background image

Appendices

íë

“Additional permissions” are terms that supplement the terms of this License by making exceptions from one or more of its 
conditions. Additional permissions that are applicable to the entire Program shall be treated as though they were included in this 
License, to the extent that they are valid under applicable law. If additional permissions apply only to part of the Program, that 
part may be used separately under those permissions, but the entire Program remains governed by this License without regard 
to the additional permissions. 
When you convey a copy of a covered work, you may at your option remove any additional permissions from that copy, or from 
any part of it. (Additional permissions may be written to require their own removal in certain cases when you modify the work.) 
You may place additional permissions on material, added by you to a covered work, for which you have or can give appropriate 
copyright permission. 
 
Notwithstanding  any  other  provision  of  this  License,  for  material  you  add  to  a  covered  work,  you  may  (if  authorized  by  the 
copyright holders of that material) supplement the terms of this License with terms: 

 

a) Disclaiming warranty or limiting liability differently from the terms of sections 15 and 16 of this License; or

 

b) Requiring preservation of specified reasonable legal notices or author attributions in that material or in the Appropriate 
Legal Notices displayed by works containing it; or 

 

c)  Prohibiting  misrepresentation  of  the  origin  of  that  material,  or  requiring  that  modified  versions  of  such  material  be 
marked in reasonable ways as different from the original version; or 

 

d) Limiting the use for publicity purposes of names of licensors or authors of the material; or 

 

e) Declining to grant rights under trademark law for use of some trade names, trademarks, or service marks; or 

 

f)  Requiring  indemnification  of  licensors  and  authors  of  that  material  by  anyone  who  conveys  the  material  (or  modified 
versions of it) with contractual assumptions of liability to the recipient, for any liability that these contractual assumptions 
directly impose on those licensors and authors. 

 
All other non-permissive additional terms are considered “further restrictions” within the meaning of section 10. If the Program 
as you received it, or any part of it, contains a notice stating that it is governed by this License along with a term that is a further 
restriction, you may remove that term. If a license document contains a further restriction but permits relicensing or conveying 
under this License, you may add to a covered work material governed by the terms of that license document, provided that the 
further restriction does not survive such relicensing or conveying. 
 
If you add terms to a covered work in accord with this section, you must place, in the relevant source files, a statement of the 
additional terms that apply to those files, or a notice indicating where to find the applicable terms. 
 
Additional terms, permissive or non-permissive, may be stated in the form of a separately written license, or stated as exceptions; 
the above requirements apply either way. 
 

8. Termination. 

You may not propagate or modify a covered work except as expressly provided under this License. Any attempt otherwise to 
propagate  or  modify  it  is  void,  and  will  automatically  terminate  your  rights  under  this  License  (including  any  patent  licenses 
granted under the third paragraph of section 11). 
 
However,  if  you  cease  all  violation  of  this  License,  then  your  license  from  a  particular  copyright  holder  is  reinstated  (a) 
provisionally,  unless  and  until  the  copyright  holder  explicitly  and  finally  terminates  your  license,  and  (b)  permanently,  if  the 
copyright holder fails to notify you of the violation by some reasonable means prior to 60 days after the cessation. 
 
Moreover,  your  license  from  a  particular  copyright  holder  is  reinstated  permanently  if  the  copyright  holder  notifies  you  of  the 
violation by some reasonable means, this is the first time you have received notice of violation of this License (for any work) from 
that copyright holder, and you cure the violation prior to 30 days after your receipt of the notice. 
 
Termination of your rights under this section does not terminate the licenses of parties who have received copies or rights from 
you under this License. If your rights have been terminated and not permanently reinstated, you do not qualify to receive new 
licenses for the same material under section 10. 
 

9. Acceptance Not Required for Having Copies. 

You are not required to accept this License in order to receive or run a copy of the Program. Ancillary propagation of a covered 
work  occurring  solely  as  a  consequence  of  using  peer-to-peer  transmission  to  receive  a  copy  likewise  does  not  require 
acceptance. However, nothing other than this License grants you permission to propagate or modify any covered work. These 
actions infringe copyright if you do not accept this License. Therefore, by modifying or propagating a covered work, you indicate 
your acceptance of this License to do so. 
 

