Access control by authentication
48
Figure 6 • 2: Authentication with User ID only on the user's card
If the user ID found on the user's card exists in the terminal database, then the
optical sensor switches on, and the user is expected to place his finger on it.
If the authentication is successful, the terminal signals the result to the user, and
(if applicable) to a distant system such as a Central Security Controller.
Once the user authentication is done, the terminal automatically loops back and
waits for an other user's card presentation
Required tags on card
ID
AuthenID
Yes
contactless
Card structure is described in MorphoAccess
Note: a database must exist in the terminal.
Binary user's identifier, non-structured data
This mode can not work when the app/contactless/enabled profiles
configuration key value is different from 0.
In this mode the identifier is read at a given offset on the card and is supposed
to be binary. No TLV structure is required on the card.
It is possible to read non-byte aligned data. It is useful to read a user ID
included in a Wiegand frame.
DOCUMENT SSE-0000077399-01 - V
S
S
D
AGEM
ÉCURITÉ
M
A
ORPHO
CCESS
User ID only
Card
PK1
PK2
Mode
No
No
No
®
Contacless Card Specification.
- R
OCUMENT
EPRODUCTION AND
® J S
– User Guide
ERIES
PIN
BIOPIN
No
No
1.0 - M
2010
ERSION
AY
D
P
ISCLOSURE
ROHIBITED
Need help?
Do you have a question about the MorphoAccess J-Bio and is the answer not in the manual?