PlastiCard understands the unique and various safety and security issues facing learning institutions from grade school through college. Our Academia Keeper ID software systems are completely scaleable to your institution from single entrance to multiple buildings, and grow as your needs change. With Academia Keeper, you'll quckly and easily design, issue and track ID cards for students, employees, contractors, and visitors and choose your level of security from simple photo capture up to signature and fingerprint capture.
Academia Keeper's features include: Student and employee positive identification and tracking | Visitor positive identification and tracking | On-Demand …show more content…
Reports | Identification Cards | Appointment Book | Security | Customize | Gatekeeper Access | Photo Capture | Signature Capture | Card Printer | Identification Card Reader | Fingerprint Scanners | Software | Hardware | |
Student and employee positive identification and tracking - Students and employees are enrolled by entering name, phone, department, Id number, photo and optional fingerprint into database. The students and employees pass their identification card through a reader at the entrance when they enter or depart. Their photo, fingerprint authorization and other related data pops up on the monitor positively identifying the student or employee. Date/time and gate number are recorded into the database when the identification card is passed through the card reader.
Visitor positive identification and tracking - The gate attendant enters the visitor's name phone number, destination, and takes photo, optional fingerprint.
The visitor signs the electronic signature pad. A badge or label is printed out with visitor's name, photo, destination and badge number. The visitor can now pass their badge or fingerprint through a reader when entering and departing. The visitor's photo pops up on the monitor positively identifying the visitor. The date/time and gate number is recorded into the database when the identification card is passed through the card reader. Pre-authorized visits can be recorded into the Appointment book from the authorization person's office. This has the added benefit of faster sign-in with minimum data …show more content…
entry.
On-Demand Reports - Reports and instant information can be viewed or printed in various flavors. The employee and visitor logged data can be sorted by name, date, time period etc. Complete visitor records including the persons who requested and authorized the visit, arrival/departure dates and times and the gateways used can be assembled and reported.
Identification Cards - You can design your own cards with easy-to-use drag and drop methodology. You can print full color standard plastic card, smart card, proximity and weigand cards. Standard cards can be bar coded or magnetically encoded. Biometric fingerprint identification can be loaded into smart cards to verify scanned fingerprints signature and photographs are printed on the Identification card.
Appointment Book - Pre-authorized visitors are recorded in the appointment book. The record includes, persons whom requested and authorized visit, visitor's name, phone number, company represented, company address, telephone number and visitors classification.
Security - The database is password protected. The system is divided into multi-level and access is password controlled. Optionally, if fingerprint scanner or Smart Card is used, access may be further restricted by the use of fingerprint or Smart Card providing physical security.
Customize - Academia KeeperTM can be scaled to fit the smallest institution with a single entry point to the largest of institutions with multiple facilities and multi gateways.
Gatekeeper Access - The appointment book and visitor and employee logs can be viewed from remote PCs as well as from the gate attendants PC. This allows authorized employees to determine who is currently in the facility and perhaps location. Of course employee, contractor and visitor arrival and departure dates and times can also be viewed.
Photo Capture - Employee and visitor photographs are taken by Academia KeeperTM and stored in the database. Photographs offer positive identification that can be viewed on the monitor and printed on the Identification card.
Signature Capture - Student, employee, contractor and visitor signatures are electronically captured and stored in the database. The signatures can then be viewed on the monitor and printed on the identification card.
Card Printer - Identification cards are printed on an integrated or centrally located printer. Printers for standard plastic cards, smart card, weigand and proximity cards are available to accommodate the client's requirements.
Identification Card Reader - The integrated card reader speeds the flow of people entering or departing the facility.
The readers can accommodate standard plastic cards, smart card, proximity and weigand cards.
Fingerprint Scanners - Employee and visitor fingerprints are scanned and stored in the database and or stored in an identification smart card. Finger- print scanning provides for positive identification and speeds the flow of people entering and departing the facility.
Software - The software operates under Microsoft Windows 95, 98, NT, 2000, ME or XP. The student, employee and visitor data currently existing in a database can be loaded into the database. The system is scaleable from a single PC to multi PCs in various network configurations, LAN, WAN or (optionally) the Internet.
Hardware - PCs that will operate with Microsoft Windows 95, 98, NT, 2000, ME or XP. Optional hardware include, plastic card printer, label and report printer, barcode reader, magnetic card reader, proximity card reader, weigand reader, smart card reader, fingerprint scanner, electronic signature pad, video or digital camera and
scanner.
An identity document (also called a piece of identification or ID, or colloquially as one's '"papers"') is any document which may be used to verify aspects of a person's personal identity. If issued in the form of a small, mostly standard-sized card, it is usually called an identity card (IC). In some countries the possession of a government-produced identity card is compulsory while in others it may be voluntary. In countries which do not have formal identity documents, informal ones may in some circumstances be required.
In the absence of a formal identity document, some countries accept driving licences as the most effective method of proof of identity. Most countries accept passports as a form of identification.
