Sagem Securite Groupe SAFRAN MA1XXBC ユーザーズマニュアル
31
Access control presentation
S
TAN
D
ALO
N
E
MO
DES
(
N
ETW
OR
KE
D
OR
NO
T
)
S
TA
ND
ALO
N
E
MO
DES
(
NE
TW
OR
KED
OR
NO
T
)
S
TA
ND
ALON
E
MO
DE
S
(
NETW
O
RK
ED
OR
NO
T
)
S
TA
ND
ALO
N
E
MO
DES
(
NE
TW
ORK
ED
OR
NO
T
)
S
TA
N
D
ALO
N
E
MO
DE
S
(
NE
TW
OR
KE
D
OR
NOT
)
S
TA
ND
ALO
N
E
MO
DE
S
(
N
ETW
OR
KE
D
OR
NO
T
)
3. Access control presentation
Typical access control system
Typical architecture includes, at least one MorphoAccess
®
, a Host System (for
enrolment) and a Central Security Controller (for area access final check, and
physical access command).
physical access command).
Figure 4 • 3:Typical access control system architecture
MorphoAccess
®
J Series biometric database management
The management of the MorphoAccess
®
internal biometric database can be
done remotely by a Host System (typically a PC with MEMS
TM
application).
MorphoAccess
®
operating mode
The MorphoAccess
®
works according two exclusive operating modes.
•
In Stand Alone Mode, the biometric database can be managed by a Host
System and downloaded to the MorphoAccess
System and downloaded to the MorphoAccess
®
.
•
In Proxy Mode, the terminal is remotely operated by a host system
application that sends individual commands to the MorphoAccess
application that sends individual commands to the MorphoAccess
®
.
MorphoAccess
®
access control result sending
When the biometric identification is positive, the person ID can be sent to a
Central Security Controller, for further action such as opening doors.
Central Security Controller, for further action such as opening doors.