة بالموظفين وتتوافر فى اجهزة الحضور و الانصراف امكانية عمل كلمة سر لمسؤل جهاز الحضور و الانصراف حتى لا يتم الدخول الى الجهاز من خلال اى شخص غير مفوض و التعديل فى عمليات الحضور و الانصراف للموظفين و امكانية اضافة اكثر من بصمة للموظف الواحد فى اى حال او اى ظرف طارق مثل اصابة الموظف وامكانية اضافة اكثر من 10000  موظف على نفس الجهاز حتى تناسب الشركات والهيئات الكبرى وايضا مساحة شاسعة لتسجيل عدد هائل من العمليات وتتميز بوجود شاشة الوان لاظهار بيانات الموظفين ومواعيد الدخول والخروج وحتى انها ايضا تنطق باللغة العربية والانجليزية لتوضيح عملية الدخول والخروج ويمكن من خلالها اضافة مواعيد استثنائية لعدد معين من الموظفين  وتحديد ايضا اوقات الماموريات وتنظيم الشيفتات وتحديد الاجر الاضافى  ولا داعى للقلق فهى تعمل اثناء انقطاع التيار الكهربائى لانها تحتوى على انظمة بطاريات مما يسمح لها بالعمل لمدة 6 ساعات فى حالة انقطاع التيار الكهربائى ويمكن من خلالها ربط اكثر من فرع فى نفس الوقت ويمكن ربطها بالشبكة الدخلية واستخراج التقارير وعمليات الدخول والخروج من خلال مخرج الشبكة او مخرج  usb , وتتميز بانها يمكنها اصدار اكثر من 10 انواع من التقارير وللمثال وليس الحصر ( تقرير مفصل لكل موظف – تقرير اجمالى لكل الموظفين – تقرير بالاجر الاضافى ) 

 ويتوافر لدينا احدث اجهزه للحضور والانصراف بالبصمه و بالعين و بالكارت ويوجد اجهزة بصمه العين والتي تعد من افضل اجهزه البصمه للتاكد من الهويه الشخصيه كما يتم التدريب على هذة الاجهزة وتركيبها من خلال مهندسين متخصصين

ويمكن التحكم فى االبصمة من خلال:-

ubio-x faceVisionPass

ويمكن دمج كل الطرق او بعضها فى الجهاز الواحد

يتوافر لدينا احدث اجهزة الحضور والانصراف بالبصمة والعين والكارت بأرخص سعر فى مصر

المميزات :                                                   

1_تستطيع ضبط مواعيد الموظفين

2_ تسهيل اجراءت تسجيل الحضور دون تلاعب او تاخير اواى تعطل

3_ايضا برامج الحضور الانصراف عربى وانجليزى بواجهة سهلة الاستخدام

4_تقليل الوقت فى العملية تمكين عشرة اشخاص واكثر بتسجيل بصمتهم فى دقيقة

5_تقسيم الشركة الى اقسام او ادارات واضافة الورديات ومواعيدها وحساب التاخيرات والانصراف المبكر

6_التوريد والتركيب على استخدام جهاز البصمة

7- تقديم الخدمة ما بعد البيع والدعم الفنى طوال فترة الضمان

8- توفير في جهاز حضور وانصراف امكانيه عمل كلمه سرلكل موظف

9-يمكن من خلالها ربط اكثر من فرع فى نفس الوقت ويمكن ربطها بالشبكه الداخليه واستخراج التقارير وعمليات الدخول والخروج

تقرير الدخول و الخروج اليومي 

لإظهار الدخول و الخروج والتأخير والغياب اليومى.

التقرير الشهري الإجمالى

لإظهار اجمالي ايام الشهر وايام الحضور و التأخير و الغياب والأجازات.

تقرير تفصيلي للموظف

لإظهار معلومات عن حاله الموظف من الدخول و الخروج و ساعات العمل و التأخير والغياب و الأجازات ويتم تصميم هذا التقرير حسب الطلب في شاشه تصميم التقارير.

تقرير الخلاصة اليومية لإظهار معلومات عن حاله الموظفين  و اظهار اجمالي عدد ( الموظفين و الدخول و الخروج و الغياب و المتأخرين و المجازين .. الخ ) مع نسبه الدخول على مستوي كل قسم ،ويتم تصميمه في شاشه تصميم التقارير.

وضع لوائح الدوام الخاصه بالعميل من خلال تحديد فترات وايام الأجازات الرسمية

يدعم النظام إمكانية إدخال عدد لا محدود من الفترات المقررة على الموظفين

مع طريقه تحديد الدخول و الخروج للموظف.

تهيئه النماذج المعتمدة لدى العميل

من خلال شاشة تصميم التقارير يمكن ترحيل الأجمالي الشهري لساعات

( الغياب – التأخير – الإضافي ) إلي نظام المرتبات  و الأجور

يمكن للمستخدم تحديد بدايه زمن بداية ونهاية زمن الدخول و الخروج خلال 24 ساعه

“يسعدنا اهتمامكم بمنتجات الشركة الاساسية ولكى نتمكن من التواصل معكم بشكل اسرع نرجو الاتصال على ارقام قسم المبيعات 01148009052 – 01149044332 – 01142954520 – 01150007381

ليه تجيب موظف يسجل الحضور والآنصراف وستار تكنولوجى تقدر توفرلك جهاز البصمه تخليك واثق ان التقارير بتطلع بدون اى غلط او لخبطه والدعم الفنى مجاانا ده غير مميزات تانيه كتير اتصل وانت اكيد الكسبان. 

ومن خدمتنا ايضا:-

 كاميرات مراقبة – اجهزة انذار الحريق  – انتركم – شبكات – بوابات امنية

وتقدر تتابعنا على الفيسبوك او تويتر او انستجرام وتابع كل ما هوجديد من فيديوهات من خلال قنوات التواصل الاجتماعى اللى موجودة على شمال الصفحة ومنها هتعرف كل العروض الجديدة 

مع ستار تكنولوجى خطوة بخطوة نحو التميز

07 Apr 2021
Open Supervised Device Protocol (OSDP)

Open Supervised Device Protocol (OSDP)

What is Open Supervised Device Protocol (OSDP)?

Open Supervised Device Protocol (OSDP) is a standard that has been developed by the Security Industry Association (SIA) in order to offer more secure access control communications. This protocol works across various types of readers, controllers (RBH), and software, and has been developed as a way to improve on issues of security that are often faced with other legacy systems.

In other words, the development of this protocol aimed to help implement, monitor and maintain a more stable and secure system of access control devices, which includes the use of advanced smart card technology applications and biometrics.

In addition to improved security, it improves interoperability between access control and security devices, through bi-directional communication. To retain its focus on security, it is constantly refined, with OSDP v2.1.7 currently gaining recognition as a standard by the American National Standards Institute (ANSI).

Manufacturers, like HID Global, Mercury and Cypress, are already using OSDP and it is recommended for use in government and other high-security settings, since the protocol meets all federal access control requirements, such as Public Key Infrastructure (PKI) for Federal Identity, Credential and Access Management (FICAM).

OSDP security standard to replace Wiegand for access control communication  - SecureIDNews

What is the wiring diagram for OSDP?

If you’re interested in having a more in-depth look at how it works, take a look at this OSDP protocol example diagram, which gives an insight into how to use it with existing Wiegand devices.

This includes how to connect both a Peripheral Device (PD) or Access Control Unit (ACU), or both. This OSDP wiring diagram pdf download also provides more information on Pin Designations, DIP Switch Settings, OSDP Default Parameters, Status LED Behavior, and Bench Testing.

Implementing OSDP

What is the OSDP Protocol?

The Open Supervised Device Protocol (OSDP) is a way of linking together access control devices and smart cards in a way that guarantees optimum security. Other legacy systems, while popular and easier to use, unfortunately, do not always offer the same level of security, and are vulnerable to tampering.

Using AES-128 encryption, and by constantly monitoring wiring, this protocol keeps an eye on all points within the system, to make sure that it protects against all threats. Other advanced functionality features include advanced user interfaces, with welcome messages and text prompts, and the use of 2 wires instead of 12+. The use of two wires, in this case, allows for multi-drop installation, supervised connections and scalability.

Implementing this is, therefore, crucial in ensuring that your access control system is up to date with all of the latest security system requirements.

What is the OSDP Protocol?

How Does OSDP Protocol Work?

The OSDP Protocol works through an audio-visual system, which integrates a user feedback mechanism to ensure an access control environment that is built for, and benefits, the user. Since encryption and authentication processes are already predefined, there is no need for guesswork, which takes a lot of stress and labor costs out of the equation. This also means that this protocol costs less to implement on devices already embedded in the system.

The main benefit of it is that it works across a range of devices and security solutions, regardless of the equipment manufacturer. This includes peripheral devices (PD’s), which include card readers, as well as other devices like secured access doors/gates and control panels (CP’s).

Internet Protocol (IP) environments can also use OSDP and it is recommended when Transmission Control Protocol/Internet Protocol TCP/IP, USB or other protocols are not available. OSDP over IP is currently in development and will be launched soon. This will ensure that the interoperability of this protocol extends even further.

Advantages over Wiegand

It has a number of advantages over Wiegand, such as:

  • It supports two-way communication between a reader and a controller. This means that a controller, a computer or an interface unit can connect with a reader and identify a malfunctioning device, manage LED indication or check a PIN-code that was entered.
  • Its connection is encrypted (OSDP supports high-end AES-128 encryption) and makes it much more secure than Wiegand and other common protocols.
  • OSDP is cheaper to install because it requires less cable. Also, this interface enables a reader to function even if it’s located 1200m away from the controller. In case with Wiegand, the distance between a reader and a controller rarely exceeds 152m.
  • It has a user-friendly interface and is easy to implement.
Open Supervised Device Protocol and Added Security - SPG Controls
08 Feb 2021
Idemia biometric devices

اجهزة بصمة وجه فرنسى

IDEMIA’s Top 4 Trends in Biometrics for 2020

IDEMIA’s Top 4 Trends in Biometrics for 2020

As the world leader in biometric solutions, Idemia Biometric devices explore the top four biometric

The full potential of biometrics is yet to unfold. The public and private sectors drive its growing usage. In our increasingly connected world, biometrics is set as one of the key enablers of its digital transformation. Today, the biometric industry’s central focus is to protect our identity and improve security for all of us.

1) Use of multi-biometric identification adds a further level of security

As the only form of Idemia Biometric devices that leaves a visible trace, our fingerprints were the first biometrics widely used for identity verification. Today, other biometrics such as face, iris, and DNA are commonly used as well. 2020 will see more and more solutions that offer multi-biometric identification. The combination of multiple types of biometrics enhances security and adds granularity. Depending on the nature of transaction or interaction, different levels of security might be needed. We can already unlock our smartphone with either our fingerprint or face, as this is a comparably less sensitive action. In contrast, mobile biometric devices using fingerprints and faces have, for example, been developed for law enforcement agencies, enabling officers to verify the identities of individuals while patrolling the streets. Another example is the national eID card in Nepal. Nepalese citizens can use their ID cards to interact with their bank, which is why both fingerprint and iris data are embedded into the card for maximum security. 2020 will see this trend growing.

2) Increased exposure of biometrics calls for top-notch technology to secure data

Today, public and private sectors alike face the challenge of achieving two aims simultaneously:
  1. Enhanced, convenient services in a digital world
  2. Prevention of identity theft when using these services
Biometrics is the safest way to verify one’s identity. With the assistance of advanced technologies, the verification of identities with biometrics is fast and easy. However, due to their increased usage, biometric data becomes ever more exposed. On top of this, the trend of storing data in the cloud increasingly includes even the most sensitive data. From startups to large multinationals, cloud computing has revolutionized the way many organizations store and interact with data. It facilitates easier data management, flow and sharing. Biometric data is arguably one of the most sensitive types of data that one can get hold of. 2020 will be all about developing ways to provide extremely tight cyber security to protect biometric data – in the cloud or wherever it might be stored, processed or shared. Three ways of securing data will ensure we can continue to benefit from convenient services and security at the same time, and feel confident in sharing our data:
  1. Secure multi-party computation. While securing data in rest and in transit is quite common, the trickiest part is to secure data that is being processed. Traditionally, the processing party had to be able to ‘see’ data to be able to work with it. The risk connected with this method is significantly reduced when the work of processing the data is shared between different parties. It means that there is not one central player processing all the open, vulnerable data, but several contributors. Only by breaching the data processed by each player would the data make sense to the malicious perpetrator. In 2020, we will see a much wider application of this methodology.
  2. Verifiable computing. For the security of biometric data, this is a very interesting trend in data processing, which will further develop in 2020. Verifiable computing means that one central entity can outsource the computing of data to another potentially unknown, not previously verified entity, while maintaining verifiable results. In the world of biometrics this could mean that we could do the matching of our own data to verify our identity, for example on our smartphone (i.e. the unknown, not verified entity), without anyone doubting the validity of the computing we have done. This would mean that we control our biometric data at all times and it would never leave our own device.
  3. Homomorphic encryption. Homomorphic encryption already protects data both at rest and in transit. However, the Holy Grail that we will see developing in 2020 is to apply this encryption technology also to data that is being processed. The goal is simple – to ensure the data processor cannot decipher or even understand the content that is being processed. It is a method of performing calculations on encrypted information, without decrypting it first. In 2020, we will see a movement towards standardizing homomorphic encryption on a worldwide level. The standard will give a boost towards the aim of using encrypted biometric data while computing. With this last step, end-to-end data privacy can be achieved, given that at no moment in time data is exposed without protection.

3) Wide-spread adoption of facial recognition technology

With high performance levels in terms of speed and accuracy, it is no wonder that we will see a wide adoption of facial recognition technology in 2020. Already over the last few years, many use cases have demonstrated how this technology brings convenience and security. It is one of the least intrusive biometric identification methods because it requires little behavioral adaptation. Today, facial recognition is already used to enable security and convenience. It is, for example, an important facilitator to manage the increasing number of travelers globally. In Europe, over 18 countries are using facial recognition, allowing 200 million passengers to cross borders using their face1. Banks have also started to deploy biometric-based systems, so users no longer need to visit branch offices when opening new bank accounts. They simply capture a picture of their ID and take a selfie. Liveness check functionalities permit the customer to prove who they are with a few movements of their head, ensuring a photo or video of them is not used to impersonate them2. As facial recognition continues to be widely implemented, what are some of the new use cases we should expect to see in 2020?
  1. Protection of public places with video analytics. Enhanced video analytics add intelligence to existing video surveillance. This technology will in 2020 play an increasingly important role in providing effective solutions to detect threats. Combined with efficient incident response platforms, video analytics enable the law enforcement community to react quickly when a person of interest is detected in a vulnerable area. The analytics provided can be compliant with the strictest data protection laws; detecting biometrics, i.e. face, is by far not their only capability. Next year, we expect to see this type of tool widely offered and therefore a sharp increase in its use.
  2. Facial recognition in new industries. While most use cases for facial recognition involve the public sector, many technically advanced industries are expected to implement facial recognition technology for security and convenience as well – like the automotive industry. In 2020, more and more proofs of concept will emerge enabling drivers to access their vehicles and start the engine by simply showing their face. Thanks to facial recognition, the vehicle will automatically adjust the temperature settings, move the seat precisely to fit physical characteristics and preferences and load personalized data, including music playlists and navigation settings into the infotainment system. Moreover, facial recognition replaces the need to look for physical keys (or mobile devices) to open a vehicle and drive away. This improves security by defeating “relay attacks”, where the signal from a car key is captured by the perpetrator within the vicinity of the car using a special device, and car hijacking attempts as the car can only be driven by recognized drivers.

4) Development of a regulatory and ethical framework for the use of facial recognition

Facial recognition technology offers significant problem-solving potential for both security- and convenience-related use cases. Yet as its use is based on monitoring people’s movements, this specific type of biometric data is particularly personal. Citizens have to keep control of their biometric data. They need to know how their data is used, how long it is saved and for what reason. To address unease, 2019 has already seen several attempts to develop regulatory and, arguably more importantly, ethical frameworks that define the way facial recognition technology should be used. IDEMIA expects this trend to grow in 2020, with national initiatives being escalated to a continental or even global level. As a leading provider in the industry, IDEMIA encourages the cooperation between governments, the private sector and providers of the technology to define a framework that allows all stakeholders and end-users to benefit from this technology while addressing the public’s concerns. Idemia Biometric devices اجهزة بصمة وجه فرنسى
16 Jan 2021
VisionPass

VisionPass جهاز بصمة الوجه الفرنسى الاحدث فى العالم

Idemia VisionPass To protect their premises, organizations need access control solutions that provide a high level of security but not to the detriment of employees’ experience, which requires ease and speed of use. Bearing those key constraints in mind, IDEMIA involved partners and end-users in the development of VisionPass, the ultimate face recognition device for access control. In this product, IDEMIA associated its latest advances in Artificial Intelligence and facial recognition algorithms with a state-of-the-art optical set combining 2D, 3D and infra-red cameras in order to meet the expectations of the most demanding clients. The result? A robust, reliable and powerful device, providing near-motion 1-second verification through multiple angles and in all light conditions, and resistant to all kinds of spoofing attempts.

Unique performance

Thanks to the association of a state-of-the-art optical set combining 2D/3D/IR cameras with IDEMIA’s latest advances in AI and image processing, VisionPass provides both a high level of security and real user convenience.

True security

VisionPass incorporates IDEMIA’s latest spoof detection mechanisms and is capable of coping with face changes (change of haircut, glasses, helmet, etc.).

Easy deployment

VisionPass can be deployed at any location: indoor or outdoor. In addition to biometrics, it natively supports Prox, iClass, MIFARE, DESFire cards and PIN codes.

Contact Details

Star Technology for light current systems Co. Headquarter:-Address: 15 Al Fareek Ali Amer St. Nasr City Tel: +(202) 22730200 – 22730300 – 22730400 GSM: + (2 012)02013020 GSM: + (2 011)54000933 GSM: + (2 011)54000939 E-Mail: mramadan@stc-security.com Website: https://www.stc-security.com Sales Department  01150007381 – 01148009052 – 01142954520 – 01149044332
22 Oct 2020
ubio-x-face

جهاز بصمة وجه كورى

جهاز بصمة وجه كورى

Ubio-X Face

ستار تكنولوجى لانظمة التيار الخفيف تقدم جهاز بصمة الوجه الاول من نوعه فى العالم من انتاج شركة يونيون الكورية.

يستطيع الجهاز التعرف على بصمة الوجه من مسافة ثلاثة امتار كما يمكنه العمل فى الاجواء الخارجية بدرجة حماية IP65

يمكن الجهاز تخزين عشرون الف بصمة وجه كما يمكنه تخزين عشرة ملايين حركة.

جهاز بصمة وجه كورى

Nitgen UBio-X Face

The Latest Face Recognition Algorithm Technology

Supporting Walk-Through and Multiple Face Authentication.

Nitgen UBio-X Face supports a deep learning algorithm and a face authentication from a distance up to 3 meters and maximum 4 people at the same time when users walk through gates.
Ubio-x Face-gates
Ubio-x Face-gates

Contactless Solution for a New Era with Liveness Face Detection and Anti-Spoofing Function.

UBio-X Face meets the needs of user liveness detection even wearing a mask, and prevents attempts with fake faces such as 3D face mask, face photo, and face printed paper.
face Mask detection
face Mask detection

36°C Accurate Temperature Detection with Thermal Camera and Thermal Module.

UBio-X Face can detect face temperature and identify a user’s face at the same time. Therefore, it accurately determines the information ofthe accessing user. When users are not wearing mask, it warns user to wear mask.Temperature controlTemperature control Safe and EasySafe, Easy and Convenience. With the highest level of device security, it encrypts biometric credentials and user information and sends all the information to a server. It also allows users to enroll by taking a photo with a smartphone and uploading it to the server remotely. Supports Various Installation Environments. UBio-X Face can authenticate faces in a low-light or dark environment through the IR recognition technology and its auxiliary lighting. With IP65 rating, the device supports both indoor and outdoor use, and supports POE (Optional) and various installation environment.Ubio-X Face fixing types

  • Biometric: Face
  • Dust & Waterproof: IP65
  • CPU: Cortex-A9 Quad Core 1.0GHz
  • Memory: 2GB RAM + 16GB Flash Memory
  • Display: 5”Color Touch Screen
  • Interface: External I/O, TCP/IP, RS-232, RS-485, Wiegand, PoE (Optional),HID Prox, iClass (Optional)
  • Dimension: (W x H x D) mm 94 x 224 x 35.5.
  • Application fields: Construction Sites, Medical Centers, Religious Facilities, Events and Commercial Facility.
  • Capacity: Up to 500,000 Users (1Card : 1User)
Up to 20,000 Users (1Face : 1User) Face 1:20,000 < 1sec Event Logs : 10,000,000 Photo Logs : 20,000