Cross Match® Technologies, Inc.
Version 1.0 (February 2014) © Copyright 2014, Cross Match Technologies. All rights reserved. Specifications are subject to change without prior notice. Cross Match Technologies assumes no liability for maloperation or improper use of products. Cross Match® and D SCAN® are registered trademarks, and the CROSS MATCH TECHNOLOGIES logo is a trademark, of Cross Match Technologies, Inc.
Contents Introduction Appropriate Operation ..................................................................................................................1-1 Who should read this book ...........................................................................................................1-1 How this book is arranged ............................................................................................................1-1 Standards .................................................................
The options page .................................................................................................................... 3-10 Global result settings ......................................................................................................... 3-10 Workflow settings .............................................................................................................. 3-10 Barcodes to read ........................................................................................
Industry Canada 2 Statement of Compliance 2 Recycling information 3 WEEE Directive 3 Safety when operating 3 Glossary 4 Installation 1 D SCAN AUTHENTICATOR 1 Front view 2 Back view 3 Product label 3 System requirements 4 Operating system 4 Hardware 4 Installation 5 Remove the contents 5 List of contents 5 Prepare to use 5 Connect the Authenticator 5 The Authenticator status lights 7 Attach the Authenticator to a surface 8 Prepare the installation 8 Installation 8 Drill template 11 How to use the D SCAN Auth
Problems and Corrections 1 The Authenticator does not work 1 Authenticator disconnected during operation 1 Initialization failed 1 Dark image sections 2 Visualization and processing speed too slow 2 Creating a problem report 2 Customer Care and Contact Information 1 Technical Support 1 E-mail 1 Telephone and facsimile 1 Return and repair of the D SCAN AUTHENTICATOR 2 Delivery costs 2 The product is in the warranty period 2 Customers inside the EU 2 The product is not in the warranty period 2 Contact informa
Figures Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure 2.1: D SCAN Authenticator front view ............................................................................2-2 2.2: D SCAN Authenticator document holder ................................................................2-2 2.3: D SCAN Authenticator back view ...................................................
RFID data groups page 9 Barcode page 10 RFID check results page 10 Options page 11 Clean the document support area 1 x D S CA N ® A U THE N TI CA TOR User M a nu al v1.
Tables Table 1.1: Glossary of terms .......................................................................................................1-4 Table 2.1: Front features .............................................................................................................2-2 Table 2.2: Back features ..............................................................................................................2-3 Table 2.3: Default LED indications ........................................................
xii D SCAN®
1 Introduction Chapter 0 Appropriate Operation The D SCAN® AUTHENTICATOR captures color images and reads full pages to capture and transmit personal and document data. The device can capture an entire data page from any ID document in different types of light. The device can read the RFID data contactless found on the RFID tag. It is intended for the use in an IT-devices environment and the operation and installation must be in connection with suitable computer equipment.
I nt r o d u c ti o n Warning DANGER A Warning describes an action that can cause injury or loss of life. Mechanical damage can occur. A Warning describes an action or condition that causes injury or loss of life. Mechanical damage can occur. FCC statement FCC ID: WO8RJ1479 This device complies with Part 15 of the FCC Rules.
Introduction Declaration of Conformities may be directly obtained from Cross Match Technologies GmbH. Recycling information Cross Match Technologies recommends that customers dispose of their used computer hardware, monitors, printers and other peripherals in an environmentally sound manner. Potential methods include reuse of parts or whole products and recycling products, components and/or materials.
I nt r o d u c ti o n Warning Do not look directly into the lights of the document contact area. Maintain a required minimum distance of not less than 0.3 meters. Glossary This section contains some terms that are used in this manual. Table 1.1 Glossary of terms Term Definition Barcode A means of storing data as a pattern of lines or dots. DIN Deutsches Institut für Normung e.V. und deutsche Industrie-Norm (German Institute for Standardization and Industrial Standard Specification).
Introduction Table 1.1 Glossary of terms Term Definition Kensington Also called a K-Slot or Kensington lock, is a small hole found on almost all Security Slot small or portable computer and electronics equipment, particularly on expensive and relatively light ones. It is used for attaching a lock, in particular those from Kensington Computer Products Group, who are its originators.
I nt r o d u c ti o n Table 1.1 Glossary of terms Term Definition UV Ultraviolet (UV) light is represented in the light spectrum as light with a wavelength of 200nm to 400nm. The UV spectrum is divided into three regions: the near ultraviolet, the far ultraviolet, and the extreme ultraviolet, all of which are present in natural sunlight. These waves are invisible to the human eye. VIZ Visual Inspection Zone. Those portions of the MRTD (data page in the case of MRP) designed for visual inspection, i.e.
2 Installation Chapter 0 THIS CHAPTER DESCRIBES THE D SCAN AUTHENTICATOR AND HOW TO INSTALL THE DOCUMENT AUTHENTICATION READER. D SCAN AUTHENTICATOR The D SCAN Authenticator is a compact full-page document reader. Some of the following characteristics require additional software functions which might be contained in D SCAN Extensions or are project-specific.
Front view 1 3 2 7 6 5 4 Figure 2.1 D SCAN Authenticator front view Table 2.1 Front features # Description 1 Ambient light cover. The cover reduces outside light during operation and protects the document contact area. 2 Document support area. The glass bearing surface where you put the documents to verify. The entire document support area is covered by the RFID antenna. 3 Document holder. The holder keeps large documents in position during reading process, see Figure 2.2 for example.
3 Figure 2.2 D SCAN Authenticator document holder Back view 5 1 4 Figure 2.3 D SCAN Authenticator back view Table 2.1 Back features 3 2 # Description 1 Kensington security slot. Used to secure the unit in place with a key and attached through a rubberized metal cable. The end of the cable has a small loop which allows the whole cable to be looped around a permanent object, such as a heavy table, to secure it in place. 2 Power connector.
• The Manufacturer, • The Product Name, • The Model Number, • The Serial Number, • The Connection Values, • The FCC Compliance, • The CE Compliance, • Other Certification Symbols. The Version No. indicates the revision number of the device. Below the barcode abbreviations are used, which indicates the installed options. • L - UV light • R - RFID reader • M - Magnetic Stripe Reader • S - Smart Card Reader Figure 2.
Installation This section describes how to install the D SCAN Authenticator. Remove the contents Note Keep all original materials in the event you return the document reader. Remove all the contents from the product package. List of contents The following items are included in the product package: D SCAN Authenticator document authentication reader • External power supply unit • Shielded and TID certified USB 2.
. 1a 3 2 Figure 2.5 4 1 D SCAN Authenticator connectors Connect the USB 2.0 cable (2). Use only a shielded and TID certified cable. . Figure 2.6 5 USB certification labels Connect the power supply to the AC electrical outlet. Note Before you connect the D SCAN Authenticator to the USB port of your computer you must install the D SCAN Essentials software. The software provides the required hardware drivers during the D SCAN Authenticator installation.
The Authenticator status lights Four LEDs on the Authenticator give status and feedback to the user during the document reader operation. They are used to show the operator process and quality checking information and can occur either as steady or flashing indications. The following section explains the default status light indications. Your software controls how the status lights can be used in different methods. However the operation of the D SCAN Authenticator is always the same.
Background correction images created during manufacturing are stored on the Authenticator. However they will be stored automatically on the connected computer during the boot process. Each set of background correction images stored on the computer is overwritten with the new one when: • You connect a new Authenticator or one returned from service. • You replace the computer connected to the Authenticator. Also during the boot procedure of the Authenticator a self-calibration of the device is processed.
1 Figure 2.10 Mount points 1 Use M4 metric screws to fasten the Authenticator. The mount points on the document reader are 0.295 inches (7.5 mm) deep. Caution Make sure that the screws do not extend more than 0.295 inches (7.5 mm) above the surface. Longer screws will damage the bottom of the device. 2 Attach the device to the surface with the four screws. Figure 2.11 Fasten the Authenticator 1 You have completed the procedure.
drill diameter 4.5 mm 2-10 D SCAN ® A UT HE NT IC A T O R U s er M a nu al v 1.
Drill template scale 1:1, use a borderless print method Note Do not choose the option in the printer properties dialogue.
2-12 D SCAN ® A UT HE NT IC A T O R U s er M a nu al v 1.
3 How to use the D SCAN Authenticator Chapter 0 THIS CHAPTER DESCRIBES THE FIELDS OF APPLICATION, THE CHARACTERISTICS OF DOCUMENTS AND HOW TO READ A DOCUMENT WITH THE D SCAN AUTHENTICATOR USING THE D SCAN EXTENSIONS DEMO APPLICATION. Applications and software levels The D SCAN AUTHENTICATOR is available with two software levels, the D SCAN Essentials and D SCAN Extensions to allow easy integration into existing systems on different levels of completeness.
