Справочник Пользователя для Sagem Securite Groupe SAFRAN MA1XXBC

Скачать
Страница из 118
31
Access control presentation
S
TAN
D
 
ALO
N
E
 
MO
DES
 
(
N
ETW
OR
KE
D
 
OR
 
NO
T
)
S
TA
ND
 
ALO
N
E
 
MO
DES
 
(
NE
TW
OR
KED
 
OR
 
NO
T
)
S
TA
ND
 
ALON
E
 
MO
DE
S
 
(
NETW
O
RK
ED
 
OR
 
NO
T
)
S
TA
ND
 
ALO
N
E
 
MO
DES
 
(
NE
TW
ORK
ED
 
OR
 
NO
T
)
S
TA
N
D
 
ALO
N
E
 
MO
DE
S
 
(
NE
TW
OR
KE
D
 
OR
 
NOT
)
S
TA
ND
 
ALO
N
E
 
MO
DE
S
 
(
N
ETW
OR
KE
D
 
OR
 
NO
T
)
3. Access control presentation
Typical access control system
Typical architecture includes, at least one MorphoAccess
®
, a Host System (for
enrolment) and a Central Security Controller  (for area access final check, and
physical access command).
Figure 4 • 3:Typical access control system architecture
MorphoAccess
®
 J Series biometric database management
The management of the MorphoAccess
®
 internal biometric database can be
done remotely by a Host System (typically a PC with MEMS
TM
 application). 
MorphoAccess
®
 operating mode
The MorphoAccess
®
 works according two exclusive operating modes. 
 In Stand Alone Mode, the biometric database can be managed by a Host
System and downloaded to the MorphoAccess
®
.
 In Proxy Mode, the terminal is remotely operated by a host system
application that sends individual commands to the MorphoAccess
®
.
MorphoAccess
®
 access control result sending
When the biometric identification is positive, the person ID can be sent to a
Central Security Controller, for further action such as opening doors.