Biometric ID

Low cost, but effective barcode

All of our data capture terminals can be fitted with a fully integrated barcode reader, allowing for a reliable but low cost badge to be issued to employees.

It's an all in one solution we're offering since the badges can be designed and the barcode itself created utilising the ELF ID badge design software. You simply need to print it off either to a standard printer with plain paper and then laminate it or alternatively with a PVC card printer.

Since you can design the badge yourself (or we can do it for you) the badge can double up as a security ID card if you so wish.


Proximity enables employees to clock in and out of attendance without even having to make contact with the integrated reader. This type of media is especially suited to harsh environments where debris would prevent barcode cards being read.

Proximity cards are standard "credit card" size and can be printed in full colour using a PVC card printer, allowing for the card to be used as a security ID card. The same card could also be used for Access Control or a company vending card (I-Class).

In use at thousands of locations!

Biometric authentication takes you straight into the 21st century with technologies that measure and analyse human physical characteristics for authentication purposes. So for those areas that require enhanced security, we can prohibit access to those personnel who have not been specifically granted access by the administrator. Our systems can be set to read fingerprints, eye retinas and irises, facial patterns and even hand measurements.

Moreover, biometric systems can be used in conjunction with passwords or tokens, so you can add an additional layer of security on top of existing systems without having to replace them.

The Biometric Advantage

Whilst all our systems are reliable and robust, biometric security offers some unique features:

  • Biometric traits, unlike barcodes and proximity cards, cannot be lost or forgotten
  • Biometric traits are difficult to copy, share and distribute and cannot be passed to colleagues for 'buddy clocking'
  • By their very nature they require that the person being authenticated be present at the time and point of authentication
Biometric clocking Fingerprint scanning

Fingerprint Recognition

Every single person on the planet has a fingerprint that is utterly unique to them. Our fingerprint sensors work by taking a snapshot of a fingerprint and producing an image. From that image a fingerprint recognition algorithm extracts the unique features of each fingerprint and then saves them as a template.

All the system needs do is compare the features of any fingerprint presented at any given access point with the features of the fingerprint templates in the database. By comparing the similarity between two feature sets, it can quickly decide whether the two fingerprints match or not. More importantly, by using this method individual fingerprint data is not actually stored in the database, thereby completely eliminating the risk of biometric identity theft.


Buddy clocking, a process where one employee enters another's details for them, can be eliminated by using this technology. The system will request either a PIN number or card swipe, and then require validation by the employee fingerprint. The fingerprint is then compared to the both the template itself and the employee's pin number or card swipe.

Once the employee's identification has been verified, this information can be passed to the Ceequel software for processing where the employees attendance is instantly logged.


Instantaneous and secure identification

The employee simply places their finger in the reader and within one second is identified and clocked into attendance.

Fingerprint data is stored as a mathematical algorithm and cannot be used for any purpose other than identifying the employee for data collection purpose.

Biometric clocking handscanning

Hand Recognition

Hand readers simultaneously analyse more than 31,000 points and instantaneously records more than 90 separate measurements of an individual's hand - including length, width, thickness and surface area - to verify that the person using the device is really who he or she claims to be.

The hand reader compares this information with a 'template' of the individual's hand, not an actual image that has previously been stored in the reader, on a server or on a card. This way you can be sure that there is no threat of biometric identity theft.

Once the person has been identified as a valid user, a door can be opened, access can be provided and time details recorded. The reading and verification process takes less than a second and its reliability record is impeccable.


Facial Recognition

No longer the stuff of science fiction movies, facial recognition is fast becoming one of the most effective ways to securely register the attendance of your employees, providing not only a foolproof method of clocking in, but also providing the optional ability to take snapshots for future reference.

It couldn't be simpler; employees stand 45cm-70cm away from the terminal to complete authentication in less than one second and require little training prior to using terminals.

More Information

If you require more information regarding our available media or biometric security options feel free to contact our sales team. They'll be happy to offer a solution that is tailored to your needs.