This tool is a 100% safe alternative when, in addition to the presence detection, it is necessary to give certainty of the access of authorized persons. Very useful on external sites, this tool solves some known problems. For example:
Solves the problem of employees exchanging badges to stamp one for the other and defraud the working hours of the company.
Solves the problem of "unauthorized replacement". Sometimes the worker having to do personal things doesn’t go for work and lends the badge to a relative.
Resolves a privacy issue. Only persons authorized to enter the site will be registered as working time.
This technology beats fingerprint technology as far as safety is concerned, since the normal biometric fingerprint detectors need to memorize the fingerprint inside the stamper before being able to recognize it. Then a tool containing the various fingerprints is left on the site. If this tool is stolen at the same time, the imprints contained therein are stolen, which could be used at times very dangerous.
Our facial recognition technology is not invasive. Here we know it happens to the practical acts:
The worker goes to the company for recruitment and at the same time his face is scanned with the screening technology, that is to say that “strategic” points are detected on the face that allow him to be recognized. So in fact, in the company database that resides on a CLOUD, only the coordinates are stored as longitude-latitude and not the face. The cloud is protected with the UE security rules of May 25th 2018 requires.
The worker goes to the workplace and before entering shows the face in front of the detector. An App again performs, with the same algorithm, the mapping of the points of the face and compares them with those stored in the database in CLOUD.
If the face is recognized then the work start time will be sent to the work site. If it is not recognized, a security code is requested that the worker must ask the company at the moment of entering the service. This can happen for replacements for example.
The same thing happens when the service ends.
Last but not least, the data sent (entry, exit, employee name, site where the stamp was made, etc.) can also be interrogated by other software so that if the company already owns a staff management software should not change it but use our tool only for the detection of schedules.
The potential that this tool offers and the very high degree of security, we can say that Facial Recognition of our company is a solution that today is winning on any other site-time technology.
Menage your cookies
Technical cookies are necessary and help to make a website usable by enabling basic functions such as page navigation and access to protected areas of the site. The website can not function properly without these cookies.
The cookie allows the website to remember the preferences about allowed cookies set by the user and provide only the accepted cookies
These are general purpose identifier used to maintain user session variables. They can be used for recognizing the user and maintaining a logged status when visiting new pages.
The cookie allows the website to recognize the user, if there's some functions that require the user's registration (eg. aree riservate, e-commerce)
Statistical cookies help website owners to understand how visitors interact with sites by collecting and transmitting information in an anonymous form.
__utma, __utmt, __utmb, __utmc, __utmz, __utmv
As a user navigates between web pages, you can use the analytics.js tagging library to record information about the page the user has seen (for example, the page's URL) in Google Analytics. The analytics.js tagging library uses HTTP Cookies to "remember" the user's previous interactions with the web pages.
As a user navigates between web pages, you can use the Shinistat scripts to record information about the page the user has seen (for example, the page's URL) in Shinystat. The Shinistat library uses HTTP Cookies to "remember" the user's previous interactions with the web pages.