This tool is a 100% safe alternative when, in addition to the presence detection, it is necessary to give certainty of the access of authorized persons. Very useful on external sites, this tool solves some known problems. For example:
Solves the problem of employees exchanging badges to stamp one for the other and defraud the working hours of the company.
Solves the problem of "unauthorized replacement". Sometimes the worker having to do personal things doesn’t go for work and lends the badge to a relative.
Resolves a privacy issue. Only persons authorized to enter the site will be registered as working time.
This technology beats fingerprint technology as far as safety is concerned, since the normal biometric fingerprint detectors need to memorize the fingerprint inside the stamper before being able to recognize it. Then a tool containing the various fingerprints is left on the site. If this tool is stolen at the same time, the imprints contained therein are stolen, which could be used at times very dangerous.
Our facial recognition technology is not invasive. Here we know it happens to the practical acts:
The worker goes to the company for recruitment and at the same time his face is scanned with the screening technology, that is to say that “strategic” points are detected on the face that allow him to be recognized. So in fact, in the company database that resides on a CLOUD, only the coordinates are stored as longitude-latitude and not the face. The cloud is protected with the UE security rules of May 25th 2018 requires.
The worker goes to the workplace and before entering shows the face in front of the detector. An App again performs, with the same algorithm, the mapping of the points of the face and compares them with those stored in the database in CLOUD.
If the face is recognized then the work start time will be sent to the work site. If it is not recognized, a security code is requested that the worker must ask the company at the moment of entering the service. This can happen for replacements for example.
The same thing happens when the service ends.
Last but not least, the data sent (entry, exit, employee name, site where the stamp was made, etc.) can also be interrogated by other software so that if the company already owns a staff management software should not change it but use our tool only for the detection of schedules.
The potential that this tool offers and the very high degree of security, we can say that Facial Recognition of our company is a solution that today is winning on any other site-time technology.
The cookie allows the website to remember the cookie preferences set by the user and therefore provide only accepted cookies.
Session management (PHPSESSID, SSID_)
They are identifiers of the browsing session. They can be used to recognize the user and maintain the logged in status when visiting new pages.
User registration (Users, Ecommerce)
They allow the site to recognize the user if the site has user registration functions (e.g. restricted areas, e-commerce).
Statistical cookies help website owners understand how visitors interact with sites by collecting and reporting information anonymously.
Google Analytics (__utma, __utmt, __utmb, __utmc, __utmz, __utmv)
As a user navigates between web pages, you can use the analytics.js tagging library to record information about the page the user has seen (for example, the page's URL) in Google Analytics. The analytics.js tagging library uses HTTP Cookies to remember the user's previous interactions with the web pages.