Sagem Securite MorphoAccess J-Bio User Manual

Sagem Securite MorphoAccess J-Bio User Manual

Automatic fingerprint recognition terminal, j series
Table of Contents

Advertisement

M
A
® J S
ORPHO
CCESS
ERIES
U
G
SER
UIDE
DOCUMENT SSE-0000077399-01 - Version 1.0 - May 2010
Copyright© 2010
Sagem Sécurité
Osny, France
Sagem Sécurité Document - Reproduction and Disclosure Prohibited

Advertisement

Table of Contents
loading

Summary of Contents for Sagem Securite MorphoAccess J-Bio

  • Page 1 ® J S ORPHO CCESS ERIES UIDE DOCUMENT SSE-0000077399-01 - Version 1.0 - May 2010 Copyright© 2010 Sagem Sécurité Osny, France Sagem Sécurité Document - Reproduction and Disclosure Prohibited...
  • Page 2 Warning ® J S – User Guide ORPHO CCESS ERIES Warning Copyright© 2010, Sagem Sécurité. All rights reserved. Information in this document is subject to change without notice and do not represent a commitment on the part of Sagem Sécurité. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying or recording, for any purpose without the express written permission of Sagem Sécurité.
  • Page 3: Revision History

    ® J S – User Guide Revision History ORPHO CCESS ERIES Revision History This Document table contains the history of changes made to this document. Version Date Document Revision History ® May 2010 Creation of MorphoAccess J Series User Guide DOCUMENT SSE-0000077399-01 - V 1.0 - M 2010...
  • Page 4 Revision History ® J S – User Guide ORPHO CCESS ERIES REV • 2 DOCUMENT SSE-0000077399-01 - V 1.0 - M 2010 ERSION AGEM ÉCURITÉ OCUMENT EPRODUCTION AND ISCLOSURE ROHIBITED...
  • Page 5: Table Of Contents

    ® J S – User Guide Table of contents ORPHO CCESS ERIES Table of contents Section 1 Introduction Scope of the document . 2. Safety instructions Europe information . USA information Section 2 Terminal presentation Interfaces presentation . User interface . Power supply interface (see figures 2 and 3) Administration interface (see figures 2 and 3) Access control devices and systems interface (see figure 2)
  • Page 6 Table of contents ® J S – User Guide ORPHO CCESS ERIES ® 4. Configuring a networked MorphoAccess . 20 Introduction Network factory settings Date/Time settings SSL securing Modifying a configuration key using "configuration tool" . Network Wi-Fi™ configuration 5. Upgrading the firmware .
  • Page 7 ® J S – User Guide Table of contents ORPHO CCESS ERIES 2. Access control by authentication Authentication with templates on a contactless card Authentication with template in local database and user ID on contactless card Authentication based on contactless card mode . Bypassing the biometric control in authentication Multi-factor mode Section 7...
  • Page 8 Table of contents ® J S – User Guide ORPHO CCESS ERIES Section 9 Man Machine Interface Convention . . 79 2. Identification - Waiting for a finger on the sensor . 80 3. Authentification - waiting for user's contactless card .
  • Page 9 ® J S – User Guide Table of contents ORPHO CCESS ERIES Section 11 Support Customer service Hotline DOCUMENT SSE-0000077399-01 - V 1.0 - M 2010 TOC • 5 ERSION AGEM ÉCURITÉ OCUMENT EPRODUCTION AND ISCLOSURE ROHIBITED...
  • Page 10 Table of contents ® J S – User Guide ORPHO CCESS ERIES TOC • 6 DOCUMENT SSE-0000077399-01 - V 1.0 - M 2010 ERSION AGEM ÉCURITÉ OCUMENT EPRODUCTION AND ISCLOSURE ROHIBITED...
  • Page 11 ® J S – User Guide List of figures ORPHO CCESS ERIES List of figures ® Figure 2 • 1 : MorphoAccess J Series front view . ® Figure 2 • 2 : MorphoAccess J Series rear view (connectors) ® Figure 2 •...
  • Page 12 List of figures ® J S – User Guide ORPHO CCESS ERIES LOF • 2 DOCUMENT SSE-0000077399-01 - V 1.0 - M 2010 ERSION AGEM ÉCURITÉ OCUMENT EPRODUCTION AND ISCLOSURE ROHIBITED...
  • Page 13 E C T I O N NTR OD U CTI ON...
  • Page 14 ® J S – User Guide ORPHO CCESS ERIES ® Congratulations for choosing a MorphoAccess J Series Automatic Fingerprint Recognition Terminal. ® MorphoAccess J Series provides an innovative and effective solution for access control applications using Fingerprint Verification or/and Identification. Among a range of alternative biometric technologies, the use of finger imaging has significant advantages: each finger constitutes an unalterable physical signature, developed before birth and preserved until death.
  • Page 15: Scope Of The Document

