CONTENTS Safety instructions Authentication Instructional icons Auth Mode Registering auth mode Modifying Auth Mode Introduction Delete Auth Mode Server Matching Components Face Name and function of each part Cables and connectors T&A Mode Correct face enrollment and authentication method Display & Sound Admin Menu Network All Menus...
Page 3
CONTENTS Device Product specifications Relay Dimensions Date & Time FCC compliance information Daylight Saving Time Device Info EU Declaration of Conformity (CE) Memory Info USB Memory Appendices Secure Tamper Disclaimers Restart Device Copyright notice Restore Default Open Source License GNU General Public License User ID Type TERMS AND CONDITIONS BoringSSL License...
Safety instructions Please read this safety instructions before you use the product to prevent injury to yourself and others and to prevent property damage. The term ‘product’ in this manual refers to the product and any items provided with the product. Instructional icons Warning: This symbol indicates situations that could result in death or severe injury.
Page 5
The product may be affected by radio frequencies emitted by other products and the product may malfunction. Use the IEC/EN 62368-1 approved power adapter that supports higher power consumption than the product. It is highly recommended to use the power adapter sold by Suprema. •...
Page 6
Safety instructions Caution Operation Do not drop the product or cause impacts to the product. • The product may malfunction. Do not disconnect the power supply while upgrading the firmware of the product. • The product may malfunction. Do not disclose the password to others and change it regularly. •...
When assembling the product with the bracket, you can use the included bracket fixing screw (Star Shaped) instead of the product fixing screw for enhanced security. • For more details regarding the product installation, visit the Suprema website (https://www.supremainc.com) and refer to the installation guide.
Introduction Name and function of each part LED Lamp Visual Camera Infrared Camera LCD Screen RF card and mobile access card authentication unit Speaker Ethernet TTL Input (4 pins) Relay (3 pins) Wiegand Input/Output Power Supply (2 pins) (4 pins) SAM Card Slot RS-485 (4 pins) USB (Type-C) Memory Slot...
Introduction Name Description Power Supply (2 pins) Connect the power supply cable. RS-485 (4 pins) Connect the RS-485 cable. SAM Card Slot Insert the SAM card. USB (Type-C) Memory Slot Connects the USB memory. Cables and connectors Power supply Name Color PWR +VDC Red (white stripe)
Page 10
Introduction TTL input Name Color TTL IN0 TTL IN1 Yellow TTL GND Black SH GND Gray Wiegand input and output Name Color WG D0 Green WG D1 White WG GND Black SH GND Gray...
Introduction Correct face enrollment and authentication method Cautions for enrolling a face • When enrolling a face, maintain a distance of 60 – 100 cm between the device and the face. • Do not change your face expression. • Do not wear masks, hats, or eye patches. •...
Admin Menu All Menus Press and authenticate with the Admin level credential. Select the desired menu. If the administrator has not been designated, the menu screen will be displayed when you press...
User Registering user information The user information including credentials can be registered. Press and authenticate with the Admin level credential. → Select USER , and choose a credential you want to register. There are two steps for the user registration. Some options are available after the credential has been registered. •...
User • Period: Set an expiry date to use the user account. • Extended Private Auth Mode: Change the authentication method according to the user. You can set whether to use the extended private auth mode. this mode allows you to combine user authentication methods, including both faces.
User Delete All Users You can delete all registered users at once. Press and authenticate with the Admin level credential. → Select USER Check Delete All to delete all registered users and press OK. When you press OK, all registered users will be deleted. View User Usage You can see the number of registered users and cards at a glance.
Authentication Auth Mode Set the authentication mode. You can make a combination of face, PIN, card, or ID and you can also set a schedule for each authentication mode. Registering auth mode Press and authenticate with the Admin level credential. →...
Authentication Server Matching You can set the server matching. When this option is activated, it performs user authentication matching in BioStar 2, not in the device. It can be used when the device has too much user information or when the device is installed outside. Press and authenticate with the Admin level credential.