10. Automatic Licensing of Downstream Recipients. 

Each time you convey a covered work, the recipient automatically receives a license from the original licensors, to run, modify 
and  propagate  that  work,  subject  to  this  License.  You  are  not  responsible  for  enforcing  compliance  by  third  parties  with  this 
License. 
 
An “entity transaction” is a transaction transferring control of an organization, or substantially all assets of one, or subdividing an 
organization, or merging organizations. If propagation of a covered work results from an entity transaction, each party to that 

Содержание BioStation 2

Страница 1: ...BioStation 2 USER GUIDE EN 102 00 BS2 V1 38A Version 1 38 English...

Страница 2: ...Instructions 4 Getting Started 6 Administrator Menus 12 User Management 13 Authentication Configuration 15 System Setup 18 Check Event Log 25 Troubleshooting 27 Product Specifications 28 FCC Complianc...

Страница 3: ...Appendices 31...

Страница 4: ...ructions Be careful not to spill any liquid such as water drinks or chemicals inside the product This can cause fire electric shock or product damage Caution Ignoring these instructions may result in...

Страница 5: ...reful not to contaminate or damage the fingerprint reader with dirty hands or materials This can decrease performance or cause failures to read fingerprints Clean the product with a soft dry cloth Do...

Страница 6: ...Star Shaped instead of the product fixing screw for enhanced security For more information on installation visit the Suprema website www supremainc com to see the installation guide BioStation 2 Wall...

Страница 7: ...s the character type Changes the character type or selects a T A event Deletes numbers characters Inserts symbols or configures an item OK Selects an item or saves the settings Speaker Makes a sound L...

Страница 8: ...pin Connects a TTL input output cable Relay 3 pin Connects a relay cable Power 2 pin Connects the power cable DIP switch Turns on the termination resistor for the RS 485 interface To use the terminat...

Страница 9: ...RLY NO White 2 RLY COM Blue 3 RLY NC Orange RS 485 Pin Name Color 1 485 TRXP Blue 2 485 TRXN Yellow 3 485 GND Black 4 SH GND Gray TTL input output Pin Name Color 1 TTL IN0 OUT0 Red 2 TTL IN1 OUT1 Yell...

Страница 10: ...Getting Started Intercom Pin Name Color 1 INPH VDC Red 2 INPH GND Black 3 INPH AUD Orange 4 INPH DTA Blue 5 SH GND Gray...

Страница 11: ...scan again then remove your finger and place it again to scan You are required to scan the same finger twice for enrollment NOTE Precautions for enrolling fingerprints Enrolling fingerprints is the m...

Страница 12: ...anyone can access the menu just by pressing the ESC button Quick Menu 1 Press and hold the ESC button for more than one second and then release the button Next authenticate yourself as an administrat...

Страница 13: ...nt Card Registers cards for user authentication Scan the cards that you want to assign to users Press the ESC button if you do not want to register another card User Level Selects the privileges to as...

Страница 14: ...be displayed 4 Select the user you want to edit and press F2 Edit the information by referring to Adding User Information Press F3 and then the OK button to delete a user NOTE Access Group can be regi...

Страница 15: ...figured schedule For more information on configuring schedules see the BioStar 2 Administrator Guide Card A schedule can be configured for each authentication method using cards 1 Press the ESC button...

Страница 16: ...on or entering a PIN is required after entering an ID In this mode both fingerprint authentication and entering a PIN are required after entering an ID 4 Press OK to save the settings NOTE You can con...

Страница 17: ...to have the authentication speed configured according to the total fingerprint templates enrolled on the device Template Format Sets the fingerprint template format The default format is SUPREMA Be ca...

Страница 18: ...in seconds the LCD screen light stays on Menu Timeout Configures the time in seconds for the menu screen to automatically disappear If there is no button input for the specified period the display go...

Страница 19: ...th the server To synchronize the time with the server select Use Date Format Selects the date format You can select from among the YYYY MM DD MM DD YYYY or DD MM YYYY formats Time Format Selects the t...

Страница 20: ...e connected USB memory stick Press the buttons to select an item and press OK FW Upgrade If there are firmware files stored on the USB memory stick select the firmware file to use and press OK to upgr...

Страница 21: ...rtificate saved in the device 3 If you proceed to restore the defaults the device will restart NOTE When you reset the operator level will be reset as well After resetting make sure to set the operato...

Страница 22: ...level credential 2 Select DEVICE Secure Tamper then change the settings by pressing or 3 To save settings press OK Device Info Shows the model name device ID FW version and MAC address 1 Press the ESC...

Страница 23: ...P login password Port Enter the port number of the device DHCP Select whether or not to use DHCP If Disabled is selected the user can modify the IP Address IP Address Enter the IP address of the devic...

Страница 24: ...BioStar 2 installed You can enter the values when Device Server is selected for Connection Mode 4 Press OK to save the settings NOTE Press the number buttons to enter the values for Server IP and Ser...

Страница 25: ...OK 3 Select an item and press the buttons to change the condition If you press OK matching logs will be displayed on the screen 4 Press ESC to return to the previous screen Delete All Logs You can de...

Страница 26: ...k Event Log Check Log Usage Shows the status of the log usage 1 Press the ESC button then authenticate as an administrator 2 Go to EVENT LOG Log Usage then press OK 3 Press OK after checking the log u...

Страница 27: ...fingerprint recognition does not work Check whether the finger or the fingerprint sensor has sweat water or dust on it and then wipe it clear Try again after clearing the finger and the fingerprint s...

Страница 28: ...per finger Max Text Log 3 000 000 Interface Wi Fi Yes TCP IP Yes RS 485 1ch Host or Slave Selectable Wiegand 1ch Input 1ch Output TTL Input 2ch Inputs 2ch Outputs Relay 1 Relay USB USB 2 0 Host Relay...

Страница 29: ...Product Specifications Dimensions Unit mm...

Страница 30: ...iance and its antenna must not be co located or operation in conjunction with any other antenna or transmitter A minimum separation distance of 20 cm must be maintained between the antenna and the per...

Страница 31: ...uprema or a regional distributor Copyright Notice Suprema owns the copyright for this document The rights of other product names brands and trademarks belong to the individuals or organizations who ow...

Страница 32: ...to a free program could make it effectively proprietary To prevent this the GPL assures that patents cannot be used to render the program non free The precise terms and conditions for copying distrib...

Страница 33: ...material for which you do not control copyright Those thus making or running the covered works for you must do so exclusively on your behalf under your direction and control on terms that prohibit the...

Страница 34: ...re that it is available for as long as needed to satisfy these requirements e Convey the object code using peer to peer transmission provided you inform other peers where the object code and Correspon...

Страница 35: ...conveying If you add terms to a covered work in accord with this section you must place in the relevant source files a statement of the additional terms that apply to those files or a notice indicati...

Страница 36: ...ur recipient s use of the covered work in a country would infringe one or more identifiable patents in that country that you have reason to believe are valid If pursuant to or in connection with a sin...

Страница 37: ...HE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES 17 Interpretation of Sections 15 and 16 If the disclaimer of warran...

Страница 38: ...g Source 1 Use a suitable shared library mechanism for linking with the Library A suitable mechanism is one that a uses at run time a copy of the Library already present on the user s computer system...

Страница 39: ...t com All rights reserved This package is an SSL implementation written by Eric Young eay cryptsoft com The implementation was written so as to conform with Netscapes SSL This library is free for comm...

Страница 40: ...F THE POSSIBILITY OF SUCH DAMAGE The licence and distribution terms for any publically available version or derivative of this code cannot be changed i e this code cannot simply be copied and put unde...

Страница 41: ......

Отзывы: