User's Manual
Table Of Contents
- INTRODUCTION
- INTERFACES PRESENTATION
- SETTING UP THE TERMINAL IP ADDRESS
- ACCESS CONTROL PRESENTATION
- CONFIGURING A “CONNECTED” MORPHOACCESS
- CONFIGURING A STANDALONE MORPHOACCESS
- CHANGING A PARAMETER
- UPGRADING THE FIRMWARE
- ACCESS CONTROL BY IDENTIFICATION
- ACCESS CONTROL BY AUTHENTICATION (MA120 / MA110 ONLY)
- Contactless authentication with templates on card:
- Contactless authentication with templates on a contactless c
- Contactless authentication with templates on local database
- Contactless authentication based on card mode
- Bypassing the biometric control in authentication
- Merged mode
- MorphoAccess 220 320 compatibility
- PROXY MODE
- RECOGNITION MODE SYNTHESIS
- SETTING UP RECOGNITION MODE
- SETTING UP MATCHING PARAMETERS
- RELAY ACTIVATION
- LED IN ACTIVATION
- LOG FILE
- REMOTE MESSAGES
- TAMPER SWITCH MANAGEMENT
- MAN MACHINE INTERFACE
- NETWORK PARAMETERS
- TERMINAL INFORMATION
- ADMINISTRATION PARAMETERS
- ANNEX: CONTACTLESS MODES TABLE
- ANNEX: REQUIRED TAGS ON CONTACTLESS CARD
- FAQ
- BIBLIOGRAPHY
Authentication
The captured fingerprint is matched against a reference template – 1 vs. 1.
In authentication, user minutiae can be stored on a contactless card. It is
also possible to store minutiae in terminal local database.
Contactless card containing:
ID
Biometrics
If the user is matched access is granted.
If the user is not recognized access is refused.
See section
Access Control By Authentication.
SAGEM Défense Sécurité document. Reproduction and disclosure forbidden 11