suprema FSF2ODB User Manual
Hide thumbs Also See for FSF2ODB:

Advertisement

Quick Links

FaceStation F2
USER GUIDE
Version 1.02
English
EN 102.00.FSF2-ODB V1.02A

Advertisement

Table of Contents
loading

Summary of Contents for suprema FSF2ODB

  • Page 1 FaceStation F2 USER GUIDE Version 1.02 English EN 102.00.FSF2-ODB V1.02A...
  • Page 2 Contents...
  • Page 4: Safety Instructions

    Safety Instructions Observe the following instructions to use the product safely and prevent any risk of injury or property damage. Warning Noncompliance with instructions can lead to serious injury or death. Installation Do not install the device under direct sunlight or UV light. Product damage, malfunction, discoloration, or deformation may occur.
  • Page 5 Operation Do not drop the product or apply an impact to the product. Product failure may occur. • Manage the password with care; do not to disclose it to others and change it periodically. Otherwise, illegal intrusion may occur. • Do not press the buttons on the product forcibly or using a sharp tool.
  • Page 6 When assembling the product with the bracket, you can use the included bracket fixing screw (Star Shaped) instead of the • product fixing screw for enhanced security. For additional content regarding product installation, visit the Suprema website (https://www.supremainc.com) and view • the installation guide.
  • Page 7: Name And Function Of Each Part

    Name and function of each part LED lamp Visual camera Infrared camera LCD screen Fingerprint sensor RF card and mobile access card authentication unit Speaker Ethernet Relay (3 pins) TTL Input (4 pins) Wiegand Input/Output Power Supply (2 pins) (4 pins) SAM card slot RS-485 (4 pins) USB (Type-C) cable slot...
  • Page 8 Fingerprint sensor Reads fingerprints. Speaker Delivers sound. Ethernet Connect the Ethernet cable. TTL input (4 pins) Connect the TTL input cable. Relay (3 pins) Connect the relay cable. Wiegand input/output Connect the Wiegand input/output cable. (4 pins) Power supply (2 pins) Connect the power supply cable.
  • Page 9: Cables And Connectors

    Cables and connectors Power supply Name Color PWR +VDC Red (white stripe) PWR GND Black (white stripe) Relay Name Color RLY NO White RLY COM Blue RLY NC Orange RS-485 Name Color 485 TRXP Blue 485 TRXN Yellow 485 GND Black SH GND Gray...
  • Page 10: How To Enroll A Fingerprint

    Correct face registration and authentication method Cautions for registering a face When registering a face, maintain a distance of 60 cm to 100 cm between the device and the face. • Do not change your face expression. • Do not wear masks, hats, or eye patches. •...
  • Page 11: Fingerprint Enroll Method

    Fingerprint enroll method When a message saying “Place your finger on the sensor.” is displayed on the LCD screen for enrolling the fingerprint, place the finger with the fingerprint you wish to enroll on the fingerprint authentication unit and press the finger gently for better authentication.
  • Page 12: Admin Menu

    Admin Menu All Menus Press and authenticate with the Admin level credential. Select the desired menu. NOTE If the administrator has not been designated, the menu screen will be displayed when you press •...
  • Page 13: Registering User Information

    User Registering User Information The user information, including the face and fingerprint, can be registered. Press and authenticate with the Admin level credential. Select USER > , and choose a credential you want to register. There are two steps for the user registration. Some options are available after the credential has been registered. : Register a user photo.
  • Page 14: Registering A Fingerprint

    • Extended Private Auth Mode: Change the authentication method according to the user. You can set whether to use the extended private auth mode. this mode allows you to combine user authentication methods, including both faces and fingerprints. Otherwise, you can use the device's basic authentication mode. You can modify it in BioStar 2. To save settings, press OK.
  • Page 15: Modifying User Information

    Modifying User Information ’ User Management or Administrator can modify the registered user information. A user s face, fingerprint, or card can be added, and the PIN and level can be modified. Press and authenticate with the Admin level credential. Select USER >...
  • Page 16: View User Usage

    View User Usage You can see the number of registered users, faces, fingerprints, and cards at a glance. Press and authenticate with the Admin level credential. Select USER > . User usage information appears.
  • Page 17: Modifying Auth Mode

    Authentication Auth Mode Set the authentication mode. You can make a combination of face, fingerprint, PIN, card, or ID and you can also set a schedule for each authentication mode. Registering auth mode Press and authenticate with the Admin level credential. Select AUTHENTICATION >...
  • Page 18: Server Matching

    Server Matching You can set the server matching. When this option is activated, it performs user authentication matching in BioStar 2, not in the device. It can be used when the device has too much user information or when the device is installed outside. Press and authenticate with the Admin level credential.
  • Page 19 Maximum Face Width: 250 Search Range X coordinate: 144 Search Range Width: 432 Security Level: Set the security level for 1:N authentication. • Operation Mode: Set the operation mode of the device when the face is authenticated. • Fusion Matching: Use both visual and infrared cameras to increase the face authentication accuracy. Fast Matching: The device authenticates users who pass an access point without a pause within the authentication distance.
  • Page 20 • fingerprint templates enrolled on the device. Template Format: Set the fingerprint template format. SUPREMA is set as the default, and if you change the template format, all • fingerprints saved previously cannot be used. Use caution when changing the Template Format.
  • Page 21 the rejection rate of fingerprint. Advanced Enrollment: Inspect the quality of a scanned fingerprint in order to save high quality fingerprint information When • Use is set and the quality of the fingerprint is low, it notifies such information to the user and helps the user scan the fingerprint correctly.
  • Page 22: Display And Sound

    Voice Instruction: Set to use the voice instruction instead of alarm sounds. • Volume: Set the volume. • NOTE Refer to the BioStar 2 Device SDK webpage on the Suprema Knowledge Base website (kb.supremainc.com/bs2sdk/) for • more information on the BioStar 2 Device SDK.
  • Page 23: Network Settings

    Network Network Settings You can change the network settings of the device. Ethernet Press and authenticate with the Admin level credential. Select NETWORK > Ethernet. Change the desired item. • DHCP: Set whether or not to use DHCP. If DHCP setting is disabled, the user can modify Port, IP Address, Gateway, Subnet Mask, and DNS.
  • Page 24: Serial Setting

    Server Press and authenticate with the Admin level credential. Select NETWORK > Server. Change the desired item. • Device -> Server: You can send a connection signal from the device to a server with the input information directly. When you select Server ->...
  • Page 25 Device Relay You can set the open time and the input port of the exit button in the device. Press and authenticate with the Admin level credential. Select DEVICE > Relay. Relay: You can set whether relay is enabled or not. To set the open time and the input port of the exit button, activate this option. •...
  • Page 26: Date And Time

    Date & Time You can set date and time. Set the date and time accurately in order to collect accurate log data. Press and authenticate with the Admin level credential. Select DEVICE > Date & Time. Change the desired item. Date &...
  • Page 27: Daylight Saving Time

    Daylight Saving Time You can use the device by applying daylight saving time. Set the start and end time correctly. Press and authenticate with the Admin level credential. Select DEVICE > Daylight Saving Time and press to add additional daylight saving time. Select the desired item and change the setting.
  • Page 28: Memory Info

    Memory Info View the status of memory usage. Press and authenticate with the Admin level credential. Select DEVICE > Memory Info. You can view the memory usage status of the device.
  • Page 29: Usb Memory

    USB Memory Connect USB Memory and import user information to the device or export log and user information from the device. Upgrade the firmware. Press and authenticate with the Admin level credential. Select DEVICE > USB Memory. Select the desired item and change the setting. Import: Import user information from the connected USB memory.
  • Page 30: Restart Device

    Activate Secure Tamper to delete data of all registered users, all logs, and secure keys when a temper event occurs. Restart Device The user can restart the device. Press and authenticate with the Admin level credential. Select DEVICE > Restart Device. To restart the device, press OK.
  • Page 31: Event Log

    Event Log Search Log You can set a condition and search a log. Press and authenticate with the Admin level credential. Select EVENT LOG. All event logs appear. Press to search a specific log and change the condition. Press OK. A log that matches the condition will be displayed on the screen. Delete All Logs You can delete all saved logs.
  • Page 32: View Log Usage

    View Log Usage You can check the status of log usage. Press and authenticate with the Admin level credential. Select EVENT LOG > . You can check the capacity of event and image logs on the device.
  • Page 33: Troubleshooting

    Troubleshooting Checklist before reporting a failure Classification Problem Solution The power is being supplied If the distance between the terminal and the bracket is too great, the • but the device does not device may not operate due to the temper switch. operate.
  • Page 34: Product Specifications

