all | frequencies |
|
exhibits | applications |
---|---|---|---|---|
manual |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 2 |
|
User manual | Users Manual | 1.05 MiB | April 05 2009 | |||
1 2 | Cover Letter(s) | April 05 2009 | ||||||
1 2 | Cover Letter(s) | April 05 2009 | ||||||
1 2 | External Photos | April 05 2009 | ||||||
1 2 | Internal Photos | April 05 2009 | ||||||
1 2 | ID Label/Location Info | April 05 2009 | ||||||
1 2 | Test Report | April 05 2009 | ||||||
1 2 | Test Setup Photos | April 05 2009 | ||||||
1 2 | Operational Description | April 05 2009 |
1 2 | User manual | Users Manual | 1.05 MiB | April 05 2009 |
This manual is provided for information purpose only. All information included herein is subject to change without notice. Suprema is not responsible for any changes, direct or indirect, arising from or related to us of this manual. Copyright 2008 Supremainc. All rights reserved. 2 Contents Contents ..................................................................................................................... 3 Safety Instructions .................................................................................................... 5 1. Before Use ............................................................................................................. 6 1.1 Components ..................................................................................................................... 6 1.2 Body.................................................................................................................................. 7 1.3 Methods for fingerprint input ............................................................................................. 8 1.4 System setup procedure ................................................................................................. 10 1.4.1 Registering the initial administrator .......................................................................... 11 1.4.2 Network configuration............................................................................................... 12 1.4.3 Stand-alone configuration ........................................................................................ 15 1.4.4 Configuring Secure I/O ............................................................................................. 17 1.4.5 Configuring environment settings ............................................................................. 18 1.5 Authorization methods .................................................................................................... 19 1.5.1 Finger Only ............................................................................................................... 19 1.5.2 Finger or PIN ............................................................................................................ 20 1.5.3 Finger and PIN ......................................................................................................... 23 1.5.4 PIN Only ................................................................................................................... 24 1.5.5 Card Only ................................................................................................................. 25 2. User Management................................................................................................ 26 2.1 Enrolling a user ............................................................................................................... 26 2.2 Editing a user data .......................................................................................................... 28 2.3 Deleting a user data ........................................................................................................ 31 3. Configuration for Screen and Sound ................................................................. 32 3.1 Date, Time ...................................................................................................................... 32 3.2 Backlight ......................................................................................................................... 33 3.3 Sound ............................................................................................................................. 34 4. Device Configuration .......................................................................................... 35 4.1 Authorization ................................................................................................................... 35 4.2 In/Out .............................................................................................................................. 40 4.3 System ............................................................................................................................ 47 5. Attendance Management .................................................................................... 51 5.1 Operating environment ................................................................................................... 51 5.2 Setup for attendance management ................................................................................ 52 5.3 Operation modes ............................................................................................................ 53 5.3.1 Key Input .................................................................................................................. 53 5.3.2 Manual ...................................................................................................................... 53 5.3.2 Auto .......................................................................................................................... 54 5.3.3 Fixed ......................................................................................................................... 55 6. FAQ ....................................................................................................................... 56 6.1 Error messages .............................................................................................................. 56 6.2 Troubleshooting .............................................................................................................. 57 6.3 Usage summary.............................................................................................................. 58 6.4 System Installation .......................................................................................................... 59 3 6.4.1 Cable specifications ................................................................................................. 59 6.4.2 Installing the bracket ................................................................................................ 60 6.4.3 Connecting Power & RS-485 ................................................................................... 61 6.4.4 Connecting the switch .............................................................................................. 61 6.4.5 Connecting the relay ................................................................................................ 62 6.4.6 Connecting Network ................................................................................................ 63 6.4.7 Connecting Wiegand ............................................................................................... 63 6.4.8 Electrical specifications ............................................................................................ 64 6.5 Specifications ................................................................................................................. 65 6.6 FCC Notice ..................................................................................................................... 67 4 Safety Instructions Installation Do not arbitrarily install or repair the product. The warranty does not apply to any product damage caused by an arbitrary installation or repair. Use the power adapter provided or one for 12V 0.5A or above. When sharing the power with other devices such as electric door lock, check the power capacity considering power requirements for each device. If appropriate power is not used, it may not operate normally. In Use Endure that password does not exposed to unauthorized individuals. Frequent change of password is recommended. Any illegal access to your product may happen. Do not forcibly press the buttons of the product and avoid any contact with sharp object to the device. It may cause a failure. Be cautioned for the fingerprint contact area not to be contaminated or damaged by dirty hands or foreign materials. It may affect fingerprint recognition performance or cause a failure. Do not clean the device with any form of liquid. Use soft and dry cloth only. 5 1. Before Use 1.1 Components Fixing Screws Main Body
(2 EA) Star-shape wrench
(For fixing bracket) 6 Wall mounting bracket Extended bracket
(Option) Knife Blocks
(2 EA) Shrinkable Tubes Ethernet Connector Adapter
(Option) The components shown above may differ depending on the installation environment. 1.2 Body LCD Display Key Pad LED Lamp Fingerprint Touch Area No. 1 Name Description LCD Display The operation status is displayed. 2 Key Pad 09 Buttons: Used to enter the ID and password.
< > Arrow Buttons: Used to move the selected item. 3 LED Lamp Button: Used to select the desired function. Button: Used to enter or exit the menu. Button: Used to exit from the menu or cancel the desired action. The operation status is displayed with an alert sound. Green (Sound: beep beep beep beep!): Authorization success Red (Sound: beep beep beep!) : Authorization failure Pink (Sound: beep!) : Processing Blue and Yellow blink in turn at an interval of 2 seconds (No sound): No IP address is given because DHCP is set in TCP/IP Setup Blue and Sky Blue blink in turn at an interval of 2 seconds (No sound): Normal operation Red and Pink blink in turn at an interval of 2 seconds (No sound): Device locked or no administrator Blue and Red blink in turn at an interval of 2 seconds (No sound): The time is reset due to battery discharge. At first use, Red blinks at an interval of 2 seconds (No sound): Initialization error, Consult with the manufacturer. In normal use, Red blinks at an interval of 2 seconds (No sound): On the watch. Yellow blinks shortly (No sound): Entry standby or in communication for getting an IP when DHCP is set in TCP/IP Setup 4 Fingerprint Touch Area Used to input a fingerprint for authentication. 7 1.3 Methods for fingerprint input BioLite Net can easily recognize fingerprints even though the angle and location of the pattern change. However, it is recommended to properly input fingerprints for more precise recognition. Selecting a finger on fingerprint enrollment Up to two fingerprints can be enrolled for each user in preparation of any abnormal situation like having a wounded finger or carrying an object with a hand. In the case of a low recognition, the user can register the same fingerprint twice to increase the recognition rate. It is recommended to use the index or middle finger. In case of other fingers, the recognition rate decreases because it tends to be more difficult to place the finger in the center of the sensor area. How to proerply place a fingerprint Place your finger firmly on the sensor area. Adjust the finger so that its middle position can be located in the center of the sensor. When the finger is vertically placed or its angle goes astray, the recognition may be a failure. When enrolling your fingerprint, the first finger input window prompts. Then register the desired finger on the terminal as shown in the figure below. When the re-entry window appears with a tick sound, re-enter the previously enrolled finger. The fingerprint input is made twice.
