CONTENTS Safety instructions Authentication Instructional icons Auth Mode Fingerprint Mode Card Mode ID Mode Introduction T&A Mode Components Fingerprint Name and function of each part server Matching Cables and connectors How to enroll a fingerprint Display Admin Menu Device All Menus Date &...
Page 3
CONTENTS Network FCC compliance information Network Settings TCP/IP Server EU Declaration of Conformity (CE) RS-485 Appendices Event Log Disclaimers Search Log Copyright notice Delete All Logs Open Source License View Log Usage GNU General Public License GNU Lesser General Public License OpenSSL License Original SSLeay License Troubleshooting...
Safety instructions Please read this safety instructions before you use the product to prevent injury to yourself and others and to prevent property damage. The term ‘product’ in this manual refers to the product and any items provided with the product. Instructional icons Warning: This symbol indicates situations that could result in death or severe injury.
Page 5
The product may be affected by radio frequencies emitted by other products and the product may malfunction. Use the IEC/EN 62368-1 approved power adaptor that supports higher power consumption than the product. It is highly recommended to use the power adaptor sold by Suprema. •...
Page 6
Safety instructions RTC battery Discard the battery according to the appropriate regional or international waste regulations. Discard the battery according to the appropriate regional or international waste regulations.
When assembling the product with the bracket, you can use the included bracket fixing screw (Star Shaped) instead of the product fixing screw for enhanced security. • For more details regarding the product installation, visit the Suprema website (https://www.supremainc.com) and refer to the installation guide.
Introduction Name and function of each part LCD screen Function button Keypad ESC button OK button Fingerprint authentication unit RF card and mobile access card authentication unit Cable Speaker Name Description LCD screen Provides UI for operation. Function buttons Used for T & A key or changing a letter. •...
Introduction Cables and connectors Name Color PWR +VDC PWR GND Black (White stripe) 485 TRXP Blue (White stripe) 485 TRXN Yellow (Black stripe) 485 GND White (Black stripe) ENET RXN Yellow ENET RXP Green ENET TXN ENET TXP Black RLY NO Gray (White stripe) RLY COM Green (White stripe)
When the fingerprint recognition fails BioLite N2 can recognize a fingerprint regardless of a change in season or finger condition. However, the authentication rate may vary according to the external environment or fingerprint input method. If the fingerprint authentication cannot be done smoothly, it is recommended to take the following measures.
Admin Menu All Menus Press ESC and authenticate with the Admin level credential. Select the desired menu. If the administrator has not been designated, the menu screen will be displayed when you press ESC.
User Registering user information The user information including credentials can be registered. Press ESC and authenticate with the Admin level credential. → Select USER Add User, then press 6. Select the desired item, then press and set 4 or 6. When you press OK, the user information will be registered. •...
User Modifying User Information User Management or Administrator can modify the registered user information. A card or fingerprint can be added, and PIN and level can be modified. Press ESC and authenticate with the Admin level credential. → Select USER Search User, then press 6.
Authentication Auth Mode Fingerprint Mode You can set the schedule to be used for each authentication method using a fingerprint. Press ESC and authenticate with the Admin level credential. → → Select AUTH Auth Mode Fingerprint Mode, then press 6. Select the desired item and set the schedule by pressing 4 or 6.
Authentication To save settings, press OK. • A schedule can be set in BioStar 2. If there is no set schedule, only Not Used and Always can be selected. • For detailed contents regarding setting a schedule, refer to BioStar 2 Administrator’s manual. ID Mode You can set the schedule to be used for each authentication method using ID.
Authentication T&A Mode You can set how to register T&A Mode. Press ESC and authenticate with the Admin level credential. → Select AUTH T&A, then press 6. Select the desired item and then change the settings by pressing 4 or 6. •...
• Template Format: Set the fingerprint template format. SUPREMA is set as the default, and if you change the template format, all fingerprints saved previously cannot be used. Use caution when changing the Template Format.
Display You can change the display settings of the device. Press ESC and authenticate with the Admin level credential. Select DISPLAY, then press 6. Select the desired item and then change the settings by pressing 4 or 6. • Home Screen: Select items to be displayed in the background of the home screen. •...
Device Date & Time You can set date and time. Set the date and time accurately in order to collect accurate log data. Press ESC and authenticate with the Admin level credential. → Select DEVICE Date & Time, then press 6. Select the desired item and then change the settings by pressing 4 or 6.
Device Relay You can set the open time and the input port of the exit button in the device. This option is useful when the device is used as a standalone. Press ESC and authenticate with the Admin level credential. →...
Device Restart Device The user can restart the device. Press ESC and authenticate with the Admin level credential. → Select DEVICE Restart Device, then press 6. To restart the device, press OK. To cancel, press ESC. Restore Default Device settings, network settings, and operator levels will be reset. Press ESC and authenticate with the Admin level credential.
Network Network Settings You can change the network settings of the device. TCP/IP Press ESC and authenticate with the Admin level credential. → Select NETWORK TCP/IP, then press 6. Select the desired item and then change the settings by pressing 4 or 6. •...
Page 23
Network • Server IP: Enter the IP of the PC where BioStar 2 is installed. Input is accepted only when Device -> Server is set for Connection Mode. • Server Port: Enter the port of the PC on which BioStar 2 is installed. Input is accepted only when Device -> Server is set for Connection Mode.
Event Log Search Log You can set a condition and search a log. Press ESC and authenticate with the Admin level credential. → Select EVENT LOG Search, then press 6. Select the desired item and then change the settings by pressing 4 or 6. When you press OK, a log that matches the set condition will be displayed on the screen.
I close the installation company. door. • BioLite N2 is equipped with a built-in battery but if power is not supplied Suddenly the time has Time for a long time, the built-in battery may die, causing the time to become become incorrect.
272 x 320 pixels Image bit depth 8 bits, 256 gray scale Resolution 500 dpi Fingerprint Template SUPREMA / ISO19794-2 / ANSI-378 Extractor / Matcher MINEX certified and compliant Live Fingerprint Detection Supported (SW-based) Max. User 10,000 Max. Credential (1:N) Fingerprint: 10,000 •...
Page 27
Relay 1 A @ 30 VDC Inductive load DESFire EV2/EV3 cards are supported by having backward compatibility of DESFire EV1 cards. CSN and smart card functions are compatible with BioLite N2. RF read range will vary depending on installation environment.
This product is CE marked according to the provisions of the Radio Equipment Directive (RED) 2014/53/EU. Hereby, Suprema Inc. declares that this product is in compliance with the essential requirements and other relevant provisions of Radio Equipment Directive (RED) 2014/53/EU.
Information in this document is provided in connection with Suprema products. • The right to use is acknowledged only for Suprema products included in the terms and conditions of use or sale for such products guaranteed by Suprema. No license, express or implied, by estoppel or otherwise, to any intellectual property is granted by this document.
Appendices Open Source License • The software of this product is based on "Linux Kernel 4.x", which is licensed under GPL. As for GPL, please refer to GNU General Public License in this manual. • This product uses the "glibc" library, which is licensed under LGPL. As for LGPL, please refer to the GNU Lesser General Public License in this manual.
Page 32
Appendices TERMS AND CONDITIONS 0. Definitions. “This License” refers to version 3 of the GNU General Public License. “Copyright” also means copyright-like laws that apply to other kinds of works, such as semiconductor masks. “The Program” refers to any copyrightable work licensed under this License. Each licensee is addressed as “you”. “Licensees”...
Page 33
Appendices 2. Basic Permissions. All rights granted under this License are granted for the term of copyright on the Program, and are irrevocable provided the stated conditions are met. This License explicitly affirms your unlimited permission to run the unmodified Program. The output from running a covered work is covered by this License only if the output, given its content, constitutes a covered work.
Page 34
Appendices 6. Conveying Non-Source Forms. You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also convey the machine-readable Corresponding Source under the terms of this License, in one of these ways: a) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by the Corresponding Source fixed on a durable physical medium customarily used for software interchange.
Page 35
Appendices 7. Additional Terms. “Additional permissions” are terms that supplement the terms of this License by making exceptions from one or more of its conditions. Additional permissions that are applicable to the entire Program shall be treated as though they were included in this License, to the extent that they are valid under applicable law.
Page 36
Appendices 9. Acceptance Not Required for Having Copies. You are not required to accept this License in order to receive or run a copy of the Program. Ancillary propagation of a covered work occurring solely as a consequence of using peer-to-peer transmission to receive a copy likewise does not require acceptance.
Page 37
Appendices A patent license is “discriminatory” if it does not include within the scope of its coverage, prohibits the exercise of, or is conditioned on the non-exercise of one or more of the rights that are specifically granted under this License. You may not convey a covered work if you are a party to an arrangement with a third party that is in the business of distributing software, under which you make payment to the third party based on the extent of your activity of conveying the work, and under which the third party grants, to any of the parties who would receive the covered work from you, a...
Appendices 17. Interpretation of Sections 15 and 16. If the disclaimer of warranty and limitation of liability provided above cannot be given local legal effect according to their terms, reviewing courts shall apply local law that most closely approximates an absolute waiver of all civil liability in connection with the Program, unless a warranty or assumption of liability accompanies a copy of the Program in return for a fee.
Page 39
Appendices • b) Accompany the object code with a copy of the GNU GPL and this license document. 4. Combined Works. You may convey a Combined Work under terms of your choice that, taken together, effectively do not restrict modification of the portions of the Library contained in the Combined Work and reverse engineering for debugging such modifications, if you also do each of the following: •...
Appendices OpenSSL License Copyright (c) 1998-2017 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Page 41
Appendices include an acknowledgement: "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
Need help?
Do you have a question about the BioLite N2 and is the answer not in the manual?
Questions and answers