suprema BioEntry P2 Installation Manual Download Page 22

  Appendices 

22 

To protect your rights, we need to prevent others from denying you these rights or asking you to surrender the rights. Therefore, you have 

certain responsibilities if you distribute copies of the software, or if you modify it: responsibilities to respect the freedom of others. 

 

For example, if you distribute copies of such a program, whether gratis or for a fee, you must pass on to the recipients the same freedoms 

that you received. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they 
know their rights. 

 

Developers that use the GNU GPL protect your rights with two steps: (1) assert copyright on the software, and (2) offer you this License 

giving you legal permission to copy, distribute and/or modify it. 

 

For the developers' and authors' protection, the GPL clearly explains that there is no warranty for this free software. For both users' and 

authors' sake, the GPL requires that modified versions be marked as changed, so that their problems will not be attributed erroneously to 
authors of previous versions. 

 

Some devices are designed to deny users access to install or run modified versions of the software inside them, although the manufacturer 

can do so. This is fundamentally incompatible with the aim of protecting users' freedom to change the software. The systematic pattern of 

such abuse occurs in the area of products for individuals to use, which is precisely where it is most unacceptable. Therefore, we have 

designed this version of the GPL to prohibit the practice for those products. If such problems arise substantially in other domains, we stand 
ready to extend this provision to those domains in future versions of the GPL, as needed to protect the freedom of users. 

 

Finally, every program is threatened constantly by software patents. States should not allow patents to restrict development and use of 

software on general-purpose computers, but in those that do, we wish to avoid the special danger that patents applied to a free program 

could make it effectively proprietary. To prevent this, the GPL assures that patents cannot be used to render the program non-free. 

The precise terms and conditions for copying, distribution and modification follow. 

 

TERMS AND CONDITIONS 
0. Definitions. 

“This License” refers to version 3 of the GNU General Public License. 
 

“Copyright” also means copyright-like laws that apply to other kinds of works, such as semiconductor masks. 

 

“The Program” refers to any copyrightable work licensed under this License. Each licensee is addressed as “you”. “Licensees” and “recipients” 

may be individuals or organizations. 

 
To “modify” a work means to copy from or adapt all or part of the work in a fashion requiring copyright permission, other than the making 

of an exact copy. The resulting work is called a “modified version” of the earlier work or a work “based on” the earlier work. 

 

A “covered work” means either the unmodified Program or a work based on the Program. 

 

To “propagate” a work means to do anything with it that, without permission, would make you directly or secondarily liable for infringement 

under applicable copyright law, except executing it on a computer or modifying a private copy. Propagation includes copying, distribution 
(with or without modification), making available to the public, and in some countries other activities as well. 

 

To “convey” a work means any kind of propagation that enables other parties to make or receive copies. Mere interaction with a user 

through a computer network, with no transfer of a copy, is not conveying. 

 

An interactive user interface displays “Appropriate Legal Notices” to the extent that it includes a convenient and prominently visible feature 

that (1) displays an appropriate copyright notice, and (2) tells the user that there is no warranty for the work (except to the extent that 
warranties are provided), that licensees may convey the work under this License, and how to view a copy of this License. If the interface 

presents a list of user commands or options, such as a menu, a prominent item in the list meets this criterion. 

 

1. Source Code. 

The “source code” for a work means the preferred form of the work for making modifications to it. “Object code” means any non-source form 

of a work. 

 

A “Standard Interface” means an interface that either is an official standard defined by a recognized standards body, or, in the case of 
interfaces specified for a particular programming language, one that is widely used among developers working in that language. 

 

The “System Libraries” of an executable work include anything, other than the work as a whole, that (a) is included in the normal form of 

packaging a Major Component, but which is not part of that Major Component, and (b) serves only to enable use of the work with that 

Major Component, or to implement a Standard Interface for which an implementation is available to the public in source code form. A 

“Major Component”, in this context, means a major essential component (kernel, window system, and so on) of the specific operating 
system (if any) on which the executable work runs, or a compiler used to produce the work, or an object code interpreter used to run it. 

 

The “Corresponding Source” for a work in object code form means all the source code needed to generate, install, and (for an executable 

work) run the object code and to modify the work, including scripts to control those activities. However, it does not include the work's 

Summary of Contents for BioEntry P2

Page 1: ...English Version 1 24 BioEntry W2 INSTALLATION GUIDE www supremainc com EN 101 00 BEW2 V1 24A...

Page 2: ...P IP 11 TTL input connection 12 Relay connection 13 Fail Safe Lock 13 Fail Secure Lock 13 Automatic door connection 14 Connecting as a standalone 15 Connecting to Secure I O 2 16 Wiegand connection 17...

Page 3: ...t installation or repair of the product by the user free A S service will not be provided Operation Do not allowliquids suchas water beverages or chemicals get intothe product A fire electric shock or...

Page 4: ...es Deterioration in fingerprint authentication performance and a product failure may occur Whencleaningthe product wipe the product with a soft and dryclothand no water benzene or alcohol Otherwise a...

Page 5: ...Components Components may vary according to the installationenvironment Note BioEntry W2 Bracket PVC anchor 2 EA Fixing screw 2 EA Diode 1 EA 120 resistor 1 EA Drilling template Quick guide Ferrite c...

Page 6: ...ut cable Wiegand input or output cable Power cable RS485 cable Ethernet connector Relay output cable LEDlamp for Network Shows the status of the network connection Reset button Resets the network conf...

Page 7: ...te Pin Name Color 1 RLY NO Gray White stripe 2 RLY COM Green White stripe 3 RLY NC Orange White stripe 4 VB2 Blue Brown 5 VB1 Red Green 6 WG D0 Green 7 WG D1 White 8 WG GND Black 9 TTL IN 1 Brown 10 T...

Page 8: ...gain scan the fingerprint of a finger to be registered twice Cautions for enrolling afingerprint When a fingerprint is recognized it is compared with the initially registered fingerprint so the initia...

Page 9: ...sing fixing screws through the bracket to the position where BioEntryW2 will be installed If installing BioEntryW2 on a concrete wall drill holes insert PVC anchors and fixthem withfixing screws To av...

Page 10: ...Installation 10 2 Install BioEntryW2 onto the fixed bracket 3 Connect BioEntryW2 to the bracket by rotating the product fixing screw...

Page 11: ...ly adaptor you should use an adaptor with a current capacity which is the same or larger than the total power consumption required for the terminal and another device Use a separate power supply for S...

Page 12: ...utomatic MDI MDIX function so that it can be connected to a PC directly using a normal straight type CAT 5 cable not a cross cable TTL input connection BioEntry W2 9 TTL IN 1 Brown 10 TTL IN 0 Purple...

Page 13: ...or lock Fail Secure Lock In order to use the Fail Secure Lock connect N O relay as shown in the figure below There is normally no current flowing through the relay for the Fail Secure Lock When the cu...

Page 14: ...Installation 14 Automatic door connection BioEntry W2 Automatic door Controller Sensor Door Lock Door button 1 RLY NO Gray White stripe 2 RLY COM Green White stripe 2 1...

Page 15: ...of users and number of devices Also note that the number of slave devices affects the fingerprint authentication speed Amaster device can control 31slave devices The bandwidth of RS485 allows for upt...

Page 16: ...ices with the RS485 cable The slave devices are used as dummy readers and authentication is performed in the master device If Xpass is connected to the master device only card authenticationcan be use...

Page 17: ...RS 485 information 5 Turn the power off later on and then check the network setting is properly Restoring the Factory Defaults This will delete all data and root certificate on the device and reset th...

Page 18: ...00 dpi Template SUPREMA ISO 19794 2 ANSI 378 Extractor Matcher MINEX certified and compliant LFD Supported Capacity Max User 1 1 500 000 Max User 1 N 100 000 Max Template 1 1 1 000 000 Two templates p...

Page 19: ...Product specifications 19 Dimensions Unit mm 50 172 38 2 43 5 172 39 4 156 8...

Page 20: ...guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipm...

Page 21: ...uct names trademarks and registered trademarks are vested in each individual or organization that owns such rights Open Source License The software of this product is based on Linux Kernel 3 x which i...

Page 22: ...anizations To modify a work means to copy from or adapt all or part of the work in a fashion requiring copyright permission other than the making of an exact copy The resulting work is called a modifi...

Page 23: ...cation of the work as a means of enforcing against the work s users your or third parties legal rights to forbid circumvention of technological measures 4 ConveyingVerbatim Copies You may convey verba...

Page 24: ...vered work in that User Product from a modified version of its Corresponding Source The information must suffice to ensure that the continued functioning of the modified object code is in no case prev...

Page 25: ...eptance Not Required for HavingCopies You are not required to accept this License in order to receive or run a copy of the Program Ancillary propagation of a covered work occurring solely as a consequ...

Page 26: ...rder agreement or otherwise that contradict the conditions of this License they do not excuse you from the conditions of this License If you cannot convey a covered work so as to satisfy simultaneousl...

Page 27: ...xcluding any source code for portions of the CombinedWork that considered in isolation are based on the Application and not on the LinkedVersion The Corresponding Application Code for a CombinedWork m...

Page 28: ...ary as you received it specifies that a certain numbered version of the GNU Lesser General Public License or any later version applies to it you have the option of following the terms and conditions e...

Page 29: ...n binary form must reproduce the above copyright notice this list of conditions and the following disclaimer in the documentation and or other materials provided with the distribution 3 All advertisin...

Page 30: ...www supremainc com www supremainc com...

Reviews: