TABLE OF CON
TE
N
TS
TA
BLE OF
CON
TENT
S
TABLE OF CONTENTS
TABL
E OF
CON
TEN
TS
TABLE OF CONTENTS
TA
BLE OF
CONT
ENT
S
–
Table of contents
DOCUMENT SSE-0000077399-01 - V
TOC • 3
2. Access control by authentication . . . . . . . 45
Authentication with templates on a contactless card . . . . . 46
Authentication with template in local database and user ID on contactless card . 47
Authentication based on contactless card mode
50
Bypassing the biometric control in authentication . . . . . 51
Multi-factor mode . . . . . . . . . . 53
1. Proxy mode (or slave) presentation . . . . . . . 57
2. Proxy mode activation . . . . . . . . . 58
1. Setting up recognition mode . . . . . . . . 61
Two attempts mode . . . . . . . . . . 61
Parameters . . . . . . . . . . . 61
2. Setting up matching threshold . . . . . . . . 63
3. Relay activation . . . . . . . . . . 64
Relay external activation . . . . . . . . . 64
4. LED IN feature . . . . . . . . . . 66
5. Access request log file . . . . . . . . . 68
6. Remote messages: sending the User ID to the central security controller . . . 69
Presentation . . . . . . . . . . . 69
Supported protocols . . . . . . . . . . 70
Note about terminal clock deviation . . . . . . . 70
7. Anti-tamper and anti-pulling switches . . . . . . . 71
Description . . . . . . . . . . . 71
Configuration keys . . . . . . . . . . 72
Summary of Contents for MorphoAccess J-Bio
Page 13: ...SECTION 1 INTRODUCTION...
Page 19: ...SECTION 2 TERMINAL PRESENTATION...
Page 25: ...SECTION 3 TERMINAL CONFIGURATION...
Page 39: ...SECTION 4 STAND ALONE MODES NETWORKED OR NOT...
Page 49: ...SECTION 5 ACCESS CONTROL BY IDENTIFICATION...
Page 53: ...SECTION 6 ACCESS CONTROL BY AUTHENTIFICATION...
Page 67: ...SECTION 7 PROXY MODE...
Page 71: ...SECTION 8 TERMINAL CUSTOMIZATION...
Page 89: ...SECTION 9 MAN MACHINE INTERFACE...
Page 103: ...SECTION 10 APPENDIX...
Page 115: ...SECTION 11 SUPPORT...