    Live Face Detection Supported Image dimension 300 x 400 pixels Resolution 500 dpi Template SUPREMA / ISO19794-2, ANSI-378 Fingerprint Extractor / Matcher MINEX certified and compliant Sensor Certificates FBI PIV and FBI Mobile ID FAP20 Live Face Detection Supported (Deep learning-based) Max.
  • Page 35 Dimensions (Unit: mm) 23.5 119.8 268.4 49.7 98.4 251.4...
  • Page 36: Fcc Compliance Information

    This product is CE marked according to the provisions of the Radio Equipment Directive (RED) 2014/53/EU. Hereby, Suprema Inc. declares that this product is in compliance with the essential requirements and other relevant provisions of Radio Equipment Directive (RED) 2014/53/EU.
  • Page 37: Copyright Notice

    Suprema's products. Do not use the product of Suprema under the situations related to medical, rescue of human lives, or maintenance of •...
  • Page 38 The licenses for most software and other practical works are designed to take away your freedom to share and change the works. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change all versions of a program--to make sure it remains free software for all its users.
  • Page 39 To “convey” a work means any kind of propagation that enables other parties to make or receive copies. Mere interaction with a user through a computer network, with no transfer of a copy, is not conveying. An interactive user interface displays “Appropriate Legal Notices” to the extent that it includes a convenient and prominently visible feature that (1) displays an appropriate copyright notice, and (2) tells the user that there is no warranty for the work (except to the extent that warranties are provided), that licensees may convey the work under this License, and how to view a copy of this License.
  • Page 40 extent such circumvention is effected by exercising rights under this License with respect to the covered work, and you disclaim any intention to limit operation or modification of the work as a means of enforcing, against the work's users, your or third parties' legal rights to forbid circumvention of technological measures. 4.
  • Page 41 A separable portion of the object code, whose source code is excluded from the Corresponding Source as a System Library, need not be included in conveying the object code work. A “User Product” is either (1) a “consumer product”, which means any tangible personal property which is normally used for personal, family, or household purposes, or (2) anything designed or sold for incorporation into a dwelling.
  • Page 42 relicensing or conveying under this License, you may add to a covered work material governed by the terms of that license document, provided that the further restriction does not survive such relicensing or conveying. If you add terms to a covered work in accord with this section, you must place, in the relevant source files, a statement of the additional terms that apply to those files, or a notice indicating where to find the applicable terms.
  • Page 43 Each contributor grants you a non-exclusive, worldwide, royalty-free patent license under the contributor's essential patent claims, to make, use, sell, offer for sale, import and otherwise run, modify and propagate the contents of its contributor version. In the following three paragraphs, a “patent license” is any express agreement or commitment, however denominated, not to enforce a patent (such as an express permission to practice a patent or covenant not to sue for patent infringement).
  • Page 44 Software Foundation. If the Program specifies that a proxy can decide which future versions of the GNU General Public License can be used, that proxy's public statement of acceptance of a version permanently authorizes you to choose that version for the Program. Later license versions may give you additional or different permissions.
  • Page 45: Original Ssleay License

    conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. All advertising materials mentioning features or use of this software must display the following acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit.
  • Page 46 DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  • Page 47 ISC license used for completely new code in BoringSSL: Copyright (c) 2015, Google Inc. Permission to use, copy, modify, and/or distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies. THE SOFTWARE IS PROVIDED "AS IS"...
  • Page 48: Apache License

    * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of Google Inc.
  • Page 49 improving the Work, but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner as "Not a Contribution." "Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received by Licensor and subsequently incorporated within the Work.
  • Page 50 8. Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence), contract, or otherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall any Contributor be liable to You for damages, including any direct, indirect, special, incidental, or consequential damages of any character arising as a result of this License or out of the use or inability to use the Work (including but not limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses), even if such Contributor has been advised of the possibility of such damages.
  • Page 51 Tel: +82 31 783 4502 I Fax: +82 31 783 4503 I Inquiry: sales_sys@supremainc.com ©2021 Suprema Inc. Suprema and identifying product names and numbers herein are registered trade marks of Suprema, Inc. All non-Suprema brands and product names are trademarks or registered trademarks of their respective companies. Product appearance, build status and/or specifications are subject to change without notice.

This manual is also suitable for:

Facestation f2

Table of Contents