Techsphere VP-II X User Manual Download Page 1

Hand Vascular Pattern Recognition System 

 

 

 

 

 
 

 

 

User’s Manual

 

 

VP-II X 

Hand Vascular Pattern Recognition System 

 

Summary of Contents for VP-II X

Page 1: ...Hand Vascular Pattern Recognition System 1 User s Manual VP II X Hand Vascular Pattern Recognition System ...

Page 2: ...d RS485 and or RS232 can be also supported as an option VP II X runs either as a stand alone system or on a TCP IP based network and provides various interfaces to external systems through TCP IP Wiegand RS232 and RS485 The application software running on a server is also provided Customer Service To add or extend the configuration of installed products or required repairs and maintenance please c...

Page 3: ... 1 User Type 15 2 2 User Manager Enrolment 16 2 2 1 Enrollment options 16 3 Deletion 18 3 1 Delete Installer 18 3 2 Delete Users 18 4 Verification 19 4 1 Manager Verification 19 4 2 Password User Verification 20 4 3 Job Code Input 20 4 4 Verification With a Card Number 20 4 5 Verification With a Function Key 20 4 6 Verification With Duress Code 20 4 7 Installer Verification 21 5 Modifying User Inf...

Page 4: ...d Input Settings 32 3 4 Sleep Mode 33 3 5 Tamper Switch Setting 33 3 6 DB Search Option 33 4 UI Settings 34 4 1 Language Settings 34 4 2 Sound Settings 34 4 3 PIN Display Option 34 5 Card Settings 35 5 1 Wiegand Settings 35 5 1 1 Wiegand Output 35 5 1 2 Set Wiegand Format 35 5 1 3 Wiegand Output Options 36 5 2 Mifare iClass Card 37 5 3 PACS System Settings 39 6 Tools 40 6 1 Report 40 6 2 Diagnosti...

Page 5: ...release V1 1 December 10 2009 U S and Canada customer service contact Techsphere Corporation Formatted to letter size V1 2 April 01 2010 Internal management purpose V1 3 June 09 2010 Changed all related VP II X images Added new functions by the firmware app 0 1 14 v56 ...

Page 6: ...6 Chapter 1 Overview 1 VP II X Scanner Display Display USB port Keypad RF Antenna Hand input indicator Trigger switch Speaker Handle Status indicator Date Time ...

Page 7: ... set proper network parameters to run the VP II X in a network environment Refer to Chapter 3 1 Network Setup for details on network setup 2 1 Master Slave Operation When multiple VP II X units are networked one unit has to be configured to a master unit while other units are configured to slaves A server on which the VP II X application software NetControl X runs can be also configured as a maste...

Page 8: ...hout a server computer it is recommended that the application software NetControl X running on a server be used in order to utilize the enhanced features of the VP II X system such as detailed User management anti pass back events etc Below figure shows a typical network configuration with multiple units of VP II X and the NetControl X Master Slave Slave Slave DBMS NetControl X Slave ...

Page 9: ...tance Rate Up to 0 0001 FRR False Rejection Rate 0 1 Changeable 5 levels 1 Highest accuracy 5 the level can be individually set to each Users or to the unit Usability 99 98 Usability Percentage of the entire population who is able to use the system accurately Speed 0 4sec verification 0 4sec 2 times for enrollment Liveness Detection HCD Human Criteria Decision algorithm Non human materials are not...

Page 10: ...Users database Up to 500 000 logs User transactions and or system events Firmware GUI Font etc storage USB 2 0 USB Memory device Firmware upgrade DB transfer Can be activated only when authorized by an administrator Optional use Wireless LAN External key board Card Module Card reader module installed inside Optional 125Khz Prox reader 13 5Mhz Mifare DESFire TWIC PIV 13 5Mhz HID iClass Only one typ...

Page 11: ... your feet to the left of the Scanner so that your arm is naturally straight towards to the Scanner Insert your middle finger between the two guide bars all the way in until contact is made with the webbing in between your fingers Please do not make a fist with your hand Just relax your hand and rest it gently on the guide bar Press the trigger switch gently by raising your wrist smoothly up to th...

Page 12: ... completed Only a PIN is allowed to be used for Installer and no cards are allowed to be used for enrolling an Installer while both cards and PIN are allowed to enrol Manager s 1 3 Test Mode Test Mode is a factory default set when the VP II X is delivered Under Test Mode the VP II X brings a menu allowing an installer to be enrolled as a Manager each time the VP II X starts up As this means that a...

Page 13: ...he ESC key is used to escape from the menu or cancel the settings You can also directly enter a number key to select a menu if indexed with a number 1 7 Menu Tree VP II X Manager Menu 1 User Management 1 Enroll User 2 Delete User 3 Edit User 4 Template Management 5 Delete Installer 6 Smart Card Update 2 Operational Settings 1 Mode Setting 2 Test Mode 3 Keypad Input Settings 4 Sleep Mode 5 Tamper S...

Page 14: ...nguage Settings 2 Sound Settings 3 PIN Display Option 5 Card Settings 1 Wiegand Settings 2 Mifare Card 3 HID iClass Card 4 PACS Settings 6 Tools 1 Report 2 Diagnostic Tools 1 Network Diagnostics 2 Network Info 3 Soft Reset ...

Page 15: ...Users Managers can be enrolled with a PIN Proximity card smart card or password PIN User Users enrolled with a PIN Personal Identification Number from 2 to 24 digits Prox Card User Users enrolled with a proximity card Wiegand code of a card is used as the PIN Smart Card User Users enrolled with a smart card HID Mifare DESFire PIV TWIC etc In this case the vascular data is stored on a card and or a...

Page 16: ... steps shown on the display It will first ask you to enter a PIN from 2 to 24 digits or present a card Proximity or smart card and then place a hand This process is required to take place twice in order to make sure that the entered ID and vascular data are accurate 2 2 1 Enrollment options User Class Select User or Manager to enroll Multiple Managers can be enrolled Level Security level Select a ...

Page 17: ... level System Level and it can be individually assigned to each User s Personal Security Level When verifying a User the VP II X uses either Personal Security Level if assigned or System Level if the Personal Security Level is not assigned to the User TEST This function gives the User an opportunity to check if the enrollment has been properly made If you execute TEST it will start a verification ...

Page 18: ...unit in the network at the same time you should use NetControl X software 3 2 Delete Users Delete User This function is to delete a single User Enter the Users PIN or present the Users card to be deleted Follow the steps as displayed to complete deletion Only Users can be deleted Managers cannot be directly deleted from this menu In order to delete a Manager its User class has to be changed to a U...

Page 19: ...anager F2 Password Verification F3 Job Code for Time and Attendance or F4 to allow User to enter their card number instead of presenting their card Select the appropriate F Key for the desired operation please refer to the following instructions 4 1 Manager Verification To verify a Manager 1 enter a Manager PIN or present a Manager card 2 press F1 key to proceed with Manager verification and 3 pla...

Page 20: ...at To verify with a card number 1 enter the card number using the keypad 2 press F4 to proceed with card number verification and 3 place a hand 4 5 Verification With a Function Key Function keys are typically used for time and attendance purposes If used Users are required to press a function prior to entering a PIN or presenting a card VP II X sends the function key information none F1 F2 F3 or F...

Page 21: ...r 1 Press ENT key twice 2 Enter an Installer PIN and 3 Place a hand When the ENT key is entered twice a message indicating Installer verification appears above the PIN input screen as shown below Note There is no Wiegand output or door open signal sent when an Installer verifies 5 Modifying User Information 5 1 Edit User User information of enrolled Users can be modified using this function Go to ...

Page 22: ... a Start time the User will not be allowed to gain access until the set time comes By default every User is immediately allowed to use the system right from the time of enrollment unless the Start time is specified In the same manner if the Expired Time is set once expired the User cannot access the system even though the User data still exists in the database Password This is used to assign a pas...

Page 23: ...d with Please make sure that the master unit is in operation if this function is being performed on a slave unit If the master unit is not able to be connected to on the network this function will not work as the slave cannot update the User data to the database in the master The Template number shows the number of enrolled vascular data templates It means only one template is enrolled if only 1 i...

Page 24: ...To manually set an IP address make sure that all network parameters are properly set and there are no IP conflicts in the network It is also strongly recommended that you test TCP IP communication status using the ping command from a server Status This shows the network parameters currently set IP address Subnet mask and Gateway An IP address 128 0 0 1 factory default will be shown if the IP addre...

Page 25: ...Master The master periodically monitors the database of slaves to synchronize it with the database in the master This guarantees that the slave s database is synchronized with master s database and verification can be made at any slave even if there is no network connectivity The master performs this operation in the interval in minutes set here The range of synchronization time is from 20 to 1440...

Page 26: ...cular patterns the user s present their hand to a slave device the slave will communicate to a master VP II X or server where the enrolled template is stored to verify their hand Please refer to Chapter 3 3 6 for instructions to set the verification location to Only Network 1 4 Slave List This function is only available for master units You can check add or delete the list of slaves being managed ...

Page 27: ...ate the firmware s in this folder And then execute Search USB after plugging the USB device in the VP II X USB port Refer to Chapter 1 1 VP II X Scanner It will automatically search the firmware and perform upgrade if available USB Driver Techsphere VP IIX Firmware The firmware s must be in the folder indicated above Otherwise the VP II X will not locate it to perform the upgrade 2 3 VP Set Securi...

Page 28: ...ber of times the system retries if a hand verification fails the default is 2 it can be adjusted from 2 to 5 times 2 4 Door Settings The VP II X system is capable of controlling doors with its controller without using a PACS Physical Access Control System The following menu is to set or change the parameters required to control a door Controller This is to select a controller being used for door c...

Page 29: ...for each function key accordingly As an example if F1 is unselected in this menu the VP II X will not open the door for a successful verification of a User who pressed F1 prior to entering a PIN This option is to satisfy the requirement for time and attendance applications where customers do not want a door to be open when verifying for punch in out using function keys Pairing For security reasons...

Page 30: ...l User transaction records and system logs will be deleted 2 7 Door lock Setting When the VP II XG is used as the door controller the door lock is used for closing or opening the door In this case the door lock system has a built in sensor to control the door but in some cases the door lock may not have this sensor If this is the case the VP II XG can provide the signal to the door lock for openin...

Page 31: ...d as an exit reader When VP II X AUX port is set to Wiegand Input the VP II X will work in bypass mode and will check only the following user verification options 1 User Expiration Date 2 User Activation and 3 Gate Time zone Please refer to Chapter 4 2 2 Ports and Connection to get more details on the differences Wiegand and AUX Manager Menu 3 System Settings 9 AUX Settings ...

Page 32: ... the Test Mode it can be recovered in this menu If you re access this menu after releasing the Test Mode with Enable recovery function selected it will ask Do you want to recover test mode to re establish the Test Mode However if you un select Enable recovery function when releasing the Test Mode the unit must be sent back to the factory or to a Techsphere sales representative to recover the Test ...

Page 33: ...tamper switch has opened It is recommended that you disable this function when taking the VP II X off the wall for maintenance purpose 3 6 DB Search Option A Manager can set the sequence of database searches local network or both The default is to firstly search the User data from the local database and secondly from the network Master s database if it failed to retrieve the data form the local da...

Page 34: ...ven different sounds are available Voice Voice messages are supported for some operations such as Verification success It can be enabled or disabled 4 3 PIN Display Option Factory default is not to display the PIN being entered by a User It can be changed to show the number being entered Manager Menu 4 UI Settings 1 PIN Display Option Manager Menu 4 UI Settings 1 Sound Settings Manager Menu 4 UI S...

Page 35: ... 3 5 1 3 Wiegand Output Options VP II X is also capable of outputting a Wiegand code for verification failure and or an emergency case with a duress code 5 1 2 Set Wiegand Format Bits Length Set both the total bit length 26 128 and site code bit length 0 32 then the bit length for PIN shall be automatically generated The Wiegand format being generated by the VP II X for PIN Users is as follow Bit ...

