Installation Guide
MorphoAccess® VP MD – Installation Guide
Annex 1 : Finger Placement Recommendations
2019_200000XXXX-V0
IDEMIA DOCUMENT - REPRODUCTION AND DISCLOSURE PROHIBITED
53
December 2018
For further information, please see the "Authentication mode" section in the
MorphoAccess® VP MD Administration Guide.
Multi-factor mode
In this mode, the "identification" and "authentication" modes are available
simultaneously; the user decides which control method will be used:
by placing his finger on the sensor, thereby triggering the identification process,
by placing his contactless card on the reader, thereby triggering the authentication
process,
This is the default mode for terminals fitted with a contactless smartcard reader.
For further information, please see the "Multi-factors method" section in the
MorphoAccess® VP MD Administration Guide.
Proxy mode
The Proxy mode is an operating mode where the access control main application is
located in a distant system. This is not a standalone mode like Identification and
Authentication modes.
It means that the terminal becomes a slave of the host system application. The access
control application is running on the host system and uses MorphoAccess® VP MD
terminal high level functions:
• Identification function
• Authentication function
• Read data on a contactless card
• Access control result signal command
The MorphoAccess® VP MD terminal is driven through an Ethernet (or Wi-Fi™) link
using TCP, SSL or TLS protocol.
The MorphoAccess® VP MD terminal acts as a server: it is either waiting for a command
or executing a command.
The commands allowed by the MorphoAccess® VP MD terminal are described in the
MorphoAccess® VP MD Host System Interface Specification document.
For further details about SSL or TLS on the MorphoAccess® VP MD terminal, please
refer to the MorphoAccess® VP MD Administration Guide.
External database mode (also called polling mode)
The reference biometric templates of the users are stored in external database, instead
of terminal local database or user’s RF card.
When authentication is initiated on the terminal, the terminal will poll the user ID to
external controller. On polling out the ID, the corresponding template (if exists) is
fetched from the external database and is authenticated against user’s biometric on
the terminal. Once the template request is posted to the external database, the