36
DOCUMENT SSE-0000077399-01 - V
Access control presentation
–
This mode is used when the whole access right check process is fully monitored
by an external device (such as a PC). It means that the local access control
application of the terminal is not used, but only the biometric features
(identification, authentification) and the user input/output features (the
contactless card reader). In that case, the access control application is in the
external device.
Figure 4 • 7:Proxy mode
Section
gives more information about remote
management.
Please refer to
MorphoAccess
®
Host System Interface Specification
for a
complete description of TCP orders possibilities.
Proxy order:
•
Identification
•
Verification
•
Relay activation
•
Read card
•
...
Summary of Contents for MorphoAccess J-Bio
Page 13: ...SECTION 1 INTRODUCTION...
Page 19: ...SECTION 2 TERMINAL PRESENTATION...
Page 25: ...SECTION 3 TERMINAL CONFIGURATION...
Page 39: ...SECTION 4 STAND ALONE MODES NETWORKED OR NOT...
Page 49: ...SECTION 5 ACCESS CONTROL BY IDENTIFICATION...
Page 53: ...SECTION 6 ACCESS CONTROL BY AUTHENTIFICATION...
Page 67: ...SECTION 7 PROXY MODE...
Page 71: ...SECTION 8 TERMINAL CUSTOMIZATION...
Page 89: ...SECTION 9 MAN MACHINE INTERFACE...
Page 103: ...SECTION 10 APPENDIX...
Page 115: ...SECTION 11 SUPPORT...