Page 1 of 14 Ethos® Multi-technology USB Logical Access Reader User Manual 303-327-1477 www.WaveLynxTech.
Page 2 of 14 Contents 3 Glossary of Terms/Acronyms Terms/Acronyms 4 Understanding Your Product Product 4 Card Data Layout 4 System Requirements 4 USB Interface 5 Configuration Software Tool (CST) 5 Step by Step Software Installation 6-10 Software Basics 6-7 Software Basics - The Buttons 8-10 Software Basics – The Tabs 11 Customizing Your Access Data 12 – 13 Step by Step Password Example 14 Certification Note to Users
Page 3 of 14 Glossary of Terms/Acronyms Terms/Acronyms ASCII: The American Standard Code for Information Interchange codes represent text in computers, communications equipment, and other devices that use text. BID: Badge Identifier. BLE: Bluetooth low energy. Contactless: Technology using wireless electromagnetic fields to transfer data.
Page 4 of 14 Understanding Your Product What does your model number mean? WaveLynx Technologies follows a simple system of categorization to easil y U Series USB Readers diffe A full line of USB readers for logical access U1 U2 U3 U4 U5 U6 U7 renti 125 kHz 13.56 MHz 125 kHz and Bluetooth Bluetooth Bluetooth and Bluetooth, 13.56 ate 13.56 MHz and 125 kHz 13.56 MHz MHz, and 125 kHz bet Red, Green, Amber LED and Buzzer wee n products. Below is the basic system that WaveLynx follows.
Page 5 of 14 you can use the information on your secure access card and let the reader “type” the password for you by just reading the card. Configuration Software Tool (CST) The card holds information that is strictly numeric in nature. That is, it holds a number that has information embedded in it (e.g. badge identification number, facility code, etc…). Often, it’s desirable to “break out” these information fields and add descriptive or control data to conform to any given access systems conventions.
Page 6 of 14 Software Basics Once your software is installed and running, it will look like the picture below. We will talk through how each tab and button function in the following pages. Note: When you change any of your settings, you need to push the “Set Set Reader Configuration” button at the top of the screen. If you don’t push this button your changes will not be saved.
Page 7 of 14 review the information sent to computer for logical access after you have customized the access information to you requirements. Analyze Cards: Cards: This button is pressed to make the reader act as a card analyzer. This mode is used if you want descriptive information about the card that is in addition to the logical access data.
Page 8 of 14 The Tabs Input: Input: This tab navigates you to the screen where your information is being sent. If you are on a different section, it will also bring you back to this original screen. Smart Card CSN Configuration: Configuration: This tab navigates you to the screen that lets you change your settings for reading smart card serial numbers (often called the CSN or UID).
Page 9 of 14 Keysets: Keysets: This tab navigates you to the screen that lets you enter custom keys for secure smart card access application. The reader comes with a set of default keys for use with the WaveLynx secure access application. It this allows you to have your own key sets. Please be aware, that if you create your own key sets, you are responsible for all secure key management of those custom keys. WaveLynx is not responsible for tracking or recovering a custom keyset.
Page 10 of 14 Filter lets you choose if you want to process all available bits of data from the card or just a subset of all available bits. The Parity Stripping option lets you strip parity bits.
Page 11 of 14 Customizing Your Access Data Typically you will want to customize the data read from a card to use in logical access. Here we will walk through how you can do this. Let’s say you want to configure the reader to send out a specific string of data either in front of or behind the data fields to represent something, possibly your company. Let’s say your company commonly uses “XYZ” in reference to itself.
Page 12 of 14 Step by Step Password Example Now assume this setup is to be used for a password entry for your email account. You would, of course, have to set up your email account to use the password sent by your reader. To do this simply follow the email account’s steps for changing your password and when it is time to enter your new password, simply let the reader enter it by reading your access card.
Page 13 of 14 to the reader. All of your settings are stored in non-volatile memory in the reader. This means, even if you unplug the reader, it will “remember” the settings you have just entered. In other words, once your reader is configured, the configuration software tool is no longer needed (unless you want to make changes to your password). The reader can just be used as a log-in device without the need for any other software.
Page 14 of 14 Certification Note to Users Note: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment.