Preview

Academia Keepers

Good Essays
Open Document
Open Document
2073 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Academia Keepers
afety and Security Designed Especially for Learning Institutions
PlastiCard understands the unique and various safety and security issues facing learning institutions from grade school through college. Our Academia Keeper ID software systems are completely scaleable to your institution from single entrance to multiple buildings, and grow as your needs change. With Academia Keeper, you'll quckly and easily design, issue and track ID cards for students, employees, contractors, and visitors and choose your level of security from simple photo capture up to signature and fingerprint capture.
Academia Keeper's features include: Student and employee positive identification and tracking | Visitor positive identification and tracking | On-Demand
…show more content…
The visitor signs the electronic signature pad. A badge or label is printed out with visitor's name, photo, destination and badge number. The visitor can now pass their badge or fingerprint through a reader when entering and departing. The visitor's photo pops up on the monitor positively identifying the visitor. The date/time and gate number is recorded into the database when the identification card is passed through the card reader. Pre-authorized visits can be recorded into the Appointment book from the authorization person's office. This has the added benefit of faster sign-in with minimum data …show more content…
The readers can accommodate standard plastic cards, smart card, proximity and weigand cards.
Fingerprint Scanners - Employee and visitor fingerprints are scanned and stored in the database and or stored in an identification smart card. Finger- print scanning provides for positive identification and speeds the flow of people entering and departing the facility.
Software - The software operates under Microsoft Windows 95, 98, NT, 2000, ME or XP. The student, employee and visitor data currently existing in a database can be loaded into the database. The system is scaleable from a single PC to multi PCs in various network configurations, LAN, WAN or (optionally) the Internet.
Hardware - PCs that will operate with Microsoft Windows 95, 98, NT, 2000, ME or XP. Optional hardware include, plastic card printer, label and report printer, barcode reader, magnetic card reader, proximity card reader, weigand reader, smart card reader, fingerprint scanner, electronic signature pad, video or digital camera and

You May Also Find These Documents Helpful

  • Better Essays

    Biometric scanners should be used for all sensitive areas as a second method to prevent card cloning . Those that have access to sensitive areas or doors that can allow more than one person through such as the shipping area and front double doors will be issued a Personal Identity Verification…

    • 1902 Words
    • 8 Pages
    Better Essays
  • Better Essays

    Nt1310 Unit 1 Assignment 1

    • 7711 Words
    • 31 Pages

    The system stores all the necessary information about the user. A new user is first registered to the system and the corresponding information is burned in the RFID tag. This RFID tag will then be accessible through the system. When a registered user comes to the entry point and puts his/her tag into the reader, the system checks whether he/she is a registered user or an imposter. If the user is registered, then the tab information is matched with the user information stored in system. The door is opened after the successful authentication and is closed automatically after a specific time interval. The check-in information is also stored in the database with the corresponding date and time. A log is also generated by the system according to the check-in information. Finally, this check-in information is stored in a central server along with the basic information of the…

    • 7711 Words
    • 31 Pages
    Better Essays
  • Good Essays

    Some fingerprints are visible; if not a device called the Reflected Ultraviolet Imaging System aims UV light at areas where fingerprints might be. If there is a fingerprint it will reflect back under the UV light or finger print power can be dusted over areas.…

    • 487 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    | The software that enables one or a company to store, organize and retrieve information.…

    • 365 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In Grandfield College, the Software-Tracking database will be used to help in managing the school’s software licensing. The software will be watched for lifecycle and version corrections as well as keeping track of the number of users accessing the software under the constraints of the license agreement. The faculty and staff computers will be followed for which version and licensed copy of software is presently running on each system.…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Databases are used for record keeping and tracking of information institutions like colleges or organizations (Coronel & Morris, 2015). In this case, the database will be used to keep track of the students・attendance, performance and the courses they are supposed to be taking. This will help the college analyze how the students perform and which classes they least or most attend. The database will also help the college keep track of all the subjects which the student is taking or is expected to take in during the course. Instructors will also be part of the database. The database will track their performance in various subjects and their attendance in each class. The database will be upgraded at the beginning of every subject where each student will confirm their attendance for the particular subject and whether the instructor is in class as well. After an examination, all the students・performance will be…

    • 590 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    yehudit erlbaum word 2

    • 261 Words
    • 1 Page

    A fingerprint reader, or scanner, captures curves and indentations of a fingerprint. Organizations use fingerprint readers to secure doors, computers, and software. For example, a fingerprint reader can be set up to authenticate users before they can access a computer (Rossi). External fingerprint readers usually plug into a USB port. To save on desk space, some laptops include built-in fingerprint readers1.…

    • 261 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    A database is an integrated computer structure that stores end-user data and metadata (Coronel, Morris, & Rob, pg. 7). Data are the raw format of information, which when properly formatted can produce accurate, relevant, and timely information that is the key to making good decisions (Coronel, Morris, & Rob, pg. 5-6). The purpose of a database is to provide computer-based systems a way in which to store, manage, and retrieve data quickly (Coronel, Morris, & Rob, pg. 5). As for a local college database, the purpose of the database will be to house the data of enrolled students, the courses offered and times available, and the information of the faculty. The database can provide possible course matches for each student based off of previous courses taken and pre-requisites obtained, as well as keep track of the professors teaching each course. The database will provide the data a student needs to insure they are taking the correct courses and provide the college and the faculty general student information, such as contact information.…

    • 906 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Syabus

    • 3034 Words
    • 13 Pages

    Print Mini Syllabus Course ID: Title: Modality: Credit Hours: Specialty: CIS105 Survey of Computer Information Systems Internet 3.00 MS Office Pro 2010…

    • 3034 Words
    • 13 Pages
    Good Essays
  • Satisfactory Essays

    Staff and visitors have to sign in and out using an electronic scanning system. Each member of staff/visitor has a card with photo ID, name and bar code to identify themselves and use to sign in and out of the premises.…

    • 436 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    All employees and visitors have to sign in a book, kept within the hallway. This is so at any time, the manager has a detailed record of who is within the building, staff, residents, workmen, or visitors in case of that an emergency, or in case an evacuation procedure may arise. All visitors to the building are asked their identity.…

    • 602 Words
    • 2 Pages
    Good Essays
  • Good Essays

    employment legislation

    • 2462 Words
    • 10 Pages

    Computer system: types eg PC, base unit, laptop, netbook, PDA, mobile phone, games consoles, tablet, server, embedded devices (inside phones, domestic appliances, cars)…

    • 2462 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    Indicate any special experiences, unusual factors or other information you feel would be helpful in evaluating you, including, but not limited to, education, employment, extracurricular activities, prevailing over adversity. You may expand upon but not repeat AMCAS application information. 2000 character limit.…

    • 593 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Case Project

    • 650 Words
    • 3 Pages

    Standard biometrics can use a person’s unique physical characteristics for authentication; these types of devices can use fingerprints or other physical characteristics of a person’s body. There are two types of fingerprint scanners, a static fingerprint and a dynamic fingerprint scanner. By doing research I found that I cannot recommend using these because of their cost and their reliability.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Academic Success

    • 1154 Words
    • 5 Pages

    No matter where you are in your life continuing your education can be a challenge. Being able to juggle all your responsibilities can be very hard, but it is one of the keys to success. Everyone strives to be successful in every aspect of their life. You must know what you want to accomplish and be able to create a guided plan to have the best results. Making sure to stay organized and set your priorities in line, will lead to ultimate success. The ways I plan to continue my academic success is by setting educational goals, perfecting my writing process, applying my learning style, and the importance of academic integrity.…

    • 1154 Words
    • 5 Pages
    Better Essays