- I -
Contents
1. Before Start..............................................................................................1
2. Menu tree.................................................................................................5
3. Basic Concepts......................................................................................... 7
3.1 User Enrollment.................................................................................. 7
3.2 User Identification/Verification ..........................................................8
3.3 Threshold............................................................................................8
3.4 User ID Numbers.............................................................................. 10
3.5 Privilege (status) Levels ...................................................................10
3.6 Start-up window................................................................................ 11
4.Getting Start...........................................................................................12
4.1 Enrolling Users.................................................................................12
4.1.1 Fingerprint Enrollment ..............................................................13
4.1.2 Password Enrollment................................................................. 14
4.1.3 Fingerprint & Password............................................................. 16
4.1.4 Enroll ID ★..............................................................................17
4.1.5 Enroll HID Card ★ .................................................................. 19
4.1.6 Enroll Mifare Card★.................................................................20
4.2 Testing an Enrollment....................................................................... 22
4.3 Enrolling a Auxiliary Fingerprint of User......................................... 22
4.4 Authentication type...........................................................................23
4.4.1 Fingerprint authentication..........................................................23
4.4.2 Password authentication ............................................................27