User's Manual
Table Of Contents
- INTRODUCTION
- INTERFACES PRESENTATION
- SETTING UP THE TERMINAL IP ADDRESS
- ACCESS CONTROL PRESENTATION
- CONFIGURING A “CONNECTED” MORPHOACCESS
- CONFIGURING A STANDALONE MORPHOACCESS
- CHANGING A PARAMETER
- UPGRADING THE FIRMWARE
- ACCESS CONTROL BY IDENTIFICATION
- ACCESS CONTROL BY AUTHENTICATION (MA120 / MA110 ONLY)
- Contactless authentication with templates on card:
- Contactless authentication with templates on a contactless c
- Contactless authentication with templates on local database
- Contactless authentication based on card mode
- Bypassing the biometric control in authentication
- Merged mode
- MorphoAccess 220 320 compatibility
- PROXY MODE
- RECOGNITION MODE SYNTHESIS
- SETTING UP RECOGNITION MODE
- SETTING UP MATCHING PARAMETERS
- RELAY ACTIVATION
- LED IN ACTIVATION
- LOG FILE
- REMOTE MESSAGES
- TAMPER SWITCH MANAGEMENT
- MAN MACHINE INTERFACE
- NETWORK PARAMETERS
- TERMINAL INFORMATION
- ADMINISTRATION PARAMETERS
- ANNEX: CONTACTLESS MODES TABLE
- ANNEX: REQUIRED TAGS ON CONTACTLESS CARD
- FAQ
- BIBLIOGRAPHY
L
L
O
O
G
G
F
F
I
I
L
L
E
E
MorphoAccess
TM
is logging its activities
app/log file/enabled
1
The MorphoAccess™ can log its biometric activities. It stores the result of
the command, the date and time, the matching mark, the execution time,
and the ID of the user.
It is possible to download the diary file. For more information on this
feature, refer to the MA100 Series Host System Interface.
SAGEM Défense Sécurité document. Reproduction and disclosure forbidden 35