36 DOCUMENT SSE-0000077399-01 - VERSION 1.0 - MAY 2010
S
AGEM SÉCURITÉ DOCUMENT - REPRODUCTION AND DISCLOSURE PROHIBITED
Access control presentation MORPHOACCESS® J SERIES – User Guide
This mode is used when the whole access right check process is fully monitored
by an external device (such as a PC). It means that the local access control
application of the terminal is not used, but only the biometric features
(identification, authentification) and the user input/output features (the
contactless card reader). In that case, the access control application is in the
external device.
Figure 4 • 7:Proxy mode
Section Terminal configuration gives more information about remote
management.
Please refer to MorphoAccess
®
Host System Interface Specification for a
complete description of TCP orders possibilities.
Proxy order:
• Identification
• Verification
• Relay activation
• Read card
• ...