M
A
® J S
– User Guide
ORPHO
CCESS
ERIES
3. Access control presentation
Typical access control system
DOCUMENT SSE-0000077399-01 - V
S
S
D
AGEM
ÉCURITÉ
OCUMENT
Typical architecture includes, at least one MorphoAccess
enrolment) and a Central Security Controller (for area access final check, and
physical access command).
Figure 4 • 3:Typical access control system architecture
®
MorphoAccess
J Series biometric database management
The management of the MorphoAccess
done remotely by a Host System (typically a PC with MEMS
®
MorphoAccess
operating mode
®
The MorphoAccess
works according two exclusive operating modes.
•
In Stand Alone Mode, the biometric database can be managed by a Host
System and downloaded to the MorphoAccess
•
In Proxy Mode, the terminal is remotely operated by a host system
application that sends individual commands to the MorphoAccess
®
MorphoAccess
access control result sending
When the biometric identification is positive, the person ID can be sent to a
Central Security Controller, for further action such as opening doors.
1.0 - M
ERSION
AY
- R
D
EPRODUCTION AND
ISCLOSURE
®
internal biometric database can be
®
2010
P
ROHIBITED
Access control presentation
®
, a Host System (for
TM
application).
.
®
.
31
Need help?
Do you have a question about the MorphoAccess J-Bio and is the answer not in the manual?