background image

  Appendices 

23 

When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure 

that you have the freedom to distribute copies of free software (and charge for them if you wish), that you receive source code or 

can get it if you want it, that you can change the software or use pieces of it in new free programs, and that you know you can do 

these things. 

 

To protect your rights, we need to prevent others from denying you these rights or asking you to surrender the rights. Therefore, 

you have certain responsibilities if you distribute copies of the software, or if you modify it: responsibilities to respect the 

freedom of others. 

 

For example, if you distribute copies of such a program, whether gratis or for a fee, you must pass on to the recipients the same 

freedoms that you received. You must make sure that they, too, receive or can get the source code. And you must show them 

these terms so they know their rights. 

 

Developers that use the GNU GPL protect your rights with two steps: (1) assert copyright on the software, and (2) offer you this 

License giving you legal permission to copy, distribute and/or modify it. 

 

For the developers' and authors' protection, the GPL clearly explains that there is no warranty for this free software. For both 

users' and authors' sake, the GPL requires that modified versions be marked as changed, so that their problems will not be 

attributed erroneously to authors of previous versions. 

 

Some devices are designed to deny users access to install or run modified versions of the software inside them, although the 

manufacturer can do so. This is fundamentally incompatible with the aim of protecting users' freedom to change the software. 

The systematic pattern of such abuse occurs in the area of products for individuals to use, which is precisely where it is most 

unacceptable. Therefore, we have designed this version of the GPL to prohibit the practice for those products. If such problems 

arise substantially in other domains, we stand ready to extend this provision to those domains in future versions of the GPL, as 

needed to protect the freedom of users. 

 

Finally, every program is threatened constantly by software patents. States should not allow patents to restrict development and 

use of software on general-purpose computers, but in those that do, we wish to avoid the special danger that patents applied to 

a free program could make it effectively proprietary. To prevent this, the GPL assures that patents cannot be used to render the 

program non-free. 

The precise terms and conditions for copying, distribution and modification follow. 

 

TERMS AND CONDITIONS 

0. Definitions. 

“This License” refers to version 3 of the GNU General Public License. 

 

“Copyright” also means copyright-like laws that apply to other kinds of works, such as semiconductor masks. 

 

“The Program” refers to any copyrightable work licensed under this License. Each licensee is addressed as “you”. “Licensees” 

and “recipients” may be individuals or organizations. 

 

To “modify” a work means to copy from or adapt all or part of the work in a fashion requiring copyright permission, other than the 

making of an exact copy. The resulting work is called a “modified version” of the earlier work or a work “based on” the earlier 

work. 

 

A “covered work” means either the unmodified Program or a work based on the Program. 

 

To “propagate” a work means to do anything with it that, without permission, would make you directly or secondarily liable for 

infringement under applicable copyright law, except executing it on a computer or modifying a private copy. Propagation 

includes copying, distribution (with or without modification), making available to the public, and in some countries other 

activities as well. 

 

To “convey” a work means any kind of propagation that enables other parties to make or receive copies. Mere interaction with a 

user through a computer network, with no transfer of a copy, is not conveying. 

 

An interactive user interface displays “Appropriate Legal Notices” to the extent that it includes a convenient and prominently 

visible feature that (1) displays an appropriate copyright notice, and (2) tells the user that there is no warranty for the work 

(except to the extent that warranties are provided), that licensees may convey the work under this License, and how to view a 

copy of this License. If the interface presents a list of user commands or options, such as a menu, a prominent item in the list 

meets this criterion. 

 

1. Source Code. 

The “source code” for a work means the preferred form of the work for making modifications to it. “Object code” means any non-

source form of a work. 

 

A “Standard Interface” means an interface that either is an official standard defined by a recognized standards body, or, in the 

Содержание BioStation L2

Страница 1: ...BioStation L2 INSTALLATION GUIDE EN 101 00 BSL2 V1 14A Version 1 14 English...

Страница 2: ...Network connection 12 TCP IP 12 TTL connection 13 TTL input connection 13 Relay connection 14 Fail Safe Lock 14 Fail Secure Lock 14 Automatic door connection 15 Connecting as a standalone 16 Connectin...

Страница 3: ...ll not be provided Operation Do not allow liquids such as water beverages or chemicals get into the product A fire electric shock or product damage may occur Caution Noncompliance of instructions coul...

Страница 4: ...rty hand or foreign substances Deterioration in fingerprint authentication performance and a product failure may occur When cleaning the product wipe the product with a soft and dry cloth and no water...

Страница 5: ...ding to the installation environment BioStation L2 Wall Bracket Fixing Screw x2 PVC Anchor x2 Diode Connection Cable 2 pins 1 EA 3 pins 1 EA 4 pins 4 EA Ferrite Core Drilling Template Quick Guide 120...

Страница 6: ...sound Fingerprint authentication unit Part to scan the fingerprint for entrance RF card authentication unit Part to scan the card for entrance TTL input 4 pins Connect the TTL input cable RS 485 4 pi...

Страница 7: ...in Name Color 1 RLY NO White 2 RLY COM Blue 3 RLY NC Orange RS 485 Pin Name Color 1 485 TRXP Blue 2 485 TRXN Yellow 3 485 GND Black 4 SH GND Gray TTL input Pin Name Color 1 TTL IN0 Red 2 TTL IN1 Yello...

Страница 8: ...Introduction 8 Ethernet Pin Name Color 1 ENET RXN Yellow 2 ENET RXP Green 3 ENET TXN Red 4 ENET TXP Black...

Страница 9: ...beep sound scan the fingerprint of the registered finger again scan the fingerprint of a finger to be registered twice NOTE Cautions for enrolling a fingerprint When a fingerprint is recognized it is...

Страница 10: ...fixing screws through the bracket to the position where BioStation L2 will be installed NOTE If installing BioStation L2 on a concrete wall drill holes insert PVC anchors and fix them with fixing scr...

Страница 11: ...Installation 11 2 Install BioStation L2 onto the fixed bracket 3 Connect BioStation L2 to the bracket by rotating the product fixing screw of BioStation L2...

Страница 12: ...than the total power consumption required for the terminal and another device Use a separate power supply for Secure I O 2 the electric lock and the BioStation L2 respectively If connecting and using...

Страница 13: ...MDIX function so that it can be connected to a PC directly using a normal straight type CAT 5 cable not a cross cable TTL connection TTL input connection Door sensor BioStation L2 1 TTL IN0 Red 2 TTL...

Страница 14: ...pply for BioStation L2 and the door lock Fail Secure Lock In order to use the Fail Secure Lock connect N O relay as shown in the figure below There is normally no current flowing through the relay for...

Страница 15: ...Installation 15 Automatic door connection BioStation L2 Automatic door control device Detection sensor 1 RLY NO White 2 RLY COM Blue Door button Door lock...

Страница 16: ...tion method number of users and number of devices Also note that the number of slave devices affects the fingerprint authentication speed A master device can control 31 slave devices The bandwidth of...

Страница 17: ...e slave devices with the RS485 cable The slave devices are used as dummy readers and authentication is performed in the master device If Xpass is connected to the master device only card authenticatio...

Страница 18: ...Installation 18 Wiegand connection 1 WG D0 Green 2 WG D1 White 3 WG GND Black 4 SH GND Gray RFID reader Control device BioStation L2 Use as a Wiegand input output device Cable shield optional...

Страница 19: ...ixels Image bit depth 8bit 256 grayscale Resolution 500 dpi Template SUPREMA ISO 19794 2 ANSI 378 Extractor Matcher MINEX certified and compliant LFD Supported Capacity Max User 1 1 500 000 Max User 1...

Страница 20: ...Product specifications 20 Dimensions Unit mm 201 71 44 158 52 171 7 34...

Страница 21: ...guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equip...

Страница 22: ...ore ordering the product contact Suprema through a Sales Representative or local distributor of Suprema Copyright notice The copyright of this document is vested in Suprema The rights of other product...

Страница 23: ...nd use of software on general purpose computers but in those that do we wish to avoid the special danger that patents applied to a free program could make it effectively proprietary To prevent this th...

Страница 24: ...provide you with facilities for running those works provided that you comply with the terms of this License in conveying all material for which you do not control copyright Those thus making or runnin...

Страница 25: ...what server hosts the Corresponding Source you remain obligated to ensure that it is available for as long as needed to satisfy these requirements e Convey the object code using peer to peer transmis...

Страница 26: ...rovided that the further restriction does not survive such relicensing or conveying If you add terms to a covered work in accord with this section you must place in the relevant source files a stateme...

Страница 27: ...y relying means you have actual knowledge that but for the patent license your conveying the covered work in a country or your recipient s use of the covered work in a country would infringe one or mo...

Страница 28: ...RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY O...

Страница 29: ...NU GPL for conveying Corresponding Source 1 Use a suitable shared library mechanism for linking with the Library A suitable mechanism is one that a uses at run time a copy of the Library already prese...

Страница 30: ...ginal SSLeay License Copyright C 1995 1998 Eric Young eay cryptsoft com All rights reserved This package is an SSL implementation written by Eric Young eay cryptsoft com The implementation was written...

Страница 31: ...WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE The licence and distribution terms for any publically available version or derivative of this code cannot be chan...

Страница 32: ...nquiry sales supremainc com 2018 Suprema Inc Suprema and identifying product names and numbers herein are registered trade marks of Suprema Inc All non Suprema brands and product names are trademarks...

Отзывы: