User's Manual

Table Of Contents
1-1
1
Chapter 0Introduction
Appropriate Operation
The D SCAN
®
AUTHENTICATOR captures color images and reads full pages to capture and
transmit personal and document data. The device can capture an entire data page from any ID
document in different types of light. The device can read the RFID data contactless found on
the RFID tag.
It is intended for the use in an IT-devices environment and the operation and installation must
be in connection with suitable computer equipment. When operating, the electrical installation
and cabling must comply with the IEC 60950-1 Standard.
Who should read this book
You should read this book if you are a user who operates the D SCAN Authenticator
document authentication reader device.
How this book is arranged
Chapter 1 “Introduction” covers standards for the manual and describes the safety
instructions. The chapter also contains a glossary of terms.
Chapter 2 “Installation” describes the D SCAN Authenticator and how to install the
document authentication reader.
Chapter 3 “How to use the D SCAN Authenticator” describes how to use the
indicators on the device to capture the best quality images.
Chapter 4 “Maintenance” explains how to maintain the D SCAN Authenticator.
Chapter 5 “Problems and Corrections” describes the problems, causes, and
corrections.
Chapter 6 “Customer Care and Contact Information” explains how to get the
technical support that is available from Cross Match Technologies.
Chapter 7 “Product Warranty” contains the full text of the product warranty from
Cross Match Technologies.
Standards
The following standards are used in this book:
Bold UPPER/lower case and tilted text identify important information.
Special information can appear as a Note, Caution, Warning, or Danger.
Note
A Note contains additional information. To ignore a note can cause a delay, but not mechanical damage
or personal injury.
Caution
A Caution contains a method to prevent data loss or damage to equipment. To ignore the caution can
cause damage or data loss.