Biostar 1.92 Administrator Guide en
Biostar 1.92 Administrator Guide en
Biostar 1.92 Administrator Guide en
BioStar 1.92
Administrator Guide
EN 102.00.BS V1.92A
BioStar 1.92 Administrator Guide
Disclaimers
The information in this document is provided in connection with Suprema products. No license,
express or implied, by estoppels or otherwise, to any intellectual property rights is granted by this
document, except as provided in Suprema’s Terms and Conditions of Sale for such products.
Suprema assumes no liability whatsoever and Suprema disclaims any express or implied warranty,
relating to sale and/or use of Suprema products, including liability or warranties relating to fitness for
a particular purpose, merchantability, or infringement of any patent, copyright, or other intellectual
property right.
Suprema products are not intended for use in medical, lifesaving, or life sustaining applications or
other applications in which the failure of the Suprema product could create a situation where
personal injury or death may occur. Should Buyer purchase or use Suprema products for any such
unintended or unauthorized application, Buyer shall indemnify and hold Suprema and its officers,
employees, subsidiaries, affiliates, and distributors harmless against all claims, costs, damages,
expenses, and reasonable attorney fees arising out of, directly or indirectly, any claim of personal
injury or death associated with such unintended or unauthorized use, even if such claim alleges that
Suprema was negligent regarding the design or manufacture of the part.
Suprema reserves the right to make changes to specifications and product descriptions at any time
without notice to improve reliability, function, or design. Designers must not rely on the absence or
characteristics of any features or instructions marked "reserved" or "undefined." Supreme reserves
these for future definition and shall have no responsibility whatsoever for conflicts or
incompatibilities arising from future changes to them.
Please contact Suprema, local Suprema sales representatives or local distributors to obtain the latest
specifications before placing your order.
Copyright Notice
This document is copyrighted © 2008-2013 by Suprema, Inc. All rights reserved. All other product
names, trademarks, or registered trademarks are property of their respective owners.
BioStar is Suprema's next-generation access control system, based on IP connectivity and biometric
security. Most system devices integrate fingerprint scanners and card readers for multiple levels of
user authentication. However, Suprema's biometric devices, installed at each door, work not only as
card or fingerprint scanners and card readers, but also as intelligent access controllers.
The licensed standard edition of BioStar is unlocked by a USB dongle. Without the dongle, BioStar
functions as a free, but limited-capability version. With the dongle, BioStar offers greater versatility
and additional features, as shown in the table below:
Maximum # of 32 2
clients
IO board Yes No
Secure I/O 2: This is a separable controller with an ultra slim design for
one external door relay control and input and output expansion. It is
used with SUPREMA's IP access control terminals and encrypted
communication, reinforcing security and providing an optimized
solution according to the service environment.
Xpass S2: The Xpass S2 device is a slimmer version of the Xpass that
supports FeliCa and ISO 15693 cards. Its low profile allows it to be
installed in tight spaces and it features access control to floors when
connected with a LIFT I/O device via RS485 slave.
LIFT I/O: The LIFT I/O supports 0-9 device IDs and 12 output ports (12
input ports are not currently supported). Each output can be connected
to an elevator button to control access to floors. The LIFT I/O can be
connected via RS485 as a slave to Xpass and Xpass S2 devices. Up to
10 LIFT I/O devices can be connected to a BioEntry Plus, Xpass or
Xpass S2 device to control up to 120 floors.
Overall, the system supports a maximum of 512 doors and 512 devices (20 doors and
devices in the free version). Networked devices can be easily grouped together to create
various combinations of anti-passback or alarm zones, as illustrated by the graphic that
follows.
Card only: authentication via an access card is the only method to gain entry.
[FaceStation Only]
Face: authentication via face recognition is the only method to gain entry.
Face + Password: authentication via face recognition plus password.
Face + Card: authentication via face recognition plus access card.
Face + Card or Password: authentication via face recognition plus access card or
password.
Face + Card + Password: authentication via face recognition plus card plus password.
User ID + Face: authentication via user ID plus face recognition.
User ID + Face or Password: authentication via user ID plus face regognition or
password.
User ID + Face + Password: authentication via user ID plus face recognition plus
password.
BioStar allows specific configuration of alarm events for doors that are forced open or held
open longer than a specified interval, including activating alarm sounds from individual
devices, sending signals to external alarm sirens, displaying warnings in the BioStar user
interface, and sending e-mail notifications (not available in the free version). In addition,
administrators or operators can remotely lock and unlock doors or reset alarms. For more
information about door management, see sections 3.3, 4.3, and 4.4. For more information
about elevator management, see section 3.4.
Compatible Firmware
BioStation 2: 1.2.1 version or later
BioStation A2: 1.1.0 version or later
BioStation L2: 1.0.1 version or later
BioEntry W2: 1.0.0 version or later
User
Import user: Department information and PIN cannot be imported.
Card: A security credential card, which could be issued in BioStar 2, cannot be issued.
In addition, only one card can be used.
Scanning a fingerprint and reading a card: The master device should be used for
scanning a user’s fingerprint or issuing a card. A 2.x device connected as the slave
cannot scan a fingerprint or read a card.
Door
Door: A 1.x device and a 2.x device cannot be used together for configuring the door. In
other words, devices of different versions cannot be set for the entrance and exit
devices.
Zone: A 1.x device and a 2.x device cannot be used together for configuring a zone. In
other words, a zone cannot be configured with devices of different versions.
Access control
Full Access / No Access: A 2.x device uses the access control information of users in
preference to full access/no access set for the device. If there is no access control
information set for the device, access is possible with the user authentication
information registered by default, and in order to control the access of users
specifically, access control information must be set.
Device
Device tree: A 2.x device is always displayed on the sublist of the BioStar Server. If the
server mode is used, a 1.x device is displayed on the sublist of BioStar Server, and if
the direct mode is used, it is displayed on the sublist of the device.
Network tab: RS485 mode, which can be set for a 2.x device, is different from a 1.x
device. The default value, host, and slave can be set as the RS485 mode for a 2.x
device, and if the default value is set, one door can be configured with one device. Also,
when a device whose Default Value is set for the RS485 mode is connected to the host
device using a RS485 cable, it can also be registered as a slave device in the BioStar.
Input/output tab: Device version 2.x only uses the input tab.
Wiegand tab: Only the extension mode is supported for the Wiegand mode.
MIFARE card CSN: Byte order of MIFARE card ID is different from a 1.x device. If Byte
Order of 1.x devices is set to MSB, Byte Order of 2.x devices should be set to LSB. If
Byte Order of 1.x devices is set to LSB, Byte Order of 2.x devices should be set to MSB.
Monitoring
Arm/disarm: Arm/disarm cannot be used for a door or zone which is configured with a
2.x device.
Uploading a log: A log can be uploaded using USB for a 2.x device.
02
Install the BioStar
Software
Installing BioStar is a fairly simplistic process, provided that you address a few prerequisites before
beginning the installation:
First, you must select a PC that can remain running constantly to function as the BioStar server.
The server will receive and store log data from connected devices in real time.
Second, you must choose a type of database to use. The BioStar server supports either MySQL or
MS SQL Server (including the scaled-down, free MS SQL Server Express). Regardless of which
database you choose, you must have sufficient access rights and privileges to connect to the
database and create new tables.
Third, ensure that the PCs you will use for both server and client applications meet the minimum
requirements listed in section 2.1.
The BioStar installation CD includes the BioStar installer. By default, the installer will install both the
server and client applications with minimal input (see section 2.2). However, you may choose to
install the server and client applications independently if you need to specify additional database
options or desire to install the applications on separate PCs (see sections 2.3 and 2.4).
The minimum system requirements for installing and operating the BioStar software
include the following:
CPU: Intel Dual Core or similar processor, capable of processing speeds of 1.5GHz or
faster
RAM: 2GB
HDD: 5GB
!
Attention: If you have installed a previous installation on the machine with BioStar
installer, remove the old version before runninng the BioStar Installer.
!
Attention: Do not install BioStar 1 on a computer where BioStar 2 is installed. A problem
in the performance of the program may occur.
Before you run the BioStar installer, close all other open applications. If you have previously
installed BioAdmin on the same machine, ensure that you stop the BioAdmin server before
beginning the installation.
5. Make sure that both the Server and Client applications are selected in the Select
Features dialog box, then click Next to proceed.
!
Attention: If you have installed a previous installation on the machine with BioStar
installer, remove the old version before runninng the BioStar Installer.
4. During the installation, you will be asked to select the language of your preference.
Select a language, then click Next to proceed.
5. At the Select Features dialog box, click the Client checkbox to uncheck it and exclude
the Biostar client application in the installation (both the server and slient
applications are checked by default), then click Next to proceed.
Note: The default name for the database is always “BioStar,” to prevent unintentional
installation of multiple databases on the same system or database server. The database
name can be changed by editing the DBSetup.exe file. When patching the database server,
you will have the option to manually select a datbase.
10. If you choose MS SQL Server, you must configure the authentication method as well
(MySQL allows only server authentication):
Server authentication: this option uses login IDs and passwords to authenticate
users that are created by and stored on the SQL Server. These credentials are not
based on Windows user accounts. Users connecting via server authentication
must provide their credentials every time that they connect.
Windows authentication: this option uses Windows users accounts for
authentication. When users connect through a Windows user account, the SQL
Server validates the account name and password using the Windows principal
token in the operating system. The SQL Server does not ask for a password and
does not independently validate user identification. Windows authentication is the
default authentication mode for MS SQL Server.
Note: You must choose the authentication mode that is supported by the database. You
must also provide the proper credentials to create new tables in the database.
max_allowed_packet=16M). After you have changed and saved the file, restart the BioStar
Server for the changes to take effect.
On desktop, click BioStar Server Config to start BioStar Server setting program. Or, in
Windows, Start > All programs > BioStar 1.92 > Server Service > BioStar Server Config
The server configuration utility allows you to monitor and control the following:
Status: view and modify the current status of the BioStar server (Stopped or Started).
You can stop and start the server by clicking the Start or Stop button on the right.
Connection: view and modify the details for the connection between the server and
devices.
– TCP Port: enter the port that devices and client applications use to connect to the
server. You should use a port that is not shared with any other software
applications. Most devices supporting BioStar 1 use 1480 port as a default, and
BioStation A2, BioStation 2 and BioStation L2 use 51212 port as a default.
– Thread Count: enter the maximum thread count that the BioStar server can create.
You can enter any number between 32 and 512; however, keep in mind a larger
thread count will consume more system resources.
– Client List: click this button to view a list of devices that are connected to the
BioStar server. The list shows the IP address of each device and whether or not a
SSL certificate has been issued to the device. You can issue or remove SSL
certificates directly from the utility.
Server Matching: The function of the matcher used at the time of server matching is
improved according to the number of CPU cores in the system. Therefore, a faster
server matching speed can be expected as the number of cores used by the matcher
becomes larger. The following setting is supported at the Server Matching item in the
BioStar Server Config.
– Number Of Core: means the number of cores used by the matcher and the default
number is 2.
Database: view and modify database settings. For more information about how to alter
these settings, see the procedure for setting up the BioStar server in section 2.3.
– Max Connection: specify the maximum number of connections between the server
and the database. In most cases, the default value (1) is appropriate.
SSL: view or modify the settings for OpenSSL. Click Browse to locate the path for the
OpenSSL application or click Change to change the pass phrase.
5. At the Select Features dialog box, click the Server checkbox to uncheck it and exclude
the Biostar server application in the installation (both the server and client
applications are checked by default), then click Next to proceed.
!
Attention: BioStar versions 1.3 and higher include a USB driver, which enables the
connection of BioStation in Windows 7. This driver is not compatible with a previous
version of BioStar. If a previous version of BioStar is used, install the correct USB driver.
2. Click Server Setting. This will open the Connect Server dialog box.
Each element is named as what is displayed in the title. For example, it is called User window,
Customize dialog box, Additional Infomation tab, Basic Information area.
5. Drag a command to the toolbar. This will add a new button for the command.
This section describes how to add administrator accounts, devices, doors, zones, departments,
users, and access groups and setup time and attendance within the BioStar software. This
administrator's guide does not cover procedures for installing physical components, wiring doors
and devices, or connecting devices to networks. For more information about hardware installation
and physical configuration of your access control system, please refer to the installation guides that
accompany your access control devices.
Administrators are capable of adding and configuring devices, users, doors, zones, and
access groups. They also can manage time and attendance functions, including setting up
time categories, daily schedules, shifts, holiday rules, and leave periods, as well as creating,
modifying, and viewing time and attendance reports. In addition, administrators can create
custom administrator levels that are granted various privileges for the BioStar system
menus.
Operators can monitor and manage the BioStar system via a remote client terminal.
Operators have the same privileges with administrators, other than the privileges to create
and delete other administrator or operator accounts. Like administrators, operators are
capable of adding and configuring devices, users, doors, zones, and access groups. They
also can manage time and attendance functions, including setting up time categories, daily
schedules, shifts, holiday rules, and leave periods, as well as creating, modifying, and
viewing time and attendance reports.
Managers have privileges to read all information in the menus. However, they cannot
create, modify, or delete anything in the menus. Depending on your organization’s
requirements, the capability to view events may be useful for other management purposes.
The custom administrator level can be assigned full or limited privileges on the seven
menus. On each menu, you can assign one of three privileges: All Rights, Modify, or Read.
Depending on your organization’s requirements, the BioStar system can be managed more
effectively by adding custom administrator levels.
A typical setup will consist of one administrator (or more, depending on the size of your
organization) who has full access to the system. Below the administrator level, several
operators may perform various functions, such as remotely controlling doors and locks,
adding users, registering fingerprints, issuing access cards, adding access groups, defining
timezones, and configuring alarm events.
allowed to view or modify other users or devices. While you are creating a custom
administrator level, in the User menu, you can grant privileges for users in a
department and its sub departments. However, ensure that you do not select
individual users, but rather the first-level or second-level departments they belong
to.
In the Device menu, you can grant privileges for specific devices. If a device has a
slave device connected, the privileges for the host device will also apply to the
slave device. Users and devices that are not selected in the User and Device
menus will not appear in the Doors, Visual Map, Access Control, Monitoring, and
Time and Attendance menus. If a door or zone is associated with devices that are
not granted privileges, the door or zone will not appear in the Door menu.
7. When selecting the User Menu or Device Menu, select users or devices to
grant access privileges by clicking the checkboxes in the users or devices
list.
8. Select a permission level (All Rights, Modify, or Read) by clicking the
checkbox next to an option.
9. Click Add to include the permission in the custom level.
10. Repeat steps 6-9 as necessary to add other permissions.
11. When you are finished customizing the level, click Save.
You can now create new administrative accounts with any of the custom
administrator levels you have created.
!
Attention: BioStar versions 1.3 and higher include a USB driver, which enables the
connection of BioStation in Windows 7. This driver is not compatible with a previous
version of BioStar. If a previous version of BioStar is used, install the correct USB driver.
4. Click Next.
5. For USB or Virtual USB searches, skip to step 7. If you are searching for devices
connected via LAN or serial ports, set advanced search criteria:
LAN: Select whether to search for devices using TCP or UDP protocols. When
you select TCP, you can specify an IP address range, the type of device you are
searching for (BioStation/X-Station/BioStation T2/FaceStation: 1470, BioEntry
Plus/BioEntry W/BioLite Net/Xpass/Xpass S2: 1471, BioStation A2/BioStation
2/BioStation L2/BioEntry W2: 51212 or Custom: enter manually), and the port to
search with. If you select UDP, you can search for devices only in the same
subnet.
Serial: Specify a COM port (or select All port) and a baud rate. You can connect
up to 31 devices per COM port via RS485. If the RS485 cable is too long, the
signal may be weakened. In this case, you should install a terminating resistance
at both ends of the bus by turning on the Dip Switch on your device for normal
signal transmission. On the other hand, if the cable is too short, the resistance
may interrupt signal transmission. Therefore, by considering the length of the
cable and the signal status, select whether to turn on or off the terminating
resistance switch.
Note: The RS485 mode setting is different between a 1.x device and a 2.x device. Disable,
Host, Slave and PC Connection can be used for a 1.x device, and Default, Host, and Slave
can be used for a 2.x device.
If Default is set as the RS485 mode for a 2.x device, one door can be configured with one
device. In order to configure one door with two devices such as the Anti-passback zone,
the RS485 mode should be changed to Host or Slave.
Also, when a device whose Default is set as the RS485 mode is connected to the host
device using a RS485 cable, it can be searched as a slave device in the BioStar.
6. Click Next.
7. When BioStar completes the search, you can specify network settings as described
below. Click a device name in the list on the left and then configure the settings as
required:
Note: If you change the network settings for a device at this point, the device will be
removed from the device list. To add the device in the following steps, you must search for
the device again.
You need not and should not add devices with server mode. The devices will connect to the
server by themselves, and will be listed under the BioStar Server on the Device Tree dialog
box. If you are trying to add devices with server mode, the process will fail.
DHCP or Static IP: If you choose to use the DHCP option, the device will
automatically acquire network settings from the DHCP server. If you do not use
DHCP, you must configure the network settings manually.
Direct connection: This is the default connection option. With this option, the
BioStar client will connect directly to the device. If you choose this type of
connection, the BioStar client must be running to retrieve the log records from
the device.
Server connection: If you choose this option, the device will automatically
connect to the BioStar server. If you configure the server IP address and port
correctly, log records from the device will be gathered at the server, regardless of
whether or not the BioStar client is online. This option may also be useful if your
network configuration requires you to connect devices with private IP addresses
(for example, over a WAN) to a server with a public IP address. This option also
provides SSL encryption for BioStation devices.
8. Click Next.
9. Select the device or devices to add by clicking the checkboxes next to the device IDs.
This feature also allows for controlling elevator (lift) access with BioEntry Plus, Xpass and
Xpass S2 devices that are connected to LIFT I/O devices.
If your configuration includes slave devices, you must perform an additional search to
locate and add those devices.
First, configure the host device:
1. Search for and add the host device as described in section 3.2.1.
2. Click Device in the shortcut pane.
3. In the navigation pane, click the host device.
4. In the device pane, click the Network tab.
5. Change the RS485 serial setting by selecting Host from the Mode drop-down list.
6. Click Apply to save the change.
Next, search for and add slave devices:
1. In the navigation pane, right-click the host device and click Add Device (Serial). This
will open the Search and Add Device dialog box.
To add an RF device:
1. Connect the RF device to a Suprema device.
2. Ensure that the Suprema device is added to the BioStar system (see section 3.2.1).
3. Click Device in the shortcut pane.
4. In the navigation pane, click the Suprema device name.
5. Click the Wiegand tab and specify Wiegand settings as described below.
5. To apply the same settings to other devices, click Apply to Others and select other
devices from the Device Tree dialog box.
Black List: Use this tab to block access through a particular card, e.g. a card
which has been stolen or used by a former employee. You can use this feature
only when the card mode of the device is set to 'Template on Card'. Adding a
user ID or card ID denies access from the users with the matching ID or card.
Command Card: Use this tab to issue command cards that can control BioEntry
Plus or BioEntry W devices. For more information about issuing command cards,
see section 3.2.6.1.
Display/Sound: Use this tab to configure LED & Buzzer settings according to the
event or status.
Wiegand: Use this tab to configure the Wiegand format. For more information
about Wiegand formats, see section 3.1.16.
4. When you are finished configuring the device, click Apply to save your changes.
5. To apply the same settings to other devices, click Apply to Others and select other
devices from the Device Tree dialog box.
5. To apply the same settings to other devices, click Apply to Others, select other
devices from the Device Tree dialog box, and click Apply.
Display/Sound: Use this tab to configure LED & Buzzer according to the event or
status.
Wiegand: Use this tab to configure the Wiegand format. For more information
about Wiegand formats, see section 3.2.16.
4. When you are finished configuring the device, click Apply to save your changes.
5. To apply the same settings to other devices, click Apply to Others, select other
devices from the Device Tree dialog box, and click Apply.
2. Double-click a device name in the navigation pane. This will open a Device pane
similar to the one below:
4. When you are finished configuring the device, click Apply to save your changes.
5. To apply the same settings to other devices, click Apply to Others and select other
devices from the Device Tree dialog box.
Interphone: Use this tab to set the device to act as an interphone which allows
communication between people on either side of the door.
Input: Use this tab to add, modify, or delete input settings for the device.
Output: Use this tab to add, modify, or delete output settings for the device.
Black List: Use this tab to block access through a particular card, e.g. a card
which has been stolen or used by a former employee. You can use this feature
only when the card mode of the device is set to 'Template on Card'. Adding a
user ID or card ID denies access from the users with the matching ID or card.
Display/Sound: Use this tab to adjust display or sound settings and add
background images and sounds.
T&A: Use this tab to configure time and attendance settings.
Wiegand: Use this tab to configure the Wiegand format. For more information
about Wiegand formats, see section 3.2.16.
4. When you are finished configuring the device, click Apply to save your changes.
5. To apply the same settings to other devices, click Apply to Others and select other
devices from the Device Tree dialog box.
Display/Sound: Use this tab to adjust display or sound settings and add
background images and sounds.
T&A: Use this tab to configure time and attendance settings.
Wiegand: Use this tab to configure the Wiegand format. For more information
about Wiegand formats, see section 3.2.163.2.16.
4. When you are finished configuring the device, click Apply to save your changes.
5. To apply the same settings to other devices, click Apply to Others and select other
devices from the Device Tree dialog box.
Access Control: Use this tab to specify entrance limits and default access
groups for an individual device.
Interphone: Use this tab to set the device to act as an interphone which allows
communication between people on either side of the door.
Input: Use this tab to add, modify, or delete input settings for the device.
Black List: Use this tab to block access through a particular card, e.g. a card
which has been stolen or used by a former employee. You can use this feature
only when the card mode of the device is set to 'Template on Card'. Adding a
user ID or card ID denies access from the users with the matching ID or card.
Display/Sound: Use this tab to adjust display or sound settings and add
background images and sounds.
T&A: Use this tab to configure time and attendance settings.
Wiegand: Use this tab to configure the Wiegand format. For more information
about Wiegand formats, see section 3.2.16.
4. When you are finished configuring the device, click Apply to save your changes.
5. To apply the same settings to other devices, click Apply to Others and select other
devices from the Device Tree dialog box.
5. To apply the same settings to other devices, click Apply to Others and select other
devices from the Device Tree dialog box.
only when the card mode of the device is set to 'Template on Card'. Adding a
user ID or card ID denies access from the users with the matching ID or card.
Display/Sound: Use this tab to adjust display or sound settings and add
background images and sounds.
T&A: Use this tab to configure time and attendance settings.
Wiegand: Use this tab to configure the Wiegand format. For more information
about Wiegand formats, see section 3.2.16.
4. When you are finished configuring the device, click Apply to save your changes.
5. To apply the same settings to other devices, click Apply to Others and select other
devices from the Device Tree dialog box.
Network: Use this tab to specify settings for LAN or serial connections.
Access Control: Use this tab to specify entrance limits and default access
groups for an individual device.
Interphone: Use this tab to set the device to act as an interphone which allows
communication between people on either side of the door.
Input: Use this tab to add, modify, or delete input settings for the device.
Black List: Use this tab to block access through a particular card, e.g. a card
which has been stolen or used by a former employee. You can use this feature
only when the card mode of the device is set to 'Template on Card'. Adding a
user ID or card ID denies access from the users with the matching ID or card.
Display/Sound: Use this tab to configure LED & Buzzer settings according to the
event or status.
T&A: Use this tab to configure time and attendance settings.
Wiegand: Use this tab to configure the Wiegand format. For more information
about Wiegand formats, see section 3.2.16.
4. When you are finished configuring the device, click Apply to save your changes.
5. To apply the same settings to other devices, click Apply to Others and select other
devices from the Device Tree dialog box.
4. Click Change Format. This will open the Wiegand Configuration wizard.
5. Click a option button to select one of the following formats:
26-bit Standard: This format is the most widely used and consists of an 8-bit FC
code and a 16-bit ID. You cannot change the bit definition of the format or the
parity bits of this format.
Pass-through: Use this format to customize only the ID bits. During verification,
if the ID is recognized, the Wiegand input string will pass through in its original
form. You cannot set the parity bits or alternative values of this format. By
definition, the pass-through format is useful only when the operation mode is
one-to-one (1: 1). In one-to-many (1: N) mode, non-ID bits are set to 0. Pass-
through is not supported for BioStation 2, BioStation A2, BioStation L2 and
BioEntry W2.
Custom: With a custom format, you can define the ID bits, parity bits, and
alternative values.
6. Use the Wiegand Configuration wizard to customize the Wiegand format to your
specifications (see the subsections that follow for more information).
7. When you have completed making changes with the wizard, click Apply to save your
changes.
1. After selecting the format in the wizard, click Next until you reach the
Alternative Value dialog box.
1. After selecting the format in the wizard, click Next to advance to the
Wiegand Configuration - Format dialog box.
10. As necessary, click >> and select the bits that will be used to calculate
additional parity bits. You must perform this step for each parity bit you
assigned in steps 4 and 5. If necessary, you can click Initialize to reset the
selection.
11. Click Next.
12. In the Wiegand Configuration - Alternative Value dialog box, select a field to
customize (non-ID bits only).
13. Click the Alt Value checkbox and enter a new value for the output string.
14. Repeat steps 10-11 as necessary to customize the rest of the output string.
15. Click Finish to close the wizard.
!
Attention: A 2.x device (BioStation A2, BioStation 2, BioStation L2, BioEntry W2) cannot
configure the door together with a 1.x device (BioStation, BioEntry Plus, BioEntry W,
BioLite Net, Xpass, Xpass S2, X-Station, BioStation T2, FaceStation).
3. Select a device from the Device Tree dialog box by clicking the checkbox next to a
device name.
4. Click OK.
3. Configure door information on the following tabs. For an explanation of door settings,
see section 5.2.
Details: Use this tab to control the interaction between doors, devices, locks, and
exit buttons. If you add two devices to a door, you can also use this tab to
configure anti-passback settings.
Alarm: Use this tab to specify what actions to take when the door is forced open
or held open.
Zone: Use this tab to see the zones associated with a door.
Access Control: Use this tab to see the access groups associated with a door.
Event: Use this tab to retrieve and monitor an event log for the door.
4. When you are finished configuring the device, click Apply to save your changes.
4. Click OK.
Supported by latest regular firmware among Xpass and BioEntry Plus supporting
LIFT IO.
Note: Supported Firmware Versions: BioEntry Plus 1.6, Xpass 1.3
Output: This field lists the avaialble outputs of the LIFT I/O device.
Floor: Use this tab to see the zones associated with a door.
Not Use: Select the checkbox when you do not use the output port of the LIFT I/O
device. Clear the checkbox to control aceess to floors by associating outputs
with floors.
4. When you are finished configuring the elevator, click Apply to save your changes.
!
Attention: When using BioEntry Plus, Xpass or Xpass S2 devices as lift readers,
transferring settings to the device with the User menu will reset all of the settings and
user data stored on the device. To preserve the settings, use the Transfer to Device
function in the Lift menu instead.
2. Click Transfer to Device in the task pane. This will open the Lift Tree dialog box.
3. In the lift tree, select a device or devices by clicking the checkboxes next to device
names.
4. Click Apply to send the elevator settings to the selected devices.
!
Attention: A 2.x device (BioStation A2, BioStation 2, BioStation L2, BioEntry W2) cannot
configure a zone together with a 1.x device (BioStation, BioEntry Plus, BioEntry W, BioLite
Net, Xpass, Xpass S2, X-Station, BioStation T2, FaceStation). Also, BioStation A2,
BioStation 2, BioStation L2 and BioEntry W2 can configure only an anti-passback zone
and a fire alarm zone.
Anti-passback zone: Use this zone to prevent a user from passing his or her card back
to another person or using his or her fingerprint to allow someone else to gain entry.
The zone supports two types of anti-passback restrictions: soft and hard. When a user
violates the anti-passback protocol, the soft restriction will record the action in the
user's log. The hard restriction will deny access and record the event in the log when
the anti-passback protocol is violated. For information about customizing anti-
passback zones, see section 5.3.1.
Entrance limit zone: Use this zone to restrict the number of times a user can enter an
area. The entrance limit can be tied to a timezone, so that a user is restricted to a
maximum number of entries during a specified time span. You can also set time limits
for reentry to enforce a timed anti-passback restriction. For information about
customizing entrance limit zones, see section 5.3.2.
Alarm zone: Use this zone to group inputs from multiple devices into a single alarm
zone. Devices in the alarm zone can be simultaneously armed or disarmed via an arm
or disarm card or a key. For more information about configuring alarm zones, see
sections 3.5.2.4, 3.5.2.5, 3.5.2.6 and 5.3.3.
Fire alarm zone: Use this zone to control how doors will respond during a fire. External
inputs can be fed into the BioStar system to automatically trigger door releases or
perform other actions. For more information about customizing fire alarm zones, see
section 5.3.4.
Muster zone: Use this zone to monitor and track employees during an emergency or to
perform a “roll call” where employees are required to be present in a particular area at
a particular time. Muster zone allows administrators to determine if any employee has
not reported to the muster area and, if any employee is unaccounted for, take the
necessary actions to locate them. For more information about customizing muster
zone, see section 5.3.6.
Interlock zone: Use this zone to create an interlock area with two doors equipped with
devices. When an external input indicates that one door is open, the other door is
automatically locked to provide a secure interlock area. A reader-equipped door that
does not belong to any other zone can be used to create up to four interlock zones
(four zones maximum per reader). For more information about configuring an interlock
zone, see section 5.3.7.
!
Attention: BioStation A2, BioStation 2, BioStation L2 and BioEntry W2 can
configure only an anti-passback zone and a fire alarm zone.
4. Select a device (or multiple devices) from the list and click >.
Anti-passback zones: When the Select Zone Attribute pop-up appears,
select an attribute from the drop-down list (In Device or Out Device).
Alarm zones: When the Select Zone Attribute/Type pop-up appears,
select a device attribute from the drop-down list (General, Arm, Disarm,
or Arm/Disarm). If you select an arm or disarm attribute (or Arm/Disarm),
click the Card or Key option button to specify how to arm or disarm
zones, and then press OK. For more information about arming or
disarming zones, see section 3.5.2.5.
5. Press Save to add the devices to the list.
3. Click a device name in the list on the left to display zone information
contained in the device.
Yellow: Indicates that the configuration data in both the device and the
server are identical.
Red: Indicates that the configuration data in the device and the server are
different.
Green: Indicates that the configuration data are stored to the device only.
Blue: Indicates that the configuration data are stored to the server only.
4. Optional: To delete all zones from the device, select a device and click Delete
all zone in the lower-right corner of the screen.
To configure inputs:
1. Click Doors in the shortcut pane.
2. In the navigation pane, click the name of a zone.
3. In the Zone tab, at the bottom of the Device List, click Add Input. This will
open the Add Zone Input dialog box.
following options for all zones except access zones. For more information about
alarms, see sections 3.5.2.5 and 3.10.
Program Sound: Set a sound to be emitted by the software (at the host
computer or BioStar Server). To add custom sounds, please see section
3.10.1.2.
Device Sound: Set a sound to be emitted by a particular device.
Send Email: Create an email alert to send when an alarm is activated and
select recipients or email alerts. For more information about email alerts,
see section 3.10.2.
Output Device: Specify a device that will send an alarm signal to an external
device, such as an alarm siren.
Output Port: Specify the port to use for an output signal.
Output Signal: Specify a type of output signal.
!
Attention: BioStation A2, BioStation 2, BioStation L2 and BioEntry W2 can
configure only an anti-passback zone and a fire alarm zone.
Date of Birth: Select the user's date of birth from the drop-down calendar.
Note: You can add a photo of the user or a private message by clicking Modify Private
Information.
4. Register fingerprints (see section 3.6.2), face images (see section 3.6.3), and access
cards (see section 3.6.4) as necessary.
5. When you are finished adding details to the user’s account, click Apply.
!
Attention: A fingerprint cannot be registered with a 2.x device connected as a
slave device.
Candidates should be educated about what occurs when the duress finger
is used (e.g., the duress finger may trigger automatic door locks or silent
alarms).
To register fingerprints:
1. Click User in the shortcut pane.
2. In the navigation pane, click a user’s name.
3. Click the Fingerprints tab in the User pane.
4. Select the device you will use for scanning fingerprints from the Enroll Device
drop-down list.
5. Select a security level from the 1:1 Security Level drop-down list.
6. Specify any of the following options, as desifred:
Enroll Quality: Set the quality of fingerprints to be enrolled to increase
authentification efficiency. The quality of a fingerprint is determined by
multiple factors incluing data on its minutiae distribution. You can
specify four values (20, 40, 60, 80) and selecting the higher numbers will
improve the quality of a fingerprint but can reduce the chances of a
fingerprint being enrolled. Please note that this option is only avaiable on
BioStar Standard Edition.
Show Fingerprint Image: Specify whether to display a fingerprint image
on the screen. Fingerprint images are not saved in the database of
BioStar server and you can only save individual images on your PC if
necessary.
7. Click Add at the bottom right of the User pane to create an empty slot for
registering a fingerprint.
8. In an empty finger slot, press Scan and then have the user place his or her
finger on the scanner twice, as prompted by the BioStar interface.
9. If desired, click the checkbox next to the Duress option to set this fingerprint
as the duress signal.
10. Repeat steps 6-8 to register the rest of fingerprints.
11. Click Apply to save your changes.
12. Validate the submitted fingerprints by clicking either one or both of the
following two options:
Verification Test: Compare a newly-scanned fingerprint to only the stored
fingerprint templated collected from a prior enrollment.
1: N Auth Test: Match a newly-scanned fingerprint against multiple
fingerprint templates stored in the server.
4. Select the Enrollment Device you will use for capturing face images from the drop-
down list.
5. Click Add at the bottom right of the screen to add face(from the 1st Face to the 5th
Face).
Note: FaceStation supports up to 5 different user faces to ensure the most accurate face
detection at all times, regardless of the different hair styles, make-ups or eye glasses the
user might wear.
6. Click the newly added face, click Capture, then follow the instructions prompted by the
enrollment device. Repeat steps 5~6 to add more faces.
7. Click Use Profile Img to use the currently registered and selected face image as the
user’s profile image in the User pane.
8. Click Apply to save your changes.
4. Select the enrollment device you will use for capturing face images from the drop-
down list.
5. In the 1st Face section, click Capture, and then have the user align his or her face with
the camera, as prompted by the device.
6. If desired, click Use Profile Img to use the image assigned to the user’s profile instead
of capturing a new image.
7. Repeat steps 5-7 in the 2nd Face and 3rd Face sections to capture additional face
images.
8. Click Apply to save your changes.
EM4100 and HID cards require only a card ID to complete card registration, while MIFARE
and iCLASS cards support two operation modes: Card Serial Number (CSN) and Template-
on-Card modes. FeliCa cards support only the CSN mode. When using the CSN mode, you
can read the serial number just as you would for an EM4100 or HID card. When using
Template-on-Card mode, you must record the user information, including fingerprint
templates, directly to the card.
Follow the procedures below to issue the appropriate type of card and then add it to the
user's account.
Note: Only one card can be issued and used for BioStation 2, BioStation A2, BioStation L2
!
or BioEntry W2.
Attention: A card cannot be issued with a 2.x device connected as a slave device.
6. Select a device or Smart Card Reader from the Device ID drop-down list.
7. Enter a card ID and custom ID either manually or by reading from the card
(you can also click Use User ID to insert the user’s ID in these fields):
To enter the data manually, type the card ID and custom ID in the
corresponding fields, click OK, and then skip to step 8.
To read the data from the card, click Read Card (the LED on the device
you selected will begin flashing) and then place the card on the device.
After the card has been read, click OK.
8. Click Apply to save the card to the user's account.
7. Enter a card ID either manually or by reading from the card (you can also
click Use User ID to insert the user’s ID in these fields):
To enter the data manually, type the ID and facility code in the
corresponding fields, click OK, and then skip to step 8.
To read the data from the card, click Read Card (the LED on the device
you selected will begin flashing) and then place the card on the device.
After the card has been read, click OK.
8. Click Apply to issue the card to the user's account.
!
Attention: DESFire template cards can be issued with a 2.x device only.
6. Select a Device ID or USB MIFARE device (if connected) from the drop-down
list.
7. If desired, click Bypass Card to allow the user to bypass the fingerprint
authentication.
8. Click Read Card. The LED on the device that you selected will begin flashing.
9. Place the card on the device.
10. After the card is read, click OK.
11. Click Apply to issue the card to the user's account.
Note: iCLASS 2000, 2002 and 2004 cards are not supported as template cards.
!
Attention: Use numbers for the site key.
Attention: DESFire site keys can be applied to only 2.x devices.
Note: When all cards have been rewritten with the new site key, Suprema advises
disabling the secondary key function to prevent old cards from being used for
access.
2. Use the drop-down lists and input fields to configure the following
parameters of the MIFARE layout:
CIS Index Block: Select the block index to use for header information (4,
8, 12, or 16).
Number of Templates: Select the number of templates to include in the
layout (0 to 4).
Template Size: Select the number of bytes to use in the template. The
default size is 334 bytes.
Template 1-4 Start Block: Enter the starting block for each fingerprint
template.
3. To use the custom layout, click Apply to Devices and select the appropriate
device numbers from the Device Tree dialog box.
4. To save your changes, click Save.
Note: To reset any changes you have made, click Default. To exit the dialog box
without saving changes, click Close.
Note: To reset any changes you have made, click Default. To exit the dialog box
without saving changes, click Close.
BioEntry Plus iCLASS devices support 16k bit (2k Byte) and 32k bit (4k Byte)
iCLASS cards. The 16k bit (2k Byte) cards are available with either 2 or 16
application areas and are organized into 237 blocks of 8 bytes each. The 32k bit
(4k Byte) cards are available with either 2 or 16 application areas, plus an
additional 16k user configurable memory, and are organized into 8 pages with 26
blocks of 8 bytes each.
3. Select a device or devices from the list on the left by clicking the checkboxes
next to device names.
4. If desired, click the checkbox to overwrite users with different information.
5. Click Transfer to Device to send the user information to the selected devices.
Note: You can also delete users from devices with this menu. This action cannot
be undone, so use this feature with caution. To delete users from a device, click a
user’s name and then click Delete Users.
When using Xpass or Xpass S2 devices as lift readers, transferring settings to the
device with the User menu will reset all of the settings and user data stored on the
device. To preserve the settings, use the Transfer to Device function in the Lift
menu instead.
3. Click a device name in the list on the left to display user templates contained
in the device.
4. Click a user in the Template Information list (new users will be highlighted in
yellow).
5. Click Get From Device.
Note: You can also delete users from devices with this menu. This action cannot
be undone, so use this feature with caution. To delete users from a device, click a
user’s name and then click Delete (or click Delete All to delete all user records at
once).
In the template information, “Template Num” is the number of fingerprint
templates stored in the device and “Face Num” is the number of face templates
stored in the device.
!
Caution: If there are the same users on the BioStar database when you retrieve
user data from Xpass devices, the data will be overwritten without fingerprint
data because Xpass devices do not store fingerprint data.
!
Caution: Department information and PIN cannot be imported when importing
user information saved in BioStation 2, BioStation A2 or BioStation L2.
Password
4. Click the device name in the device list on the left and display user information in the
device.
5. With color information, compare user data between the device and server and select
users.
6. Click Get from Device.
Note You can use Personal Information Encryption without encryption keys. Any
combination of letters, numbers and special characters up to 32 characters can be used as
the encryption key.
5. Click Change to close the window then click Save to save changes.
5. If desired, you can add up to two holiday schedules to the timezone. To create holiday
schedules, see section 3.7.2.
6. When you are finished creating the timezone, click Apply.
7. Next, transfer the timezone data to devices:
8. In the task pane, click Transfer to Device. This will open the Device Tree dialog box.
9. Select a device or devices by clicking the checkboxes in the Device Tree dialog box.
10. Click OK.
You can now combine the timezone with door permissions to create an access group (see
section 3.8).
5. If the holiday recurs every year, click the checkbox below the drop-down list.
6. Set the duration of the holiday (in days).
7. Click Add to add the holiday to the list.
8. Click Apply.
5. Select doors to add to the group by clicking the checkboxes next to door groups or
individual doors.
6. Select a timezone to apply to the group from the drop-down list at the bottom of the
dialog box.
7. Repeat steps 5 and 6 as necessary to add multiple sets of doors and timezones to the
access group.
8. Click OK to add your selections to the group.
4. Click OK.
If you have setup user groups, users will appear under their respective groups.
4. Click Add. This will open the User Access Group dialog box.
5. Click the name of an access group from the list on the left and then click >.
6. Repeat step 5 as needed to assign additional access groups.
7. When you are finished assigning access groups, click OK.
who check out within the grace period will be considered to checked out right
at the end of the time slot.
- Rounding (In): Specify in minutes how to round a user’s check-in time (for
example, a entry of “5” will round a user’s time to the nearest 5-minute
decrement).
- Rounding (Out): Specify in minutes how to round a user’s check-out time (for
example, an entry of “5” will round a user’s time to the nearest 5-minute
decrement).
- Auto Check IN: Enable or disable this feature to automatically check-in a user
who has failed to check-in for the time slot.
- Auto Check OUT: Enable or disable this feature to automatically check-out a
user who has failed to check-out for the time slot.
- Affect Result: Allow or disallow data from this time slot to be used to
determine overall time and attendance result per one daily schedule.
c. Click Add to add the time slot to the daily schedule.
6. Click Apply to save the daily schedule.
3. Click one of the option buttons to set the shift as a part of a daily or weekly cycle. If
you select “weekly,” a calendar week will constitute a cycle. If you select “daily,” you
can specify any number of consecutive days (e.g., 5, 10, or 20 days) to constitute a
cycle.
Note: Daily cycle is available only with the Standard Edition of BioStar.
6. Click the ellipsis button (...) to select a daily schedule. This will open the T&A Tree
dialog box. See section 3.9.2 to define the daily schedules that will appear in this
dialog box.
7. Select a daily schedule and click OK to apply the daily schedule to the shift.
8. Repeat steps 5-7 as needed.
Note: You can copy a schedule from one day to the next by clicking the arrow to the right of
the day. In addition, you can add up to 1,024 daily schedules to the list.
4. Click the option button next to Shift Management and then click Add at the bottom of
the User pane. This will open the T&A Tree dialog box.
To assign multiple users to a shift via the Time and Attendance pane:
1. Click Time and Attendance in the shortcut pane.
2. In the navigation pane, click a shift name.
3. In the Shift pane, click the User tab and then click Add at the bottom of the pane. This
will open the Add New User dialog box.
3. In the User tree pan, click the user that you want to add a T&A rule for.
4. Among the Shift Management, Holiday Rules Management, and Leave Management,
select the appropriate option button to add a type of the schedule that you want to
add, and then click Add in the bottom of the screen.
5. Specify the details of the schedule that you want to add, and then click OK.
6. Optional: To override the existing shift schedules, select the Shift Override
Management option button, and then click Add in the bottom of the screen.
Note: This overriden schedules are only supported for Daily Report and Individual
Report when reports are created. Also, please note that they will be maintained when
you choose the ‘Rebuild’ option, and will not be deleted even if you choose the
‘Rebuild All’ option.
Overriden shift schedules: Preferential shift rules which are temporarily applied
7. Specify the shift that you want to override and its period, and then click OK.
8. In the bottom of the screen, click Apply to make changes.
Select and deselect with >, >> or <, <<, and check selected devices and unselected devices
through the panel. Manual Add can be made through direct device ID and name input when
a device is no longer able to be found from the server but used before.
2. Select a priority level from the drop-down list and click Add. This will open a
list of events.
3. Select the events to include in the priority level and click OK.
4. Select an action or actions by clicking the checkboxes on the right.
Program Sound: Choose a sound from the drop-down list and then
specify the duration (“play count”) of the sound in seconds. If you set the
Play Count to 0, the specified sound will play until someone with
administrative privileges manually stops the sound via the Realtime
Monitoring tab in the Monitoring pane. To add custom sounds to the list,
please see section 3.10.1.2.
Send Email: Click the ellipsis button (…) to the right to select an email
recipient. To configure email notifications, please see section 3.10.2.
Acknowledge: Activate pop-up alerts on client PCs.
Color: Specify the color of text and background on any event raised by
priority in the Alert Window.
5. Repeat steps 2-4 as desired to customize other priority levels.
6. When you are finished, click Save.
2. Type the email address, SMTP server, port number, SMTP ID, and SMTP password in
the Sender Info section, then choose one of the options(NO SECURITY, TLS or SSL) in
the Security Type drop-down list.
3. Type the email address in the Recipient Info section.
4. Click Add to add the configuration to the list.
5. Repeat steps 2-4 as necessary to add other email configurations.
6. When you are finished, click Save.
E-mail setting
Using Alarm setting, you can send an e-mail with user-customized format.
1. Click Option > Event > Alarm Setting > Send Email > The “…” button, then the Admin &
Contents window will open.
2. Click the “Setup” button and the “Email Setting” window will open.
3. Fill in “Sender Info” and click the “Add” button.
To configure outputs:
1. Click Device in the shortcut pane.
2. In the navigation pane, click a device name.
3. In the Device pane, click the Output tab.
4. Click Add at the bottom of the pane. This will open the Output Setting dialog
box.
5. Configure actions that will activate (send a signal to) a specified output relay:
a. In the Alarm On Event section, select an event from the first drop-down
list.
b. Select the device number or All Device from the second drop-down list.
c. Select a signal setting from the third drop-down list.
d. Enter a priority for the event. Only an event with an equal or higher
priority (1 is the highest) can override a previous event. For example, an
alarm on (activate) event with a priority of 2 can be canceled only by an
alarm off (deactivate) event with a priority of 1 or 2.
e. Click Add.
6. Configure actions that will turn off (stop sending a signal to) an activated
output relay:
a. In the Alarm Off Event section, select an event from the first drop-down
list.
b. Select the device number or All Device from the second drop-down list.
c. Enter a priority for the event.
d. Click Add.
7. When you are finished, click Save.
To configure inputs:
1. Click Device in the shortcut pane.
2. In the navigation pane, click a device name.
3. In the Device pane, click the Input tab.
4. Click Add at the bottom of the pane. This will open the Input Setting dialog
box.
3. In the Task pane, click Add New Camera Server. This will open a Camera (Setup Mode)
pane similar to the one below.
4. In the Basic Information section, enter a name, type, model, IP address, and port
number for the NVR server, and then enter the BioStar user name and password
required to access the NVR server.
5. Click Detect to view cameras that are currently connected to the NVR server.
6. Click Apply at the bottom right of the Camera (Setup Mode) pane. This will add the
detected cameras under the NVR server in the navigation pane, as illustrated below.
7. In the navigation pane, click a camera name. This will open the Camera (Setup Mode)
pane.
8. Click Add at the bottom right of the Device List to open the Device Tree dialog box.
4. In the Basic Information section, enter a name, type, model, IP address, and port
number for the IP camera and enter a user name and password for the BioStar to
acess the IP camera.
5. In the Details tab, click Add at the bottom right of the Device List section to open the
Device Tree dialog box.
Once you have properly set up the BioStar system, management is fairly simple. BioStar allows you
to monitor events in real-time and view event logs by date, control parts of the system remotely,
manage users, and upgrade device firmware directly from the BioStar interface. In addition, you can
activate fingerprint encryption, if necessary, to provide an additional level of security and privacy.
This tab shows all events that have occurred since you last logged into the system.
The tab shows the current monitoring status (Monitoring Started or Monitoring
Paused) and includes buttons for starting (play) or stopping (pause) real-time
monitoring. The sound bar icon on the right shows whether an alarm sound is
currently playing (green bars) or not (grey bars). To stop an alarm sound, click the
sound bars icon.
BioStar displays the following camera icons at the front of the event logs:
Icon Description
The event log includes a still image. Click the event log to view the
image.
The event log includes a video. Double-click the event log to view the
video.
When both camera icons are displayed, single-click the icon to view the still image and
double-click the icon to view the recorded video. When you double-click the video icon, a
video playback window will appear that is similar to the one below.
Coupled with the face detection features of X-Station, BioStation T2, FaceStation, or
BioStation A2, administrators can verify users’ identity by clicking Show Image (to view the
user’s stored face image) and Auto Image Reflect (to view the most recent face image
captured by the local device). Clicking Show Image also opens a window at the bottom
where the user image will be displayed. Click Real Size to view the full-sized (640 x 480)
stored image, instead of a thumbnail version and click Show Popup to open the image in a
new window that can be repositioned on the screen.
To see a users’ photos upon successful authentication events, click Option > Event >
Profile Image Setting in the menu bar, select event types, and then click the checkbox next
to Show Image Profile. The user’s image will appear on the realtime monitoring tab when
he or she successfully completes one of the authentication events specified in the Profile
Image Setting dialog box.
As of BioStar V1.3, administrators can monitor users’ locations and authentication status
via a Roll Call (muster) feature. This feature allows administrators to determine whether
users are present, missing, or have gained entry to areas for which they are not authorized.
To save the report data as a comma delimited file, click Save as CSV. To print the report,
click the printer icon. To export the report, click the export icon.
6. Click Get Log. This will generate a list of the relevant events for the period you
specified.
9. Click and drag the door icon to the desired location on the floor plan. You can
individually relocate a door icon or name by double-clicking the door icon or name.
10. To remove a door from the floor plan, click the door and then click Remove Door.
11. Repeat steps 7-10 as necessary to add additional doors.
12. When you are finished adding doors, click Apply.
Note: To remove all doors from the plan and start over, click Reset.
To monitor doors:
1. In the task pane, click Monitor Visual Map. “Monitor Mode” will appear in the title bar
of the Visual Map window.
2. Monitor door status and activities on the visual map, as represented by the following
icons. Door activities, such as successful authentication or alarms will appear on the
door icons:
Icon Activity
Door is open
Note: Door icons will change only when door sensors have been assigned in the door
settigns and detect the door status. In other words, door icons change only when the door
actually opens or closes and not when you click Open Door or Close door. For more
information about door settings, see section 5.2.1.
3. To open or close a door, click a door and then click Open Door or Close Door. To
change settings for a door, click a door and then click Setup Door.
4. The current relay status can be checked through Visual Map in Monitoring.
5. Show Event Tooltip for Selected Door option is added to indicate the details of the
current door status.
6. Event or door name font size can be enlarged or reduced by selecting font size in
Setup Visual Map and Monitor Visual.
To release alarms:
1. Click Monitoring in the shortcut pane.
2. The Door/Zone Monitoring tab lists doors names and alarm events. To release
(cancel) an alarm, click the door name and then click Release Alarm.
!
Attention: 2.x devices (BioStation 2, BioStation A2, BioStation L2, BioEntry W2) do
not support this function.
2. Click the first checkbox to lock all devices when exiting BioStar.
3. If desired, click the second checkbox to change the lock password:
a. Enter the old password
b. Enter the new password
c. Retype the new password to confirm.
!
Attention: 2.x devices (BioStation 2, BioStation A2, BioStation L2, BioEntry W2) do
not support this function.
2. Click the Initialize Password checkbox to activate the buttons at the bottom
of the screen.
3. Click Get Challenge Code. This will open the Get Challenge Code dialog box.
4. Select the appropriate device from the drop-down list and click Get.
5. Click Save as File to save the challenge code to your computer.
6. Email the challenge code to Suprema ([email protected]).
Suprema’s technical support personnel will return an unlocking code to you
via email.
7. When you receive the code from Suprema, open the Auto Locking dialog box
and activate the buttons (see steps 1-2).
8. Click Unlock Device and Password to Default. This will open the Write
Challenge Code dialog box.
9. Click Open Code File and locate the file sent to you by Suprema.
When you have opened the file, click Write. This will unlock the device and reset
the locking password to the default (no password).
!
Attention: 2.x devices (BioStation 2, BioStation A2, BioStation L2, BioEntry W2) do
not support this function.
To delete a user:
1. Click User in the shortcut pane.
2. Right-click a user's name.
3. Click Delete User.
4. Click OK to confirm the deletion.
To delete users directly from a BioEntry Plus or BioEntry W device via command
cards:
1. Place a delete card (command card) on a BioEntry Plus or BioEntry W device.
2. If authorization is required, an administrator must scan his or her fingerprints
to continue.
3. Place the user's access card on the device and then have the user place his
or her finger on the scanner (as prompted by the device).
To delete users directly from an Xpass or Xpass S2 device via command cards:
1. Place a delete card (command card) on an Xpass or Xpass S2 device.
2. If authorization is required, an administrator must place his or her access
card on the device to continue.
3. Place the user's access card on the device.
4. Place the delete card on the device again to confirm the action.
To delete all users directly from a BioEntry Plus or BioEntry W device via
command cards:
1. Place a delete all card (command card) on a BioEntry Plus or BioEntry W
device.
2. If authorization is required, an administrator must scan his or her fingerprints
to continue.
3. Place the delete all card on the device again to confirm the action.
To delete all users directly from an Xpass or Xpass S2 device via command cards:
1. Place a delete all card (command card) on an Xpass or Xpass S2 device.
2. If authorization is required, an administrator must place his or her access
card on the device to continue.
3. Place the delete all card on the device again to confirm the action.
To create a department:
1. Click User in the shortcut pane.
2. In the navigation pane, right-click User that is top level of department.
3. Click Add Department.
4. Enter a name for the department.
To transfer users to a department, simply click and drag a user name onto a department
name.
Note: Up to four department levels can be created.
2. Select an order number from the first drop-down list (choose a number that
is not already in use).
3. Select a field type from the second drop-down list. To restrict the field to
numerical values, click the Only Digit checkbox.
4. Enter item data (for example, items to appear in a combo box) and a name
for the item.
5. Click Add.
6. Repeat steps 2-5 as desired to create additional information fields.
7. When you are finished, click Save.
3. Select types of user data to export by clicking items in the list on the left and then
clicking >.
4. Optional: Click Show Column Name below the selected filed list to include a field’s
column name with its data in an exported file.
5. After selecting all the types of user data to export, click Next.
6. Type a path and filename for the user data or click Browse to select a location to save
the file.
7. Click Next.
8. Click Export to begin exporting the user data.
9. When the export is complete, click Finish.
3. Type a path and filename where the user data is located or click Browse to select a
file.
4. Click Next. The raw data types will be displayed and the User list field will default to
“Not Use. Click here to change.”
5. Click the cell to the right of a data sample. This will open the Setup Field dialog box,
which allows you to map the raw data to a user information field in BioStar.
6. Map the data to a field by selecting a field label from the drop-down list and then click
OK.
Note: Up to four department levels can be displayed in BioStar. In the CSV file, include
department levels in the same cell, separated by slashes (for example, “Department
1/Department 2/Department 3”), and then map the cell to the “Department” field in BioStar.
3. Click User, a user name, or a department name in the pane on the left. This will display
the corresponding T&A status in the pane on the right.
4. To close the dialog box, click Close.
2. In the task pane, click Report. This will open the T&A Report dialog box.
Note: Click Upload Log to retrieve data from all networked devices. Click Update Report to
refresh the report with any data you have modified (see section 4.5.3).
You can sort report data by clicking any column header (the sort will toggle between
ascending and descending orders). You can also rearrange the columns by dragging and
dropping column headers in a new location. Furthermore, you can add or remove columns
by using the menu that appears when you right-click on any column header:
2. Select a period unit which regular work hours are based on, and enter the amount of
regular work corresponding to the period. The work hours that have exceeded the
regular time would be considered overtime work and reported.
3. Click OK.
Note: To successfully display overtime hours in a report, you should set the start day
of the periold to Sunday of the week that you want to check for.
3. To edit an event, change the following event properties as necessary and then click
Edit Event. To add an event, change the following event properties as necessary and
then click Add Event. To delete the event, click Delete Event.
Date: Select whether the event occurred on this day or the next day.
Event: Select the type of event.
Time: Set the time of the event.
Device: Set the device where the event occurred.
4. When you are finished modifying the event data, click the “X” in the top right corner to
close the dialog box.
5. In the T&A Report window, ensure that the “Rebuild” checkbox is NOT checked.
6. Click Update Report. The report will show the changes you have made. The changes
you have made via the detailed editing will not be restored to the original data even if
you click the check box next to “Rebuild” and click Update Report. If you want to
reproduce the report with the original data, click the checkboxes next to “Rebuild” and
“Rebuild All” and then click Update Report.
Note: You can sort report data by clicking any column header (the sort will toggle between
ascending and descending orders). You can also rearrange the columns by dragging and
dropping column headers in a new location.
1. Generate a T&A report as described in 4.5.2 and make any necessary modifications as
described in 4.5.3.
2. Click View Report. This will open a preview window similar to the one below.
2. Click the option button next to the type of device you want to upgrade.
3. Click Select Device and select a device or devices from the Device Tree dialog box.
2. Click the checkbox under “Security Option” to activate the fingerprint template
encryption.
!
Attention: The user’s fingerprint format change and encryption should be set before the
user's fingerprint is registered. If the fingerprint format changes and encryption is
carried out after the fingerprint is registered, it should be carried out after all user
settings screens are closed. In addition, if it is changed while the user settings screens are
being selected, use BioStar Client after restarting it.
Customize Settings
This section describes the settings available in the BioStar software. BioStar provides precise control
and customization of the access control system via settings for device functions, door and zone
behaviors, and user accounts.
BioStation Time
– Date: Manually set the device date with a drop-down calendar.
– Time: Manually set the device time.
– Get Host PC Time: Check this box to get the time of the local PC
which BioStar client program is installed on. The time will be
displayed in the Date and Time spin boxes right below this option and
you can set the device’s time to match this time by clicking Set
Device Time.
– Get Device Time: Get the current time displayed by the device.
– Set Device Time: Set the time on the device.
1: 1 Operation Mode: the drop-down lists in this area allow you to control the
authentication mode by schedule. For example, you can choose a normal
authentication mode for working hours and a more strict authentication
mode for hours outside the normal schedule. You can specify authentication
modes either by device or by user (see section 5.4.1). Unless a particular
mode is specified for a user, the device authentication mode will apply.
– ID/Card + Fingerprint: Set the device to require ID or card plus
fingerprint authorization (Always, Disable, or custom schedule).
– ID/Card + Password: Set the device to require ID or card plus
password authorization (Always, Disable, or custom schedule).
– ID/Card + Fingerprint/Password: Set the device to require ID or card
plus fingerprint or password authorization (Always, Disable, or
custom schedule).
– Card Only: Set the device to require only card authorization (Always,
Disable, or custom schedule).
- Use Wiegand Card Bypass: By Wiegand setting in BioStar, this feature exports
CSN regardless of whether the authentication is successful or not. This is
designed to be used as a dummy reader that doesn’t have a door control
feature. When a card data input is made, the device sends out the data
through Wiegand without going through a matching process.
Note: This feature is supported from the FW versions, BioStation 1.93,
BioStation T2 1.3, FaceStation 1.3,
BioEntry Plus 1.6, BioEntry W 1.2, BioLite Net 1.4, Xpass 1.3.
–
Fingerprint
– Security Level: Set the security level to use for fingerprint
authorization (Normal, Secure, or Most Secure). Keep in mind that as
the security level is increased, so too is the likelihood of a false
rejection.
– Image Quality: Set the strictness of the quality check for fingerprint
scans (Weak, Normal, or Strict). If a fingerprint image is below the
specified quality level, it will be rejected.
– Sensitivity: Set the sensitivity of the fingerprint scanner (0 [Min] to 7
[Max]). A higher sensitivity setting will result in more easily captured
fingerprint scans, but also increases the sensitivity to external noise.
– 1: N Delay: Set the delay between scans when identifying fingerprints
(0 sec to 10 sec). This delay prevents the scanner from processing
the same fingerprint more than once if a user has not yet removed his
or her finger from the scanner.
– 1: N Fast Mode: Set the device to use Fast Mode to reduce the
amount of time required for matching fingerprints (Auto, Normal,
Fast, or Fastest). Setting Fast Mode to Auto will adjust the matching
speed according to the number of enrolled templates.
– View Image: Set to show or hide fingerprint images on the BioStation
display (Yes or No).
– Scan Timeout: Set the length of time before the fingerprint scanner
will timeout (1 sec to 20 sec). If a user does not place a finger on the
device within the timeout period, the authorization will fail.
– Matching Timeout: Set the length of time before the device will
timeout when trying to identify a fingerprint match (0 [Infinite] to 10
sec).
– Server Matching: Enable this setting to perform fingerprint or card ID
matching at the BioStar server, instead of the device. When this mode
is enabled, the devices will send the fingerprint template or card ID to
the server to verify a match. This mode is useful when you have more
users than can be downloaded to a device or user information cannot
be distributed due to security concerns.
– Check Fake Finger: Set the device to detect the use of fake
fingerprints, such as those made from silicon or rubber, and prevent
unauthorized access.
Check Duplicate FP: Set the device to determine whether or not a scanned
fingerprint has been previously enrolled. If the device determines that a
fingerprint has been previously enrolled, the enrollment process will fail.
TCP/IP Setting
– LAN Type: Select a type of LAN connection from the drop-down list
(Disable, Ethernet, or Wireless LAN).
– Port: Specify a port to use for the device.
– WLAN: Select a preset WLAN configuration from the drop-down list.
This option is active only when WLAN is selected as the TCP/IP
setting.
– Change Setting: Click to specify settings for a wireless local area
network (WLAN). This option is active only when WLAN is selected as
the TCP/IP setting. For more information about configuring settings
for a WLAN, please see section 3.2.4.
– Use DHCP: Click this option button to enable the dynamic host
configuration protocol (DHCP) for the device.
– Not Use DHCP: Click this option button to disable the dynamic host
configuration protocol (DHCP) for this device.
– IP Address: Specify an IP address for the device.
– Subnet: Specify a subnet address for the device.
– Gateway: Specify a network gateway.
– Max Conn.: Specify the maximum number of connections to allow.
Server
– Use: Click this option button to enable the server mode.
– Not Use: Click this option button to disable server settings.
– IP Address: Specify an IP address for the BioStar server.
– Server Port: Specify the port used to connect to the server.
– SSL: Displays the status of SSL for the server connection.
– Time Sync with Server: Check this box to synchronize the device’
time with the server. The device polls for a time change on the server
every one hour and its time will be synchronized with the server when
the device’s time and the server’s time differ by more than 5 seconds.
RS485
– Mode: Set the mode for a device connected via RS485 (Disable, Host,
Slave, or PC Connection). For more information about RS485 modes,
see sections 3.2.1 and 3.2.2.
– Baudrate: Set the baud rate for a device connected via RS485 (9600
to 115200).
RS232: Set the baud rate for a device connected via RS232 (9600 to
115200).
USB Setting: Click the option buttons to enable or disable the USB port on
the BioStation device.
Device: Select the BioStation (or Secure I/O) device for which you will add or
modify settings.
Port: Select an input port (Input 0, Input 1, or Tamper). For Secure I/O
devices, these settings are available: Input 0, Input 1, Input 2, Input 3.
Switch: Click the option buttons to specify the normal position of the input
switch (N/O: normally open or N/C: normally closed).
Device Type: Select the device type for which you will add or modify
settings.
Port: Select an output port (Relay 0). For Secure I/O devices, these settings
are available: Relay 0 or Relay 1.
Alarm On Event: Specify settings and click Add to add the event to the
Alarm On Event list. These events will activate an alarm.
– Event: Select an event that will activate an alarm (Auth Success, Auth
Fail, Auth Duress, Anti-passback Fail, Access Not Granted, Entrance
Limited, Admin Auth Success, Tamper On, Door Opened, Door Close,
Forced Open Door, Held Open Door, Detect Input #1-3).
– Device: Select the device to monitor for an alarm event.
– Signal Setting: Select a signal setting that you have previously
configured from the menu bar (Option > Event > Output Port Setting).
– Priority: set a priority for the event. Only an event with an equal or
higher priority (1 is the highest) can override a previous event. For
example, an alarm on (activate) event with a priority of 2 can be
canceled only by an alarm off (deactivate) event with a priority of 1 or
2.
Alarm Off Event: Specify settings and click Add to add the event to the
Alarm Off Event list. These events will deactivate an alarm.
– Event: Select an event that will deactivate an alarm (Auth Success,
Auth Fail, Auth Duress, Anti-passback Fail, Access Not Granted,
Entrance Limited, Admin Auth Success, Tamper On, Door Opened,
Door Close, Forced Open Door, Held Open Door, or Detect Input #1-3).
– Device: Select the device to monitor for an alarm event.
– Priority: Set a priority for the event. Only an event with an equal or
higher priority (1 is the highest) can override a previous event. For
Current Count: The total number of user IDs and access cards that have
been registered.
Reserved: The remaining number of user IDs and access cards that can be
registered.
Display/Sound
– Language: Set the language to use on the display (Korean, English, or
Custom).
– Sub Info: Set the info to display at the bottom of the BioStation
display (Time, or None).
– Menu Timeout: Set the length of time before the display will return to
the idle screen (Infinite, 10 sec, 20 sec, or 30 sec).
– Private Msg: Enable or disable the option to show a private message
on the BioStation display (Disable or Enable). You can add a private
message from the Event tab in the User pane: click Modify Private
Information, set options for display count and display duration, enter
text in the Private Message field, and then click Save.
– Resource: Set the language resource file to use for the BioStar
interface (No Change, English, Korean, or Custom). To use a language
resource file other than English or Korean, select Custom and then
click the ellipsis (…) button to locate the resource file.
– Background: Set the type of background for the BioStation display
(Logo, Notice, or Slide Show). Supported file types (JPG, GIF, BMP,
and PNG) cannot exceed 320x240 pixels each. Only one image at a
time can be used as a logo or notice, while up to 16 images can be
displayed (at a set interval) in a slide show.
– Notice: Click this button to create a notice that will be shown on the
BioStation display. After creating a notice, you can click Apply to
apply the notice to the current device or Apply to Others to apply the
notice to additional devices.
Fix mode, you can click the checkbox to the right to designate a fixed
event.
– Event Caption: Enter a caption for the event.
– Auto Mode Schedule: When using the Auto Change mode, you can
specify when the event will occur by selecting a timezone in the drop-
down list. For more information on creating a timezone, please see
section 3.7.1.
– Event Type: Set the type of event to assign to the key (Not Use, Check
In, Check Out, In, or Out). In/Out indicates the general check in/out
events during a day whereas Check In/Out indicates the formal check
in/out events upon arrival and departure at work—or the first check–
in and the last check–out events on that day. When you choose
Check In or Check Out, you can enable the “Regard as normal check-
in/check-out event” option. If this option is enabled, users who
activate the appropriate keys will be regarded as arriving or leaving
on time at work even though they actually arrive late or leave early. If
you enable the “Only Result” option, they appear being on time on
T&A reports but their work time will be calculated correctly based on
their actual check in/out time. If you choose Out, you can enable the
“Add work time after this event” option. If this option is enabled, users
activating the appropriate key will be considered working for the
remainder of the time slot even if they leave the office early.
Wiegand Mode: Set the mode of Wiegand input to use when reading card ID
data (Legacy or Extended). The Legacy mode will treat connected RF
devices as part of their host devices (this is the typical function of
previous versions of BioStar). The Extended mode will allow RF card
activated, the door relay will open when other two users, regardless of
whether being a normal user or an admin user.
Note: This feature is supported from the FW versions, BioStation 1.93,
BioStation T2 1.3, FaceStation 1.3, BioEntry Plus 1.6, BioEntry W 1.2, BioLite
Net 1.4, Xpass 1.3.
- Use Wiegand Card Bypass: This feature makes the device to send out Card
CSN according to Wiegand setting of BioStar without having to conduct a
matching. This is designed to be used as a dummy reader in a connection with
a third party access control unit through Wiegand. When a card data input is
made, the device sends out the data through Wiegand without going through a
matching process.
Note: This feature is supported from the FW versions, BioStation 1.93,
BioStation T2 1.3, FaceStation 1.3, BioEntry Plus 1.6, BioEntry W 1.2,
BioLite Net 1.4, Xpass 1.3.)
– Get Host PC Time: Check this box to get the time of the local PC
which BioStar client program is installed on. The time will be
displayed in the Date and Time spin boxes right below this option and
you can set the device’s time to match this time by clicking Set
Device Time.
– Get Device Time: Get the current time displayed by the device.
– Set Device Time: Set the time on the device.
Operation Mode: For each of the following options, click the corresponding
checkbox to enable Double Verification Mode, which requires verification
of two users’ credentials to gain entry to a door.
– All: Set the device to allow all types of authorization (Always, Disable,
or custom schedule).
– Card + Fingerprint: Set the device to require card plus fingerprint
authorization (Always, Disable, or custom schedule).
– Only Fingerprint: Set the device to require only fingerprint
authorization (Always, Disable, or custom schedule).
– Only CARD: Set the device to require only card authorization (Always,
Disable, or custom schedule).
– Private Auth: Set the device to allow a private authorization method
(Disable or Enable). If enabled, the authentication mode of the user
will be determined by a user’s authorization setting (Private Auth
Mode), which is located on the Details tab in the User pane. If
disabled, the authentication mode will be determined by the
operation mode settings of the device.
– Double Verification Mode: Set the device to require verification from
two users during a selected schedule (Always, Disable, or custom
schedule).
Mifare/iCLASS (available on select models)
– Bio Entry Plus Mifare devices:
– Not Use Card: Check this box to disable MIFARE card authorization.
– Card Reading Mode: Set the type of card authorization mode (Mifare
Template or Mifare CSN only)
– View Mifare Layout: Click this button to configure the MIFARE layout
used by the device. For more information about configuring MIFARE
layouts, please see section 3.6.4.7.
Bio Entry Plus iCLASS devices:
– Not Use Card: Check this box to disable iCLASS or FeliCa card
authorization.
– Card Reading Mode: Set the type of card authorization mode (iCLASS
Template, iCLASS CSN only, or FeliCa CSN only).
– View Card Layout: Click this button to configure the iCLASS layout
used by the device. For more information about configuring iCLASS
layouts, please see section 3.6.4.7.
Card ID Format
– Format Type: Set the type of pre-processing to occur on card ID data
(Normal or Wiegand). If “Normal” is selected, the card ID data will be
processed in its original form. If “Wiegand” is selected, devices will
interpret card ID data according to the Wiegand format settings.
– Byte Order: Specify whether to swap ID card data between cards and
devices by most significant byte (MSB) or least significant byte
(LSB).
– Bit Order: Specify whether to swap ID card data between cards and
devices by most significant bit (MSB) or least significant bit (LSB).
Fingerprint
– Security Level: Set the security level to use for fingerprint
authorization (Normal, Secure, or Most Secure). Keep in mind that as
the security level is increased, so too is the likelihood of a false
rejection.
– Scan Timeout: Set the length of time before the fingerprint scanner
will timeout (1 sec to 20 sec). If a user does not place a finger on the
device within the timeout period, the authorization will fail.
– Server Matching: Enable this setting to perform fingerprint or card ID
matching at the BioStar server, instead of the device. When this mode
is enabled, the devices will send the fingerprint template or card ID to
the server to verify a match. This mode is useful when you have more
users than can be downloaded to a device or user information cannot
be distributed due to security concerns.
– 1: N Fast Mode: Set the device to use Fast Mode to reduce the
amount of time required for matching fingerprints (Auto, Normal,
Fast, or Fastest). Setting Fast Mode to Auto will adjust the matching
speed according to the number of enrolled templates.
– Matching Timeout: Set the length of time before the device will
timeout when trying to identify a fingerprint match (0 [Infinite] to 10
sec).
– Check Fake Finger: Set the device to detect the use of fake
fingerprints, such as those made from silicon or rubber, and prevent
unauthorized access.
TCP/IP
– Use DHCP: Click this option button to enable the dynamic host
configuration protocol (DHCP) for the device.
– Not Use DHCP: Click this option button to disable the dynamic host
configuration protocol (DHCP) for this device.
– IP Address: Specify an IP address for the device.
– Subnet: Specify a subnet address for the device.
– Gateway: Specify a network gateway.
– Port: Specify a port to use for the device.
Server
– Use: Click this option button to use specific server settings.
– Not Use: Click this option button to disable server settings.
– IP Address: Specify an IP address for the BioStar server.
– Time Sync with Server: Check this box to synchronize the device’
time with the server. The device polls for a time change on the server
every one hour and its time will be synchronized with the server when
the device’s time and the server’s time differ by more than 5 seconds.
Support 100 Base-T: This option allows you to enable or disable a fast
Ethernet connection for the device. When enabled, the device will detect
the Ethernet network and automatically establish the best connection. If
you do not enable this option, the device will attempt to establish a
10Base-T Ethernet connection.
– Use: Click this option button to enable the 100base-T connection for
the device.
– Not Use: Click this option button to disable the 100base-T
connection for the device.
RS485
– Mode: Set the mode for a device connected via RS485 (Disable, Host,
Slave, or PC Connection).
– Baudrate: Set the baud rate for a device connected via RS485 (9600
to 115200).
Support MTU Size setting
– Devices affiliated with Black Fin support MTU Size setting. The supported
packet size is between 1078 and 1514, and the default is 1514.
Note: This feature is supported from the FW versions, BioEntry Plus 1.6,
BioEntry W 1.2, BioLite Net 1.4, Xpass 1.3.
Device: Select the BioEntry Plus or BioEntry W (or Secure I/O) device for
which you will add or modify settings.
Port: Select an input port (Input 0, Input 1, or Tamper). For Secure I/O
devices, these settings are available: Input 0, Input 1, Input 2, Input 3.
Switch: Click the option buttons to specify the normal position of the input
switch (N/O: normally open or N/C: normally closed).
Function: Select an action to associate with the input:
– Not Use: The input port will not be monitored.
– Generic Input: The input port will be monitored for a triggering action
(events specified with “Detect Input 1-3” in the Output setting dialog
box —see section 5.1.2.6).
– Emergency Open: Open doors controlled by this device. The normal
door open period will be ignored and doors will remain open until an
operator sends a “Close Door” command via the Door/Zone
Monitoring tab (see section 4.4.1).
– Release All Alarms: Cancel alarms associated with this device.
– Restart Device: Restart the device.
– Disable Device: Disable the device. A disabled device will not
communicate with the BioStar server or process fingerprints or card
inputs. To enable communication again, an administrator must enter
the master password for a BioStation device or provide
authentication locally for a BioEntry Plus or BioEntry W device.
– With BioStar 1.8v, LED Green Input, LED Red Input, Buzzer Input, Access
Granted Input, and Access Denied Input were newly added. And these
input options are available only with BioStation (FW 1.93v), BioStation T2
(FW 1.3v), FaceStation (FW 1.3v), BioEntry Plus (FW 1.6v), BioEntry W (FW
1.2v), BioLite Net (FW 1.4v), and Xpass (FW 1.3v).
Schedule: Set the schedule for the input actions (Always, Disable, or custom
schedule).
Duration (ms): Set the duration (in milliseconds) an input signal must last to
trigger the specified action.
Device Type: Select the device type for which you will add or modify
settings.
Port: Select an output port (Relay 0). For Secure I/O devices, these settings
are available: Relay 0 or Relay 1.
Alarm On Event: Specify settings and click Add to add the event to the
Alarm On Event list. These events will activate an alarm.
– Event: Select an event that will activate an alarm (Auth Success, Auth
Fail, Auth Duress, Anti-passback Fail, Access Not Granted, Entrance
Limited, Admin Auth Success, Tamper On, Door Opened, Door Close,
Forced Open Door, Held Open Door, or Detect Input #1-3).
– Device: Select the device to monitor for an alarm event.
– Signal Setting: Select a signal setting that you have previously
configured from the menu bar (Option > Event > Output Port Setting).
– Priority: Set a priority for the event. Only an event with an equal or
higher priority (1 is the highest) can override a previous event. For
example, an alarm on (activate) event with a priority of 2 can be
Current Count: The total number of user IDs and access cards that have
been registered.
Reserved: The remaining number of user IDs and access cards that can be
registered.
Card ID: Enter the card ID or click Read Card and place a command card on
the reader to automatically populate the fields.
Command Type: Select a type of command card to issue (Enroll Card, Delete
Card, or Delete All Card).
Event: Specify the affected event by selecting it from the drop-down list.
LED: Set the LED behavior for a specified event.
– Count: Enter a number of LED cycles for the specified event. Enter “0”
to enable an infinite loop or “-1” to disable the LED.
Wiegand Mode: Set the mode of Wiegand input to use when reading card ID
data (Legacy or Extended). The Legacy mode will treat connected RF
devices as part of their host devices (this is the typical function of
previous versions of BioStar). The Extended mode will allow RF card
readers to operate independently, which allows them to be associated
with doors, included in zones, and leave logs with their own device IDs.
Wiegand Input: Assign the Wiegand input:
– Disabled: The input will not be used.
– Wiegand [Card]: The ID field of the Wiegand string is interpreted as a
card ID.
– Wiegand [User]: The ID field of the Wiegand string is interpreted as a
user ID.
Wiegand Output: Assign the Wiegand output:
– Disabled: The output will not be used.
– Wiegand [Card]: Inserts the card ID of the authenticated user in the ID
field of the Wiegand string.
– Wiegand [User]: Inserts the user ID of the authenticated user in the ID
field of the Wiegand string.
BioLiteNet Time
Fingerprint
– Security Level: Set the security level to use for fingerprint
authorization (Normal, Secure, or Most Secure). Keep in mind that as
the security level is increased, so too is the likelihood of a false
rejection.
– Scan Timeout: Set the length of time before the fingerprint scanner
will timeout (1 sec to 20 sec). If a user does not place a finger on the
device within the timeout period, the authorization will fail.
– Server Matching: Enable this setting to perform fingerprint or card ID
matching at the BioStar server, instead of the device. When this mode
is enabled, the devices will send the fingerprint template or card ID to
the server to verify a match. This mode is useful when you have more
users than can be downloaded to a device or user information cannot
be distributed due to security concerns.
– 1: N Fast Mode: Set the device to use Fast Mode to reduce the
amount of time required for matching fingerprints (Auto, Normal,
Fast, or Fastest). Setting Fast Mode to Auto will adjust the matching
speed according to the number of enrolled templates.
– Matching Timeout: Set the length of time before the device will
timeout when trying to identify a fingerprint match (0 [Infinite] to 10
sec).
– Check Fake Finger: Set the device to detect the use of fake
fingerprints, such as those made from silicon or rubber, and prevent
unauthorized access.
– Use: Click this option button to enable the 100base-T connection for
the device.
– Not Use: Click this option button to disable the 100base-T
connection for the device.
RS485
– Mode: Set the mode for a device connected via RS485 (Disable, Host,
Slave, or PC Connection).
– Baudrate: Set the baud rate for a device connected via RS485 (9600
to 115200).
Device: Select the BioLite Net (or Secure I/O) device for which you will add
or modify settings.
Port: Select an input port (Input 0, Input 1, or Tamper). For Secure I/O
devices, these settings are available: Input 0, Input 1, Input 2, Input 3.
Switch: Click the option buttons to specify the normal position of the input
switch (N/O: normally open or N/C: normally closed).
Function: Select an action to associate with the input:
– Not Use: The input port will not be monitored.
– Generic Input: The input port will be monitored for a triggering action
(For the events specified with “Detect Input 1-3” in the Output setting
dialog box, please see section 5.1.3.6).
– Emergency Open: Open doors controlled by this device. The normal
door open period will be ignored and doors will remain open until an
operator sends a “Close Door” command via the Door/Zone
Monitoring tab (see section 4.4.1).
– Release All Alarms: Cancel alarms associated with this device.
– Restart Device: Restart the device.
– Disable Device: Disable the device. A disabled device will not
communicate with the BioStar server or process fingerprints or card
inputs. To enable communication again, an administrator must enter
the master password for a BioStation device or provide
authentication locally for a BioLite Net device.
With BioStar 1.8v, LED Green Input, LED Red Input, Buzzer Input,
Access Granted Input, and Access Denied Input were newly added.
And these input options are available only with BioStation (FW 1.93v),
BioStation T2 (FW 1.3v), FaceStation (FW 1.3v), BioEntry Plus (FW
1.6v), BioEntry W (FW 1.2v), BioLite Net (FW 1.4v), and Xpass (FW
1.3v).
Schedule: Set the schedule for the input actions (Always, Disable, or custom
schedule).
Duration (ms): Set the duration (in milliseconds) an input signal must last to
trigger the specified action.
Device Type: Select the device type for which you will add or modify
settings.
Port: Select an output port (Relay 0). For Secure I/O devices, these settings
are available: Relay 0 or Relay 1.
Alarm On Event: Specify settings and click Add to add the event to the
Alarm On Event list. These events will activate an alarm.
– Event: Select an event that will activate an alarm (Auth Success, Auth
Fail, Auth Duress, Anti-passback Fail, Access Not Granted, Entrance
Limited, Admin Auth Success, Tamper On, Door Opened, Door Close,
Forced Open Door, Held Open Door, or Detect Input #1-3).
– Device: Select the device to monitor for an alarm event.
– Signal Setting: Select a signal setting that you have previously
configured from the menu bar (Option > Event > Output Port Setting).
– Priority: Set a priority for the event. Only an event with an equal or
higher priority (1 is the highest) can override a previous event. For
example, an alarm on (activate) event with a priority of 2 can be
Current Count: The total number of user IDs and access cards that have
been registered.
Reserved : The remaining number of user IDs and access cards that can be
registered.
Event: Specify the affected event by selecting it from the drop-down list.
LED: Set the LED behavior for a specified event.
– Count: Enter a number of LED cycles for the specified event. Enter “0”
to enable an infinite loop or “-1” to disable the LED.
– Colors: Specify up to three display colors from the drop-down list.
The LED will cycle through these colors in order, from top to bottom.
Next to each color, enter the duration (in milliseconds) that the LED
should display the selected color and the duration (in milliseconds)
that the LED should remain off before advancing to the next color in
the cycle.
Buzzer: Set the buzzer behavior for a specified event.
– Count: Enter a number of buzzer cycles for the specified event. Enter
“0” to enable an infinite loop or “-1” to disable the buzzer.
– Volume: Set up to three tone volumes from the drop-down list (Low,
Middle, or High). The buzzer will cycle through these volumes in
order, from top to bottom. Next to each volume, enter the duration (in
milliseconds) that the buzzer should maintain the selected volume
and the duration (in milliseconds) that the buzzer should remain off
before advancing to the next volume in the cycle.
– Fade Out: Set the tone volume to fade out before advancing to the
next volume in the cycle by clicking this checkbox.
Language: Set the language to use on the display (Korean, English, or
Custom).
Resource File: Set the language resource file to use for the BioStar interface
by clicking the ellipsis (…) button and locating the resource file.
– Event Type: Set the type of event to assign to the key (Not Use, Check
In, Check Out, In, or Out). In/Out indicates the general check in/out
events during a day whereas Check In/Out indicates the formal check
in/out events upon arrival and departure at work—or the first check–
in and the last check–out events on that day. When you choose
Check In or Check Out, you can enable the “Regard as normal check-
in/check-out event” option. If this option is enabled, users using the
appropriate keys will be regarded arriving or leaving on time at work
even though they actually come late or leave early. If you enable the
“Only Result” option, they appear being on time on T&A reports but
their work time will be calculated correctly based on their actual
check in/out time. If you choose Out, you can enable the “Add work
time after this event” option. If this option is enabled, users using the
appropriate key will be considered working for the remainder of the
time slot even though they leave the office early.
Wiegand Mode: Set the mode of Wiegand input to use when reading card ID
data (Legacy or Extended). The Legacy mode will process ID data from
networked devices and RF card readers in the same way (this is the typical
function of previous versions of BioStar). The Extended mode will allow RF
card readers to operate independently, which allows them to be
associated with doors, included in zones, and leave logs with their own
device IDs.
Wiegand Input: Assign the Wiegand input:
– Disabled: The input will not be used.
Xpass Time
– Date: Manually set the device date with a drop-down calendar.
– Time: Manually set the device time.
– Get Host PC Time: Check this box to get the time of the local PC
which BioStar client program is installed on. The time will be
displayed in the Date and Time spin boxes right below this option and
you can set the device’s time to match this time by clicking Set
Device Time.
– Get Device Time: Get the current time displayed by the device.
– Set Device Time: Set the time on the device.
Operation Mode: For each of the following options, click the corresponding
checkbox to enable Double Verification Mode, which requires verification
of two users’ credentials to gain entry to a door.
– Card Only: Set the device to require only card authorization (Always,
Disable, or custom schedule).
– Server Matching: Enable this setting to perform card ID matching at
the BioStar server, instead of the device. When this mode is enabled,
the device will send card ID to the server to verify a match. This mode
is useful when you have more users than can be downloaded to a
device or user information cannot be distributed due to security
concerns.
Mifare
– Not Use Mifare: Check this box to disable MIFARE card authorization.
– Use Data Card: Check this box to use the user data on the MIFARE
card for authorization. The user data card does not provide
fingerprint templates.
– View Mifare Layout: Click this button to view the MIFARE layout used
by the device. For more information about configuring MIFARE
layouts, please see section 3.6.4.7.
Card ID Format
– Format Type: Set the type of pre-processing to occur on card ID data
(Normal or Wiegand). If “Normal” is selected, the card ID data will be
processed in its original form. If “Wiegand” is selected, devices will
interpret card ID data according to the Wiegand format settings.
– Byte Order: Specify whether to swap ID card data between cards and
devices by most significant byte (MSB) or least significant byte
(LSB).
– Bit Order: Specify whether to swap ID card data between cards and
devices by most significant bit (MSB) or least significant bit (LSB).
– In Double mode, setting option which includes an administrator is supported.
In Double mode, door relay will not open unless an administrator
authenticates within 15 seconds after a user authenticates. If this option
is not activated, the door relay will open when other two users, regardless
of whether being a user or an administrator, authenticate within 15 seconds.
Note: This feature is supported from the FW versions, BioStation 1.93,
BioStation T2 1.3, FaceStation 1.3, BioEntry Plus 1.6, BioEntry W 1.2, BioLite
Net 1.4, Xpass 1.3.
– Use Wiegand Card Bypass: This feature makes the device to send out Card
CSN according to Wiegand setting of BioStar without having to conduct a
matching. This is designed to be used as a dummy reader in a connection
with a third party access control unit through Wiegand. When a card data
input is made, the device sends out the data through Wiegand without
going through a matching process.
Note: This feature is supported from the FW versions, BioStation 1.93,
BioStation T2 1.3, FaceStation 1.3, BioEntry Plus 1.6, BioEntry W 1.2,
BioLite Net 1.4, Xpass 1.3.
TCP/IP
– Use DHCP: Click this option button to enable the dynamic host
configuration protocol (DHCP) for the device.
– Not Use DHCP: Click this option button to disable the dynamic host
configuration protocol (DHCP) for this device.
– IP Address: Specify an IP address for the device.
– Subnet: Specify a subnet address for the device.
– Gateway: Specify a network gateway.
– Port: Specify a port to use for the device.
Support MTU Size setting
– Devices affiliated with Black Fin support MTU Size setting. The supported
packet size is between 1078 and 1514, and the default is 1514.
Note: This feature is supported from the FW versions, BioEntry Plus 1.6,
BioEntry W 1.2, BioLite Net 1.4, Xpass 1.3.
Server
– Use: Click this option button to use specific server settings.
– Not Use: Click this option button to disable server settings.
– IP Address: Specify an IP address for the BioStar server.
– Time Sync with Server: Check this box to synchronize the device’
time with the server. The device polls for a time change on the server
every one hour and its time will be synchronized with the server when
the device’s time and the server’s time differ by more than 5 seconds.
Support 100 Base-T: This option allows you to enable or disable a fast
Ethernet connection for the device. When enabled, the device will detect
the Ethernet network and automatically establish the best connection. If
you do not enable this option, the device will attempt to establish a
10Base-T Ethernet connection.
– Use: Click this option button to enable the 100base-T connection for
the device.
– Not Use: Click this option button to disable the 100base-T
connection for the device.
RS485
– Mode: Set the mode for a device connected via RS485 (Disable, Host,
Slave, or PC Connection).
– Baudrate: Set the baud rate for a device connected via RS485 (9600
to 115200).
Device: Select the Xpass (or Secure I/O) device for which you will add or
modify settings.
Port: Select an input port (Input 0, Input 1, or Tamper). For Secure I/O
devices, these settings are available: Input 0, Input 1, Input 2, Input 3.
Switch: Click the option buttons to specify the normal position of the input
switch (N/O: normally open or N/C: normally closed).
Function: Select an action to associate with the input:
– Not Use: The input port will not be monitored.
– Generic Input: The input port will be monitored for a triggering action
(For the events specified with “Detect Input 1-3” in the Output setting
dialog box, please see section 5.1.4.5).
– Emergency Open: Open doors controlled by this device. The normal
door open period will be ignored and doors will remain open until an
operator sends a “Close Door” command via the Door/Zone
Monitoring tab (see section 4.4.1).
– Release All Alarms: Cancel alarms associated with this device.
– Restart Device: Restart the device.
– Disable Device: Disable the device. A disabled device will not
communicate with the BioStar server or process fingerprints or card
inputs. To enable communication again, an administrator must enter
Device Type: Select the device type for which you will add or modify
settings.
Port: select an output port (Relay 0). For Secure I/O devices, these settings
are available: Relay 0 or Relay 1.
Alarm On Event: Specify settings and click Add to add the event to the
Alarm On Event list. These events will activate an alarm.
– Event: Select an event that will activate an alarm (Auth Success, Auth
Fail, Auth Duress, Anti-passback Fail, Access Not Granted, Entrance
Limited, Admin Auth Success, Tamper On, Door Opened, Door Close,
Forced Open Door, Held Open Door, or Detect Input #1-3).
– Device: Select the device to monitor for an alarm event.
– Signal Setting: Select a signal setting that you have previously
configured from the menu bar (Option > Event > Output Port Setting).
– Priority: Set a priority for the event. Only an event with an equal or
higher priority (1 is the highest) can override a previous event. For
example, an alarm on (activate) event with a priority of 2 can be
canceled only by an alarm off (deactivate) event with a priority of 1 or
2.
Alarm Off Event: Specify settings and click Add to add the event to the
Alarm Off Event list. These events will deactivate an alarm.
– Event: Select an event that will deactivate an alarm (Auth Success,
Auth Fail, Auth Duress, Anti-passback Fail, Access Not Granted,
Entrance Limited, Admin Auth Success, Tamper On, Door Opened,
Door Close, Forced Open Door, Held Open Door, or Detect Input #1-3).
– Device: Select the device to monitor for an alarm event.
– Priority: Set a priority for the event. Only an event with an equal or
higher priority (1 is the highest) can override a previous event. For
example, an alarm on event (activate) can be overridden only by an
alarm off (deactivate) event with a priority of 1 or 2.
5.1.4.6 Blacklist
From BioStar 1.8, ‘Blacklist’ feature is supported with Xpass.
(This feature is available only with FW 1.3v or higher.)
Card ID: Enter the card ID or click Read Card and place a command card on
the reader to automatically populate the fields.
Command Type: Select a type of command card to issue (Enroll Card, Delete
Card, or Delete All Card).
Event: Specify the affected event by selecting it from the drop-down list.
LED: Set the LED behavior for a specified event.
– Count: Enter a number of LED cycles for the specified event. Enter “0”
to enable an infinite loop or “-1” to disable the LED.
– Colors: Specify up to three display colors from the drop-down list.
The LED will cycle through these colors in order, from top to bottom.
Next to each color, enter the duration (in milliseconds) that the LED
should display the selected color and the duration (in milliseconds)
that the LED should remain off before advancing to the next color in
the cycle.
Buzzer: Set the buzzer behavior for a specified event.
– Count: Enter a number of buzzer cycles for the specified event. Enter
“0” to enable an infinite loop or “-1” to disable the buzzer.
– Volume: Set up to three tone volumes from the drop-down list (Low,
Middle, or High). The buzzer will cycle through these volumes in
order, from top to bottom. Next to each volume, enter the duration (in
milliseconds) that the buzzer should maintain the selected volume
and the duration (in milliseconds) that the buzzer should remain off
before advancing to the next volume in the cycle.
– Fade Out: Set the tone volume to fade out before advancing to the
next volume in the cycle by clicking this checkbox.
Wiegand Mode: Set the mode of Wiegand input to use when reading card ID
data (Legacy or Extended). The Legacy mode will treat connected RF
devices as part of their host devices (this is the typical function of
previous versions of BioStar). The Extended mode will allow RF card
readers to operate independently, which allows them to be associated
with doors, included in zones, and leave logs with their own device IDs.
Wiegand Input: Assign the Wiegand input:
– Disabled: The input will not be used.
– Wiegand [Card]: The ID field of the Wiegand string is interpreted as a
card ID.
Xpass S2 Time
– Date: Manually set the device date with a drop-down calendar.
– Time: Manually set the device time.
– Get Host PC Time: Check this box to get the time of the local PC
which BioStar client program is installed on. The time will be
displayed in the Date and Time spin boxes right below this option and
you can set the device’s time to match this time by clicking Set
Device Time.
– Get Device Time: Get the current time displayed by the device.
– Set Device Time: Set the time on the device.
Operation Mode: For each of the following options, click the corresponding
checkbox to enable Double Verification Mode, which requires verification
of two users’ credentials to gain entry to a door.
– Card Only: Set the device to require only card authorization (Always,
Disable, or custom schedule).
– Server Matching: Enable this setting to perform card ID matching at
the BioStar server, instead of the device. When this mode is enabled,
the device will send card ID to the server to verify a match. This mode
is useful when you have more users than can be downloaded to a
device or user information cannot be distributed due to security
concerns.
Mifare: Mifare template cards are not supported in the Xpass S2 device.
Card ID Format
– Format Type: Set the type of pre-processing to occur on card ID data
(Normal or Wiegand). If “Normal” is selected, the card ID data will be
processed in its original form. If “Wiegand” is selected, devices will
interpret card ID data according to the Wiegand format settings.
– Byte Order: Specify whether to swap ID card data between cards and
devices by most significant byte (MSB) or least significant byte
(LSB).
– Bit Order: Specify whether to swap ID card data between cards and
devices by most significant bit (MSB) or least significant bit (LSB).
TCP/IP
– Use DHCP: Click this option button to enable the dynamic host
configuration protocol (DHCP) for the device.
– Not Use DHCP: Click this option button to disable the dynamic host
configuration protocol (DHCP) for this device.
– IP: Specify an IP address for the device.
– Subnet: Specify a subnet address for the device.
– Gateway: Specify a network gateway.
– Port: Specify a port to use for the device.
Server
– Use: Click this option button to use specific server settings.
– Not Use: Click this option button to disable server settings.
– IP Address: Specify an IP address for the BioStar server.
– Time Sync with Server: Check this box to synchronize the device’ time
with the server. The device polls for a time change on the server every
one hour and its time will be synchronized with the server when the
device’s time and the server’s time differ by more than 5 seconds.
Support 100 Base-T: This option allows you to enable or disable a fast
Ethernet connection for the device. When enabled, the device will detect
the Ethernet network and automatically establish the best connection. If
you do not enable this option, the device will attempt to establish a
10Base-T Ethernet connection.
– Use: Click this option button to enable the 100base-T connection for
the device.
– Not Use: Click this option button to disable the 100base-T
connection for the device.
RS485
– Mode: Set the mode for a device connected via RS485 (Disable, Host,
Slave, or PC Connection).
– Baudrate: Set the baud rate for a device connected via RS485 (9600
to 115200).
gained entry, the device will reject the user’s card or fingerprint
authorization for the time period specified here.
– Option 1-4: Click the checkbox to enable an entrance limit setting,
and then specify the effective hours for the entrance limit.
– Max Number of Entrance: Set the maximum number of entries
allowed during the specified time limit.
Default Access Group Setting: Select a default access group to be applied
to new users who have not been assigned to another access group.
Automatic T&A Mode Change
– T&A Mode: Set the time and attendance mode for the device (Disable,
Fixed In, Fixed Out, and Auto).
– Fixed Entrance: When the “Auto” T&A mode is selected, specify when
to allow entrance events by selecting a timezone (Always, Disable, or
custom timezone) in the drop-down list. For more information on
creating a timezone, please see section 3.7.1.
– Fixed Exit Time: When the “Auto” T&A mode is selected, specify when
to allow exit events by selecting a timezone (Always, Disable, or
custom timezone) in the drop-down list. For more information on
creating a timezone, please see section 3.7.1.
– In Event Caption: Set a caption for check-in.
– Out Event Caption: Set a caption for check-out.
Device: Select the Xpass S2 (or Secure I/O) device for which you will add or
modify settings.
Port: Select an input port (Input 0, Input 1, or Tamper). For Secure I/O
devices, the following options are available: Input 0, Input 1, Input 2, Input
3.
Switch: Click the option buttons to specify the normal position of the input
switch (N/O: normally open or N/C: normally closed).
Function: Select an action to associate with the input:
– Not Use: The input port will not be monitored.
– Generic Input: The input port will be monitored for a triggering action
(events specified with “Detect Input 1-3” in the Output Setting dialog
box —see section 5.1.5.5).
– Emergency Open: Open doors controlled by this device. The normal
door open period will be ignored and doors will remain open until an
operator sends a “Close Door” command via the Door/Zone
Monitoring tab (see section 4.4.1).
– Release All Alarms: Cancel alarms associated with this device.
– Restart Device: Restart the device.
– Disable Device: Disable the device. A disabled device will not
communicate with the BioStar server or process fingerprints or card
inputs. To enable communication again, an administrator must enter
the master password for a BioStation device or provide
authentication locally for a BioEntry Plus or BioEntry W device.
Schedule: Set the schedule for the input actions (Always, Disable, or custom
schedule).
Duration (ms): Set the duration (in milliseconds) an input signal must last to
trigger the specified action.
Device Type: Select the device type for which you will add or modify
settings.
Port: Select an output port (Relay 0). For Secure I/O devices, these settings
are available: Relay 0 or Relay 1.
Alarm On Event: Specify settings and click Add to add the event to the
Alarm On Event list. These events will activate an alarm.
– Event: Select an event that will activate an alarm (Auth Success, Auth
Fail, Auth Duress, Anti-passback Fail, Access Not Granted, Entrance
Limited, Admin Auth Success, Tamper On, Door Opened, Door Close,
Forced Open Door, Held Open Door, or Detect Input #1-3).
– Device: Select the device to monitor for an alarm event.
– Signal Setting: Select a signal setting that you have previously
configured from the menu bar (Option > Event > Output Port Setting).
– Priority: Set a priority for the event. Only an event with an equal or
higher priority (1 is the highest) can override a previous event. For
example, an alarm on (activate) event with a priority of 2 can be
canceled only by an alarm off (deactivate) event with a priority of 1 or
2.
Alarm Off Event: Specify settings and click Add to add the event to the
Alarm Off Event list. These events will deactivate an alarm.
Card ID: Enter the card ID or click Read Card and place a command card on
the reader to automatically populate the fields.
Command Type: Select a type of command card to issue (Enroll Card, Delete
Card, or Delete All Card).
Event: Specify the affected event by selecting it from the drop-down list.
LED: Set the LED behavior for a specified event.
– Count: Enter a number of LED cycles for the specified event. Enter “0”
to enable an infinite loop or “-1” to disable the LED.
– Colors: Specify up to three display colors from the drop-down list.
The LED will cycle through these colors in order, from top to bottom.
Next to each color, enter the duration (in milliseconds) that the LED
should display the selected color and the duration (in milliseconds)
that the LED should remain off before advancing to the next color in
the cycle.
Buzzer: Set the buzzer behavior for a specified event.
– Count: Enter a number of buzzer cycles for the specified event. Enter
“0” to enable an infinite loop or “-1” to disable the buzzer.
– Volume: Set up to three tone volumes from the drop-down list (Low,
Middle, or High). The buzzer will cycle through these volumes in
order, from top to bottom. Next to each volume, enter the duration (in
milliseconds) that the buzzer should maintain the selected volume
and the duration (in milliseconds) that the buzzer should remain off
before advancing to the next volume in the cycle.
– Fade Out: Set the tone volume to fade out before advancing to the
next volume in the cycle by clicking this checkbox.
Wiegand Mode: Set the mode of Wiegand input to use when reading card ID
data (Legacy or Extended). The Legacy mode will treat connected RF
devices as part of their host devices (this is the typical function of
previous versions of BioStar). The Extended mode will allow RF card
readers to operate independently, which allows them to be associated
with doors, included in zones, and leave logs with their own device IDs.
Wiegand Input: Assign the Wiegand input:
– Disabled: The input will not be used.
– Wiegand [Card]: The ID field of the Wiegand string is interpreted as a
card ID.
– Wiegand [User]: The ID field of the Wiegand string is interpreted as a
user ID.
Wiegand Output: Assign the Wiegand output:
– Disabled: The output will not be used.
– Wiegand [Card]: Inserts the card ID of the authenticated user in the ID
field of the Wiegand string.
– Wiegand [User]: Inserts the user ID of the authenticated user in the ID
field of the Wiegand string.
X-Station Time
– Date: Manually set the device date with a drop-down calendar.
– Time: Manually set the device time.
– Get Host PC Time: Check this box to get the time of the local PC
which BioStar client program is installed on. The time will be
displayed in the Date and Time spin boxes right below this option and
you can set the device’s time to match this time by clicking Set
Device Time.
– Get Device Time: Get the current time displayed by the device.
– Set Device Time: Set the time on the device.
1: 1 Operation Mode: The drop-down lists in this area allow you to control
the authentication mode by schedule. For example, you can choose a
normal authentication mode for working hours and a more strict
authentication mode for hours outside the normal schedule. You can
specify authentication modes either by device or by user (see section
5.4.1). Unless a particular mode is specified for a user, the device
authentication mode will apply.
– Card Only: Set the device to require only card authorization (No Time,
First Shift, or Always).
Add to select an event that will activate the camera. Click Apply to save your
settings.
!
Attention: We recommend that add the authentication events to the camera event
for security. Add only a maximum of 30 events to reduce the network load
between the device and the server.
TCP/IP Setting
– LAN Type: Select a type of LAN connection from the drop-down list
(Disable, or Ethernet).
– Port: Specify a port to use for the device.
IP
– Use DHCP: Click this option button to enable the dynamic host
configuration protocol (DHCP) for the device.
– Not Use DHCP: Click this option button to disable the dynamic host
configuration protocol (DHCP) for this device.
– IP Address: Specify an IP address for the device.
– Subnet: Specify a subnet address for the device.
– Gateway: Specify a network gateway.
– Max Conn.: Specify the maximum number of connections to allow.
Server
– Use: Click this option button to enable the server mode.
– Not Use: Click this option button do disable server settings.
– IP Address: Specify an IP address for the BioStar server.
– Server Port: Specify the port used to connect to the server.
– Time Sync with Server: Check this box to synchronize the device’
time with the server. The device polls for a time change on the server
every one hour and its time will be synchronized with the server when
the device’s time and the server’s time differ by more than 5 seconds.
RS485 Network
– Mode: Set the mode for a device connected via RS485 (Disable, Host,
or Slave). For more information about RS485 modes, please see
sections 3.2.1 and 3.2.2.
RS485
– Baudrate: Set the baud rate for a device connected via RS485 (9600
to 115200).
Device: Select the X-Station device for which you will add or modify
settings.
Port: Select an input port (Input 0, Input 1, or Tamper). For Secure I/O
devices, these settings are available: Input 0, Input 1, Input 2, Input 3.
Switch: Click the option buttons to specify the normal position of the input
switch (N/O: normally open or N/C: normally closed).
Function: Select an action to associate with the input:
– Not Use: The input port will not be monitored.
– Generic Input: The input port will be monitored for a triggering action
(For the events specified with “Detect Input 0-3” in the Output Setting
dialog box, please see section 5.1.1.6).
– Emergency Open: Open doors controlled by this device. The normal
door open period will be ignored and doors will remain open until an
operator sends a “Close Door” command via the Door/Zone
Monitoring tab (see section 4.4.1).
– Release All Alarms: Cancel alarms associated with this device.
– Restart Device: Restart the device.
– Disable Device: Disable the device. A disabled device will not
communicate with the BioStar server or process fingerprints or card
inputs. To enable communication again, an administrator must
provide authentication at the device.
Schedule: Set the schedule during which the inputs will be monitored
(Always, First Shift, or No Time).
Duration (ms): Set the duration (in milliseconds) an input signal must last to
trigger the specified action.
Device Type: Select the device type for which you will add or modify
settings.
Port: select an output port (Relay 0). For Secure I/O devices, these settings
are available: Relay 0 or Relay 1.
Alarm On Event: Specify settings and click Add to add the event to the
Alarm On Event list. These events will activate an alarm.
– Event: Select an event that will activate an alarm (Auth Success, Auth
Fail, Auth Duress, Anti-passback Fail, Access Not Granted, Entrance
Limited, Admin Auth Success, Tamper On, Door Opened, Door Closed,
Forced Open Door, Held Open Door, Detect Input #0-3).
– Device: Select the device to monitor for an alarm event.
– Signal Setting: Select a signal setting that you have previously
configured from the menu bar (Option > Event > Output Port Setting).
– Priority: Set a priority for the event. Only an event with an equal or
higher priority (1 is the highest) can override a previous event. For
example, an alarm on (activate) event with a priority of 2 can be
canceled only by an alarm off (deactivate) event with a priority of 1 or
2.
Alarm Off Event: Specify settings and click Add to add the event to the
Alarm Off Event list. These events will deactivate an alarm.
Current Count: The total number of user IDs and access cards that have
been registered.
Reserved: The remaining number of user IDs and access cards that can be
registered.
Display/Sound
– Language: Set the language to use on the display (Korean, English, or
Custom).
– Menu Timeout: Set the length of time before the display will return to
the idle screen.
– Back Light Timeout: Set the length of time before the display goes
dim (Infinite, 10, 20, 30, 40, 50, or 60 sec).
– Theme: Set a display theme (Theme 1-3).
– Resource File: Set the language resource file to use for the
X-Station interface (No Change, English, Korean, or Custom). To use a
language resource file other than English or Korean, select Custom
and then click the ellipsis (…) button to locate the resource file.
– Background: Set the type of background for the X-Station display
(Logo, Notice, or Slide Show). Supported file types (JPG, GIF, BMP,
and PNG) cannot exceed 240x320 pixels each. Only one image at a
time can be used as a logo or notice, while up to 16 images can be
displayed (at a set interval) in a slide show.
– Notice: Click this button to create a notice that will be shown on the
X-Station display. After creating a notice, you can click Apply to apply
the notice to the current device or Apply to Others to apply the notice
to additional devices.
– Volume: Set the volume of the X-Station device (0% to 100%).
– Msg Timeout: Set the length of time that a failure or confirmation
message will be displayed.
– Clock Display: Set to display the current time on the device (Enable or
Disable).
Background Image: Click this checkbox to upload new background images.
Click Add to locate and add a new image file. To delete an existing image,
click the image name and then click Delete.
– Type: Set the type of background for the X-Station display (Logo,
Notice, or Slide Show). Supported file types (JPG, GIF, BMP, and PNG)
cannot exceed 240x320 pixels for Notices and 240x320 pixels for
Logos. Only one image at a time can be used as a logo or notice.
Sound: Click this checkbox to enable and add custom event sounds. Click
an event from the list and then click Add to locate and add a new sound
file. Click Delete to remove custom sound files or Play to preview a custom
sound file.
T&A Key: Specify which keys to use for T&A events and the event types
associated with them:
– Function Key: Select a function key from the drop-down list to assign
a T&A event (*1-*15). If you are using the Event Fix mode, you can
click the checkbox to the right to designate a fixed event.
– Event Caption: Enter a caption for the event.
– Auto Mode Schedule: When using the Auto Change mode, you can
specify when the event will occur by selecting a timezone in the drop-
down list. For more information on creating a timezone, see section
3.7.1.
– Event Type: Set the type of event to assign to the key (Not Use, Check
In, Check Out, In, or Out). In/Out indicates the general check in/out
events during a day whereas Check In/Out indicates the formal check
in/out events upon arrival and departure at work—or the first check–
in and the last check–out events on that day. When you choose
Check In or Check Out, you can enable the “Regard as normal check-
in/check-out event” option. If this option is enabled, users using the
appropriate keys will be regarded arriving or leaving on time at work
even though they actually come late or leave early. If you enable the
“Only Result” option, they appear being on time on T&A reports but
their work time will be calculated correctly based on their actual
check in/out time. If you choose Out, you can enable the “Add work
time after this event” option. If this option is enabled, users using the
appropriate key will be considered working for the remainder of the
time slot even though they leave the office early.
Wiegand Mode: Set the mode of Wiegand input to use when reading card ID
data (Legacy or Extended). The Legacy mode will process ID data from
networked devices and RF card readers in the same way (this is the typical
function of previous versions of BioStar). The Extended mode will allow RF
card readers to operate independently, which allows them to be
associated with doors, included in zones, and leave logs with their own
device IDs.
Wiegand In/Out: Assign the function of the Wiegand input or output:
– Wiegand (User) In: The ID field of the Wiegand string is interpreted as
a user ID.
– Wiegand (Card) In: The ID field of the Wiegand string is interpreted as
a card ID.
– Wiegand (User) Out: Inserts the user ID of the authenticated user in
the ID field of the Wiegand string.
– Wiegand (Card) Out: Inserts the card ID of the authenticated user in
the ID field of the Wiegand string.
BioStation T2 Time
– Date: Manually set the device date with a drop-down calendar.
– Time: Manually set the device time.
– Get Host PC Time: Check this box to get the time of the local PC
which BioStar client program is installed on. The time will be
displayed in the Date and Time spin boxes right below this option and
you can set the device’s time to match this time by clicking Set
Device Time.
– Get Device Time: Get the current time displayed by the device.
– Set Device Time: Set the time on the device.
ID Operation Mode: The drop-down lists in this area allow you to control the
authentication mode by schedule. For example, you can choose a normal
authentication mode for working hours and a more strict authentication
mode for hours outside the normal schedule. You can specify
authentication modes either by device or by user (see section 5.4.1).
Unless a particular mode is specified for a user, the device authentication
mode will apply.
– ID + Fingerprint: Set the device to require ID plus fingerprint
authorization (Always, or No Time).
– ID + Password: Set the device to require ID plus password
authorization (Always, or No Time).
– ID + Fingerprint/Password: Set the device to require ID plus
fingerprint or password authorization (Always, or No Time).
– ID + Fingerprint + Password: Set the device to require ID plus
fingerprint plus password authorization (Always, or No Time).
Card Operation Mode
– Card Only: Set the device to require only card authorization (Always,
or No Time).
– Card + Fingerprint: Set the device to require card plus fingerprint
authorization (Always, or No Time).
– Card + Password: Set the device to require card plus password
authorization (Always, or No Time).
– Card + Fingerprint/Password: Set the device to require card plus
fingerprint or password authorization (Always, or No Time).
– Card + Fingerprint + Password: Set the device to require card plus
fingerprint plus password authorization (Always, or No Time).
Fingerprint Operation Mode
– Fingerprint: Set the device to require only fingerprint authorization
(Always, or No Time).
– Fingerprint + Password: Set the device to require fingerprint plus
password authorization (Always, or No Time).
– Func Key + Fingerprint: Set the device to require function key plus
fingerprint authorization (Always, or No Time).
– Func Key + Fingerprint + Password: Set the device to require function
key plus fingerprint plus password authorization (Always, or No
Time).
Other Options
– Private Auth: Set the device to allow a private authorization method
(Disable or Enable). If enabled, the authentication mode of the user
will be determined by a user’s “Authorization” setting, which is
located on the Details tab. If disabled, the authentication mode will be
determined by operation mode settings of the device.
– Double Mode: Set the device to require authentication of two users’
IDs, access cards or fingerprints (Always, or No Time). The timeout
for presenting the second authentication is 15 seconds.
– Detect Face: Set the device to capture a face image. Upon successful
authentication, the captured image is stored in the event log.
– Server Matching: Enable this setting to perform user ID, fingerprint or
card ID matching at the BioStar server, instead of the device. When
this mode is enabled, the devices will send the user ID, fingerprint
template or card ID to the server to verify a match. This mode is
useful when you have more users than can be downloaded to a
device or user information cannot be distributed due to security
concerns.
– Matching Timeout: Set the length of time before the device will
timeout when trying to identify a fingerprint match within the device
itself or via the server (3, 7, 10, 15, 20, 30 sec).
Mifare
– Not Use Mifare: Check this box to disable MIFARE card authorization.
– Use Template on Card: Check this box to use the template on the
MIFARE card for authorization.
– View Mifare Layout: Click this button to view the MIFARE layout used
by the device. For more information about configuring MIFARE
layouts, please see section 3.6.4.7.
Card ID Format
– Format Type: Set the type of pre-processing to occur on card ID
data (Normal or Wiegand). If “Normal” is selected, the card ID data
will be processed in its original form. If “Wiegand” is selected,
devices will interpret card ID data according to the Wiegand format
settings.
– Byte Order: Specify whether to swap ID card data between cards
and devices by most significant byte (MSB) or least significant byte
(LSB).
– Bit Order: Specify whether to swap ID card data between cards and
devices by most significant bit (MSB) or least significant bit (LSB).
– In Double mode, setting option which includes an admin user is
supported. In Double mode, door relay will not open unless an
admin user authenticates within 15 seconds after a normal user
authenticates. If this option is not activated, the door relay will open
when other two users, regardless of whether being a normal user or
an admin user.
Note: This feature is supported from the FW versions, BioStation 1.93,
BioStation T2 1.3, FaceStation 1.3, BioEntry Plus 1.6, BioEntry W 1.2,
BioLite Net 1.4, Xpass 1.3.
– Use Wiegand Card Bypass: This feature makes the device to send
out Card CSN according to Wiegand setting of BioStar without
having to conduct a matching. This is designed to be used as a
dummy reader in a connection with a third party access control unit
through Wiegand. When a card data input is made, the device sends
out the data through Wiegand without going through a matching
process.
Note: This feature is supported from the FW versions, BioStation 1.93,
BioStation T2 1.3, FaceStation 1.3, BioEntry Plus 1.6, BioEntry W 1.2,
BioLite Net 1.4, Xpass 1.3.
Fingerprint
– Security Level: Set the security level to use for fingerprint
authorization (Normal, Secure, or Most Secure). Keep in mind that as
the security level is increased, so too is the likelihood of a false
rejection.
– Sensitivity: Set the sensitivity of the fingerprint scanner (0 [Min] to 7
[Max]). A higher sensitivity setting will result in more easily captured
fingerprint scans, but also increases the sensitivity to external noise.
– Scan Timeout: Set the length of time before the fingerprint scanner
will timeout (1 sec to 20 sec). If a user does not place a finger on the
device within the timeout period, the authorization will fail.
– 1: N Fast Mode: Set the device to use Fast Mode to reduce the
amount of time required for matching fingerprints (Auto, Normal,
Fast, or Fastest). Setting Fast Mode to Auto will adjust the matching
speed according to the number of enrolled templates.
– View Image: Set to show or hide fingerprint images on the BioStation
T2 display (Yes or No).
– Check Fake Finger: Set the device to detect the use of fake
fingerprints, such as those made from silicon or rubber, and prevent
unauthorized access.
– Template Option: Displays the global fingerprint template settings.
For more information about fingerprint templates, see section 4.9.
!
Attention: We recommend that add the authentication events to the camera event
for security. Add only a maximum of 30 events to reduce the network load
between the device and the server.
TCP/IP Setting
– LAN Type: Select a type of LAN connection from the drop-down list
(Disable, Ethernet, or Wireless LAN).
– Port: Specify a port to use for the device.
WLAN
– Change Setting: Click to specify settings for a wireless local area
network (WLAN). This option is active only when WLAN is selected as
the TCP/IP setting. For more information about configuring settings
for a WLAN, see section 3.2.4.
IP
– Use DHCP: Click this option button to enable the dynamic host
configuration protocol (DHCP) for the device.
– Not Use DHCP: Click this option button to disable the dynamic host
configuration protocol (DHCP) for this device.
– IP Address: Specify an IP address for the device.
– Subnet: Specify a subnet address for the device.
– Gateway: Specify a network gateway.
– Max Conn.: Specify the maximum number of connections to allow.
Server
– Use: Click this option button to enable the server mode.
– Not Use: Click this option button do disable server settings.
– IP Address: Specify an IP address for the BioStar server.
– Server Port: Specify the port used to connect to the server.
– Time Sync with Server: Check this box to synchronize the device’
time with the server. The device polls for a time change on the server
every one hour and its time will be synchronized with the server when
the device’s time and the server’s time differ by more than 5 seconds.
RS485 Network
– Mode: Set the mode for a device connected via RS485 (Disable, Host,
or Slave). For more information about RS485 modes, please see
sections 3.2.1 and 3.2.2.
RS485
– Baudrate: Set the baud rate for a device connected via RS485 (9600
to 115200).
RS232
– Baudrate: Set the baud rate for a device connected via RS232 (9600
to 115200).
USB: Click the option buttons to enable or disable the USB port on the
BioStation T2 device.
USB Memory: Click the option buttons to enable or disable the USB memory
on the BioStation T2 device.
When you select IP Interphone in the Type drop-down list, specify the following
settings:
VoIP Server IP: Specify an IP address for the VoIP server.
VoIP Phone Number: Specify a phone number for the interphone.
VoIP Display Name: Specify a name to use for communication through the
interphone.
VoIP ID: Specify a user name to access the VoIP server.
VoIP Password: Specify a password to access the VoIP server.
VoIP Speaker Gain: Specify the volume of the speaker.
VoIP Mic Gain: Specify the volume of the microphone.
Device: Select the BioStation T2 device for which you will add or modify
settings.
Port: Select an input port (Input 0, Input 1, or Tamper). For Secure I/O
devices, these settings are available: Input 0, Input 1, Input 2, Input 3.
Switch: Click the option buttons to specify the normal position of the input
switch (N/O: normally open or N/C: normally closed).
Function: Select an action to associate with the input:
– Not Use: The input port will not be monitored.
– Generic Input: The input port will be monitored for a triggering action
(events specified with “Detect Input 0-3” in the Output Setting dialog
box —see section 5.1.1.6).
– Emergency Open: Open doors controlled by this device. The normal
door open period will be ignored and doors will remain open until an
operator sends a “Close Door” command via the Door/Zone
Monitoring tab (see section 4.4.1).
– Release All Alarms: Cancel alarms associated with this device.
Device Type: Select the device type for which you will add or modify
settings.
Port: Select an output port (Relay 0). For Secure I/O devices, these settings
are available: Relay 0 or Relay 1.
Alarm On Event: Specify settings and click Add to add the event to the
Alarm On Event list. These events will activate an alarm.
– Event: Select an event that will activate an alarm (Auth Success, Auth
Fail, Auth Duress, Anti-passback Fail, Access Not Granted, Entrance
Limited, Admin Auth Success, Tamper On, Door Opened, Door Close,
Forced Open Door, Held Open Door, Detect Input #1-3).
– Device: Select the device to monitor for an alarm event.
Current Count: The total number of the user IDs and access cards that have
been registered.
Reserved : The remaining number of user IDs and access cards to be
registered.
Display/Sound
– Language: Set the language to use on the display (Korean, English, or
Custom).
– Menu Timeout: Set the length of time before the display will return to
the idle screen.
– Backlight Timeout: Set the length of time before the display goes
dim.
– Theme: set a display theme.
– Use Voice: Set the device to notify you with voice messages (Disable
or Enable).
– Resource File: Set the language resource file to use for the BioStar
interface (No Change, English, Korean, or Custom). To use a language
resource file other than English or Korean, select Custom and then
click the ellipsis (…) button to locate the resource file.
– Background: Set the type of background for the BioStation T2 display
(Logo, Notice, or Slide Show). Supported file types (JPG, GIF, BMP,
PNG and PDF) cannot exceed 480x800 pixels each. Only one image
at a time can be used as a logo or notice, while up to 16 images can
be displayed (at a set interval) in a slide show.
– Volume: Set the volume of the BioStation device (0% to 100%).
– Msg Timeout: Set the length of time that a failure or confirmation
message will be displayed.
– Clock Display: Set to display the current time on the device (Enable or
Disable).
– Function Key: Select a function key from the drop-down list to assign
a T&A event (F1-F4, EXT01-EXT12). If you are using the Event Fix
mode, you can click the checkbox to the right to designate a fixed
event.
– Event Caption: Enter a caption for the event.
– Auto Mode Schedule: When using the Auto Change mode, you can
specify when the event will occur by selecting a timezone in the drop-
down list. For more information on creating a timezone, please see
section 3.7.1.
– Event Type: Set the type of event to assign to the key (Not Use, Check
In, Check Out, In, or Out). In/Out indicates the general check in/out
events during a day whereas Check In/Out indicates the formal check
in/out events upon arrival and departure at work—or the first check–
in and the last check–out events on that day. When you choose
Check In or Check Out, you can enable the “Regard as normal check-
in/check-out event” option. If this option is enabled, users who
activate the appropriate keys will be regarded as arriving or leaving
on time at work even though they actually arrive late or leave early. If
you enable the “Only Result” option, they appear being on time on
T&A reports but their work time will be calculated correctly based on
their actual check in/out time. If you choose Out, you can enable the
“Add work time after this event” option. If this option is enabled, users
activating the appropriate key will be considered working for the
remainder of the time slot even if they leave the office early.
Wiegand Mode: Set the mode of Wiegand input to use when reading card ID
data (Legacy or Extended). The Legacy mode will treat connected RF
devices as part of their host devices (this is the typical function of
previous versions of BioStar). The Extended mode will allow RF card
readers to operate independently, which allows them to be associated
with doors, included in zones, and leave logs with their own device IDs.
Wiegand In/Out: Assign the Wiegand input or output:
– Wiegand (User) In: The ID field of the Wiegand string is interpreted as
a user ID.
– Wiegand (Card) In: The ID field of the Wiegand string is interpreted as
a card ID.
– Wiegand (User) Out: Inserts the user ID of the authenticated user in
the ID field of the Wiegand string.
– Wiegand (Card) Out: Inserts the card ID of the authenticated user in
the ID field of the Wiegand string.
FaceStation Time
– Date: Manually set the device date with a drop-down calendar.
– Time: Manually set the device time.
– Get Host PC Time: Check this box to automatically synchronize the
device time with the time of the host computer.
– Get Device Time: Get the current time displayed by the device.
– Set Device Time: Set the time on the device.
ID Operation Mode: The drop-down lists in this area allow you to control the
authentication mode by schedule. For example, you can choose a normal
authentication mode for working hours and a more strict authentication
mode for hours outside the normal schedule. You can specify
authentication modes either by device or by user (see section 5.4.1).
Unless a particular mode is specified for a user, the device authentication
mode will apply.
– ID + Face: Set the device to require ID plus face recognition for
authorization (Always, New Time Zone, or No Time).
– ID + Password: Set the device to require ID plus password
authorization (Always, New Time Zone, or No Time).
– ID + Face/Password: Set the device to require ID plus face recognition
or password authorization (Always, New Time Zone, or No Time).
– ID + Face + Password: Set the device to require ID plus face
recognition plus password authorization (Always, New Time Zone, or
No Time).
– Matching Timeout: Set the length of time before the device will
timeout when trying to identify a fingerprint match within the device
itself or via the server (3, 7, 10, 15, 20, 30 sec).
Mifare
– Not Use Mifare: Check this box to disable MIFARE card authorization.
– Use Template on Card: Not available with FaceSation devices.
– View Mifare Layout: Not available with FaceSation devices.
Card ID Format
– Format Type: Set the type of pre-processing to occur on card ID data
(Normal or Wiegand). If “Normal” is selected, the card ID data will be
processed in its original form. If “Wiegand” is selected, devices will
interpret card ID data according to the Wiegand format settings.
– Byte Order: Specify whether to swap ID card data between cards and
devices by most significant byte (MSB) or least significant byte
(LSB).
– Bit Order: Specify whether to swap ID card data between cards and
devices by most significant bit (MSB) or least significant bit (LSB).
Security Level: Set the security level to use for face recognition (Normal,
Secure, or Most Secure). Keep in mind that as the security level is
increased, so too is the likelihood of a false rejection.
Enroll Sensitivity: Set the sensitivity of the face recognition system (0 [Min]
to 9 [Max]). A higher sensitivity setting will result in easier face
recognition, but also increases the sensitivity to external visual noise.
Use Templete Image: Set whether or not to display user face template
images in the FaceStation device.
!
Attention: We recommend that add the authentication events to the camera event
for security. Add only a maximum of 30 events to reduce the network load
between the device and the server.
TCP/IP Setting
– LAN Type: Select a type of LAN connection from the drop-down list
(Disable, Ethernet, or Wireless LAN).
– Port: Specify a port to use for the device.
WLAN
– Change Setting: Click to specify settings for a wireless local area
network (WLAN). This option is active only when WLAN is selected as
the TCP/IP setting. For more information about configuring settings
for a WLAN, please see section 3.2.4.
IP
– Use DHCP: Click this option button to enable the dynamic host
configuration protocol (DHCP) for the device.
– Not Use DHCP: Click this option button to disable the dynamic host
configuration protocol (DHCP) for this device.
– IP Address: Specify an IP address for the device.
– Subnet: Specify a subnet address for the device.
– Gateway: Specify a network gateway.
– Max Conn.: Specify the maximum number of connections to allow.
Server
– Use: Click this option button to enable the server mode.
– Not Use: Click this option button do disable server settings.
– IP Address: Specify an IP address for the BioStar server.
– Server Port: Specify the port used to connect to the server.
– Time Sync with Server: Check this box to synchronize the device’
time with the server. The device polls for a time change on the server
every one hour and its time will be synchronized with the server when
the device’s time and the server’s time differ by more than 5 seconds.
RS485 Network
– Mode: Set the mode for a device connected via RS485 (Disable, Host,
or Slave). For more information about RS485 modes, please see
sections 3.2.1 and 3.2.2.
RS485
– Baudrate: Set the baud rate for a device connected via RS485 (9600
to 115200).
RS232
– Baudrate: Set the baud rate for a device connected via RS232 (9600
to 115200).
USB: Click the option buttons to enable or disable the USB port on the
FaceStation device.
USB Memory: Click the option buttons to enable or disable the USB memory
on the FaceStation device.
Device: Select the FaceStation device for which you will add or modify
settings.
Port: Select an input port (Input 0, Input 1, or Tamper). For Secure I/O
devices, these settings are available: Input 0, Input 1, Input 2, Input 3.
Switch: Click the option buttons to specify the normal position of the input
switch (N/O: normally open or N/C: normally closed).
Function: Select an action to associate with the input:
– Not Use: The input port will not be monitored.
– Generic Input: The input port will be monitored for a triggering action
(events specified with “Detect Input 0-3” in the Output Setting dialog
box —see section 5.1.1.6).
– Emergency Open: Open doors controlled by this device. The normal
door open period will be ignored and doors will remain open until an
operator sends a “Close Door” command via the Door/Zone
Monitoring tab (see section 4.4.1).
– Release All Alarms: Cancel alarms associated with this device.
– Restart Device: Restart the device.
– Disable Device: Disable the device. A disabled device will not
communicate with the BioStar server or process face or card inputs.
To enable communication again, an administrator must provide
authentication at the device.
Schedule: Set the schedule during which the inputs will be monitored
(Always or No Time).
Duration (ms): Set the duration (in milliseconds) an input signal must last to
trigger the specified action.
Device Type: Select the device type for which you will add or modify
settings.
Port: select an output port (Relay 0). For Secure I/O devices, these settings
are available: Relay 0 or Relay 1.
Alarm On Event: Specify settings and click Add to add the event to the
Alarm On Event list. These events will activate an alarm.
– Event: Select an event that will activate an alarm (Auth Success, Auth
Fail, Anti-passback Fail, Access Not Granted, Entrance Limited,
Admin Auth Success, Tamper On, Door Opened, Door Close, Forced
Open Door, Held Open Door, Detect Input #1-3).
– Device: Select the device to monitor for an alarm event.
– Signal Setting: Select a signal setting that you have previously
configured from the menu bar (Option > Event > Output Port Setting).
– Priority: Set a priority for the event. Only an event with an equal or
higher priority (1 is the highest) can override a previous event. For
example, an alarm on (activate) event with a priority of 2 can be
canceled only by an alarm off (deactivate) event with a priority of 1 or
2.
Alarm Off Event: Specify settings and click Add to add the event to the
Alarm Off Event list. These events will deactivate an alarm.
– Event: Select an event that will deactivate an alarm (Auth Success,
Auth Fail, Anti-passback Fail, Access Not Granted, Entrance Limited,
Admin Auth Success, Tamper On, Door Opened, Door Close, Forced
Open Door, Held Open Door, or Detect Input #1-3).
– Device: Select the device to monitor for an alarm event.
Priority: Set a priority for the event. Only an event with an equal or higher
priority (1 is the highest) can override a previous event. For example, a
priority 2 “alarm on” event (activate) can be overridden only by an “alarm
off” (deactivate) event with a priority of 1 or 2.
Display/Sound
– Language: Set the language to use on the display (Korean, English, or
Custom).
– Menu Timeout: Set the length of time before the display will return to
the idle screen (Infinite, 10 sec, 20 sec, or 30 sec).
– Backlight Timeout: Set the length of time before the display goes dim
(Infinite, 10 sec, 20 sec, 30 sec, 40 sec, 50 sec, or 60 sec).
– Theme: set a display theme (Theme 1-4)
– Use Voice: Set the device to notify you with voice messages (Disable
or Enable).
– Resource File: Set the language resource file to use for the BioStar
interface (No Change, Korean, English, or Custom). To use a language
resource file other than English or Korean, select Custom and then
click the ellipsis (…) button to locate the resource file.
– Background: Set the type of background for the FaceStation display
(Logo, Notice, Slide Show, or PDF). Supported file types (JPG, GIF,
BMP, PNG and PDF) cannot exceed 480x800 pixels each. Only one
image at a time can be used as a logo or notice, while up to 16
images can be displayed (at a set interval) in a slide show.
– Volume: Set the volume of the FaceStation device (0% to 100%).
– Msg Timeout: Set the length of time that a failure or confirmation
message will be displayed (0.5-5 sec).
– Clock Display: Set to display the current time on the device (Enable or
Disable).
Background Image: Click this checkbox to upload new background images.
Click the plus sign (+) to locate and add a new image file.
– Type: Set the type of background for the FaceStation display (Logo,
Notice, Slide Show, or PDF). Supported file types (JPG, GIF, BMP, PNG
and PDF) cannot exceed 480x800 pixels for Notices and 480x800
pixels for Logos. Only one image at a time can be used as a logo or
notice.
Sound: Click this checkbox to enable and add custom event sounds. Click
an event from the list and then click the plus sign (+) to locate and add a
new sound file. Click Add to add new sound files, Delete to remove sound
files, or Play to preview a selected sound file.
– Event Type: Set the type of event to assign to the key (Not Use, Check
In, Check Out, In, or Out). In/Out indicates the general check in/out
events during a day whereas Check In/Out indicates the formal check
in/out events upon arrival and departure at work—or the first check–
in and the last check–out events on that day. When you choose
Check In or Check Out, you can enable the “Regard as normal check-
in/check-out event” option. If this option is enabled, users who
activate the appropriate keys will be regarded as arriving or leaving
on time at work even though they actually arrive late or leave early. If
you enable the “Only Result” option, they appear being on time on
T&A reports but their work time will be calculated correctly based on
their actual check in/out time. If you choose Out, you can enable the
“Add work time after this event” option. If this option is enabled, users
activating the appropriate key will be considered working for the
remainder of the time slot even if they leave the office early.
Wiegand Mode: Set the mode of Wiegand input to use when reading card ID
data (Legacy or Extended). The Legacy mode will treat connected RF
devices as part of their host devices (this is the typical function of
previous versions of BioStar). The Extended mode will allow RF card
readers to operate independently, which allows them to be associated
with doors, included in zones, and leave logs with their own device IDs.
Wiegand In/Out: Assign the Wiegand input or output:
– Wiegand (User) In: The ID field of the Wiegand string is interpreted as
a user ID.
– Wiegand (Card) In: The ID field of the Wiegand string is interpreted as
a card ID.
Device Time
– Date: Manually set the device date with a drop-down calendar.
– Time: Manually set the device time.
– Time Zone: Select the time zone you wish to use.
– Get Host PC Time: Check this box to get the time of the local PC
which BioStar client program is installed on. The time will be
displayed in the Date and Time spin boxes right below this option and
you can set the device’s time to match this time by clicking Set
Device Time.
– Get Device Time: Get the current time displayed by the device.
– Set Device Time: Set the time on the device.
Fingerprint Operation Mode
– Fingerprint: Set the device to require only fingerprint authorization
(Always, or No Time).
– MIFARE: Click this button to view the MIFARE layout used by the
device. For more information about configuring MIFARE layouts,
please see section 3.6.4.7.
– iCLASS: Click this button to view the iCLASS layout used by the
device. For more information about configuring iCLASS layouts,
please see section 3.6.4.9.
– DESFire: Click this button to view the DESFire layout used by the
device. For more information about configuring DESFire layouts,
please see section 3.6.4.8.
Card ID Format
– Format Type: Set the type of pre-processing to occur on card ID
data (Normal or Wiegand). If “Normal” is selected, the card ID data
will be processed in its original form. If “Wiegand” is selected,
devices will interpret card ID data according to the Wiegand format
settings.
– Byte Order: Specify whether to swap ID card data between cards
and devices by most significant byte (MSB) or least significant byte
(LSB).
Note: The device versions 1.x and 2.x have different methods to read card
data, but BioStar corrects card data, so card data can be used in the
same way. Therefore, MSB/LSB should be set in the same way in
the device versions 1.x and 2.x. The card ID displayed by the device
may be shown as horizontally reversed, since it is displayed based
on Hexa value, but this can be ignored because card data can
nevertheless be read correctly.
– In Double mode, setting option which includes an admin user is
supported. In Double mode, door relay will not open unless an
admin user authenticates within 15 seconds after a normal user
authenticates. If this option is not activated, the door relay will open
when other two users, regardless of whether being a normal user or
an admin user.
– Use Wiegand Card Bypass: This feature makes the device to send
out Card CSN according to Wiegand setting of BioStar without
having to conduct a matching. This is designed to be used as a
dummy reader in a connection with a third party access control unit
through Wiegand. When a card data input is made, the device sends
out the data through Wiegand without going through a matching
process.
Fingerprint
– Security Level: Set the security level to use for fingerprint
authorization (Normal, Secure, or Most Secure). Keep in mind that as
the security level is increased, so too is the likelihood of a false
rejection.
– Sensitivity: Set the sensitivity of the fingerprint scanner (0 [Min] to 7
[Max]). A higher sensitivity setting will result in more easily captured
fingerprint scans, but also increases the sensitivity to external noise.
– Scan Timeout: Set the length of time before the fingerprint scanner
will timeout (1 sec to 20 sec). If a user does not place a finger on the
device within the timeout period, the authorization will fail.
– Advanced Enrollment: Checks the quality of the scanned fingerprint
to avoid the poor quality fingerprint template enrollment. The user
will be alerted when the quality of the fingerprint scanned is low and
given enrollment instructions.
– 1: N Fast Mode: Set the device to use Fast Mode to reduce the
amount of time required for matching fingerprints (Auto, Normal,
Fast, or Fastest). Setting Fast Mode to Auto will adjust the matching
speed according to the number of enrolled templates.
– Sensor Mode: If the option is set to Auto On, the sensor will
automatically go on when it detects a finger. If the option is set to
Always On, the sensor will always be on.
– View Image: Set to show or hide fingerprint images on the BioStation
2 display (Yes or No).
– Template Option: Displays the global fingerprint template settings.
For more information about fingerprint templates, see section 4.9.
TCP/IP Setting
– LAN Type: Select a type of LAN connection from the drop-down list
(Ethernet, or Wireless LAN).
– Port: Specify a port to use for the device.
WLAN
– Change Setting: Click to specify settings for a wireless local area
network (WLAN). This option is active only when WLAN is selected as
the TCP/IP setting. For more information about configuring settings
for a WLAN, see section 3.2.4.
IP
– Use DHCP: Click this option button to enable the dynamic host
configuration protocol (DHCP) for the device.
– Not Use DHCP: Click this option button to disable the dynamic host
configuration protocol (DHCP) for this device.
– IP Address: Specify an IP address for the device.
– Subnet: Specify a subnet address for the device.
– Gateway: Specify a network gateway.
Server
– Use: Click this option button to enable the server mode.
– Not Use: Click this option button do disable server settings.
– IP Address: Specify an IP address for the BioStar server.
– Server Port: Specify the port used to connect to the server.
– Time Sync with Server: Check this box to synchronize the device’
time with the server. The device polls for a time change on the server
every one hour and its time will be synchronized with the server when
the device’s time and the server’s time differ by more than 5 seconds.
RS485 Network
– Mode: Set the mode for a device connected via RS485 (Default, Host,
or Slave). For more information about RS485 modes, please see
sections 3.2.1 and 3.2.2.
– Baudrate: Set the baud rate for a device connected via RS485 (9600
to 115200).
Type
– Analogue Interphone: Choose this option to enable the analogue
interphone.
Trigger
– Device: Select a device which a specific event will be monitored.
– Type: Select Input or Event.
Input: If the Type of Trigger is set to Input, can be set.
Current Count: The total number of the user IDs and access cards that have
been registered.
Reserved : The remaining number of user IDs and access cards to be
registered.
at the bottom of the tab. You can also apply the same settings to other devices by
clicking Apply to Others.
Display/Sound
– Language: Set the language to use on the display (Korean, English, or
Custom).
– Menu Timeout: Set the length of time before the display will return to
the idle screen.
– Backlight Timeout: Set the length of time before the display goes
dim.
– Theme: set a display theme.
– Use Voice: Set the device to notify you with voice messages (Disable
or Enable).
– Resource File: Set the language resource file to use for the BioStar
interface (No Change, English, Korean, or Custom). To use a language
resource file other than English or Korean, select Custom and then
click the ellipsis (…) button to locate the resource file.
– Background: Set the type of background for the BioStation 2 display
(Logo, Notice, or Slide Show). Supported file types (JPG, GIF, BMP,
and PNG) cannot exceed 320x240 pixels each.
– Notice: Click this button to create a notice that will be shown on the
BioStation 2 display. After creating a notice, you can click Apply to
apply the notice to the current device or Apply to Others to apply the
notice to additional devices.
– Volume: Set the volume of the BioStation 2 device (0% to 100%).
– Msg Timeout: Set the length of time that a failure or confirmation
message will be displayed.
– Clock Display: Set to display the current time on the device (Enable or
Disable).
Background Image: Click this checkbox to upload new background images.
Click Add to locate and add a new image file.
Sound: Click this checkbox to enable and add custom event sounds. Click
an event from the list and then click the plus sign (+) to locate and add a
new sound file. Click Add to add new sound files, Delete to remove sound
files, or Play to preview a selected sound file.
Wiegand Mode: Set the mode of Wiegand input to use when reading card ID
data (Extended). The Extended mode will allow RF card readers to operate
independently, which allows them to be associated with doors, included in
zones, and leave logs with their own device IDs.
Wiegand In/Out: Assign the Wiegand input or output:
– Wiegand (Card) In: The ID field of the Wiegand string is interpreted as
a card ID.
Device Time
– Date: Manually set the device date with a drop-down calendar.
– Time: Manually set the device time.
– Time Zone: Select the time zone you wish to use.
– Get Host PC Time: Check this box to get the time of the local PC
which BioStar client program is installed on. The time will be
displayed in the Date and Time spin boxes right below this option and
you can set the device’s time to match this time by clicking Set
Device Time.
– Get Device Time: Get the current time displayed by the device.
– Set Device Time: Set the time on the device.
Fingerprint Operation Mode
– Fingerprint: Set the device to require only fingerprint authorization
(Always, or No Time).
– Fingerprint + Password: Set the device to require fingerprint plus
password authorization (Always, or No Time).
ID Operation Mode: The drop-down lists in this area allow you to control the
authentication mode by schedule. For example, you can choose a normal
authentication mode for working hours and a more strict authentication
mode for hours outside the normal schedule. You can specify
– MIFARE: Click this button to view the MIFARE layout used by the
device. For more information about configuring MIFARE layouts,
please see section 3.6.4.7.
– iCLASS: Click this button to view the iCLASS layout used by the
device. For more information about configuring iCLASS layouts,
please see section 3.6.4.9.
– DESFire: Click this button to view the DESFire layout used by the
device. For more information about configuring DESFire layouts,
please see section 3.6.4.8.
Card ID Format
– Format Type: Set the type of pre-processing to occur on card ID
data (Normal or Wiegand). If “Normal” is selected, the card ID data
will be processed in its original form. If “Wiegand” is selected,
devices will interpret card ID data according to the Wiegand format
settings.
– Byte Order: Specify whether to swap ID card data between cards
and devices by most significant byte (MSB) or least significant byte
(LSB).
Note: The device versions 1.x and 2.x have different methods to read card
data, but BioStar corrects card data, so card data can be used in the
same way. Therefore, MSB/LSB should be set in the same way in
the device versions 1.x and 2.x. The card ID displayed by the device
may be shown as horizontally reversed, since it is displayed based
on Hexa value, but this can be ignored because card data can
nevertheless be read correctly.
– In Double mode, setting option which includes an admin user is
supported. In Double mode, door relay will not open unless an
admin user authenticates within 15 seconds after a normal user
authenticates. If this option is not activated, the door relay will open
when other two users, regardless of whether being a normal user or
an admin user.
– Use Wiegand Card Bypass: This feature makes the device to send
out Card CSN according to Wiegand setting of BioStar without
having to conduct a matching. This is designed to be used as a
dummy reader in a connection with a third party access control unit
through Wiegand. When a card data input is made, the device sends
out the data through Wiegand without going through a matching
process.
Fingerprint
– Security Level: Set the security level to use for fingerprint
authorization (Normal, Secure, or Most Secure). Keep in mind that as
the security level is increased, so too is the likelihood of a false
rejection.
– Sensitivity: Set the sensitivity of the fingerprint scanner (0 [Min] to 7
[Max]). A higher sensitivity setting will result in more easily captured
fingerprint scans, but also increases the sensitivity to external noise.
– Scan Timeout: Set the length of time before the fingerprint scanner
will timeout (1 sec to 20 sec). If a user does not place a finger on the
device within the timeout period, the authorization will fail.
– Advanced Enrollment: Checks the quality of the scanned fingerprint
to avoid the poor quality fingerprint template enrollment. The user
will be alerted when the quality of the fingerprint scanned is low and
given enrollment instructions.
– 1: N Fast Mode: Set the device to use Fast Mode to reduce the
amount of time required for matching fingerprints (Auto, Normal,
Fast, or Fastest). Setting Fast Mode to Auto will adjust the matching
speed according to the number of enrolled templates.
– Sensor Mode: If the option is set to Auto On, the sensor will
automatically go on when it detects a finger. If the option is set to
Always On, the sensor will always be on.
– View Image: Set to show or hide fingerprint images on the BioStation
A2 display (Yes or No).
– Check Fake Finger: Set the device to detect the use of fake
fingerprints, such as those made from silicon or rubber, and prevent
unauthorized access.
– Template Option: Displays the global fingerprint template settings.
For more information about fingerprint templates, see section 4.9.
!
Attention: We recommend that add the authentication events to the camera event
for security. Add only a maximum of 30 events to reduce the network load
between the device and the server.
TCP/IP Setting
– LAN Type: Select a type of LAN connection from the drop-down list
(Ethernet, or Wireless LAN).
– Port: Specify a port to use for the device.
WLAN
– Change Setting: Click to specify settings for a wireless local area
network (WLAN). This option is active only when WLAN is selected as
the TCP/IP setting. For more information about configuring settings
for a WLAN, see section 3.2.4.
IP
– Use DHCP: Click this option button to enable the dynamic host
configuration protocol (DHCP) for the device.
– Not Use DHCP: Click this option button to disable the dynamic host
configuration protocol (DHCP) for this device.
– IP Address: Specify an IP address for the device.
– Subnet: Specify a subnet address for the device.
– Gateway: Specify a network gateway.
Server
– Use: Click this option button to enable the server mode.
– Not Use: Click this option button do disable server settings.
– IP Address: Specify an IP address for the BioStar server.
– Server Port: Specify the port used to connect to the server.
– Time Sync with Server: Check this box to synchronize the device’
time with the server. The device polls for a time change on the server
every one hour and its time will be synchronized with the server when
the device’s time and the server’s time differ by more than 5 seconds.
RS485 Network
– Mode: Set the mode for a device connected via RS485 (Default, Host,
or Slave). For more information about RS485 modes, please see
sections 3.2.1 and 3.2.2.
– Baudrate: Set the baud rate for a device connected via RS485 (9600
to 115200).
Trigger
– Device: Select a device which a specific event will be monitored.
– Type: Select Input or Event.
Input: If the Type of Trigger is set to Input, can be set.
– Port: Select an input port (Input 0, Input 1, or Tamper).
– Switch: Click the option buttons to specify the normal position of the
input switch (N/O: normally open or N/C: normally closed).
– Schedule: Set the schedule during which the inputs will be monitored
(Always or No Time).
– Duration(ms): Set the duration (in milliseconds) an input signal must
last to trigger the specified action.
Event: Set the trigger event. If the Type of Trigger is set to Event, can be set.
Action
– Device: Select a device which performs the action.
– Type: Select Output or Function.
Output: If the Type of Action is set to Output, can be set.
– Port: Select an output port.
– Signal Setting: Select a signal setting that you have previously
configured from the menu bar (Option > Event > Output Port Setting).
Function: Select an action to associate with the input. If the Type of Action
is set to Function, can be set.:
– Not Use: The input port will not be monitored.
– Release All Alarms: Cancel alarms associated with this device.
– Restart Device: Restart the device.
– Disable Device: Disable the device. A disabled device will not
communicate with the BioStar server or process fingerprints or card
inputs. To enable communication again, an administrator must
provide authentication at the device.
Current Count: The total number of the user IDs and access cards that have
been registered.
Reserved : The remaining number of user IDs and access cards to be
registered.
Display/Sound
– Language: Set the language to use on the display (Korean, English, or
Custom).
– Menu Timeout: Set the length of time before the display will return to
the idle screen.
– Backlight Timeout: Set the length of time before the display goes
dim.
– Theme: set a display theme.
– Use Voice: Set the device to notify you with voice messages (Disable
or Enable).
– Resource File: Set the language resource file to use for the BioStar
interface (No Change, English, Korean, or Custom). To use a language
resource file other than English or Korean, select Custom and then
click the ellipsis (…) button to locate the resource file.
– Background: Set the type of background for the BioStation A2 display
(Logo, Notice, or Slide Show). Supported file types (JPG, GIF, BMP,
and PNG) cannot exceed 480x854 pixels each.
– Notice: Click this button to create a notice that will be shown on the
BioStation A2 display. After creating a notice, you can click Apply to
apply the notice to the current device or Apply to Others to apply the
notice to additional devices.
– Volume: Set the volume of the BioStation A2 device (0% to 100%).
– Msg Timeout: Set the length of time that a failure or confirmation
message will be displayed.
– Clock Display: Set to display the current time on the device (Enable or
Disable).
Background Image: Click this checkbox to upload new background images.
Click Add to locate and add a new image file.
Sound: Click this checkbox to enable and add custom event sounds. Click
an event from the list and then click the plus sign (+) to locate and add a
new sound file. Click Add to add new sound files, Delete to remove sound
files, or Play to preview a selected sound file.
– Not Use: Disable the time and attendance functions for this device.
– Manual: Users must press the specified key every time they enter or
leave to record their T&A events.
– Manual Fix: When a T&A key is pressed, the device will remain in that
mode until a different T&A key is pressed.
– Auto change: The device will automatically change T&A modes to
correspond with the functions specified for a time period.
– Event Fix: The device will perform only the specified T&A function.
T&A Key: Specify which keys to use for T&A events and the event types
associated with them:
– Function Key: Select a function key from the drop-down list to assign
a T&A event (F1-F4, EXT01-EXT12). If you are using the Event Fix
mode, you can click the checkbox to the right to designate a fixed
event.
– Event Caption: Enter a caption for the event.
– Auto Mode Schedule: When using the Auto Change mode, you can
specify when the event will occur by selecting a timezone in the drop-
down list. For more information on creating a timezone, please see
section 3.7.1.
– Event Type: Set the type of event to assign to the key (Not Use, Check
In, Check Out, In, or Out). In/Out indicates the general check in/out
events during a day whereas Check In/Out indicates the formal check
in/out events upon arrival and departure at work—or the first check–
in and the last check–out events on that day. When you choose
Check In or Check Out, you can enable the “Regard as normal check-
in/check-out event” option. If this option is enabled, users who
activate the appropriate keys will be regarded as arriving or leaving
on time at work even though they actually arrive late or leave early. If
you enable the “Only Result” option, they appear being on time on
T&A reports but their work time will be calculated correctly based on
their actual check in/out time. If you choose Out, you can enable the
“Add work time after this event” option. If this option is enabled, users
activating the appropriate key will be considered working for the
remainder of the time slot even if they leave the office early.
Wiegand Mode: Set the mode of Wiegand input to use when reading card ID
data (Extended). The Extended mode will allow RF card readers to operate
independently, which allows them to be associated with doors, included in
zones, and leave logs with their own device IDs.
Wiegand In/Out: Assign the Wiegand input or output:
– Wiegand (Card) In: The ID field of the Wiegand string is interpreted as
a card ID.
Device Time
– Date: Manually set the device date with a drop-down calendar.
– Time: Manually set the device time.
– Time Zone: Select the time zone you wish to use.
– Get Host PC Time: Check this box to get the time of the local PC
which BioStar client program is installed on. The time will be
displayed in the Date and Time spin boxes right below this option and
you can set the device’s time to match this time by clicking Set
Device Time.
– Get Device Time: Get the current time displayed by the device.
– Set Device Time: Set the time on the device.
Fingerprint Operation Mode
– Fingerprint: Set the device to require only fingerprint authorization
(Always, or No Time).
– Fingerprint + Password: Set the device to require fingerprint plus
password authorization (Always, or No Time).
ID Operation Mode: The drop-down lists in this area allow you to control the
authentication mode by schedule. For example, you can choose a normal
authentication mode for working hours and a more strict authentication
mode for hours outside the normal schedule. You can specify
authentication modes either by device or by user (see section 5.4.1).
Unless a particular mode is specified for a user, the device authentication
mode will apply.
– ID + Fingerprint: Set the device to require ID plus fingerprint
authorization (Always, or No Time).
– ID + Password: Set the device to require ID plus password
authorization (Always, or No Time).
– ID + Fingerprint/Password: Set the device to require ID plus
fingerprint or password authorization (Always, or No Time).
– ID + Fingerprint + Password: Set the device to require ID plus
fingerprint plus password authorization (Always, or No Time).
Card Operation Mode
– Card Only: Set the device to require only card authorization (Always,
or No Time).
– Card + Fingerprint: Set the device to require card plus fingerprint
authorization (Always, or No Time).
– Card + Password: Set the device to require card plus password
authorization (Always, or No Time).
– Card + Fingerprint/Password: Set the device to require card plus
fingerprint or password authorization (Always, or No Time).
– Card + Fingerprint + Password: Set the device to require card plus
fingerprint plus password authorization (Always, or No Time).
Other Options
– Use Wiegand Card Bypass: This feature makes the device to send
out Card CSN according to Wiegand setting of BioStar without
having to conduct a matching. This is designed to be used as a
dummy reader in a connection with a third party access control unit
through Wiegand. When a card data input is made, the device sends
out the data through Wiegand without going through a matching
process.
Fingerprint
– Security Level: Set the security level to use for fingerprint
authorization (Normal, Secure, or Most Secure). Keep in mind that as
the security level is increased, so too is the likelihood of a false
rejection.
– Sensitivity: Set the sensitivity of the fingerprint scanner (0 [Min] to 7
[Max]). A higher sensitivity setting will result in more easily captured
fingerprint scans, but also increases the sensitivity to external noise.
– Scan Timeout: Set the length of time before the fingerprint scanner
will timeout (1 sec to 20 sec). If a user does not place a finger on the
device within the timeout period, the authorization will fail.
– Advanced Enrollment: Checks the quality of the scanned fingerprint
to avoid the poor quality fingerprint template enrollment. The user
will be alerted when the quality of the fingerprint scanned is low and
given enrollment instructions.
– 1: N Fast Mode: Set the device to use Fast Mode to reduce the
amount of time required for matching fingerprints (Auto, Normal,
Fast, or Fastest). Setting Fast Mode to Auto will adjust the matching
speed according to the number of enrolled templates.
– Sensor Mode: If the option is set to Auto On, the sensor will
automatically go on when it detects a finger. If the option is set to
Always On, the sensor will always be on.
– View Image: Set to show or hide fingerprint images on the BioStation
L2 display (Yes or No).
– Check Fake Finger: Set the device to detect the use of fake
fingerprints, such as those made from silicon or rubber, and prevent
unauthorized access.
– Template Option: Displays the global fingerprint template settings.
For more information about fingerprint templates, see section 4.9.
TCP/IP Setting
– LAN Type: Select a type of LAN connection from the drop-down list
(Ethernet, or Wireless LAN).
– Port: Specify a port to use for the device.
WLAN
– Change Setting: Click to specify settings for a wireless local area
network (WLAN). This option is active only when WLAN is selected as
the TCP/IP setting. For more information about configuring settings
for a WLAN, see section 3.2.4.
IP
– Use DHCP: Click this option button to enable the dynamic host
configuration protocol (DHCP) for the device.
– Not Use DHCP: Click this option button to disable the dynamic host
configuration protocol (DHCP) for this device.
– IP Address: Specify an IP address for the device.
– Subnet: Specify a subnet address for the device.
– Gateway: Specify a network gateway.
Server
– Use: Click this option button to enable the server mode.
– Not Use: Click this option button do disable server settings.
Trigger
– Device: Select a device which a specific event will be monitored.
Current Count: The total number of the user IDs and access cards that have
been registered.
Reserved : The remaining number of user IDs and access cards to be
registered.
Display/Sound
– Language: Set the language to use on the display (Korean, English, or
Custom).
– Menu Timeout: Set the length of time before the display will return to
the idle screen.
– Backlight Timeout: Set the length of time before the display goes
dim.
– Theme: set a display theme.
– Use Voice: Set the device to notify you with voice messages (Disable
or Enable).
– Resource File: Set the language resource file to use for the BioStar
interface (No Change, English, Korean, or Custom). To use a language
resource file other than English or Korean, select Custom and then
click the ellipsis (…) button to locate the resource file.
– Background: Set the type of background for the BioStation L2 display
(Logo, Notice, or Slide Show). Supported file types (JPG, GIF, BMP and
PNG) cannot exceed 220x176 pixels each.
– Notice: Click this button to create a notice that will be shown on the
BioStation L2 display. After creating a notice, you can click Apply to
apply the notice to the current device or Apply to Others to apply the
notice to additional devices.
– Volume: Set the volume of the BioStation L2 device (0% to 100%).
– Msg Timeout: Set the length of time that a failure or confirmation
message will be displayed.
– Clock Display: Set to display the current time on the device (Enable or
Disable).
Background Image: Click this checkbox to upload new background images.
Click Add to locate and add a new image file.
Sound: Click this checkbox to enable and add custom event sounds. Click
an event from the list and then click the plus sign (+) to locate and add a
new sound file. Click Add to add new sound files, Delete to remove sound
files, or Play to preview a selected sound file.
Wiegand Mode: Set the mode of Wiegand input to use when reading card ID
data (Extended). The Extended mode will allow RF card readers to operate
independently, which allows them to be associated with doors, included in
zones, and leave logs with their own device IDs.
Wiegand In/Out: Assign the Wiegand input or output:
– Wiegand (Card) In: The ID field of the Wiegand string is interpreted as
a card ID.
Device Time
– Date: Manually set the device date with a drop-down calendar.
– Time: Manually set the device time.
– Time Zone: Select the time zone you wish to use.
– Get Host PC Time: Check this box to get the time of the local PC
which BioStar client program is installed on. The time will be
displayed in the Date and Time spin boxes right below this option and
you can set the device’s time to match this time by clicking Set
Device Time.
– Get Device Time: Get the current time displayed by the device.
– Set Device Time: Set the time on the device.
Fingerprint Operation Mode
– Fingerprint: Set the device to require only fingerprint authorization
(Always, or No Time).
Card Operation Mode
– Card Only: Set the device to require only card authorization (Always,
or No Time).
authenticates. If this option is not activated, the door relay will open
when other two users, regardless of whether being a normal user or
an admin user.
– Use Wiegand Card Bypass: This feature makes the device to send
out Card CSN according to Wiegand setting of BioStar without
having to conduct a matching. This is designed to be used as a
dummy reader in a connection with a third party access control unit
through Wiegand. When a card data input is made, the device sends
out the data through Wiegand without going through a matching
process.
Fingerprint
– Security Level: Set the security level to use for fingerprint
authorization (Normal, Secure, or Most Secure). Keep in mind that as
the security level is increased, so too is the likelihood of a false
rejection.
– Sensitivity: Set the sensitivity of the fingerprint scanner (0 [Min] to 7
[Max]). A higher sensitivity setting will result in more easily captured
fingerprint scans, but also increases the sensitivity to external noise.
– Scan Timeout: Set the length of time before the fingerprint scanner
will timeout (1 sec to 20 sec). If a user does not place a finger on the
device within the timeout period, the authorization will fail.
– Advanced Enrollment: Checks the quality of the scanned fingerprint
to avoid the poor quality fingerprint template enrollment. The user
will be alerted when the quality of the fingerprint scanned is low and
given enrollment instructions.
– 1: N Fast Mode: Set the device to use Fast Mode to reduce the
amount of time required for matching fingerprints (Auto, Normal,
Fast, or Fastest). Setting Fast Mode to Auto will adjust the matching
speed according to the number of enrolled templates.
– Sensor Mode: If the option is set to Auto On, the sensor will
automatically go on when it detects a finger. If the option is set to
Always On, the sensor will always be on.
– Check Fake Finger: Set the device to detect the use of fake
fingerprints, such as those made from silicon or rubber, and prevent
unauthorized access.
– Template Option: Displays the global fingerprint template settings.
For more information about fingerprint templates, see section 4.9.
TCP/IP Setting
– LAN Type: Select a type of LAN connection from the drop-down list
(Ethernet).
– Port: Specify a port to use for the device.
IP
– Use DHCP: Click this option button to enable the dynamic host
configuration protocol (DHCP) for the device.
– Not Use DHCP: Click this option button to disable the dynamic host
configuration protocol (DHCP) for this device.
– IP Address: Specify an IP address for the device.
– Subnet: Specify a subnet address for the device.
– Gateway: Specify a network gateway.
Server
– Use: Click this option button to enable the server mode.
– Not Use: Click this option button do disable server settings.
– IP Address: Specify an IP address for the BioStar server.
– Server Port: Specify the port used to connect to the server.
– Time Sync with Server: Check this box to synchronize the device’
time with the server. The device polls for a time change on the server
every one hour and its time will be synchronized with the server when
the device’s time and the server’s time differ by more than 5 seconds.
RS485 Network
– Mode: Set the mode for a device connected via RS485 (Default, Host,
or Slave). For more information about RS485 modes, please see
sections 3.2.1 and 3.2.2.
– Baudrate: Set the baud rate for a device connected via RS485 (9600
to 115200).
Trigger
– Device: Select a device which a specific event will be monitored.
– Type: Select Input or Event.
Input: If the Type of Trigger is set to Input, can be set.
Current Count: The total number of the user IDs and access cards that have
been registered.
Reserved : The remaining number of user IDs and access cards to be
registered.
Event: Specify the affected event by selecting it from the drop-down list.
LED: Set the LED behavior for a specified event.
– Count: Enter a number of LED cycles for the specified event. Enter “0”
to enable an infinite loop or “-1” to disable the LED.
– Colors: Specify up to three display colors from the drop-down list.
The LED will cycle through these colors in order, from top to bottom.
Next to each color, enter the duration (in milliseconds) that the LED
should display the selected color and the duration (in milliseconds)
that the LED should remain off before advancing to the next color in
the cycle.
Buzzer: Set the buzzer behavior for a specified event.
– Count: Enter a number of buzzer cycles for the specified event. Enter
“0” to enable an infinite loop or “-1” to disable the buzzer.
– Volume: Set up to three tone volumes from the drop-down list (Low,
Middle, or High). The buzzer will cycle through these volumes in
order, from top to bottom. Next to each volume, enter the duration (in
milliseconds) that the buzzer should maintain the selected volume
and the duration (in milliseconds) that the buzzer should remain off
before advancing to the next volume in the cycle.
Fade Out: Set the tone volume to fade out before advancing to the next
volume in the cycle by clicking this checkbox.
Wiegand Mode: Set the mode of Wiegand input to use when reading card ID
data (Extended). The Extended mode will allow RF card readers to operate
independently, which allows them to be associated with doors, included in
zones, and leave logs with their own device IDs.
Wiegand In/Out: Assign the Wiegand input or output:
– Wiegand (Card) In: The ID field of the Wiegand string is interpreted as
a card ID.
!
Attention: A 2.x device (BioStation A2, BioStation 2, BioStation L2, BioEntry W2) cannot
configure the door together with a 1.x device (BioStation, BioEntry Plus, BioEntry W, BioLite
Net, Xpass, Xpass S2, X-Station, BioStation T2, FaceStation).
– Minimum Input Duration: This feature can be activated from ‘Details’ tab in the door
setting. When this option is in use, the device accepts input signal only when the
signal continues more than a certain period of time designated by the FW fix. This
option is activated with the latest FW and shown Use or Not Use.
Note: Supported Firmware Versions: BioStation 1.93, BioStation T2 1.3,
FaceStation 1.3, BioEntry Plus 1.6, BioEntry W 1.2, BioLite Net 1.4, Xpass 1.3.
Action
– Program Sound: Activate and select a sound from the drop-down list to be
emitted by the BioStar program. Then, specify the duration (“play count”) of the
sound in seconds. If you set the Play Count to 0, the specified sound will play until
someone with administrative privileges manually stops the sound via the Realtime
Monitoring tab in the Monitoring pane. To add custom sounds to the list, see
section 3.10.1.2.
– Device Sound: Activate and select a sound to be emitted by devices connected to
the door.
– Send Email: Activate and setup emails to be sent by the system. For more
information about sending alert emails, see section 3.10.2.
– Output Device: Activate and select a device to output an alarm signal.
– Output Port: Select an output port to use when sending the alarm signal.
– Output Signal Setting: Select an output signal to send.
!
Attention: A 2.x device (BioStation A2, BioStation 2, BioStation L2, BioEntry W2) cannot
configure a zone together with a 1.x device (BioStation, BioEntry Plus, BioEntry W, BioLite
Net, Xpass, Xpass S2, X-Station, BioStation T2, FaceStation). Also, BioStation A2,
BioStation 2, BioStation L2 and BioEntry W2 can configure only a dual access device zone
and a fire alarm zone.
Action
– Program Sound: Activate and select a sound from the drop-down list
to be emitted by the BioStar program. Then, specify the duration
(“play count”) of the sound in seconds. If you set the Play Count to 0,
the specified sound will play until someone with administrative
privileges manually stops the sound via the Realtime Monitoring tab
in the Monitoring pane. To add custom sounds to the list, see section
3.10.1.2.
– Device Sound: Activate and select a sound to be emitted by devices
connected to the door.
– Send Email: Activate and setup emails to be sent by the system. For
more information about sending alert emails, see section 3.10.2.
– Output Device: activate and select a device to output an alarm signal.
– Output Port: Select an output port to use when sending the alarm
signal.
– Output Signal: Select an output signal to send.
Entrance Limit Zone Setting: Click the checkbox to enable an entrance limit
setting, and then specify the effective hours for the entrance limit.
Max Number of Entrance: Set the maximum number of entries allowed
during the specified time limit.
Timed APB (min): Specify a time limit for re-entry into a zone.
In case of Disconnected: Set how doors in the zone should behave if
communication is lost between the master and member devices.
Action
– Program Sound: Activate and select a sound from the drop-down list
to be emitted by the BioStar program. Then, specify the duration
(“play count”) of the sound in seconds. If you set the Play Count to 0,
the specified sound will play until someone with administrative
privileges manually stops the sound via the Realtime Monitoring tab
in the Monitoring pane. To add custom sounds to the list, see section
3.10.1.2.
– Device Sound: Activate and select a sound to be emitted by devices
connected to the door.
– Send Email: Activate and setup emails to be sent by the system. For
more information about sending alert emails, see section 3.10.2.
!
Attention: Arm/disarm cannot be set for a door or a zone configured with BioStation A2,
BioStation 2, BioStation L2 and BioEntry W2.
Delay (sec)
– Arm: Set the length of time (in seconds) to delay before arming the
zone.
– Disarm: Set the length of time (in seconds) to delay before disarming
the zone.
Arm/Disarm Type: Specify settings for arming or disarming zones. For more
information for configuring arm and disarm settings, see 3.5.2.5. For more
information on setting up alarms, see section 3.10.
External Input/Out: Specify settings for enabling the BioStar system to
antomatically arming or disarming zones. For more information on
configuring external input/output settings, see 3.5.2.6. For more
information on setting up alarms, see section 3.10.
Action
– Program Sound: Activate and select a sound from the drop-down list
to be emitted by the BioStar program. Then, specify the duration
(“play count”) of the sound in seconds. If you set the Play Count to 0,
Action
– Program Sound: Activate and select a sound from the drop-down list
to be emitted by the BioStar program. Then, specify the duration
(“play count”) of the sound in seconds. If you set the Play Count to 0,
the specified sound will play until someone with administrative
privileges manually stops the sound via the Realtime Monitoring tab
in the Monitoring pane. To add custom sounds to the list, see section
3.10.1.2.
– Device Sound: Activate and select a sound to be emitted by devices
connected to the door.
– Send Email: Activate and setup emails to be sent by the system. For
more information about sending alert emails, see section 3.10.2.
– Output Device: Activate and select a device to output an alarm signal.
– Output Port: Select an output port to use when sending the alarm
signal.
– Output Signal: Select an output signal to send.
Muster Zone Type: By default, set to Manual. You can check for the people
who were present in a specified area for a specific time period. Please see
4.1.1 to see how to manually check attedance of people.
Tracking Time (hour): Specify how far (in hours) people are monitored for
their in/out activities in the zone. For example, if you set this value to 8,
you can track a record of attendace since 8 hours ago.
Door 1: Click the ellipsis (…) button to select door 1 of the interlock area.
Doors without associated devices cannot be added to the interlock zone.
Door 2: Click the ellipsis (…) button to select the device on door 2 of the
interlock area. Doors without associated devices cannot be added to the
interlock zone.
Card Type: Select a type of access card to issue (Mifare CSN, Mifare Template, EM
4100, HID Prox, iCLASS CSN, or iCLASS Template).
Card ID: Displays the card ID number when a card is issued.
Custom ID: Enter a custom ID for the card.
Technical Support
If you have any questions regarding this document or BioStar software, please contact technical
support at [email protected].
Please provide the following information for prompt and easy assistance:
Version of BioStar and device model name (e.g. BioStar 1.92, BioStation 2)
Open Licenses
AES
FIPS-197 compliant AES implementation Copyright (C) 2006-2007 Christophe Devine
This library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License,
version 2.1 as published by the Free Software Foundation.
This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public License along with this library; if not, write to the Free
Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
The AES block cipher was designed by Vincent Rijmen and Joan Daemen.
http://csrc.nist.gov/encryption/aes/rijndael/Rijndael.pdf
http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
MD5
MD5C.C - RSA Data Security, Inc., MD5 message-digest algorithm
Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved.
License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc. MD5 Message-
Digest Algorithm" in all material mentioning or referencing this software or this function.
License is also granted to make and use derivative works provided that such works are identified as "derived from the RSA
Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing the derived work.
RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability of
this software for any particular purpose. It is provided "as is" without express or implied warranty of any kind.
These notices must be retained in any copies of any part of this documentation and/or software.
OpenSSL
LICENSE ISSUES
===========
The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay
license apply to the toolkit.
See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues
related to OpenSSL please contact [email protected].
OpenSSL License
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following
conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer
in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment:
"This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this
software without prior written permission. For written permission, please contact [email protected].
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior
written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment:
"This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
====================================================================
This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following
conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL
documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson
([email protected]).
Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed.
If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used.
This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the
package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following
conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer
in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
"This product includes cryptographic software written by Eric Young ([email protected])"
The word 'cryptographic' can be left out if the rouines from the library being used are not cryptographic related :-).
4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must
include an acknowledgement:
"This product includes software written by Tim Hudson ([email protected])"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this
code cannot simply be copied and put under another distribution licence [including the GNU Public Licence.]
SHA-256
FIPS-180-2 compliant SHA-256 implementation
Copyright (C) 2006-2007 Christophe Devine
This library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License,
version 2.1 as published by the Free Software Foundation.
This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public License along with this library; if not, write to the Free
Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
Glossary
access card: A card that can be used to grant or restrict access to a specific area. BioStar supports
MIFARE® , EM4100, HID proximity, iCLASS® , and FeliCa® cards. See also: proximity card.
access control system: A system of physical mechanisms and controls that permit or deny access to
a particular resource or physical area. BioStar is an IP-based biometric access control system.
alarm zone: A grouping of devices that is used to protect a physical area. BioStar monitors input
points in an alarm zone and triggers alarms when intrusion or tampering is detected.
anti-passback: A security protocol that prevents a user from providing unauthorized entrance to
another user via an access card or fingerprint. See also: timed anti-passback.
biometrics: Biometrics refers to the use of physical characteristics for verification or authorization.
BioStar incorporates Suprema’s award-winning fingerprint recognition technology to provide
biometric authentication of a user's identity and authorization to gain access to restricted areas.
bypass group: A group of users that can bypass normal restrictions for a zone.
client: BioStar client software allows an operator to connect remotely to the BioStar server and
control connected devices. An operator ID and password are required to access the system via a
client.
department: A division of an organization used to group employees. The use of departments is not
necessary, but may be helpful to organize large numbers of employees.
device: In this guide, the word "device" refers to any Suprema product supported by the BioStar
system. Supported devices include BioStation, BioStation Mifare, BioStation HID, DStation, BioEntry
Plus/BioEntry W, BioEntry Plus Mifare/BioEntry W Mifare, BioEntry Plus iCLASS, BioEntry Plus HID,
BioLite Net, Xpass, and BioMini USB terminals, as well as the Secure I/O device.
distributed intelligence: In the BioStar system, the authorization database is distributed to each
terminal, so that authorization is faster and can continue even when other parts of the system are
offline.
door: Doors are the physical barriers that provide entry into a building or space. At least one device
must be connected to a door to provide access control, but two devices can be connected to support
anti-passback and other features, such as door relays, alarm relays, exit switches, and sensors.
duress finger: This term refers to an enrolled fingerprint that will activate silent alerts when a
candidate is under duress. In the typical duress scenario, a perpetrator forces the candidate to gain
access by force or threat of harm. The candidate gains access by means of his or her "duress finger,"
which allows access and simultaneously triggers the alarm or alert actions you specify.
enrollment: The process of creating a user account and capturing images of fingerprints or issuing
access cards.
entrance limit: The maximum number of times a user can gain authorization to a specific area. The
entrance limit can be related to a time period so that users are limited to certain number of entries
during office hours, for example.
ESSID: Extended Service Set ID. The ESSID is the name of a wireless network access point. It allows
one wireless network to be clearly distinguishable from another. ESSID is one type of SSID (the other
being BSSID).
face recognition -The automated process of validating a claimed identity based on the image of a
face. BioStar extracts and analyzes the facial features such as the skin texture and the shapes of the
face, eyes, nose and mouth from a captured face image and compares them with those of all the
registered persons.
false acceptance rate: The false acceptance rate (FAR) is a measure of the likelihood that a biometric
security system will incorrectly accept an access attempt by an unauthorized user. A system's FAR
typically is stated as the ratio of the number of false acceptances to the number of identification
attempts.
false rejection rate: The false rejection rate (FRR) is a measure of the likelihood that a biometric
security system will incorrectly reject an access attempt by an authorized user. A system's FRR is
typically stated as the ratio of the number of false rejections to the number of identification attempts.
fingerprint recognition -The automated process of matching two human fingerprints: one previously
recorded and one being provided by a user for authentication. BioStar incorporates Suprema's
award-winning algorithms for recognizing fingerprints.
fingerprint sensor: A fingerprint sensor is an electronic device used to capture a digital image of the
fingerprint pattern. The captured image is called a live scan. This live scan is digitally processed to
create a biometric template (a collection of extracted features) which is stored and used for
fingerprint recognition.
fire alarm zone: A zone that is used to interface with fire alarms and control doors when a fire is
detected.
host: A host is the device that serves as the master in a RS485 network. The host device relays data
packets between external devices (or a larger network) and slave devices connected to the RS485
network.
input signal: The signal sent to a device by an external object, such as an exit button.
operator: Operators are personnel who have rights to use BioStar clients. BioStar includes three pre-
defined classes for operators: administrators, operators, and managers. BioStar also supports a
maximum of 16 custom operator classes.
output signal: The signal sent to an external device, such as an alarm siren or electronic door strike.
proximity card: Proximity cards (or "prox" cards) are contactless integrated circuit devices used for
security access. BioStation, BioEntry Plus, and BioLite Net devices support EM4100 cards; BioStation
Mifare, BioEntry Plus Mifare, BioEntry W Mifare and BioLite Net, and DStation devices support
MIFARE and iCLASS cards; and BioStation HID and BioEntry Plus HID devices support HID proximity
cards.
RF device: Short-range radio frequency devices used to gain access to doors. The BioStar system
allows 3rd party RF devices to be added to the system to incorporate existing hardware into the
access control configuration
time and attendance (T&A): This designation refers to the processes and functions that monitor and
report check-in and check-out activities by employees and allow administrators to define time slots
and schedules. The information collected by the BioStar system can be used in conjunction with
external systems for time reporting and payroll capabilities.
timed anti-passback: A security protocol that prevents reauthorization of a user for a specified period
of time. See also: anti-passback.
timezone: A customizable schedule that can be used to allow or restrict access during specified
hours. Timezones can combined with doors to create access groups.
user: A user is any person who has access rights. A user's access rights are comprised of individual
rights (user level), membership in access groups, and time restrictions.
Wiegand interface: The Wiegand interface is a wiring standard used to connect a card swipe
mechanism to the rest of an electronic entry system. The interface uses three wires, one of which is a
common ground and two of which are data transmission wires usually called DATA0 and DATA1, but
sometimes also labeled Data High and Data Low.
zone: A zone consists of two or more devices that are grouped together. BioStar includes seven types
of zone classifications.
anti-passback zone
A Access Group tab, 286
access cards Alarm tab, 285
issuing, 83 Details tab, 285
E fingerprints
activating encryption, 148
EM4100 cards, 84 changing template, 149
email notifications, 112 image quality, 153
registering, 79, 81
entrance limit setting, 156, 207, 208, 222,
security level, 153, 219, 232, 246, 256, 266,
235, 236, 248
275
entrance limit zone sensitivity, 153, 219, 232, 246, 256, 266,
Access Group tab, 288 275
Alarm tab, 287 sensor placement, 79
Details tab, 287 server matching, 154, 166, 177
event logs fire alarm zone
viewing from the monitoring pane, 127, 128 Alarm tab, 291
event views Details tab, 290
changing, 31, 32
H
events
real-time monitoring, 122 HID proximity cards, 85
uploading logs to BioStar, 126
holiday schedules, 97
viewing logs, 125
viewing logs in panes, 126 host device
adding, 40
external devices
configuring inputs, 116
configuring outputs, 115
I
iClass CSN cards, 86
F iClass layout
face image editing, 92
capture, 81 Input tab
FaceStation BioEntry Plus, 169
configuring, 53 BioEntry W, 169
BioEntry W2, 277
FaceStation BioLite Net, 180
overview, 11
BioStation, 156
BioStation 2, 248
S timezones
adding holidays, 97
Secure I/O creating, 96
overview, 12
toolbar, 31
Secure I/O 2
overview, 10 U
Server Settings, 155, 207, 221, 234, 247, users
258, 267, 276 adding new information fields, 136, 137,
site keys 138
changing, 88 Card tab, 298
creating accounts, 76
support, 299
customizing information fields, 138
system requirements, 20 deleting, 136
deleting all via command cards, 137
T deleting an individual via command cards,
136
T&A mode
Details tab, 295
BioEntry Plus, 168
enrolling via command cards, 81
BioEntry W2, 280
exporting data, 139
BioLite Net, 184
Face tab, 297
BioStation 2, 251
Fingerprints tab, 297
BioStation A2, 261
importing data, 140
BioStation L2, 271
merge user data imported from the device,
D-Station, 227, 241
94
Xpass, 189, 198
modifying information fields, 139
X-Station, 213
registering fingerprints, 78
T&A tab retrieving data from device, 93
BioEntry W2, 280 synchronize all, 93
BioLite Net, 184 T&A tab, 298
BioStation, 161 transfer to device, 92
BioStation 2, 251 transferring to other departments, 138
BioStation A2, 261
BioStation L2, 271 V
BioStation T2, 227
FaceStation, 241 visual map
X-Station, 213 creating, 129