User's Manual
Table Of Contents
- INTRODUCTION
- INTERFACES PRESENTATION
- SETTING UP THE TERMINAL IP ADDRESS
- ACCESS CONTROL PRESENTATION
- CONFIGURING A “CONNECTED” MORPHOACCESS
- CONFIGURING A STANDALONE MORPHOACCESS
- CHANGING A PARAMETER
- UPGRADING THE FIRMWARE
- ACCESS CONTROL BY IDENTIFICATION
- ACCESS CONTROL BY AUTHENTICATION (MA120 / MA110 ONLY)
- Contactless authentication with templates on card:
- Contactless authentication with templates on a contactless c
- Contactless authentication with templates on local database
- Contactless authentication based on card mode
- Bypassing the biometric control in authentication
- Merged mode
- MorphoAccess 220 320 compatibility
- PROXY MODE
- RECOGNITION MODE SYNTHESIS
- SETTING UP RECOGNITION MODE
- SETTING UP MATCHING PARAMETERS
- RELAY ACTIVATION
- LED IN ACTIVATION
- LOG FILE
- REMOTE MESSAGES
- TAMPER SWITCH MANAGEMENT
- MAN MACHINE INTERFACE
- NETWORK PARAMETERS
- TERMINAL INFORMATION
- ADMINISTRATION PARAMETERS
- ANNEX: CONTACTLESS MODES TABLE
- ANNEX: REQUIRED TAGS ON CONTACTLESS CARD
- FAQ
- BIBLIOGRAPHY
“
“
P
P
r
r
o
o
x
x
y
y
”
”
m
m
o
o
d
d
e
e
Proxy Mode is not strictly speaking a recognition mode. In this mode, the
MorphoAccess™ works as “a slave” waiting for external orders such as:
Identification
Verification
Relay activation
Read data on a contactless card.
…
Proxy orders:
Identification
Verification
Relay activation
Read card
…
TCP IP
Section
Remote Management gives more information about remote
management.
Please refer to MA100 Series Host System Interface for a complete
description of TCP orders possibilites.
SAGEM Défense Sécurité document. Reproduction and disclosure forbidden 13