Panasonic Iris Reader Bm Et200 Operating Instructions
Have a look at the manual Panasonic Iris Reader Bm Et200 Operating Instructions online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 10737 Panasonic manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
BM-ET200 rejectaccept Iris Reader Operating Instructions Model No. BM-ET200 Before attempting to connect or operate this product, please read these instructions carefully and save this manual for future use. The model numbers in these Operating Instructions are given without suffix.
2 The serial number of this product may be found on the bot- tom of the unit. You should note the serial number of this unit in the space provided and retain this book as a permanent record of your purchase to aid identification in the event of theft. Model No. Serial No. WARNING: • This apparatus must be earthed. • To prevent fire or electric shock hazard, do not expose this apparatus to rain or moisture. • The apparatus should not be exposed to dripping or splashing and that no objects filled with liquids, such as vases, should be placed on the apparatus. • All work related to the installation of this product should be made by qualified service personnel or system installers. • The connection should be in accordance with the National Electrical Code (NFPA70) and the local authorities having juris- diction. The exclamation point within an equilateral triangle is intended to alert the user to the presence of important operating and mainte- nance (servicing) instructions in the litera- ture accompanying the appliance. CAUTION: TO REDUCE THE RISK OF ELECTRIC SHOCK, DO NOT REMOVE COVER (OR BACK). NO USER-SERVICEABLE PARTS INSIDE. REFER SERVICING TO QUALIFIED SERVICE PERSONNEL. CAUTION RISK OF ELECTRIC SHOCK DO NOT OPEN Cautions: • This unit is for indoor use only. • Refer to the name plate on the bottom of this product to verify identifications and power ratings. • Refer to UL Listed Access Control Panels installation instructions for compatibility information with Iris Reader, Model BM-ET200. SA 1966
3 Important Safety Instructions 1) Read these instructions. 2) Keep these instructions. 3) Heed all warnings. 4) Follow all instructions. 5) Do not use this apparatus near water. 6) Clean only with dry cloth. 7) Do not block any ventilation openings. Install in accordance with the manufacturers instructions. 8) Do not install near any heat sources such as radiators, heat registers, stoves, or other apparatus (including amplifiers) that produce heat. 9) Only use attachments/accessories specified by the manufacturer. 10) Refer all servicing to qualified service personnel. Servicing is required when the apparatus has been damaged in any way, such as power-supply cord or plug is damaged, liquid has been spilled or objects have fallen into the apparatus, the apparatus has been exposed to rain or moisture, does not operate normally, or has been dropped. 11) All interconnecting devices must be UL Listed. The UL Listed card reader when employed must be suitable for use with the selected UL Listed Access Control Panels. Refer to the UL Listed Access Control Panels Installation Instructions for compatibility with the UL Listed card readers and compatibility with the BM-ET200.
