Installation and maintenance of access control systems with work time tracking

Prompt designs and builds a cost-effective access control system to suit the needs and goals of your business, along with a built-in timesheet. If necessary, we also install access gates to the system.

Request a Quote

If you only need access at one or two doors, installing stand-alone access points may be the best option.

For stand-alone access points, the access device performs all tasks on its own, without the need to connect to a computer or control server.

In this solution, each entry point must be taught separately who can be admitted, and they perform the identification from their own memory and then do their work offline without requiring further intervention.

If you want to automate access at multiple points, we recommend centralized access systems that allow you to specify an almost unlimited number of people authorized to enter.

For centralized systems, all access points can be programmed from a central server computer, and the server can be accessed from anywhere in the world as needed. If the connection between the access point and the server is lost, the access devices will continue to operate offline, but in this case, access rights cannot be programmed or set.

Authentication methods and access devices

Touch identification devices:

  • code-locked access control (even with the possibility of opening a door with a card), e.g. Jantar
  • barcode scanner (eg in warehouses),
  • magnetic card reader (such as a bank card reader),
  • chip card reader (such as Smart card or Supershop card),
  • biometric identification (fingerprint or palmprint identifier, vascular network identifier).

Contactless identification devices:

  • Proxy card access control (even in combination with code lock): these radio frequency readers (RFID / Mifare access control systems) are the most common. A reading distance of up to 1-1.5 meters is possible, which means that the card does not have to be taken out to open the door: the reader reads it from our pocket. The encapsulation of the technology can be not only a card, but also, for example, a watch, a bracelet, a button that can be sewn into clothes.
  • Biometric identifiers (iris identifier, facial recognition).
  • RF identification: a radio frequency (433 MHz) remote control combined with an access control ID with a range of up to 50 meters.

Recording of working time

One of the very useful additional functions of the access control systems is the working time register, with which we can find out the working hours of the employees and their time spent at a given location in seconds, and we can also record holidays and sick leaves.

The timesheet can be connected to any payroll system, so month-end payroll tasks can be reduced to a few minutes of work and real time can be billed.

Request a Quote