Sagem Securite Groupe SAFRAN MA1XXBC Manual De Usuario

Descargar
Página de 118
48
Access control by authentication
Figure  6 • 2:  Authentication with User ID only on the user's card
If the user ID found on the user's card exists in the terminal database, then the
optical sensor switches on, and the user is expected to place his finger on it.
If the authentication is successful, the terminal signals the result to the user, and
(if applicable) to a distant system such as a Central Security Controller.
Once the user authentication is done, the terminal automatically loops back and
waits for an other user’s card presentation
Required tags on card
Card structure is described in MorphoAccess
®
 Contacless Card Specification.
Note: a database must exist in the terminal.
Binary user’s identifier, non-structured data
This mode can not work when the app/contactless/enabled profiles
configuration key value is different from 0.
In this mode the identifier is read at a given offset on the card and is supposed
to be binary. No TLV structure is required on the card.
It is possible to read non-byte aligned data. It is useful to read a user ID
included in a Wiegand frame.
ID
Card 
Mode
PK1
PK2
PIN
BIOPIN
AuthenID 
contactless
Yes
No
No
No
No
No
User ID only