User's Manual

Table Of Contents
v
Contents
Introduction
Appropriate Operation ..................................................................................................................1-1
Who should read this book ...........................................................................................................1-1
How this book is arranged ............................................................................................................1-1
Standards ......................................................................................................................................1-1
FCC statement ...............................................................................................................................1-2
Information to the user .............................................................................................................1-2
Industry Canada ............................................................................................................................1-2
Statement of Compliance .............................................................................................................1-2
Recycling information ...................................................................................................................1-3
WEEE Directive ..............................................................................................................................1-3
Safety when operating ..................................................................................................................1-3
Glossary .........................................................................................................................................1-4
Installation
D SCAN AUTHENTICATOR ...........................................................................................................2-1
Front view ..................................................................................................................................2-2
Back view ..................................................................................................................................2-3
Product label ........................................................................................................................2-3
System requirements ....................................................................................................................2-4
Operating system ......................................................................................................................2-4
Hardware ...................................................................................................................................2-4
Installation .....................................................................................................................................2-4
Remove the contents ...............................................................................................................2-4
List of contents .........................................................................................................................2-4
Prepare to use ...........................................................................................................................2-4
Connect the Authenticator .......................................................................................................2-5
The Authenticator status lights ................................................................................................2-6
Attach the Authenticator to a surface ..........................................................................................2-7
Prepare the installation .............................................................................................................2-7
Installation .................................................................................................................................2-7
Drill template ................................................................................................................................2-10
How to use the D SCAN AUTHENTICATOR
Applications and software levels ..................................................................................................3-1
Characteristics of documents .......................................................................................................3-2
The machine readable zone .....................................................................................................3-2
Position the documents ................................................................................................................3-3
Smart cards ...............................................................................................................................3-3
Magnetic stripe cards ...............................................................................................................3-4
Read in a document ......................................................................................................................3-4
The Overview page ...................................................................................................................3-5
The camera pictures page ........................................................................................................3-6
The images page ......................................................................................................................3-7
The RFID data groups page .....................................................................................................3-8
The barcode page .....................................................................................................................3-8
The RFID check results page ...................................................................................................3-9