
TABLE OF CONTENTSTABLE OF CONTENTSTABLE OF CONTENTSTABLE OF CONTENTSTABLE OF CONTENTSTABLE OF CONTENTS
MORPHOACCESS® J SERIES –User Guide Table of contents
DOCUMENT SSE-0000077399-01 - VERSION 1.0 - MAY 2010 TOC • 3
SAGEM SÉCURITÉ DOCUMENT - REPRODUCTION AND DISCLOSURE PROHIBITED
2. Access control by authentication . . . . . . . 45
Authentication with templates on a contactless card . . . . . 46
Authentication with template in local database and user ID on contactless card . 47
Authentication based on contactless card mode . . . . . . 50
Bypassing the biometric control in authentication . . . . . 51
Multi-factor mode . . . . . . . . . . 53
Section 7 Proxy Mode
1. Proxy mode (or slave) presentation . . . . . . . 57
2. Proxy mode activation . . . . . . . . . 58
Section 8 Terminal Customization
1. Setting up recognition mode . . . . . . . . 61
Two attempts mode . . . . . . . . . . 61
Parameters . . . . . . . . . . . 61
2. Setting up matching threshold . . . . . . . . 63
3. Relay activation . . . . . . . . . . 64
Relay external activation . . . . . . . . . 64
4. LED IN feature . . . . . . . . . . 66
5. Access request log file . . . . . . . . . 68
6. Remote messages: sending the User ID to the central security controller . . . 69
Presentation . . . . . . . . . . . 69
Supported protocols . . . . . . . . . . 70
Note about terminal clock deviation . . . . . . . 70
7. Anti-tamper and anti-pulling switches . . . . . . . 71
Description . . . . . . . . . . . 71
Configuration keys . . . . . . . . . . 72
8. Setting up time mask . . . . . . . . . 75