    ® J S – User Guide Scope of the document ORPHO CCESS ERIES 1. Scope of the document ® This guide deals with the use of the MorphoAccess J Series, which is made up of following list of products. Contactless Smartcard Reader ®...
  • Page 16: Safety Instructions

    Safety instructions ® J S – User Guide ORPHO CCESS ERIES 2. Safety instructions The installation of this product should be made by a qualified service Person and should comply with all local regulations. It is strongly recommended to use a class II power supply at 12V ±5% and 0.5A.
  • Page 17 ® J S – User Guide Safety instructions ORPHO CCESS ERIES NOTE This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
  • Page 18 Safety instructions ® J S – User Guide ORPHO CCESS ERIES DOCUMENT SSE-0000077399-01 - V 1.0 - M 2010 ERSION AGEM ÉCURITÉ OCUMENT EPRODUCTION AND ISCLOSURE ROHIBITED...
  • Page 19 E C T I O N E R MI NAL P R E S E NTAT I ON...
  • Page 20 ® J S – User Guide ORPHO CCESS ERIES DOCUMENT SSE-0000077399-01 - V 1.0 - M 2010 ERSION AGEM ÉCURITÉ OCUMENT EPRODUCTION AND ISCLOSURE ROHIBITED...
  • Page 21: Interfaces Presentation

    ® J S – User Guide Interfaces presentation ORPHO CCESS ERIES 1. Interfaces presentation User interface ® Figure 2 • 1: MorphoAccess J Series front view ® The MorphoAccess J Series terminals offer a simple and ergonomic man- machine interface dedicated to access control based on fingerprint recognition: •...
  • Page 22: Power Supply Interface (See Figures 2 And 3)

    Interfaces presentation ® J S – User Guide ORPHO CCESS ERIES Power supply interface (see figures 2 • 2 and 2 • 3) The terminal can be powered by two different ways: • Either by the two wires +12V DC/GND (11) •...
  • Page 23 ® J S – User Guide Interfaces presentation ORPHO CCESS ERIES DataClock / RS485 (5) • two LED IN inputs (one for access granted, one for access denied), in an Access Control System (6) • a relay switch to directly command a physical device such as a door lock (7), •...
  • Page 24: Figure 2 • 3: Morphoaccess

    Interfaces presentation ® J S – User Guide ORPHO CCESS ERIES ® Figure 2 • 3: MorphoAccess J Series with a USB mass storage key ® Figure 2 • 4: MorphoAccess J Series with a Wi-Fi adapter ® The MorphoAccess J Series Installation Guide describes precisely each interface and connection procedure.
  • Page 25 E C T I O N E R MI NAL C ONF I GU R AT I ON...
  • Page 26 ® J S – User Guide ORPHO CCESS ERIES ® This chapter details how to configure the MorphoAccess J Series terminal. A parameter can be changed directly (using a USB mass storage key) on the terminal or remotely through a network. DOCUMENT SSE-0000077399-01 - V 1.0 - M 2010...
  • Page 27: Setting Up The Terminal Ip Address

    ® J S – User Guide Setting up the terminal IP address ORPHO CCESS ERIES 1. Setting up the terminal IP address ® The MorphoAccess J Series terminal can run in stand alone mode but a TCP/ IP connection is required to download records in the terminal and to configure its recognition mode.
  • Page 28: Configuring A Standalone Morphoaccess

    Configuring a standalone MorphoAccess® ® J S – User Guide ORPHO CCESS ERIES 2. Configuring a standalone ® MorphoAccess "USB" key administration ® MorphoAccess J Series terminals have no keyboard, no screen. However it is possible to change TCP/IP parameters without connecting the terminal on a network.
  • Page 29: Principle

    ® J S – User Guide Configuring a standalone MorphoAccess® ORPHO CCESS ERIES Principle This feature is available to change network parameters (IP, address, mask and gateway). Store a file on a USB mass storage key The administrator creates a configuration file on a PC using the USB Network Configuration Tool.
  • Page 30: Understanding Morphoaccess Configuration Parameters Management

    Understanding MorphoAccess® configuration parameters management M ® J S – User Guide ORPHO CCESS ERIES ® 3. Understanding MorphoAccess configuration parameters management Presentation ® MorphoAccess parameters (also named "configuration keys") are stored into files organized in sections and values. For example a file named "app.cfg" contains all the parameters defining the main application settings.
  • Page 31: Modifying A Parameter

    ® J S – User Guide Understanding MorphoAccess® configuration parameters management ORPHO CCESS ERIES Modifying a parameter There is one way to modify a parameter: • remotely through Ethernet or Wi-Fi™ link, with a client application running on the Host System. Notation In this manual a parameter is presented using this formality: Short parameter description...
  • Page 32: Configuring A Networked Morphoaccess

    Configuring a networked MorphoAccess® ® J S – User Guide ORPHO CCESS ERIES 4. Configuring a networked ® MorphoAccess Introduction ® A PC (running with MEMS™ for example) connected to a MorphoAccess can manage the terminal. Some available remote operations are: •...
  • Page 33: Network Factory Settings

    ® J S – User Guide Configuring a networked MorphoAccess® ORPHO CCESS ERIES Then the client (the PC) can send biometric templates to the terminal and manage the local database. ® Please refer to MorphoAccess Host System Interface Specification for a complete description of remote administration command set.
  • Page 34: Network Wi-Fi™ Configuration

    Configuring a networked MorphoAccess® ® J S – User Guide ORPHO CCESS ERIES ® Figure 3 • 4: MorphoAccess configuration tool Network Wi-Fi™ configuration Wi-Fi™ connection is available under the following conditions: • a Sagem Sécurité Wi-Fi™ USB adapter must be plugged in the rear USB port of the terminal.
  • Page 35 ® J S – User Guide Configuring a networked MorphoAccess® ORPHO CCESS ERIES ® NOTE A MorphoAccess Wi-Fi™ Licence is mandatory. If the terminal is configured to use the Wi-Fi™ connection with the Wi-Fi™ USB adapter plugged in and if there is no ®...
  • Page 36: Upgrading The Firmware

    Upgrading the firmware ® J S – User Guide ORPHO CCESS ERIES 5. Upgrading the firmware ® It is possible to upgrade current MorphoAccess firmware through IP (Ethernet or Wi-Fi™). The firmware can be obtained on a CD/ROM package from factory, or downloaded from Sagem Sécurité...
  • Page 37: Downloading (Adding) A Licence

    ® J S – User Guide Downloading (adding) a licence ORPHO CCESS ERIES 6. Downloading (adding) a licence A licence unlocks additional features of the terminal. By default the ® MorphoAccess J Series can match a fingerprint against a database of 500 users.
  • Page 38 Downloading (adding) a licence ® J S – User Guide ORPHO CCESS ERIES DOCUMENT SSE-0000077399-01 - V 1.0 - M 2010 ERSION AGEM ÉCURITÉ OCUMENT EPRODUCTION AND ISCLOSURE ROHIBITED...
  • Page 39: Stand Alone Modes (Networked Or Not)

    E C T I O N T A N D ALONE M OD ES NE T WO R K ED O R N O T...
  • Page 40 ® J S – User Guide ORPHO CCESS ERIES ® The MorphoAccess J Series terminals works according to two biometric recognition modes: identification or authentication. Identification and authentication can be activated at the same time (multi-factor mode). DOCUMENT SSE-0000077399-01 - V 1.0 - M 2010 ERSION...
  • Page 41: Recognition Mode Synthesis

    ® J S – User Guide Recognition mode synthesis ORPHO CCESS ERIES 1. Recognition mode synthesis Figure 4 • 1: Recognition mode synthesis DOCUMENT SSE-0000077399-01 - V 1.0 - M 2010 ERSION AGEM ÉCURITÉ OCUMENT EPRODUCTION AND ISCLOSURE ROHIBITED...
  • Page 42: Adding A User's Record In The Database

    Adding a user’s record in the database ® J S – User Guide ORPHO CCESS ERIES 2. Adding a user’s record in the database ® The management of the MorphoAccess internal biometric database can be done remotely by a Host System. The user is enrolled on an Enrolment Station (typically a PC station with ®...
  • Page 43: Access Control Presentation

    ® J S – User Guide Access control presentation ORPHO CCESS ERIES 3. Access control presentation Typical access control system ® Typical architecture includes, at least one MorphoAccess , a Host System (for enrolment) and a Central Security Controller (for area access final check, and physical access command).
  • Page 44: Identification - Authentification

    Access control presentation ® J S – User Guide ORPHO CCESS ERIES Identification - authentification ® The MorphoAccess works according to two biometric recognition modes: identification and authentication. Identification and authentication can be activated at the same time (multi-factor mode). Identification (matching 1 versus N) In this mode, the user which requires the access, is unknown, and the terminal searches for its identity.
  • Page 45: Access Control Result Communication

    ® J S – User Guide Access control presentation ORPHO CCESS ERIES Authentification (1 versus 1) In that mode, the user provides his identity (his user identifier), and the terminal checks it.The captured fingerprint is compared with one or two reference templates associated to the user identifier provided before the fingerprint capture.
  • Page 46: Figure 4 • 6:Access Control Result

    Access control presentation ® J S – User Guide ORPHO CCESS ERIES Control result: • RS485 Central Access Controller • Wiegand • Dataclock • Ethernet or Wi-Fi Internal relay (UDP/TCP/SSL) Figure 4 • 6:Access control result Various messages or interfaces can be activated to send the control result: Relay ®...
  • Page 47: Proxy" Mode

    ® J S – User Guide Access control presentation ORPHO CCESS ERIES UDP/TCP User Id Emission The ID of the recognized user can be sent through the IP link (Ethernet or Wi-Fi ) using UDP or TCP protocol (unsecured TCP or SSL). The administrator may select the port adress.
  • Page 48: Figure 4 • 7:Proxy Mode

    Access control presentation ® J S – User Guide ORPHO CCESS ERIES This mode is used when the whole access right check process is fully monitored by an external device (such as a PC). It means that the local access control application of the terminal is not used, but only the biometric features (identification, authentification) and the user input/output features (the contactless card reader).
  • Page 49 E C T I O N C C E S S CONTR O L I D E N TI F I CAT I ON...
  • Page 50 ® J S – User Guide ORPHO CCESS ERIES This section only relates to terminals equipped with a contactless smartcard reader (see section Scope of the document). DOCUMENT SSE-0000077399-01 - V 1.0 - M 2010 ERSION AGEM ÉCURITÉ OCUMENT EPRODUCTION AND ISCLOSURE ROHIBITED...
  • Page 51: Access Control By Identification

    ® J S – User Guide Access control by identification ORPHO CCESS ERIES 1. Access control by identification Identification mode activation app/bio ctrl/identification ® To configure the MorphoAccess in this mode, set the parameter app/bio ctrl/ identification to 1. ® After start-up, the MorphoAccess waits for fingerprint detection.
  • Page 52 Access control by identification ® J S – User Guide ORPHO CCESS ERIES DOCUMENT SSE-0000077399-01 - V 1.0 - M 2010 ERSION AGEM ÉCURITÉ OCUMENT EPRODUCTION AND ISCLOSURE ROHIBITED...
  • Page 53 E C T I O N C C E S S C O NT R O L A U T H E N T I F I C A T I O N...
  • Page 54 ® J S – User Guide ORPHO CCESS ERIES DOCUMENT SSE-0000077399-01 - V 1.0 - M 2010 ERSION AGEM ÉCURITÉ OCUMENT EPRODUCTION AND ISCLOSURE ROHIBITED...
  • Page 55: Introduction To Authentication With Contacless Card

    ® J S – User Guide Introduction to authentication with contacless card ORPHO CCESS ERIES 1. Introduction to authentication with contacless card Selecting the type of contactless card to be supported ® ® ® On MorphoAccess J Series terminal equipped with a MIFARE /DESFire contactless smartcard reader (see section Scope of the document), the type of contactless smartcard enabled are defined by the following specific...
  • Page 56 Introduction to authentication with contacless card ® J S – User Guide ORPHO CCESS ERIES ® ® Recognition with MIFARE cards supposes that the user swipes a MIFARE card containing some structured data (identifier, biometric templates...). Data are localized on the card by a block ("B" parameter) and are protected by a key (defined by "C"...
  • Page 57: Access Control By Authentication

    ® J S – User Guide Access control by authentication ORPHO CCESS ERIES 2. Access control by authentication ® This section only applies to MorphoAccess J Series equipped with a ® ® MIFARE /DESFire contactless smartcard reader (see section Scope of the document).
  • Page 58: Authentication With Templates On A Contactless Card

    Access control by authentication ® J S – User Guide ORPHO CCESS ERIES Authentication with templates on a contactless card Authentication with templates (PK) on contactless card app/bio ctrl/authent PK contactless In this mode, each user's card contains his identifier and his fingerprints. The authentication process starts when the user presents his card in front of the terminal.
  • Page 59: Authentication With Template In Local Database And User Id On Contactless Card

    ® J S – User Guide Access control by authentication ORPHO CCESS ERIES Required tags on card Card BIOPIN Mode Authen PK contactless ® Card structure is described in MorphoAccess Contacless Card Specification. Authentication with template in local database and user ID on contactless card Authentication with templates (PK) on contactless local database...
  • Page 60: Figure 6 • 2: Authentication With User Id Only On The User's Card

    Access control by authentication ® J S – User Guide ORPHO CCESS ERIES User ID only Figure 6 • 2: Authentication with User ID only on the user's card If the user ID found on the user's card exists in the terminal database, then the optical sensor switches on, and the user is expected to place his finger on it.
  • Page 61 ® J S – User Guide Access control by authentication ORPHO CCESS ERIES This mode is also useful to use the card serial number as user’s identifier. Binary identifier, non-structured data app/contactless/data format 1 (binary data) Binary data are defined by their position from the first read block. User ID length is limited to 8 bytes (app/contactless/data length 8.0).
  • Page 62: Authentication Based On Contactless Card Mode

    Access control by authentication ® J S – User Guide ORPHO CCESS ERIES Example - reading 32-bits identifier in a complete Wiegand frame. The card contains at sector 15 a complete 37 bits Wiegand frame (including parity bits, site code). On this example a 32 bits identifier begins at bit four, parity bits are noted "P".
  • Page 63: Bypassing The Biometric Control In Authentication

    ® J S – User Guide Access control by authentication ORPHO CCESS ERIES To enable this mode set app/bio ctrl/authent card mode to 1. To disable this mode set app/bio ctrl/authent card mode to 0. Required tags on card if CARD MODE tag value is ID_ONLY (fingerprint check disabled). Card BIOPIN Mode...
  • Page 64: Card Reader

    Access control by authentication ® J S – User Guide ORPHO CCESS ERIES Required tags on card Card BIOPIN Mode bypass authenticati The terminal works only as a smart card reader ® When combined «authent PK contacless» the MorphoAccess always ®...
  • Page 65: Multi-Factor Mode

    ® J S – User Guide Access control by authentication ORPHO CCESS ERIES Multi-factor mode This mode is the combination of identification mode and contactless authentication modes. This mode allows: • running an identification if user places his finger on the sensor (operation identical to identification mode) •...
  • Page 66 Access control by authentication ® J S – User Guide ORPHO CCESS ERIES DOCUMENT SSE-0000077399-01 - V 1.0 - M 2010 ERSION AGEM ÉCURITÉ OCUMENT EPRODUCTION AND ISCLOSURE ROHIBITED...
  • Page 67: Proxy Mode

    E C T I O N R OXY O D E...
  • Page 68 ® J S – User Guide ORPHO CCESS ERIES DOCUMENT SSE-0000077399-01 - V 1.0 - M 2010 ERSION AGEM ÉCURITÉ OCUMENT EPRODUCTION AND ISCLOSURE ROHIBITED...
  • Page 69: Proxy Mode (Or Slave) Presentation

    ® J S – User Guide Proxy mode (or slave) presentation ORPHO CCESS ERIES 1. Proxy mode (or slave) presentation Proxy mode is an operating mode where the Host System performs the access control remotely. ® This operating mode allows to control the MorphoAccess remotely (the link is IP) using a set of biometric and databases management commands.
  • Page 70: Proxy Mode Activation

    Proxy mode activation ® J S – User Guide ORPHO CCESS ERIES 2. Proxy mode activation To enable the proxy, all identification and authentication modes must be disabled. It means that all controls must be turned off: the terminal becomes a slave of the host system (the access control application is running on the host system).
  • Page 71: Terminal Customization

    E C T I O N E R MI NAL U S TO MI ZAT I ON...
  • Page 72 ® J S – User Guide ORPHO CCESS ERIES DOCUMENT SSE-0000077399-01 - V 1.0 - M 2010 ERSION AGEM ÉCURITÉ OCUMENT EPRODUCTION AND ISCLOSURE ROHIBITED...
  • Page 73: Setting Up Recognition Mode

    ® J S – User Guide Setting up recognition mode ORPHO CCESS ERIES 1. Setting up recognition mode Two attempts mode If the recognition fails, it is possible to give a "second chance" to the user. In identification mode, if a bad finger is presented, the user has 5 seconds to present a finger again.
  • Page 74 Setting up recognition mode ® J S – User Guide ORPHO CCESS ERIES In authentication mode a finger presentation period can be defined. Setting up the authentication timeout app/bio ctrl/authent timeout 10 (1-60) DOCUMENT SSE-0000077399-01 - V 1.0 - M 2010 ERSION AGEM...
  • Page 75: Setting Up Matching Threshold

    ® J S – User Guide Setting up matching threshold ORPHO CCESS ERIES 2. Setting up matching threshold Setting up matching threshold bio/bio ctrl/matching th 3 (1-10) The performances of a biometric system are characterized by two quantities, the False Non Match Rate - FNMR - (also called False Reject Rate) and the False Match Rate - FMR - (also called False Acceptance Rate).
  • Page 76: Relay Activation

    Relay activation ® J S – User Guide ORPHO CCESS ERIES 3. Relay activation If the control is successful, a relay may be activated to directly control a door. Relay activation app/relay/enabled 1 (Enabled) The relay aperture time can be defined and is set by default to 3 seconds (i.e. 300).
  • Page 77: Figure 8 • 1: Internal Relay Activated By Led In

    ® J S – User Guide Relay activation ORPHO CCESS ERIES Figure 8 • 1: Internal relay activated by LED IN ® Typically the MorphoAccess relay controls the door. • To enter in the building the user must be successfully recognized by the ®...
  • Page 78: Led In Feature

    LED IN feature ® J S – User Guide ORPHO CCESS ERIES 4. LED IN feature When this feature is activated, the terminal waits for an acknowledge signal (LED IN) from a Central Access Controller system, before granting the access. Central Access Controller Relay activation LED 1 to GND: Access authorized (granted).
  • Page 79 ® J S – User Guide LED IN feature ORPHO CCESS ERIES When the CSC validates the control a timeout must be specified: it defines the ® time during which the MorphoAccess will wait for an acknowledgement signal from the CSC through LED IN signals. LED IN acknowledgement timeout in 10 ms app/led IN/controller ack timeout 0 to 268435455...
  • Page 80: Access Request Log File

    Access request log file ® J S – User Guide ORPHO CCESS ERIES 5. Access request log file ® MorphoAccess is logging its activities app/log file/enabled 1 (Enabled) The terminal can log all access requests in a internal log file. It creates a record per access request.
  • Page 81: Remote Messages: Sending The User Id To The Central Security Controller

    ® J S – User Guide Remote messages: sending the User ID to the central security controller ORPHO CCESS ERIES 6. Remote messages: sending the User ID to the central security controller ® After access control rights check, the MorphoAccess can export the result of the control to a Central Security Controller, and can also log the result in a local diary, or activate a physical device, such as a door electric lock.
  • Page 82: Supported Protocols

    Remote messages: sending the User ID to the central security controller ® J S – User Guide ORPHO CCESS ERIES ® The MorphoAccess Remote Messages Specification describes the different ® solutions offered by the MorphoAccess to dialog with a controller, and how to make use of them.
  • Page 83: Anti-Tamper And Anti-Pulling Switches

    ® J S – User Guide Anti-tamper and anti-pulling switches ORPHO CCESS ERIES 7. Anti-tamper and anti-pulling switches Description ® ® The MorphoAccess J Series, like the MorphoAccess 500 Series, is able to detect two kinds of unsual events: • the front glass is removed, by monitoring anti-tamper switches •...
  • Page 84: Configuration Keys

    Anti-tamper and anti-pulling switches ® J S – User Guide ORPHO CCESS ERIES Alarm message • Ethernet (UDP/TCP/SSL) • RS485 • Wiegand • Datadock • Wi-Fi (UDP/TCP/SSL) Figure 8 • 4: Tamper switch and anti-pulling switches Configuration keys To send an alarm on an output (Ethernet, RS485, Wiegand, Dataclock, Wi-Fi ), the corresponding interface must be activated otherwise no alarm will be sent.
  • Page 85 ® J S – User Guide Anti-tamper and anti-pulling switches ORPHO CCESS ERIES Tamper Alarm Level 0 (0 - 2) app/tamper alarm/level 0 Anti-pulling and anti-tamper switches ignored. 1 An alarm message is sent to the controller by the same channel as the access control result message (if enabled).
  • Page 86 Anti-tamper and anti-pulling switches ® J S – User Guide ORPHO CCESS ERIES Example 1: Send an alarm ID (62221) in Wiegand, and play sound warning, in case of intrusion detection. To send an alarm in Wiegand, the configuration key app/send ID wiegand/ enabled must be set to 1, and the configuration key app/tamper alarm/level must be set to 2 (alarm and buzzer).
  • Page 87: Setting Up Time Mask

    ® J S – User Guide Setting up time mask ORPHO CCESS ERIES 8. Setting up time mask When using MEMS™, a time mask feature is available. This mode enables the access according to its time mask. Time mask is defined by slots of 15 minutes over a week.
  • Page 88 Setting up time mask ® J S – User Guide ORPHO CCESS ERIES DOCUMENT SSE-0000077399-01 - V 1.0 - M 2010 ERSION AGEM ÉCURITÉ OCUMENT EPRODUCTION AND ISCLOSURE ROHIBITED...
  • Page 89 E C T I O N ACHI NE NTE R FACE...
  • Page 90 ® J S – User Guide ORPHO CCESS ERIES DOCUMENT SSE-0000077399-01 - V 1.0 - M 2010 ERSION AGEM ÉCURITÉ OCUMENT EPRODUCTION AND ISCLOSURE ROHIBITED...
  • Page 91: Convention

    ® J S – User Guide Convention ORPHO CCESS ERIES 1. Convention Intermittent "Pulse": led is 1 second OFF, 0.05 second ON. For example:. Intermittent blue "Pulse" Fast "Pulse": led flashes quickly. The rhythm is the same than when a hard drive works.
  • Page 92: Identification - Waiting For A Finger On The Sensor

    Identification - Waiting for a finger on the sensor ® J S – User Guide ORPHO CCESS ERIES 2. Identification - Waiting for a finger on the sensor Sensor DOCUMENT SSE-0000077399-01 - V 1.0 - M 2010 ERSION AGEM ÉCURITÉ OCUMENT EPRODUCTION AND ISCLOSURE...
  • Page 93: Authentification - Waiting For User's Contactless Card

    ® J S – User Guide Authentification - waiting for user's contactless card ORPHO CCESS ERIES 3. Authentification - waiting for user's contactless card Sensor ON "blue" DOCUMENT SSE-0000077399-01 - V 1.0 - M 2010 ERSION AGEM ÉCURITÉ OCUMENT EPRODUCTION AND ISCLOSURE ROHIBITED...
  • Page 94: Multi-Factor Mode - Waiting For User's Finger Or Contactless Card

    Multi-factor mode - waiting for user’s finger or contactless card ® J S – User Guide ORPHO CCESS ERIES 4. Multi-factor mode - waiting for user’s finger or contactless card Sensor ON "blue" DOCUMENT SSE-0000077399-01 - V 1.0 - M 2010 ERSION AGEM...
  • Page 95: Access Granted

    ® J S – User Guide Access granted ORPHO CCESS ERIES 5. Access granted The user is recognized and the access is allowed. Sensor Green 1 second Buzzer ON 0.1 second - High - pitched DOCUMENT SSE-0000077399-01 - V 1.0 - M 2010 ERSION AGEM...
  • Page 96: Access Denied

    Access denied ® J S – User Guide ORPHO CCESS ERIES 6. Access denied The user is not recognized, or the access is not allowed to this user (by Time Mask feature or by Central Access Controller). Sensor Red 1 second Buzzer ON 0.7 second - Low - pitched...
  • Page 97: Timeout While Waiting For Finger On The Sensor

    ® J S – User Guide Timeout while waiting for finger on the sensor ORPHO CCESS ERIES 7. Timeout while waiting for finger on the sensor Time-out occurs during the wait for a valid fingerprint on the sensor (authentication only). Sensor Red 1 second Buzzer...
  • Page 98: No Database Or Empty Database

    No database or empty database ® J S – User Guide ORPHO CCESS ERIES 8. No database or empty database The selected access control mode requires at least one record in the local database. Sensor Slow intermittent yellow «Pulse» DOCUMENT SSE-0000077399-01 - V 1.0 - M 2010 ERSION...
  • Page 99: Usb Mass Storage Key Can Be Removed

    ® J S – User Guide USB mass storage key can be removed ORPHO CCESS ERIES 9. USB mass storage key can be removed When a USB Mass Storage key is used to configure the terminal, and when the configuration process is completed, the USB Mass Storage key can be removed from the USB port.
  • Page 100: Terminal Maintenance

    Terminal maintenance ® J S – User Guide ORPHO CCESS ERIES 10. Terminal maintenance A configuration operation is in progress (biometric database update, configuration key value change, access request log file acquisition, etc…). Normal process will be available again as soon as the configuration operation is completed.
  • Page 101: Sensor Start Up Error

    ® J S – User Guide Sensor start up error ORPHO CCESS ERIES 11. Sensor start up error The terminal fails to start the biometric sensor. If the trouble persists after several terminal start-ups, please contact customer service. Sensor Slow intermittent red «Pulse»...
  • Page 102 Sensor start up error ® J S – User Guide ORPHO CCESS ERIES DOCUMENT SSE-0000077399-01 - V 1.0 - M 2010 ERSION AGEM ÉCURITÉ OCUMENT EPRODUCTION AND ISCLOSURE ROHIBITED...
  • Page 103 E C T I O N PPE N D I X...
  • Page 104 ® J S – User Guide ORPHO CCESS ERIES DOCUMENT SSE-0000077399-01 - V 1.0 - M 2010 ERSION AGEM ÉCURITÉ OCUMENT EPRODUCTION AND ISCLOSURE ROHIBITED...
  • Page 105: Morphoaccess

    ® ® J S – User Guide MorphoAccess 100 and 500 Series compatibility ORPHO CCESS ERIES ® 1. MorphoAccess 100 and 500 Series compatibility ® ® The MorphoAccess J Series is fully compatible with the MorphoAccess 100 and 500 Series devices. DOCUMENT SSE-0000077399-01 - V 1.0 - M 2010...
  • Page 106 ® MorphoAccess 100 and 500 Series compatibility ® J S – User Guide ORPHO CCESS ERIES DOCUMENT SSE-0000077399-01 - V 1.0 - M 2010 ERSION AGEM ÉCURITÉ OCUMENT EPRODUCTION AND ISCLOSURE ROHIBITED...
  • Page 107: Morphoaccess

    ® ® J S – User Guide MorphoAccess 200 and 300 Series compatibility ORPHO CCESS ERIES ® 2. MorphoAccess 200 and 300 Series compatibility ® This tables present parameters equivalence between MorphoAccess J Series ® and MorphoAccess 220 and 320 Series. ®...
  • Page 108 ® MorphoAccess 200 and 300 Series compatibility ® J S – User Guide ORPHO CCESS ERIES /cfg/Maccess/Admin/mode 5 app/bio ctrl/identification 1 (multi-factor mode) DOCUMENT SSE-0000077399-01 - V 1.0 - M 2010 ERSION AGEM ÉCURITÉ OCUMENT EPRODUCTION AND ISCLOSURE ROHIBITED...
  • Page 109: Contactless Card Modes Table

    ® J S – User Guide Contactless Card modes table ORPHO CCESS ERIES 3. Contactless Card modes table Authent Authent Authent Bypass Operations card authenti contactle contactle mode -fication Authentication with templates in database Read ID on contactless card. Retrieve corresponding templates in database. Biometric authentication using these templates.
  • Page 110 Contactless Card modes table ® J S – User Guide ORPHO CCESS ERIES Authent Authent Authent Bypass Operations card authenti contactle contactle mode -fication Authentication with templates on card - biometric control disabled Read ID on contactless card. Send ID. Card mode authentication - biometric control disabled Read card mode, ID, templates (if required by...
  • Page 111: Required Tags On User's Contactless Card

    ® J S – User Guide Required tags on User’s contactless card ORPHO CCESS ERIES 4. Required tags on User’s contactless card Card BIOPIN Operations Mode Authentication with templates in database Authentication with templates on card Card mode authentication (ID_ONLY) Card mode authentication (PKS) Authentication with templates in database - biometric control disabled...
  • Page 112: Troubleshooting

    Troubleshooting ® J S – User Guide ORPHO CCESS ERIES 5. Troubleshooting Terminal IP address is unknown or terminal is not reachable Use USB Network Tool to set a valid network address in your terminal. Refer to USB Network Tool User Guide. Sensor is off Verify that the base contents at least one record.
  • Page 113: Bibliography

    ® J S – User Guide Bibliography ORPHO CCESS ERIES 6. Bibliography The documents below are available on a CD/ROM package from factory or downloadable on our web site at www.biometric-terminals.com (login and password required). Administrator Information ® MorphoAccess J Series User Guide This document describes operating mode and terminal settings ®...
  • Page 114: Developer Information

    Bibliography ® J S – User Guide ORPHO CCESS ERIES Developer Information ® MorphoAccess Host Interface Specification A complete description of remote management commands ® MorphoAccess Remote Messages Specification ® Details how the MorphoAccess sends the access control result to a Central Security Controller ®...
  • Page 115 E C T I O N U PPOR T...
  • Page 116 ® J S – User Guide ORPHO CCESS ERIES DOCUMENT SSE-0000077399-01 - V 1.0 - M 2010 ERSION AGEM ÉCURITÉ OCUMENT EPRODUCTION AND ISCLOSURE ROHIBITED...
  • Page 117 ® J S – User Guide ORPHO CCESS ERIES Customer service Sagem Sécurité SAV Terminaux Biométriques Boulevard Lénine - BP428 76805 Saint Etienne du Rouvray FRANCE Phone: +33 2 35 64 55 05 Hotline Sagem Sécurité Support Terminaux Biométriques 18, Chaussée Jules César 95520 Osny FRANCE hotline.biometrics@t.my-technicalsupport.com...
  • Page 118 ® J S – User Guide ORPHO CCESS ERIES DOCUMENT SSE-0000077399-01 - V 1.0 - M 2010 ERSION AGEM ÉCURITÉ OCUMENT EPRODUCTION AND ISCLOSURE ROHIBITED...

This manual is also suitable for:

Morphoaccess j-dual

Table of Contents