FaceStation F2 USER GUIDE Version 1.00 English EN 102.00.FSF2-ODB V1.
Contents Safety Instructions .......................................................................................... 4 Introduction ...................................................................................................... 6 Components ...................................................................................................................................................6 Name and function of each part ................................................................................
Event Log ....................................................................................................... 31 Search Log ...................................................................................................................................................31 Delete All Logs ............................................................................................................................................31 View Log Usage ...........................................................
Safety Instructions Observe the following instructions to use the product safely and prevent any risk of injury or property damage. Warning Noncompliance with instructions can lead to serious injury or death. Installation Do not install the device under direct sunlight or UV light. • Product damage, malfunction, discoloration, or deformation may occur. Do not install the product in a location with direct sunlight, moisture, dust, or soot. • Fire or electric shock may occur.
Operation Do not drop the product or apply an impact to the product. • Product failure may occur. Manage the password with care; do not to disclose it to others and change it periodically. • Otherwise, illegal intrusion may occur. Do not press the buttons on the product forcibly or using a sharp tool. • Product failure may occur. When cleaning the product, wipe the product with a soft and dry cloth. Do not apply water, benzene, or alcohol. • These may cause product failure.
Introduction Components FaceStation F2 Connection Cable (1x2-pin, 1x3-pin, 3x4-pin) Cable Cover NOTE Drilling Template Wall Bracket PVC Anchor x6 120Ω resistor Fixing Screw x6 Diode Bracket Fixing Screw (Star Shaped) Quick Guide Open Source Software Guide • Components may vary according to the installation environment. • When assembling the product with the bracket, you can use the included bracket fixing screw (Star Shaped) instead of the product fixing screw for enhanced security.
Name and function of each part LED lamp Visual camera Infrared camera LCD screen Fingerprint sensor RF card and mobile access card authentication unit Speaker Ethernet Relay (3 pins) TTL Input (4 pins) Wiegand Input/Output (4 pins) Power Supply (2 pins) SAM card slot RS-485 (4 pins) USB (Type-C) cable slot Name Description LED lamp Turned on when the user is detected in the dark. Infrared camera Capture the infrared face image. Visual camera Capture an actual face image.
Fingerprint sensor Reads fingerprints. Speaker Delivers sound. Ethernet Connect the Ethernet cable. TTL input (4 pins) Connect the TTL input cable. Relay (3 pins) Connect the relay cable. Wiegand input/output (4 pins) Connect the Wiegand input/output cable. Power supply (2 pins) Connect the power supply cable. RS-485 (4 pins) Connect the RS-485 cable. SAM card slot Insert the SAM card. USB (Type-C) cable slot Connect the USB cable.
Cables and connectors Power supply Pin Name Color 1 PWR +VDC Red (white stripe) 2 PWR GND Black (white stripe) Pin Name Color 1 RLY NO White 2 RLY COM Blue 3 RLY NC Orange Pin Name Color Relay RS-485 1 485 TRXP Blue 2 485 TRXN Yellow 3 485 GND Black 4 SH GND Gray Pin Name Color 1 TTL IN0 Red 2 TTL IN1 Yellow 3 TTL GND Black 4 SH GND Gray Pin Name Color 1 WG D0 Green 2 WG D1 White 3 WG GND Black 4 SH GND Gray TTL input Wiegand input and ou
Correct face registration and authentication method Cautions for registering a face • When registering a face, maintain a distance of 60 cm to 100 cm between the device and the face. • Be careful not to change the facial expression. • Be careful not to cover the eyes or eyebrows. • Do not wear masks or sunglasses. • Be careful not to display two faces on the screen. Register one person at a time.
How to enroll a fingerprint In order to improve the fingerprint authentication rate, register the fingerprint correctly. FaceStation F2 can recognize a fingerprint even if the angle and position of a user's fingerprint input change. If you register the fingerprint with attention to the following matters, the authentication rate can be improved.
• If the finger is too dry, blow your breath on the fingertips and then scan the finger. • If the finger has a cut, register the fingerprint of another finger. • The initially enrolled fingerprint often may have not been scanned correctly, so enroll the fingerprint again according to ‘ Cautions for enrolling a fingerprint’ .
Admin Menu All Menus 1 Press 2 Select the desired menu. NOTE • and authenticate with the Admin level credential. If the administrator has not been designated, the menu screen will be displayed when you press 13 .
User Registering User Information The user information, including the face and fingerprint, can be registered. 1 Press 2 Select USER > and authenticate with the Admin level credential. , and choose a credential you want to register. There are two steps for the user registration. Some options are available after the credential has been registered. : Register a user photo. • • Name: Enter the user name. • ID: Enter a number between 1 and 429467295 to register as the user ID.
Extended Private Auth Mode: Change the authentication method according to the user. You can set whether to use the extended private auth mode. this mode allows you to combine user authentication methods, including both faces and fingerprints. Otherwise, you can use the device's basic authentication mode. You can modify it in BioStar 2. • 3 To save settings, press OK.
5 Modify the information by referring to Registering User Information and press OK. To delete a user, select • NOTE • and then press OK. Access Group can be registered in BioStar 2. For detailed contents regarding registering an access group, refer to the BioStar 2 Administrator Manual. Delete All Users You can delete all registered users at once. 1 Press 2 Select USER > 3 Check Delete All to delete all registered users and press OK. 4 When you press OK, all registered users will be deleted.
Authentication Auth Mode Set the authentication mode. You can make a combination of face, fingerprint, PIN, card, or ID and you can also set a schedule for each authentication mode. Registering auth mode 1 Press 2 Select AUTHENTICATION > Auth Mode, and press 3 Press + and select one of options you want to use. To add additional options, repeat this step. 4 Press Schedule and set a schedule. NOTE 5 and authenticate with the Admin level credential. .
Server Matching You can set the server matching. When this option is activated, it performs user authentication matching in BioStar 2, not in the device. It can be used when the device has too much user information or when the device is installed outside. 1 Press 2 Select AUTHENTICATION and activate Server Matching. NOTE and authenticate with the Admin level credential. • It is only available for fingerprint and card options.
- Maximum Face Width: 250 - Search Range X coordinate: 144 - Search Range Width: 432 • Security Level: Set the security level for 1:N authentication. • Operation Mode: Set the operation mode of the device when the face is authenticated. - Fusion Matching: Use both visual and infrared cameras to increase the face authentication accuracy. - Walkthrough: The device authenticates users who pass an access point without a pause within the authentication distance.
Fingerprint You can change settings regarding the fingerprint authentication. 1 Press 2 Select AUTHENTICATION > Fingerprint. 3 Select and set the desired item. and authenticate with the Admin level credential. • Security Level: Set the security level for 1:N authentication. • Matching Timeout: Set the fingerprint matching timeout. If the authentication is not completed during a set time, the authentication will fail. • View Image: Set to view the original image when scanning the fingerprint.
T&A Mode You can set how to register T&A Mode. 1 Press 2 Select AUTHENTICATION > T&A. 3 Select and set the desired item. and authenticate with the Admin level credential. • T&A Mode: Set the method to use T&A mode. • T&A Code: You can register T&A events. Select T&A Code > schedule. to register a T&A event and set an icon, name of T&A event, and • T&A Required: Set to require a user to select a T&A event when authenticating.
Display & Sound You can change the display and sound settings of the device. 1 Press 2 Select DISPLAY & SOUND. 3 Change the desired item. • and authenticate with the Admin level credential. Home Screen: Select items to be displayed in the background of the home screen. • Language: Set the language you wish to use. • Device Private Msg.: Set whether or not to use a Private Message, which will be displayed on the screen when the user authenticates. You can set Device Private Msg. on the device.
Network Network Settings You can change the network settings of the device. Ethernet 1 Press 2 Select NETWORK > Ethernet. 3 Change the desired item. 4 and authenticate with the Admin level credential. • DHCP: Set whether or not to use DHCP. If DHCP setting is disabled, the user can modify Port, IP Address, Gateway, Subnet Mask, and DNS. • Device Port: Set the device port. • IP Address: View the IP address of the device. To modify, disable DHCP setting.
Server 1 Press 2 Select NETWORK > Server. 3 Change the desired item. 4 and authenticate with the Admin level credential. • Device -> Server: You can send a connection signal from the device to a server with the input information directly. When you select Server -> Device, Server IP, Server URL and Server Port cannot be entered. • Server IP: Enter the IP address of the PC on which BioStar 2 is installed. Input is accepted only when Device -> Server is set for Connection Mode.
Device Relay You can set the open time and the input port of the exit button in the device. 1 Press 2 Select DEVICE > Relay. and authenticate with the Admin level credential. • Relay: You can set whether relay is enabled or not. To set the open time and the input port of the exit button, activate this option. • Open Time: Set the duration for the door to remain open when standard user authentication has been carried out. • Exit Button: Select the input port where the exit button is connected.
Date & Time You can set date and time. Set the date and time accurately in order to collect accurate log data. 1 Press 2 Select DEVICE > Date & Time. 3 Change the desired item. and authenticate with the Admin level credential. • Date & Time: Check the current date and time. To modify it manually, disable Time Sync. • Time Zone: Set the time reference of the current location. • Time Sync: Synchronize the server and the time. If you wish to synchronize the server and the time, enable Time Sync.
Daylight Saving Time You can use the device by applying daylight saving time. Set the start and end time correctly. 1 Press 2 Select DEVICE > Daylight Saving Time and press 3 Select the desired item and change the setting. 4 and authenticate with the Admin level credential. to add additional daylight saving time. • Name: Set the name of daylight saving time. • Start Month / Start Week / Start Day / Start Time: Set details of when the daylight saving time option begins.
2 Select DEVICE > Memory Info. You can view the memory usage status of the device. USB Memory Connect USB Memory and import user information to the device or export log and user information from the device. Upgrade the firmware. 1 Press 2 Select DEVICE > USB Memory. 3 Select the desired item and change the setting. and authenticate with the Admin level credential. • Import: Import user information from the connected USB memory.
FW Upgrade: Upgrade the firmware if the firmware files are saved in the connected USB memory. • NOTE The type of supported USB memory is as follows. If you use a different type of USB memory, the function may not operate normally.
User ID Type You can set the type of user ID to be registered on the device to a combination of alphabetic characters, numbers, and symbols (_, -). 1 Press 2 Select DEVICE > User ID Type. 3 Change to the desired item and press OK. and authenticate with the Admin level credential.
Event Log Search Log You can set a condition and search a log. 1 Press 2 Select EVENT LOG. All event logs appear. 3 Press 4 Press OK. A log that matches the condition will be displayed on the screen. and authenticate with the Admin level credential. to search a specific log and change the condition. Delete All Logs You can delete all saved logs. 1 Press 2 Select EVENT LOG. 3 To delete all logs, select and authenticate with the Admin level credential. and then press OK.
View Log Usage You can check the status of log usage. 1 Press 2 Select EVENT LOG > and authenticate with the Admin level credential. . You can check the capacity of event and image logs on the device.
Troubleshooting Checklist before reporting a failure Classification Power Problem The power is being supplied but the device does not operate. Solution • • If the distance between the terminal and the bracket is too great, the device may not operate due to the temper switch. Check the adaptor or the power cable. • For a normal user PIN, request it from the administrator and reenter the PIN. • • If you have lost the Admin PIN, contact the installation company.
Product specifications Category Credential General Feature Biometric RF Option RF read range* Mobile CPU Memory LCD type LCD resolution Sound Operating temperature Storage temperature Operating humidity Storage humidity Camera Dimension (W x H x D) Weight Face Fingerprint Capacity Interface IP rating Certificates Recognition Distance Recognition Height Matching speed Live Face Detection Image dimension Resolution Template Extractor / Matcher Sensor Certificates Live Face Detection Max.
Dimensions (Unit: mm) 23.5 119.8 268.4 49.7 98.4 251.
FCC compliance information THIS DEVICE COMPLIES WITH PART 15 OF THE FCC RULES. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) This device must accept any interference received, including interference that may cause undesired operation. Note: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC Rules.
Appendices Disclaimers • The information in this manual is provided with regard to the Suprema's products. • The right to use is acknowledged only for products included in the terms and conditions of the sales agreement guaranteed by Suprema. The right of license to other intellectual property rights not discussed in this manual is not acknowledged.
The licenses for most software and other practical works are designed to take away your freedom to share and change the works. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change all versions of a program--to make sure it remains free software for all its users. We, the Free Software Foundation, use the GNU General Public License for most of our software; it applies also to any other work released this way by its authors.
To “ convey” a work means any kind of propagation that enables other parties to make or receive copies. Mere interaction with a user through a computer network, with no transfer of a copy, is not conveying.
extent such circumvention is effected by exercising rights under this License with respect to the covered work, and you disclaim any intention to limit operation or modification of the work as a means of enforcing, against the work's users, your or third parties' legal rights to forbid circumvention of technological measures. 4. Conveying Verbatim Copies.
A separable portion of the object code, whose source code is excluded from the Corresponding Source as a System Library, need not be included in conveying the object code work. “ Installation Information” for a User Product means any methods, procedures, authorization keys, or other information required to install and execute modified versions of a covered work in that User Product from a modified version of its Corresponding Source.
relicensing or conveying under this License, you may add to a covered work material governed by the terms of that license document, provided that the further restriction does not survive such relicensing or conveying. If you add terms to a covered work in accord with this section, you must place, in the relevant source files, a statement of the additional terms that apply to those files, or a notice indicating where to find the applicable terms.
Each contributor grants you a non-exclusive, worldwide, royalty-free patent license under the contributor's essential patent claims, to make, use, sell, offer for sale, import and otherwise run, modify and propagate the contents of its contributor version. In the following three paragraphs, a “ patent license” is any express agreement or commitment, however denominated, not to enforce a patent (such as an express permission to practice a patent or covenant not to sue for patent infringement).
Software Foundation. If the Program specifies that a proxy can decide which future versions of the GNU General Public License can be used, that proxy's public statement of acceptance of a version permanently authorizes you to choose that version for the Program. Later license versions may give you additional or different permissions. However, no additional obligations are imposed on any author or copyright holder as a result of your choosing to follow a later version. 15. Disclaimer of Warranty.
conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3.
DISCLAIMED.
ISC license used for completely new code in BoringSSL: Copyright (c) 2015, Google Inc. Permission to use, copy, modify, and/or distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies. THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS.
* Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of Google Inc. nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
improving the Work, but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner as "Not a Contribution." "Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received by Licensor and subsequently incorporated within the Work. 2. Grant of Copyright License.
8. Limitation of Liability.
'$$ DPNQMJBODF JOGPSNBUJPO compliance information Copyright notice The copyright of this document is vested in Suprema. The rights of other product names, trademarks and registered trademarks are vested in each individual or organization that owns such rights. 8BSOJOH 4BGFUZ *OGPSNBUJPO FCC notification to users NOTE: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC Rules.
Appendix Escape clause x The information in this manual is provided with regard to the Suprema's products. x The right to use is acknowledged only for products included in the terms and conditions of the sales agreement guaranteed by Suprema. The right of license to other intellectual property rights not discussed in this manual is not acknowledged.