Sagem Securite Groupe SAFRAN MA1XXBC Manual De Usuario

Descargar
Página de 118
33
Access control presentation
S
TAN
D
 
ALO
N
E
 
MO
DES
 
(
N
ETW
OR
KE
D
 
OR
 
NO
T
)
S
TA
ND
 
ALO
N
E
 
MO
DES
 
(
NE
TW
OR
KED
 
OR
 
NO
T
)
S
TA
ND
 
ALON
E
 
MO
DE
S
 
(
NETW
O
RK
ED
 
OR
 
NO
T
)
S
TA
ND
 
ALO
N
E
 
MO
DES
 
(
NE
TW
ORK
ED
 
OR
 
NO
T
)
S
TA
N
D
 
ALO
N
E
 
MO
DE
S
 
(
NE
TW
OR
KE
D
 
OR
 
NOT
)
S
TA
ND
 
ALO
N
E
 
MO
DE
S
 
(
N
ETW
OR
KE
D
 
OR
 
NO
T
)
Authentification (1 versus 1)
In that mode, the user provides his identity (his user identifier), and the terminal
checks it.The captured fingerprint is compared with one or two reference
templates associated to the user identifier provided before the fingerprint
capture.
In authentication, user’s minutiae can be stored on a contactless card. It is also
possible to store his minutiae in terminal local database. 
Figure 4 • 5:Authentification with contactless card
If the user is authenticated, access is granted.
If the user is not recognized, access is denied.
Access control result communication
Scope
The result of the access request is signified to the user by a specific light signal,
and an audible signal.
In addition to user information, the terminal is able:
 to activate an internal relay (to open a door),
 to register the access request result in an internal log file,
 and to send an access control result message to a distant system (usually a
Central Security Controller) through several kind of communication links.
If access is granted (the user has been recognized), the led lights green and the
buzzer emits a high-pitched "beep".
If access is denied (the user has not been recognized), the led lights red and the
buzzer emits a low-pitched "beep".
Contactless card containing:
User Identifier (ID)
User's reference fingerprints