suprema FaceStation F2 Installation Manual Download Page 27

  Appendices 

27 

disclaim any intention to limit operation or modification of the work as a means of enforcing, against the work's users, 

your or third parties' legal rights to forbid circumvention of technological measures. 

 

4. Conveying Verbatim Copies. 

You may convey verbatim copies of the Program's source code as you receive it, in any medium, provided that you 

conspicuously and appropriately publish on each copy an appropriate copyright notice; keep intact all notices stating that 

this License and any non-permissive terms added in accord with section 7 apply to the code; keep intact all notices of the 

absence of any warranty; and give all recipients a copy of this License along with the Program. 

 

You may charge any price or no price for each copy that you convey, and you may offer support or warranty protection for 

a fee. 

 

5. Conveying Modified Source Versions. 

You may convey a work based on the Program, or the modifications to produce it from the Program, in the form of source 

code under the terms of section 4, provided that you also meet all of these conditions: 

 

 

a) The work must carry prominent notices stating that you modified it, and giving a relevant date. 

 

b) The work must carry prominent notices stating that it is released under this License and any conditions added 

under section 7. This requirement modifies the requirement in section 4 to “keep intact all notices”. 

 

c) You must license the entire work, as a whole, under this License to anyone who comes into possession of a copy. 

This License will therefore apply, along with any applicable section 7 additional terms, to the whole of the work, and 

all its parts, regardless of how they are packaged. This License gives no permission to license the work in any other 

way, but it does not invalidate such permission if you have separately received it. 

 

d) If the work has interactive user interfaces, each must display Appropriate Legal Notices; however, if the Program 

has interactive interfaces that do not display Appropriate Legal Notices, your work need not make them do so. 

 

A compilation of a covered work with other separate and independent works, which are not by their nature extensions of 

the covered work, and which are not combined with it such as to form a larger program, in or on a volume of a storage or 

distribution medium, is called an “aggregate” if the compilation and its resulting copyright are not used to limit the access 

or legal rights of the compilation's users beyond what the individual works permit. Inclusion of a covered work in an 

aggregate does not cause this License to apply to the other parts of the aggregate. 

 

6. Conveying Non-Source Forms. 

You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also convey 

the machine-readable Corresponding Source under the terms of this License, in one of these ways: 

 

a) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), 

accompanied by the Corresponding Source fixed on a durable physical medium customarily used for software 

interchange. 

 

b) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), 

accompanied by a written offer, valid for at least three years and valid for as long as you offer spare parts or 

customer support for that product model, to give anyone who possesses the object code either (1) a copy of the 

Corresponding Source for all the software in the product that is covered by this License, on a durable physical 

medium customarily used for software interchange, for a price no more than your reasonable cost of physically 

performing this conveying of source, or (2) access to copy the Corresponding Source from a network server at no 

charge. 

 

c) Convey individual copies of the object code with a copy of the written offer to provide the Corresponding Source. 

This alternative is allowed only occasionally and noncommercially, and only if you received the object code with such 

an offer, in accord with subsection 6b. 

 

d) Convey the object code by offering access from a designated place (gratis or for a charge), and offer equivalent 

access to the Corresponding Source in the same way through the same place at no further charge. You need not 

require recipients to copy the Corresponding Source along with the object code. If the place to copy the object code is 

a network server, the Corresponding Source may be on a different server (operated by you or a third party) that 

supports equivalent copying facilities, provided you maintain clear directions next to the object code saying where to 

find the Corresponding Source. Regardless of what server hosts the Corresponding Source, you remain obligated to 

ensure that it is available for as long as needed to satisfy these requirements. 

 

e) Convey the object code using peer-to-peer transmission, provided you inform other peers where the object code 

and Corresponding Source of the work are being offered to the general public at no charge under subsection 6d. 

 

A separable portion of the object code, whose source code is excluded from the Corresponding Source as a System 

Summary of Contents for FaceStation F2

Page 1: ...FaceStation F2 INSTALLATION GUIDE EN 101 00 FSF2_DB FSF2_AB V1 01A Version 1 01 English ...

Page 2: ... 13 Network connection 14 TCP IP 14 TTL input connection 15 Relay connection 16 Fail Safe Lock 16 Fail Secure Lock 16 Automatic door connection 17 Connecting as a standalone 18 Connecting to Secure I O 2 19 Wiegand connection 20 Product specifications 21 Dimensions 22 FCC compliance information 23 EU Declaration of Conformity CE 23 Appendices 24 Disclaimers 24 Copyright notice 24 Open Source Licen...

Page 3: ...y may occur If the product has been damaged due to independent installation or repair of the product by the user free A S service will not be provided Operation Do not allow liquids such as water beverages or chemicals get into the product A fire electric shock or product damage may occur Caution Noncompliance of instructions could lead to minor injury or product damage Installation Do not install...

Page 4: ...ct failure may occur When cleaning the product wipe the product with a soft and dry cloth and no water benzene or alcohol Otherwise a product failure may occur FaceStation F2 uses capacitive buttons If the environment is moist from wet weather or the product surface is smeared with a lot of water wipe off the product with a dry towel before using it RTC battery Replacing the battery with an incorr...

Page 5: ...bracket you can use the included bracket fixing screw Star Shaped instead of the product fixing screw for enhanced security FaceStation F2 Wall Bracket Fixing Screw x6 PVC Anchor x6 Diode Connection Cable 1x2 pin 1x3 pin 3x4 pin Drilling Template Quick Guide 120Ω resistor Open Source Software Guide Bracket Fixing Screw Star Shaped Cable Cover ...

Page 6: ...ual face image LCD screen Provides UI for operation RF card mobile access card authentication unit Part to scan the card for entrance Speaker Delivers sound Speaker USB Type C cable slot Relay 3 pins Visual camera SAM card slot Power Supply 2 pins RS 485 4 pins TTL Input 4 pins Wiegand Input Output 4 pins Ethernet RF card mobile access card authentication unit LCD screen Infrared camera LED lamp ...

Page 7: ...pins Connect the relay cable Wiegand input output 4 pins Connect the Wiegand input output cable Power supply 2 pins Connect the power supply cable RS 485 4 pins Connect the RS 485 cable SAM card slot Insert the SAM card SAM card slot is only supported in FSF2 DB USB Type C cable slot Connect the USB cable ...

Page 8: ...Pin Name Color 1 RLY NO White 2 RLY COM Blue 3 RLY NC Orange RS 485 Pin Name Color 1 485 TRXP Blue 2 485 TRXN Yellow 3 485 GND Black 4 SH GND Gray TTL input Pin Name Color 1 TTL IN0 Red 2 TTL IN1 Yellow 3 TTL GND Black 4 SH GND Gray Wiegand input and output Pin Name Color 1 WG D0 Green 2 WG D1 White 3 WG GND Black 4 SH GND Gray ...

Page 9: ...ul not to display two faces on the screen Register one person at a time If you do not follow the instructions on the screen the face registration may take longer or may fail Cautions for authenticating a face Ensure that the face appears in the center of the device s screen When the guideline is displayed follow the instructions shown on the screen to authenticate the face If a part of the face is...

Page 10: ...The optimal height for installing device is 127 cm Install the device where it does not reach the direct sunlight or UV light Adjust the installation position so that the face is not exposed to direct sunlight when a user tries to authenticate 2 Fix the bracket firmly using fixing screws through the bracket to the position where FaceStation F2 will be installed ...

Page 11: ...void RF interference a minimum separation distance must be maintained Wall thickness Distance 100 mm 200 mm 120 mm 180 mm 150 mm 150 mm When using Suprema Mobile Access install a minimum distance of 1 m between devices to avoid BLE interference 3 Install FaceStation F2 onto the fixed bracket Wall 300 mm Distance Wall thickness Wall Wall ...

Page 12: ...Installation 12 4 Connect FaceStation F2 to the bracket by rotating the product fixing screw of FaceStation F2 Wall ...

Page 13: ...uld be connected as close as possible to the power supply so that the length of the connecting cable is kept to a minimum If cable connections are made improperly it may cause the device to malfunction It is recommended to use a 16 AWG or 18 AWG cable if the FaceStation F2 is far from the power supply The connection distance may differ depending on the standard of the cable used and the installati...

Page 14: ... F2 has an automatic MDI MDIX function so that it can be connected to a PC directly using a normal straight type CAT 5e cable or a cross cable NOTE When you use a gigabit network switch please see below information Use a Cat5e UTP Unshielded Twisted Pair cable Use all 4 pairs 8 lines of cable for network connection DO NOT use the pair of cable for other purpose Hub FaceStation F2 PC FaceStation F2...

Page 15: ...Installation 15 TTL input connection Door sensor FaceStation F2 Door button Cable shield optional 1 TTL IN0 Red 2 TTL IN1 Yellow 3 TTL GND Black 4 SH GND Gray ...

Page 16: ...ys that can directly lock unlock doors without external controllers for added convenience For access control applications in need of security however it is NOT recommended to use the internal relay of a reader to prevent any tampering attacks which can potentially trigger the door unlock For such applications it is highly recommended to use a separate relay unit for a lock control such as Suprema ...

Page 17: ... that can directly lock unlock doors without external controllers for added convenience For access control applications in need of security however it is NOT recommended to use the internal relay of a reader to prevent any tampering attacks which can potentially trigger the door unlock For such applications it is highly recommended to use a separate relay unit for a lock control such as Suprema s ...

Page 18: ...aries according to the authentication method number of users and number of devices Also note that the number of slave devices affects the authentication speed A master device can control 31 slave devices The bandwidth of RS 485 allows for up to 7 fingerprint authentication devices to be connected Suprema s standalone intelligent readers contain internal relays that can directly lock unlock doors w...

Page 19: ... fingerprint authentication device is the master device FaceStation F2 cannot be added as a slave device When you connect FaceStation F2 as a slave device while FaceStation F2 is the master device only one FaceStation F2 can be added as a slave device If FaceStation F2 is configured as a slave device for the face recognition terminal you can connect one additional Secure I O 1 and DM 20 each If Fa...

Page 20: ...Installation 20 Wiegand connection RFID reader or Controller Cable shield optional FaceStation F2 Use as a Wiegand input or output device 1 WG D0 Green 2 WG D1 White 3 WG GND Black 4 SH GND Gray ...

Page 21: ...on Height 1 4 1 9m Matching speed Less than 0 5 sec Live Face Detection Supported Capacity Max User 1 1 Based on one face enrollment per user 100 000 Max User 1 N Based on one face enrollment per user Face 50 000 Card 100 000 Max Text Log 5 000 000 Max Image Log 50 000 Interface Ethernet 10 100 Mbps auto MDI MDI X RS 485 1ch Host or Slave Selectable Wiegand 1ch Input or 1ch Output Selectable TTL i...

Page 22: ...Product specifications 22 Dimensions Unit mm 98 4 233 233 119 8 23 5 ...

Page 23: ...e receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help Modifications not expressly approved by the manufacturer could void the user s authority to operate the equipment under FCC rules This appliance and i...

Page 24: ...ma accepts no responsibility for compatibility issues and any other problems arising from such compatibility issues If you wish to obtain the newest specifications before ordering the product contact Suprema through a Sales Representative or local distributor of Suprema Copyright notice The copyright of this document is vested in Suprema The rights of other product names trademarks and registered ...

Page 25: ... is fundamentally incompatible with the aim of protecting users freedom to change the software The systematic pattern of such abuse occurs in the area of products for individuals to use which is precisely where it is most unacceptable Therefore we have designed this version of the GPL to prohibit the practice for those products If such problems arise substantially in other domains we stand ready t...

Page 26: ...ion files associated with source files for the work and the source code for shared libraries and dynamically linked subprograms that the work is specifically designed to require such as by intimate data communication or control flow between those subprograms and other parts of the work The Corresponding Source need not include anything that users can regenerate automatically from other parts of th...

Page 27: ...at the individual works permit Inclusion of a covered work in an aggregate does not cause this License to apply to the other parts of the aggregate 6 Conveying Non Source Forms You may convey a covered work in object code form under the terms of sections 4 and 5 provided that you also convey the machine readable Corresponding Source under the terms of this License in one of these ways a Convey the...

Page 28: ...y documented and with an implementation available to the public in source code form and must require no special password or key for unpacking reading or copying 7 Additional Terms Additional permissions are terms that supplement the terms of this License by making exceptions from one or more of its conditions Additional permissions that are applicable to the entire Program shall be treated as thou...

Page 29: ...fy any covered work These actions infringe copyright if you do not accept this License Therefore by modifying or propagating a covered work you indicate your acceptance of this License to do so 10 Automatic Licensing of Downstream Recipients Each time you convey a covered work the recipient automatically receives a license from the original licensors to run modify and propagate that work subject t...

Page 30: ...e the covered work from you a discriminatory patent license a in connection with copies of the covered work conveyed by you or copies made from those copies or b primarily for and in connection with specific products or compilations that contain the covered work unless you entered into that arrangement or that patent license was granted prior to 28 March 2007 Nothing in this License shall be const...

Page 31: ...7 Interpretation of Sections 15 and 16 If the disclaimer of warranty and limitation of liability provided above cannot be given local legal effect according to their terms reviewing courts shall apply local law that most closely approximates an absolute waiver of all civil liability in connection with the Program unless a warranty or assumption of liability accompanies a copy of the Program in ret...

Page 32: ...e implementation was written so as to conform with Netscapes SSL This library is free for commercial and non commercial use as long as the following conditions are aheared to The following conditions apply to all code found in this distribution be it the RC4 RSA lhash DES etc code not just the SSL code The SSL documentation included with this distribution is covered by the same copyright terms exc...

Page 33: ...IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE The licence and distribution terms for any publically available version or derivative of this code cannot be changed i e this code cannot simply be copied and put under another distribution licence including the GNU Public Licence ...

Page 34: ...TION OF CONTRACT TORT OR OTHERWISE ARISING FROM OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE The code in third_party sike also carries the MIT license Copyright c Microsoft Corporation All rights reserved Permission is hereby granted free of charge to any person obtaining a copy of this software and associated documentation files the Software to deal in th...

Page 35: ...cense Source form shall mean the preferred form for making modifications including but not limited to software source code documentation source and configuration files Object form shall mean any form resulting from mechanical transformation or translation of a Source form including but not limited to compiled object code generated documentation and conversions to other media types Work shall mean ...

Page 36: ...nerated by the Derivative Works if and wherever such third party notices normally appear The contents of the NOTICE file are for informational purposes only and do not modify the License You may add Your own attribution notices within Derivative Works that You distribute alongside or as an addendum to the NOTICE text from the Work provided that such additional attribution notices cannot be constru...

Page 37: ...and or rights consistent with this License However in accepting such obligations You may act only on Your own behalf and on Your sole responsibility not on behalf of any other Contributor and only if You agree to indemnify defend and hold each Contributor harmless for any liability incurred by or claims asserted against such Contributor by reason of your accepting any such warranty or additional l...

Page 38: ...quiry sales_sys supremainc com 2020 Suprema Inc Suprema and identifying product names and numbers herein are registered trade marks of Suprema Inc All non Suprema brands and product names are trademarks or registered trademarks of their respective companies Product appearance build status and or specifications are subject to change without notice ...

Reviews: