IDEMIA Identity & Security France MPHAC001A Manuale Utente
Section 1 : Introduction
2015_2000007248-V1 - Draft
This document and the information therein are the property of Morpho. They must not be
copied or communicated to a third party without the prior written authorization of Morpho
15
June 2015
To secure properly an access, Morpho recommends installing the MorphoAccess®
SIGMA Lite Series terminal as a part of the typical Access Control environment, as the
one described in the figure below.
SIGMA Lite Series terminal as a part of the typical Access Control environment, as the
one described in the figure below.
Figure 1: Implementation Recommendations
This environment comprises:
The MorphoAccess® SIGMA Lite Series terminal itself
Its role is to perform one-to-many biometric identification or one-to-one biometric
verification, i.e. to identify the individual who is presenting his finger on the terminal
sensor by comparing his biometric data with the references previously stored in the
terminal database (in the form of biometric templates) or to verify his identity using
the reference stored in a contactless card presented to the terminal.
verification, i.e. to identify the individual who is presenting his finger on the terminal
sensor by comparing his biometric data with the references previously stored in the
terminal database (in the form of biometric templates) or to verify his identity using
the reference stored in a contactless card presented to the terminal.
An Access Controller (3rd party product)
The Controller is the element which controls the access rights of the individuals to the
secured area. For that reason, it must be located in the secured area.
secured area. For that reason, it must be located in the secured area.
ACCESS CONTROL
SYSTEM
(*) OR EQUIVALENT
NON SECURED
AREA
ACCESS
CONTROLLER
TCP/IP, Wiegand, Dataclock or RS485
E
L
E
C
T
R
IC
L
A
T
C
H
(
*)
SECURED
AREA
Dry Contact
MorphoAccess
®
SIGMA Lite
Terminal
Dry Contact
ALARM