Sagem Wireless MA220E MA220E User Manual

Sagem Wireless MA220E Users Manual

Users Manual

 iCONTENTSWelcome to SAGEM SA MorphoAccess™  1Safety instructions  2General description  4Installation instructions  6Pre-Installation Checklist for the MorphoAccess  6Initial Installation Procedure  7Stage 1: Preparing the MorphoAccess cables/wires for installation  7Stage 2:  Positioning and preparing the MorphoAccess for nal installation against the mounting surface  8Final installation procedure  10Stage 1: Wiring the MorphoAccess to the building  10Stage 2. Fastening the MorphoAccess to the building  11Stage 3. Installing the MorphoAccess protective visor  12Stage 4: Testing the MorphoAccess functionality  12How to upgrade MorphoAccess 200E to 300E  14Pre-Installation checklist  14Performing the upgrade  14Conguring Wiegand vs. Data clock  17Performing the Conguration  17Outdoor MorphoAccess Technical characteristics  20Recommendations  22Areas containing combustibles  22General precautions  22Appendix 1 - Cable conguration tables  23Appendix 2 - Wall fastener specs  26Product Warranty, Limitations and Software License  27Contents
ii  1
ii  1Welcome to SAGEM SA MorphoAccess™ 200E / 300ECongratulations for choosing the SAGEM SA MorphoAccess™ Automatic Fingerprint Recognition Terminal. The MorphoAccess provides an innovative and effective solution for access control or time and attendance applications using ngerprint verication and/or identication.The  MorphoAccess  terminal  integrates  SAGEM  image processing  and  feature  matching  algorithms  (MorphoSoft™ and MorphoImaging™). This technology is  based on lessons learned during 18 years of  experience in the eld of biometric identication  and  the creation  of  literally millions  of  individual ngerprint identication records. We believe you will nd the SAGEM SA  MorphoAccess fast, accurate,  easy to use, and suitable for physical access control or time and attendance.The  SAGEM  SA  MorphoAccess  offers  the  following advantages:-  Has  been  designed  for  use  in  outdoor  environments,  is protected against water jets and is dust tight-  Has a high quality optical scanner-  Supports multiple input/output interfaces used in the physical access control industry-   Has a local area network interface for easy interaction with other host systems-   Is  easily  installed  and  integrated  into  your  available  ofce space-  Has  an  interface  that  is  easy  to  use  in  both  setup  and operational modes-  Has extensive, exible ash memory for data storage (user data, biometric templates, etc.)To ensure proper installation of your SAGEM SA MorphoAccess, we  recommend  that  you  read  this  Installation  Guide  in  its entirety.IntroductionThe SAGEM logo and trademark are the property of E.All other trademarks or product names are trademarks or product names of the respective title holders.
2  3Safety instructions - Please Read Before InstallationWARNING:  INSTALLATION TO BE PERFORMED BY   PROFESSIONAL INSTALLERS ONLYNote:  These instructions for the installation of the MorphoAccess assume  the  installer  is  properly  qualied  as  a  professional, familiar with applicable industry standards, local building/zoning codes, and proper installation practices.  Installation should not be attempted by non-professionals.You are required to use a National Electric Code Class 2 power supply  at  12 V  DC  ± 5%  and  2.5A  minimum.  This  product  is intended to be installed in accordance with the NEC Class 2 requirements.Europe:  SAGEM  SA  hereby  declares  that  the  SAGEM  SA MorphoAccess™  has  been  tested  and  found  compliant  with the  below  listed  standards  as  required  by  the  EMC  Directive 89/336/EEC:  EN55022 (1994) / EN55024 (1998) and by the low voltage Directive 73/23/EEC amended by 93/68/EEC: EN60950 (2000).USA:  This  device  complies  with  part  15  of  the  FCC  Rules. Operation  is  subject  to  the  following  two  conditions:  (1)  this device may not cause harmful interference, and (2) this device must accept any  interference  received,  including interference that may cause undesired operation.If  this  equipment  interferes  with  radio  or  television  reception (which can be determined by disconnecting and re-connecting the unit), the user is encouraged to try to correct the interference by one or more of the following measures:-  Reorient or relocate the receiving antenna.-  Increase  the  separation  between  the  equipment  and receiver.-  Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.-  Consult the dealer for help.Safety instructions
2  3CAUTIONRISK OF EXPLOSION IF BATTERY IS REPLACED BY AN INCORRECT TYPE.REPLACE ONLY WITH THE SAME OR EQUIVALENT TYPE RECOMMENDED BY THE MANUFACTURER.MUST BE DISPOSED OF PROPERLY.Safety instructionsATTENTION IL Y A DANGER D'EXPLOSION S'IL Y A REMPLACEMENT INCORRECT DE LA BATTERIE.REMPLACER UNIQUEMENT AVEC UNE BATTERIE DU MÊME TYPE OU D'UN TYPE ÉQUIVALENT RECOMMANDÉ PAR LE CONSTRUCTEUR. ELIMINER DE FAÇON APPROPRIÉE.WARNING: Failure to properly seal the MorphoAccess against the mounting surface may result in accident or injury. Due to the many types of building materials that exist, ensuring adequate sealing against the mounting surface is the sole responsibility of the installer. The mounting gasket provided with the  MorphoAccess  is  only  for  the  convenience  of  the  installer.  For  some applications with  rough mounting surfaces, a bead of silicone sealant can be  placed  around  the  entire  perimeter  of  the  gasket  before  placing  the MorphoAccess against the mounting surface.WARNING: As  an  additional  precaution,  take  all  steps  necessary  (in accordance with the National Electric Code) to ensure that if water leaks into the mounting  surface,  that no  high  voltage or  other  potentially dangerous wiring,  power  sources,  transformers,  or  electronics  will  become  wet.  This may  include  installing  high  voltage  wiring  or  electronics  above  the  hole in  which  MorphoAccess  is  mounted  and  waterproong  connections  as needed.  Providing  for  safety  outside  the  MorphoAccess  packaging  is  the sole responsibility of the installer.
4  5General description3D ViewDisplay136 x 34 pixelsKeyboardSensorMounting slots(4 places)Front ViewFunction keysVisorGeneral description
4  5General descriptionRear View WiegandRS-485PowerEthernetMulti-functionWall Gasket Location
6  7Pre-installation checklistInstallation instructionsThe installation instructions are divided into three segments - The Pre-Installation Checklist, The Initial Installation Procedure, and  the  Final  Installation  Procedure.  Each  segment  lists  the procedures you will perform, followed by the detailed instructions for each procedure.Pre-Installation Checklist1. Installation should be performed by a trained and qualied installer. Make sure to adhere to all applicable local building codes.  A National Electric Code (NEC) Class 2 power supply must be used for the MorphoAccess.2.  Prepare  for  the  MorphoAccess  installation  by  selecting  a mounting location that reduces exposure to the environment as much as possible within  easy  reach  of  the door that is being controlled by the MorphoAccess.3.  Verify  that  a  standard  junction  box,  at  least  the  size  of  a dual-gang  box,    has  been  installed  at  the  correct  height necessary for the MorphoAccess to meet any local or Federal requirements for ADA compliance.4.  Verify  that  there  is  enough  free  wall  space  surrounding the  junction  box  to  accommodate  the  placement  of  the MorphoAccess.5. Verify that the main power and functional interface cables are properly wired within the building, per applicable local building codes, and that wire stubs are accessible within the junction box where the MorphoAccess will be installed.6. Turn off the main power to the junction box until the installation of the MorphoAccess is complete.Note: Once steps 1 through 6 are complete, the MorphoAccess is ready for installation.
6  7Initial Installation ProcedureThe Initial Installation Procedure consists of  two stages: (1) Preparing the MorphoAccess cables/wires for installation, and (2)  Positioning and preparing the MorphoAccess for nal installation against the mounting surface.Stage  1:  Preparing  the  MorphoAccess  cables/wires  for installation1. Identify the MorphoAccess cables that will be wired for your particular  installation  requirements,  for  example,    power, Wiegand, or RS-485.Note: The Ethernet cable comes prewired for 568B with a standard RJ45  socket installed. The interface cables have a protective cover placed over the end of each cable. If the interface cables are used for an installation, remove the  protective  cover  in  order  to  perform  the  necessary wiring.2. Familiarize yourself with the cable wire diagrams located in Appendix 1 of this installation guide.3.  Prepare  the  MorphoAccess  cables  for  connection  to  the building cables as follows: a. Shorten the MorphoAccess cable stubs as necessary for each installation. b. Strip one inch of the cable insulation from the end of each cable you will be using. Note: Be careful not to cut the individual wires within the cables.c. Strip  -  inch of insulation from the end of each individual wire you will be connecting. Note: If you are using self-tapping wire connectors, this step may not be necessary.4. Prepare the building cables for installation in the same manner  as described above for the MorphoAccess cables.Initial installation
8  9Stage 2:  Positioning and preparing the MorphoAccess for nal installation against the mounting surface1. If you haven't already done so, use the included hex wrench  to unscrew the four screws securing the MorphoAccess visor and remove the visor. Place  the  visor  out  of  the  way  until needed at the end of the installation procedure.2.  Lift  the   MorphoAccess  into  position  near  the  junction  box and  place  the  wire  stubs  inside  the  junction  box  in  order to  temporarily  position  the  device  against  the  mounting surface.3. Orient the  MorphoAccess against the mounting surface in the  position  that  it  will  be  permanently  mounted  with  the cable  stub  seals  centered  within  the  junction  box  without any excessive stress applied to the cables.4. Once you are satised with the location of the device against the mounting surface, remove the  backing from the gasket material and position the  sticky  side of the gasket against the backside of the MorphoAccess ensuring that the gasket material does not cover the mounting holes.  5. Once the  MorphoAccess is properly positioned against the mounting surface, mark the location of the four fasteners at the center of the four oval slots, cut out in the ange, that surrounds the  MorphoAccess. (See diagram on Page 5)6.  Once  the  four  fastener  locations  are  marked,  remove  the  MorphoAccess from against the mounting surface and place in a safe location, out of the way from your work area.7. Drill and prepare the holes for the four fasteners.Note:  The  MorphoAccess  comes  with  four   Alligator™ anchors. These anchors can be used to mount the device to  any  surface,  of  any  thickness  above  1/4"  (6mm). For    complete  technical  specications  for  the Alligator  anchor please visit: http://www.toggler.com/pdf/ alligator.pdfPositioning and preparing the MorphoAccess
8  9For other types  of  surfaces  you  should select an appropriate anchor that  is rated to support a minimum of 5 lb (2.25 kg). See Appendix 2, p. 26 for generic bolt specications.Note: A variety of fasteners can be used to mount the  MorphoAccess to different types of material. The mounting holes must be prepared according to the type of fastener being used for an installation and the type of material the MorphoAccess is being mounted against. Use "best practices" installation procedures for the type of fastener being used.8. Once the fastener locations are properly prepared for accepting the fasteners, temporarily mount the MorphoAccess to the mounting  surface  to  check  for  proper  alignment  of  the fasteners and placement. 9. To temporarily mount the MorphoAccess, lift the device into position near the junction box and place the wire stubs inside the junction box in order to position it against the mounting surface.10.  Fasten  the  device  to  the  mounting  surface  with  the  four fasteners.11.  If  you  are  satised  with  the  mounting,  remove  the  device from the wall and place it in a safe location, away from your work area. If you need to make an adjustment, remove the MorphoAccess  from  the  wall  and  make  the  adjustment accordingly.You are now ready for the nal installation procedure.Positioning and preparing the MorphoAccess
10  11Final Installation ProcedureThe Final Installation Procedure includes four stages: (1) Wiring MorphoAccess to the building, (2) Fastening MorphoAccess to the building, (3) Installing the  MorphoAccess  protective  visor, and (4) Testing MorphoAccess functionality.Stage 1: Wiring MorphoAccess to the building1. Position MorphoAccess in such a way that the wire stubs are conveniently placed within reach of the building wire stubs.Note: To accomplish this may require placing the    MorphoAccess on a stool or other secure work surface in  order to position it at a height that allows the installer to conveniently connect the  wires to the building wires without needing to physically hold the device in position. 2. Refer to the cable wire diagram provided in  Appendix 1 of this installation guide for the color coding of each individual wire that will be connected for your installation.Note: Wiring the MorphoAccess includes connecting the interface wires rst, then connecting the power wires. Once all wires have been properly connected and sealed against the elements, MorphoAccess will be ready to be secured to the mounting surface.4. Connect each MorphoAccess wire to the corresponding wire in the building cables. Take care when connecting the wires in order not to damage the individual wires and to ensure a positive connection. Each wire should be properly wrapped or  sealed  in  order  to  ensure  uninterrupted  service  to  the device.  Follow  NEC  installation  requirements  when  wiring this device.FInal Installation
10  11Stage 2. Fastening MorphoAccess to the building1.  To  complete  permanent  mounting  of  the  MorphoAccess,  neatly wind and place the cable harness inside the junction box  without  any  excessive  stress  applied  to  the  harness. This will facilitate the mounting of the device tight against the mounting surface.2. Once the wire harness is in place in the junction box, place the device against the mounting surface and align the slots in the ange with the holes in the mounting surface.Note: The  mounting  holes  should  have  been  pre-drilled and prepared for installation as outlined earlier in the Initial Installation Procedure.3.  Once  the  device  is  properly  placed  against  the  mounting surface,  ensure  that  it  makes  a  positive  sealed  connection between the mounting surface and  the  gasket  on  the  back of the device. Note: To  ensure  a  watertight  seal  on  rough  mounting surfaces, a bead of silicone sealant can be placed around the entire perimeter of the gasket before placing  MorphoAccess against the mounting surface.4. Install the four screws through the slots in the ange into the four prepared mounting holes. Tighten the mounting screws.Note: Be careful not to overtighten the screws or the front housing will bend visibly under the bolt heads. Note: If  you  use  mounting  screws  that  pass  through  the mounting  surface  (such  as  a  thin  wall  or  an  electrical mounting box), be sure to seal the mounting screw holes per the NEC for outdoor installations.Final installation
12  13Stage 3. Installing the MorphoAccess protective visorWarning: The protective visor must be installed in order to protect the nger imaging scanner and the LCD display from direct sunlight and dripping water.1. Place the protective visor over the MorphoAccess and align the four mounting holes on the visor with the four mounting holes on the  ange.2. Re-attach the visor to the ange with the included four screws and washers using the included hex wrench. Firmly tighten each screw to 8 in-lb (0.90 N-m).3. Place the provided screw caps over each screw to complete a nished look.4. Remove the protective lm covering the LCD window.Stage 4: Testing MorphoAccess functionality1. Once the installation is complete, turn on the main power to the MorphoAccess.2. Inspect the MorphoAccess and verify that it powers up and proceeds to the main screen.3. Inspect the LCD and verify that the contrast and brightness settings make the screen readable. If the LCD is not readable, see the setup menu in the Software Guide  for how to adjust the contrast and brightness of the LCD screen.4. Inspect the scanner and verify that the scanner is glowing red.5. Have the Administrator perform an enrollment and verify that the enrollment is successful.Note: This step depends on the type of system conguration and may not be appropriate for all installations.Final installation
12  13Final installation6.  Perform  an  identification  and  verify  that  the  door  opens correctly. Note: This  step  depends  on  the  type  of  system conguration and may not be appropriate or available for all installations. Note: If any unexplained problems occur, please contact the company where you purchased the MorphoAccess for troubleshooting instructions.Installation of MorphoAccess is now complete.
14  15Upgrading How to upgrade MorphoAccess™ 200E to 300EPre-Installation checklistThis is a memory upgrade which, when installed, provides the capability to manage 16 biometric databases of 3,000 records each for a total of 48,000 people. Note: This memory upgrade must be performed by authorized personnel only.  Any work carried out by non-authorized  personnel will invalidate your warranty.Warning: Make sure the  existing  database residing  on  the MorphoAccess  200  has  been  backed  up  before  continuing with  this  upgrade.All  existing  database  information  in  the MorphoAccess  200  will  be  lost  during  this  procedure.  If transferring a memory module from one MorphoAccess 300 to another, all database information contained on the module will be lost.Performing the upgrade1. Remove the MorphoAccess visor screw caps, with a small straight  blade  scewdriver,  and  then  remove  the  four  visor screws, using the included hex wrench, and disconnect the MorphoAccess from  the  mounting surface  and  make  sure the main power to the device is turned off.2. Unscrew the front housing from the back housing by removing the four screws securing the two halves together using the included hex wrench.3. Carefully separate the front and rear housing.Note: Carefully disconnect the cables between the front and  rear  housing  before  completely  separating  the  two halves.4. Turn the front housing upside down in order to look inside. Identify the location of the memory module by looking at the picture on the next page.
14  15    Memory module upgrade Gasket sealThe word "DOWN" is  printed  on  the lower  right  corner of the module.5. Use approved static discharge protection. Remove the memory module from its protective ESD packaging. 6. Orient the memory module correctly by rotating the module so that the word "DOWN" is located in the bottom right corner of the module.7.  Place  the  memory  module  in  position  over  the  two  24-pin connectors and press the module into place. Use rm, even pressure  on  both  connectors  at  the  same  time  to  seat  the module in place. The word "UP" is printed on the module in the upper left corner.Upgrading
16  17Note: The module should press into place rmly without much  resistance.  If  it  appears  that  excessive  force  is required  to  seat  the  module,  remove  the  module  and visually inspect the pins on the MorphoAccess circuit board to ensure that the pins are not bent out of alignment.8.  Visually  inspect  the  gasket  which  provides  a  positive  seal between  the  two  halves  of  the  housing.  Ensure  that  the gasket is properly seated within the frame on the front half of the housing.Note: If the gasket appears to be damaged, contact your MorphoAccess  vendor  to  order  a  replacement  gasket before proceeding.9. Carefully reconnect the ribbon cables between the two halves of the housing.10. Place the two halves of the MorphoAccess housing together, making sure that the gasket maintains its position within the gasket frame.11.  Screw  the  two  halves  together  with  the  four  screws  and washers which were removed earlier.Note: Carefully tighten the four screws to 8 in-lb (0.90 N-m). Do not overtighten. 12.  Screw  the  visor  back  onto  the  housing.  Tighten the  four screws to 8 in-lb (0.90 N-m). Place the screw caps into place over the four screws.The MorphoAccess is now upgraded.Upgrading
16  17Conguring Wiegand vs. Data clockConguring Wiegand vs. DataclockMorphoAccess  is  congured  during  manufacturing  to  support the  Wiegand  protocol.  If  your  installation  requires  supporting the  Dataclock  protocol,  you  will  need  to  perform  the  following procedure in order to congure the device to support Dataclock. You will be taking the housing sections apart and then putting them back together again in order to perform the conguration.Note: MorphoAccess  can  support  either  Wiegand  or  Dataclock. MorphoAccess does NOT  support both protocols simultaneously.Note: This installation requires the device to be disconnected from the mounting surface with the main power to the device turned off.Performing the Conguration1. Remove the four visor screw caps and the four screws securing the visor and remove the visor.2. Unscrew the front housing from the back housing by removing the four screws securing the two halves together.3. Carefully separate the front and rear housing.Note: Carefully disconnect the cables between the front and rear housing before completely separating the two halves.4. Turn  the  front housing  upside  down in  order  to look  inside. Identify the location of the bank of eight vertical jumpers on the motherboard by looking at the picture on the next page.
18  19   8 jumper bank5.  Once you have identied the location of the vertical jumper bank, (numbered 1 - 8 from left to right), congure the jumpers for Dataclock as follows:Install jumpers on positions 1 and 2. Move jumper from position 7 to position  8. When completed, positions 1, 2, 4, and 8 will have jumpers installed.Note:  Use  jumpers  spaced  at  2  mm  on  center.  If  needed, jumpers are available from your MorphoAccess supplier.   gasket sealConguring Wiegand vs. Data clock
18  19Note: Once you have attached the jumpers as described, the conguration is complete. Putting the device back together1.  Visually inspect the gasket, which provides a positive seal between the two halves of the housing. Ensure that the gasket is properly seated within the frame on the front half of the housing.Note: If the gasket appears to be damaged, contact your  MorphoAccess  vendor  to  order  a  replacement  gasket before proceeding.2.  Carefully reconnect the cables between the two halves of the housing.3.  Place the two halves of the housing together making sure that the gasket maintains its position within the gasket frame.5.  Screw the two halves together with the four screws that were removed earlier. Note: Carefully tighten the four screws to 8 in-lb (0.90 N-m). Do not over tighten.6. Screw the visor back onto the housing. Tighten the four screws to 8 in-lb (0.90 N-m). Place the screw caps into place over the four screws.The MorphoAccess is now congured for Dataclock.                                    Conguring Wiegand vs. Data clock
20  21MorphoAccess Technical CharacteristicsDisplay•  Backlit LCD 136 x 34 pixelsKeyboard•  12 numeric keys•    4 function keysFuse•  2.5 amp quick blowMemory•  8 megabytes RAM•  4  megabytes  memory  for  Operating  System,  Biometric Libraries, and Applications•  Optional 32-Mbyte memory for data storage.Peripheral interfaces•   RS-485 / RS-422•  Ethernet 10 Base T•  Wiegand or Dataclock output•  Wiegand or Dataclock input•  Relay•  Tamper switchTechnical characteristics
20  21Power supply•  NEC Class 2, at 12 V DC  ± 5%; 2.5A minimumNote: Cable cross section depends on the length: 0.75 mm² recommended.Size and weightThis product is designed to be installed outdoors.•  8.6 inches wide x 11.4 inches high x 3.9 inches deep•  Approximately 4.5 poundsEnvironmental conditions•    Operating temperature    -10°C to + 45°C•    Humidity                           0% to 90%, non-condensing•    Fluid ingress and dust protection  Rated for IP 65Storage conditions•    Temperature                    - 40°C to + 70°C•    Humidity                           0 % t o  9 5 % , i n c l u d i n g condensationTechnical characteristics
22  23RecommendationsAreas containing combustiblesIt  is  strongly  recommended  that  you  do  not  install  your  MorphoAccess  in  the  vicinity  of  gas  stations,  petroleum processing facilities or any other facility containing amable or combustable gasses or materials.General precautions•  Do  not  attempt  to  repair  your  MorphoAccess  yourself. The  manufacturer  cannot  be  held  responsible  for  any damage/accident  that  may  result  from  attempts  to  repair components.•  Any  work  carried  out  by  non-authorized  personnel  will invalidate your warranty.•  Do not expose your MorphoAccess to temperatures outside its specied operation and storage ranges.•  Use your MorphoAccess with original accessories. Attempts to integrate the MorphoAccess with unapproved accessories will void your warranty.•  Due  to  electrostatic  discharge,  and  depending  on  the environment,  synthetic  carpet  should  be  avoided  in  areas where the device has been installed.Warning: The  manufacturer  cannot  be held  responsible if the above recommendations are not followed or if the  MorphoAccess is used incorrectly.Recommendations
22  23NOTE: The Wiegand electrical interface conforms to the Security Industry Association Wiegand standard (March 1995). MorphoAccess outputs 26-bit Wiegand reverse.NOTE: To wire MorphoAccess for Dataclock out interface use the Wiegand cable as follows. Green = Data Out; White = Clock Out; Black = Ground. To congure MorphoAccess to output Dataclock (refer to pages 18-20).NOTE: MorphoAccess Ethernet wiring follows the T568B standard. Use a straight-through cable between MorphoAccess and a hub. Use a crossover cable between MorphoAccess and a PC.Appendix 1 - Cable conguration tableAppendix 1This table lists the cables and the function of each wire in each cable. It is to be used as a reference to wire the Outdoor MorphoAccess for power and interface functionality. (See diagram on Page 26 for location of the different cables.)Power CableColor FunctionWhiteBlack+ 12VGroundWiegand CableColor FunctionGreenWhiteBrownBlackPurpleRedOrangeYellowBlueShield (drain)Wiegand OutWiegand OutWiegand OutWiegand OutWiegand InWiegand InWiegand InWiegand InWiegand InD 0D 1LEDGNDGND+ 12VLEDD 1D 0Not Connected
24  25Appendix 1Deister Card Reader Interface:To Interface the optional Deister contactless card reader, connect the Deister AB wires to the RS-485 cable Tx port as follows:Wire A to Tx+Wire B to Tx-NOTE: The tamper switch is opened when the Morpho-Access is opened, thereby disabling the MorphoAccess.Relay Ratings:1 A at 30 VDC according to the extra low voltage safety requirements (42.4 VAC max, 60 VDC max) independent of the power supply.RS-485 CableColor/stripe FunctionGreen/WhiteWhite/GreenOrange/WhiteWhite/OrangeRed/OrangeRX+RX-TX+TX-GNDMulti-Function CableColor FunctionBlackWhiteGreenBrownBlueGrayGNDTamper SwitchTamper SwitchRelay 2, CommonRelay 2, Normally ClosedRelay 2, Normally Open
24  25Appendix 1Rear ViewLocation of Cables                                                                                                                                                  Multi-functionEthernetPowerWiegandRS485
26  27Appendix 2 - Wall fastener specsIf the mounting bolts provided with the MorphoAccess do not meet your specic needs for a particular installation, the following specication provides information necessary to select a bolt that will properly support the MorphoAccess.Maximum bolt      UNC #10Minimum length of threads    1-7/8 inchesMinimum shear strength of bolt  5 lb or moreAppendix 2
26  27MORPHO® BRAND BIOMETRIC PRODUCTWARRANTY, LIMITATIONS, AND SOFTWARE LICENSE1.  LIMITED WARRANTY AND MAINTENANCE.  Subject to the Disclaimers and Limitations of Warranty set forth below, SAGEM MORPHO, Inc., (hereinafter “SMI,” or its licensed reseller, as may be applicable) provide the following limited warranty, for the benet of original Customer only, that all hardware components of the Morpho® brand biometric product with which this information is associated will conform to the applicable hardware product specications as published by SMI and will be in good working order and free from material defects in materials or workmanship, given Customer’s normal use and service (the “Hardware Limited Warranty”).  It is further warranted that the Morpho® brand biometric software provided with, and/or loaded into and resident in the biometric product will conform to the applicable software specications or SMI documentation published by SMI, given Customer’s normal use and operation (the “Software Limited Warranty”).  Any and all  third  party  software  programs supplied with the biometric product are subject to their respective manufacturer’s warranty and license terms only, and SMI assumes no responsibility for such software.The Hardware Limited Warranty extends for one (1) year from the date of Customer’s receipt of delivery of the biometric product. The Software Limited Warranty extends for ninety (90) days from the date of Customer’s receipt of delivery of the biometric product. During the duration of the Hardware and Software Limited Warranties, the rst level of support shall be provided by telephone “Help Desk” support (the applicable Help  Desk  telephone  number  is  included  with  the  packaged  biometric  product).  Hardware repairs which cannot be remedied through Help Desk consultation shall be made by returning the hardware component to an authorized SMI service depot, in accordance with instructions issued by the service depot, at Customer’s expense.  Return delivery of the repaired or replaced component shall be at SMI’s expense.  SMI shall repair or replace any nonconforming hardware component at its sole election.  Software problems not remedied through Help Desk consultation may be corrected through software patches or updates issued by SMI or by replacement of the unit in which the software is resident, at SMI’s sole election.  The Limited Software Warranty does  not  entitle  the  customer  to  automatically  receive  patches,  updates  or  other notication of software correction or revision during the duration of the warranty.  The original warrantyperiods shall not be renewed or extended by subsequent repair or replacement.Biometric product maintenance after expiration of the one (1) year warranty may be available pursuant to the terms and conditions of a separate Maintenance Agreement – please contact the location  from which the  biometric product was purchased for further details.2.  LIMITATIONS AND  DISCLAIMERS  OF WARRANTY.  SMI does not warrant that operation of the biometric product will be uninterrupted or error-free; further, no biometric product or system can be guaranteed to be 100% accurate, or to properly enroll, identify, or authenticate every individual. SMI shall have no responsibility for repairing or otherwise remedying any defect or Warranty
28  29nonconformity in the condition or operation of the biometric product or its software if: 1) modications to Customer’s site are necessary for proper operation, and Customer’s site preparation is inadequate; 2) the biometric product is not professionally installed in accordance with applicable industry standards, local building/zoning codes such as the National Electric Code, and proper installation practices; 3) the biometric product is not maintained and operated with all proper accessories under normal conditions by  competent  personnel;  4)  the  biometric  product  incorporates  replacement  parts not authorized by SMI; 5) the biometric product has been subjected to disassembly except as required for normal installation, modication beyond what is described in SMI-supplied installation and operation guides, unauthorized enhancement, abuse or misuse; or 6) the defect or nonconformity has not been reported to the designated Help Desk within ten (10) days of its discovery by Customer.   As Customer’s sole and exclusive remedy for any nonconformity or defect in the condition or operation of the biometric product for which SMI is responsible, SMI shall provide its reasonable efforts to remedy same as set forth in Section 1, above during the applicable stated Limited Warranty Period.  With the exception  of its  Limited Warranties  set forth  in Section  1,  above,  TO  THE  MAXIMUM  EXTENT ALLOWED  BY APPLICABLE LAW,  SMI  DISCLAIMS ANY AND ALL  PROMISES,  REPRESENTATIONS AND WARRANTIES, EXPRESS OR IMPLIED, WITH RESPECT TO THE BIOMETRIC PRODUCT, ITS HARDWARE,  SOFTWARE,  DESIGN,  OR  FUNCTIONALITY,  OR ITS MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE, OR ARISING FROM  USAGE  OF  TRADE,  COURSE OF  DEALING, OR  COURSE OF PERFORMANCE.    SMI  FURTHER  DISCLAIMS ANY AND ALL PROMISES, REPRESENTATIONS AND WARRANTIES,  EXPRESS OR  IMPLIED,  WITH RESPECT TO ANY OF SMI’S SERVICES PERFORMED HEREUNDER.3.  LIMITATIONS OF LIABILITY.    The entire liability of SMI to Customer (or to any person or entity claiming through Customer) for any claim whatsoever related to the biometric product or the parties’ transaction shall not exceed the total amount of all payments made for the biometric product by Customer to the date of the claim.  IN NO EVENT SHALL SMI BE LIABLE TO CUSTOMER FOR ANY LOST PROFITS, LOST INFORMATION, BUSINESS INTERRUPTION, OR OTHER CONSEQUENTIAL, INCIDENTAL, SPECIAL, PUNITIVE OR INDIRECT DAMAGES (WHETHER IN AN ACTION IN CONTRACT OR TORT OR BASED ON WARRANTY), EVEN IF SMI HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES, ARISING OUT OF, OR RELATED TO, THE BIOMETRIC PRODUCT OR THE PARTIES’ TRANSACTION.  Some jurisdictions do not allow excluding or limiting  implied warranties, or  limiting liability for incidental or consequential damages, and some jurisdictions have special statutory consumer  protection provisions that  may supersede  this limitation.  As a result, the limitations and disclaimers of warranty and liability set forth herein may not apply to Customer if prohibited by the laws of Customer’s jurisdiction.4.  RESTRICTION ON  EXPORTATION.    Certain  biometric  products  and associated software may have restrictions upon their exportation outside the United States of America, and the applicable U.S. Government regulations and restrictions are subject to frequent change.  Customer shall comply with all applicable laws, rules and  regulations  of  governmental  authorities,  now  or  hereafter  in  effect,  including, Warranty
28  29without limitation, the U.S. Export Administration Act and other U.S. export controls.  Customer agrees that Customer will not export or re-export, directly or indirectly, the SMI biometric products or software to any country, person, or entity subject to U.S. export restrictions.Warranty
             MMoorrpphhooAAcccceessss™™  TTeerrmmiinnaall  IInnssttaallllaattiioonn  GGuuiiddee  UUppddaattee                            M142-005C September 2003  SAGEM MORPHO, Inc. Tacoma, Washington  98402
 2   SAGEM MORPHO, Inc. 2003. All rights reserved.   SEPTEMBER 2003   Contents FCC Compliance of MorphoAccess™  200, 220, 300, 200E, 220E, and 300E ......................3 Installing Ferrite Beads on Interface Cables for MorphoAccess™ 200 and 300 ....................3 Installing Ferrite Beads on Interface Cables for MorphoAccess™ 220 ..................................5 MorphoAccess™ Motherboard Jumper Configuration............................................................7 MorphoAccess™ Serial Port is RS-422 Only .........................................................................8 Ethernet Connections to MorphoAccess™.............................................................................8 MorphoAccess™ 300 Memory Extension Board....................................................................8 MorphoAccess™ Power Supply Selection Outside the United States....................................8   MorphoAccess Installation Guide Update  SAGEM MORPHO, Inc. 2003. All Rights Reserved.  This manual, as well as the software described in it, is furnished under license and may be used or copied only in accordance with the terms of such license.  The content of this manual is furnished for informational use only, is subject to change without notice, and should not be construed as a commitment by SAGEM MORPHO, Inc.  SAGEM MORPHO, Inc. assumes no responsibility or liability for errors or inaccuracies that may appear in this documentation, and it is furnished “AS IS,” with no warranties of any kind, express or implied.  Except as may be permitted by the license, no part of this manual may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of SAGEM MORPHO, Inc. “SAGEM,” “MORPHO,” and the SAGEM logo are U.S. registered trademarks of SAGEM SA.  All other product and company names which may be referenced herein are trademarks or servicemarks of their respective owners. MorphoAccess Terminal Installation Guide Update, Document M142-005C SAGEM MORPHO, Inc., 1145 Broadway Plaza, Tacoma, WA 98402 USA September 2003
 SEPTEMBER 2003   SAGEM MORPHO, Inc. 2003. All rights reserved.  3 FCC Compliance of MorphoAccess™  200, 220, 300, 200E, 220E, and 300E This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.  This FCC compliance is for MorphoAccess™ products as delivered to you, the customer. Any changes or modifications not expressly approved by SAGEM MORPHO, Inc. could void your authority to operate MorphoAccess™ products. Installing Ferrite Beads on Interface Cables for MorphoAccess™ 200 and 300  This document provides an overview of ferrite beads and explains how to install them on the power, Wiegand, RS-422, and Ethernet cables that you connect to the MorphoAccess™ 200 or 300. To meet FCC requirements for Class B computing devices, a ferrite bead must be installed on every cable connected to the MorphoAccess 200 or 300 — only if the MorphoAccess serial number starts with 01 or 02.   What is a Ferrite Bead? Ferrite beads are radio frequency (RF) absorbers. To see an example of a ferrite bead, look at a monitor video cable or a laptop computer power cable that is connected to your computer. The walnut-sized protrusion that is molded near one end of the cable is a ferrite bead. The size and shape of the ferrite bead determines the amount of RF that is absorbed. The amount of RF that a device emits determines the type of ferrite bead that is required to provide the proper absorption. The ferrite beads supplied with your MorphoAccess 200 or 300 terminal have been properly sized to absorb the correct amount of RF to comply with FCC requirements.    Installing a Ferrite Bead Check the serial number on the back of the MorphoAccess. If the serial number starts with 01 or 02, install one ferrite bead on each cable before you install the MorphoAccess 200 or 300 terminal.
 4   SAGEM MORPHO, Inc. 2003. All rights reserved.   SEPTEMBER 2003    Ordering Ferrite Beads To order more ferrite beads (Ferrico F5-NF-80B) for your MorphoAccess 200 or 300 interface cable, contact SAGEM MORPHO, Inc. at 1-800-526-2674. Ask for part number 1205-294001-0.  1.  Select the interface cable that you want to work with and open a ferrite bead by releasing the clasps on the side.    2.  Position the ferrite bead on the cable as close as possible to (but not inside) the MorphoAccess.  Lay the cable inside the groove.    3.  Bend the cable around the ferrite bead to form a loop and lay it again inside the ferrite bead.  Make sure the cable circles the ferrite bead so that it passes through the ferrite bead twice.    4.  Close the two halves of the ferrite bead and securely fasten the clasps without pinching the cables.
 SEPTEMBER 2003   SAGEM MORPHO, Inc. 2003. All rights reserved.  5 Installing Ferrite Beads on Interface Cables for MorphoAccess™ 220 This document provides an overview of ferrite beads and explains how to install them on the power, Wiegand, RS-422, and Ethernet cables that you connect to the MorphoAccess™ 220. To meet FCC requirements for Class B computing devices, a ferrite bead must be installed on all cables connected to the MorphoAccess.  What is a Ferrite Bead? Ferrite beads are radio frequency (RF) absorbers. To see an example of a ferrite bead, look at a monitor video cable or a laptop computer power cable that is connected to your computer. The walnut-sized protrusion that is molded near one end of the cable is a ferrite bead. The size and shape of the ferrite bead determines the amount of RF that is absorbed. The amount of RF that a device emits determines the type of ferrite bead that is required to provide the proper absorption. The ferrite beads supplied with your MorphoAccess 220 terminal have been properly sized to absorb the correct amount of RF to comply with FCC requirements. Installing a Ferrite Bead After all the cables have been routed through the wall, place a single ferrite bead around all of them before you install the MorphoAccess 220 terminal. See instructions below.  The foam strip will be compressed in the ferrite bead to prevent the ferrite bead from slipping down the cable.  1.  Open a ferrite bead by releasing the clasp on the side. 2.  Determine where the ferrite bead will be positioned on the cables.  It should be positioned as close as possible (but not inside) to the MorphoAccess terminal.  Ensure that sufficient cable slack will be available to route the cables inside the MorphoAccess and to attach the wires to the terminal block.
 6   SAGEM MORPHO, Inc. 2003. All rights reserved.   SEPTEMBER 2003   3.  Wrap the foam tightly around all the cables at the position where the ferrite bead will be placed.  4.  Lay the foam-wrapped cable inside the groove of the ferrite bead.   5.  Close the two halves of the ferrite bead and securely fasten the clasps.  If the ferrite bead does not close easily, trim the foam slightly, but not so much that the ferrite bead will slide away from the terminal.   Ordering Ferrite Beads or Foam Cable Wrap for Ferrites To order more ferrite beads (Fair-Rite 04441 73551) for your MorphoAccess 220 interface cables, contact SAGEM MORPHO, Inc. at 1-800-526-2674. Ask for part number 1205-364001-0.  To order more foam cable wrap for ferrites, ask for part number 0999-900019-0.
 SEPTEMBER 2003   SAGEM MORPHO, Inc. 2003. All rights reserved.  7  MorphoAccess™ Motherboard Jumper Configuration   SW1: Wiegand input   Open  =  Wiegand Mode (default)  Closed  = Dataclock Mode SW2: Wiegand output       Open  =  Wiegand Mode (default)  Closed  = Dataclock Mode SW3-6: Reserved (MA200/300)   SW3 must be open   =     SW4 must be closed =     SW5 must be open  =     SW6 must be open  =   SW3-6: Reserved (MA220)   SW3 must be closed      SW4 must be open       SW5 must be open       SW6 must be closed    SW7-8: Wiegand Input (Interrupts)    Open Open  =  Not allowed   Closed Open  =  Wiegand Mode (default)   Open Closed   =  Dataclock Mode   Closed Closed  =  Not allowed
 8   SAGEM MORPHO, Inc. 2003. All rights reserved.   SEPTEMBER 2003 MorphoAccess™ Serial Port is RS-422 Only The COM1 serial port supported in all MorphoAccess™ products is RS-422 only, not RS-485 as shown in the installation guides. Below is the correct RS-422 wiring diagram for MorphoAccess™ 200E, 220E, and 300E (outdoor units).  RS-422 Cable Color/stripe Function White/Green RX+ Green/White RX- White/Orange TX+ Orange/White TX- Blue/White GND Ethernet Connections to MorphoAccess™ It is recommended to use shielded category 5 (Cat 5) Ethernet cable (120 ohm impedance). It is also strongly recommended to install a repeater unit every 300 ft (90 m). Extreme care must be taken when connecting the Ethernet wires to the terminal block board during installation, since low quality connections may degrade the Ethernet signal sensitivity. The receive wires Rx+ and Rx- should be connected from the same twisted pair of wires, and the transmit wires Tx+ and Tx- should also be connected from the same twisted pair of wires. MorphoAccess™ 300 Memory Extension Board  Under certain very harsh shipping conditions, the memory extension board of the MorphoAccess™ 300 (indoor MorphoAccess only) might become disconnected. You should check that the memory board is properly attached before connecting power to the MorphoAccess 300. When you disassemble the MorphoAccess 300 to mount it on a wall, make sure the memory board is properly aligned with the pins (see page 9 of the Installation Guide). There are two sets of 26 connector pins, but each connector on the memory extension board has only 24 socket holes. Align the memory extension board such that it uses the sets of 24 pins closest to the large silver shield. Push on the memory extension board to make sure it is firmly seated on the connector pins. MorphoAccess™ Power Supply Selection Outside the United States  When any model MorphoAccess™ is installed, it is the responsibility of the installer to provide an IEC 60950-certified power supply that is marked Limited Power Source (or “LPS”) and rated at 12 VDC, 2.5 A minimum. This applies to indoor units (MA200, 220, and 300) as well as outdoor units (MA200E, 220E, and 300E).
 iCONTENTSIntroduction  1MorphoAccess™ Software User Interface V.4.2                                     23Applicant recognition application                                                           23MorphoAccess Software Administrator Interface                                  31Biometric management operations                                                        32Access the set up functions of the system                                             37The CONFIG menu                                                                                39The VERSION menu                                                                              69The SERIAL NUMBER menu                                                                 70The SETTING menu                                                                               71Communication protocol                                                                          75Appendix 1 - Wiegand data format                                                          76Appendix 2 - ISO 7811/2-1995 - Track 2 Data clock format                    77Appendix 3 - Reserved conguration values                                          79Product Warranty, Limitations and Software License                            80End User Software License                                                                       82Contents
 1Thanks for choosing the MorphoAccess™ Automatic Fingerprint Recognition  Terminal.  MorphoAccess  provides  an  innovative and effective solution for access control or time and attendance applications using ngerprint verication and/or identication.The  MorphoAccess  terminal  integrates  SAGEM  image processing  and  feature  matching  algorithms  (MorphoSoft™ and MorphoImaging™). This technology  is  based  on lessons learned during 18 years of  experience in the eld of biometric identication  and  the creation  of  literally millions  of  individual ngerprint identication records. We believe you will nd the MorphoAccess fast, accurate, easy to  use  and  suitable  for  physical  access  control  or  time  and attendance.The MorphoAccess offers the following advantages:•  Has a high quality optical scanner.•  Supports multiple input/output interfaces used in the physical access control industry.•  Has a local area network interface for easy interaction with other host systems.•  Is compact in size for easy installation and integration into your available ofce space.•  Has an Intuitive interface that is easy to use in both setup and operational modes.•  Has  extensive,  flexible  flash  memory  for  data  storage, including  user data and biometric templates.      IntroductionIntroduction
 2  3This guide allows you to congure the software parameters to meet your installation requirements.The following lists some of the congurable parameters:•  Administrator mode versus User mode•  Identication versus Authentication•  Standalone versus Client/Server•  Database management functions – enroll or delete•  Congure network parameters•  Congure juvenile processing•  Set matching threshold•  Set language preference – English, French, or Spanish•  Congure Welcome message•  Setup Wiegand and Data clock codes/parameters•  Congure COM port•  Congure relays•  Adjust contrast and brightness•  Set clockTo  ensure  the  most  effective  use  of  your  MorphoAccess,  we recommend that you read this Software Guide in its entirety.Introduction
SE32/03-011145-01 SAGEM SA document. Reproduction and disclosure forbidden. 23ESMORPHOACCESSTM SOFTWARE USER INTERFACEThe SAGEM SA MorphoAccess™ terminal can operate in threemodes: access control by identification, access control byauthentication and proxy mode. Those modes are set in theMaccess/Admin/Mode configuration key.The MorphoAccess™ 200 manages one base of 800(1) persons,locally or remotely. MorphoAccess™ 300 manages 16 bases of3000 persons, remotely(2).Access control by identification (MorphoAccess™ 200)To configure MorphoAccess™ terminal in this mode, use thesystem and edit /cfg/Maccess/Admin/mode, then enter 0.After starting the MorphoAccess™ terminal, waits for fingerprintdetection in identification mode.(1) In stand alone mode, the local base is sized for 800 persons, 2 fingers.In MMS mode, it is possible to manage up to 1000 persons in a base, 2 fingers.(2) For more information, see MorphoAccess™ Host System Interface SpecificationRef.: 3000005996.Place your fingerfor identificationPleasemanuel.book  Page 23  Vendredi, 30. mai 2003  12:21 12
24 SAGEM SA document. Reproduction and disclosure forbidden. SE32/03-011145-01ESIf the identification is successful, the terminal triggers the accessor returns the corresponding ID to central security controller(3).Once the person’s identification is done, the terminal automaticallyloops back and waits for a new finger. This display remains forabout 4 seconds.(3) Port used to exchange ID is either Weigand/Dataclock or COM1/COM2. The ID format send to COM portis described on Communication protocol section.Welcome707251IDENTIFIED✔✔✔✔✔manuel.book  Page 24  Vendredi, 30. mai 2003  12:21 12
SE32/03-011145-01 SAGEM SA document. Reproduction and disclosure forbidden. 25ESAccess control by identification (MorphoAccess™ 300)To configure the MorphoAccess™ in this mode, use Asystem andedit /cfg/Maccess/Admin/mode, then enter 0.After starting the MorphoAccess™ terminal, waits for fingerprintdetection in identification mode.To select a user database, just press a key number to toggle thebase number. Only bases 0 to 15 can be selected and used.Place your fingerfor identificationPleaseBase does not existPlease selectanother one00Place your fingerfor identificationPleaseKey 1 pressedKey 1 pressedKey 5 pressedOriginal IdentificationScreen using base 0Now using base 1Base 11 selected butnot used0111manuel.book  Page 25  Vendredi, 30. mai 2003  12:21 12
26 SAGEM SA document. Reproduction and disclosure forbidden. SE32/03-011145-01ESIf the identification is successful, the terminal triggers the accessor returns the corresponding ID to central security controller.Once the person’s identification is done, the terminal automaticallyloops back, selects base 0 and waits for a new finger. This displayremains for about 4 seconds.Access control by authentication (MorphoAccess™ 200 and 300)To configure the MorphoAccess™ in this mode, use Asystem andedit /cfg/Maccess/Admin/mode, then enter 1.This mode requires a peripheral equipment which will send the IDof the person to authenticate to the MorphoAccess™ Wiegand orDataclock input.Place your fingerfor identificationPleasePlace your fingerfor identificationPleaseKey 3 pressedNow using base 15Now using base 0because base 53cannot be selected1500Welcome92716IDENTIFIED✔✔✔✔✔00manuel.book  Page 26  Vendredi, 30. mai 2003  12:21 12
SE32/03-011145-01 SAGEM SA document. Reproduction and disclosure forbidden. 27ESTo trigger authentication:−if using a MorphoAccess™ 300, select a valid user database asdescribed in paragraph "Access control by identification".−pass the user badge so the external reader sends the user ID onMorphoAccess™ Wiegand or Dataclock input.If the ID exists in the selected database, the MorphoAccess™performs an authentication using the biometric templatesassociated to this ID.If the authentication is successful, the terminal triggers the accessor returns the user ID to central security controller.Once the person’s authentication is done, the terminalautomatically loops back, selects base 0 and waits for a new inputID. This display remains for about 4 seconds.When using this feature, ID should be a value between 0 and65535.Pass your badgefor AuthenticationPlease00Authentication ofID 92716Place your finger00Welcome92716AUTHENTICATED✔✔✔✔✔00manuel.book  Page 27  Vendredi, 30. mai 2003  12:21 12
28 SAGEM SA document. Reproduction and disclosure forbidden. SE32/03-011145-01ESAccess control by contactless authentication: ID and templates on a MIFARE card (MorphoAccess™ 220)To configure the MorphoAccess in this mode, use Asystem andedit /cfg/Maccess/Admin/mode, then enter 3.To trigger authentication, users should present their MIFARE cardto the terminal. MorphoAccess™ will read the ID, the user’s nameand two biometric templates stored on the card.Read templates are used for a 1:1 matching.If the authentication is successful, the terminal triggers the accessor returns the user ID to central security controller.Please presentContactlessSmart CardAuthentication ofJohn SmithPlace your fingerWelcomeJohn SMITHAUTHENTICATED✔✔✔✔✔manuel.book  Page 28  Vendredi, 30. mai 2003  12:21 12
SE32/03-011145-01 SAGEM SA document. Reproduction and disclosure forbidden. 29ESAccess control by contactless authentication: ID on a MIFARE card, local templates (MorphoAccess™ 220)To configure the MorphoAccess in this mode, use Asystem andedit /cfg/Maccess/Admin/mode, then enter 4.To trigger authentication, users should present their MIFARE cardto the terminal. MorphoAccess™ will read the ID stored on thecard.If the ID exists in the selected database, the MorphoAccess™performs an authentication using the biometric templatesassociated to this ID.If the authentication is successful, the terminal triggers the accessor returns the user ID to central security controller.Please presentContactlessSmart CardAuthentication ofID 92716Place your fingerWelcome92716AUTHENTICATED✔✔✔✔✔manuel.book  Page 29  Vendredi, 30. mai 2003  12:21 12
30 SAGEM SA document. Reproduction and disclosure forbidden. SE32/03-011145-01ESProxy modeThis mode allows to control the MorphoAccess™ remotely using aset of biometric and database management function interfaceaccess commands.For more information, please contact SAGEM SA or refer todocument 3000005996 MorphoAccess™ Host System InterfaceSpecification.To configure the MorphoAccess™ in this mode, use Asystem andedit /cfg/Maccess/Admin/mode, then enter 2.manuel.book  Page 30  Vendredi, 30. mai 2003  12:21 12
SE32/03-011145-01 SAGEM SA document. Reproduction and disclosure forbidden. 31ESMORPHOACCESSTM SOFTWARE ADMINISTRATOR INTERFACEApplication of the SAGEM SA MorphoAccess™ terminal allows:1. Biometric management operations−Transfer of biometric data between the MorphoAccess™terminal and MorphoAccess™ Management System (MMS).−In stand alone without the MorphoAccess™ managementsystem (manages the biometric data in a local database onthe MorphoAccess™) (MorphoAccess™ 200 only).−The MorphoAccess™ shall be configured in one of either ofthese modes (see this chapter).2. Access to the set up functions of the system (requestAdministrator mode).Note 1The MMS handles the MorphoAccess™ through a set ofcommand exchanges (two-way commands to and from the MMSserver and the MorphoAccess™ terminal). If you wish to knowmore about this protocol and the command set, please contactSAGEM SA.Note 2For further information about the application protocol betweenMorphoAccess™. and MMS, please contact SAGEM SA. Thespecification document has the following reference:MorphoAccess™ Host System Interface SpecificationRef.: 3000005996.System overviewSystem overviewSystem overviewSystem overviewSystem overviewWiegand / Dataclock▼▼▼▼▼▼▼▼▼▼MorphoAccess™MorphoAccess™MorphoAccess™MorphoAccess™MorphoAccess™COM1 RS422COM2 RS232Host local / MMSEthernetHost local / MMSmanuel.book  Page 31  Vendredi, 30. mai 2003  12:21 12
32 SAGEM SA document. Reproduction and disclosure forbidden. SE32/03-011145-01ESBiometric management operationsBiometric Management between terminal andMorphoAccess™ Management System (MMS)(4)MorphoAccess™ terminal includes an interface layer tocommunicate with the access control system or the MMS throughEthernet, RS422 and RS232 (For more information, see sectionSetting up Network Parameters).The biometric management operations are:−Insert template/ID in database: The terminal inserts a newrecord in the database.−Remove template/ID from database: The terminal removes therecord identified by the ID in the database.−Update template/ID in database: The terminal changes thetemplate identified by the ID in the database.−Download database: The terminal reads the new database andinstalls it in a local database according to the database identifier.If the MorphoAccess™ application receives the commands fromMMS it will switch to base management mode. The operationssent by MMS are automatically registered in the database of theMorphoAccess™ terminal.Managing a base locally is not possible. All biometric data is storedon the MMS and the terminal will act as a capture and send deviceonly.To access the Administrator menu with a MorphoAccess™ 300,first select the base in which the Administrator is enrolled then hitthe following keys in sequence <#>, <*> and <#>. With aMorphoAccess™ 200 simply hit the following keys in sequence<#>, <*> and <#>.(4) For more information about MMS, please contact SAGEM SA.manuel.book  Page 32  Vendredi, 30. mai 2003  12:21 12
SE32/03-011145-01 SAGEM SA document. Reproduction and disclosure forbidden. 33ESThe next screen is the Administrator screen. The blinking red ledindicates that you are in administrator mode.Biometric login is enabled if configuration key /cfg/Maccess/admin/admin ident is set to 1.This operation creates a database with ID 0. This database cancontain 800 records with two biometric data fields, an ID field andan Administrator field.In order to access the Control menu, the Administrator’s fingerprinttemplate or pin must be entered (the default PIN is 12345). Toenter the pin code(5) select the PIN menu.You can use the correction key # to delete the last number hit. Aftera valid pin code or an Administrator identification, you will see thefollowing screen:(5) To change the pin code, see section Use Application System.Administrator identificationPlace your Fingerfor identificationPIN EXITAdministrator identificationEnter Pin : IOK EXITPress <#> for correctionAdministrator ModeSelect a command PleaseSYSTEM EXIT CL KEYSmanuel.book  Page 33  Vendredi, 30. mai 2003  12:21 12
34 SAGEM SA document. Reproduction and disclosure forbidden. SE32/03-011145-01ESBiometric management in stand alone(6) (MorphoAccess™200 only)In stand alone mode, the MorphoAccess™ manages its own localdatabase. This can be setup through the Administrator menus. Onthe keypad, hit the following keys in sequences <#>, <*> and <#>.The resulting screen is the Administrator menu.Biometric login is enabled if configuration key /cfg/Maccess/admin/admin ident is set to 1.This operation creates a database with ID 0. This database cancontain 800 records with two biometric data fields, an ID field andan Administrator field.In order to access the Control menu, the Administrator’s fingerprinttemplate or pin code must be entered. To enter the pin code(7),select the Pin menu.You can use the correction key # to delete the last number hit.(6) To change the Biometric management mode, see section Use Application System.(7) To change the pin code, see section Use Application System.Administrator identificationPlace your Fingerfor identificationPIN EXITAdministrator IdentificationEnter Pin : IOK EXITPress <#> for correctionmanuel.book  Page 34  Vendredi, 30. mai 2003  12:21 12
SE32/03-011145-01 SAGEM SA document. Reproduction and disclosure forbidden. 35ESIf the identification is successful, the application allows access tothe biometric management functions. The biometric managementoperations are:−Insert template/ID in database (enrollment): The terminal insertsa new record in the database.−Remove template/ID from database (deletion): The terminalremoves the record identified by the ID in the database.Insert template/ID in database (MorphoAccess™ 200 only)To insert template/ID in local database, select the ENROLL menu.You have to enter the ID of the person and validate it. The primaryand secondary fingers are requested and their correspondingbiometric templates are processed. If the process is successful,then the person is registered in the local database.You can use the correction key # to delete the last digit entered. Inthe next screen you enroll your finger. Here You choose the usertype Administrator or User.Administrator ModeSelect a command PleaseENROLL DEL EXITERASEEnrollment ModeEnter Person ID : IOK CANCELPress <#> for correctionmanuel.book  Page 35  Vendredi, 30. mai 2003  12:21 12
36 SAGEM SA document. Reproduction and disclosure forbidden. SE32/03-011145-01ESRemove template/ID from database (MorphoAccess™ 200only)To remove a single template/ID record from the database, selectthe DEL menu. You will then have to enter the ID of the person andvalidate it. If the ID number does not exist in the local database, anerror message appears.You can use the correction key # to delete the last digit entered.Remove all template/ID from database (MorphoAccess™ 200only)To remove all records from the local MorphoAccess™ database,select the ERASE menu option. A screen appears to confirm yourcommand.Deletion ModeEnter Person ID : IOK CANCELPress <#> for correctionDo you reallywant to ERASEthe DatabaseNO YESmanuel.book  Page 36  Vendredi, 30. mai 2003  12:21 12
SE32/03-011145-01 SAGEM SA document. Reproduction and disclosure forbidden. 37ESAccess the set up functions of the systemTo access the System Menu, you must leave the main applicationof the MorphoAccess™. You must access the Administrator Menus(see the section Biometric Management in Standalone) if you arein fingerprint detection mode.You must select the System Menu.Then, select the ASYST menu to enter in the system application.Enter the password to access to SYSTEM MENU (default value:12345).You can use the correction key # to delete the last digit entered.The password can be changed in the configuration file"/cfg/system" (see the section Setting up Administrator SystemPin). The System Menu will appear when the password is correct.ASYSTE MACCESSSYSTEM MENUEnter Password:OK CANCELPress <#> for correctionmanuel.book  Page 37  Vendredi, 30. mai 2003  12:21 12
38 SAGEM SA document. Reproduction and disclosure forbidden. SE32/03-011145-01ESThe CONFIG menu allows you to set up network and third-partyapplications and specify additional parameters.The  VERSION item allows you to browse for software modulespresent in your SAGEM MorphoAccess™ and see their revisionnumber(s).The SER NB item displays the terminal serial number, MicroBootrevision and Ethernet physical address of your machine.The MORE key displays the rest of the system options.The SETTING menu allows you to set the LCD contrast and thetime and date.SYSTEM MENUCONFIG VERSION MORESER NBSYSTEM MENUSETTING EXIT MOREmanuel.book  Page 38  Vendredi, 30. mai 2003  12:21 12
SE32/03-011145-01 SAGEM SA document. Reproduction and disclosure forbidden. 39ESThe CONFIG menuUnreferenced configuration keys are reserved by the applicationand must not be changed(8).Setting up Network ParametersFrom the System Menu, press the CONFIG key to access theconfiguration files. Press the NEXT key until the file menu shows"/cfg/net".−Press the EDIT key. The section menu will show "ip".−Press the NEXT key until the address menu shows "address",then press the EDIT key.You can now edit the IP address of your SAGEM SAMorphoAccess™.The LEFT and RIGHT keys move the cursor. The alphanumerickeys enter digits as necessary. The # key deletes the digitimmediately to the left of the cursor. The EXIT key aborts editingand restores the previous address value.(8) For default values, see appendix 4.PREV NEXT EDITEXITFILE:     cfg/netPREV NEXT EDITEXITFILE:     cfg/netSECTION: ipPREV NEXT EDITEXITFILE:     cfg/netSECTION: ipaddress: 134.1.32.214manuel.book  Page 39  Vendredi, 30. mai 2003  12:21 12
40 SAGEM SA document. Reproduction and disclosure forbidden. SE32/03-011145-01ESWhen finished editing, press the OK key to update the addressfield and return to the previous screen.The IP subnet mask and IP default gateway are set up in the sameway. Contact your network Administrator for these values.Setting up the System Administrator PinFrom the Set up menu, press the CONFIG key to access theconfiguration files. Press the NEXT key until the file menu shows"/cfg/ system".Press the EDIT key. The section menu will show "System". Pressthe EDIT key again to show "Pwd". You can now edit the passwordkey to get access to system menu. The default value is "12345".The LEFT and RIGHT keys move the cursor and the # key deletesthe digit immediately to the left of the cursor. The CANCEL keyaborts editing and restores the previous password value.LEFT RIGHT OKCANCELcfg/net              ipaddress    134.1.32.214PREV NEXT EDITEXITFILE:     cfg/systemSECTION: SystemPwd : 12345manuel.book  Page 40  Vendredi, 30. mai 2003  12:21 12
SE32/03-011145-01 SAGEM SA document. Reproduction and disclosure forbidden. 41ESSetting up the MorphoAccess™ Administrator PinFrom the Set up menu, press the CONFIG key to access theconfiguration files. Press the NEXT key until the file menu shows"/cfg/ Maccess".Press the EDIT key. The section menu will show "Admin". Pressthe  EDIT key again to show "PwdAdmin". You can now edit thepassword key to get access to system menu. The default value is"12345".The PREV and NEXT keys move the cursor and the # key deletesthe digit immediately to the left of the cursor. The CANCEL keyaborts editing and restores the previous password value.Setting up Host Communication(9)This mode allows management of a local database within theMorphoAccess™. The default value of Host Com key is 3 (MMS).In this case, the biometric management is between terminal andMorphoAccess™ Management System (MMS). To configure theMorphoAccess™ terminal to manage the local database, thisdefault value must be changed to 0.From the System Menu, press the CONFIG key to access theconfiguration files.(9) With MorphoAccess™ 300, the stand alone mode is disabled. Nevertheless, the key value must be set to 0to enable MMS connection.PREV NEXT EDITEXITFILE:     cfg/MaccessSECTION: AdminPwdAdmin : 12345manuel.book  Page 41  Vendredi, 30. mai 2003  12:21 12
42 SAGEM SA document. Reproduction and disclosure forbidden. SE32/03-011145-01ESPress  NEXT key until the file shows "/cfg/Maccess". Press theEDIT key to select "Admin" section.Press EDIT key and NEXT key to select the "Host Com" value.You can now edit the value. The LEFT and RIGHT keys move thecursor. The numeric keys enter digits as necessary. Thealphanumeric # key deletes the digit immediately to the left of thecursor. The EXIT key aborts editing and restores the previousvalue.The allowed values are:You cannot use the stand alone mode to manage your localdatabase if the MorphoAccess™ biometric data is managed by theMMS.The MorphoAccess™ shall be used either in stand alone mode orin connected mode (with MMS) but never in both modes.Parameters Value CommentHost Com 0 Stand alone1 Connected through COM12 Connected through COM23 (default value) Connected through ETH-ERNETPREV NEXT EDITEXITFILE:     cfg/MaccessSECTION: AdminPREV NEXT EDITEXITFILE:     cfg/MaccessSECTION: AdminHost Com : 1manuel.book  Page 42  Vendredi, 30. mai 2003  12:21 12
SE32/03-011145-01 SAGEM SA document. Reproduction and disclosure forbidden. 43ESConfiguring the key to 0 will disable MMS connection.Setting up juvenile recognitionSince software release 2.0, the MorphoAccess™ is able tomanage both juvenile and adult finger images.From the System Menu, press the CONFIG key to access theconfiguration files. Press the NEXT key until the file menu shows"/cfg/ Maccess".Press the EDIT key. Press the NEXT key until the section menushows "bio".Press the EDIT key. You can edit the juvenile parameters toactivate juvenile recognition.PREV NEXT EDITEXITFILE:     cfg/MaccessSECTION:PREV NEXT EDITEXITFILE:     cfg/MaccessSECTION: bioPREV NEXT EDITEXITFILE:     cfg/MaccessSECTION: biojuvenile : 0manuel.book  Page 43  Vendredi, 30. mai 2003  12:21 12
44 SAGEM SA document. Reproduction and disclosure forbidden. SE32/03-011145-01ESThis provides a solution with reliable performance to the automaticprocessing of finger images with small to normal ridges, extendingthe capability of the terminal by providing access control to a widerrange of population.Since the encoding time is a little bit longer when the juvenileoption is turned on, we offer the possibility to the user set up theterminal either in "Juvenile" mode or in standard mode.When the juvenile mode is turned on, key set to 1, young childrencan easily be enrolled in the MorphoAccess™.Setting up anti-latencyThe anti-latency processing consists to detect marks left on thesensor. In some extreme conditions it is possible that a mark lefton the sensor triggers an identification or verification.From the 4.4 release of MorphoAccess firmware it is now possibleto detect marks left on the sensor.When the MorphoAccess detects a mark the identification isstopped and the application loops back and look for a newfingerprint.With regards to the previous releases of the MA application themain change is that  a  fingerprint placed two consecutive times onthe sensor in the the same position will be rejected from thesecond attempt.From the System Menu, press the CONFIG key to access theconfiguration files. Press the NEXT key until the file menu shows"/cfg/Maccess".PREV NEXT EDITEXITFILE:     cfg/MaccessSECTION: manuel.book  Page 44  Vendredi, 30. mai 2003  12:21 12
SE32/03-011145-01 SAGEM SA document. Reproduction and disclosure forbidden. 45ESPress the EDIT key. Press the NEXT key until the section menushows "bio".Press the EDIT key. You can edit the anti-latency parameters toactivate the mode.When the anti-latency mode is turned on, key set to 1, no latentfingerprint marks may be detected by the MorphoAccess™.Setting up matching thresholdThe performances of a biometric  system are characterized by twoquantities, the  False Non Match Rate - FNMR - (Also called FaleReject Rate) and the False Match Rate - FMR - (Also called FalseAcceptance Rate). Different trade-off are possible between FNMRand FMR depending on the security level targeted by the accesscontrol system. When convenience is the most important factor theFNMR must be low and conversly if security is more importantthen  the FMR  has to be minimized.Different tunning are proposed in the MorphoAccess terminaldepending on the security level targeted by the system. The tablebelow details the different possibilities.From the System Menu, press the CONFIG key to access theconfiguration files. Press the NEXT key until the file menu shows"/cfg/ bio".PREV NEXT EDITEXITFILE:     cfg/MaccessSECTION: bioPREV NEXT EDITEXITFILE:     cfg/MaccessSECTION: bioAnti latency : 0manuel.book  Page 45  Vendredi, 30. mai 2003  12:21 12
46 SAGEM SA document. Reproduction and disclosure forbidden. SE32/03-011145-01ESPress the EDIT key. Press the NEXT key until the section menushows "matching threshold".Press the EDIT key. You can edit the matching threshold levelparameters for identification and authentication using NEXT andEDIT keys.PREV NEXT EDITEXITFILE:     cfg/bioSECTION:PREV NEXT EDITEXITFILE:     cfg/bioSECTION: matching threshPREV NEXT EDITEXITFILE:     cfg/bioSECTION: matching thresholdidentify : 5PREV NEXT EDITEXITFILE:     cfg/bioSECTION: matching thresholdauthenticate : 5manuel.book  Page 46  Vendredi, 30. mai 2003  12:21 12
SE32/03-011145-01 SAGEM SA document. Reproduction and disclosure forbidden. 47ESYou can now edit the format of the value. The LEFT and RIGHTkeys move the cursor. The numeric keys enter digits as necessary.The alphanumeric # key deletes the digit immediately to the left ofthe cursor. The EXIT key aborts editing and restores the previousvalue.This parameter can be set to values from 0 to 10. This parameterspecifies how tight the matching threshold is. Threshold scoringvalues are identified below.For example:0 Low threshold for test purpose onlyThere are few rejections, but many recognitions1 Very few persons rejected FAR < 1%2 FAR < 0.3%3 FAR < 0.1%4 FAR < 0.03%5 Intermediate threshold(default value)FAR < 0.01%6 FAR < 0.001%7 FAR < 0.0001%8 FAR < 0.00001%9 Very high threshold(few false acceptances)FAR < 0.0000001%10 High threshold for test purpose onlyThere are very few recogni-tions, and many rejectionsmanuel.book  Page 47  Vendredi, 30. mai 2003  12:21 12
48 SAGEM SA document. Reproduction and disclosure forbidden. SE32/03-011145-01ESSetting up multilingual applicationThe MorphoAccess™ can operate using other language thanEnglish. It can also operate in Spanish and French. It is possible todownload a user defined string table. For more information aboutthis feature, refer to the MorphoAccess™ Host System InterfaceSpecification, Ref.: 3000005996.The default language of the MorphoAccess™ is defined in the/cfg/Maccess/Language/default.The allowed values are:Setting up user interfaceLanguageA user may choose his language by pressing a button. Thelanguage choice is circular. This feature can be enabled anddisabled with key /cfg/Maccess/Language/change.Those configuration keys can be defined from the CONFIG menuin file /cfg/Maccess, in section Language.Parameters Value CommentDefault 0 (default value) English1 Spanish2 French3 User defined languagePlace your fingerfor identificationPleaseFR00manuel.book  Page 48  Vendredi, 30. mai 2003  12:21 12
SE32/03-011145-01 SAGEM SA document. Reproduction and disclosure forbidden. 49ESIdentification informationOn a positive identification, it is possible to display an informationabout the identified user. This information should be present in theadditional fields of its record.Those configuration keys can be defined from the CONFIG menuin file /cfg/Maccess, in section GVI.The allowed values are:Example: First and second additional field have been selected.They contain first and family name of all records present in thedatabase. On identification, system will display the followingscreen:This feature needs a database containing the appropriateadditional fields.Parameters Value CommentChange 0 (default value) The change language but-ton is disable. Users can-not change their language.1 Users can choose their language using the change language button.Parameters Value CommentWelcome field 1/2 0 (default value) System displays ID of iden-tified person.X System displays data present in additional field number X of identified per-son.WelcomeJohn SMITHIDENTIFIED✔✔✔✔✔manuel.book  Page 49  Vendredi, 30. mai 2003  12:21 12
50 SAGEM SA document. Reproduction and disclosure forbidden. SE32/03-011145-01ESClockWhen using time mask feature, users may find useful tosynchronise with their MorphoAccess™. A clock can be displayed.Time is displayed in the 24 hours format.Related configuration key can be defined from the CONFIG menuin file /cfg/GUI, in section Display hour.The allowed values are:Idle modeIn identification mode it is possible to switch the MorphoAccess™in idle mode in order to shut down sensor red light and greenscreen back light. Pressing a key wakes the MorphoAccess™ up.Related configuration key can be defined from the CONFIG menuin file /cfg/GUI, in section Idle time in min.The allowed values are:Parameters Value CommentDisplay hour 0 (default value) Clock is not displayed.1 Clock is displayed and refreshes every minute.Parameters Value CommentIdle time in min. 0 (default value) MorphoAccessTM never enters idle mode.n MorphoAccessTM enters idle mode after n minutes.Place your fingerfor identificationPlease15:2408manuel.book  Page 50  Vendredi, 30. mai 2003  12:21 12
SE32/03-011145-01 SAGEM SA document. Reproduction and disclosure forbidden. 51ESSetting up contactless reader parameters (MorphoAccess™220 only)A MIFARE card is defined by a unique serial number. The card isdivided in 16 sectors. Each sector is divided in 4 blocks. Eachblock contains 16 bytes of data. Data are encoded with two sets ofkey. To be able to read a card, the reader should use the same keyset. Fourth blocks cannot be read, they are used to store key sets.Data can be accessed by blocks as follows:Blocks are numbered in an absolute way, 1 for block 0 sector 0,then 3 blocks for each sector.SAGEM SA biometric data (ID, name and templates) are locatedon the card thanks to a BNC address where:<B> is the first block number to read,<N> is the number of blocks to read,<C> selects a security key.For more information about SAGEM SA biometric data, pleasecontact SAGEM SA or refer to document 3000005996MorphoAccess™ Host System Interface Specification.With a MorphoAccess™ 220, contactless parameters can bedefined from the CONFIG menu in file /cfg/Maccess, in sectionContactless.Block 0 Block 1 Block 2 Block 3Sector 0 Block 1 Block 2 Block 3Sector 1 Block 4 Block 5 Block 6...Sector 15 Block 46 Block 47 Block 48manuel.book  Page 51  Vendredi, 30. mai 2003  12:21 12
52 SAGEM SA document. Reproduction and disclosure forbidden. SE32/03-011145-01ESThe allowed values are:Setting up log fileThe MorphoAccess™ can log its biometric activities. It stores theresult of the command, the date and time, the matching mark, theexecution time, and the ID of the user.Those configuration keys can be defined from the CONFIG menuin file /cfg/Maccess, in section Admin.Parameters Value CommentReader Type 0 No MIFARE reader is used.1 External MIFARE Deister reader is used.2 (default value) Internal MIFARE reader is used.B 4 (default value) to 13First block number to read.N 2 or 25 Number of blocks to read.2 when an ID is stored.25 when templates are stored.C 2 (default value) MIFARE security key A is selected.MIFARE security key B is selected.manuel.book  Page 52  Vendredi, 30. mai 2003  12:21 12
SE32/03-011145-01 SAGEM SA document. Reproduction and disclosure forbidden. 53ESThe allowed values are:It is possible to upload the log file. For more information about thisfeature, refer to the MorphoAccess™ Host System InterfaceSpecification, Ref.: 3000005996.Setting up time maskWhen using MMS commands, a time mask feature is available.This mode enables the access according to its time mask. Timemask is defined by slots of 15 minutes over a week. For moreinformation, see MorphoAccess™ Host System InterfaceSpecification Ref.: 3000005996.Those configuration keys can be defined from the CONFIG menuin file /cfg/Maccess, in section Admin.The allowed values are:Parameters Value CommentLog File 0 (default value) MorphoAccessTM is not logging its activities.1 MorphoAccessTM is log-ging its activities.Parameters Value CommentTime mask 0 (default value) Time mask feature is dis-able.1 Time mask feature is enabled. Users must be on time to have their access granted.manuel.book  Page 53  Vendredi, 30. mai 2003  12:21 12
54 SAGEM SA document. Reproduction and disclosure forbidden. SE32/03-011145-01ESSetting up download agentIn order to upgrade the MorphoAccess™ terminal to futureversions, a download agent is running. This agent allowsconnecting to the terminal and proceeding maintenanceoperations. For more information about the protocol used tocommunicate with this agent, please contact your SAGEM SAsales representative.Those configuration keys can be defined from the CONFIG menuin file /cfg/sdl, in section download.The allowed values are:Setting up Wiegand/Dataclock ouputYou can use the output Wiegand(10) or Dataclock to send thecorresponding ID to the central security controller. Wiegand portsare configured in 26-bit format and output port Dataclock iscompatible with ISO track 2 data formats.Using Wiegand, ID is sent in binary format. Using Dataclock, Id issent in BCD(11) format(12).From the System Menu, press the CONFIG key to access theconfiguration files. Press the NEXT key until the file menu shows"/cfg/Maccess".Parameters Value CommentActive 0 Agent is disabled.1 (default value) Agent is enabled.Ratif 3 (default value) Number of failed attempts before deactivating the agent.Password 12345678(default value)Password to present in order to connect the agent.(10)Refer to the previous chapter to configure the terminal with desired output.(11)BCD: Binary Code Decimal.(12)For more information, see appendices 2 and 3.manuel.book  Page 54  Vendredi, 30. mai 2003  12:21 12
SE32/03-011145-01 SAGEM SA document. Reproduction and disclosure forbidden. 55ESPress the EDIT key. Press the NEXT key until the section menushows "Wiegand/Dataclock".Press the EDIT key. You can edit the Wiegand/Dataclockparameters using NEXT and EDIT keys.To configure the facility code in Wiegand(13) mode, you must selectthe facility code key in section Wiegand/Dataclock.You can now edit the value. The LEFT and RIGHT keys move thecursor.The numeric keys enter digits as necessary. Thealphanumeric # key deletes the digit immediately to the left of thecursor. The EXIT key aborts editing and restores the previousvalue.To configure the Data and Strobe levels in Dataclock(14) mode,you must select the Dataclock level key in sectionWiegand/Dataclock.(13)For more information, see appendix 2(14)Idem.PREV NEXT EDITEXITFILE:     cfg/MaccessSECTION:PREV NEXT EDITEXITFILE:     cfg/MaccessSECTION: Wiegand/DataclockPREV NEXT EDITEXITFILE:     cfg/MaccessSECTION: Wiegand/DataclockFacility code : 7manuel.book  Page 55  Vendredi, 30. mai 2003  12:21 12
56 SAGEM SA document. Reproduction and disclosure forbidden. SE32/03-011145-01ESYou can now edit the value. The LEFT and RIGHT keys move thecursor.The numeric keys enter digits as necessary. The alphanumeric #key deletes the digit immediately to the left of the cursor. The EXITkey aborts editing and restores the previous value.When finished editing, press OK key to update the format valueand return to the previous screen.To activate/deactivate the output port, you must select the SENDkey in section Wiegand/Dataclock.You can now edit the value. The LEFT and RIGHT keys move thecursor.The numeric keys enter digits as necessary. The alphanumeric #key deletes the digit immediately to the left of the cursor. The EXITkey aborts editing and restores the previous value.Parameters Value CommentDataclock level 0 (default value) Data and strobe are not inverted.1 Strobe is inverted.2 Data is inverted.3 Data and strobe are inverted.PREV NEXT EDITEXITFILE:     cfg/MaccessSECTION: Wiegand/DataclockDataclock level : 0PREV NEXT EDITEXITFILE:     cfg/MaccessSECTION: Wiegand/DataclockSend : 0manuel.book  Page 56  Vendredi, 30. mai 2003  12:21 12
SE32/03-011145-01 SAGEM SA document. Reproduction and disclosure forbidden. 57ESThe allowed values are:When finished editing, press OK key to update the value andreturn to the previous screen.To configure the behaviour of LED IN and LED OUT signals, go tothe  CONFIG menu in file /cfg/Maccess, in sectionWiegand/Dataclock.You can now edit the value. The LEFT and RIGHT keys move thecursor.The numeric keys enter digits as necessary. The alphanumeric #key deletes the digit immediately to the left of the cursor. The EXITkey aborts editing and restores the previous value.The allowed values are:Parameters Value CommentSend 0 The output is not activated.1 (default value) The output is activated.Parameters Value CommentLevel out/Card present 0 (default value) AutodetectThe led out signal can behave as a card present signal depending on the hardware configuration of the system:−DataClock IN/DataClock OUT: Card presentPREV NEXT EDITEXITFILE:     cfg/MaccessSECTION: Wiegand/Dataclockled out/card present : 0manuel.book  Page 57  Vendredi, 30. mai 2003  12:21 12
58 SAGEM SA document. Reproduction and disclosure forbidden. SE32/03-011145-01ESSetting up Ethernet Link parametersYou can use the Ethernet port to send the corresponding ID to thecentral security controller. Connection should be made using port11020.Those configuration keys can be defined from the CONFIG menuin file /cfg/Maccess, in section Ethernet.Parameters Value Comment−Wiegand IN/DataClock OUT: card present (priority goes to dataclock out)−Wiegand IN/Wiegand OUT: led out−DataClock IN/Wiegand OUT: inactiveLed out/Card present (con’t)1 Force Led outThe led out signal only behaves as a led out sig-nal.Led in 0 (default value) ActiveThe led in signal is ignored.1 InactiveThe MorphoAccessTM led is driven by the led in sig-nal:led in = 0 =>led is greenled in = 1 => led is offmanuel.book  Page 58  Vendredi, 30. mai 2003  12:21 12
SE32/03-011145-01 SAGEM SA document. Reproduction and disclosure forbidden. 59ESThe allowed values are:Setting up Serial Link ParametersYou can use the serial port(15) to send the corresponding ID to thecentral security controller. You can use COM1 or COM2 or both.Setting up COM1 portFrom the System Menu, press the CONFIG key to access theconfiguration files. Press the NEXT key until the file menu shows"/cfg/ Maccess".Press the EDIT key. Press the NEXT key until the COM1 menushows "COM1".Parameters Value CommentSend 0 (default value) ID is not sent.1 ID is sent through the Eth-ernet port.IP aaa.bbb.ccc.ddd IP of the central security controller.(15)One RS422 port (full duplex, four wires) or one RS232 port.PREV NEXT EDITEXITFILE:     cfg/Maccessmanuel.book  Page 59  Vendredi, 30. mai 2003  12:21 12
60 SAGEM SA document. Reproduction and disclosure forbidden. SE32/03-011145-01ESPress the EDIT key. You can now edit the format parameters toselect the output format of the ID.You can now edit the format of the ID. The LEFT and RIGHT keysmove the cursor. The numeric keys enter digits as necessary. Thealphanumeric # key deletes the digit immediately to the left of thecursor.The EXIT key aborts editing and restores the previous value.The allowed values are:When finished editing, press OK key to update the format of the IDand return to the previous screen.Parameters Value CommentFormat 0 (default value) The ID is sent in ASCII for-mat.1 The ID is sent in Hexa for-mat.2 The ID is sent in BCD(13) format.PREV NEXT EDITEXITFILE:     cfg/MaccessSECTION: COM1PREV NEXT EDITEXITFILE:     cfg/MaccessSECTION: COM1Format : 0manuel.book  Page 60  Vendredi, 30. mai 2003  12:21 12
SE32/03-011145-01 SAGEM SA document. Reproduction and disclosure forbidden. 61ESTo activate or deactivate the COM1 port, you must select theSEND key in section COM1.The allowed values are:ID transmission on port COM1 is disabled when ILVcommunication is activated with key /cfg/Maccess/Admin/HostCom set to 1.To configure the COM1 serial link, press the CONFIG key from theSystem Menu. Press the NEXT key until the file menu shows "/cfg/ser0" and select parameters section.Parameters Value CommentSend 0 (default value) The COM1 output is not activated.1 The output COM1 is acti-vated.LEFT RIGHT OKCANCEL/cfg/Maccess/COM1Send   0PREV NEXT EDITEXITFILE:     /cfg/ser0manuel.book  Page 61  Vendredi, 30. mai 2003  12:21 12
62 SAGEM SA document. Reproduction and disclosure forbidden. SE32/03-011145-01ESPress the EDIT key. The section menu will show "parameters".Press the EDIT key. You can edit the baudrate value to select thetransmission speed.You can now modify the baudrate value of COM1 port. The LEFTand RIGHT keys move the cursor. The numeric keys enter digits asnecessary. The alphanumeric # key deletes the digit immediatelyto the left of the cursor. The EXIT key aborts editing and restoresthe previous baudrate value.Parameters Value CommentBaudrate (bits/second) 0 12001 24002 48003 (default value) 96004 192005 288006 384007 576008 115200PREV NEXT EDITEXITFILE:     cfg/ser0SECTION: parametersPREV NEXT EDITEXITFILE:     cfg/ser0SECTION: parametersbaudrate : 3manuel.book  Page 62  Vendredi, 30. mai 2003  12:21 12
SE32/03-011145-01 SAGEM SA document. Reproduction and disclosure forbidden. 63ESWhen finished editing, press OK key to update the baudrate fieldand return to the previous screen.To configure the next parameters (databits, parity and control flow),select the NEXT key to select the other value and follow theprevious descriptions to modify the values.You can edit the databits parameters. The different values are:Parameters Value CommentDatabits 5 5667 (default value) 788PREV NEXT EDITEXITFILE:     cfg/ser0SECTION: parametersdatabits : 7PREV NEXT EDITEXITFILE:     cfg/ser0SECTION: parametersstopbits : 2manuel.book  Page 63  Vendredi, 30. mai 2003  12:21 12
64 SAGEM SA document. Reproduction and disclosure forbidden. SE32/03-011145-01ESYou can edit the stopbits parameter, the allowed values are:You can edit the parity parameter.The allowed values are:You can edit the control flow parameter.The allowed values are:Parameters Value CommentStopbits 1 12 (default value) 2Parameters Value CommentParity 0 No1Odd2 (default value) EvenParameters Value CommentFlow Ctrl Type 0 (default value) No2 Xon/XoffPREV NEXT EDITEXITFILE:     cfg/ser0SECTION: parametersParity : 2PREV NEXT EDITEXITFILE:     cfg/ser0SECTION: parametersflow ctrl : 0manuel.book  Page 64  Vendredi, 30. mai 2003  12:21 12
SE32/03-011145-01 SAGEM SA document. Reproduction and disclosure forbidden. 65ESWhen using the Deister contacless card reader, COM1 parametersshould be:Setting up COM2 portTo activate this port, press the CONFIG key to access theconfiguration files. Press the NEXT key until the file menu shows"/cfg/Maccess". Press the EDIT key, and select the RS232 section.The values are:BaudrateDatabitsStopbitsParityFlow ctrl3 (9600)8100Parameters Value CommentSend 0 (default value) The RS232 output is not activated.1 The RS232 output is acti-vated.Format 0 (default value) The ID is sent in ASCII for-mat.1 The ID is sent in Hexa for-mat.2 The ID is sent is BCD(1) format.(1) BCD: Binary Code DecimalPREV NEXT EDITEXITFILE:     cfg/MaccessSECTION: COM2manuel.book  Page 65  Vendredi, 30. mai 2003  12:21 12
66 SAGEM SA document. Reproduction and disclosure forbidden. SE32/03-011145-01ESThe following table describes the parameters for the serial linkconfiguration. Press the CONFIG key to access the configurationfiles. Press the NEXT key until the file menu shows "/cfg/ser1" andselect parameters section.ID transmission on port COM2 is disabled when ILVcommunication is activated with the key /cfg/Maccess/Admin/HostCom set to 2.The values are described below:Parameters Value CommentBaudrate 0 1200 bit/second1 2400 bit/second2 4800 bit/second3 (default value) 9600 bit/second4 19200 bit/second5 28800 bit/second6 38400 bit/second7 57600 bit/second8 115200 bit/secondData bits 5 5667 (default value) 788Stop bits 1 122PREV NEXT EDITEXITFILE:     cfg/ser1SECTION: parametersmanuel.book  Page 66  Vendredi, 30. mai 2003  12:21 12
SE32/03-011145-01 SAGEM SA document. Reproduction and disclosure forbidden. 67ESSetting up Relay ParametersIt is possible to configure the release time of the relay. For this,from the System Menu, press the CONFIG key to access theconfiguration files. Press the NEXT key until the file menu shows"/cfg/Maccess".Press the EDIT key, and press NEXT key to select the Relaysection.Press the EDIT key. You can edit the release time value by 100 mssteps.You can now modify the release time value by pressing the EDITkey.The  LEFT and RIGHT keys move the cursor. The numeric keysenter digits as necessary. The alphanumeric # key deletes the digitimmediately to the left of the cursor. The EXIT key aborts editingand restores the previous value.Parameters Value CommentParity 0 No1Odd2 (default value) EvenFlow control type 0 (default value)l No1 Hardware (CTS/RTS)2 Software (XON/XOFF)PREV NEXT EDITEXITFILE:     cfg/MaccessSECTION: RelayPREV NEXT EDITEXITFILE:     cfg/MaccessSECTION: RelayTime in 100 ms : 30manuel.book  Page 67  Vendredi, 30. mai 2003  12:21 12
68 SAGEM SA document. Reproduction and disclosure forbidden. SE32/03-011145-01ESWhen finished editing, press the OK key to update the releasetime field and return to the previous screen.To configure the next parameter, select the NEXT key. You can editthe "active" value.The different values are:Parameters Value CommentActive 0 (default value) Relay not active.2 Relay active.PREV NEXT EDITEXITFILE:     cfg/MaccessSECTION: RelayActive : 0manuel.book  Page 68  Vendredi, 30. mai 2003  12:21 12
SE32/03-011145-01 SAGEM SA document. Reproduction and disclosure forbidden. 69ESThe VERSION menuInformation DisplayFrom the System Menu, press the VERSION key to access theinformation file.This display contains information that may be necessary if theSAGEM SA MorphoAccess™ requires technical support. It shouldnot normally be necessary to access this display unless requestedby SAGEM SA technical support personnel.Kernel is the name of the module being displayed.Rev is the revision of the module.P/N is the part number for the module.∑ is the checksum for the module.The next line shows the date of the module’s creation.ID is the ID for the module in the system.The PREV and NEXT buttons allow you to browse for all modulespresent in your SAGEM SA MorphoAccess™.EXIT returns to main menu.PREV NEXT EXITKernel                     Rev: 3.1P/N:233082036                    ∑:0125B463May 1 2002 13:21:05                  ID:0001manuel.book  Page 69  Vendredi, 30. mai 2003  12:21 12
70 SAGEM SA document. Reproduction and disclosure forbidden. SE32/03-011145-01ESThe SERIAL NUMBER menuSerial Number DisplayFrom the System Menu, press the SER NB key to display theserial number.Serial # is your SAGEM SA MorphoAccess™’s serial number.MicroBoot revision is the revision number of your SAGEM SAMorphoAccess™’s MicroBoot. This revision number may beneeded when requesting technical support.ETH is the physical Ethernet address, also known as the MACaddress. This address may be required by your networkAdministrator.OKSerial # : 993000001Micro Boot revision : 2.4ETH : 00:90:27:9A:F2:53manuel.book  Page 70  Vendredi, 30. mai 2003  12:21 12
SE32/03-011145-01 SAGEM SA document. Reproduction and disclosure forbidden. 71ESThe SETTING menuParameters SettingFrom the System Menu, press the SETTING key to access theparameter settings.The  CONTRA selection allows you to adjust the contrast of theLCD display.The MORE key increases the contrast, the LESS key decreasesthe contrast.The RTC menu allows you to set the current date and time.GENERAL SETTINGSCONTRA RTC EXITCONTRAST SETTINGSLESS MORE EXITCONTRAST VALUE : 5-+RTC SETTINGSSETTIME SETDATE EXITTime 16:45:44   Date 14/06/00manuel.book  Page 71  Vendredi, 30. mai 2003  12:21 12
72 SAGEM SA document. Reproduction and disclosure forbidden. SE32/03-011145-01ESThe SETTIME key allows you to set the time. Enter the time in thefollowing format: HHMMSS. The VALID key records your setting.The CANCEL key aborts editing and returns to the previous menu.The SETDATE key allows you to set the current date. Enter thedate in the following format: DDMMYY. The VALID key recordsyour setting.The CANCEL key aborts editing and returns to the previous menu.Note : You can use the correction key # to delete the last charac-ters entered.TIME SETTINGSVALID CANCELTIME (HHMMSS) : 120000DATE SETTINGSVALID CANCELDATE (DDMMYY) : 100600manuel.book  Page 72  Vendredi, 30. mai 2003  12:21 12
SE32/03-011145-01 SAGEM SA document. Reproduction and disclosure forbidden. 73ESAccess the MIFARE keys update menu (MorphoAccessTM 220)Each data sector on a MIFARE card is protected in reading andwriting by 2 keys of 6 bytes each. These keys are noted A and B.Since the card is composed of 16 sectors, there are actually 32keys.When you present a MIFARE card to the MorphoAccess for anauthentication, data can be read only if the keys which protect itare the same as the keys initialized into the reader. By default bothkeys A and B are set to 0xFFFFFF for the 16 sectors in theMIFARE module of the MorphoAccess. These default values arecalled Transport keys.You can change the value of the keys thanks to the hotkeyCL KEYS in the Administrator menu(16). You will need for that anadministrator card containing the new keys to initialize. Pleasecheck the Enrollment Station documentation to know how to createan administrator card.While you are in the administrator menu, press the key CL KEYS.The MIFARE KEYS UPDATE screen appears.Present the administrator card to start the update.(16)If you perform this operation, the old user cards won't be readable anymore, since the keys won't be com-pliant anymore.CANCELMIFARE KEYS UPDATEPlease Present Admin Card<Current Keys : Transport>manuel.book  Page 73  Vendredi, 30. mai 2003  12:21 12
74 SAGEM SA document. Reproduction and disclosure forbidden. SE32/03-011145-01ESWhen the MorphoAccess™ finishes to update the keys for the16 sectors, a successful message appears. The keys statusindicates now "user" keys, meaning keys different from 0xFFFFFFhave been loaded into the reader. Then the MorphoAccess™comes back to the administrator menu after 2 seconds.If for some reasons the update is not successful (power shutdownbefore the end of the operation for instance), a new hotkey will beavailable the next time you will enter in the CL KEYS menu. Thekeys status will indicate "INVALID" keys.Pressing the LOAD DFLT KEYS hotkey will allow you to re-updatethe 32 keys with the default value 0xFFFFFF.CANCELMIFARE KEYS UPDATEUpdating Key A3 & B3<Current Keys : UPDATING>CANCELMIFARE KEYS UPDATEKeys have been udpated !<Current Keys : USER>PREVMIFARE KEYS UPDATEPlease Present Admin Card<Current Keys : INVALID>LOAD DFLT KEYSmanuel.book  Page 74  Vendredi, 30. mai 2003  12:21 12
 44 75Communication protocolThe communication protocol available allows the terminal to send commands to a host through the communication COM1/RS485.All the commands will be formatted with an "Identier Length Value" structure as described below:Identier Length ValueIdentier called I  This is the identier of the command.Length called L      This is the length of the Value eld in bytes.Value called V       The parameters or data.The  commands  will  be  encapsulated  in  a  packet  structure described on the next gure.STX ID RC ILV CRC DLE ETX                                                                                                                CRC  :  Compliance CRC16 V41Fields name Denition Value<STX> Start Text 0x02<ID> Packet Identier 0xE1<RC> Request Counter Unused byte<ILV> Identier Length Data (DLE data bytes arestuffed)I:0x00 for ASCII0x01 for Hexa0x02 for BCDL: 2 bytesV: Value of identier<CRC> Transmission error controlDepends on the frame<DLE> 0x1B<ETX> End Text 0x03Communication protocol
 76Appendix 1 - Wiegand data formatThe 26 bits of transmission consists of two parity bits and 24 code bits. The eight rst code bits are encoding the facility code. This  code  identies each  Morphoccess  in  a  network. The 16 other bits are data bits. The rst bit transmitted is the rst parity bit. It is even parity calculated over the rst 12 bits. The last bit transmitted is the second  parity bit. It is odd parity bit calculated over the last 12 code bits.Even parity (1 bit) Facility code (8 bits)Data (16 bits) Odd parity (1 bit)Compliant with access control 26-Bit - Wiegand reader interfacestandard  03/1995.Appendix 1
 46 77Appendix 2 - ISO 7811/2-1995 - Track 2 Data clock formatCompliant with ISO07811/2-1995 - Track 2.Data encoding tableValue              Bit pattern         Meaning0                      0 0 0 0-1              "0"1                      1 0 0 0-0              "1"2                      0 1 0 0-0              "2"3                      1 1 0 0-1              "3"4                      0 0 1 0-0              "4"5                      1 0 1 0-1              "5"6                      0 1 1 0-1              "6"7                      1 1 1 0-0              "7"8                      0 0 0 1-0              "8"9                      1 0 0 1-1              "9"10 (Ahex)          0 1 0 1-1              unused character11 (Bhex)           1 1 0 1-0              start sentinel (start character)12 (Chex)          0 0 1 1-1              unused character13 (Dhex)          1 0 1 1-0              eld separator14 (Ehex)          0 1 1 1-0              unused character15 (Fhex)           1 1 1 1-1             end sentinel (stop character)The least signicant bit of every digit is sent rst; the fth bit is an odd parity bit for each group of four data bits.The complete message always looks as follows:left edgestart data charactersend LRC right edgeThe LRC is calculated by the following procedure: each of the 4 bits in the LRC character is an even parity bit of the equivalent bits in the telegram including start and stop sentinel.The  fth  bit  is  the  odd  parity  of  the  four  LRC  bits  (it  is  not calculated over all the parity bits).Appendix 2
 78Data clock levelsIn normal operation mode (default) in and out signals are dened as:datastrobeOther modes are (only for output):datainverted strobeinverted datastrobeinverted datainverted strobeAppendix 2
 48 79Appendix 3Appendix 3 - Reserved conguration valuesThese values are for internal use only.For proper operation, these settings should not be changed./cfg/lcd0/display/type : 1/cfg/lcd0/contrast/value : 0/cfg/ser0/mode/connection: EXT/cfg/ser0/mode/mode: 450db/seq ash/start: 0/cfg/bio/video/channel: 0/cfg/bio/video/rotation: 0/cfg/lic/licences/*
 80MORPHO® BRAND BIOMETRIC PRODUCTWARRANTY, LIMITATIONS, AND SOFTWARE LICENSE1.  LIMITED WARRANTY AND MAINTENANCE.  Subject to the Disclaimers and Limitations of Warranty set forth below, SAGEM MORPHO, Inc., (hereinafter “SMI,” or its licensed reseller, as may be applicable) provide the following limited warranty, for the benet of original Customer only, that all hardware components of the Morpho® brand biometric product with which this information is associated will conform to the applicable hardware product specications as published by SMI and will be in good working order and free from material defects in materials or workmanship, given Customer’s normal use and service (the “Hardware Limited Warranty”).  It is further warranted that the Morpho® brand biometric software provided with, and/or loaded into and resident in the biometric product will conform to the applicable software specications or SMI documentation published by SMI, given Customer’s normal use and operation (the “Software Limited Warranty”).  Any and all  third  party  software  programs supplied with the biometric product are subject to their respective manufacturer’s warranty and license terms only, and SMI assumes no responsibility for such software.The Hardware Limited Warranty extends for one (1) year from the date of Customer’s receipt of delivery of the biometric product. The Software Limited Warranty extends for ninety (90) days from the date of Customer’s receipt of delivery of the biometric product. During the duration of the Hardware and Software Limited Warranties, the rst level of support shall be provided by telephone “Help Desk” support (the applicable Help Desk telephone number is included with the packaged biometric product).  Hardware repairs which cannot be remedied through Help Desk consultation shall be made by returning the hardware component to an authorized SMI service depot, in accordance with instructions issued by the service depot, at Customer’s expense.  Return delivery of the repaired or replaced component shall be at SMI’s expense.  SMI shall repair or replace  any nonconforming hardware component at its sole election.  Software problems not remedied through Help Desk consultation may be corrected through software patches or updates issued by SMI or by replacement of the unit in which the software is resident, at SMI’s sole election.  The Limited Software Warranty does not entitle the customer to automatically receive patches, updates or other notication of software correction or revision during the duration of the warranty.  The original warranty periods shall not be renewed or extended by subsequent repair or replacement.Biometric product maintenance after expiration of the one (1) year warranty may be available pursuant to the terms and conditions of a separate Maintenance Agreement – please contact the location  from which the  biometric product was purchased for further details.Warranty
 50 812.  LIMITATIONS AND  DISCLAIMERS  OF WARRANTY.  SMI does not warrant that operation of the biometric product will be uninterrupted or error-free; further, no biometric product or system can be guaranteed to be 100% accurate, or to properly enroll, identify, or authenticate every individual. SMI shall have no responsibility for repairing or otherwise remedying any defect or nonconformity in the condition or operation of the biometric product or its software if: 1) modications to Customer’s site are necessary for proper operation, and Customer’s site preparation is inadequate; 2) the biometric product is not professionally installed in accordance with applicable industry standards, local building/zoning codes such as the National Electric Code, and proper installation practices; 3) the biometric product is not maintained and operated with all proper accessories under normal conditions by  competent  personnel;  4)  the  biometric  product  incorporates  replacement  parts not authorized by SMI; 5) the biometric product has been subjected to disassembly except as required for normal installation, modication beyond what is described in SMI-supplied installation and operation guides, unauthorized enhancement, abuse or misuse; or 6) the defect or nonconformity has not been reported to the designated Help Desk within ten (10) days of its discovery by Customer.   As Customer’s sole and exclusive remedy for any nonconformity or defect in the condition or operation of the biometric product for which SMI is responsible, SMI shall provide its reasonable efforts to remedy same as set forth in Section 1, above during the applicable stated Limited Warranty Period.  With the exception  of its  Limited Warranties  set forth  in Section  1,  above,  TO  THE  MAXIMUM  EXTENT ALLOWED  BY APPLICABLE LAW,  SMI  DISCLAIMS ANY AND ALL  PROMISES,  REPRESENTATIONS AND WARRANTIES, EXPRESS OR IMPLIED, WITH RESPECT TO THE BIOMETRIC PRODUCT, ITS HARDWARE,  SOFTWARE,  DESIGN,  OR  FUNCTIONALITY,  OR ITS MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE, OR ARISING FROM  USAGE  OF  TRADE,  COURSE OF  DEALING, OR  COURSE OF PERFORMANCE.    SMI  FURTHER  DISCLAIMS ANY AND ALL PROMISES, REPRESENTATIONS AND WARRANTIES,  EXPRESS OR  IMPLIED,  WITH RESPECT TO ANY OF SMI’S SERVICES PERFORMED HEREUNDER.3.  LIMITATIONS OF LIABILITY.    The entire liability of SMI to Customer (or to any person or entity claiming through Customer) for any claim whatsoever related to the biometric product or the parties’ transaction shall not exceed the total amount of all payments made for the biometric product by Customer to the date of the claim.  IN NO EVENT SHALL SMI BE LIABLE TO CUSTOMER FOR ANY LOST PROFITS, LOST INFORMATION, BUSINESS INTERRUPTION, OR OTHER CONSEQUENTIAL, INCIDENTAL, SPECIAL, PUNITIVE OR INDIRECT DAMAGES (WHETHER IN AN ACTION IN CONTRACT OR TORT OR BASED ON WARRANTY), EVEN IF SMI HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES, ARISING OUT OF, OR RELATED TO, THE BIOMETRIC PRODUCT OR THE PARTIES’ TRANSACTION.  Some jurisdictions do not allow excluding or limiting  implied warranties, or  limiting liability for incidental or consequential damages, and some jurisdictions have special statutory consumer  protection provisions that  may supersede  this limitation.  As a result, the limitations and disclaimers of warranty and liability set forth herein may not apply to Customer if prohibited by the laws of Customer’s jurisdiction.Warranty
 82MORPHO® BRAND BIOMETRIC SOFTWARE END-USER LICENSE Important - Terms Govern Usage of SoftwarePlease Read Carefully Prior to Commencement of OperationsThis SMI End-User  License Agreement («License»)  allows the acquirer of an SMI biometric product (referred to in the following sections as the «End-User») to use the proprietary SMI software provided with, and/or loaded into and resident in, the SMI biometric product, so long as the End-User uses the SMI software strictly in accordance with the terms and conditions of this License, below. This License is a binding legal contract between the End-User and SMI, or its licensed reseller (sometimes referred to hereafter generically as «Licensor»).  By using the SMI software provided with, and/or resident in the SMI biometric product in any way, the End-User agrees to be bound by the License terms on a continuing basis. If the End-User does not agree to the terms of this License, Licensor is unwilling to license the software to End-User. In such event, End-User may not use the software, and End-User should promptly contact the location from which the SMI Product was acquired for instructions on return of the unused biometric product for a refund or credit.1. GRANT OF RIGHTS.  The SMI software  provided with,  and/or loaded  into and resident in, the biometric product, is licensed, not sold, to the End-User by Licensor, and is protected by United States copyright and trade secret laws, as well as by other intellectual property laws and international treaties.  Licensor grants to the End-User the right to use the copy of the SMI software originally loaded and resident in each unit of the SMI biometric product acquired by End-User in object-code format, subject to the following restrictions. End-User shall not use the SMI software in any computer, computer system, or hardware conguration other than in the course of authorized use of the SMI biometric product acquired by End-User. End-User shall not reverse engineer, decom-pile, disassemble, or copy the SMI software (except, and then only to the extent that such activity is expressly permitted by applicable law, notwithstanding this limitation); nor shall End-User modify, create a derivative work, or otherwise use the SMI software, except as stated in this License.  End-User shall not copy the written materials accompanying the SMI software, without the express written permission of Licensor.  End-User shall not remove, obscure or alter any notice of patent, trademark, service-mark, copyright, or other proprietary rights related to the SMI software or the SMI biometric product.  End-User shall promptly notify Licensor of any unauthorized use of the SMI software that comes to End-User’s attention.  SMI reserves all rights not expressly granted to the End-User hereunder.2. TRANSFERABILITY.  End-User may transfer the SMI software to another person or entity with SMI’s prior written consent, which shall not be unreasonably withheld, so long as: (1) the SMI software is transferred as an integral part of the SMI biometric product to be transferred to a third party; (2) the SMI software is in its original format, without  modication  (excepting  authorized  software  upgrades  installed  by  SMI,  or its licensed reseller); and (3) End-User transfers all of End-User’s rights under this License on a permanent basis to the third party recipient AND the recipient agrees to be bound by all terms of this Software License
 52 83License as End-User’s assignee. End-User shall not otherwise sublicense, assign, loan, rent, transfer, give or otherwise dispose of its interest in the SMI software to others, or vend services to others based directly on the SMI software (e.g., service bureau activities) unless such is otherwise expressly permitted by the terms of a written agreement between SMI and End-user. 3. TERMINATION OF LICENSE.  End-User acknowledges and agrees that the SMI Software contains valuable trade secrets and proprietary information which are the sole property of SMI and that violation of End-User’s license obligations hereunder will cause SMI and its licensed reseller immediate, irreparable harm for which monetary damages are inadequate.  In such event, SMI and/or its  licensed reseller shall be entitled to seek injunctive and equitable relief, in addition to all other remedies available under law to prevent any such violation, or to secure enforcement of this License.  Without prejudice to any other rights or remedies, SMI and/or its licensed reseller may terminate this License immediately in the event End-User fails to comply with the terms and conditions of this License.  In such event, End-User must immediately cease all use of the SMI software, destroy all copies thereof, and provide certication of such destruction as may be requested by SMI and/or its licensed reseller.4. SEVERABILITY; APPLICABLE LAW.  If any provision of this Agreement is found to be unlawful, void or unenforceable, then that provision shall be severed from this Agreement and  will not affect the validity or  enforceability of  any of the remaining provisions.  This Agreement shall be governed, construed and enforced solely and exclusively in accordance with the laws of the State of Washington, U.S.A., without regard to conict of law principles 5. U.S. GOVERNMENT RESTRICTED RIGHTS LEGEND.  The SMI software and any accompanying materials are provided with Restricted Rights.  Use, duplication, or disclosure by the U.S. Government and agencies thereof is subject to restrictions set forth herein and in subparagraphs (c)(1) and (2) of 48 CFR 52.227-19, Commercial Computer  Software-Restricted  Rights,  as  applicable  (or,  as  applicable,  similar regulatory  restrictions  on  Rights  in  Technical  Data  and  Computer  Software,  e.g., DOD FAR Supplement 252.227-7013 (c)(1)(ii)).  Manufacturer is SAGEM MORPHO, Inc., 1145 Broadway Plaza, Suite 200, Tacoma, WA 98402.Software License

Navigation menu