UNIONCOMMUNITY UBio-X Iris User manual

Copyright 2000 By UNIONCOMMUNITY Co., LTD.
UBio-X Iris.User Guide
Version Eng-1.04
Distributed by

UBio-X Iris User Guide 2
<Revison History>
Version
Date
Description
Firmware Version
1.00
2020-06-17
Initial Release
0.0.1-61.00.000.01
1.01
2020-08-10
3.6.1 Add a description(※) for authentication in
system(p.43)
0.0.1-61.00.000.03
1.02
2020-01-21
3.6.3 Add mask detection level in iris recognition
3.7.6 Add ETC(thermal imaging) Menu
0.0.1-61.00.000.13
1.03
2021-02-01
3.6.1 Change user ID length(2~9 2~8) in
system(p.43)
0.0.1-61.00.000.14
1.04
2021-03-17
3.3.1.5 Add duress password authentication
description
0.0.1-61.00.000.15

UBio-X Iris User Guide 3
<Glossary>
Admin, Administrator
- A user who can enter into the terminal menu mode, he/she can register/modify/delete
terminal users and change the operating environment by changing settings.
- If there is no administrator for a terminal, anyone can change the settings. In this
regard, it is recommended to register at least one administrator.
- Caution is required with registration and operation because an administrator has the
right to change critical environmental settings of the terminal.
1 to 1 Verification
- It is the method to authenticate the fingerprint (or iris) after entering the user’s ID or
card
- It is called as 1 to 1 Verification since only the fingerprint (or iris) registered in the
user’s ID or card is used for comparison.
1 to N Identification
- It is the method to find the user only with the fingerprint (or iris).
- It is called as 1 to N identification since it finds the same fingerprint (or iris) as the
input fingerprint (or iris) among registered fingerprints (or irises) without entering a
user ID or card.
Authentication level
- Depending on the fingerprint match rate, it is displayed from 1 to 9. Authentication is
successful only if the matching rate is higher than the set level.
- The higher the authentication level is, the higher the security is. However, it requires a
relatively high match rate, so the authentication is vulnerable to failure.
- 1:1 Level: Authentication level used for 1:1 verification
- 1:N Level: Authentication level used for 1:N identification
Authentication Method
- It represents the various types of authentication, including the iris authentication, FP
authentication, RF (Card) authentication, password authentication or a combination of
these methods.
Example) Iris or FP: It authenticates with the iris or fingerprint.
LFD (Live Finger Detection)
- This function allows the input of only real fingerprints and blocks the input of imitation
fingerprints produced using rubber, paper, film, and silicone.

UBio-X Iris User Guide 4
Table of Contents
<Revison History>....................................................................................................2
<Glossary>................................................................................................................3
Table of Contents....................................................................................................4
1. Before use.............................................................................................................6
1.1. Safety Precautions.................................................................................................6
1.2. Specific names of the terminal..............................................................................7
1.3. Windows after operation .......................................................................................8
1.3.1. Icons...............................................................................................................8
1.3.2. Message.........................................................................................................9
1.4. Voice sounds in operation...................................................................................12
1.5. Beep sound in operation.....................................................................................12
1.6. How to register and authenticate the iris properly............................................12
1.7. Proper fingerprint registration and input methods............................................13
2. Product introduction..........................................................................................15
2.1. Product characteristics .......................................................................................15
2.2. Product components ...........................................................................................18
2.2.1. Standalone use (Access)..............................................................................18
2.2.2. Connected with Server (Access, Time & Attendance, Meal management)....18
2.3. Product specification...........................................................................................19
3. Environment setting...........................................................................................20
3.1. Checks before setting the environment.............................................................20
3.1.1. Entering the menu........................................................................................20
3.1.2. Administrator authentication..........................................................................20
3.1.3. How to enter the menu without administrator authentication.........................21
3.1.4. How to save the set values...........................................................................22
3.2. Menu composition ...............................................................................................23
3.3. User Management................................................................................................26
3.3.1. Add...............................................................................................................26
3.3.1.1. Photo registration.................................................................................. 28
3.3.1.2. Name registration.................................................................................. 28
3.3.1.3. Fingerprint registration .......................................................................... 28
3.3.1.4. Iris registration....................................................................................... 30
3.3.1.5. Password registration............................................................................ 32
3.3.1.6. Card registration.................................................................................... 33
3.3.1.7. Authentication option............................................................................. 34
3.3.1.8. Auth type............................................................................................... 35
3.3.1.9. Save...................................................................................................... 35
3.3.2. Delete...........................................................................................................37
3.3.3. Modify...........................................................................................................38
3.3.4. Delete All ......................................................................................................39
3.3.5. View..............................................................................................................39
3.4. Network setting....................................................................................................40
3.5. Application mode.................................................................................................42
3.5.1. Application....................................................................................................42
3.5.1.1. Access or TnA setting............................................................................ 42
3.5.1.2. Meal setting........................................................................................... 43
3.5.2. Function key.................................................................................................43
3.6. System..................................................................................................................44