(Gently push your finger on the sensor to have a full fingerprint.) Place the first Finger 8 In case fingerprint is not recognized normally BioLite Net is designed to normally operate regardless of weather change or the angle and location of the fingerprint to place. However, the recognition rate may vary depending on the external environment or fingerprint condition. In abnormal cases, follow the directions below:
1. Retry after drying the wetness of your finger. 2. When your finger is too dry, retry after blowing on your fingertip. 3. When you have a cut on your registered finger, register another fingerprint. Cautions while registering your fingerprint The initial fingerprint registration is important. Because the recognition process compares the scanned fingerprint with the registered one, an abnormally registered fingerprint can cause a failure. To increase the recognition rate, follow the directions below:
1. Put the center of your fingerprint on the middle of the sensor. 2. If you have a cut in your finger or your fingerprint is not clear enough, retry with another finger. 3. When fingerprint recognition is in progress, do not move your fingerprint . 9 Install the system according to the environment
- Grasp the locations for installation site, door open switch, Register an initial administrator
- Register the initial administrator for setting devices (See 1.4.1). dead bolt, and such. Step 3 Step 2 Step 1
- Install the system (see 6.4). 1.4 System setup procedure Step 6 Step 5 Step 4 10 Configure the system
- Network configuration (see 1.4.2)
- Stand alone configuration (see 1.4.3.) or Secure I/O configuration (see 1.4.4) Test for system operation
- Check the door lock/unlock status and switch operation.
- Deliver the setting items to the customer. Configure the environment
- Configure various environments (see 1.4.5). Register users
- Use the system after user registration (see 2.1). 1.4.1 Registering the initial administrator There is no administrator set for the product in the initial status. So register an administrator for configuring the environments for relay, door open switch, door open detection sensor, and such. 1. When the product is connected, a window Enter ID 1 Enroll Admin Operation Mode PIN Only Enroll Enter PIN
Enroll Confirm PIN
Enroll Completed appears as shown in the right figure. Enter an ID and press OK. 2. When the authorization mode window appears, use / buttons to move to PIN Only, and press OK. 3. When the password entry window appears, enter the desired password and press OK. 4. When the password re-entry window appears, enter the previously input password again and press OK. 5. The completion message window appears. This procedure is necessary to temporarily configure the installation-
related settings. Modify the administrator information after the installation is complete. 11 1.4.2 Network configuration The network configuration is required to connect the dedicated PC software or other devices via network. Configure the settings according to the communication environment in your place.
[In case of configuring the network via Ethernet]
1. Connect the terminal to the computer that has the dedicated PC software according to the network environment after seeing 6.4.6 Connecting network. 2. Configure the settings for TCP/IP port and server according to the installation environment. The following example explains how to directly connect the server PC without using DHCP. Device In/Out Item TCP/IP In/Out Use / buttons to select the Device icon and press OK. Use / buttons to select the In/Out icon and press OK. Use / buttons to select the TCP/IP and press OK. DHCP Not Use TCP/IP IP Address 192.168.1.35 TCP/IP Gateway 192.168.1.10 TCP/IP Use / buttons to set whether or not to use DHCP and press OK. Enter the IP address and press OK. Enter the Gateway using numeric and arrow buttons and press OK. Subnet Mask 255.255.255.0 TCP/IP Enter IP address using numeric and arrow button and press OK. Server IP 192.168.1.30 TCP/IP Enter Server IP address using numeric and arrow button and press OK. Port 1471 TCP/IP Enter Port and press OK. Server Port 1480 TCP/IP Enter Server Port and press OK. Server Use TCP/IP Use / buttons to select the Use and press OK. Cont. 12 100Base-T support Not support TCP/IP Use / buttons to set whether or not to support 100Base-T and press OK. Completed The completion message window appears. When you exit from the menu before completing the TCP/IP setting, the data is not stored so please finish the remaining steps until the setting completion message appears. IP Address/Gateway/Subnet Mask Setup: If DHCP is used, the values for IP address, gateway, and subnet mask are automatically assigned. Otherwise, set DHCP to Not Use and enter the corresponding values.
(When the right arrow is pressed, . is entered while the left arrow deletes characters one by one.) Server: To directly connect the server of the dedicated PC software that enables monitoring and setting the terminal, use Server for its setup and enter the values for IP address and port number. (Refer to the dedicated PC software manual.) TCP/IP Port, Server Port: Should be the same values defined in the dedicated PC software. It is recommended to set the TCP/IP port to 1471 and Server to 1480.
(When the port number is modified as you want, TCP/IP communication may not be active.) 13
[In case of configuring the network via RS-485]
1. Connect the terminal to the computer that has the dedicated PC software or to another device according to the network environment after seeing 6.4.3 Connecting Power & RS-485. Item Type In/Out In/Out Device Termination Serial Conn. Baudrate 115200 PC Conn. Serial Conn. Use / buttons to select the In/Out icon and press OK. Use / buttons to select the Device icon and press OK. Use / buttons to select the Serial Conn. and press OK. 2. Configure the settings for RS-485 according to the installation environment. Use select 115200 for PC connection speed and press OK. Use / buttons to select the PC Conn. and press OK. The completion message window appears. Serial Conn. Serial Conn. Completed Use select Not Use for termination and press OK. buttons to buttons to Not Use
14 1.4.3 Stand-alone configuration This configuration is required to use the device for stand alone purpose, which device which requires no communication with PC or other devices. 1. As shown in the figure, connect BioLite Net to respective switches. 2. Configure the internal relay settings as shown below. (It is explained based on the For actual wring method, see 6.4 System Installation.. figure above.) Follow the instructions below only when the dedicated PC software is not used. When using the software, refer to the software manual. Device In/Out Item Door In/Out Use / buttons to select the In/Out icon and press OK. Use / buttons to select Door and press OK. Press MENU -> Enter ID
-> Enter the password ->
Use / buttons to select the Device icon and press OK. Relay Internal Door Exit Button Input 0 Internal Use / buttons to select Internal and press OK. Use / buttons to select Input 0 and press OK. Type N.O Exit Button Use / buttons to select N.O and press OK.
*N.O/N.C Cont. 15 Type N.O Door Sensor Use / buttons to select N.O and press OK.
*N.O/N.C Held Open Alarm Not Use Door Opening Mode Temporary Open Door Use / buttons to select Temporary Open for opening mode and press OK.
* Temporary Open/ Toggle Forced Open Alarm Not Use Door Use / buttons to select Not Use for Held Open Alarm and press OK.
*Not Use/Sound/
Backlight/Sound and Light/SIO Relay0/SIO Relay1 Use / buttons to select Not Use for Forced Open Alarm and press OK.
*Not Use/Sound/
Backlight/Sound and Light/SIO Relay0/ SIO Relay1 Door Sensor Input 1 Internal Use / buttons to select Input 1 and press OK.
*Not Use/Input0/Input1 Open Time 3 Door Enter the time and press OK.
*The time is set for automatically closing the door after the specified time. Complete The completion message window appears. Opening Mode
- Temporary Open: When the door is open, it is automatically closed after a specific time.
- Toggle: The door is open after the first authorization success and it remains unlocked until the second authorization success. When you exit from the menu before completing the relay setup, the configuration is not stored so please finish configuration until the message Complete appears. 16 1.4.4 Configuring Secure I/O This connects BioLite Net to Secure I/O. 1. Connect wires between BioLite Net, Secure I/O, and respective switches as shown For actual wiring, see 6.4 System Installation. below. Device Follow the instructions below only when the dedicated PC software is not used. When using the software, refer to the software manual. 2. Configure the relay settings as shown below. (Based on the figure above) Press Menu -> Enter ID ->
Enter password ->Use/
buttons to select the Device icon and press OK. Use / buttons to select SIO Relay 0 and press OK. Use / buttons to select the In/Out icon and press OK. Use / buttons to select SIO Relay 0 and press OK. (*Not Use/ SIO Input 0/ SIO Input 1) Use / buttons to select Door and press OK. Use / buttons to select N.O and press OK. Exit Button SIO Input 0 SIO Relay 0 Relay SIO Relay 0 Item Door In/Out Exit Button Type N.O In/Out Door Cont. 17 Door Sensor SIO Input 1 SIO Relay 0 Use / buttons to select SIO Input 1 and press OK.
*Not Use/ SIO Input0/ SIO Input1 Type N.O Door Sensor Use / buttons to select N.O and press OK. Open Time(sec) Held Open Alarm Not Use Door Opening Mode Temporary Open Door Use / buttons to select Temporary Open for opening mode and press OK.
* Temporary Open/Toggle Forced Open Alarm Not Use Door 3 Door Enter the time and press OK.
*The time is set for automatically closing the door after the specified time. Complete The completion message window appears. Use / buttons to select Not Use for Held Open Alarm and press OK.
*Not Use/Sound/Backlight/
Sound & Light/SIO Relay0/
SIO Relay1 Use / buttons to select Not Use for Forced Open Alarm and press OK.
*Not Use/Sound/Backlight/
Sound & Light/SIO Relay0/
SIO Relay1 Sync. Button
(In case of using Secure I/O) Sync. button should be pressed when Relay setting is completed. Opening Mode
-Temporary Open: When the door is open, it is automatically closed after a specific time.
-Toggle: The door is opened after the first authorization success and it remains unlocked until the second authorization success. When you exit from the menu before completing the relay setup, the configuration is not stored so please finish configuration until the message Complete appears. 1.4.5 Configuring environment settings
Settings for date and time: Set the values as 3.1 Date, Time.
Fingerprint authorization related settings: Set the values after reading the case of fingerprint selection in 4.1 Authorization.
Operation mode setting: Finish the setting after seeing the operation mode selection case in 4.1 Authorization. 18 1.5 Authorization methods For changing the terminal authorization method, see the operation mode selection case in 4.1 Authorization. To separately set the authorization method for each user, see 2.2 Editing a user data. 1.5.1 Finger Only When the user authorization method is set to Finger Only, you can open the door by using the three different methods:
1. Fingerprint recognition 2. Fingerprint recognition after entering ID 3. Fingerprint recognition after identifying user card Fingerprint recognition BioLite Net 10:33:02 Access Granted ID : 2 Input the fingerprint of the user. The door is open with the authentication success message. Fingerprint recognition after entering ID BioLite Net 10:33:02 Enter ID 2 Enter the ID of the user and press OK. Input the fingerprint of the user. Access Granted ID : 2 The door is open with the authentication success message. 19 Fingerprint recognition after identifying user card BioLite Net 10:33:02 Place the user card on the SUPREMA logo area. Input the fingerprint of the user. Access Granted ID : 2 The door is open with the authentication success message. 1.5.2 Finger or PIN When the user authorization method is set to Finger or PIN, you can open the door by using the five different methods:
1. Fingerprint recognition 2. Fingerprint recognition after entering ID 3. Password entry after entering ID 4. Fingerprint recognition after identifying the user card 5. PIN entry after identifying the user card Fingerprint recognition BioLite Net 10:33:02 Input the fingerprint of the user. Access Granted ID : 2 The door is open with the authentication success message. 20 Fingerprint recognition after entering ID BioLite Net 10:33:02 Enter ID 2 Enter the ID of the user and press OK. Input the fingerprint of the user. Access Granted ID : 2 The door is open with the authentication success message. PIN entry after entering ID BioLite Net 10:33:02 Enter ID 2 Enter the ID of the user and press OK. Access Granted ID : 2 The door is open with the authentication success message. Enter Finger or PIN
Enter the password of the user and press OK. Fingerprint recognition after identifying user card BioLite Net 10:33:02 Access Granted ID : 2 The door is open with the authentication success message. Place the user card on the SUPREMA logo area. Input the fingerprint of the user. 21 PIN entry after identifying the user card Enter Finger or PIN
Enter the password of the user and press OK. Place the user card on the SUPREMA logo area. BioLite Net 10:33:02 Access Granted ID : 2 The door is open with the authentication success message. 22 1.5.3 Finger and PIN When the user authorization method is set to Finger and PIN, you can open the door by using the three different methods:
1. PIN entry after identifying fingerprint 2. PIN entry after entering ID and fingerprint 3. PIN entry after entering user card and fingerprint PIN entry after identifying fingerprint Enter PIN
Input the fingerprint of the user. Enter the password of the user and press OK. BioLite Net 10:33:02 Access Granted ID : 2 The door is open with the authentication success message. PIN entry after entering ID and fingerprint BioLite Net 10:33:02 Enter ID 2 Enter the ID of the user and press OK. Input the fingerprint of the user. Enter PIN
Enter the password of the user and press OK. Access Granted ID : 2 The door is open with the authentication success message. 23 PIN entry after entering user card and fingerprint BioLite Net 10:33:02 Place the user card on the SUPREMA logo area. Input the fingerprint of the user. Enter PIN
Access Granted ID : 2 Enter the password of the user and press OK. The door is open with the authentication success message. 1.5.4 PIN Only When the user authorization method is set to PIN Only, you can open the door by using the two different methods:
1. PIN entry after entering ID 2. PIN entry after identifying user card PIN entry after entering ID BioLite Net 10:33:02 Enter ID 2 Enter the ID of the user and press OK. Enter Finger or PIN
Enter the password of the user and press OK. Access Granted ID : 2 The door is open with the authentication success message. 24 PIN entry after identifying user card BioLite Net 10:33:02 Place the user card on the SUPREMA logo area. Enter Finger or PIN
Enter the password of the user and press OK. Access Granted ID : 2 The door is open with the authentication success message. 1.5.5 Card Only 10:33:02 Access Granted BioLite Net When the user authorization method is set to Card Only, you can open the door by following the instructions below:
For Card Only, register the card user on the dedicated PC software first. The door is open with the authentication success message. Place the user card on the SUPREMA logo area. ID : 2 25 2. User Management The user management and other environment settings can be updated after authorizing the registered administrator (see 1.4.1 Registering the initial administrator). 2.1 Enrolling a user You can enroll a new user as shown below:
1. Use / buttons to select the User (
and press OK.
) icon 2. Use / buttons to select Enroll (
press OK.
) icon and 3. The ID that can be used appears. Use it or enter another ID and press OK.
(18 digit number) ID is used to edit or delete the user data so please keep it carefully. 4. Use / buttons to select Level and press OK.
(Level: General /Administrator) The user enrollment and environment configuration are enabled only in Administrator level. 26 User Enroll Enter ID 3 Enroll Level General Enroll 5. Enter the finger or PIN depending on the operation mode.
(Password: 48 digit number, Fingerprint: 1st finger or 1st + 2nd fingers) Enter the required information after selecting Device > Authorization
> Operation Mode > Auth Mode. Finger Only/Finger or PIN/Finger and PIN Place the first finger Place the first finger again Place the first finger on the sensor. Place the same finger on the sensor again. Place the second finger
(Skip=ESC) Place the second finger in the same manner. In order to skip the second fingerprint enrollment after enrolling the first fingerprint, press ESC. The user can enroll one or two fingerprints for passing the door. PIN Only/ Finger and PIN Enter PIN
Enroll Confirm PIN
Enroll For password, it is recommended to enter 4 to 8 digit number not to be easily exposed. 6. When the user enrollment is successfully done, the completion message window appears. User can be enrolled up to maximum 5000. Completed 27 2.2 Editing a user data You can modify the data of the previously enrolled user. 1. Use / buttons to select the User (
) icon and press OK. 2. Use / buttons to select the Edit (
and press OK.
) icon 3. Enter the ID or fingerprint of the desired user and press OK. User Edit Enter ID/Finger 4 Edit 4. Use / buttons to select the desired item and press OK. select any of Level/Operation Mode/Security Level/Finger/PIN/Access Group(1~4) Changing the user level Item Level Edit Level General Edit The settings for user, screen/sound, device, and such can be configured Use / buttons to select General or Administrator. Use / buttons to select Level and press OK. Press OK. only by the administrator level. 28 Operation Mode Finger Only Edit Use / buttons to select an desired operation mode and press OK. Press OK. Changing the authorization method Use / buttons to select Operation Mode and press OK. Edit Item Operation Mode Autho This authorization method setting for each user has higher priority than the terminal setting that has been defined in Device > Authorization
> Operation Mode > Auth Mode. Note that this function is applied to the case when the user enters ID or card and when Use is set in Device > Authorization > Operation Mode > Private Auth rization methods: *Finger Only/PIN Only/Finger or PIN
/ Finger and PIN/Card Only/Per Device
- Finger Only: Only fingerprint is used.
- PIN Only: Only PIN is used.
- Finger or PIN: Fingerprint or PIN is used.
- Finger and PIN: Both fingerprint and PIN are used.
- Card Only: Only user card is used.
- Per Device: The mode set in Device > Authorization > Operation Mode >
Auth Mode is used. Changing the security level of the user Edit Item Normal Security Level Security Level Security Level: *Per Device/Lower/Low/Normal/High/Higher
- Per Device: The security level in Device>Authorization>Fingerprint>
Use / buttons to select a security level. Use / buttons to select Security Level and press OK. Edit Press OK. on page 37 is applied.
- The higher the security level, the more sensitive the fingerprint recognition. But the authorization failure rate can increase. 29 Changing the fingerprint of the user Item Fingerprint Edit Use / buttons to select Fingerprint and press OK. Place the first finger Place the first finger again Place the first finger on the sensor. Place the same finger on the sensor again. Place the second finger
(Skip=ESC) Enroll the second fingerprint in the same manner. Changing the PIN of the user Item PIN Edit Use / buttons to select PIN and press OK. Enter PIN
Edit Confirm PIN
Edit Enter the desired password and press OK. After re-entering the password of the user, press OK. Changing the access group Item Select Edit Access Group1 Full Access Access Group1 Use / buttons to select any of Access Group and press OK. Setting the access groups other than Full Access or No Access is enabled through the dedicated PC software only. Using the terminal, you cannot add or edit them but only selecting them is enabled for each user. Use / buttons to select access privilege for selected Access Group
*Full Access/No Access/Not Use/Or user designated Acce ss Group Press OK. 30 2.3 Deleting a user data You can delete unnecessary user data. 1. Use / buttons to select the User (
and press OK. 2. Use / buttons to select the Delete (
and press OK.
) icon
) icon 3. After entering the ID or finger to delete and press OK. 4. When the action is successfully made, the message Deletion appears. The deleted user cannot be recovered. User Delete Enter ID/Finger 4 Delete Deletion If necessary, enroll it again.
- If all the users including the administrator are deleted, you must register the initial administrator again (see 1.4.1).
- When an administrator is deleted by mistake except normal users, the initial administrator registration step does not require registering normal users. 31 3. Configuration for Screen and Sound 3.1 Date, Time You need to set the current system date and time. After setting the date and time, the log data can store correct information. 1. Use / buttons to select the Screen, Sound
) icon and press OK. 2. Use / buttons to select the Date, Time (
icon and press OK.
) 3. Enter the current date by following the suggested format and press OK. For example, in case of November 15 in 2008, enter 20081115 and press OK. 4. Enter the current time by following the suggested format and press OK. For example, in case of 10:20 55 AM, enter 102055 and press OK. Screen, Sound Date, Time Date(YYYYMM00) 20081115 Date, Time Time(hhmmss) 102055 Date, Time 32 3.2 Backlight 1. Use / buttons to select the Screen, Sound
) icon and press OK. 2. Use / buttons to select Backlight (
and press OK.
) icon 3. Use / buttons to select a backlight operation status and press OK. Screen, Sound Backlight Mode Always On Backlight Always On When no input is made, it sets the time to exit from the menu. Mode Always On Backlight Timeout(sec) 20 Menu Duration Use / buttons to select the Always On and press OK. When no operation is made, it sets the time (second) to switch the screen. On at Use When no input is made on the menu window, it sets the time to automatically turn off the backlight. Mode On at Use Backlight Use / buttons to select the On at Use and press OK. Timeout(sec) 20 Backlight Enter the backlight-on time
(second) on the menu window. 33 3.3 Sound 1. Use / buttons to select the Screen, Sound
) icon and press OK. 2. Use / buttons to select Sound (
and press OK.
) icon Screen, Sound 3. Use / buttons to select the sound operation status and press OK. Mode On Sound Mode Off Sound Sound Or 34 4. Device Configuration 4.1 Authorization 1. Use / buttons to select the Device (
and press OK.
) icon 2. Use / buttons to select the Authorization
) icon and press OK. 3. Use / buttons to select any of Fingerprint, and Operation Mode and press OK. Device Authorization Item Fingerprint Authorization Security Level Normal Fingerprint In case of Fingerprint Use / buttons to select Fingerprint and press OK. Item Fingerprint Authorization Item Security Level Fingerprint Use / buttons to select Security Level and press OK. Use / buttons to select Security Level and press OK.
* Normal /Secure/More Secure Item Image Quality Fingerprint Image Quality Normal Fingerprint Use / buttons to select Image Quality and press OK. Use / buttons to select Image Quality and press OK.
*Normal/High/Low Cont. 35 36 Item Sensitivity Fingerprint Use / buttons to select Sensitivity and press OK. Item Check Duplicate Fingerprint Sensitivity 7 Fingerprint Use / buttons to select Sensitivity level and press OK. Check Duplicate Not Use Fingerprint Use / buttons to select Check Duplicate and press OK. Use / buttons Check Duplicate and press OK.
* Not Use /Use Item Fast Mode Fingerprint Use / buttons to select Fast Mode and press OK. Item Scan Timeout Fingerprint Fast Mode Auto Fingerprint Use / buttons to select desired Fast Mode and press OK.
*Auto/Normal/Fast
/Faster Scan Timeout(sec) 10 Fingerprint Use / buttons to select Scan Timeout and press OK. Enter Scan Timeout
(second) and press OK. Item Matching Timeout(sec) Matching Timeout Fingerprint Use / buttons to select Matching Timeout and press OK. 3 Fingerprint Enter Matching Timeout
(second)and press OK. Cont. Item Template Type Fingerprint Use / buttons to select Template Type and press OK. Template Type SUPREMA Fingerprint Use / buttons to select template format and press OK.
*SUPREMA/SIF Security Level: The higher the security level, the more sensitive the fingerprint recognition. But the authorization failure rate can increase. Image Quality: It is the image quality level used when entering the fingerprint data. In case of Low, the fingerprint can be easily input but the correct authorization is not guaranteed. Sensitivity: The higher the value, the more sensitive the sensor. Check Duplicate: When enrolling a user, it determines whether or not to check the Fast Mode: You can set the fingerprint recognition speed. If it is set to Fast, fingerprint data is already enrolled. the recognition accuracy may decrease. Scan Timeout: You can set the terminal standby time for entering fingerprint. If entry is not made within the specified time, the message, Entry time is over appears. Matching Timeout: You can set the maximum authorization time after entering fingerprint. If this time limit expires, matching stops and the authorization fails. Template Type: Format used in the terminal when identifying fingerprints (SUPREMA/SIF)
- SUPREMA: SUPREMAs own template format, SIF: ISO/IEC compatible template format
(To change the template format, there must be no fingerprint data stored on the terminal.) 37 38 In case of Operation Mode Item Operation Mode Authorization Use / buttons to select Operation Mode an press OK. Item Sensor Mode Operation Mode Use / buttons to select Sensor Mode an press OK. Sensor Mode Always On Operation Mode Use / buttons to select a sensor mode.
*Always On/ID Entered/OK Pressed Schedule All Time Always On
Use buttons to select the applicable time zone and press OK. Sensor Mode: *Always On/ID Entered/OK Pressed
- Always On: The sensor always waits for a fingerprint input.
- ID Entered/OK Pressed: If you enter ID or press OK, you can enter the time zone for using the sensor. Applied time: Use the dedicated PC software for setting the time zone except All Time and Not Use. With the terminal, you cannot add and edit it but only selection is not possible. Item Auth Mode Operation Mode Use / buttons to select Auth Mode and press OK. Auth Mode Finger Only Operation Mode Schedule All Time Finger Only
buttons to Use select the authorization method press OK.
Use buttons to select the applicable time zone and press OK. Double Mode Not Use Finger Only Use / buttons to set whether or not to use the double mode and press OK. Auth Mode: *Finger Only/PIN Only/Finger or PIN
/ Finger and PIN /Card Only If no authorization setting exists for each user, the user authorization method that has been set on the terminal is applied. Double Mode: When consequent two users are authorized successfully, entrance and exit are allowed. Cont.
Item Use Item Card Operation Mode Private Auth Mode Use buttons to set whether or not to use the mode and press OK. Private Auth Mode Operation Mode Use / buttons to select Private Auth Mode an press OK. Card entry methods:
- Use Template: After placing the user card, enter your fingerprint and PIN. Then the terminal matches the enrolled fingerprint template with the template in the card for identification. Card buttons to Use select the card entry method and press OK.
* Use Template/Use CSN Use whether or not to use cards and press OK. Use / buttons to select Card an press OK. Operation Mode Card Use Use Template Operation buttons to Type set
- Use CSN: Identifies only the serial number of the card. 39 4.2 In/Out 1. Use / buttons to select the Device (
and press OK.
) icon 2. Use / buttons to select In/Out (
press OK.
) icon and 3. Use / buttons to select any of Serial Conn., Tamper On, Door Wiegand, and TCP/IP and press OK. Device In/Out Item Serial Conn. In/Out In case of Serial Conn. (selection of connection method) Use / buttons to select Serial Conn. and press OK. Serial Conn.: It is used for RS485 communication or direct PC connection. Item Serial Conn. In/Out Type Host Serial Conn. Use / buttons to select Host and press OK. Type Slave Serial Conn. Use / buttons to select Slave and press OK. Type Ext. Host Serial Conn. Use / buttons to select Ext. Host and press OK. 40 Termination Not Use Serial Conn.
buttons to Use set whether or not to use the termination and press OK. Termination Not Use Serial Conn.
buttons to Use set whether or not to use the termination and press OK. Termination Not Use Serial Conn.
buttons to Use set whether or not to use the termination and press OK. Completed The completion message window appears. Completed The completion message window appears. Completed The completion message window appears. Cont.
Type Type buttons to buttons to Completed Completed Termination Termination Not Use Serial Conn Not Use Serial Conn. Not Use Serial Conn. Ext. Slave Serial Conn. The completion message window appears. The completion message window appears. Use / buttons to select Ext. Slave and press OK. Use set whether or not to use the termination and press OK. Use set whether or not to use the termination and press Use / buttons to select Not Use and press OK. Methods
- PC Conn.: Directly connects to PC through RS485
- Host/Slave: Connects between terminals through RS485. Used when the terminal Use / buttons to select Baudrate and press OK.
*115200/57600/38400
/19200 Use buttons to set whether or not to use the termination and press OK. Use / buttons to select PC Conn. and press OK. The completion message window appears. PC Conn. Serial Conn. Not Use Serial Conn. Baudrate 115200 Termination Serial Conn. Completed Type
interoperates with the BioAdmin software.
(Refer to the BioAdmin manual.)
- Ext. Host/Ext. Slave: Connects between terminals through RS485. Used when the terminal interoperates with the BioStar software.
(Refer to the BioStar manual.)
- Termination: Used when the communication line is too long or the signal strength changes drastically (It enforces the signal strength).
- Host/Slave, Ext. Host/Ext. Slave: Connects between terminals through RS485. The communication speed is fixed to 115200 baudrate. 41 In case of Tamper On Item Tamper On In/Out Use / buttons to select Tamper On and press OK. Tamper On Ignore In/Out Tamper: *Ignore/Locked
- Locked: When the device is forcibly removed, the Device is locked.
(To release the lock, the administrator must perform authorization.) Use / buttons to select a tamper method. Press OK. 42 In case of Door (When using the internal relay) It is used only when the stand-alone BioLite Net is installed without interoperating with the dedicated PC software. Relay Internal Door Exit Button Input 0 Internal Use / buttons to select Internal and press OK. Use / buttons to select Exit Button and press OK.
* Not Use/ Input 0/ Input 1 Door Sensor Input 1 Internal Type N.O Door Sensor Use / buttons to select Door Sensor and press OK.
*Not Use/Input Use / buttons to select a door sensor type and press OK.
*N.O/N.C Open Time(sec) Held Open Alarm 3 Door Enter the time and press OK. Not Use Door Use / buttons to select the type for Held Open Alarm and press OK.
* Not Use /Sound/Backlight/
Sound& Light/SIO Relay0/
SIO Relay1 Forced Open Alarm Not Use Door Use / buttons to select the type for Forced Open Alarm and press OK.
*Not Use/Sound/ Backlight/Sound and Light/SIO Relay0/ SIO Relay1 Completed The completion message window appears. Door Exit Button Item Door In/Out Opening Mode Temporary Open Use / buttons to select the type for Exit Button and press OK.
*N.O/N.C Use / buttons to select Door and press OK. Type N.O Enter the held open time by using the Numeric buttons and press OK.
*Held Open Time: Alarm ringing time when the open door is not closed. Use / buttons to select a opening mode and press OK.
*Temporary Open/ Toggle Held Open Time(sec) 30 Door When you exit from the menu before completing the relay setup, the configuration is not stored so please finish configuration until the message Complete appears. Opening Mode
- Temporary Open: When the door is open, it is automatically closed after a specific time.
- Toggle: The door is opened after the first authorization success and it remains unlocked until the second authorization success. 43 In case of Door (When using the SIO relay) It is used only when the stand-alone BioLite Net is installed without interoperating with the dedicated PC software. Item Door In/Out SIO Relay0 Relay Door Use / buttons to select Door and press OK. Use / buttons to select the relay type and press OK. Exit Button SIO Input0 SIO Relay0 Use / buttons to select the exit button and press OK.
* Not Use/SIO Input0/
SIO Input1 Type N.O Exit Button Use / buttons to select the type of the exit button and press OK.
*N.O/N.C Opening Mode Temporary Open Door Use / buttons to select the type of the opening mode and press OK.
*Temporary Open/ Toggle Door Sensor SIO Input1 SIO Relay0 Type N.O Door Sensor Use / buttons to select the door sensor and press OK.
*Not Use/ SIO Input1 Use / buttons to select the door sensor type and press OK.
*N.O/N.C Open Time(sec) Held Open Alarm 3 Door Enter the time and press OK and press OK. Sound Door Use / buttons to select the alarm type and press OK.
*Not Use/Sound/Backlight/
Sound and Light/SIO Relay0/SIO Relay1 Complete The completion message window appears. Held Open Alarm(sec) Forced Open Alarm 30 Door Not Use Door Enter the time for Held Open Alarm by using the Numeric buttons and press OK.
*Held Open Time: Alarm ringing time when the open door is not closed. Use / buttons to select the type for Forced Open Alarm and press OK.
*Not Use/Sound/
Backlight/Sound and Light/SIO Relay0/ SIO Relay1 44 In case of Wiegand Standard 26Bit Format is used for Wiegand In/Out format. The setting can be changed using the dedicated PC software. Item Type Use / buttons to select Wiegand and press OK. select buttons to Wiegand Wiegand In/Out Card ID In Wiegand
types: *Card ID In/Card ID Out/User ID In/User ID Out Use Wiegand and press OK.
*Card ID In/ Card ID Out/User ID In/ User ID Out/Not Use
- Card ID In: The card ID is entered.
- Card ID Out: The card ID is output.
- User ID In: The user ID is entered.
- User ID Out: The user ID is output. When the user whose user ID is 2 registers the card ID (1234567),
- Card ID In: When 1234567 is entered through the Wiegand port, the
- Card ID Out: When the user card is read through the terminal, the card ID
- User ID In: When 2 is entered through the Wiegand port, the user is
- User ID Out: When the user is successfully authorized, the user ID 2 is For Wiegand connection, see 6.4.7 Connection Wiegand. 1234567 is output through the Wiegand port. output through the Weigand port. user is successfully authorized. successfully authorized. 45
. In case of TCP/IP Item TCP/IP In/Out Use / buttons to select the TCP/IP and press OK. It directly connects to the server for the dedicated PC software without using DHCP. DHCP Not Use TCP/IP
buttons to set Use whether or not to use DHCP and press OK. IP Address 192.168.1.35 TCP/IP Enter IP address and press OK. Gateway 192.168.1.10 TCP/IP Subnet Mask 255.255.255.0 TCP/IP Port 1471 TCP/IP Enter Gateway using numeric and arrow button and press OK. Enter IP address using numeric and arrow button and press OK. Enter Port and press OK. Server Use TCP/IP Use / buttons to select the Use and press OK. 100Base-T Support Not Support TCP/IP Use / buttons to set whether or not to support 100Base-T and press OK. Server IP 192.168.1.30 TCP/IP Server Port 1480 TCP/IP Enter Server IP address using numeric and arrow button and press OK. Enter Server Port and press OK. Completed The completion message window appears. When you exit before finishing the TCP/IP setting, the change is not stored so proceed with the settings until the message Completed appears. IP Address/Gateway/Subnet Mask Setup: If DHCP is used, the values for IP address, gateway, and subnet mask are automatically assigned. Otherwise, set DHCP to Not Use and enter the corresponding values.
(When the right arrow is pressed, . is entered while the left arrow deletes characters one by one.) Server: To directly connect the server of the dedicated PC software that enables monitoring and setting the terminal, use Server for its setup and enter the values for IP address and port number. (Refer to the dedicated PC software manual.) TCP/IP Port, Server Port: Should be the same values defined in the dedicated PC software. It is recommended to set the TCP/IP port to 1471 and Server to 1480.
(When the port number is modified as you want, TCP/IP communication may not be active.) 46 4.3 System 1. Use / buttons to select the Device (
and press OK. 2. Use / buttons to select the System (
icon and press OK.
) icon
) 3. Use / buttons to select any of Information, Factory Default, Delete All Log, Delete User DB, and Language and press OK. Device System Item Information System In case of Information Item Log Information Use / buttons to select Not Use and press OK. Filter Not Use Log Use / buttons to select Log and press OK. 6/18 16:21(1) Set Time 6/18 14:20(3) Delete OK The entire logs appear.
(Use / buttons to see the previous/next logs.) Filter Use Log User All Filter Date All Filter Use / buttons to select Use and press OK. Use / buttons to select any of All and Select ID and press OK. Use / buttons to select any of All and Specify Date and press OK. Event All Filter 6/18 14:20(3) Delete OK 6/18 13:46(3) Enroll OK Use / buttons to select the event type and press OK.
*All/Success/Failure/In/Out/
System The log filtering result appears on the screen.
(Use / buttons to see the previous/next logs.) Filter
- Not Use: Displays all.
- Use: Only the specified log is displayed.
(ID/Date/Event Type) When the date is specified, the logs occurred earlier than the specified date appear. 47 In case of Information Continued Item Num. Of User Information Firmware Ver. Information Use / buttons to select Num. Of User and press OK. Item Use / buttons to select Firmware Ver. and press OK. Item Use / buttons to select Hardware Ver. and press OK. Hardware Ver. Information User 4/5000 Templates 6/10000 The number of current users and the number of fingerprints enrolled appear. Firmware Ver. V1.0_081127 Information The version of the firmware appears. Hardware Ver. 11563(Rev.C) Information The version of the hardware appears. In case of Factory Default Item System Factory Default Initialize?
Initialize Use / buttons to select Factory Default and press OK. In case of Initialize, the settings are deleted but the log data and user DB are not Use / buttons to determine whether or not to initialize it.
*Cancel/ Initialize In case of Initialize, the message Initialized appears. Factory Default Initialized deleted. 48 In case of Delete All Log Item Deletion System Delete All Log Delete All Log Delete?
Delete Use / buttons to select Delete All Log and press OK. In this case, all users in/out data are deleted and they cannot be recovered. Use / buttons to determine whether or not to delete them.
*Cancel/ Delete In case of Delete, the message Deletion appears. In case of Delete User DB Item System Delete?
Delete Delete User DB In this case, the users DB is completely deleted so you must immediately Delete User DB Use / buttons to determine whether or not to delete the user DB.
*Cancel/Delete In case of Delete, the message Deletion appears. Use / buttons to select Delete User DB and press OK. Deletion register the initial administrator (see 1.4.1). When the user DB is deleted, it cannot be recovered. In case of Language Item Language System Use / buttons to select Language and press OK. Item English Language Use / buttons to select the language.
* English/ Korean Press OK. 49 In case of Wallpaper Item Wallpaper
Wallpaper System Type1 System buttons to Use select the type and press OK.
*Type1/Type2 buttons to Use select Wallpaper and press OK. Types
- Type1: Only the time appears on the wallpaper screen.
- Type2: The number of users and TCP/IP connection status appears
on the wallpaper screen. In case of (8/5000) U - Eight people are registered among 5000
(number of people that can be registered) and it is unlinked. 10:33:02 BioLite Net 10:33:02
(8/5000) U BioLite Net Characters on the Type2 wallpaper
- U: Unlinked (LAN is not connected.)
- D: Disconnected (LAN is connected but TCP/IP communication is not active.)
- C: Connected (LAN is connected and TCP/IP communication is active.) Type1 Type2 50 5. Attendance Management 5.1 Operating environment When an event (attendance, leaving, return, and outside duty) is received from the terminal, it is reported to the server of the dedicated PC software. You can create a report from the events stored in the server. With the dedicated PC software, you can also define new event other than the above-
mentioned basic events and apply it to the report. In case of basic events provided, each event causes the door to open. You can configure the settings according to the environment through the dedicated PC software. Event 51 5.2 Setup for attendance management 1. Use / buttons to select the Device (
) icon and press OK. 2. Use / buttons to select the Authorization
) icon and press OK. 3. Use / buttons to select the Operation Mode and press OK. 4. Use / buttons to select the Time Attendance and press OK. 5. Use / buttons to select the Operation Mode of Time Attendance and press OK. Device Authorization Item Operation Mode Authorization Item Time Attendance Operation Mode Time Attendance Key Input
- Key Input: In usual time, the function is inactive. When / buttons are pressed,
: *Key Input/Fixed/Manual/Auto/Not Use Operation modes Operation Mode you can select the attendance status. When a user authorization is successful, the selected attendance log is recorded.
- Fixed: A specific attendance status continues. When a user authorization is successful, the corresponding log is recorded.
- Manual: The active attendance status appears on the screen and it can be changed using / buttons. Once it is changed, the status continues until another selection is made. Every authorization success makes the log recorded.
- Auto: The active attendance status appears on the screen. Fore each time zone, the active attendance statuses are fixed.
- Not Use: The function is not available. 52 5.3 Operation modes 5.3.1 Key Input 10:33:02 BioLite Net When the operation mode is set to Key Input, this mode is used. Move to the desired event by using /
buttons. ID: 8 In Select In Type Select the desired event and perform user authorization. The door opens with a confirmation message. 5.3.2 Manual When the operation mode is set to Manual, this mode is used. In 08:30:43 12/01/2008 The desired event appears. Move to the desired event by using /
buttons. In case of Manual BioLite Net 10:33:02 53 In case of Manual In 08:30:43 12/01/2008 ID: 8 In The door opens with a confirmation message. The Users identify the card or fingerprint according to the authorization method. Manual:
It is convenient to those who need to change an event type manually everytime they enter or leave.are in and out... 5.3.2 Auto When the operation mode is set to Auto, this mode is used. This mode can set the corresponding time zone for each attendance event through the dedicated PC software. Then the fixed event is set for the corresponding time zone. In case of Auto Out 18:35:55 12/01/2008 The event for the corresponding time zone appears. ID: 8 Out The door opens with a confirmation message. The users identify the card or fingerprint according to the authorization method. Auto
: While the event type and time zone are set through the dedicated PC software, you can totally use this mode for all the users who are entering or leaving. 54 5.3.3 Fixed When the operation mode is set to Fixed, this mode is used. This mode is used after fixing the event through the dedicated PC software if required. In this case, the setting can be changed only through the dedicated PC software and you cannot change the attendance event through the terminal. Out 18:35:55 12/01/2008 The preset event appears. ID: 8 Out The door opens with a confirmation message. The users identify the card or fingerprint according to the authorization method. Fixed: This mode is available only when the desired event is set for all the users who are entering or leaving. 55 6. FAQ 6.1 Error messages Error Message Description
!Not Administrator A normal user tries to enter the menu.
!Not Authorized The fingerprint authentication for the administrator fails when entering the menu.
!Device Locked The device is locked because the case has been open.
!Failed
!No Log The number of users exceeds 5000, so you cannot enroll more users. There is no log data.
!Unknown Finger The entered fingerprint for entering the menu or editing/deleting a user data does not exist.
!Cannot Change A template already exists when you want to change the template format.
!Failed
!ID In Use The user ID to delete does not exist. The user ID to enroll already exists.
!Unknown ID The user ID that does not exist in the device is entered.
!Wrong PIN
!Invalid Value
!Mode Error
!Not Matched The entered password for authentication is not matched the enrolled one. An invalid value is entered. The authorization mode is different from the setting. The entered fingerprint or password is not matched to the enrolled one.
- In case of fingerprint entry, the entered two fingerprints of the same finger are different.
!Time Out The fingerprint data is not entered while the sensor is active.
!Not Recognizable The fingerprint data cannot be extracted due to wrong finger input.
!Duplicated Time The time zone is duplicated.
!Duplicate Finger When enrolling a user fingerprint, the fingerprint that has been input already exists in the device (when checking the duplicated case).
!Access Restricted The authentication trial happens except for the allowed time zone.
!No Card You tried authorization with a unregistered card. 56 6.2 Troubleshooting Category Trouble Solution Power Password Fingerprint Door lock Time TCP/IP The power is supplied but the device does not operate. The password is lost. The locked door is not open after entering the password and pressing OK. The fingerprint has been enrolled but its recognition encounters an error. It was good at recognizing fingerprints but suddenly it fails in recognition. Even if you close the door, the door is not locked. The time is not correct. The terminal data is not found by the dedicated PC software. Administrator connection The administrator mode cannot be entered because of losing the administrator password or resignation.
- When the device is disconnected from the bracket, it may not work when using the tamper switch.
- Check the adapter or power cable.
- Enter the queried password after contacting the administrator in case of a normal user.
- When the administrator password is lost, contact with the installation agency.
- Check whether the correct password is input.
- Check whether you have changed the password recently.
- If you cannot find the password, contact the administrator.
- BioLite Net has the technology of Suprema that won the first award in FVC2004 and FVC2006 because it has world number one quality in recognition.
- For better performance in fingerprint recognition, correct registration is a must.
- Enroll the fingerprint again after seeing 1.4 Methods for fingerprint input
- The recognition rate may vary due to the characteristic of each finger so enroll the fingerprint of another finger.
- Check whether the finger or the sensor is covered with sweat, moisture, or dust.
- In case the fingerprint has any damage, the device may consider it as the one of wrong person.
- Wipe the finger or sensor with a dry cloth and retry.
- When the fingerprint is so dry, blow your steam of breath into it and retry.
- The electric lock failure is most likely to happen. Check it after contacting the installation agency.
- BioLite Net has an embedded battery but it can be discharged by a long time use. Accordingly the time may not be correct. Correct the time after seeing 3.1 Date, Time.
- Check the connection status after setting on the terminal like Terminal > System > Wallpaper > Type2.
- When U is displayed: Check the LAN connection status.
- When D is displayed: Check the IP address. If you set like Terminal > In/Out -> TCP/IP -> DHCP Not Use, the current IP address appears. If you use DHCP, the actual address received from the DHCP server appears. If the IP address is set correctly, check the port number.
- BioLite Net allows the administrator to give access rights so only the administrator can enter the menu.
- When you have no choice but to enter the administrator menu, you can be granted an administrator password after following the predefined procedure.
(Contact with the installation agency.) 57 6.3 Usage summary It provides the mainly used functions. button: Used to select the desired function. Function Initial administrator registration Date & time setting Method for setting
(Sequentially perform the following items.) Enter ID Enter password Enter password again Select Screen, Sound (
Enter date Enter time
) icon Select Date, Time (
) icon User registration Select User (
Select Enroll (
Select General or Administrator in Level
) icon
) icon Enter ID Enter fingerprint or PIN User password modification User fingerprint modification Select User (
fingerprint again
) icon Select PIN Select Edit (
) icon Enter ID or Enter the desired password Enter it Select User (
fingerprint
) icon Select Fingerprint Select Edit (
Enter it again
) icon Enter ID or Enter the fingerprint of the user User authorization method modification Select User (
fingerprint method Select Enroll (
) icon Select Operation Mode
) icon Select an authorization Enter ID or User deletion Select User (
fingerprint to delete
) icon Select Delete (
) icon Enter ID or
) icon Select System (
Select Delete
) icon Select System (
Select Initialize
) icon Select
) icon Select All user deletion Initialization
(Environment settings deletion) Select Device (
Delete User DB Select Device (
Factory Default 58 6.4 System Installation 6.4.1 Cable specifications Type Switch
Wiegand Network Relay Power
RS485 No. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 Name Color SWIN0 GND SWIN1 GND W-DATA0 W-DATA1 W-GND ERX -
ERX +
ETX -
ETX +
Purple Gray Brown Gray Orange White Black Yellow Blue Orange Pink Relay Normal Close Orange (White String) Relay Common Green (White String) Relay Normal Open Gray (White String) Power 12V Power Ground RS485 Ground RS485 +
RS485 -
Red Black White (Black String) Blue (Black String) Yellow (Black String) 59 6.4.2 Installing the bracket 1. Fix the bracket to the place where BioLite Net is to be installed using the fixing screws. If the installation place is on concrete, drill holes, insert knife blocks into the holes, and fix them by using fixing screws. 2. Install BioLite Net on the bracket. 3. Fix BioLite Net and the wall mount bracket by rotating the star-shape screw by the hexagonal wrench. The extension bracket (Option) is provided for wiring aid according to the installation environment. Remove the basic bracket on the body for use of this bracket 60 6.4.3 Connecting Power & RS-485 RS-485 is used for connecting to another device
(e.g. PC, BioStation, BioEntry Plus, BioLite Net, Secure I/O, etc.). For power supply, use a product of DC 12V ( 10%) and minimum 500mA. To share the power adapter with another device, the required current sum of terminal (500mA) and another device must not exceed the current capacity. 6.4.4 Connecting the switch 61 6.4.5 Connecting the relay 1. Fail safe lock 2. Fail secure lock 3. Automatic door 62 6.4.6 Connecting Network 6.4.7 Connecting Wiegand When BioLite Net is used for Wiegand output device When BioLite Net is used for Wiegand input device 63 Max. 13.2 250
1 0.3 30W 37.5VA 110 125 Notes Use regulated DC power adaptor only The input ports are pulled up with 4.7k resistors 30V DC 125V AC DC AC DC AC 6.4.8 Electrical specifications Type Power Name Voltage (V) Min. Typ. 10.8 12 Current (mA) VIH (V) VIL (V) Pull-up resistance () Switching capacity (A) Switching power
(resistive) Switching voltage (V)
TBD TBD 4.7k
Switch Input Relay 64 6.5 Specifications Item Specification CPU 400MHz DSP Fingerprint sensor 500dpi optical sensor User capacity 5000 users (2 fingerprints per user) Matching speed Less than 1 second Operation mode Fingerprint, Password, Fingerprint + Password, Card IP rate IP65 Class Internal relay Deadbolt, EM lock, door strike, automatic door TTL I/O 2 inputs for exit switch and door sensor Wiegand In/Out 1 Port (Wiegand Input or Wiegand Output is used according to the configuration.) LCD Keypad 128 x 64 Graphic LCD (Monochrome) 3x4 keypad, 3 navigation keys Log capacity 50,000 events Rated Voltage DC 12V (Min. 500mA and above)
(When sharing the power with a device such as electric door lock, enough power is required considering the power requirement for the connected device.) Supportable Cards BioLite Net Model(BLN-OC)
- 13.56MHz Mifare Classic 1K, 4K Card (Read/Write)
- 13.56MHz ISO 14443A compatible Card (CSN Read) BioLite Net EMProx Model(BLR-OC)
- 125KHz EM4100 compatible Card (Read) Size Certified 60 x 185 x 40 mm (Width x Height x Depth) KCC, CE, FCC 65 Mechanical Specifications 66 6.6 FCC Notice Caution Changes or modifications not expressly approved by the manufacturer responsible for compliance could void the user's authority to operate the equipment Warning This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions : (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. Information to User This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
1. Reorient or relocate the receiving antenna. 2. Increase the separation between the equipment and receiver. 3. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. 4. Consult the dealer or an experienced radio/TV technician for help. 67
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2009-05-04 | JBP - Part 15 Class B Computing Device Peripheral | Original Equipment | |
2 | 0.125 ~ 0.125 | DCD - Part 15 Low Power Transmitter Below 1705 kHz |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 2 | Effective |
2009-05-04
|
||||
1 2 | Applicant's complete, legal business name |
Suprema Inc.
|
||||
1 2 | FCC Registration Number (FRN) |
0017205907
|
||||
1 2 | Physical Address |
17F-5, Parkview officetower,, 248, Jeongjail-ro
|
||||
1 2 |
Seongnam-si, Gyeonggi-do, N/A 13554
|
|||||
1 2 |
South Korea
|
|||||
app s | TCB Information | |||||
1 2 | TCB Application Email Address |
m******@ccsemc.com
|
||||
1 2 | TCB Scope |
A1: Low Power Transmitters below 1 GHz (except Spread Spectrum), Unintentional Radiators, EAS (Part 11) & Consumer ISM devices
|
||||
app s | FCC ID | |||||
1 2 | Grantee Code |
TKW
|
||||
1 2 | Equipment Product Code |
BLROC
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 2 | Name |
D**** S********
|
||||
1 2 | Title |
CTO
|
||||
1 2 | Telephone Number |
+82-3********
|
||||
1 2 | Fax Number |
+82-3********
|
||||
1 2 |
d******@supremainc.com
|
|||||
app s | Technical Contact | |||||
n/a | ||||||
app s | Non Technical Contact | |||||
n/a | ||||||
app s | Confidentiality (long or short term) | |||||
1 2 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 2 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 2 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 2 | Equipment Class | JBP - Part 15 Class B Computing Device Peripheral | ||||
1 2 | DCD - Part 15 Low Power Transmitter Below 1705 kHz | |||||
1 2 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | BioLite Net | ||||
1 2 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 2 | Modular Equipment Type | Does not apply | ||||
1 2 | Purpose / Application is for | Original Equipment | ||||
1 2 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | Yes | ||||
1 2 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 2 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 2 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 2 | Firm Name |
ESTECH Co., Ltd.
|
||||
1 2 | Name |
Y**** J********
|
||||
1 2 | Telephone Number |
82-31********
|
||||
1 2 | Fax Number |
82-31********
|
||||
1 2 |
j******@estech.co.kr
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15B | CC | ||||||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
2 | 1 | 15C | CC | 0.12500000 | 0.12500000 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC