Home > Panasonic > Security system > Panasonic Iris Reader Bm Et200 Operating Instructions

Panasonic Iris Reader Bm Et200 Operating Instructions

    Download as PDF Print this page Share this page

    Have a look at the manual Panasonic Iris Reader Bm Et200 Operating Instructions online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 10737 Panasonic manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							BM-ET200
    rejectaccept
    Iris Reader 
    Operating Instructions 
    Model No.  BM-ET200
    Before attempting to connect or operate this product, 
    please read these instructions carefully and save this manual for future use.
    The model numbers in these Operating Instructions are given without suffix. 
    						
    							2
    The serial number of this product may be found on the bot-
    tom of the unit.
    You should note the serial number of this unit in the space
    provided and retain this book as a permanent record of your
    purchase to aid identification in the event of theft.
    Model No.
    Serial No.
    WARNING:
    • This apparatus must be earthed.
    • To prevent fire or electric shock hazard, do not expose this
    apparatus to rain or moisture.
    • The apparatus should not be exposed to dripping or splashing
    and that no objects filled with liquids, such as vases, should be
    placed on the apparatus.
    • All work related to the installation of this product should be
    made by qualified service personnel or system installers.
    • The connection should be in accordance with the National
    Electrical Code (NFPA70) and the local authorities having juris-
    diction.
    The exclamation point within an equilateral
    triangle is intended to alert the user to the
    presence of important operating and mainte-
    nance (servicing) instructions in the litera-
    ture accompanying the appliance.
    CAUTION: TO REDUCE THE RISK OF ELECTRIC SHOCK,
    DO NOT REMOVE COVER (OR BACK).
    NO USER-SERVICEABLE PARTS INSIDE.
    REFER SERVICING TO QUALIFIED SERVICE PERSONNEL.
    CAUTION
    RISK OF ELECTRIC SHOCK
    DO NOT OPEN
    Cautions:
    • This unit is for indoor use only.
    • Refer to the name plate on the bottom of this product to
    verify identifications and power ratings.
    • Refer to UL Listed Access Control Panels installation
    instructions for compatibility information with Iris Reader,
    Model BM-ET200.
    SA 1966 
    						
    							3
    Important Safety Instructions
    1) Read these instructions.
    2) Keep these instructions.
    3) Heed all warnings.
    4) Follow all instructions.
    5) Do not use this apparatus near water.
    6) Clean only with dry cloth.
    7) Do not block any ventilation openings. Install in accordance with the manufacturers instructions.
    8) Do not install near any heat sources such as radiators, heat registers, stoves, or other apparatus (including amplifiers) that
    produce heat.
    9) Only use attachments/accessories specified by the manufacturer.
    10) Refer all servicing to qualified service personnel. Servicing is required when the apparatus has been damaged in any way,
    such as power-supply cord or plug is damaged, liquid has been spilled or objects have fallen into the apparatus, the
    apparatus has been exposed to rain or moisture, does not operate normally, or has been dropped.
    11) All interconnecting devices must be UL Listed.
    The UL Listed card reader when employed must be suitable for use with the selected UL Listed Access Control Panels.
    Refer to the UL Listed Access Control Panels Installation Instructions for compatibility with the UL Listed card readers and
    compatibility with the BM-ET200. 
    						
    							4
    Disclaimer of Warranty
    IN NO EVENT SHALL MATSUSHITA ELECTRIC INDUSTRI-
    AL CO,. LTD. BE LIABLE TO ANY PARTY OR ANY PER-
    SON, EXCEPT FOR REPLACEMENT OR REASONABLE
    MAINTENANCE OF THE PRODUCT, FOR THE CASES,
    INCLUDING BUT NOT LIMITED TO BELOW:
    (1) ANY DAMAGE AND LOSS, INCLUDING WITHOUT LIM-
    ITATION, DIRECT OR INDIRECT, SPECIAL, CONSE-
    QUENTIAL OR EXEMPLARY, ARISING OUT OF OR
    RELATING TO THE PRODUCT;
    (2) PERSONAL INJURY OR ANY DAMAGE CAUSED BY
    INAPPROPRIATE USE OR NEGLIGENT OPERATION
    OF THE USER;
    (3) UNAUTHORIZED DISASSEMBLE, REPAIR OR MODIFI-
    CATION OF THE PRODUCT BY THE USER;
    (4) INCONVENIENCE OR ANY LOSS ARISING OUT OF
    NON-RECOGNITION WHEN IRIS DATA IS ALREADY
    ENROLLED, DUE TO ANY REASON OR CAUSE OTHER
    THAN ANY FAILURE OR PROBLEM OF THE PROD-
    UCT;
    (5) ANY PROBLEM, CONSEQUENTIAL INCONVENIENCE,
    OR LOSS OR DAMAGE, ARISING OUT OF THE SYS-
    TEM COMBINED BY THE DEVICES OF THIRD PARTY;
    (It might be a case that the entrance-gate control sys-
    tem, for example, combining the Product and the elec-
    tric lock devices, does not open/close the door properly
    because of before-mentioned reasons or other causes
    of such system except for the Product.)(6) ANY LOSS OR DAMAGE, OR CLAIMS ARISING OUT
    FROM LOSS OR LEAK OF PC DATA INCLUDING IRIS
    DATA IN THE IRIS SERVER PC, IC CARD, OR MEMO-
    RY;
    (Iris data is nature of privacy. The customer shall be
    responsible for any Iris data stored in the iris server
    PC.)
    (7) INCONVENIENCE OR ANY LOSS ARISING WHEN
    IMAGES ARE NOT DISPLAYED, DUE TO ANY REASON
    OR CAUSE INCLUDING ANY FAILURE OR PROBLEM
    OF THE PRODUCT;
    (8) ANY CLAIM OR ACTION FOR DAMAGES, BROUGHT
    BY ANY PERSON OR ORGANIZATION BEING A PHO-
    TOGENIC SUBJECT, DUE TO VIOLATION OF PRIVACY
    WITH THE RESULT OF THAT SURVEILLANCE-CAMER-
    AS PICTURE, INCLUDING SAVED DATA, FOR SOME
    REASON, BECOMES PUBLIC OR IS USED FOR THE
    PURPOSE OTHER THAN SURVEILLANCE.
    Limitation of Liability
    THIS PUBLICATION IS PROVIDED AS IS WITHOUT WAR-
    RANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED,
    INCLUDING BUT NOT LIMITED TO, THE IMPLIED WAR-
    RANTIES OF MERCHANTABILITY, FITNESS FOR ANY PAR-
    TICULAR PURPOSE, OR NON-INFRINGEMENT OF THE
    THIRD PARTYS RIGHT.THIS PUBLICATION COULD INCLUDE TECHNICAL INAC-
    CURACIES OR TYPOGRAPHICAL ERRORS. CHANGES
    ARE ADDED TO THE INFORMATION HEREIN, AT ANY
    TIME, FOR THE IMPROVEMENTS OF THIS PUBLICATION
    AND/OR THE CORRESPONDING PRODUCT (S). 
    						
    							5
    Network Security
    As you will use this product connected to a network, your attention is called to the following security risks.
    1. Leakage or theft of information through this product
    2. Use of this product for illegal operations by persons with malicious intent
    3. Interference with or stoppage of this product by persons with malicious intent
    It is your responsibility to take precautions such as those described below to protect yourself against the above network
    security risks.
    • Use this product in a network secured by a firewall, etc.
    • If this product is connected to a network that includes PCs, make sure that the system is not infected by computer
    viruses or other malicious entities (using a regularly updated anti-virus program, anti-spyware program, etc.).
    • Protect your network against unauthorized access by restricting users to those who log in with an authorized user
    name and password.
    • Apply measures such as user authentication to protect your network against leakage or theft of information, including
    iris data, authentication information (user names and passwords), and alarm mail information.
    Trademarks and Registered Trademarks
    • Microsoft, Windows, Windows Server, ActiveX and Internet Explorer are either registered trademarks or trademarks of
    Microsoft Corporation in the United States and/or other countries.
    • Adobe and Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States
    and/or other countries.
    • Intel and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and
    other countries.
    • Private id
    TMis a trademark of Iridian Technologies in the United States.
    • Other names of companies and products contained in these operating instructions may be trademarks or registered trade-
    marks of their respective owners. 
    						
    							6
    Important Safety Instructions ...............................................3
    Limitation of Liability  ............................................................4
    Disclaimer of Warranty  ........................................................4
    Network Security  .................................................................5
    Trademarks and Registered Trademarks  ...........................5
    Preface ................................................................................7
    System Configuration of Stand-alone Mode  .................7
    System Configuration of Network Mode  .......................7
    Features ...............................................................................9
    Precautions ........................................................................10
    Document Convention  .......................................................12
    Notification About This Document  .....................................14
    Major Operating Controls and Their Functions  .................15
    External View  ..............................................................15
    Rear View ....................................................................16
    Internal View  ...............................................................17
    Specifications of Connector Terminal .........................17
    Specifications of Setup Switches  ...............................20
    Installation and Connections  .............................................23
    Preparation .................................................................24
    Description about Tamper Detection  .........................25
    Notification about the Installation Site  ........................25
    Installation Space and Recognition Range  ................26
    Installation ...................................................................28
    Setup (Stand-alone Mode)  ................................................32
    Available External Devices  .........................................32
    List of Settings  ............................................................32
    Connection and Setup Flow  .......................................34
    Registering Administrators  .........................................36
    Registering Users with the Operator’s Privilege  .........37
    Setup from the Web Browser on the PC  .....................37
    About the Operation Window  .....................................39
    Configure the Settings Relating to System 
    [Reader Setting]  .........................................................40
    Operation from the Web Browser on the PC  ..............41Configure the Settings Relating to User
    [User/Administrator] ...................................................41
    Check the Logs [Log]  .................................................45
    Back up or Restore Files  ............................................48
    Configure the Settings Relating to Time and Date 
    [Time & Date]  ..............................................................50
    Check the Version of Iris Reader Software 
    [Version] .....................................................................50
    Download Files [Download] ........................................51
    Operations from the Numeric Key 
    (For Use with Stand-Alone Mode Only)  ......................53
    Setup (Network Mode)  ......................................................63
    Connection and Setup Flow  .......................................63
    Registering Administrators  .........................................64
    Setup from the Web Browser on the PC  .....................64
    About the Operation Window  ............................................65
    Configure the Settings Relating to System 
    [Reader Setting]  ................................................................65
    Instructions for Proper Enrollment and Recognition ..........67
    Operating Procedures (Instructions for Users)  .................68
    How to Position Your Eyes in the Mirror ......................68
    If You Have Difficulty in Eye Positioning  .....................69
    If You are Wearing an Eyepatch, etc.  .........................69
    Cases of Enrollment/Recognition Failure ....................70
    How to Carry Out Enrollment (Network Mode)  ...........70
    How to Carry Out Enrollment (Stand-alone Mode)  .....71
    How to Carry Out Iris Reader Recognition  .................73
    Recognition by an Iris Reader and a Card Reader  ....74
    How to Carry Out PIN Recognition 
    (For Use with Stand-Alone Mode Only)  ......................75
    List of System Log Information ...........................................78
    Troubleshooting .................................................................80
    When Enrollment/Recognition Becomes Invalid .........80
    Before Requesting for Repair  .....................................81
    Specifications ....................................................................83
    Standard Accessories  .......................................................84
    CONTENTS 
    						
    							Iris Reader BM-ET200 is used in an access control system. The iris reader, which captures a users iris image, is available for
    the following operation modes.
    • Stand-alone mode: The iris reader can be used in the stand-alone operation.
    • Network mode: Iris server is required to operate the iris server.
    System Configuration of Stand-alone Mode
    Note: Stand-alone Mode has not been evaluated by UL.
    It is possible to enroll and recognize iris data by using this iris reader in the stand-alone operation.
    Numeric key (option) or web browser is used for iris reader control.
    Iris data of up to 50 users can be enrolled to the iris reader.
    System Configuration of Network Mode
    Note:
    • The following items have not been evaluated by UL.
    Administration Software BM-ES200
    User Licence Software BM-EU30000E series
    Option Camera BM-ETC202
    Smart card capability
    Card writer capability
    • The UL Listed card reader when employed must be suitable for use with the selected UL Listed Access Control Panels.
    Refer to the UL Listed Access Control Panels Installation Instructions for compatibility with the UL Listed card readers and
    compatibility with the BM-ET200.
    • As an enrollment iris reader for iris image capturing and iris server enrollment
    To activate iris recognition, it is necessary to capture the iris images of a user and enroll the iris data in the iris server.
    An iris reader generates iris data from iris images captured, and transfers the data to the iris server in the LAN (Local Area
    Network). The iris data is enrolled in the iris database of the iris server. Up to 10 025 users can enroll their iris data. *
    1
    *1For operation in the network mode, you need to install the optional Administration Software BM-ES200. The PC needs to
    have Microsoft®Windows®operating system installed.
    The total number of users that can be enrolled differs depending on the total license numbers of the User Licence Software
    BM-EU30000E Series.
    7
    Preface
    LAN
    0 1 4 7
    clear
    enter
    , 2 5 8 =
    . 3 6 9 /
    +
    –*
    Setup PC*Access control panel
    Iris reader
    Numeric keyElectric lock
    LAN connection
    Numeric key connection
    Form A contact connection
    * Use PC that operates Microsoft
    ® Internet Explorer® 6.0 SP2 (for Microsoft® 
    Windows® XP Professional SP2) or Microsoft® Internet Explorer® 6.0 SP1 
    (for Microsoft® Windows® 2000 Professional SP4). Form A  contact 
    output 
    						
    							*2The recognition time may differ depending on capturing conditions.
    *3The iris reader captures the iris images of both eyes at the same time, but the iris data of each eye is enrolled separately.
    Enrollment/recognition by one eye capturing is also available.
    *
    4Refer to BM-ES200 Operating Instructions
    (supplied with Administration Software BM-ES200) for details on available cards and card writers.
    *
    5Capturing diagnosis is made by the administration software at the time of enrollment.
    *6The user is recognized with the iris data of either eye.
    *7Up to 256 iris readers (enrollment and recognition iris readers) can be connected to the iris server in the LAN.
    *8The UL Listed card reader when employed must be suitable for use with the selected UL Listed Access Control Panels.
    Refer to the UL Listed Access Control Panels Installation Instructions for compatibility with the UL Listed card readers and
    compatibility with the BM-ET200.
    • Iris recognition technology is a way to identify a person with iris patterns (an iris is the thin
    plate-shaped film in front of the eyeball), which differ among each person. The iris pattern of
    the left eye differs from that of the right eye.
    • Using iris readers, users can carry out recognition without touching any devices.
    • In the iris recognition process, the users are recognized with the enrolled iris data.
    8
    • As a recognition iris reader for iris recognition
    Iris data of up to 5 025 users can be distributed from the iris server to iris readers. If the iris data of user has been distrib-
    uted to a recognition iris reader, or if a card reader (connected to a recognition iris reader) reads the iris data out of a card,
    the iris reader can recognize the user in approx. 0.3 seconds after iris image capturing.*
    2The user can check the recogni-
    tion result with the result indicator (accept/reject) on the front panel of the iris reader.
    Enrollment
    Recognition
    For enrollment*7
    Captures iris images of both eyes, generates iris data from the iris  
    images, and enrolls the iris data in the iris server. *3
    If a card writer is connected to the iris server, iris data enrolled in 
    the iris server can be written into a card. *4
    Iris database
    Administration Software BM-ES200*5
    User Licence Software BM-EU30000E SeriesFor recognition*7
    (1) Captures the iris images of both eyes.
    (2) Recognizes a user by checking the iris images with the iris data 
    (that is distributed to the iris reader or that is read out by the 
    card 
    reader connected to the iris reader). *6
    (3) Indicates the recognition result.Iris server
    If no corresponding iris data has been 
    found in 
    the iris reader, the iris reader 
    accesses the administration software 
    to execute server certification.
    Enrolled iris data is distributed 
    to iris readers.Card writer
    IrisRetina
    Pupil
    Electric lock Access control panel *
    8
    Access control server *8
    NETWORK MODE
    Iris server
    Administration
    software
    DB
    LANLAN
    LAN
    Iris reader 
    (for Recognition) Iris reader 
    (for Enrollment)
    Card reader *8
    Iris reader 
    (for Recognition)Card reader *8
    LAN
    Wiegand/
    RS-485Wiegand/RS-485
    Wiegand/
    RS-485Wiegand/RS-485 
    						
    							9
    Features
    • Automatic guidance and recognition by voice guidance and distance indicator
    When a user is within 50 cm {1.64 ft.} of the front of an iris reader, the voice guidance will start. Moving to the point where
    the user can see both eyes in the mirror according to the voice guidance or distance indicator, the users iris images will
    be automatically captured and the user will be recognized from the iris data. The recognition range of the iris reader is
    between approx. 30 cm {0.98 ft.} and 40 cm {1.32 ft.}
    • One-time capturing of both eyes enables recognition in approx. 0.3 seconds*
    1
    This iris reader captures the iris images of both eyes at the same time, generates iris data from the iris images, and com-
    pares the data with that distributed to the recognition iris reader or that read out by the card reader connected to the iris
    reader. If the iris data of either eye is corresponding with the iris data that is distributed or that is read out, you will be rec-
    ognized as an enrolled user. The recognition time will be approx. 0.3 seconds after iris image capturing.*
    1
    If no corresponding iris data is found in the recognition iris reader, the iris reader will transfer the data to the iris server. The
    iris server will compare the transferred iris data with those enrolled in the iris database for certification. (In this document,
    the certification by the iris server is called server certification.) The recognition time will be approx. 5 seconds after iris
    image capturing.*
    2
    *1The recognition time may differ depending on capturing conditions.
    *2The recognition time may differ depending on the traffic of the network or the total number of the enrolled users.
    • Option camera can be installed. (BM-ETC202: Not supplied to the iris reader)
    Optional minisize color camera can be installed in the iris reader. You can record the facial image of a user by connecting
    this camera and a recorder. Using the recognition result outputs (REJECT) of the iris reader, you can record only users that
    have not been recognized.
    • Access control system can be composed.
    Iris readers and the iris server can compose an access control system in combination with access control panels*
    3, card
    readers*3, and electric locks*3, etc.
    *
    3These devices are independent to BM-ET200.
    • Supporting a common access control interface
    Recognition result outputs support Wiegand/RS-485*
    4, which is one of the interfaces commonly used for access control
    systems. Any access control panel supporting the Wiegand/RS-485 interface can be directly connected to the iris reader.
    The iris reader also has a Wiegand/RS-485 input. Any card reader supporting the Wiegand/RS-485 interface can be direct-
    ly connected to the iris reader for composing an access control system.
    *
    4Our exclusive protocol is employed.
    • Recognition is available using a card that includes iris data
    By using the iris server and a card writer, you can write the iris data of user into a card. When the user passes the card
    through the card reader connected to an iris reader, recognition is available. 
    						
