Wasp B2000 User manual

B2000

© 2012 by Wasp Barcode Technologies. All rights reserved.
No part of this publication may be reproduced or used in any form, or by any electrical or mechanical means, without
permission in writing from Wasp Barcode Technologies. This includes electronic or mechanical means,such as photocopying,
recording, or information storage and retrieval systems. The material in this manual is subject to change without notice.
The software is provided strictly on an “as is” basis. All software, including firmware, furnished to the user is on a licensed
basis. Wasp Barcode Technologies grants to the user a non-transferable and nonexclusive license to use each software or
firmware program delivered hereunder (licensed program). Except as noted below, such license may not be assigned,
sublicensed, or otherwise transferred by the user without prior written consent of Wasp Barcode Technologies. No right to
copy a licensed program in whole or in part is granted, except as permitted under copyright law. The user shall not modify,
merge, or incorporate any form or portion of a licensed program with other program material, create a derivative work from a
licensed program, or use a licensed program in a network without written permission from Wasp Barcode Technologies. The
user agrees to maintain Wasp Barcode Technologies’ copyright notice on the licensed programs delivered hereunderand to
include the sameon any authorized copies it makes, in whole or in part. The useragrees notto decompile,disassemble,decode,
or reverse engineer any licensed program delivered to the user or any portion thereof.
Wasp Barcode Technologies reserves the right to make changes to any software or product to improvereliability, function, or
design.Wasp Barcode Technologies does not assumeany product liability arising out of,or in connection with,theapplication
or use of any product, circuit, or application described herein. No license is granted, either expressly or by implication,
estoppel, or otherwise under any Wasp Barcode Technologies, intellectualproperty rights. An implied license only exists for
equipment, circuits, and subsystems contained in Wasp Barcode Technologies products.
Wasp Barcode Technologies is a registered trademarkof Wasp Barcode Technologies. Other product namesmentioned in this
manual may be trademarks or registered trademarks of their respective companies and are hereby acknowledged.
Wasp Barcode Technologies
1400 10th St.
Plano TX 75074
http://www.waspbarcode.com

i
B2000 User Manual
Table of Contents
Chapter 1: Device Overview................................................................................................1
1.1 System Construction ................................................................................................ 1
1.2 Device Interface ....................................................................................................... 2
Chapter 2 – Introduction to Fingerprint Recognition Technology ....................................5
2.1 How Fingerprint Recognition Technology Works ....................................................... 5
2.2 Achieving Good Fingerprint Images .......................................................................... 6
2.3 Correcting Wet or Dry Fingerprint Images ................................................................. 6
2.4 How Much Pressure is Required for a Good-Quality Fingerprint? .............................. 7
2.5 Proper Finger Placement .......................................................................................... 7
Chapter 3: Identity Verification...........................................................................................9
3.1 Fingerprint Matching ................................................................................................. 9
3.1.1 1:N Fingerprint Matching..............................................................................9
3.1.2 1:1 FingerprintMatching (ID. NO + Fingerprint)..........................................10
3.1.3 Password Matching....................................................................................12
Chapter 4 – User Management..........................................................................................14
4.1 User Management .................................................................................................. 14
4.2 Administrator Enrollment ........................................................................................ 14
4.3 User Enrollment ..................................................................................................... 17
4.3.1 Fingerprint Enrollment................................................................................17
4.3.2 Password Enrollment .................................................................................22
4.4 Delete User ............................................................................................................ 25
4.5 Verification Mode .................................................................................................... 29
4.5.1 Fingerprint Verification................................................................................29
4.5.2 Password Verification.................................................................................29