Page 36: ...parity calculation 5 1 3 Wiegand Output Options VP II X can also output a Wiegand code for verification failure and emergency notification duress code In order for PACS Physical Access Control System to recognize the difference for these codes a separate site code needs to be assigned for each Output Enable Site Code Value Description PIN Success 0 65535 A site code to be used for verification suc...

Page 37: ...onal information is stored in the card but can be also stored in the system memory if desired Supported Card Types Mifare 1K 4K DESFire HID iClass 16K 16 16K 2 32K 16K 2 16K 1 32K 16K 16 16K 1 Set the parameters required to access the card accordingly using the following menu Reader Status This shows the status of a reader module In the above example there is not reader module installed as it says...

Page 38: ...D from the database Customer Key Setting The VP II X uses a key to encrypt the data stored in a smart card For security reasons customers should assign a unique key to be utilized for their VP II X devices The key is stored in both VP II X and the card and the key in the card must be matched to that in the VP II X to be accepted This prevents unauthorized cards such as one issued by another custom...

Page 39: ...d Connections Detection Level Detection Time A detection level signal will be sent from PACS system to VP II X The detection ime is the expected time when the PACS system will respond to the VP II X VP II X can be configured to detect a signal of 0V or 5V Timeout The timeout setting sets the time the VP II X will wait for the signal from the PACS A minimum required time of 50ms is required if VP I...

Page 40: ...st packets to the device that s IP address is specified After about 10 seconds the VP II X will display the result By using this tool a manager can determine whether there is problem with their network configuration 6 2 2 Network Info This shows the current network information settings such as IP address Subnet mask Gateway Server IP Master IP and port A manager can view this information to determ...

Page 41: ...hout the need to unplug power cord in the back Socket Restart The VP II X will reset and restart all related network protocols with the scanner Soft Reset When a manager wants to reboot the system this function can be used It will reboot the system Manager Menu 6 Tools 3 Soft Reset ...

Page 42: ...are files can be downloaded to the VP II X using the Download function of the VP II XConfig software It is useful for upgrading firmware to multiple VP II X units at the same time without needing to physically go to the VP II X units The XConfig software is included in the NetControl X application software package or it can be separately provided upon request Please refer to the NetControl X User ...

Page 43: ...e message The VP II X will also show the progress status while downloading and will reboot automatically after writing the firmware to the flash memory The power of VP II X must be kept on in order to write complete firmware to its memory Removing power while upgrading firmware may hang up the system due to incomplete firmware installation ...

Page 44: ... can degrade verification performance Locating Bracket and Scanner Install the VP II X at a height of 1 010 1 045mm from the floor and 100mm from the doorframe If there is a nearby wall perpendicular to the door the VP II X should be at least 200mm away from the wall in order for Users to be able to stand properly to place hands Put the bracket in place for installing the VP II X and make a hole a...

Page 45: ...dation of the VP II X If using an external power source supply the power to the EXT PWR port The input power must be DC 12V 5 with 1 5A or more current source Improper use of power supply may cause irreparable damage to the system or may degrade performance USB This USB port is used for only production purpose for test and or initial factory set It cannot be used by a customer LAN An Ethernet cabl...

Page 46: ...nput verification failure success output to use as an external indicator such as large LED or lamps etc However these functions are not included in the standard product and will be provided with a customized firmware upon request SERIAL A B Serial port A is used for connecting the VP II XG door controller Connections are as follows Serial port B is reserved for future uses RS 485 In case that the ...

Page 47: ...orted file name is event_bak db that can be opened by the VP Report application The figure below shows an example of a report Using this application Managers can view transaction details including user management events such as User Enrolment User Deletion and User Verification For a complete audit trail of all system events and diagnosis tools Techsphere strongly recommend s that customer to inst...

Page 48: ...r 1 Check server setting in the Manager menu 2 Check your server status 3 Contact network administrator Disconnected Master Device 1 Check master device setting in Manager menu 2 Check the status of master device 3 Contact your network administrator Tamper Switch Warning 1 Check VP II X status 2 Reset VP II X on the wall or check the Tamper Switch menu in a Manager menu 3 Check that Tamper Switch ...

Reviews: