suprema BioEntry P2 Installation Manual Download Page 23

  Appendices 

23 

System Libraries, or general-purpose tools or generally available free programs which are used unmodified in performing those activities 

but which are not part of the work. For example, Corresponding Source includes interface definition files associated with source files for the 

work, and the source code for shared libraries and dynamically linked subprograms that the work is specifically designed to require, such as 

by intimate data communication or control flow between those subprograms and other parts of the work. 

 
The Corresponding Source need not include anything that users can regenerate automatically from other parts of the Corresponding 

Source. 

 

The Corresponding Source for a work in source code form is that same work. 

 

2. Basic Permissions. 

All rights granted under this License are granted for the term of copyright on the Program, and are irrevocable provided the stated 

conditions are met. This License explicitly affirms your unlimited permission to run the unmodified Program. The output from running a 
covered work is covered by this License only if the output, given its content, constitutes a covered work. This License acknowledges your 

rights of fair use or other equivalent, as provided by copyright law. 

 

You may make, run and propagate covered works that you do not convey, without conditions so long as your license otherwise remains in 

force. You may convey covered works to others for the sole purpose of having them make modifications exclusively for you, or provide you 

with facilities for running those works, provided that you comply with the terms of this License in conveying all material for which you do 

not control copyright. Those thus making or running the covered works for you must do so exclusively on your behalf, under your direction 
and control, on terms that prohibit them from making any copies of your copyrighted material outside their relationship with you. 

 

Conveying under any other circumstances is permitted solely under the conditions stated below. Sublicensing is not allowed; section 10 

makes it unnecessary. 

 

3. Protecting Users' Legal Rights From Anti-Circumvention Law. 

No covered work shall be deemed part of an effective technological measure under any applicable law fulfilling obligations under article 11 

of the WIPO copyright treaty adopted on 20 December 1996, or similar laws prohibiting or restricting circumvention of such measures. 
 

When you convey a covered work, you waive any legal power to forbid circumvention of technological measures to the extent such 

circumvention is effected by exercising rights under this License with respect to the covered work, and you disclaim any intention to limit 

operation or modification of the work as a means of enforcing, against the work's users, your or third parties' legal rights to forbid 

circumvention of technological measures. 

 

4. Conveying Verbatim Copies. 

You may convey verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and 
appropriately publish on each copy an appropriate copyright notice; keep intact all notices stating that this License and any non-permissive 

terms added in accord with section 7 apply to the code; keep intact all notices of the absence of any warranty; and give all recipients a copy 

of this License along with the Program. 

 

You may charge any price or no price for each copy that you convey, and you may offer support or warranty protection for a fee. 

 

5. Conveying Modified Source Versions. 

You may convey a work based on the Program, or the modifications to produce it from the Program, in the form of source code under the 
terms of section 4, provided that you also meet all of these conditions: 

 

 

a) The work must carry prominent notices stating that you modified it, and giving a relevant date. 

 

b) The work must carry prominent notices stating that it is released under this License and any conditions added under section 7. This 
requirement modifies the requirement in section 4 to “keep intact all notices”. 

 

c) You must license the entire work, as a whole, under this License to anyone who comes into possession of a copy. This License will 

therefore apply, along with any applicable section 7 additional terms, to the whole of the work, and all its parts, regardless of how 

they are packaged. This License gives no permission to license the work in any other way, but it does not invalidate such permission if 
you have separately received it. 

 

d) If the work has interactive user interfaces, each must display Appropriate Legal Notices; however, if the Program has interactive 

interfaces that do not display Appropriate Legal Notices, your work need not make them do so. 

 

A compilation of a covered work with other separate and independent works, which are not by their nature extensions of the covered work, 
and which are not combined with it such as to form a larger program, in or on a volume of a storage or distribution medium, is called an 

“aggregate” if the compilation and its resulting copyright are not used to limit the access or legal rights of the compilation's users beyond 

what the individual works permit. Inclusion of a covered work in an aggregate does not cause this License to apply to the other parts of the 

aggregate. 

 

6. Conveying Non-Source Forms. 

You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also convey the machine-

readable Corresponding Source under the terms of this License, in one of these ways: 

 

a) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by the 

Summary of Contents for BioEntry P2

Page 1: ...English Version 1 24 BioEntry W2 INSTALLATION GUIDE www supremainc com EN 101 00 BEW2 V1 24A...

Page 2: ...P IP 11 TTL input connection 12 Relay connection 13 Fail Safe Lock 13 Fail Secure Lock 13 Automatic door connection 14 Connecting as a standalone 15 Connecting to Secure I O 2 16 Wiegand connection 17...

Page 3: ...t installation or repair of the product by the user free A S service will not be provided Operation Do not allowliquids suchas water beverages or chemicals get intothe product A fire electric shock or...

Page 4: ...es Deterioration in fingerprint authentication performance and a product failure may occur Whencleaningthe product wipe the product with a soft and dryclothand no water benzene or alcohol Otherwise a...

Page 5: ...Components Components may vary according to the installationenvironment Note BioEntry W2 Bracket PVC anchor 2 EA Fixing screw 2 EA Diode 1 EA 120 resistor 1 EA Drilling template Quick guide Ferrite c...

Page 6: ...ut cable Wiegand input or output cable Power cable RS485 cable Ethernet connector Relay output cable LEDlamp for Network Shows the status of the network connection Reset button Resets the network conf...

Page 7: ...te Pin Name Color 1 RLY NO Gray White stripe 2 RLY COM Green White stripe 3 RLY NC Orange White stripe 4 VB2 Blue Brown 5 VB1 Red Green 6 WG D0 Green 7 WG D1 White 8 WG GND Black 9 TTL IN 1 Brown 10 T...

Page 8: ...gain scan the fingerprint of a finger to be registered twice Cautions for enrolling afingerprint When a fingerprint is recognized it is compared with the initially registered fingerprint so the initia...

Page 9: ...sing fixing screws through the bracket to the position where BioEntryW2 will be installed If installing BioEntryW2 on a concrete wall drill holes insert PVC anchors and fixthem withfixing screws To av...

Page 10: ...Installation 10 2 Install BioEntryW2 onto the fixed bracket 3 Connect BioEntryW2 to the bracket by rotating the product fixing screw...

Page 11: ...ly adaptor you should use an adaptor with a current capacity which is the same or larger than the total power consumption required for the terminal and another device Use a separate power supply for S...

Page 12: ...utomatic MDI MDIX function so that it can be connected to a PC directly using a normal straight type CAT 5 cable not a cross cable TTL input connection BioEntry W2 9 TTL IN 1 Brown 10 TTL IN 0 Purple...

Page 13: ...or lock Fail Secure Lock In order to use the Fail Secure Lock connect N O relay as shown in the figure below There is normally no current flowing through the relay for the Fail Secure Lock When the cu...

Page 14: ...Installation 14 Automatic door connection BioEntry W2 Automatic door Controller Sensor Door Lock Door button 1 RLY NO Gray White stripe 2 RLY COM Green White stripe 2 1...

Page 15: ...of users and number of devices Also note that the number of slave devices affects the fingerprint authentication speed Amaster device can control 31slave devices The bandwidth of RS485 allows for upt...

Page 16: ...ices with the RS485 cable The slave devices are used as dummy readers and authentication is performed in the master device If Xpass is connected to the master device only card authenticationcan be use...

Page 17: ...RS 485 information 5 Turn the power off later on and then check the network setting is properly Restoring the Factory Defaults This will delete all data and root certificate on the device and reset th...

Page 18: ...00 dpi Template SUPREMA ISO 19794 2 ANSI 378 Extractor Matcher MINEX certified and compliant LFD Supported Capacity Max User 1 1 500 000 Max User 1 N 100 000 Max Template 1 1 1 000 000 Two templates p...

Page 19: ...Product specifications 19 Dimensions Unit mm 50 172 38 2 43 5 172 39 4 156 8...

Page 20: ...guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipm...

Page 21: ...uct names trademarks and registered trademarks are vested in each individual or organization that owns such rights Open Source License The software of this product is based on Linux Kernel 3 x which i...

Page 22: ...anizations To modify a work means to copy from or adapt all or part of the work in a fashion requiring copyright permission other than the making of an exact copy The resulting work is called a modifi...

Page 23: ...cation of the work as a means of enforcing against the work s users your or third parties legal rights to forbid circumvention of technological measures 4 ConveyingVerbatim Copies You may convey verba...

Page 24: ...vered work in that User Product from a modified version of its Corresponding Source The information must suffice to ensure that the continued functioning of the modified object code is in no case prev...

Page 25: ...eptance Not Required for HavingCopies You are not required to accept this License in order to receive or run a copy of the Program Ancillary propagation of a covered work occurring solely as a consequ...

Page 26: ...rder agreement or otherwise that contradict the conditions of this License they do not excuse you from the conditions of this License If you cannot convey a covered work so as to satisfy simultaneousl...

Page 27: ...xcluding any source code for portions of the CombinedWork that considered in isolation are based on the Application and not on the LinkedVersion The Corresponding Application Code for a CombinedWork m...

Page 28: ...ary as you received it specifies that a certain numbered version of the GNU Lesser General Public License or any later version applies to it you have the option of following the terms and conditions e...

Page 29: ...n binary form must reproduce the above copyright notice this list of conditions and the following disclaimer in the documentation and or other materials provided with the distribution 3 All advertisin...

Page 30: ...www supremainc com www supremainc com...

Reviews: