MorphoAccess® VP Series - User Guide
Table
of figures
SSE-0000082427-01
M
ORPHO DOCUMENT
.
R
EPRODUCTION AND
D
ISCLOSURE
P
ROHIBITED
6
January 2011
Table of figures
Figure 1: Minutiae are classified in two categories: ridge ending and bifurcation .................................. 12
Figure 2: Vascular pattern image processing ............................................................................................ 13
Figure 3: areas of interest ......................................................................................................................... 16
Figure 4: Cross section of the acquisition area ......................................................................................... 17
Figure 5: Recommended fingers ............................................................................................................... 17
Figure 6 : MorphoAccess® VP Series terminal front view ......................................................................... 20
Figure 7: MorphoAccess® VP Series terminal rear view (connectors) ...................................................... 22
Figure 8: MorphoAccess® VP Series terminal front view, without bottom cover .................................... 23
Figure 9: MorphoAccess® VP Series terminal front USB port with a USB mass storage key .................... 25
Figure 10: MorphoAccess® VP Series terminal USB port with a Wi-Fi™ adapter ..................................... 26
Figure 11: Direct point to point Ethernet connection .............................................................................. 29
Figure 12: Connection, through an Ethernet switch ................................................................................. 30
Figure 13: Connection through a LAN ....................................................................................................... 31
Figure 14: USB Network Configuration Tool main window ...................................................................... 33
Figure 15: Build a setting file on a USB mass storage key ........................................................................ 34
Figure 16: Apply setting file to the MorphoAccess® terminal .................................................................. 34
Figure 17: Configuration of a MorphoAccess® terminal by a Host System .............................................. 38
Figure 18: MorphoAccess® configuration tool main window ................................................................... 39
Figure 19: Typical access control system architecture ............................................................................. 46
Figure 20: Recognition mode synthesis .................................................................................................... 49
Figure 21: Access control result = access granted .................................................................................... 51
Figure 22: Access control result = Access denied ..................................................................................... 51
Figure 23: Identification mode ................................................................................................................. 55
Figure 24: Contactless card presentation starts authentication process ................................................. 57
Figure 25: Authentication with user's fingerprints on contactless card ................................................... 62
Figure 26: Authentication with biometric check and database ................................................................ 64
Figure 27: Authentication without biometric check, and without User ID check .................................... 66
Figure 28: Authentication without biometric check, and without User ID check .................................... 68
Figure 29: Authentication process specified by user's card ..................................................................... 70
Figure 30 : Sample of user’s identifier which is included in a Wiegand frame ......................................... 74
Figure 31: Multi-factor mode (identification and authentication) ........................................................... 77
Figure 32: Proxy (slave) mode................................................................................................................... 80
Figure 33: PROXY sample with a remote Identification process .............................................................. 81
Figure 34: Anti-pulling switches ................................................................................................................ 87
Figure 35: Anti-tamper switches ............................................................................................................... 87
Figure 36: MorphoAccess® terminal internal relay .................................................................................. 92
Figure 37: Activation of internal relay by an external button (sample) ................................................... 94
Figure 38: Sending access control result message to a distant system .................................................... 97
Figure 39: LED IN feature ........................................................................................................................ 101