User guide
AC-2100 User Guide    2 
UNIONCOMMUNITY Co., Ltd. / 3F Hyundai Topix Bldg. 44-3 Bangi-dong Songpa-gu   
Seoul, Korea (138-050) 
Tel : 02-6488-3000 , Fax : 02-6488-3099, E-Mail :sales@unioncomm.co.kr 
http://www.unioncomm.co.kr 
< Terminology Description > 
z Admin, Administrator 
- As a user who can access using terminal menu mode, the administrator has 
rights to change the operating environment through 
registration/modification/deletion of terminal users. 
- In case no registered administrator is available, anyone can access the 
terminal menu to change a particular setting. Therefore, it is 
recommended to have at least one administrator. 
- As the administrator has rights to change important environment setting of 
fingerprint recognition device, special caution is required during registration 
and operation. 
z 1:1 Authentication (1 to 1, Verification) 
- This is a method that authenticates fingerprint after entering user ID or card 
- This method is called 1:1 authentication because the fingerprint of a user 
registered in a user ID or card. 
z 1:N Authentication (1 to N, Identification)   
- This is a method that searches a corresponding user only with fingerprint. 
- This method is called 1:N authentication because it searches the identical 
fingerprint from the registered fingerprints without user ID or card input. 
z Authentication Level 
- This is a level used during fingerprint authentication. 1~9 levels are available 
for display according to the level of fingerprint correspondence. The 
correspondence level of two fingerprints during authentication must be higher 
than the authentication level in the setting. 
- A higher authentication level provides a higher security level. However, a 
relatively higher correspondence rate may lead to a higher authentication 
failure rate. 
- 1:1 authentication level: Authentication level used during 1:1 authentication   
- 1:N authentication level: Authentication level used during 1:N authentication 
z Authentication Method 
- This represents the various types of authentication methods formed with 
combination of FP (fingerprint) authentication and RF (card) authentication. 
Example) Card or FP: Authentication with card or fingerprint 
z Function Key 
- [F1], [F2], [F3] and [F4] keys are available. These keys allow a user to enter 
the menus or change modes such as office start/leave. 
z LFD (Live Finger Detection): Imitation Fingerprint Prevention Function 
- This function allows the input of only real fingerprints and blocks the input of 










