You are on page 1of 16

e

IT

S olutions

Cer t

9001:2008

ISO

ro

vid

er

www.avi-infosys.com

World Class Biometric Solutions

Product Catalouge

AVI INFOSYS - Profile

AVI INFOSYS is an ISO 9001:2008 Certified Biometric Solutions Provider Company based in Dubai, United Arab Emirates. AVI INFOSYS is pleased to respond to Clients Project Requirements for Comprehensive and Total Integrated Solution for Enterprise-Wide Management Information Systems. Our review of the Market Place indicates that many Vendors can provide the Automated Systems; however only a few, such as AVI INFOSYS is Capable of Assisting Client in Plans, Develops and Implements of such a Highly Complex Biometric Security Management & Information Technology Projects. AVI INFOSYS business is to Partner with Clients to achieve Breakthrough Performance through the intelligent use of the Technologies. AVI INFOSYS provides: Business and Information Technology Consulting Reusable and Customized Software System Integration Services in Biometric Field for Medium to Large Local, Regional and International Organizations

AVI INFOSYS has successfully Developed, Integrated and Delivered Systems to Clients, including several in the Middle East; our successful accomplishments are based on four corporate strengths. Partnership based of Trust Dedication to deliver on Commitments Focused Industry Expertise Linking People, Processes, Organizations and Technologies The Achievement of Breakthrough Performance requires Forward Looking & Practical Ideas for Improving Business Processes Intelligent use of Technology to enable Improved Processes Committed, Trained People in Appropriately Aligned Organizations AVI INFOSYS is a leader in Partnering with clients to achieve breakthrough performance through the intelligent use of Information Technology. AVI INFOSYS is Trusted and Valued by clients for the High Quality Services and Commitment to deliver real results.

Increase security - Provide a convenient and lowcost additional tier of security. Reduce fraud by employing hard-to-forge technologies and materials. For e.g. Minimise the opportunity for ID fraud, buddy punching. Eliminate problems caused by lost IDs or forgotten passwords by using physiological attributes. For e.g. Prevent unauthorised use of lost, stolen or borrowed ID cards. Reduce password administration costs. Replace hard-to-remember passwords which may be shared or observed. Integrate a wide range of biometric solutions and technologies, customer applications and databases into a robust and scalable control solution for facility and network access

Offer significant cost savings or increasing ROI in areas such as Loss Prevention or Time & Attendance. Unequivocally link an individual to a transaction or event.

AVI INFOSYS products and Services


Biometric Fingerprint Identification Solutions Biometric Access Control Solutions. Smartcard based Prepaid and Loyalty Rewards Systems Web based Time Attendance Software and Solutions Smartcard /RFID Card based Solutions Enterprise Firewall Solutions Secure Networking, Network Security Biometric Based Access Control / Encryption Solutions Smartcard Production and Printing Services Secured VPN Solutions IT Infrastructure Security Solutions Special Capabilities & Expertise Enterprise - Wide Information Systems (EIS) Management Information Systems (MIS) Decision Support Systems (DSS)

Preventive Maintenance Management Systems (PMMS) Hospitality Information Systems (Hospital & Hotel) - (HIS) Industries cover by AVI INFOSYS Applications & Software Development Solutions Government Financial Institutions / Banks Industrials / Productions Hospitality (Hospitals & Hotels) Educational (University & School) Construction & Contracting Legal, Library & Case-Handling Multi Offices Organizations

Management & Technology Solutions


State-of -the-Art Technology Open Systems Architecture & Environment Portable on any Platform and Scalable Adaptable to Newer Technology Integrating information: Technology, Systems and Management

AVI INFOSYS has assist clients in making Intelligent Investment on Information Technology, deriving the highest returns possible and helps clients to understand the changes they needs to make their organizations to operate efficiently and effectively.

Our Approach and Methodology


The following processes (We called it A Dozen of Success) will be adopted by AVI INFOSYS toward Developing the IT Strategy for the clients 1. Define High Level business objectives 2. Assess current Information System (IS) support and services

AVI INFOSYS assists clients in


Responding to Competition Gaining or Maintaining Market Leadership Achieving Grater Efficiencies Dramatically Improving Performance

Putting It All Together


IN the complexity of todays Information Technology, many elements must come into play before an integral whole is achieved. These elements vary in emphasis from business to business, but to the solution provider each has vital role in the final product: choice of hardware and peripherals, communications setup,

networking, RDBMS, operating system, Arabization, understanding of requirements and - foremost - the users. AVI INFOSYS has the experience and track record to prove it. We have kept abreast with the ever-evolving technology. We have migrated / converted systems from proprietary to open platform, from 3GLs to RDBMS and CASE Tools, and from simple networks to clientserver architecture.

AVI INFOSYS Successes


Our successes are based on achieving real result for the clients, maintaining a High Standard of customer satisfaction and establishing Long-Term client relationships.
4

3. Determine future IS support and services required 4. Evaluate potential contribution of IS department and involved units 5. Analyse gap between current and future systems 6. Prioritise development and produce plan 7. Implement improved methods for Development 8. Implement improved Project Management methods 9. Plan immediate Developments 10. Implementation 11. Educate and Trains end- users and administrators 12. Maintain Customer Support and Services.

AVI-FTA-507

AVI-TEC Fingerprint based Time Attendance Systems:


Features:
Simple and durable device with a robust inbuilt optical scanner Records up to 50000 / 80000 / 100000 transaction records User Capacity - 1500 / 2000 / 2500 identities Free SDK Available for Software Customization Supports multiple companies of one organization at a single location Supports one company at multiple locations. Supports multiple input units installed for one company Company Rules, Time Management Parameters can be easily customized on the device Easy to manage Employees, Departments and Multiple Shifts Supports leave management Flexibility of Reports generated by the Software - Daily Attendance Statistics Report, Attendance General Report, Staff On- Duty/Off Duty Report Department Attendance Report, etc. Data available in excel/html/ASCII format for further calculation Seamless integration with various Accounting and Payroll Packages

Benefits:
Built in strong U.S.A Intel32bit fingerprint embedded standalone module (ZEM100),it is easy to integrate with various systems Support finger 360 degree identification, easy to use. Sensor window cotton improving image quality, accepts dry, wet fingers CMOS automated exposure and intelligent compensation improved image quality Adjusting image distortion, assure fingerprint matching consistency Suggesting customers cooperating as ODM or OEM, providing system analysis, mould-making, circuit design, producing-assembly, package design, etc, linear service

Technical Specifications:
Size User Capacity Transaction Storage Algorithm version Hardware platform Communications Power Identification time FAR FRR Operating Temperature Operating Humidity Sensor Language 185L~123W~43(H)mm 1500 / 2500/5000 50000/80000/125000 2005 Version new algorithm ZEM100 RS232, RS485, TCP/ IP (UDP Protocol) 5V 2A POE: Power Over Ethernet (Optional) <=2s <= 0.0001% <= 1% 0 C- 45C 20%-80% Error free Optical Sensor English , Simplified Chinese, Traditional Chinese ,other Languages Optional: Simple access control (Electro control Directness relay output 3A/12VDC)
5

AVI-FTA-508

AVI-TEC Fingerprint & RFID Based Time Attendance System.


Features:
Supports both - Fingerprint & RFID (Smartcards) for attendance recording purposes Records up to 50000 / 80000 / 100000 transaction records User Capacity - 1500 / 2000 / 2500 identities Free SDK Available for Software Customization Supports multiple companies of one organization at a single location. Supports one company at multiple locations. Supports multiple input units installed for one company. Company Rules, Time Management Parameters can be easily customized on the device Easy to manage Employees, Departments and Multiple Shifts Supports leave management Data available in excel/html/ASCII format for further calculation

Flexibility of Reports generated by the Software - Daily Attendance Statistics Report, Attendance General Report, Staff On- Duty/Off Duty Report Department Attendance Report, etc. Seamless integration with various Accounting and Payroll Packages

Technical Specifications:
Size User Capacity Transaction Storage Algorithm version Hardware platform Communications Power Identification time FAR FRR Operating Temperature Operating Humidity Sensor Language 185L~123W~43(H)mm 1500 / 2500 50000 2005 Version new algorithm ZEM100 RS232, RS485, TCP/ IP (UDP Protocol) 5V 2A POE: Power Over Ethernet (Optional) <=2s <= 0.0001% <= 1% 0 C- 45C 20%-80% Error free Optical Sensor English , Simplified Chinese, Traditional Chinese ,other Languages Optional: Simple access control (Electro control Directness relay output 3A/12VDC)

iGuard Biometrics Fingerprint/PIN/Smartcard based Time Attendance and Access Control System with Web based Software
iGuard Technology Overview
Each iGuard Biometric / Smart Card Security Appliance has a builtin Web Server enables all the computers in the corporate network to directly simultaneously access the device using any Internet Browser, such as Microsoft Internet Explorer Netscape Navigator.
6

Different computer platforms such as Apple Macintosh, Microsoft Windows Linux machines can access the device. No additional software is required. So whether you are in an airport lounge or a hotel room, you can always check if your employees are already in the office or not, and you can even control, modify or disable their access rights to your office remotely via internet connection provided your iGuard Biometric / Smart Card Security Appliance is connected to an external IP address or your network is available through a VPN connection that is reachable from your location. iGuard Super Master is a back-end server of iGuard. With Super Master installed, the maximum no. of users of iGuard Master / Slave network will be increased to 5000 or up. And, Super Master is designed base on the iGuard patented embedded Web Server technologies, which enables all computers, such as Apple Macintosh, PCs & Unix machines, in the corporate computer network to setup, maintain and access the information of the device simultaneously using the well-known Internet Browser.

iGuard Features Multi Factor Authentication:


With iGuard, users can be authenticated and verified through Fingerprint, Smartcard or Password. And depending on the different time period, you can set up the iGuard that the users can just simply presents his smartcard to get authorized (such as during hightraffic period), or requires the high-security fingerprint verification (such as after office hours or during weekends and holidays).

Access Rights:
When you can easily and conveniently assign different access rights to your employees, you can plan your security better and maximize the effectiveness of the human resources. And with the built-in Web Server technology, iGuard empowers you to manage the access rights of each individual employees or a group of employees easily anytime, anywhere using any webenabled computers or mobile devices. For example, you can assign the staff members of the marketing department the rights to get in the office premises during weekdays from nine to five only, or prevent a particular employee from entering the computer server room. Reports: iGuard includes three built-in reports:

Access Log, Attendance Report & Daily In/Out report, that can be accessed via any web-enabled computer with web browser. Should more sophisticated reports be required, such as for the payroll purposes, the information can be downloaded and saved in Microsoft Excel format and in plain text format. In addition, the access records can be saved in any PC in the network in the popular ODBC database format in real-time manner, and other applications can conveniently obtain the information from the ODBC (the required software, iServer is available free-of-charge in our download page)

Economical:
All the necessary hardware and software is built-in to the device, including the hardware to connect the system to the corporate network. All you need to do is to plug-in the popular RJ-45 network cable to the back of the device. No other hardware and wiring is necessary. In contrast, all other existing security systems use the old RS232 & RS485 wiring system to connect to the dedicated computers (not to the corporate network), and it usually involves a lot of extra wiring works.

Small Footprint:
iGuard is a wall-mounted unit elegantly designed with extremely small footprint. In fact, it is the smallest stand-alone biometrics device available in the market today. It can be mounted easily and conveniently without requiring a lot of space.

We are currently using SecuGen SDA03M sensor for LM520-FOSC (FBI Certified, FIPS 201/PIV Compliant, GSA APL Listed). A new model with SDA04 sensor (FBI Certified, FIPS 201/PIV Compliant, GSA APL Listed) will be introduced in mid. 2010 to address the high end market. The SecuGen SDA03M is very rugged, accurate, and affordable as it is designed for long-lasting performance in high traffic and tough environments. Lucky Technology has deployed earlier generations of the iGuard with the United States Air Force and the US Army and in Afghanistan and thousands of schools, universities and business buildings worldwide, stated Wayne Wilkerson, President of Lucky Technologys US Operations. SecuGens OEM sensors are used by device manufacturers all over the world and are widely recognized as among the most effective and affordable solutions for successfully integrating fingerprint capture and matching into third party devices.

Simplicity:
iGuard is an Internet-Ready Security System, and is the first and the only network appliance security product in the market that uses TCP/IP as the protocol to communicate with other iGuards and the outside world. The protocol enables the device to directly connect to the corporate network via the existing cable wiring. And since the TCP/IP protocol is the Internet protocol, it allows all computers in the corporate network to access the device using the Internet Browser software. As a result, users do not need to learn to use a new software to access and administer the device, and most users can start using the device in minutes. In contrast, all other similar security systems use proprietary protocol & wiring, and proprietary software is required to access these systems and for compatibility purposes, iGuard also supports conventional interfaces including Wiegand, RS-485 & RS-232.

STEP 1 Enter Employee ID

STEP 2 Place the thumb on the sensor

STEP 3 The door is unlocked if authenticated

How it works as an Access Control System


iGuard analyzes & compares a persons fingerprint against the previously enrolled record. If the two fingerprints match, the person is authenticated. And if the time is within the authorized period for entry, the device will signal release the electric door lock. The iGuard Security System analyzes and compares a persons fingerprint against the previously enrolled record. If the two fingerprints match, the person is authenticated. And if the time is within the authorized period for entry, the device will signal and release the electric door lock. Access Time restriction - you can define the authorized time for each individual or for a group of individuals. Terminal restriction - you can specify who has the rights to access a particular terminal. It is useful in
8

a multi-device environment, where multiple doors are controlled by different devices. Password/Fingerprint Access - you can define the period in which password can be used instead of fingerprint for access. This is particularly useful if you want to just use password to access during normal office hours, but to restrict the access to authorized people only after office hours. The Access Control Mode controls the employees from entering the business premises. The system controls the electronic door strike to lock / unlock the door. Users can be assigned to different departments and the authorized time for members in each department can also be controlled. In a multi-device environment, the access rights for each department in accessing different terminals can also be assigned.

How it works - as a Time Attendance System


When configured as a Time Attendance System, a user can specify whether he/she is clocking-in or clockingout. By using fingerprints to determine identity, buddy-punching problems can be totally eliminated as well as other fraud. Attendance of each employee is printed on the attendance report. The attendance report is particularly useful for payroll purposes. Wages and salaries can be paid according to the employees worked hours, overtime etc. Wages and salaries can be integrated with a smart card or automatic deposit payroll system.

FP = Fingerprint Only iGuard SC = Smart Card Only iGuard FSC = Fingerprint and Smartcard iGuard iGuard Power and Strike Units iGuard Network Appliance Power Options

Overview
The AL400ULX power supply converts a 115VAC / 60Hz input, to a 4 amp of continuous supply current @ 12VDC or 3 amp of continuous supply current at 24VDC power limited output, (see specifications).

How it works
Main iGuard Time/ Attendance iGuard Working Area

Entrance Door

(Access to designated personnel only)

Secure Area

High Secure Area


(Access to designated personnel only)

Access Log Report

Smartcards for iGuard readers

Technical Specifications
RF contactless operates at 13.56 MHz Standard NXP Mifare Card 1K bytes,15 sectors, 48 bytes each R/W is protected by encryption key, 48 bit triple DES Raw data is scrambled by 64 bit DES. High Security, suitable for all applications. Free sectors can be reserved for multiple any purposes Print your own brand on this card

iGuard Technical Specifications:


FP / SC / FSC Power Fingerprint Sensor Contactless Smart Card reader writer (builtin) Web and Database Server Network Security (SSL) 12VDC, 600mA Yes / n/a / Yes n/a / Yes/ Yes Built-in Optional Super Master 12VDC, 800mA n/a n/a

Auto Data Synchronization (i.e., master / slave configuration) Yes Maximum Transaction Records stored Static / Dynamic IP Assignment Non-volatile memory Computer Supported (with Internet Browser) Valid Characters for Employee ID Display LCD Multi-Lingual Two Finger Enrollment Fingerprint Sensor Type Fingerprint Sensor Resolution Fingerprint Sensor scan area (mm) Image Capture Time Verification Time False Rejection Rate False Acceptance Rate Auto-match Count Network Protocol Network Interface Real Time Clock 10,000 Yes(Support existing DHCP Server) 16MB Macintosh, Windows 95/98/NT/ME/XP , Linux and Unix Machine 0-9, A-B(maximum - 8 characters 20 x 2 LCD with Backlight Yes Yes Capacitive 500dpi 12 x 15 < sec. < 1 sec. <1% < 0.01% 30 TCP/IP , Wiegand, RS485, RS232 (Optional) Ethernet (100-Base T) Last for approx. 2 days without power Door Strike Open-Door Switch Break-in Alarm Door Status 105(W) x 38(D) x 150(H) n/a n/a n/a n/a n/a n/a n/a n/a n/a n/a 20,000

External Controls Dimension (mm)

n/a 254(W) x 193

AVI-SC 509

AVI-TEC SC Series is a core RFID Access Control & Time Attendance system
SC Series is an import proximity T&A and A&C system, as it adopts proximity communication PSK and encrypt professional proximity card to check ID, which is much safer and more credible than those without encrypt proximity cards. Recheck the 5 PIN inputted by card holder, which is a senior and safe equipment, achieve the professional management of automatic and modern C&A and T&A. In the operation process, SC Series could offer 3 different manners. The first one is the most convenient one--use proximity card directly; the second way is to use both card and 5 No.s code, which is the most precise one; the third way is the most simplest--use 1-5 No.s code.
10

When the user is threaten to open the door, a kind of intimidating card or code could be used to output a soundless alarm signal through auto-dial machine which was connected with the alarm system. The anti-pass function is optional, which can prevent those person who has no authorization but through following others enter the room. SC Series input and output interface could be used for linking other exterior system accessories.

System Specification:
User Capacity: 30000; Transaction Capacity: 50000 With 10 cm Proximity Reader and LCD inside Standalone or contacted PC with RS232 or RS485 or TCP/IP Download records with U-Disk Identification: Standalone proximity card, proximity+5 bits code, 1 to 5 bits PIN number. Users can set up threatened alarm and code by themselves. Access Control: 50 Time Zone, 5Grouping, 10 Combination, support many fingerprint access. Operated in night with 16 bits backlight keyboard. Authentication: UL, CE, FCC, MIC The Hardware Design adopts international fashionable POE, applying professional anti-static and anti-jamming protection. All input/output are designed with over-voltage & circuit protection, illegal-dismantle alarm & professional alarm system, voltage control & compliable surveillance system. Besides, its completely waterproof. All these advantages make an excellent performance.

Technical Specification
Card Holders Transaction Capacity CPU Hardware Aceess Mode Read Range I/O Interface Baud Rate Ethernet Wiegand I/O USB Access Control Function LCD Panel Keypad Audio Visual Indicator Housing Material Power Requirement Operating Temperature Optional 30000 cards 50000 records 64bit ZK6001 Microprocessor ZEM500(Embedded Linux O/S) Card Only, PIN Only, Card+PIN 10-15 cm RS232/485 9600-115Kbps programmable 10/100M any bit Mini-USB 2.0 port 50time zones, 5groups, 10open door conbination, supports multi-users enter. TTL for connecting to lock, door sensor, exit button, alarm LCD Panel: 4 line, 16 character each line(User name, ID number, time, date, states) 4*4 metal keypad with 4 function keys Red LED(Access denied)/ Green LED(Access granted) with Audible Beep ABS Power Requirement: 12V DC, 400mA 12V DC, 400mA 0C-45C Operating Humidity: 20%-80% Webserver, Antipass-back, Multi-language display
11

AVI-FP-ID-510
Features:

AVI-TEC Fingerprint based Time Attendance & Access Control Systems:


Simple and durable device with a robust inbuilt optical scanner Records up to 50000 transaction records User Capacity - 1500 identities Free SDK Available for Software Customization Supports multiple companies of one organization at a single location Supports one company at multiple locations. Supports multiple input units installed for one company. Company Rules, Time Management Parameters can be easily customized on the device Easy to manage Employees, Departments and Multiple Shifts Supports leave management Flexibility of Reports generated by the Software - Daily Attendance Statistics Report, Attendance General Report, Staff On- Duty/Off Duty Report Department Attendance Report, etc. Data available in excel/html/ASCII format for further calculation

Seamless integration with various Accounting and Payroll Packages

Technical Specifications:
Hardware platform Operating system User capacity Transaction capacity Sensor Algorithm version Access Control Communicational Keyboard and Display Power Identification speed FRR FAR Temperature operating Humidity operating Language Standard Optional ZEM500 Linux 1500 50000 ZK Sensor 2007 Version ZK new algorithm 50 Time Zone, 5 Grouping, 10 Combination, Holiday Management, support many fingerprints access, support standalone work TCP/IP or RS232 and RS485 LCD with 80 character and figure keypad 12 V < =2 seconds <=1% <=0.0001% 0 degree centigrade - 45 degree centigrade 20%-80% Simplified Chinese, Traditional Chinese, English, Other Languages Wire Doorbell, Wiegand OUT, Wiegand IN ID/HID/Mifare card, Web server, USB host, Short message, Work code, RIS, Antipass-back

12

Benefits:
Built in strong U.S.A Intel32bit fingerprint embedded standalone module (ZEM100),it is easy to integrate with various systems Support finger 360 degree identification, easy to use. Sensor window cotton improving image quality, accepts dry, wet fingers CMOS automated exposure and intelligent compensation improved image quality. Adjusting image distortion, assure fingerprint matching consistency Suggesting customers cooperating as ODM or OEM, providing system analysis, mould-making, circuit design, producing-assembly, package design, etc, linear service

BioLook

Face Recognition Solution

Features:
Simultaneous multiple face processing. BioLook performs fast and accurate detection of multiple faces in live video streams and still images. All faces on the current frame are detected in 0.07 sec. and then each face is processed in 0.13 sec. Live face detection. A conventional face identification system can be easily cheated by placing a photo of another person in front of a camera. BioLook is able to prevent this kind of security breach by determining whether a face in a video stream belongs to a real human or is a photo. Face image quality determination. A quality threshold can be used during face enrolment to ensure that only the best quality face template will be stored into database. Tolerance to face posture. BIOLOOK has certain tolerance to face posture that assures face enrolment convenience: rotation of a head can be up to 10 degrees from frontal in each direction (nodded up/down, rotated left/right, tilted left/right). Multiple samples of the same face. Biometric template record can contain multiple face samples belonging to the same person. These samples can be enrolled with different face postures and expressions, from different sources and in different time thus allowing to improve matching quality. Identification capability. BIOLOOK functions can be used in 1-to-1 matching (verification), as well as 1-to-many mode (identification).

BioLook algorithm Technical Specifications


Recommended minimal image size Multiple faces detection time (using 640 x 480 image) Single face processing time (after detecting all faces) Matching speed Size of one record in the database Maximum database size 0.13 sec. 100,000 faces/sec. 2.3 Kbytes unlimited 0.07 sec. 640 x 480 pixels

13

Fast face matching. The BIOLOOK 3.2 face template matching algorithm compares 100,000 faces per second.* Compact face features template. A face features template occupies only 2.3 Kilobytes, thus BIOLOOK-based applications can handle large face databases. Features generalization mode. This mode generates the collection of the generalized face features from several images of the same subject.

Then, each face image is processed, features are extracted, and the collections of features are analyzed and combined into a single generalized features collection, which is written to the database. This way, the enrolled feature template is more reliable and the face recognition quality increases considerably.

RFID and Mifare Cards for Time Attendance & Access Control Devices

Technical Specifications
Frequency 125 kHz / 13.56 MHz EM Marin : EM4102 EM4450 / Mifare: Ultralight, Mini, Classic, Desfire I-Code: SL1, SLI NXP (Philips) : Hitag 1, 2, S Infineon : Mifare: NRG Atmel : Temic 5557, 5567 Legic : Prime: MIM256, MIM1024 Advant: ATC128, ATC256, ATC512, ATC1024, ATC2048, ATC4096

TimeTracker

Time Attendance/Payroll & HRMS Software:

Feature to upload company logo and Name to be shown in all report formats

Shift Management
Create multiple shifts per branch per day Configure late arrival and overtime calculations Manage Lunch and Tea breaks timings. System can manage both day and night shifts in 24 hours rotation. Provision of Straight / Split Shifts

Holidays and Leave Management


Manage the information of all allowed HOLIDAYS per year. Manage Leave Applications, their approval or rejection status Assign allowed leaves and unpaid leaves will be deducted from salary

Software versions Available for below Hardware Devices. 1. AVI-TEC Biometric and RFID Devices 2. ZK Software Biometric and RFID Devices 3. iGuard TM Biometric and Smartcard Devices

Employee Management
Manage all details of each employee per department along with Photo upload feature Assign Shifts so created to employees and Departments Manage Employee Transfer / Resignation Search Engine for all data of Employees.

User Management
Make multiple users per company/branch/ department/shift User Access Rights Configuration for Data Safety and Software Access Control Creation of Admin. User and Normal users in Software.

Payroll Configuration
Manage Allowances and Deductions Bank Setup for Each Employee/Company/ Department

Company / Branch / Department Management


Manage data of multiple companies, branches and departments
14

Employee Salary Generation Maintain required details of Transaction Year Manage Allowances and Deductions Bank Setup for Each Employee/Company/ Department Employee Salary Generation Maintain required details of Transaction Year Generates TAX Forms. (completely customizable if Applicable) Generates Documents handling & Expiry Passport, Visa, Heath, Insurance Cards etc. Automatic Gratuity and PF calculations based on different country Labor laws and regulations.

Contractor Management
Manage Data of Contractors and details of contract signed Manages count of number of workers coming daily on work

Monthly Analytical Reports


Monthly Attendance Summary Employee Summary Report Individual Employee Monthly Attendance Report Individual Department Monthly Attendance Report Detail Present Report with total overtime calculations

Machine Configuration
Active Monitoring - watch details of employee entering / exiting office directly on your screen Manage multiple machines in one TA software

Payroll Reports
Salary Package Report Permanent Employee Monthly Salary Report Monthly Salary Report of employees on Contract Bonus Details Report Bonus Summary Report Generation of Lateness and Absentees MEMO. Generation of Salary Slip in prescribed format. Overtime Report Payable Summary Payment of Wages and Tax Statement if applicable Allowances and Deductions Master Annual Leave Dues Per Employee Annual Air Ticket control per Employee Document Control with On-Screen, Reports, Email Alerts Online Alerts and reports on Screen/Email on Documents handling Expiry (Passport, Visa, Heath, Car Registration, Insurance Cards Etc.)

Manual Entry of Attendance


Manage attendance of employees who are out of office for office work by manual entry Manage employee tour details

Daily Analytical Reports


Daily Attendance Report Early Arrival Report Late Arrival Report Early Departure Report Overtime Report Daily Absence Report

Master Reports
Company / Branch / Department Shift Master Report Holiday and Leave Report

OUR PROJECTS SPEAK FOR ITSELF... ITS EASY TO SEE WHY?

Total Automation

15

www.avi-infosys.com

IT

S olutions

Cer t

9001:2008

ISO

ro

vid

INTERNATIONAL OPERATIONS

er

U.A.E TOLL FREE 800 AVI (800-284)


Master Suite B # 1203, Pent House Office Bel Rasheed Twin Towers, Al Quasis- III Damuscus Street PO BOX: 26813 Dubai, United Arab Emirates

Tel : 04 258 8260 Fax : 04 2588270 Email : info@avi-infosys.com Web : www.avi-infosys.com

You might also like