36
DOCUMENT SSE-0000077399-01 - V
Access control presentation
–
This mode is used when the whole access right check process is fully monitored
by an external device (such as a PC). It means that the local access control
application of the terminal is not used, but only the biometric features
(identification, authentification) and the user input/output features (the
contactless card reader). In that case, the access control application is in the
external device.
Figure 4 • 7:Proxy mode
Section
gives more information about remote
management.
Please refer to
MorphoAccess
®
Host System Interface Specification
for a
complete description of TCP orders possibilities.
Proxy order:
•
Identification
•
Verification
•
Relay activation
•
Read card
•
...
Содержание MorphoAccess J-Bio
Страница 13: ...SECTION 1 INTRODUCTION...
Страница 19: ...SECTION 2 TERMINAL PRESENTATION...
Страница 25: ...SECTION 3 TERMINAL CONFIGURATION...
Страница 39: ...SECTION 4 STAND ALONE MODES NETWORKED OR NOT...
Страница 49: ...SECTION 5 ACCESS CONTROL BY IDENTIFICATION...
Страница 53: ...SECTION 6 ACCESS CONTROL BY AUTHENTIFICATION...
Страница 67: ...SECTION 7 PROXY MODE...
Страница 71: ...SECTION 8 TERMINAL CUSTOMIZATION...
Страница 89: ...SECTION 9 MAN MACHINE INTERFACE...
Страница 103: ...SECTION 10 APPENDIX...
Страница 115: ...SECTION 11 SUPPORT...