DOCUMENT SSE-0000077399-01 - V
31
–
Access control presentation
S
TAN
D
ALO
N
E
MO
DES
(
N
ETW
OR
KE
D
OR
NO
T
)
S
TA
ND
ALO
N
E
MO
DES
(
NE
TW
OR
KED
OR
NO
T
)
S
TA
ND
ALON
E
MO
DE
S
(
NETW
O
RK
ED
OR
NO
T
)
S
TA
ND
ALO
N
E
MO
DES
(
NE
TW
ORK
ED
OR
NO
T
)
S
TA
N
D
ALO
N
E
MO
DE
S
(
NE
TW
OR
KE
D
OR
NOT
)
S
TA
ND
ALO
N
E
MO
DE
S
(
N
ETW
OR
KE
D
OR
NO
T
)
3. Access control presentation
Typical access control system
Typical architecture includes, at least one MorphoAccess
®
, a Host System (for
enrolment) and a Central Security Controller (for area access final check, and
physical access command).
Figure 4 • 3:Typical access control system architecture
MorphoAccess
®
J Series biometric database management
The management of the MorphoAccess
®
internal biometric database can be
done remotely by a Host System (typically a PC with MEMS
TM
application).
MorphoAccess
®
operating mode
The MorphoAccess
®
works according two exclusive operating modes.
•
In Stand Alone Mode, the biometric database can be managed by a Host
System and downloaded to the MorphoAccess
®
.
•
In Proxy Mode, the terminal is remotely operated by a host system
application that sends individual commands to the MorphoAccess
®
.
MorphoAccess
®
access control result sending
When the biometric identification is positive, the person ID can be sent to a
Central Security Controller, for further action such as opening doors.
Содержание MorphoAccess J-Bio
Страница 13: ...SECTION 1 INTRODUCTION...
Страница 19: ...SECTION 2 TERMINAL PRESENTATION...
Страница 25: ...SECTION 3 TERMINAL CONFIGURATION...
Страница 39: ...SECTION 4 STAND ALONE MODES NETWORKED OR NOT...
Страница 49: ...SECTION 5 ACCESS CONTROL BY IDENTIFICATION...
Страница 53: ...SECTION 6 ACCESS CONTROL BY AUTHENTIFICATION...
Страница 67: ...SECTION 7 PROXY MODE...
Страница 71: ...SECTION 8 TERMINAL CUSTOMIZATION...
Страница 89: ...SECTION 9 MAN MACHINE INTERFACE...
Страница 103: ...SECTION 10 APPENDIX...
Страница 115: ...SECTION 11 SUPPORT...