4 Disclaimer of Warranty IN NO EVENT SHALL MATSUSHITA ELECTRIC INDUSTRI- AL CO,. LTD. BE LIABLE TO ANY PARTY OR ANY PER- SON, EXCEPT FOR REPLACEMENT OR REASONABLE MAINTENANCE OF THE PRODUCT, FOR THE CASES, INCLUDING BUT NOT LIMITED TO BELOW: (1) ANY DAMAGE AND LOSS, INCLUDING WITHOUT LIM- ITATION, DIRECT OR INDIRECT, SPECIAL, CONSE- QUENTIAL OR EXEMPLARY, ARISING OUT OF OR RELATING TO THE PRODUCT; (2) PERSONAL INJURY OR ANY DAMAGE CAUSED BY INAPPROPRIATE USE OR NEGLIGENT OPERATION OF THE USER; (3) UNAUTHORIZED DISASSEMBLE, REPAIR OR MODIFI- CATION OF THE PRODUCT BY THE USER; (4) INCONVENIENCE OR ANY LOSS ARISING OUT OF NON-RECOGNITION WHEN IRIS DATA IS ALREADY ENROLLED, DUE TO ANY REASON OR CAUSE OTHER THAN ANY FAILURE OR PROBLEM OF THE PROD- UCT; (5) ANY PROBLEM, CONSEQUENTIAL INCONVENIENCE, OR LOSS OR DAMAGE, ARISING OUT OF THE SYS- TEM COMBINED BY THE DEVICES OF THIRD PARTY; (It might be a case that the entrance-gate control sys- tem, for example, combining the Product and the elec- tric lock devices, does not open/close the door properly because of before-mentioned reasons or other causes of such system except for the Product.)(6) ANY LOSS OR DAMAGE, OR CLAIMS ARISING OUT FROM LOSS OR LEAK OF PC DATA INCLUDING IRIS DATA IN THE IRIS SERVER PC, IC CARD, OR MEMO- RY; (Iris data is nature of privacy. The customer shall be responsible for any Iris data stored in the iris server PC.) (7) INCONVENIENCE OR ANY LOSS ARISING WHEN IMAGES ARE NOT DISPLAYED, DUE TO ANY REASON OR CAUSE INCLUDING ANY FAILURE OR PROBLEM OF THE PRODUCT; (8) ANY CLAIM OR ACTION FOR DAMAGES, BROUGHT BY ANY PERSON OR ORGANIZATION BEING A PHO- TOGENIC SUBJECT, DUE TO VIOLATION OF PRIVACY WITH THE RESULT OF THAT SURVEILLANCE-CAMER- AS PICTURE, INCLUDING SAVED DATA, FOR SOME REASON, BECOMES PUBLIC OR IS USED FOR THE PURPOSE OTHER THAN SURVEILLANCE. Limitation of Liability THIS PUBLICATION IS PROVIDED AS IS WITHOUT WAR- RANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WAR- RANTIES OF MERCHANTABILITY, FITNESS FOR ANY PAR- TICULAR PURPOSE, OR NON-INFRINGEMENT OF THE THIRD PARTYS RIGHT.THIS PUBLICATION COULD INCLUDE TECHNICAL INAC- CURACIES OR TYPOGRAPHICAL ERRORS. CHANGES ARE ADDED TO THE INFORMATION HEREIN, AT ANY TIME, FOR THE IMPROVEMENTS OF THIS PUBLICATION AND/OR THE CORRESPONDING PRODUCT (S).
5 Network Security As you will use this product connected to a network, your attention is called to the following security risks. 1. Leakage or theft of information through this product 2. Use of this product for illegal operations by persons with malicious intent 3. Interference with or stoppage of this product by persons with malicious intent It is your responsibility to take precautions such as those described below to protect yourself against the above network security risks. • Use this product in a network secured by a firewall, etc. • If this product is connected to a network that includes PCs, make sure that the system is not infected by computer viruses or other malicious entities (using a regularly updated anti-virus program, anti-spyware program, etc.). • Protect your network against unauthorized access by restricting users to those who log in with an authorized user name and password. • Apply measures such as user authentication to protect your network against leakage or theft of information, including iris data, authentication information (user names and passwords), and alarm mail information. Trademarks and Registered Trademarks • Microsoft, Windows, Windows Server, ActiveX and Internet Explorer are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. • Adobe and Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. • Intel and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. • Private id TMis a trademark of Iridian Technologies in the United States. • Other names of companies and products contained in these operating instructions may be trademarks or registered trade- marks of their respective owners.
6 Important Safety Instructions ...............................................3 Limitation of Liability ............................................................4 Disclaimer of Warranty ........................................................4 Network Security .................................................................5 Trademarks and Registered Trademarks ...........................5 Preface ................................................................................7 System Configuration of Stand-alone Mode .................7 System Configuration of Network Mode .......................7 Features ...............................................................................9 Precautions ........................................................................10 Document Convention .......................................................12 Notification About This Document .....................................14 Major Operating Controls and Their Functions .................15 External View ..............................................................15 Rear View ....................................................................16 Internal View ...............................................................17 Specifications of Connector Terminal .........................17 Specifications of Setup Switches ...............................20 Installation and Connections .............................................23 Preparation .................................................................24 Description about Tamper Detection .........................25 Notification about the Installation Site ........................25 Installation Space and Recognition Range ................26 Installation ...................................................................28 Setup (Stand-alone Mode) ................................................32 Available External Devices .........................................32 List of Settings ............................................................32 Connection and Setup Flow .......................................34 Registering Administrators .........................................36 Registering Users with the Operator’s Privilege .........37 Setup from the Web Browser on the PC .....................37 About the Operation Window .....................................39 Configure the Settings Relating to System [Reader Setting] .........................................................40 Operation from the Web Browser on the PC ..............41Configure the Settings Relating to User [User/Administrator] ...................................................41 Check the Logs [Log] .................................................45 Back up or Restore Files ............................................48 Configure the Settings Relating to Time and Date [Time & Date] ..............................................................50 Check the Version of Iris Reader Software [Version] .....................................................................50 Download Files [Download] ........................................51 Operations from the Numeric Key (For Use with Stand-Alone Mode Only) ......................53 Setup (Network Mode) ......................................................63 Connection and Setup Flow .......................................63 Registering Administrators .........................................64 Setup from the Web Browser on the PC .....................64 About the Operation Window ............................................65 Configure the Settings Relating to System [Reader Setting] ................................................................65 Instructions for Proper Enrollment and Recognition ..........67 Operating Procedures (Instructions for Users) .................68 How to Position Your Eyes in the Mirror ......................68 If You Have Difficulty in Eye Positioning .....................69 If You are Wearing an Eyepatch, etc. .........................69 Cases of Enrollment/Recognition Failure ....................70 How to Carry Out Enrollment (Network Mode) ...........70 How to Carry Out Enrollment (Stand-alone Mode) .....71 How to Carry Out Iris Reader Recognition .................73 Recognition by an Iris Reader and a Card Reader ....74 How to Carry Out PIN Recognition (For Use with Stand-Alone Mode Only) ......................75 List of System Log Information ...........................................78 Troubleshooting .................................................................80 When Enrollment/Recognition Becomes Invalid .........80 Before Requesting for Repair .....................................81 Specifications ....................................................................83 Standard Accessories .......................................................84 CONTENTS
Iris Reader BM-ET200 is used in an access control system. The iris reader, which captures a users iris image, is available for the following operation modes. • Stand-alone mode: The iris reader can be used in the stand-alone operation. • Network mode: Iris server is required to operate the iris server. System Configuration of Stand-alone Mode Note: Stand-alone Mode has not been evaluated by UL. It is possible to enroll and recognize iris data by using this iris reader in the stand-alone operation. Numeric key (option) or web browser is used for iris reader control. Iris data of up to 50 users can be enrolled to the iris reader. System Configuration of Network Mode Note: • The following items have not been evaluated by UL. Administration Software BM-ES200 User Licence Software BM-EU30000E series Option Camera BM-ETC202 Smart card capability Card writer capability • The UL Listed card reader when employed must be suitable for use with the selected UL Listed Access Control Panels. Refer to the UL Listed Access Control Panels Installation Instructions for compatibility with the UL Listed card readers and compatibility with the BM-ET200. • As an enrollment iris reader for iris image capturing and iris server enrollment To activate iris recognition, it is necessary to capture the iris images of a user and enroll the iris data in the iris server. An iris reader generates iris data from iris images captured, and transfers the data to the iris server in the LAN (Local Area Network). The iris data is enrolled in the iris database of the iris server. Up to 10 025 users can enroll their iris data. * 1 *1For operation in the network mode, you need to install the optional Administration Software BM-ES200. The PC needs to have Microsoft®Windows®operating system installed. The total number of users that can be enrolled differs depending on the total license numbers of the User Licence Software BM-EU30000E Series. 7 Preface LAN 0 1 4 7 clear enter , 2 5 8 = . 3 6 9 / + –* Setup PC*Access control panel Iris reader Numeric keyElectric lock LAN connection Numeric key connection Form A contact connection * Use PC that operates Microsoft ® Internet Explorer® 6.0 SP2 (for Microsoft® Windows® XP Professional SP2) or Microsoft® Internet Explorer® 6.0 SP1 (for Microsoft® Windows® 2000 Professional SP4). Form A contact output
*2The recognition time may differ depending on capturing conditions. *3The iris reader captures the iris images of both eyes at the same time, but the iris data of each eye is enrolled separately. Enrollment/recognition by one eye capturing is also available. * 4Refer to BM-ES200 Operating Instructions (supplied with Administration Software BM-ES200) for details on available cards and card writers. * 5Capturing diagnosis is made by the administration software at the time of enrollment. *6The user is recognized with the iris data of either eye. *7Up to 256 iris readers (enrollment and recognition iris readers) can be connected to the iris server in the LAN. *8The UL Listed card reader when employed must be suitable for use with the selected UL Listed Access Control Panels. Refer to the UL Listed Access Control Panels Installation Instructions for compatibility with the UL Listed card readers and compatibility with the BM-ET200. • Iris recognition technology is a way to identify a person with iris patterns (an iris is the thin plate-shaped film in front of the eyeball), which differ among each person. The iris pattern of the left eye differs from that of the right eye. • Using iris readers, users can carry out recognition without touching any devices. • In the iris recognition process, the users are recognized with the enrolled iris data. 8 • As a recognition iris reader for iris recognition Iris data of up to 5 025 users can be distributed from the iris server to iris readers. If the iris data of user has been distrib- uted to a recognition iris reader, or if a card reader (connected to a recognition iris reader) reads the iris data out of a card, the iris reader can recognize the user in approx. 0.3 seconds after iris image capturing.* 2The user can check the recogni- tion result with the result indicator (accept/reject) on the front panel of the iris reader. Enrollment Recognition For enrollment*7 Captures iris images of both eyes, generates iris data from the iris images, and enrolls the iris data in the iris server. *3 If a card writer is connected to the iris server, iris data enrolled in the iris server can be written into a card. *4 Iris database Administration Software BM-ES200*5 User Licence Software BM-EU30000E SeriesFor recognition*7 (1) Captures the iris images of both eyes. (2) Recognizes a user by checking the iris images with the iris data (that is distributed to the iris reader or that is read out by the card reader connected to the iris reader). *6 (3) Indicates the recognition result.Iris server If no corresponding iris data has been found in the iris reader, the iris reader accesses the administration software to execute server certification. Enrolled iris data is distributed to iris readers.Card writer IrisRetina Pupil Electric lock Access control panel * 8 Access control server *8 NETWORK MODE Iris server Administration software DB LANLAN LAN Iris reader (for Recognition) Iris reader (for Enrollment) Card reader *8 Iris reader (for Recognition)Card reader *8 LAN Wiegand/ RS-485Wiegand/RS-485 Wiegand/ RS-485Wiegand/RS-485
9 Features • Automatic guidance and recognition by voice guidance and distance indicator When a user is within 50 cm {1.64 ft.} of the front of an iris reader, the voice guidance will start. Moving to the point where the user can see both eyes in the mirror according to the voice guidance or distance indicator, the users iris images will be automatically captured and the user will be recognized from the iris data. The recognition range of the iris reader is between approx. 30 cm {0.98 ft.} and 40 cm {1.32 ft.} • One-time capturing of both eyes enables recognition in approx. 0.3 seconds* 1 This iris reader captures the iris images of both eyes at the same time, generates iris data from the iris images, and com- pares the data with that distributed to the recognition iris reader or that read out by the card reader connected to the iris reader. If the iris data of either eye is corresponding with the iris data that is distributed or that is read out, you will be rec- ognized as an enrolled user. The recognition time will be approx. 0.3 seconds after iris image capturing.* 1 If no corresponding iris data is found in the recognition iris reader, the iris reader will transfer the data to the iris server. The iris server will compare the transferred iris data with those enrolled in the iris database for certification. (In this document, the certification by the iris server is called server certification.) The recognition time will be approx. 5 seconds after iris image capturing.* 2 *1The recognition time may differ depending on capturing conditions. *2The recognition time may differ depending on the traffic of the network or the total number of the enrolled users. • Option camera can be installed. (BM-ETC202: Not supplied to the iris reader) Optional minisize color camera can be installed in the iris reader. You can record the facial image of a user by connecting this camera and a recorder. Using the recognition result outputs (REJECT) of the iris reader, you can record only users that have not been recognized. • Access control system can be composed. Iris readers and the iris server can compose an access control system in combination with access control panels* 3, card readers*3, and electric locks*3, etc. * 3These devices are independent to BM-ET200. • Supporting a common access control interface Recognition result outputs support Wiegand/RS-485* 4, which is one of the interfaces commonly used for access control systems. Any access control panel supporting the Wiegand/RS-485 interface can be directly connected to the iris reader. The iris reader also has a Wiegand/RS-485 input. Any card reader supporting the Wiegand/RS-485 interface can be direct- ly connected to the iris reader for composing an access control system. * 4Our exclusive protocol is employed. • Recognition is available using a card that includes iris data By using the iris server and a card writer, you can write the iris data of user into a card. When the user passes the card through the card reader connected to an iris reader, recognition is available.