ii
B2000 User Manual
4.6 Browse Attendance Records .................................................................................. 31
4.6.1 Inquiry Methods..........................................................................................31
4.6.2 To browse attendance records:...................................................................34
Chapter 5 – Communication.............................................................................................35
5.1 Network (Ethernet) Connection............................................................................... 35
5.2 RS/232/485 Connection ......................................................................................... 37
5.3 Security .................................................................................................................. 39
5.4 Web Setup ............................................................................................................. 39
Chapter 6 – System Options.............................................................................................40
6.1 System Menu ......................................................................................................... 42
6.2 Data Management Menu ........................................................................................ 44
6.3 Upload Firmware .................................................................................................... 45
6.4 Display ................................................................................................................... 46
6.5 Reset ..................................................................................................................... 47
6.6 Bell ........................................................................................................................ 48
6.7 Misc. Set ................................................................................................................ 49
Chapter 7 - Date/Time........................................................................................................51
Chapter 8 - Pen Drive ........................................................................................................53
Chapter 9 - Auto Test.........................................................................................................55
Chapter 10 – Record (Attendance/Audit Logs) ................................................................58
Chapter 11 – System Information.....................................................................................60
Appendix I – Troubleshooting...........................................................................................62
Appendix II – WiFi Function..............................................................................................63
Appendix III – Environmental-Friendly Use Description..................................................64

1
B2000 User Manual
Chapter 1: Device Overview
1.1 System Construction
This device supports RS232 and TCP/IP connections to the PC.

2
B2000 User Manual
1.2 Device Interface
Front View:
• Led Indicator:
Status Indicator
Blinking Green Normal State
Solid Green (three seconds) Verification Successful
Solid Red (three seconds) Verification Failed
• Speaker: Plays the beep sound and voice prompts.
• Screen: Displays all visual information, including time and menu screens for operation prompts.
• Fingerprint Scanner: Used to enroll or verify user identities.
• Keyboard: Used to input information to the device or execute the menu operation.
• Power Button: The 0 key acts as the power and restart button. To power on the device, press the 0 key. To turn
off the device, press and hold down the 0 button for three seconds.
Speaker
Screen
Fingerprint Scanner
Keyboard
Power Button

3
B2000 User Manual
Back View:
• Power Supply: Use to connect to the power supply.
• Ethernet Port: Connect the device to the Internet or connect directly to the PC.
• Wiring Terminals: Use to connect with the external ring, door lock or RS232 communication (or connect with the
printer.
Note: You cannot use RS232 communication and connect to a printer at the same time.

4
B2000 User Manual
Side View:
• USB Port – You can use the U disk to download or upload user information and verification records.
• Reset Function – If the device is not working properly, you can use the Reset function to restart it. To reset,
open the black rubber cap, then use a sharp tool (less with 2mm tip) into the Reset button hole.
Reset Button
USB Port

5
B2000 User Manual
Chapter 2 – Introduction to Fingerprint
Recognition Technology
Prior to operating the B2000, it is essential to understand how fingerprint recognition technology works. Adding and
verifying fingergprints is the core function of the B2000. Once a thorough understanding of fingerprint recognition
technology is obtained, you will find your experience with the B2000 to be very productive and rewarding.
2.1 How Fingerprint Recognition Technology Works
When the user places his/her finger on a Fingerprint Recognition Device (i.e.the B2000) for the first time, the fingerprint
is scanned and converted into a computer-generated “biometric Template”. The templates can only be recognized by
each respective biometric manufacturer’s devices. Also note that these “templates” are NOT actual fingerprint images.
“Real” fingerprint images cannot be re-generated from these templates.
All fingerprints contain a number of unique physical characteristics called minutiae. Minutiae include certain visible
aspects of fingerprints such as ridges, ridge endings and bifurcation (forking) of ridges. Most of the minutiae are found
in the core points of fingerprints, and the core points themselves are found near the center of the fingerprint on the
fleshy pad of the finger.
The figure below shows the positions of core points within fingerprints. The core points are represented by the red
dots in the figure below.
A core poirnt is defined as the topmost point on the innermost upward recurring ridge line.
A user is considered “enrolled” in the B2000 after his/her fingerprint(s) or password has been successfully registered in
the clock’s database.
When the user places his/her finger on the B2000 fingerprint sensor during the enrollment process, the B2000 takes a
picture of that finger’s key minutiae points. The B2000 then uses its proprietary mathematical algorithm and converts
that picture into a unique mathematical template which is comparable to a 60-digit password. This unique template is
then encrypted and stored in the B2000 database.

6
B2000 User Manual
IMPORTANT NOTE:
Privacy issues should never be a concern when using the B2000 as no real image of a user’s fingerprint is actually
stored. In stead, ONLY the minutiae-based templates are actually stored.
Each time a user’s fingerprint is scanned, the B2000 searches its database for a matching fingerprint. If the B2000
finds the user’s matching fingerprint, then his/her “attendance” is recorded in the B2000 “audit log” and will be noted in
subsequent reports.
2.2 Achieving Good Fingerprint Images
The quality of fingerprint images is relative to the number of minutiae points captured by the B2000’s sensor.
Fingerprint images not possessing an adequate number of minutiae points may be unreadable. For those users
whose fingerprint images lack sufficient minutiae points and cannot be read by the sensor, it is advised to issue a
password instead.
The images below show poor-quality fingerprints, characterized by smudged, faded or otherwise distorted areas on the
fingerprint. These conditions can be caused by excessive dryness or wetness, excessive or insufficient pressure, or
scarring of the skin at the fingertip.
The B2000 fingerprint matching algorithm is often capable of extracting the correct minutiae even without the benefit of
a perfect print. However, the positioning of the finger and the relative moisture and pressure of the fingerprint when it
is placed on the sensor are important contributing factors in achieving a good, consistent fingerprint match.
2.3 Correcting Wet or Dry Fingerprint Images
When the temperature is very cold or just after washing hands, fingerprints often become very dry. In this case, the
user should moisturize his/her fingerprint simply by breathing on the fleshy pad of his/her fingertip prior to placing the
finger on the sensor. The moisture from his/her breath should improve the recognition of his/her fingerprint.

7
B2000 User Manual
Conversely, if the fingerprint is too wet, the ridges and valleys are rendered indistinguishable. The lack of
recognizable minutiae causes wet fingerprints to be rejected by the B2000. This can be remedied simply by swiping the
finger on a clean, dry towel or cloth.
2.4 How Much Pressure is Required for a Good-Quality
Fingerprint?
If too much pressure is applied when pressing down on the fingerprint sensor, the finger’s ridges become pressed
together and create an indistinguishable image. Applying too much pressure (similar to fingerprints that are too wet)
will create a “blurred” image which the B2000 sensor might not recognize.
If too little pressure is applied, the resulting image will be similar to the dry fingerprint.
Be sure to maintain contact with the fingerprint sensor for 2 full seconds, until the B2000 responds. The
B2000 has both audio and visual indicators which respond when the B2000 senses a finger.
2.5 Proper Finger Placement
The user’s finger should completely cover the sensor. The finger should be placed flat and in the center of the sensor.
The finger should cover at least 80% of the sensor as shown below:

8
B2000 User Manual
The finger should NOT be placed in the following positions:

9
B2000 User Manual
Chapter 3: Identity Verification
This B2000 will NOT record an employee’s attendance OR allow door access UNTIL the individual’s identity is verified.
The B2000 uses various means to verify a user’s identify:
• Fingerprint Matching
• Password Matching
• Card Matching (optional)
3.1 Fingerprint Matching
The B2000 supports two methods of fingerprint matching, 1:N and 1:1.
3.1.1 1:N Fingerprint Matching
When using 1:N Fingerprint Matching, the B2000 will place the fingerprint (“1”) in its temporary memory and then
compare it to ALL (“N”) the fingerprint templates stored in the B2000 database (up to 2800 templates).
By using 1:N matching, the user enjoys the convenience of not having to additionally enter his/her User ID number prior
to placing his/her finger on the sensor. 1:N is the fastest and easiest method of fingerprint matching.
Using 1:N Fingerprint Matching
Start from the Main screen:

10
B2000 User Manual
Properly place the finger on the sensor. A confirmation screen similar to the following will appear:
The clock will also respond “Thank you” when the user has successfully verified his/her identify. If the B2000
responds “Please Try Again”, the operation must be repeated.
3.1.2 1:1 Fingerprint Matching (ID. NO + Fingerprint)
The B2000 can perform 1:1 fingerprint matching. 1:1 requires the additional step of first entering the user’s ID. No.
1:1 matching is more consistent then 1:N matching.
Using 1:1 Fingerprint Matching
Prior to placing his/her finger on the B2000 sensor, the user must FIRST enter his/her ID number and press the M/OK
key. If the fingerprint template registered with his/her user ID (“1”) matches his/her finger (“1”), the user’s identity has
been successfully verified using 1:1 fingerprint matching.

11
B2000 User Manual
Start at the Main screen.
Enter the User ID No and press the M/OK key. The screen will appear as follows:

12
B2000 User Manual
The user places his/her finger on the sensor. If the B2000 recognizes the user’s fingerprint, the screen will look similar
to the following:
The clock will also respond “Thank you” when the user has successfully verified his/her identify. If the B2000
responds “Please Try Again”, the operation must be repeated.
3.1.3 Password Matching
If too many users have difficulty with fingerprint matching, you can register them with passwords instead of fingerprints.
Using Password Matching
Start at the Main screen.

13
B2000 User Manual
Enter the User ID No and press the M/OK key. The screen will prompt for a password.
If the screen does not prompt for a password, the user has not been enrolled with a password. If the B2000 prompts
“Error Enroll No”, the incorrect ID number has been entered.
After entering the User Id, the user will enter his/her password and press the M/OK key. If a match is made, the
screen a confirmation screen will appear.
The clock will also respond “Thank you” when the user has successfully verified his/her identify. If the B2000
responds “Error Password”, the operation must be repeated.

14
B2000 User Manual
Chapter 4 – User Management
4.1 User Management
To limit the privileges of administrators on the device and to avoid an unauthorized person changing the settings or
damaging the data of the device, there are three privilege levels of users: user, enroller and administrator.
• Users are people whose identify must be verified to gain access to a facility or to have their attendance recorded.
• Enrollers are authorized to enroll new users or delete users from the system.
• Administrators can perform the same functions as enrollers and all other operations.
User Verification: The device provides two types of verification modes for a user – Password Verification and Card
Verification. These will be discussed later in this document.
Administrator Verification: Press the M button. At the device prompt [Admin Affirm], input the Administrator ID and
press the OK button. Hold your administrator card to the card reader or input the password.
Note: If there is no administrator in the device, the user can enter the menu without Administrator Verification.
4.2 Administrator Enrollment
To enroll an administrator, follow the steps below:
1. There is no administrator in the device by default. Press the M button to enter the menu of the device.
The Menu screen will appear:

15
B2000 User Manual
2. Highlight the User Mng icon (see screen above) and press the M button.
The User Mng menu appears:
3. Highlight the New User icon and select the M button. The New User screen appears.

16
B2000 User Manual
4. Enter an ID number for the Admin user. By default, the system assigns the next, unused number.
5. Since this clock does not have an Alpha keyboard, skip the Name field by using the down arrow on the keypad.
6. Select an enrollment type. You have two options for enrollment:
a. Enroll – Enrolls the user with Card Verification on l y.
b. Enroll PWD – Enrolls the user with Password Verification.
To select an option, use the arrow key to highlight it, then press the M key.
Please see section 2.3 for details on enrolling each option.
7. Arrow down to the Role field. Use the left and right arrow keys on the keypad to select Admin.
8. Arrow down to the OK (M/ <-) field and press the M key. A screen similar to the following appears:
Other manuals for B2000
1
Table of contents
Other Wasp IP Access Controllers manuals