Information present on the document or in a supporting database might include the bearer's full name, a portrait photo, age, birth date,address, an identification number, profession or rank, religion, ethnic or racial classification, restrictions, and citizenship status. Newtechnologies could allow identity cards to contain biometric information, such as photographs, face, hand or iris measurements, orfingerprints. Electronic identity cards or e-IDs are already available in some territories such as Hong Kong, Malaysia, Estonia, Finland,Belgium, Portugal and Spain. Morocco is also planning to launch a new identity card of biometric type by January 2007
Student cards are typically used to identify someone as a university or college student.
Student ID cards are almost always distributed to students through the administrative department of a college or university. They are usually given to first-year students who are enrolled in school full-time. This article will explore facts about student cards and other ID accessories that are often used by students.
The Purpose of Student ID Cards
Students can use them to get discounted movie tickets, heavily discounted software, discounted books, and sometimes even free food. Though student cards have several perks, they can also have a dark side. For example, some people use false plastic ID cards that look like student cards in order to get the benefits associated with them. This is highly illegal, but the law is not heavily enforced as most of these people are not caught. It is not recommended to create false ID cards as it is a felony in some states.
Student cards can serve a more practical purpose than discounts on movies and software. They are often used to check students in and out of class. Some schools have an ID scanner by the door where students can swipe their card and automatically be clocked in or out. This is a newer student ID adaptation that makes coming to class easier for teachers and students. Some schools also require students to show their ID at the door of the administrator's office upon entering.
Introduction:
We propose to create a database that will track all relevant information dealing with entrepreneurial accounts created for ECE 345 Senior Design Projects. We also propose to design and build a scanning system utilizing the information currently stored on the University of Illinois identification card to confirm reception of parts from the ECE store. This database and identification card will be able to interface with the website created in the ECE 345 E-Bank Project 1.
The creation of this database consists of information containing company sponsorship, project members, account balances, withdrawals, etc. This database will be able to interface with the website created in ECE 345 E-Bank Project 1. The interface will allow students and faculty to monitor account information, project status, request and approval for purchases etc.
The verification system will be used to document parts ordered and delivered to ECE 345 team members. A “swipe” of the card will be used as confirmation by the student that the parts were received and the appropriate deduction will be automatically made from the database. The update of the database will allow update of the E-Bank Project 1 web page. This will eliminate the paper trail of the current monitoring system.
Block Diagram:
(Diagram includes interface with Project 1)
Project 1
Alternative User Interface: Will act as a backaup system to access and modify information in case of Web failure
Database: Contains all pertinent Project Information
Verification System: Will identify user and will automatically update database. Design Considerations:
This project has 2 major subsections that are discussed below.
The verification system will consist of either utilizing the magnetic strip or the bar code on the current University of Illinois I.D. Card. The benefits and downfalls of both systems are currently under consideration. At this time, we do not know the details of the contents of the information of the magnetic strip. However, either system could be used to perform the desired function of the verification system. The magnetic strip can be used to identify the user of the card. This can be done using a magnetic read head. A microcontroller will be connected to the read head to receive information about the user and interface various commands to update the database. The barcode scanner can be used to identify the card owner. This again can be read by a scanner head and input into a micro controller to interface with a PC.
The database will be used to store all the information needed by the web page created in Project 1. This will also be used as an interface between the hardware components and the web. The database will be automatically updated through the verification system, no manual entries are needed. The database, through a user interface, will be able to be updated which will act as a backup incase of failure of the web.
Specifications:
The verification system will conform to speed and reliability standards currently used in existing systems. The database will easily interact with the verification system and the web page in Project 1. Actual figures are not available at this time.
Estimated Cost:
Total Parts Cost Estimate: $50
(2.5)*($30/hr)*(10hrs/week) = $750/week/partner ($750/week/partner)*(2 partners)*(12weeks) = $18,000
Total Labor Cost Estimate: $18,000
Total Project Cost Estimate: $18,050
Testing Procedures:
Tests will consist of proper binary output of scanner. Test to insure interface between scanner and database performs desired functions.
Timetable:
Week of: | Activities: | Partner: | 2-7 | * Initial Proposal | * Both | 2-14 | * Investigation of information on the Student I.D. * Explore operation/design of magnetic strip reader * Create initial design of database and reader | * Alex * Brian * Alex | 2-21 | * Prepare/present Design Review * Investigate ability to get all needed parts | * Both * Brian | 2-28 thru 3-6 | * Order all parts * Build scanner * Have rough database with interface created | * Alex * Both * Both | 3-20 thru 4-3 | * Refine database * Debug scanner | * Alex * Both | 4-10 thru 4-17 | * Interface Database with Project #1 * Preparation of Presentation | * Both (also includes members of Project 1) * Both | 4-24 | * Demos and Presentation | * Both | 5-1 | * Final Paper | * Both |
Parts: * Use SQL Server for database * Microcontroller * Read Head * Other miscellaneous parts