User's Manual

MorphoAccess® VP Series - User Guide
<
Table of contents
SSE-0000082427-01 M
ORPHO DOCUMENT
.
R
EPRODUCTION AND
D
ISCLOSURE
P
ROHIBITED
4
January 2011
Table of contents
Table of contents ............................................................................................................................. 4
Table of figures ................................................................................................................................ 6
Section 1: Introduction .................................................................................................................... 7
MorphoAccess® VP Terminal .................................................................................................................. 8
Scope of the document ........................................................................................................................... 9
Safety instructions................................................................................................................................. 10
About Biometrics ................................................................................................................................... 10
Acquisition principles ............................................................................................................................ 16
Section 2: MorphoAccess® VP Series terminal presentation ............................................................ 19
Interfaces description ............................................................................................................................ 20
USB port usage ...................................................................................................................................... 25
Section 3: Connecting a MorphoAccess® to a PC ............................................................................. 27
Introduction .......................................................................................................................................... 28
Point to Point Ethernet Connection....................................................................................................... 29
Connection through only one Ethernet switch ...................................................................................... 30
Connection through a LAN .................................................................................................................... 31
Setting up IP parameters with a USB Mass Storage Key ...................................................................... 33
Wi-Fi™ Network configuration .............................................................................................................. 35
Section 4: MorphoAccess® Terminal Configuration ......................................................................... 36
MorphoAccess® configuration parameters .......................................................................................... 37
Configuring a connected MorphoAccess® terminal .............................................................................. 38
Upgrading the firmware ....................................................................................................................... 41
MorphoAccess® terminal database management ................................................................................ 42
MorphoAccess® terminal license management .................................................................................... 43
Section 5: Access Control ............................................................................................................... 45
Access control presentation .................................................................................................................. 46
MorphoAccess® terminal operating modes .......................................................................................... 48
Access control result ............................................................................................................................. 50
Section 6: Access Control by Identification...................................................................................... 52
Identification mode description ............................................................................................................ 53
Section 7: Access control by Authentication ................................................................................... 56
Authentication process ......................................................................................................................... 57
Biometric check, biometric data on user’s card .................................................................................... 61
Biometric check, biometric data in local database ............................................................................... 63
No biometric check, no user id check .................................................................................................... 65
No biometric check, but User ID check .................................................................................................. 67