IDEMIA DOCUMENT
– REPRODUCTION AND DISCLOSURE PROHIBITED.
5
Typical Access Control Process
On Access
Request, the
terminal checks
user’s access
rights using a
biometric check.
If the result of the
check is successful
(user recognized ),
a message is sent
to the Central
Access Controller
for additional
access rights
check.
If the user is
allowed to access
to the protected
zone, the central
access controller
returns an "access
granted" message
to the terminal and
a “open” command
to the gate
controller.
MorphoAccess® VP MD
– Quick User
Guide - 2019_2000041669-V1
St
ep
one
:
ov
erv
iew
User’s fingerprints and veins must be stored in the terminal database or in contactless card, to enable
biometric check.