DOCUMENT SSE-0000077399-01 - VERSION 1.0 - MAY 2010 47
S
AGEM SÉCURITÉ DOCUMENT - REPRODUCTION AND DISCLOSURE PROHIBITED
MORPHOACCESS® J SERIES – User Guide Access control by authentication
ACCESS CONTROL BY
AUTHENTIFICATION
ACCESS CONTROL BY
AUTHENTIFICATION
ACCESS CONTROL BY
AUTHENTIFICATION
ACCESS CONTROL BY
AUTHENTIFICATION
ACCESS CONTROL BY
AUTHENTIFICATION
ACCESS CONTROL BY
AUTHENTIFICATION
Required tags on card
Card structure is described in MorphoAccess
®
Contacless Card Specification.
Authentication with template in local database and user ID on
contactless card
In this mode, only the ID (IDentifier) is read on the card. If the ID exists in the
biometric database, the MorphoAccess
®
performs an authentication using the
biometric templates associated to this ID.
The ID can be stored into a TLV structure (typically a card encoded by
MEMS™) or directly read at a given offset of the card (binary ID).
ASCII User ID included in a TLV structured data
The user’s identifier must be stored into a TLV structure.
A user's record with the same User ID and user's fingerprint templates must
exist in the local database of the MorphoAccess
®
terminal.
To start the authentication process, the user presents his card to the terminal.
ID
Card
Mode
PK1 PK2 PIN BIOPIN
Authen PK
contactless
Yes No Yes Yes No No
Authentication with templates (PK) on contactless local
database
app/bio ctrl/authent ID contactless 1
ASCII identifier in tagged structure
app/contactless/data format 0
app/contactless/data length 0
app/contactless/data offset 0