background image

  Appendices 

25 

regardless of how they are packaged. This License gives no permission to license the work in any other way, but it does not 

invalidate such permission if you have separately received it. 

 

d) If the work has interactive user interfaces, each must display Appropriate Legal Notices; however, if the Program has 

interactive interfaces that do not display Appropriate Legal Notices, your work need not make them do so. 

 

A compilation of a covered work with other separate and independent works, which are not by their nature extensions of the 

covered work, and which are not combined with it such as to form a larger program, in or on a volume of a storage or distribution 

medium, is called an “aggregate” if the compilation and its resulting copyright are not used to limit the access or legal rights of 

the compilation's users beyond what the individual works permit. Inclusion of a covered work in an aggregate does not cause 

this License to apply to the other parts of the aggregate. 

 

6. Conveying Non-Source Forms. 

You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also convey the 

machine-readable Corresponding Source under the terms of this License, in one of these ways: 

 

a) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied 

by the Corresponding Source fixed on a durable physical medium customarily used for software interchange. 

 

b) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied 

by a written offer, valid for at least three years and valid for as long as you offer spare parts or customer support for that 

product model, to give anyone who possesses the object code either (1) a copy of the Corresponding Source for all the 

software in the product that is covered by this License, on a durable physical medium customarily used for software 

interchange, for a price no more than your reasonable cost of physically performing this conveying of source, or (2) access 

to copy the Corresponding Source from a network server at no charge. 

 

c) Convey individual copies of the object code with a copy of the written offer to provide the Corresponding Source. This 

alternative is allowed only occasionally and noncommercially, and only if you received the object code with such an offer, in 

accord with subsection 6b. 

 

d) Convey the object code by offering access from a designated place (gratis or for a charge), and offer equivalent access to 

the Corresponding Source in the same way through the same place at no further charge. You need not require recipients to 

copy the Corresponding Source along with the object code. If the place to copy the object code is a network server, the 

Corresponding Source may be on a different server (operated by you or a third party) that supports equivalent copying 

facilities, provided you maintain clear directions next to the object code saying where to find the Corresponding Source. 

Regardless of what server hosts the Corresponding Source, you remain obligated to ensure that it is available for as long as 

needed to satisfy these requirements. 

 

e) Convey the object code using peer-to-peer transmission, provided you inform other peers where the object code and 

Corresponding Source of the work are being offered to the general public at no charge under subsection 6d. 

 

A separable portion of the object code, whose source code is excluded from the Corresponding Source as a System Library, need 

not be included in conveying the object code work. 

 

A “User Product” is either (1) a “consumer product”, which means any tangible personal property which is normally used for 

personal, family, or household purposes, or (2) anything designed or sold for incorporation into a dwelling. In determining 

whether a product is a consumer product, doubtful cases shall be resolved in favor of coverage. For a particular product received 

by a particular user, “normally used” refers to a typical or common use of that class of product, regardless of the status of the 

particular user or of the way in which the particular user actually uses, or expects or is expected to use, the product. A product is 

a consumer product regardless of whether the product has substantial commercial, industrial or non-consumer uses, unless 

such uses represent the only significant mode of use of the product. 

 

“Installation Information” for a User Product means any methods, procedures, authorization keys, or other information required 

to install and execute modified versions of a covered work in that User Product from a modified version of its Corresponding 

Source. The information must suffice to ensure that the continued functioning of the modified object code is in no case 

prevented or interfered with solely because modification has been made. 

 

If you convey an object code work under this section in, or with, or specifically for use in, a User Product, and the conveying 

occurs as part of a transaction in which the right of possession and use of the User Product is transferred to the recipient in 

perpetuity or for a fixed term (regardless of how the transaction is characterized), the Corresponding Source conveyed under this 

section must be accompanied by the Installation Information. But this requirement does not apply if neither you nor any third 

party retains the ability to install modified object code on the User Product (for example, the work has been installed in ROM). 

 

The requirement to provide Installation Information does not include a requirement to continue to provide support service, 

warranty, or updates for a work that has been modified or installed by the recipient, or for the User Product in which it has been 

modified or installed. Access to a network may be denied when the modification itself materially and adversely affects the 

operation of the network or violates the rules and protocols for communication across the network. 

 

Corresponding Source conveyed, and Installation Information provided, in accord with this section must be in a format that is 

publicly documented (and with an implementation available to the public in source code form), and must require no special 

password or key for unpacking, reading or copying. 

 

Содержание BioStation L2

Страница 1: ...BioStation L2 INSTALLATION GUIDE EN 101 00 BSL2 V1 14A Version 1 14 English...

Страница 2: ...Network connection 12 TCP IP 12 TTL connection 13 TTL input connection 13 Relay connection 14 Fail Safe Lock 14 Fail Secure Lock 14 Automatic door connection 15 Connecting as a standalone 16 Connectin...

Страница 3: ...ll not be provided Operation Do not allow liquids such as water beverages or chemicals get into the product A fire electric shock or product damage may occur Caution Noncompliance of instructions coul...

Страница 4: ...rty hand or foreign substances Deterioration in fingerprint authentication performance and a product failure may occur When cleaning the product wipe the product with a soft and dry cloth and no water...