UBio-X Iris User Guide 5
UNIONCOMMUNITY Co., Ltd.
Addr : 12F, Munjeong Daemyeong Valeon bldg, 127 Beobwon-ro Songpa-gu,
Seoul, Korea (zip code: 05836)
Tel: +82-2-6488-3000, Fax: +82-2-6488-3099,
E-Mail :sales@unioncomm.co.kr; http://www.unioncomm.co.kr
3.6.1. System .........................................................................................................44
3.6.2. Finger...........................................................................................................45
3.6.3. Iris ................................................................................................................47
3.6.4. Auth..............................................................................................................47
3.6.5. Date/Time.....................................................................................................48
3.6.6. Database......................................................................................................49
3.6.6.1. Delete all the users................................................................................ 49
3.6.6.2. Delete setting ........................................................................................ 50
3.6.6.3. Delete Log............................................................................................. 51
3.6.6.4. Delete Image log................................................................................... 51
3.6.6.5. Factory init ............................................................................................ 52
3.7. Terminal................................................................................................................53
3.7.1. Sound...........................................................................................................53
3.7.2. Option...........................................................................................................54
3.7.3. Input.............................................................................................................55
3.7.4. Lock..............................................................................................................56
3.7.5. External Device ............................................................................................57
3.7.6. ETC.(Thermal)..............................................................................................58
3.8. Display..................................................................................................................60
3.8.1. Theme..........................................................................................................60
3.8.2. Camera.........................................................................................................60
3.8.3. Language .....................................................................................................61
3.8.4. Option...........................................................................................................61
3.8.5. Message display time...................................................................................62
3.9. Terminal Info.........................................................................................................62
3.9.1. System .........................................................................................................62
3.9.2. Terminal........................................................................................................63
3.9.3. Network........................................................................................................63
3.9.4. User..............................................................................................................64
3.9.5. Log...............................................................................................................64
3.9.6. About............................................................................................................65
3.10. USB.....................................................................................................................66
3.11. Download the user file.......................................................................................68
3.11.1. Change the voice message.........................................................................68
4. How to use the terminal.....................................................................................69
4.1. How to change Auth mode..................................................................................69
4.2. How to input the user ID......................................................................................70
4.3. Authentication......................................................................................................70
4.3.1. Iris authentication .........................................................................................70
4.3.2. Fingerprint authentication .............................................................................71
4.3.3. Card authentication.......................................................................................71
4.3.4. Password authentication...............................................................................71
4.3.5. Multi authentication.......................................................................................71

UBio-X Iris User Guide 6
1. Before use
1.1. Safety Precautions
Warning
Handling with wet hands or
allowing liquid to flow into
it is prohibited.
-> It may cause an
electric shock or damage.
Do not place a fire source
near the terminal.
-> It may cause a fire.
Do not disassemble, repair,
or modify the terminal at
discretion.
-> It may cause an electric
shock, fire or damage.
Keep out of reach of
children.
-> It may cause an
accident or damage.
- If the above warning is ignored, it may result in death or serious injury.
Cautions
Keep away from direct
sunlight
-> It may cause
deformation or color
change.
Avoid high humidity or
dust
-> The terminal may be
damaged.
Avoid using water, benzene,
thinner, or alcohol for
cleaning
-> It may cause an electric
shock or fire.
Do not place a magnet
close to the terminal.
-> The terminal may
break down or
malfunction.
Do not contaminate the
fingerprint input area.
-> Fingerprints may not be
well recognized.
Avoid using insecticide or
flammable spray near the
terminal.
-> It may result in
deformation or color
change.
Avoid impacts or using
sharp objects on the
terminal.
-> The terminal may be
damaged and broken.
Avoid severe temperature
changes
-> The terminal may be
broken.
- If the above cautions are ignored, it may result in property loss or human injury.
※ Under no circumstances will UNIONCOMMUNITY be responsible for accidents or damages
caused by inappropriate use of the product without referring to the user manual.

UBio-X Iris User Guide 8
1.3. Windows after operation
<Fig. 1>
1.3.1. Icons
①Wi-Fi Status
None
: There is no connected Wi-Fi dongle.
: Wi-Fi connection is not activated
: Wi-Fi connection is activated
②Distance
detection
None
: When there is nothing in the proximity distance (90cm)
: When there is a person within the proximity distance
(90cm)
③Illumination
detection
None
: Detect the high illumination status. (Light)
: Detect the low illumination status. (Dark)
④Fire Alarm
: Fire Alarm is activated.
(on connecting to the fire detection sensor)
⑤Tamper
Switch
None
: Normal status
: Tamper switch is activated. (Terminal is disassembled.)
⑥Door Status
: Door status is not sensed.
: Door is closed.
: Door is opened.
: Door is opened abnormally.
⑦Network
status
: LAN cable is not connected.
: Disconnected to the server even if LAN cable is connected.
: Connected to the server. (Online)
ID input button
Menu button
Select the
access mode.
Status Icon
Time/Date

UBio-X Iris User Guide 10
- Passback error when using anti-passback
function
- When using for meal management
- When a user tried the authentication more
than twice in one meal time
- When the server does not respond during the
authentication attempt to the server
- When the network is disconnected during the
authentication attempt to the server
- Registration without authentication right or
authentication attempt when the entrance is not
permitted
When the user is designated in the blacklist

UBio-X Iris User Guide 12
- The waiting status for the input of card
- When the terminal program is being
upgraded
(In this status, you should not turn off the
terminal.)
1.4. Voice sounds in operation
Operation type
Voice sound
Success to authorize
You are authorized.
Fail to authorize
Please try again.
1.5. Beep sound in operation
Pick
Notice for
reading the
card or
fingerprint
When the card is read
When the fingerprint is entered in the fingerprint
window
Pi-pick
Notice for fail
When the authentication is failed (at Voice off)
Peek
Notice for
Success
When the authentication is successful (at Voice off)
1.6. How to register and authenticate the iris properly
How to register the iris
- Maintain the distance between the face and terminal about 45 cm.
(Locate the eyes in the guide line of the LCD window.)
- Open your face big according to the guidance and register it by staring at the front.)
However, please keep the motion still during the registration shooting.
- Register the iris after sweeping up the hair so that it does not cover the eyes.
- Glasses wearers should register as much as possible without wearing glasses.
How to authenticate with iris
Stare at the message window in the center of the LCD screen.

UBio-X Iris User Guide 13
Notes
- It is recommended to register and authorize at the location where the terminal is
installed.
- If you close your eyes or turn your eyes to the side, the iris recognition rate may
decrease. It is recommended to locate the face at the front as far as possible
- The color lenses or sun glasses can decrease the recognition rate of iris.
Cautions in the installation
- Be sure to install the terminal indoor.
- Do not install under the light bulb.
- Not recommended in the circumstance of backlight or direct light.
1.7. Proper fingerprint registration and input methods
Correct fingerprint registration methods
Place your index finger on the window just as you do with a finger stamp.
Do not use the tip of the finger.
Make sure the center of your finger touches the window.
(Please be cautious that you may result in low temperature burns when inserting
finger.)
Use your index finger if possible, which is the easiest for orientation and guarantees a
stable input method. Using the thumb or baby finger can be awkward and may result
in a bad image.
Check if your fingerprint is unclear or damaged.
It is tricky to recognize fingerprints on dry, wet, unclear, or injured fingers. Use
another finger in this case.

UBio-X Iris User Guide 14
Be aware of certain fingerprint conditions
Depending on the user’s fingerprint condition, some fingerprints may not be used or
may cause an inconvenience.
If the fingerprint is damaged or very unclear, it cannot be recognized. Please use
a password instead in this case.
When a finger is dry, breathe on the finger for smooth operation.
For kids, it may be tricky or impossible to use the terminal since their fingerprints
are too small or very unclear. It is recommended to register their fingerprints
every six months.
For the elderly, it may not be possible to register their fingerprints if there are too
many fine lines on the fingerprints.
It is recommended that you register more than 2 fingerprints.

UBio-X Iris User Guide 15
2. Product introduction
2.1. Product characteristics
Multi-Modal product which the user can use both iris and fingerprint authentication
functions together.
FHD (5M) Display resolution is applied.
The illumination sensor and dual camera (Color & IR) are applied to enable the iris
recognition even in the dark place.
RF(125kHz) and Smart Card(13.56MHz) can be used at the same time.
Easy authentication with the iris or fingerprint
- Can prevent the hazard factors such as forgetting password, losing the card or key,
or stealing with the biometrics such as iris and fingerprint recognition and
increasing the security by using the person’s own bionic information.
The access control system using the LAN
- Easy expansion directly applying to the existing network since it communicates with
using TCP/IP protocol between the fingerprint recognition terminal and
authentication server. High speed with 10/100 Mbps Auto Detect can make it easy
to manage and monitor via network.
Various registration and authentication methods
Iris
Iris registration
Iris authentication
Fingerprint
Fingerprint registration
Fingerprint authentication
Card
Card registration
Card authentication
Password
Password registration
Password authentication
Card
or Fingerprint
Card, fingerprint registration
Card or fingerprint authentication
Fingerprint authentication after ID input
Card & Fingerprint
Card, fingerprint registration
Fingerprint authentication after card authentication
ID input > Card authentication > Fingerprint authentication
Card or Password
Card, or password authentication
Card authentication
Password authentication after ID input

UBio-X Iris User Guide 16
Card
& Password
Card, password registration
Password authentication after card authentication
ID input > Card authentication > Password authentication
Fingerprint
or Password
Fingerprint, password registration
Fingerprint authentication
Fingerprint authentication after ID input, if failed, Password
authentication is possible.
Fingerprint
& Password
Fingerprint, password registration
Password authentication after fingerprint authentication
ID input > Fingerprint authentication > Password authentication
Card or Iris
Card, iris registration
Card or iris authentication
Iris authentication after ID input
Card & Iris
Card, iris registration
Iris authentication after card authentication
ID input > Card authentication > Iris authentication
Iris or Password
Iris, password registration
Iris authentication
ID input> Iris authentication > if failed, Password authentication
Iris & Password
Iris, password registration
Password authentication after iris authentication
ID input > Iris authentication > Password authentication
Fingerprint or Iris
Fingerprint, iris registration
Fingerprint or iris authentication
ID input > Fingerprint authentication > if failed, Iris
authentication
Fingerprint
& Iris
Fingerprint, iris registration
Iris authentication after fingerprint authentication
ID input > Fingerprint authentication > Iris authentication
Card
or Fingerprint
or Iris
Card, fingerprint, iris registration
Card or fingerprint or iris authentication
ID input > Fingerprint authentication > if failed, Iris
authentication
Card
& Fingerprint
& Password
Card, fingerprint, and password registration
Fingerprint and password authentication after card
authentication
ID input > Card authentication > Fingerprint or Password
authentication
Card
& Iris
& Password
Card, iris, and password registration
Iris and password authentication after card authentication
ID input > Card authentication > Iris and Password
authentication

UBio-X Iris User Guide 17
Card
& Fingerprint
& Iris
Card, fingerprint, iris registration
Fingerprint and iris authentication after card authentication
ID input > Card authentication > Fingerprint and Iris
authentication
Fingerprint
& Iris
& Password
Fingerprint, iris, password registration
Iris and password authentication after fingerprint authentication
ID input > Fingerprint authentication > Iris and Password
authentication

UBio-X Iris User Guide 18
2.2. Product components
2.2.1. Standalone use (Access)
2.2.2. Connected with Server (Access, Time & Attendance, Meal management)
TCP/IP
Meal management
program in cafeteria
Internet /
WAN / LAN
TCP/IP
Fingerprint authentication
server (static IP)
UDB server
database (MDB or MSSQL)
TCP/IP
Remote management
program
(user and terminal setting
management)
TCP/IP
TCP/IP
TCP/IP
DC15V Adapter
Electric lock
(Lock+, Lock-, Monitor)
Attendance
management program

UBio-X Iris User Guide 19
2.3. Product specification
Types
SPEC
REMARK
CPU
1GHz Quad Core CPU
LCD
5.0 inch Touch LCD(480*800)
MEMORY
16G Bytes Flash
2GBytes RAM
External SD Card
Support
Backup data / FW upgrade
Camera
Dual Camera (Color & IR)
Capacity
200,000 User / 200,000 Card
200,000 Finger (1:N1:50,000)
400,000 Iris (1:N1:40,000)
10,000,000 Log / 20,000 Image Log
Fingerprint sensor
Optical
Scan Area / Resolution
20 * 20mm / 500 DPI
Temperature /
Humidity
-20 ~ 60℃ /
Lower than 90% RH
AC / DC Adapter
INPUT : Universal AC100 ~ 250V
OUTPUT : DC 12V
(Option : DC 24V)
UL, CSA, CE Approved
Lock Control
EM, Strike, Motor Lock, Auto Door
I/O
4 In (1 Exit, 3 Monitor)
2 Out (a combined use of Lock Control)
Communication Port
TCP/IP (10/100Mbps)
Authentication
server
communication
RS-232
Meal ticket
printer
RS-485
Controller
communication
Wiegand In/Out
Card reader
or
Controller
communication
Card Reader
125KHz RF / 13.56MHz Smart
simultaneous use
(1 Sam socket)
HID 125K Prox card (Option)
HID iClass Card (Option)
Optional
Dimension(W*H*D)
160.6mm * 214.1mm * 45.7mm

UBio-X Iris User Guide 20
3. Environment setting
3.1. Checks before setting the environment
3.1.1. Entering the menu
If you click [ ] icon at the basic window, you can see the main menu window as
follows.
You can enter the subdivision menu
by clicking each button.
3.1.2. Administrator authentication
If the administrator is registered, the following administrator authentication window
appears at first.
▶Administrator authentication
If you enter the admin ID, the
administrator authentication is tried
along with the authentication method
of the admin such as the card,
fingerprint, iris, or password.
The admin authentication only appears
when there is a registered
administrator. The authentication is
tried only once when entering the
menu mode and you can access to all
the menu until you go out from the
main menu.
Table of contents
Other UNIONCOMMUNITY Security System manuals