Administrative and financial sector
ELECTRONIC DOCUMENT WORKFLOW
Introducing a barcode to mark documents makes it possible to unambiguously identify a particular letter and the people directly connected with it. Documents are one of the basic information carriers in companies, offices, institutions, etc. Exchanged with contractors and used inside the organization, they take part in almost all business processes. The efficiency of their management determines such factors of competitive advantage as: efficiency of business processes, quality of cooperation with contractors or relations with employees. For the vast majority of companies, the circulation of documents is a critical factor of effective operation - as stated by 8 out of 10 managing companies. Electronic circulation of "papers" would not be possible without the use of barcodes. Each document containing a barcode can be easily controlled by a well-coupled IT system and Auto ID devices, such as barcode readers or label printers. One-dimensional (1D) and two-dimensional (2D) codes are used to label documents.
BENEFITS:
- greater work efficiency,
- higher quality of customer service,
- linking a physical document to its electronic counterpart.
The barcode is a unique identifier that contains information about the path a document has taken from the office to the archive and where it is currently located in the archive. If a document goes missing, it is easy to find out who was last in possession of it. One-dimensional barcode only allows you to mark the document, all the data is in the corresponding database record. Two-dimensional codes are more advanced, because they allow you to save information in the code itself - up to 3 500 characters. Thanks to that, at a low cost, you can efficiently mark every external and internal document and check who, when and from which computer printed it. There is also space in the code for data from the document itself, e.g. information from the invoice or application. This allows you to easily restore a document that has been partially destroyed. We can also transfer it to a separate document workflow system, e.g. belonging to another organization. Using 2D codes increases information security, reduces unnecessary printouts (each copy points to the person who printed it) and increases work flexibility.
AUTOMATIC DATA ENTRY ID
Modern Auto ID technology is nowadays not only marking and identification of goods or documents. It is also full automation of data entry into the systems. And all this thanks to OCR technology and devices based on it. No more laborious retyping of data on the keyboard! No more typos in names and addresses!
BENEFITS:
- efficient data entry,
- the completeness of the data in the system,
- error elimination.
OCR (Optical Character Recognition) technology, enables scanned text to be converted into digital form. A neural network-based system reads both OCR and non-OCR (VIZ zone) content from any document, such as an ID card, passport, driver's license, etc. The text recognition uses software that works with images transmitted from scanners and digital cameras. OCR readers detect fake documents, read 1D and 2D codes, decode data from proximity cards, biometric passports or process cards. In just a few seconds we enter all the necessary data from the identity document. Installed in kiosks, they create a self-service point for filling in applications, forms, concluding insurance policies - from entering name and surname into the system to filling in entire forms. With one implementation we eliminate errors in the database and speed up our process. It is an ideal solution wherever data of supplicants is collected: airports, offices, hospitals, clinics, company reception desks.
INSTANT CARD ISSUANCE
Customers' expectations are constantly increasing, not only in terms of quality and price of service, but also in terms of delivery time. Customers are reluctant to wait for a new payment or loyalty card, especially when the previous one has been lost or destroyed and they have no access to their funds or privileges. Modern solutions based on Auto ID devices allow you to streamline the customer service process of issuing cards. Small size printers allow on-the-spot card personalization, so the customer can use the card within minutes after signing the agreement or blocking the old card. In addition to customer satisfaction, it's also a way to reduce administrative costs, especially when renewing old cards and sending them by traditional mail.
ACCESS CONTROL
Identification and access control systems are becoming essential in every company or institution. They enable limiting access to chosen rooms or zones to unauthorized persons. These systems are available in three groups, where authorization takes place by means of:
- Something you know - a PIN, a password,
- Something you have - a plastic card, a token, a key,
- Something that sets you apart - a biometric trait.
BENEFITS:
- total control of access to a building or its part,
- the possibility of assigning rights to employees and access to particular rooms,
- increased security - protecting information, property and people,
- possibility of integration with other systems - time registration, computer logging.
The system can operate on the basis of proximity elements (e.g. cards, pendants), in the memory of which a unique serial number is coded. After approaching e.g. a card to the reader, the device decodes its number thus identifying the cardholder. A plastic card may also serve as an ID with printed data or a photo of the user. It has additional forms of protection against forgery, such as holograms or UV printing. Card printers, such as Entrust CR805 - a high-end device for retransfer printing - can be used to print cards and apply individual protective elements. Biometric systems may be based on recognition of fingerprints, hand geometry or iris characteristics. They are currently the safest and most convenient tool for authentication. They eliminate the risk of forgetting the password, PIN and loss or even theft of cards or access control tokens. On the other hand, the disadvantage of this solution is the question of storage of biometric data of individual employees. For this reason, the most popular solution is still the classic coded cards.
ELECTRONIC INVENTORY
Identification of individual assets with the automatic method uses marking and reading with bar codes and RFID tags. The data identified by the readers and terminals are processed by software cooperating with databases. Each fixed asset, as well as all elements of equipment subject to recording have a unique inventory number.
BENEFITS:
- control of capital assets,
- Better management of the institution's fixed assets,
- efficient inventory process.
Due to the required resistance of the inventory label to abrasion and cleaning, vinyl labels and resin ribbons are most often used. In order to enable automatic inventory - the inventory number is encoded in the form of a barcode, which is read by laser readers in a fraction of a second. The stocktaking process consists of reading and memorizing barcodes by a mobile terminal, and then, after sending this information to the system, comparing it with the inventory of fixed assets or the accounting balance of the warehouse.
SECURE WIRELESS NETWORKS
Wireless, convenient access to the corporate network and the Internet is nowadays a key condition for the efficient operation of any institution. In banks, offices and other places where "sensitive" data is transmitted via the network, it becomes particularly important not only that the network is available without interruption at any point of the building, but above all that it is secure and resistant to attacks both from the outside and from the inside. The solution is a wireless network design based on a central controller and dependent access points controlled by it. This streamlines network configuration and diagnostics, while automatic reporting keeps track of all potential threats. The solutions offered by Koncept-L are among the most modern on the market. The systems detect both attempts to enter the network from the outside and foreign access points within it. They can automatically respond to threats, eliminating them by remotely disconnecting the client or hostile access point. The points themselves, which are also sensors, constantly listen to the network and report suspicious activity. A system of self-diagnostics regulates the signal strength of individual devices so that they do not jam each other and cover the entire desired area with stable coverage.
BENEFITS:
- stability of network access,
- security: PCI certification support,
- automatic detection functions,
- management convenience,
- automatic reports.