Страница 5: ...ding to the installation environment BioStation L2 Wall Bracket Fixing Screw x2 PVC Anchor x2 Diode Connection Cable 2 pins 1 EA 3 pins 1 EA 4 pins 4 EA Ferrite Core Drilling Template Quick Guide 120...

Страница 6: ...sound Fingerprint authentication unit Part to scan the fingerprint for entrance RF card authentication unit Part to scan the card for entrance TTL input 4 pins Connect the TTL input cable RS 485 4 pi...

Страница 7: ...in Name Color 1 RLY NO White 2 RLY COM Blue 3 RLY NC Orange RS 485 Pin Name Color 1 485 TRXP Blue 2 485 TRXN Yellow 3 485 GND Black 4 SH GND Gray TTL input Pin Name Color 1 TTL IN0 Red 2 TTL IN1 Yello...

Страница 8: ...Introduction 8 Ethernet Pin Name Color 1 ENET RXN Yellow 2 ENET RXP Green 3 ENET TXN Red 4 ENET TXP Black...

Страница 9: ...beep sound scan the fingerprint of the registered finger again scan the fingerprint of a finger to be registered twice NOTE Cautions for enrolling a fingerprint When a fingerprint is recognized it is...

Страница 10: ...fixing screws through the bracket to the position where BioStation L2 will be installed NOTE If installing BioStation L2 on a concrete wall drill holes insert PVC anchors and fix them with fixing scr...

Страница 11: ...Installation 11 2 Install BioStation L2 onto the fixed bracket 3 Connect BioStation L2 to the bracket by rotating the product fixing screw of BioStation L2...

Страница 12: ...than the total power consumption required for the terminal and another device Use a separate power supply for Secure I O 2 the electric lock and the BioStation L2 respectively If connecting and using...

Страница 13: ...MDIX function so that it can be connected to a PC directly using a normal straight type CAT 5 cable not a cross cable TTL connection TTL input connection Door sensor BioStation L2 1 TTL IN0 Red 2 TTL...

Страница 14: ...pply for BioStation L2 and the door lock Fail Secure Lock In order to use the Fail Secure Lock connect N O relay as shown in the figure below There is normally no current flowing through the relay for...

Страница 15: ...Installation 15 Automatic door connection BioStation L2 Automatic door control device Detection sensor 1 RLY NO White 2 RLY COM Blue Door button Door lock...

Страница 16: ...tion method number of users and number of devices Also note that the number of slave devices affects the fingerprint authentication speed A master device can control 31 slave devices The bandwidth of...

Страница 17: ...e slave devices with the RS485 cable The slave devices are used as dummy readers and authentication is performed in the master device If Xpass is connected to the master device only card authenticatio...

Страница 18: ...Installation 18 Wiegand connection 1 WG D0 Green 2 WG D1 White 3 WG GND Black 4 SH GND Gray RFID reader Control device BioStation L2 Use as a Wiegand input output device Cable shield optional...

Страница 19: ...ixels Image bit depth 8bit 256 grayscale Resolution 500 dpi Template SUPREMA ISO 19794 2 ANSI 378 Extractor Matcher MINEX certified and compliant LFD Supported Capacity Max User 1 1 500 000 Max User 1...

Страница 20: ...Product specifications 20 Dimensions Unit mm 201 71 44 158 52 171 7 34...

Страница 21: ...guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equip...

Страница 22: ...ore ordering the product contact Suprema through a Sales Representative or local distributor of Suprema Copyright notice The copyright of this document is vested in Suprema The rights of other product...

Страница 23: ...nd use of software on general purpose computers but in those that do we wish to avoid the special danger that patents applied to a free program could make it effectively proprietary To prevent this th...

Страница 24: ...provide you with facilities for running those works provided that you comply with the terms of this License in conveying all material for which you do not control copyright Those thus making or runnin...

Страница 25: ...what server hosts the Corresponding Source you remain obligated to ensure that it is available for as long as needed to satisfy these requirements e Convey the object code using peer to peer transmis...

Страница 26: ...rovided that the further restriction does not survive such relicensing or conveying If you add terms to a covered work in accord with this section you must place in the relevant source files a stateme...

Страница 27: ...y relying means you have actual knowledge that but for the patent license your conveying the covered work in a country or your recipient s use of the covered work in a country would infringe one or mo...

Страница 28: ...RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY O...

Страница 29: ...NU GPL for conveying Corresponding Source 1 Use a suitable shared library mechanism for linking with the Library A suitable mechanism is one that a uses at run time a copy of the Library already prese...

Страница 30: ...ginal SSLeay License Copyright C 1995 1998 Eric Young eay cryptsoft com All rights reserved This package is an SSL implementation written by Eric Young eay cryptsoft com The implementation was written...

Страница 31: ...WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE The licence and distribution terms for any publically available version or derivative of this code cannot be chan...

Страница 32: ...nquiry sales supremainc com 2018 Suprema Inc Suprema and identifying product names and numbers herein are registered trade marks of Suprema Inc All non Suprema brands and product names are trademarks...

Отзывы: