User`s manual

S2000-2 Operating
41 www.bolid.com
meets the pattern) and specify the pattern mask (its ‘opened’ positions) which will be allied to codes of
presented keys. Finally, the access group and validity period must be specified for the pattern (see
Access Key Pattern Configuration Parameters Section of this Manual).
A typical example of key pattern based identification is an access control to an ATM for bank clients,
when the access is granted only for those cardholders whose bank card serial numbers start with the
specified numerical sequence.