suprema X-Station 2 XS2-APB User Manual Download Page 36

35

Appendices

c)  Convey individual copies of the object code with a copy of the written offer to provide the Corresponding Source. 

This alternative is allowed only occasionally and noncommercially, and only if you received the object code with 

such an offer, in accord with subsection 6b.

d)  Convey the object code by offering access from a designated place (gratis or for a charge), and offer equivalent 

access to the Corresponding Source in the same way through the same place at no further charge. You need not 

require recipients to copy the Corresponding Source along with the object code. If the place to copy the object 

code is a network server, the Corresponding Source may be on a different server (operated by you or a third party) 

that supports equivalent copying facilities, provided you maintain clear directions next to the object code saying 

where to find the Corresponding Source. Regardless of what server hosts the Corresponding Source, you remain 

obligated to ensure that it is available for as long as needed to satisfy these requirements.

e)  Convey the object code using peer-to-peer transmission, provided you inform other peers where the object code 

and Corresponding Source of the work are being offered to the general public at no charge under subsection 6d.

A separable portion of the object code, whose source code is excluded from the Corresponding Source as a System 

Library, need not be included in conveying the object code work.

A “User Product” is either (1) a “consumer product”, which means any tangible personal property which is normally 

used for personal, family, or household purposes, or (2) anything designed or sold for incorporation into a dwelling. 

In determining whether a product is a consumer product, doubtful cases shall be resolved in favor of coverage. For 

a particular product received by a particular user, “normally used” refers to a typical or common use of that class of 

product, regardless of the status of the particular user or of the way in which the particular user actually uses, or expects 

or is expected to use, the product. A product is a consumer product regardless of whether the product has substantial 

commercial, industrial or non-consumer uses, unless such uses represent the only significant mode of use of the 

product.

“Installation Information” for a User Product means any methods, procedures, authorization keys, or other information 

required to install and execute modified versions of a covered work in that User Product from a modified version of its 

Corresponding Source. The information must suffice to ensure that the continued functioning of the modified object 

code is in no case prevented or interfered with solely because modification has been made.

If you convey an object code work under this section in, or with, or specifically for use in, a User Product, and the 

conveying occurs as part of a transaction in which the right of possession and use of the User Product is transferred to 

the recipient in perpetuity or for a fixed term (regardless of how the transaction is characterized), the Corresponding 

Source conveyed under this section must be accompanied by the Installation Information. But this requirement does 

not apply if neither you nor any third party retains the ability to install modified object code on the User Product (for 

example, the work has been installed in ROM).

The requirement to provide Installation Information does not include a requirement to continue to provide support 

service, warranty, or updates for a work that has been modified or installed by the recipient, or for the User Product in 

which it has been modified or installed. Access to a network may be denied when the modification itself materially and 

adversely affects the operation of the network or violates the rules and protocols for communication across the network.

Corresponding Source conveyed, and Installation Information provided, in accord with this section must be in a format 

that is publicly documented (and with an implementation available to the public in source code form), and must require 

no special password or key for unpacking, reading or copying.

7.  Additional Terms.

“Additional permissions” are terms that supplement the terms of this License by making exceptions from one or more 

of its conditions. Additional permissions that are applicable to the entire Program shall be treated as though they were 

included in this License, to the extent that they are valid under applicable law. If additional permissions apply only to part 

of the Program, that part may be used separately under those permissions, but the entire Program remains governed by 

this License without regard to the additional permissions.

When you convey a copy of a covered work, you may at your option remove any additional permissions from that copy, 

or from any part of it. (Additional permissions may be written to require their own removal in certain cases when you 

modify the work.) You may place additional permissions on material, added by you to a covered work, for which you 

have or can give appropriate copyright permission.

Notwithstanding any other provision of this License, for material you add to a covered work, you may (if authorized by 

the copyright holders of that material) supplement the terms of this License with terms:

a)   Disclaiming warranty or limiting liability differently from the terms of sections 15 and 16 of this License; or
b)  Requiring preservation of specified reasonable legal notices or author attributions in that material or in the 

Appropriate Legal Notices displayed by works containing it; or

Summary of Contents for X-Station 2 XS2-APB

Page 1: ...X Station 2 USER GUIDE Version 1 03 English EN 102 00 XS2 V1 03A...

Page 2: ...ication 13 Auth Mode 13 Modifying Auth Mode 13 Delete Auth Mode 14 Add Auth Mode 14 Operation 14 QR Barcode Operation 15 T A Mode 15 Display Sound 16 Network 17 Network Settings 17 Ethernet 17 Server...

Page 3: ...liance information 30 EU Declaration of Conformity CE 30 Appendices 31 Disclaimers 31 Copyright notice 31 Open Source License 32 GNU General Public License 32 TERMS AND CONDITIONS 33 BoringSSL License...

Page 4: ...soot or a gas leak This may result in electric shock or fire Install the product in a well ventilated and cool place away from direct sunlight to prevent overheating when installing it outside Do not...

Page 5: ...product to maintain the water resistant and dust resistant features IP65 rating It is recommended to use the enclosure if the product is installed outside The product may malfunction if the water resi...

Page 6: ...nstructions RTC battery Discard the battery according to the appropriate regional or international waste regulations Discard the battery according to the appropriate regional or international waste re...

Page 7: ...Terminal Open Source Software Linux Kernel GPL BoringSSL Original SSLeay AOSP Apache 306 00 V1 00A G Cable Cover Shrink Tube Quick Guide Open Source Software Guide Components may vary according to the...

Page 8: ...UI for operation RF card and mobile access card authentication unit Part to scan a RFID card or mobile access card for entrance QR code Barcode authentication unit Part to scan a QR code or barcode f...

Page 9: ...IN0 Purple 13 TTL IN1 Brown RS 485 15 485 GND White Black stripe 17 485 TRXN Yellow Black stripe 19 485 TRXP Blue White stripe Wiegand 21 WG D1 White 22 WG D0 Green 20 WG GND Black Relay 18 RLY NO Gra...

Page 10: ...towards the QR Barcode code authentication unit and place the guide beam at the center of the QR code When authenticating with the QR code barcode downloaded to your smartphone adjust the brightness...

Page 11: ...in Menu Admin Menu All Menus 1 Press and authenticate with the Admin level credential 2 Select the desired menu If the administrator has not been designated the menu screen will be displayed when you...

Page 12: ...the card which will be assigned to the user To register an additional card press again You can issue QR codes only on BioStar 2 PIN Enter the PIN you wish to use Enter the PIN you wish to use and then...

Page 13: ...press OK To delete a user select and then press OK Access Group can be registered in BioStar 2 For detailed contents regarding registering an access group refer to the BioStar 2 Administrator Manual...

Page 14: ...u press available credentials to be added will be displayed on the screen 5 Set the desired auth mode and select a schedule Category Description Card QR Code Mode to use a card or QR code only Mode to...

Page 15: ...ress and authenticate with the Admin level credential 2 Press AUTHENTICATION and then modify items below Operation Face Detection When you set Face Detection X Station 2 can detect real face and authe...

Page 16: ...how to register T A Mode 1 Press and authenticate with the Admin level credential 2 Press AUTHENTICATION and then modify items below T A Mode 3 Select and set the desired item T A Mode Set the method...

Page 17: ...server the device does not display a message when authentication is successful even if Server Private Msg is enabled on the device Screen Saver Set this option to use the screen saver feature It redu...

Page 18: ...to use DHCP If DHCP setting is disabled the user can modify Port IP Address Gateway Subnet Mask and DNS Device Port Set the device port IP Address View the IP address of the device To modify disable...

Page 19: ...2 is installed Input is accepted only when Device Server is set for Connection Mode Server URL Enter server URL instead of Server IP Input is accepted only when Device Server is set for Connection Mod...

Page 20: ...utton is connected Switch Select the relay type N O or N C Date Time You can set the open time and the input port of the exit button in the device 1 Press and authenticate with the Admin level credent...

Page 21: ...ct DEVICE Daylight Saving Time and press to add additional daylight saving time 3 Select the desired item and change the setting Name Set the name of daylight saving time Start Month Start Week Start...

Page 22: ...ticate with the Admin level credential 2 Select DEVICE Device Info You can view the information including Model Name Device ID Serial No HW FW Kernel and MAC Memory Info View the status of memory usag...

Page 23: ...ferent type of USB memory the function may not operate normally Samsung Electronics SUM LSB 8 GB SUM PSB 8 GB SUM PSB 16 GB SUM BSG 32 GB LG Electronics XTICK J3 WINDY 8 GB SMART USB MU1 White 8 GB MU...

Page 24: ...can reset all settings except network settings Press OK to reset all settings except network settings Factory Default You can delete all the information saved in the device and the root certificate a...

Page 25: ...logs appear 3 Press to search a specific log and change the condition 4 Press OK A log that matches the condition will be displayed on the screen Delete All Logs You can delete all saved logs 1 Press...

Page 26: ...Event Log View Log Usage You can check the status of log usage 1 Press and authenticate with the Admin level credential 2 Select EVENT LOG You can check the capacity of event and image logs on the dev...

Page 27: ...QR code barcode Refer to How to scan a QR code barcode and try again Place the guide beam at the center of the QR code Adjust the brightness of your smartphone so that the device can read the QR code...

Page 28: ...ture 40 C 70 C Operating humidity 0 80 non condensing Storage humidity 0 90 non condensing Camera type CMOS 2M pixels Camera resolution 1600 x 1200 Dimension W x H x D XS2 DPB XS2 APB 82 mm x 159 mm x...

Page 29: ...t pots are pulled up with 4 7 k Wiegand output VOH More than 4 8 V Wiegand output VOL Less than 0 2 V Wiegand output Pull up resistance Internally pulled up with 1 k Relay 2 A 30 VDC Resistive load 1...

Page 30: ...29 Product specifications Dimensions XS2 QAPB XS2 QDPB Unit mm 203 82 35 2 196 69 6 XS2 APB XS2 DPB 159 82 27 2 152 5 69 6...

Page 31: ...eceiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer...

Page 32: ...and expenses and reasonable attorney fees arising out of directly or indirectly any claim of personal injury or death associated with such unintended or unauthorized use even if such claim alleges tha...

Page 33: ...pieces of it in new free programs and that you know you can do these things To protect your rights we need to prevent others from denying you these rights or asking you to surrender the rights Theref...

Page 34: ...r a particular programming language one that is widely used among developers working in that language The System Libraries of an executable work include anything other than the work as a whole that a...

Page 35: ...that you modified it and giving a relevant date b The work must carry prominent notices stating that it is released under this License and any conditions added under section 7 This requirement modifi...

Page 36: ...e modification has been made If you convey an object code work under this section in or with or specifically for use in a User Product and the conveying occurs as part of a transaction in which the ri...

Page 37: ...m a particular copyright holder is reinstated permanently if the copyright holder notifies you of the violation by some reasonable means this is the first time you have received notice of violation of...

Page 38: ...t license to some of the parties receiving the covered work authorizing them to use propagate modify or convey a specific copy of the covered work then the patent license you grant is automatically ex...

Page 39: ...PLICABLE LAW EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE PROGRAM AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIM...

Page 40: ...r in the documentation and or other materials provided with the distribution 3 All advertising materials mentioning features or use of this software must display the following acknowledgment This prod...

Page 41: ...ed are not cryptographic related 4 If you include any Windows specific code or a derivative thereof from the apps directory application code you must include an acknowledgement This product includes s...

Page 42: ...OF ANY KIND EXPRESS OR IMPLIED INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS B...

Page 43: ...ion of the Work and any modifications or additions to that Work or Derivative Works thereof that is intentionally submitted to Licensor for inclusion in the Work by the copyright owner or by an indivi...

Page 44: ...ut any additional terms or conditions Notwithstanding the above nothing herein shall supersede or modify the terms of any separate license agreement you may have executed with Licensor regarding such...

Page 45: ...ames and numbers herein are registered trade marks of Suprema Inc All non Suprema brands and product names are trademarks or registered trademarks of their respective companies Product appearance buil...

Reviews: