Smart Attendance Systems
Compatible Biometric Attendance Systems




Biometric Devices
Biometric devices are capable components, which can serve different individuals and organizations, ardently looking for first-rate security. Helpful in monitoring the activities of various people entering and leaving the organization, these devices are becoming mandatory security systems. Face recognition is becoming popular with companies switching from fingerprint based attendance to Touchless – No Contact attendance systems. Face recognition technology is indeed, the most appreciable application of biometrics, as it offers significant improvement over existing security products. Our biometric devices are seamlessly integrated with the software to provide a integrated user experience without the need to download data manually from devices and registered users can by synced across the devices & locations for faster processing and security management.
- Access Control Devices
- Door Locks
- Turnstlite Gates
- Rfid Devices
- Fingerprint Devices
- Face Readers
Access Control
Electronic access control uses computers to solve the limitations of mechanical locks and keys. A wide range of credentials can be used to replace mechanical keys. The electronic access control system grants access based on the credential presented. When access is granted, the door is unlocked for a predetermined time and the transaction is recorded. When access is refused, the door remains locked and the attempted access is recorded. The system will also monitor the door and alarm if the door is forced open or held open too long after being unlocked


ACCESS CONTROL
Electronic access control uses computers to solve the limitations of mechanical locks and keys. A wide range of credentials can be used to replace mechanical keys. The electronic access control system grants access based on the credential presented. When access is granted, the door is unlocked for a predetermined time and the transaction is recorded. When access is refused, the door remains locked and the attempted access is recorded. The system will also monitor the door and alarm if the door is forced open or held open too long after being unlocked
Access control system operation
When a credential is presented to a reader, the reader sends the credential’s information, usually a number, to a control panel, a highly reliable processor. The control panel compares the credential's number to an access control list, grants or denies the presented request, and sends a transaction log to a database. When access is denied based on the access control list, the door remains locked. If there is a match between the credential and the access control list, the control panel operates a relay that in turn unlocks the door. The control panel also ignores a door open signal to prevent an alarm. Often the reader provides feedback, such as a flashing red LED for an access denied and a flashing green LED for an access granted.
Types of Readers
Access control readers may be classified by the functions they are able to perform:
Basic (non-intelligent) readers: simply read card number or PIN, and forward it to a control panel. In case of biometric identification, such readers output the ID number of a user. Typically, Wiegand protocol is used for transmitting data to the control panel, but other options such as RS-232, RS-485 and Clock/Data are not uncommon. This is the most popular type of access control readers. Examples of such readers are RF Tiny by RFLOGICS, ProxPoint by HID, and P300 by Farpointe Data.
Semi-intelligent readers: have all inputs and outputs necessary to control door hardware (lock, door contact, exit button), but do not make any access decisions. When a user presents a card or enters a PIN, the reader sends information to the main controller, and waits for its response. If the connection to the main controller is interrupted, such readers stop working, or function in a degraded mode. Usually semi-intelligent readers are connected to a control panel via an RS-485 bus. Examples of such readers are InfoProx Lite IPL200 by CEM Systems, and AP-510 by Apollo.
Intelligent readers: have all inputs and outputs necessary to control door hardware; they also have memory and processing power necessary to make access decisions independently. Like semi-intelligent readers, they are connected to a control panel via an RS-485 bus. The control panel sends configuration updates, and retrieves events from the readers. Examples of such readers could be InfoProx IPO200 by CEM Systems, and AP-500 by Apollo. There is also a new generation of intelligent readers referred to as "IP readers". Systems with IP readers usually do not have traditional control panels, and readers communicate directly to a PC that acts as a host.

FINGERPRINT READERS
Fingerprint Devices are by far the most popular form of biometric security used, with a variety of systems on the market intended for general and mass market usage. A fingerprint is made up of a pattern of ridges and furrows as well as characteristics that occur at Minutiae points (ridge bifurcation or a ridge ending). Fingerprint scanning essentially provides an identification of a person based on the acquisition and recognition of those unique patterns and ridges in a fingerprint.
Fingerprint Attendance Machine Software
Biometric fingerprint reader or scanner is certainly the most appreciable achievement of this technology, which is sprouting as a breakthrough in security provisions. Based upon storing and comparing the key points of one's fingers, these devices have proved their potential in areas like access control and employee attendance management. With advanced functionality and dedicated performance, a fingerprint scanner can be the best choice for your organizational security.
Features of Fingerprint Reader / Scanner
- A fingerprint reader or scanner, based upon biometric technology, is endowed with an optical scanner to create the template database using finger samples of different users.
- LED screen, audio controls and multi-language support are other dependable features of these devices.
- Intelligent image capture technology to create samples even from dry or damp fingers.
- Huge database space for storing many fingerprint samples.
- Fast identification and verification process and response time.
Applications of Fingerprint Reader / Scanner
- Small and big offices make use of a fingerprint biometric scanner to keep a record of employee attendance.
- Government offices, where access control is required to avoid information leakage and other criminal activities, also employ fingerprint reader
- These devices are also used for accessing computers, especially when it becomes difficult to remember a number of passwords. Moreover, a biometric fingerprint reader can keep away unauthorized users from accessing your computers and laptops.
- E-passports are relatively new applications of fingerprint scanners and readers. The fingerprints of passport holders are stored on the documents in the form of chips, which later on help in verifying the authorized passport holders.
- Fingerprint reader door locks are also becoming popular to provide security to houses and garages.
Advantages of Fingerprint Reader / Scanner
- The cost of installing a biometric scanner is very low as compared to other security tools.
- Fast identification and verification processes are offered by these devices.
- Security is not hampered, even if these devices are lost, as the templates stored in them are of no use for one who finds them.
- Highly portable and easy to install devices.
- No misuse or stealing of information is associated with these security devices.
All these great features and advantages of fingerprint reader or scanner play significant role in establishing the acceptance of these biometric products. As a result, new application areas of these devices are constantly being added to the list. It is good to feel safe with existence of these high-profile devices around us.
AI Based Face Readers
Face recognition is becoming popular with companies suffering from loss of information and decrease in productivity due to inappropriate security measures. At the same time, big organizations, airports and other high-alert areas are also developing fondness towards the technology. Face recognition is becoming popular with companies suffering from loss of information and decrease in productivity due to inappropriate security measures. At the same time, big organizations, airports and other high-alert areas are also developing fondness towards the technology. Face recognition technology is indeed, the most appreciable application of biometrics, as it offers significant improvement over existing security products.


FACE READERS
Face recognition is becoming popular with companies suffering from loss of information and decrease in productivity due to inappropriate security measures. At the same time, big organizations, airports and other high-alert areas are also developing fondness towards the technology. Face recognition is becoming popular with companies suffering from loss of information and decrease in productivity due to inappropriate security measures. At the same time, big organizations, airports and other high-alert areas are also developing fondness towards the technology. Face recognition technology is indeed, the most appreciable application of biometrics, as it offers significant improvement over existing security products.
Features of Face Recognition Products
- Face recognition products captures the key-metrics of a face, including jaw length, nose length and others, rather than capturing the exact face mage.
- These products are blessed with short processing time to deliver faster results.
- Products based upon face recognition technology offer high detection rate.
- By working secretly, these devices don't essentially require a person to be informed about his or her face identity being concealed.
- High graphics and video support are other dependable features of these devices.
- Feature extraction of different faces is done on the basis of traits, which don't change with time, for example, the distance between two eyes.
- Image sensors and huge database space to store multiple face templates are other worthy features of devices utilizing biometric face recognition.
- These products warn against the presence of criminals in the premises by issuing an alarm or audible warnings.
Applications of Face Recognition Products
- Security agencies make use of face recognition products to catch suspects on the basis of their facial identity.
- Government offices, where access control is required to avoid information leakage and other criminal activities, also employ fingerprint reader
- Airline industry is another field, where these products are installed to avoid hijacking and other criminal activities.
- Banks and government offices also use face recognition technology to restrict undesirable happenings.
Advantages of Face Recognition Products
- Face recognition products offer low-cost high-profile security and that too, without hindering the normal working of an organization.
- These products are of great use in congested areas, where it becomes difficult to keep an eye on every individual.
- Easy to integrate with present security system, these products can perform well in internal as well as external environments.
- Can also be used for visitor tracking to help in investigation at the site of crime.
Biometric face recognition has helped to put a full stop on the rum ours surrounding efficacy of biometric products. The products used in this direction have already impressed small organizations as well as high-level intelligence agencies to grab most desirable security level.

Entrance Control
Entrance gates with Turnstiles provide high level of security with bi-directional access control and blend beautifully with high-level corporate environments. All our turnstiles gates integrate with our access control software / time attendance software to increase security and provide an organized entry/exit process with accurate time details thus reducing the staff required to monitor employee access. Turnstiles are highly reliable method to secure access in any industry whether i.e. corporate or any other secure sector. These turnstiles gates use the latest technology to detect tailgating and unauthorized entry attempts. Various types of Turnstile Gates are available viz., Tripod turnstile, Half Height Turnstile and Full height Turnstile gates. These can be installed in dual lane or single lane options and can integrated with biometric devices like face readers or fingerprint
Turnstiles are a form of gate which allows only one person to pass at a time. This enables security to efficiently prevent potential trouble or to restrict any prohibited materials to enter into any secured premises. It can restrict passage only to people who insert /scan a ticket, an ID card, access card. Thus a turnstile can be used in the case of paid access for example public transport, or to restrict access to authorized people in corporate houses or entrances of any building.
This entry control method is a good solution where there is requirement to control pedestrian traffic.Tripod turnstile gates are used in locations where there is no extra space available for emergency exit.Sourced with drop arm feature it allows free lane space for exit in case of emergencies/power failure with the arm dropping from its horizontal position.
Turnstiles are often used for monitoring and counting the numbers of people passing through a gate.Tripod turnstile gates are available in automatic and manual versions
Tripod Turnstile Application
Tripod Turnstile are used indoors or outdoors, in areas where crowd entrance and exit should be controlled and organized and not move through absolutely freely. Some typical usage areas are:
- Subway
- Metro Systems
- Stadiums
- Airports
- Stores
- Large venues
- Factories
- Corporate Buildings
Type of Tripod Turnstile and utility ?
- This Most models offer either a pedestal mount so they can stand on a floor.
- A wall mount it is attached to a corridor wall or spacing wall.
- The pedestal mount It is usually used for exterior installations and for large interior entrance areas.
- The wall mount It is used for corridor walls, spacing walls, and narrow entrances.
- The Tripod arms and the mounting and casework are usually made of stainless steel, so they can withstand rough treatment by weather and human usage without rusting or otherwise corroding.
Biometric face recognition has helped to put a full stop on the rum ours surrounding efficacy of biometric products. The products used in this direction have already impressed small organizations as well as high-level intelligence agencies to grab most desirable security level.

RFID - BIO LOCK
High speed proximity smart card system with unique security codes to provide show card based access to users. HS proximity based RFID based Access Control Systems provide low price with good performance, designed especially for time attendance and access control for high security zone, server room, Datacenter etc.
An Active Reader Passive Tag (ARPT) system has an active reader, which transmits interrogator signals and also receives authentication replies from passive tags.
An Active Reader Active Tag (ARAT) system uses active tags awoken with an interrogator signal from the active reader. A variation of this system could also use a Battery-Assisted Passive (BAP) tag which acts like a passive tag but has a small battery to power the tag's return reporting signal.
Radio-frequency identification (RFID) is the wireless use of electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects. The tags contain electronically stored information. Some tags are powered by electromagnetic induction from magnetic fields produced near the reader. Some types collect energy from the interrogating radio waves and act as a passive transponder. Other types have a local power source such as a battery and may operate at hundreds of meters from the reader. Unlike a barcode, the tag does not necessarily need to be within line of sight of the reader, and may be embedded in the tracked object. Radio frequency identification (RFID) is one method for Automatic Identification and Data Capture (AIDC).
RFID systems can be classified by the type of tag and reader. A Passive Reader Active Tag (PRAT) system has a passive reader which only receives radio signals from active tags (battery operated, transmit only). The reception range of a PRAT system reader can be adjusted from 1–2,000 feet (0–600 m)[citation needed], allowing flexibility in applications such as asset protection and supervision.

Door Access Control
Fingerprint door lock incorporates the proven technology of biometrics. Biometric fingerprint door locks have gained tremendous benefits compared to conventional key door locks, combination door locks, keyless keypad lock or card reader door locks. The biometric finger print door locks surpass security protection, convenience, and speed. Hotels are surely using RFID and MiFare card systems for continuous & reusable low cost access cards. Biometric security guarantees a positive method of user identification with something that cannot be lost, replicated or stolen. myburo has been engaged in offering customers a comprehensive and wide range of Biometric & Card based Door Locks that can be easily installed and operated. These Devices are fabricated by innovative technology and high quality chipset and materials. Review more information about available devices in our catalog section .
Our Top Clients
Some of our clients using myburo Attendance and Payroll Solution




