![Gallagher MorphoAccess Sigma Lite Скачать руководство пользователя страница 4](http://html1.mh-extra.com/html/gallagher/morphoaccess-sigma-lite/morphoaccess-sigma-lite_installation-manual_3292941004.webp)
MorphoAccess Installation Guide | Edition 11 | April 2019
Copyright © Gallagher Group Limited
Page 4
1
Introduction
The term biometric operation refers to the process of evaluating a biometric sample, (e.g. a person’s
fingerprint or finger vein) for the purpose of authenticating a person’s identity. Typically, a biometric
sample is taken from a person and compared with one or more previously-captured biometric samples,
called templates, to determine or verify that person’s identity. The Biometric Integration feature provides
the ability for Morpho biometric readers to be connected to Gallagher Command Centre and configured
as hardware items, for the purpose of biometric identification.
There are a number of procedures that make up the process for configuring Biometric Integration, both
within Gallagher Command Centre and externally from the Gallagher Command Centre system, (e.g.
physically installing and configuring MorphoAccess readers).
This document covers the entire configuration process from start to finish.
2
Biometric categories
Biometric operations fall into one of two different categories depending on how many templates a
person's biometric sample is compared with during the operation, as follows:
Biometric Identification:
When a person's biometric sample, (e.g. their fingerprint or finger vein), is compared against all
the fingerprints/veins in a database to determine who that person is, the biometric operation is
called "biometric identification" because it has been used to identify who that person is.
Biometric Verification:
When a person identifies themselves prior to the biometric operation, (e.g. badging their card),
and then the biometric operation is used to verify that the person is in fact who they say they
are, this is called "biometric verification". This is done by comparing the biometric sample
presented with just one template that has been previously identified as belonging to that
person.
If a site chooses to control access by way of biometric identification (as opposed to biometric
verification), then there is no need for a Cardholder to carry or use a card. However, if a site chooses to
control access by way of biometric verification, then typically these Cardholders will carry a card that they
will use to first identify themselves prior to a biometric operation verifying they are who they say they
are.
3
Morpho Biometric Readers
Morpho Biometric Readers can capture a fingerprint/vein from a Cardholder and compare it with a
biometric template to determine how closely it matches. The results of that biometric operation can then
be used to determine with more certainty that the cardholder is who they say they are.
Some Morpho Biometric Readers can also store biometric templates. These readers have one or more
internal databases and the number of templates they can store depends on the model of reader. The
different models range from having just one database that can store templates for 500 Cardholders, up to
the high-end model which has 16 databases, each capable of storing templates for 3,000 Cardholders – a
total of 48,000 Cardholders. These readers can store two biometric templates per Cardholder, which
means a Cardholder can use either one of two fingers to gain access. It does not mean the readers are
capable of evaluating both fingers as part of one biometric operation.