Advertisement

www.supremainc.com

INSTALLATION GUIDE

BioEntry W2
English
Version 1.24
EN 101.00.BEW2 V1.24A

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the BioEntry W2 and is the answer not in the manual?

Questions and answers

Summary of Contents for suprema BioEntry W2

  • Page 1: Installation Guide

    INSTALLATION GUIDE BioEntry W2 English Version 1.24 EN 101.00.BEW2 V1.24A...
  • Page 2: Table Of Contents

    Contents Safety Instructions ..................3 Introduction ...................... 5 Components ..............................5 Name and function of each part ....................... 6 Cables and connectors................................. 7 How to enroll a fingerprint ........................8 Selecting a finger for fingerprint input ........................8 Fingerprint enroll method ..............................8 Installation ......................
  • Page 3: Safety Instructions

    If installing the product outside where the product is completely exposed, it is recommended to install the product together with the enclosure. Use a separate power supply for Secure I/O 2, electric lock and BioEntry W2 respectively. • If connecting and using the power supply to these devices together, the devices may malfunction.
  • Page 4 Safety Instructions Operation Do not drop the product or apply an impact to the product. • A product failure may occur. Be careful not to contaminate or damage the fingerprint contact unit with a dirty hand or foreign substances. • Deterioration in fingerprint authentication performance and a product failure may occur.
  • Page 5: Introduction

    Components Ferrite core PVC anchor (1 EA) (2 EA) Heat shrink tubes Fixing screw (2 EA) Bracket BioEntry W2 120 Ω resistor Diode Drilling template (1 EA) (1 EA) Quick guide Note Components may vary according to the installation environment.
  • Page 6: Name And Function Of Each Part

    Introduction Name and function of each part LED lamp Network reset button RF card authentication unit LED status indicator for Net work Cable Fingerprint authentication unit Name Feature LED lamp Indicates the operational status of the product with the color of the LED lamp. RF card authentication Reads RF cards for entering and exiting.
  • Page 7: Cables And Connectors

    Introduction Cables and connectors Name Color RLY NO Gray (White stripe) RLY COM Green (White stripe) RLY NC Orange (White stripe) Blue Brown Green WG D0 Green WG D1 White WG GND Black TTL IN 1 Brown TTL IN 0 Purple PWR +VDC Not Connected...
  • Page 8: How To Enroll A Fingerprint

    When the fingerprint recognition fails BioEntry W2 can recognize a fingerprint regardless of a change of season or finger condition. However, the authentication rate may vary according to the external environment or fingerprint input method. If the fingerprint authentication cannot be done smoothly, it is recommended to take the following measures.
  • Page 9: Installation

    BioEntry W2 will be installed. Note • If installing BioEntry W2 on a concrete wall, drill holes, insert PVC anchors, and fix them with fixing screws. • To avoid RF interference, a minimum separation distance must be maintained.
  • Page 10 Installation Install BioEntry W2 onto the fixed bracket. Connect BioEntry W2 to the bracket by rotating the product fixing screw.
  • Page 11: Power Supply Connection

    • Use a separate power supply for Secure I/O 2, the electric lock, and the BioEntry W2 respectively. If connecting and using the power supply to these devices together, the devices may malfunction.
  • Page 12: Ttl Input Connection

    Installation LAN connection (connecting to a PC directly) BioEntry W2 has an automatic MDI/MDIX function so that it can be connected to a PC directly using a normal straight type CAT-5 cable, not a cross cable. BioEntry W2 TTL input connection...
  • Page 13: Relay Connection

    Take caution of the installation direction of the diode. Install the diode close to the door lock. • Use a separate power supply for BioEntry W2 and the door lock. Fail Secure Lock In order to use the Fail Secure Lock, connect N/O relay as shown in the figure below There is normally no current flowing through the relay for the Fail Secure Lock.
  • Page 14: Automatic Door Connection

    Installation Automatic door connection Door button Sensor Automatic door Controller Door Lock - RLY NO Gray (White stripe) - RLY COM Green (White stripe) BioEntry W2...
  • Page 15: Connecting As A Standalone

    Orange (White stripe) Note • BioEntry W2 can be used as a multi-door controller with the slave devices with the RS485 cable. The slave devices are used as dummy readers and authentication is performed in the master device. • If Xpass is connected to the master device, only card authentication can be used.
  • Page 16: Connecting To Secure I/O 2

    Door button Note • BioEntry W2 can be used as a multi-door controller with the slave devices with the RS485 cable. The slave devices are used as dummy readers and authentication is performed in the master device. • If Xpass is connected to the master device, only card authentication can be used.
  • Page 17: Wiegand Connection

    - WG D1 White - WG GND Black RFID reader Control device BioEntry W2 BioEntry W2 Use as a Wiegand input device Use as a Wiegand output device Resetting Network Settings Turn the power on. Press the network reset button on the rear of device until the device restart automatically.
  • Page 18: Product Specifications

    Image dimension 272 x 320 pixels Image bit depth 8bit, 256 grayscale Resolution 500 dpi Fingerprint Template SUPREMA / ISO 19794-2 / ANSI 378 Extractor / Matcher MINEX certified and compliant Supported Max. User (1:1) 500,000 Max. User (1:N) 100,000 Capacity Max.
  • Page 19: Dimensions

    Product specifications Dimensions (Unit: mm) 38.2 43.5 39.4 156.8...
  • Page 20: Fcc Compliance Information

    FCC Compliance Information FCC Compliance Information THIS DEVICE COMPLIES WITH PART 15 OF THE FCC RULES. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) This device must accept any interference received, including interference that may cause undesired operation. Note: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules.
  • Page 21: Appendices

    • Do not use the product of Suprema under the situations related to medical, rescue of human lives, or maintenance of life, as a person may get injured or lose his/her life due to product malfunction. If an accident occurs while a consumer is using the product under the...
  • Page 22 Appendices To protect your rights, we need to prevent others from denying you these rights or asking you to surrender the rights. Therefore, you have certain responsibilities if you distribute copies of the software, or if you modify it: responsibilities to respect the freedom of others. For example, if you distribute copies of such a program, whether gratis or for a fee, you must pass on to the recipients the same freedoms that you received.
  • Page 23 Appendices System Libraries, or general-purpose tools or generally available free programs which are used unmodified in performing those activities but which are not part of the work. For example, Corresponding Source includes interface definition files associated with source files for the work, and the source code for shared libraries and dynamically linked subprograms that the work is specifically designed to require, such as by intimate data communication or control flow between those subprograms and other parts of the work.
  • Page 24 Appendices Corresponding Source fixed on a durable physical medium customarily used for software interchange. b) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by a • written offer, valid for at least three years and valid for as long as you offer spare parts or customer support for that product model, to give anyone who possesses the object code either (1) a copy of the Corresponding Source for all the software in the product that is covered by this License, on a durable physical medium customarily used for software interchange, for a price no more than your reasonable cost of physically performing this conveying of source, or (2) access to copy the Corresponding Source from a network...
  • Page 25 Appendices e) Declining to grant rights under trademark law for use of some trade names, trademarks, or service marks; or • f) Requiring indemnification of licensors and authors of that material by anyone who conveys the material (or modified versions of it) •...
  • Page 26 Appendices In the following three paragraphs, a “patent license” is any express agreement or commitment, however denominated, not to enforce a patent (such as an express permission to practice a patent or covenant not to sue for patent infringement). To “grant” such a patent license to a party means to make such an agreement or commitment not to enforce a patent against the party.
  • Page 27: Gnu Lesser General Public License

    Appendices WHO MODIFIES AND/OR CONVEYS THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
  • Page 28: Openssl License

    Appendices c) For a Combined Work that displays copyright notices during execution, include the copyright notice for the Library among these • notices, as well as a reference directing the user to the copies of the GNU GPL and this license document. d) Do one of the following: •...
  • Page 29: Original Ssleay License

    Appendices This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com). Original SSLeay License Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved. This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL.
  • Page 30 www.supremainc.com www.supremainc.com...

This manual is also suitable for:

Bioentry p2

Table of Contents

Save PDF