S2000-2
Operating
41
www.bolid.com
meets the pattern) and specify the pattern mask (its ‘opened’ positions) which will be allied to codes of
presented keys. Finally, the access group and validity period must be specified for the pattern (see
Access Key Pattern Configuration Parameters Section of this Manual).
A typical example of key pattern based identification is an access control to an ATM for bank clients,
when the access is granted only for those cardholders whose bank card serial numbers start with the
specified numerical sequence.
Summary of Contents for S2000-2
Page 1: ...Orion ISS Access Controller S2000 2 User s Manual ISO 9001 ...
Page 5: ...S2000 2 Features and Design 5 www bolid com FEATURES AND DESIGN ...
Page 8: ...Orion ISS www bolid com 8 ...
Page 9: ...S2000 2 Specifications 9 www bolid com SPECIFICATIONS ...
Page 12: ...Orion ISS www bolid com 12 ...
Page 13: ...S2000 2 Operating 13 www bolid com OPERATING ...
Page 47: ...S2000 2 Installation 47 www bolid com INSTALLATION ...
Page 67: ...S2000 2 S2000 2 Programming 67 www bolid com S2000 2 PROGRAMMING ...
Page 89: ...S2000 2 Maintenance 89 www bolid com MAINTENANCE ...
Page 94: ...Orion ISS www bolid com 94 ...
Page 95: ...S2000 2 95 www bolid com Appendix Connecting Some Models of Readers to the S2000 2 Controller ...