• Verification of ID documents • Search against blacklists • Transaction automation Hotels • Check-in • Automated check-in for pre-registered guests • Reading personal data from ID documents of guests and transmitting to authorities Border control • Automated border control • Authentication of ID documents • Providing reliable and efficient border control Mobile Communications • ID verification of customers • Search against blacklists • Contract automation Characteristics of documents General properties of
23.2 (0.91) document width Figure 3.1 The machine readable zone The document support area of the D SCAN Authenticator goes beyond the ICAO-MRZ. In customer specific applications, it is also possible to read zones outside the MRZ of documents which do not meet the requirements of ICAO Doc 9303 as long as the physical conditions (font, size, printing quality, lamination, etc.) of the document to be inspected allow this.
Smart cards The smart card reader is an optional feature. The corresponding slot is on the right top. It is the shorter slot (3) and is labeled with an icon. Grasp the smart card so that the chip of the card faces to the outside. 2 Move the smart card in the slot at an angle of 45 degrees until it stops. 1 3 45° Figure 3.3 Insert a smart card Magnetic stripe cards The magnetic stripe card reader is an optional feature. The corresponding slot is on the right top.
The D SCAN Authenticator is easy to use: 1 Turn on the D SCAN Authenticator. 2 Turn on your computer. 3 Start the D SCAN Show Case application. The software initializes the D SCAN Authenticator and switches it to the Ready to scan mode. • Depending on the performance of your computer, start-up can take a few moments. 1 Figure 3.5 Launching application • After successful initialization the Overview window appears. The green status light (1) is on and indicates the Ready to scan mode.
6 4 5 Figure 3.7 Overview data page All data submitted to the computer are displayed on the computer screen. • The upper part (4) shows the captured visible data, printed on the document. • The lower part (5) shows the chip data stored on the RFID tag. This allows you to compare both data sections manually. • An optional status icon (6) is shown on the right side.and indicates the operator quality checking information. This option can be disabled or enabled on the Options page.
7 8 Figure 3.8 Failed verification The camera pictures page The Camera pictures page shows all available images captured under different illuminations depending on the features installed in the document reader. The upper image is the Master image. It allows the operator to mark an area of interest with the mouse cursor. To mark an area: 1 Move the cursor to the desired position and press the left mouse button. 2 With the left mouse button pressed, draw a frame (1).
1 Figure 3.9 Camera pictures page The images page The Images page displays all available images in full screen resolution captured under different illuminations depending on the features installed in the document reader. 1 To select a single image click the down arrow in the Select box and chose the desired type of image from the list (1). 2 To view all images in sequence click on the left or right arrow (2) in the right upper corner of the image and scroll through all available images.
The RFID data groups page The RFID Data groups page displays all data groups in the Hex-Format found on the RFID tag. To select a single data group click the down arrow in the Select box and select the desired type of data group from the list (1). • If no RFID data is available the Select box is grayed out. 2 To view all data groups in sequence click on the left or right arrow (2) in the right upper corner and scroll through all available data groups.
1 2 Figure 3.12 Barcode page The RFID check results page The RFID Check Results page shows the results of all performed security checks during processing the document. It may helpful to find out the reason for a failed security check. • Green colored entries indicate successful security checks. • Entries in red color indicate mistakes or failed security checks. • The orange color indicates security checks or features which are not supported. 1 Use the scroll bar (1) to view longer lists.
The D SCAN Authenticator is ready to process the next document. The options page The Options page allows changes to the default settings of the program and to the appearance of functions. Figure 3.14 Options page Global result settings Two icons are used to show the operator quality checking information. The function to display the icons can be enabled or disabled and applies only for ID documents with MRZ.
takes. Barcodes to read Set the checkmark for the barcodes to read. Glare reduction mode settings The glare reduction feature is not supported by the Authenticator device. Extended length read mode This mode allows the device to read more than 255 Bytes. Use flex detection The Authenticator can be configured to process documents placed on the document support area with different detection modes. • Device depended detection. This setting is the default setting to process documents placed on any position.
4 Maintenance Chapter 0 THIS CHAPTER DESCRIBES MAINTENANCE PROCEDURES THAT INCREASE THE LIFE OF THE DOCUMENT READER. Cleaning Check the condition of the document support area each day. A clean document support area is required for proper operation. It avoids the transfer of communicable diseases and prevents dirt from reducing the image quality of the processed document. To clean the document support area use Alcohol Prep Pads or glass cleaning pads.
To remove smudges, finger prints or other dirt, and grime: 1 Use a damp, soft, lint-free cloth. 2 Wipe the case. 3 Allow the outside surface to dry before the capture process is started. Warning Before you clean the case, disconnect the D SCAN Authenticator from the grounded outlet. D SCAN AUTHENTICATOR specifications Table 4.
5 Problems and Corrections Chapter 0 THIS CHAPTER CONTAINS COMMON PROBLEMS AND STEPS TO CORRECT THEM. Do the procedures in this section before you contact the Cross Match Technical Support department. The Authenticator does not work The error messages displayed: None. The yellow processing light is flashing. First actions to correct the problem Test the electrical outlet to ensure that the electrical outlet is working. 2 Check the correct installation of the power supply.
First actions to correct the problem Verify the USB cable is correctly connected to the computer. 2 Initialize the Authenticator. 1 More actions to correct the problem Restart the computer. 2 Initialize the Authenticator again. 3 Contact the Technical Support department. 1 Dark image sections The error messages displayed: None First actions to correct the problem Clean the document support area. 2 Make sure that you have no direct light exposure on the processing surface.
6 Customer Care and Contact Information Chapter0 THIS CHAPTER CONTAINS TECHNICAL SUPPORT INFORMATION FOR THE PRODUCT AND CONTACT INFORMATION FOR THE COMPANY. Technical Support The Technical Support department is available for the D SCAN Authenticator. E-mail Cross Match Customer Care offers free technical hardware support on-line during the warranty period, in the order that the requests are received. Table 6.1 The Global Technical Support department addresses Global CustomerCare@crossmatch.
• • • • • The D SCAN Authenticator serial number (found on the bottom of product) The configuration of your PC workstation or laptop The error messages that appear on the screen The log file created by the D SCAN TestWizard and the test images. The used D SCAN software and version number Return and repair of the D SCAN AUTHENTICATOR You must have an RMA number to return a D SCAN Authenticator for repair or replacement. Contact the Technical Support department to request and receive an RMA number.
USA T: +1 (561) 622-1650 F: +1 (561) 622-9938 T: (866) 725-3926 (Toll Free) General Mailbox: info@crossmatch.com Sales Department: sales@crossmatch.com Technical Support: CustomerCare@crossmatch.com Corporate Web Page www.crossmatch.
6-4 D SCAN ® A UT HE NT IC A T O R U s er M a nu al v 1.
7 Product Warranty Chapter0 THIS CHAPTER CONTAINS THE TEXT OF THE PRODUCT WARRANTY. Limited Warranty Cross Match Technologies, Inc. and its subsidiaries (“Cross Match”) warrants that the Cross Match Product (other than customized software) you have purchased will be free from defects in material and workmanship in normal service and under normal conditions for a period of one year from the date of shipment. Normal service and normal conditions are defined in the Product documentation.
power, third-party errors or omissions, or acts of God; (d) the Product is modified or altered (unless expressly authorized in writing by Cross Match); (e) the Product is installed or used in combination or in assembly with products not supplied or authorized by Cross Match; (f) there is a failure to follow specific restrictions or operating instructions; or (g) payment for the Product has not been timely made.
In the event you decide not to have a unit repaired or replaced after receiving a repair estimate, there will be a one hour labor charge at the prevailing hourly rate for evaluation plus return freight charges. At your request, Cross Match will, for a premium, ship a refurbished unit to you in exchange for the failed unit. Cross Match will contact you with a price for the exchange after receipt of the failed unit.
7-4 D SCAN ® A UT HE NT IC A T O R U s er M a nu al v 1.
Index humidy range , 4 -2 A appropriate operation , 1 -1 Authenticator back features , 2 -3 back view , 2 -3 front features , 2 -2 front view , 2 -2 packing list , 2 -5 product label , 2 -3 unpack the Authenticator , 2 -5 I ICAO Doc 9303 , 1 -4 images page , 3 -8 Industry Canada , 1 -2 installation , 2 -5 L limited warranty , 7 -1 limitations , 7 -1 out-of-warranty repairs , 7 -2 B barcode , 1 -4 barcode page , 3 -9 M MRZ , 1 -5 C camera pictures , 3 -7 cleaning , 4 -1 common problems , 6 -1 connect t
warning , 2 statement of compliance , 1 -2 supplies , 4 -2 system requirements , 2 -4 hardware , 2 -4 operating system , 2 -4 T technical support , 6 -1 e-mail returns and repair , 6 -2 telephone and fax , 6 -1 terms , 4 Index-2 troubleshooting see problems U under warranty , 6 -2 unpacking the Authenticator CF , 2 -5 W web page , 6 -3 WEEE directive , 1 -3 weight , 4 -2 D SCAN® AUTHENTICATOR User Manual v1.