background image

  Appendices 

24 

case of interfaces specified for a particular programming language, one that is widely used among developers working in that 

language. 

 

The “System Libraries” of an executable work include anything, other than the work as a whole, that (a) is included in the normal 

form of packaging a Major Component, but which is not part of that Major Component, and (b) serves only to enable use of the 

work with that Major Component, or to implement a Standard Interface for which an implementation is available to the public in 

source code form. A “Major Component”, in this context, means a major essential component (kernel, window system, and so 

on) of the specific operating system (if any) on which the executable work runs, or a compiler used to produce the work, or an 

object code interpreter used to run it. 

 

The “Corresponding Source” for a work in object code form means all the source code needed to generate, install, and (for an 

executable work) run the object code and to modify the work, including scripts to control those activities. However, it does not 

include the work's System Libraries, or general-purpose tools or generally available free programs which are used unmodified in 

performing those activities but which are not part of the work. For example, Corresponding Source includes interface definition 

files associated with source files for the work, and the source code for shared libraries and dynamically linked subprograms that 

the work is specifically designed to require, such as by intimate data communication or control flow between those subprograms 

and other parts of the work. 

 

The Corresponding Source need not include anything that users can regenerate automatically from other parts of the 

Corresponding Source. 

 

The Corresponding Source for a work in source code form is that same work. 

 

2. Basic Permissions. 

All rights granted under this License are granted for the term of copyright on the Program, and are irrevocable provided the 

stated conditions are met. This License explicitly affirms your unlimited permission to run the unmodified Program. The output 

from running a covered work is covered by this License only if the output, given its content, constitutes a covered work. This 

License acknowledges your rights of fair use or other equivalent, as provided by copyright law. 

 

You may make, run and propagate covered works that you do not convey, without conditions so long as your license otherwise 

remains in force. You may convey covered works to others for the sole purpose of having them make modifications exclusively 

for you, or provide you with facilities for running those works, provided that you comply with the terms of this License in 

conveying all material for which you do not control copyright. Those thus making or running the covered works for you must do 

so exclusively on your behalf, under your direction and control, on terms that prohibit them from making any copies of your 

copyrighted material outside their relationship with you. 

 

Conveying under any other circumstances is permitted solely under the conditions stated below. Sublicensing is not allowed; 

section 10 makes it unnecessary. 

 

3. Protecting Users' Legal Rights From Anti-Circumvention Law. 

No covered work shall be deemed part of an effective technological measure under any applicable law fulfilling obligations under 

article 11 of the WIPO copyright treaty adopted on 20 December 1996, or similar laws prohibiting or restricting circumvention of 

such measures. 

 

When you convey a covered work, you waive any legal power to forbid circumvention of technological measures to the extent 

such circumvention is effected by exercising rights under this License with respect to the covered work, and you disclaim any 

intention to limit operation or modification of the work as a means of enforcing, against the work's users, your or third parties' 

legal rights to forbid circumvention of technological measures. 

 

4. Conveying Verbatim Copies. 

You may convey verbatim copies of the Program's source code as you receive it, in any medium, provided that you 

conspicuously and appropriately publish on each copy an appropriate copyright notice; keep intact all notices stating that this 

License and any non-permissive terms added in accord with section 7 apply to the code; keep intact all notices of the absence of 

any warranty; and give all recipients a copy of this License along with the Program. 

 

You may charge any price or no price for each copy that you convey, and you may offer support or warranty protection for a fee. 

 

5. Conveying Modified Source Versions. 

You may convey a work based on the Program, or the modifications to produce it from the Program, in the form of source code 

under the terms of section 4, provided that you also meet all of these conditions: 

 

 

a) The work must carry prominent notices stating that you modified it, and giving a relevant date. 

 

b) The work must carry prominent notices stating that it is released under this License and any conditions added under 

section 7. This requirement modifies the requirement in section 4 to “keep intact all notices”. 

 

c) You must license the entire work, as a whole, under this License to anyone who comes into possession of a copy. This 

License will therefore apply, along with any applicable section 7 additional terms, to the whole of the work, and all its parts, 

Summary of Contents for BioStation L2

Page 1: ...BioStation L2 INSTALLATION GUIDE EN 101 00 BSL2 V1 14A Version 1 14 English...

Page 2: ...Network connection 12 TCP IP 12 TTL connection 13 TTL input connection 13 Relay connection 14 Fail Safe Lock 14 Fail Secure Lock 14 Automatic door connection 15 Connecting as a standalone 16 Connectin...

Page 3: ...ll not be provided Operation Do not allow liquids such as water beverages or chemicals get into the product A fire electric shock or product damage may occur Caution Noncompliance of instructions coul...

Page 4: ...rty hand or foreign substances Deterioration in fingerprint authentication performance and a product failure may occur When cleaning the product wipe the product with a soft and dry cloth and no water...

Page 5: ...ding to the installation environment BioStation L2 Wall Bracket Fixing Screw x2 PVC Anchor x2 Diode Connection Cable 2 pins 1 EA 3 pins 1 EA 4 pins 4 EA Ferrite Core Drilling Template Quick Guide 120...

Page 6: ...sound Fingerprint authentication unit Part to scan the fingerprint for entrance RF card authentication unit Part to scan the card for entrance TTL input 4 pins Connect the TTL input cable RS 485 4 pi...

Page 7: ...in Name Color 1 RLY NO White 2 RLY COM Blue 3 RLY NC Orange RS 485 Pin Name Color 1 485 TRXP Blue 2 485 TRXN Yellow 3 485 GND Black 4 SH GND Gray TTL input Pin Name Color 1 TTL IN0 Red 2 TTL IN1 Yello...

Page 8: ...Introduction 8 Ethernet Pin Name Color 1 ENET RXN Yellow 2 ENET RXP Green 3 ENET TXN Red 4 ENET TXP Black...

Page 9: ...beep sound scan the fingerprint of the registered finger again scan the fingerprint of a finger to be registered twice NOTE Cautions for enrolling a fingerprint When a fingerprint is recognized it is...

Page 10: ...fixing screws through the bracket to the position where BioStation L2 will be installed NOTE If installing BioStation L2 on a concrete wall drill holes insert PVC anchors and fix them with fixing scr...

Page 11: ...Installation 11 2 Install BioStation L2 onto the fixed bracket 3 Connect BioStation L2 to the bracket by rotating the product fixing screw of BioStation L2...

Page 12: ...than the total power consumption required for the terminal and another device Use a separate power supply for Secure I O 2 the electric lock and the BioStation L2 respectively If connecting and using...

Page 13: ...MDIX function so that it can be connected to a PC directly using a normal straight type CAT 5 cable not a cross cable TTL connection TTL input connection Door sensor BioStation L2 1 TTL IN0 Red 2 TTL...

Page 14: ...pply for BioStation L2 and the door lock Fail Secure Lock In order to use the Fail Secure Lock connect N O relay as shown in the figure below There is normally no current flowing through the relay for...

Page 15: ...Installation 15 Automatic door connection BioStation L2 Automatic door control device Detection sensor 1 RLY NO White 2 RLY COM Blue Door button Door lock...

Page 16: ...tion method number of users and number of devices Also note that the number of slave devices affects the fingerprint authentication speed A master device can control 31 slave devices The bandwidth of...

Page 17: ...e slave devices with the RS485 cable The slave devices are used as dummy readers and authentication is performed in the master device If Xpass is connected to the master device only card authenticatio...

Page 18: ...Installation 18 Wiegand connection 1 WG D0 Green 2 WG D1 White 3 WG GND Black 4 SH GND Gray RFID reader Control device BioStation L2 Use as a Wiegand input output device Cable shield optional...

Page 19: ...ixels Image bit depth 8bit 256 grayscale Resolution 500 dpi Template SUPREMA ISO 19794 2 ANSI 378 Extractor Matcher MINEX certified and compliant LFD Supported Capacity Max User 1 1 500 000 Max User 1...

Page 20: ...Product specifications 20 Dimensions Unit mm 201 71 44 158 52 171 7 34...

Page 21: ...guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equip...

Page 22: ...ore ordering the product contact Suprema through a Sales Representative or local distributor of Suprema Copyright notice The copyright of this document is vested in Suprema The rights of other product...

Page 23: ...nd use of software on general purpose computers but in those that do we wish to avoid the special danger that patents applied to a free program could make it effectively proprietary To prevent this th...

Page 24: ...provide you with facilities for running those works provided that you comply with the terms of this License in conveying all material for which you do not control copyright Those thus making or runnin...

Page 25: ...what server hosts the Corresponding Source you remain obligated to ensure that it is available for as long as needed to satisfy these requirements e Convey the object code using peer to peer transmis...

Page 26: ...rovided that the further restriction does not survive such relicensing or conveying If you add terms to a covered work in accord with this section you must place in the relevant source files a stateme...

Page 27: ...y relying means you have actual knowledge that but for the patent license your conveying the covered work in a country or your recipient s use of the covered work in a country would infringe one or mo...

Page 28: ...RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY O...

Page 29: ...NU GPL for conveying Corresponding Source 1 Use a suitable shared library mechanism for linking with the Library A suitable mechanism is one that a uses at run time a copy of the Library already prese...

Page 30: ...ginal SSLeay License Copyright C 1995 1998 Eric Young eay cryptsoft com All rights reserved This package is an SSL implementation written by Eric Young eay cryptsoft com The implementation was written...

Page 31: ...WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE The licence and distribution terms for any publically available version or derivative of this code cannot be chan...

Page 32: ...nquiry sales supremainc com 2018 Suprema Inc Suprema and identifying product names and numbers herein are registered trade marks of Suprema Inc All non Suprema brands and product names are trademarks...

Reviews: