Customized Biometric Attendance Monitoring Software

The Biometric application is suited for the state that have human activities surrounding their core operations. It attempts to uniquely recognize humans based upon one or more intrinsic physical or behavioral traits.


User authentication and authorization
Both HTTP and Cookie-based user authentication will be employed at various entry points requiring restrictive access on the web portal. A role-based privilege system will also be used to authorize users at various levels of administering the portal.
This will be implemented using similar Open Source CAPTCHA generators and validators as used on the standard software.
Disable Scripting Actions
Scripting will be used sparingly on the software for design and usability enhancements only. This will ensure that the software does not awfully degrade in accessibility and performance in an event that scripting is disabled on a visitor’s computer.
Permission Functionality
As already described in the User authentication and authorization section above, permission constraints will be enforced by ensuring that every registered user on the portal will be allocated “rights” that determine the tasks that such user will be authorized to perform.
Validation of data
>All user inputs into the portal will be validated both on the client and the application server to ensure data integrity, and also improve the security of the portal against malicious online activity.
Malicious File execution
File access permissions will be implemented both at the user authorization level of the portal (using enforced user rights), and at the operating system’s file system layer.
Guard Against Phishing
User profiles will be stored securely in a database with sensitive information such as usernames and passwords encrypted with strong one-way encryption algorithms.
Error handling
HTTP errors caused by incorrect urls, data validation errors and other user-generated errors will be gracefully handled. While data validation errors will be well explained and displayed to the user for further input, other forms of errors will be logged on the server and emails sent to the administrator for further investigations.


It can also be used for Time Attendance and Access Control in units or departments that may require them. The Time and Attendance Solution logs the personnel in on resumption and logs him out at closing or other short breaks or Pass. This ensures that staff where- about can be accounted for and off-work days will be clearly recorded.

Biometrics application will provide the following two functions:

Verification: where it is used in conjunction with a smart card, username or ID number. The biometric template captured is compared with that stored against the registered user either on a smart card or database for verification.

Identification: where it authenticates its users from the biometric characteristic alone without the use of smart cards, usernames or ID numbers. The biometric template is compared to all records within the database and a closest match score is returned. The closest match within the allowed threshold is deemed the individual and authenticated.

This solution could also be used as an Access Control System (ACS) which ensures that only authorized Officers or Soldiers enter restricted areas. This might include the installation of access control doors which would be operated using specialized cards or specific biometric parameters.

The solution also provides reporting facilities that are open, and reports/advices can be provided based on the specific (and changing) requirements of the State.