    							10
    Precautions
    General safety requirement:
    For Installation
    Refer all work related to the installation of the apparatus to
    qualified service personnel or system installers.
    Consult an expert for help in evaluating load bearing
    capacity of the installation surface and structure. If the sur-
    face is not strong enough, the apparatus may fall down.
    Refer to the apparatus specifications for weights.
    To avoid fire or personal injury:
    • Do not drop metallic parts through slots.
    This could permanently damage the apparatus.
    • Do not attempt to disassemble the apparatus.
    There are no user-serviceable parts inside. Panasonic
    is not responsible for regulatory compliance of a disas-
    sembled Panasonic apparatus by unauthorized person-
    nel. Contact qualified service personnel for mainte-
    nance.
    • Do not strike or shake the apparatus.
    Handle the apparatus with care, or it could cause the
    trouble of it.
    • Do not expose nor operate the apparatus in
    wet/damp conditions.
    Take immediate action if the apparatus gets wet. Refer
    servicing to qualified service personnel. Moisture could
    damage the apparatus and also cause electric shocks.
    • Do not use strong or abrasive detergents when
    cleaning the apparatus.
    Use soft and dry cloth to clean the apparatus when it is
    dirty. When the dirt is hard to remove, use a mild deter-
    gent and wipe gently.
    • Do not use the apparatus beyond operating require-
    ments.
    It is designed to operate properly for environment spec-
    ified below:
    Temperature 0 °C to +40 °C {32 °F to 104 °F}
    Humidity 30 % to 90 % relative humidity, non-
    condensing
    Source voltage 12 V DC/24 V DC
    Important notes specific to the apparatus:
    • This unit has no power switch.
    Power is supplied from an external 12 V DC/24 V DC
    power-supply device. Refer to service personnel for
    how to turn on/off the power.
    Note:While the power is turned off, recognition and
    entrance will NOT be available.• This unit must be powered by a UL Listed access
    control power-limited power supply, capable of 
    4-hours of standby power.
    • Adopting tamper-proof structure.
    Refer to service personnel for relocating or servicing
    the apparatus.
    As the unit has been designed in tamper-proof struc-
    ture, buzzer sound will be activated with alarm notifica-
    tion when you try to open the front cover or detach the
    apparatus from the wall. Then, recognition will become
    unavailable, the alarm notification will also be sent to
    the iris server, and the stored data (user information
    and reader settings) may be erased from the unit.
    • Use of near-infrared ray
    Near-infrared ray is used when iris data are captured
    by the apparatus. The near-infrared ray is compliant
    with the radiological safety standard of IEC60825-1.
    • Indication label
    Refer to the indication placed on the bottom of the
    apparatus as to the indications of equipment classifica-
    tion and power source, etc.
    • This apparatus is not designed to prevent theft.
    The apparatus is designed to perform roles of capturing
    personal iris data, of recognizing individuals and of pro-
    ducing output signals only. To ensure your
    entrance/gate security, you must use the apparatus
    together with other security system or devices including
    electric locks.
    Panasonic is NOT RESPONSIBLE FOR ANY CRIME OR
    TROUBLE CAUSED BY USING THIS APPARATUS.
    • In some cases, recognition or enrollment doesnt
    work properly.
    It could be invalid in recognition or enrollment when the
    apparatus has difficulty in getting iris information due to
    dirt in front of lens, reflection of glasses or insufficiency
    of physical requirement.
    • Iris data is a nature of privacy.
    Take enough care not to leak the data out of the iris
    server. It is also recommended that you should get an
    agreement from a person to register his or her data. 
    						
    All Panasonic manuals Comments (0)

    Related Manuals for Panasonic Iris Reader Bm Et200 Operating Instructions