Page 18
Authentication • Security Level: Set the security level for 1:N authentication. • Operation Mode: Set the operation mode of the device when the face is authenticated. - Fusion Matching: Use both visual and infrared cameras to increase the face authentication accuracy. - Fast Matching: The device authenticates users who pass an access point without a pause within the authentication distance.
Page 19
Authentication - ROI X(%), ROI Y(%), ROI Width(%), ROI Height(%): You can set the ROI manually when you disable Dynamic ROI. Set the temperature measurement area by adjusting the size and position of ROI (Region of Interest). To move the ROI horizontally (left or right), change the ROI X(%) value. The ROI moves to the right as entering a larger value.
Authentication • It is not possible to use both face authentication with a mask on and thermal camera features on a slave device. • The supported thermal camera is TCM10-FSF2. T&A Mode You can set how to register T&A Mode. Press and authenticate with the Admin level credential.
Voice Instruction: Set to use the voice instruction instead of alarm sounds. • Volume: Set the volume. Refer to the BioStar 2 Device SDK webpage on the Suprema Knowledge Base website (kb.supremainc.com/bs2sdk/) for more information on the BioStar 2 Device SDK.
Network Network Settings You can change the network settings of the device. Ethernet Press and authenticate with the Admin level credential. → Select NETWORK Ethernet. Change the desired item. • DHCP: Set whether to use DHCP. If DHCP setting is disabled, the user can modify Port, IP Address, Gateway, Subnet Mask, and DNS.
Network Server Press and authenticate with the Admin level credential. → Select NETWORK Server. Change the desired item. → • Device Server: You can send a connection signal from the device to a server with the input information directly. -> When you select Server Device, Server IP, Server URL and Server Port cannot be entered.
Device Relay You can set the open time and the input port of the exit button in the device. Press and authenticate with the Admin level credential. → Select DEVICE Relay. • Relay: You can set whether relay is enabled or not. To set the open time and the input port of the exit button, activate this option.
Device Date & Time You can set date and time. Set the date and time accurately in order to collect accurate log data. Press and authenticate with the Admin level credential. → Select DEVICE Date & Time. Change the desired item. •...
Device Daylight Saving Time You can use the device by applying daylight saving time. Set the start and end time correctly. Press and authenticate with the Admin level credential. → Select DEVICE Daylight Saving Time and press to add additional daylight-saving time. Select the desired item and change the setting.
Device Device Info You can view the model name, device ID, serial number, firmware version of device ID, and MAC address. Press and authenticate with the Admin level credential. → Select DEVICE Device Info. You can view the information including Model Name, Device ID, Serial No., HW, FW, Kernel, and MAC.
Device USB Memory Connect USB Memory and import user information to the device or export log and user information from the device. Upgrade the firmware. Press and authenticate with the Admin level credential. → Select DEVICE USB Memory. Select the desired item and change the setting. •...
Device • When upgrading firmware from version 1.0.5 or earlier to version 1.1.0 or later, it starts of migration of face templates registered. It may take up to 10 hours depending on the amount of data. • It is recommended to use a USB flash drive formatted in NTFS or exFAT. USB flash drives in FAT32 format may malfunction when more than 50,000 face credentials are stored.
Device Restore Default Device settings, network settings, and operator levels will be reset. Press and authenticate with the Admin level credential. → Select DEVICE Restore Default. • All settings: You can reset all settings stored on the device. Press OK to reset all device settings. •...
Event Log Search Log You can set a condition and search a log. Press and authenticate with the Admin level credential. Select EVENT LOG. All event logs appear. Press to search a specific log and change the condition. Press OK. A log that matches the condition will be displayed on the screen. Delete All Logs You can delete all saved logs.
Event Log View Log Usage You can check the status of log usage. Press and authenticate with the Admin level credential. → Select EVENT LOG . You can check the capacity of event and image logs on the device.
