DOCUMENT SSE-0000077399-01 - V
39
–
Access control by identification
A
CC
ES
S
CO
NTR
O
L
BY
ID
ENTI
FICA
TIO
N
A
CCE
SS
CO
NT
RO
L
BY
IDEN
TIFIC
ATI
ON
A
CC
ESS
CO
NTR
OL
BY
ID
ENTI
FI
CA
TIO
N
A
CCE
SS
CO
N
TR
O
L
BY
IDEN
TIFIC
ATI
ON
A
CC
ESS
CO
NTRO
L
BY
IDE
NTI
FI
CA
TIO
N
A
CC
ES
S
CO
NT
ROL
BY
IDE
N
TI
FI
C
A
TI
O
N
1. Access control by identification
To configure the MorphoAccess
®
in this mode, set the parameter app/bio ctrl/
identification to 1.
After start-up, the MorphoAccess
®
waits for fingerprint detection. The sensor
is lighted on.
The user places a finger on the sensor to start identification process.
If the identification is successful, the terminal triggers the relay or returns the
corresponding User ID to central security controller.
The user ID can be sent through various interfaces. Please refer to
MorphoAccess
®
Remote Messages Specification
for a complete description of
"hit" and "no hit" messages.
Result is returned to the user by a light and audible signal.
Once the user identification is done, the terminal automatically loops back and
waits for a new finger.
At least one user (biometric template) must be stored in the local database. The
reminal can store 500 users with 2 fingerprints each and 3,000 users with a MA
3K USERS licence.
If the terminal is running in identification mode with an empty database, the
sensor is off and the led flashes «yellow» (please refer to
Section).
Identification mode activation
app/bio ctrl/identification 1
Summary of Contents for MorphoAccess J-Bio
Page 13: ...SECTION 1 INTRODUCTION...
Page 19: ...SECTION 2 TERMINAL PRESENTATION...
Page 25: ...SECTION 3 TERMINAL CONFIGURATION...
Page 39: ...SECTION 4 STAND ALONE MODES NETWORKED OR NOT...
Page 49: ...SECTION 5 ACCESS CONTROL BY IDENTIFICATION...
Page 53: ...SECTION 6 ACCESS CONTROL BY AUTHENTIFICATION...
Page 67: ...SECTION 7 PROXY MODE...
Page 71: ...SECTION 8 TERMINAL CUSTOMIZATION...
Page 89: ...SECTION 9 MAN MACHINE INTERFACE...
Page 103: ...SECTION 10 APPENDIX...
Page 115: ...SECTION 11 SUPPORT...