Troubleshooting This troubleshooting provides information to solve unexpected issues that you may encounter when using the device. Category Problem Solution • If the terminal and the bracket are far away from each other, the The power is being supplied device may not operate due to the temper switch. but the device does not operate.
This product is CE marked according to the provisions of the Radio Equipment Directive (RED) 2014/53/EU. Hereby, Suprema Inc. declares that this product is in compliance with the essential requirements and other relevant provisions of Radio Equipment Directive (RED) 2014/53/EU.
Information in this document is provided in connection with Suprema products. • The right to use is acknowledged only for Suprema products included in the terms and conditions of use or sale for such products guaranteed by Suprema. No license, express or implied, by estoppel or otherwise, to any intellectual property is granted by this document.
Appendices Open Source License • The software of this product is based on "Linux Kernel 4.x", which is licensed under GPL. As for GPL, please refer to GNU General Public License in this manual. • This product uses the "BoringSSL", which is licensed under the OpenSSL and Original SSLeay licenses. As for the OpenSSL and Original SSLeay licenses, please refer to BoringSSL License in this manual.
Appendices TERMS AND CONDITIONS 0. Definitions. “This License” refers to version 3 of the GNU General Public License. “Copyright” also means copyright-like laws that apply to other kinds of works, such as semiconductor masks. “The Program” refers to any copyrightable work licensed under this License. Each licensee is addressed as “you”. “Licensees”...
Page 41
Appendices 2. Basic Permissions. All rights granted under this License are granted for the term of copyright on the Program, and are irrevocable provided the stated conditions are met. This License explicitly affirms your unlimited permission to run the unmodified Program. The output from running a covered work is covered by this License only if the output, given its content, constitutes a covered work.
Page 42
Appendices 6. Conveying Non-Source Forms. You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also convey the machine-readable Corresponding Source under the terms of this License, in one of these ways: a) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by the Corresponding Source fixed on a durable physical medium customarily used for software interchange.
Page 43
Appendices 7. Additional Terms. “Additional permissions” are terms that supplement the terms of this License by making exceptions from one or more of its conditions. Additional permissions that are applicable to the entire Program shall be treated as though they were included in this License, to the extent that they are valid under applicable law.
Page 44
Appendices 9. Acceptance Not Required for Having Copies. You are not required to accept this License in order to receive or run a copy of the Program. Ancillary propagation of a covered work occurring solely as a consequence of using peer-to-peer transmission to receive a copy likewise does not require acceptance.
Page 45
Appendices A patent license is “discriminatory” if it does not include within the scope of its coverage, prohibits the exercise of, or is conditioned on the non-exercise of one or more of the rights that are specifically granted under this License. You may not convey a covered work if you are a party to an arrangement with a third party that is in the business of distributing software, under which you make payment to the third party based on the extent of your activity of conveying the work, and under which the third party grants, to any of the parties who would receive the covered work from you, a...
Appendices 17. Interpretation of Sections 15 and 16. If the disclaimer of warranty and limitation of liability provided above cannot be given local legal effect according to their terms, reviewing courts shall apply local law that most closely approximates an absolute waiver of all civil liability in connection with the Program, unless a warranty or assumption of liability accompanies a copy of the Program in return for a fee.
Appendices Original SSLeay License Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved. This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL. This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code;...
Appendices The code in third_party/fiat carries the MIT license: Copyright (c) 2015-2016 the fiat-crypto authors (see https://github.com/mit-plv/fiat-crypto/blob/master/AUTHORS). Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the...
Appendices Apache License Version 2.0, January 2004 (http://www.apache.org/licenses/) TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 0. Definitions. "License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document. "Licensor"...
Page 50
Appendices 3. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions: (a) You must give any other recipients of the Work or Derivative Works a copy of this License; and (b) You must cause any modified files to carry prominent notices stating that You changed the files;...
Need help?
Do you have a question about the FSF2-AB and is the answer not in the manual?
Questions and answers