10 Precautions General safety requirement: For Installation Refer all work related to the installation of the apparatus to qualified service personnel or system installers. Consult an expert for help in evaluating load bearing capacity of the installation surface and structure. If the sur- face is not strong enough, the apparatus may fall down. Refer to the apparatus specifications for weights. To avoid fire or personal injury: • Do not drop metallic parts through slots. This could permanently damage the apparatus. • Do not attempt to disassemble the apparatus. There are no user-serviceable parts inside. Panasonic is not responsible for regulatory compliance of a disas- sembled Panasonic apparatus by unauthorized person- nel. Contact qualified service personnel for mainte- nance. • Do not strike or shake the apparatus. Handle the apparatus with care, or it could cause the trouble of it. • Do not expose nor operate the apparatus in wet/damp conditions. Take immediate action if the apparatus gets wet. Refer servicing to qualified service personnel. Moisture could damage the apparatus and also cause electric shocks. • Do not use strong or abrasive detergents when cleaning the apparatus. Use soft and dry cloth to clean the apparatus when it is dirty. When the dirt is hard to remove, use a mild deter- gent and wipe gently. • Do not use the apparatus beyond operating require- ments. It is designed to operate properly for environment spec- ified below: Temperature 0 °C to +40 °C {32 °F to 104 °F} Humidity 30 % to 90 % relative humidity, non- condensing Source voltage 12 V DC/24 V DC Important notes specific to the apparatus: • This unit has no power switch. Power is supplied from an external 12 V DC/24 V DC power-supply device. Refer to service personnel for how to turn on/off the power. Note:While the power is turned off, recognition and entrance will NOT be available.• This unit must be powered by a UL Listed access control power-limited power supply, capable of 4-hours of standby power. • Adopting tamper-proof structure. Refer to service personnel for relocating or servicing the apparatus. As the unit has been designed in tamper-proof struc- ture, buzzer sound will be activated with alarm notifica- tion when you try to open the front cover or detach the apparatus from the wall. Then, recognition will become unavailable, the alarm notification will also be sent to the iris server, and the stored data (user information and reader settings) may be erased from the unit. • Use of near-infrared ray Near-infrared ray is used when iris data are captured by the apparatus. The near-infrared ray is compliant with the radiological safety standard of IEC60825-1. • Indication label Refer to the indication placed on the bottom of the apparatus as to the indications of equipment classifica- tion and power source, etc. • This apparatus is not designed to prevent theft. The apparatus is designed to perform roles of capturing personal iris data, of recognizing individuals and of pro- ducing output signals only. To ensure your entrance/gate security, you must use the apparatus together with other security system or devices including electric locks. Panasonic is NOT RESPONSIBLE FOR ANY CRIME OR TROUBLE CAUSED BY USING THIS APPARATUS. • In some cases, recognition or enrollment doesnt work properly. It could be invalid in recognition or enrollment when the apparatus has difficulty in getting iris information due to dirt in front of lens, reflection of glasses or insufficiency of physical requirement. • Iris data is a nature of privacy. Take enough care not to leak the data out of the iris server. It is also recommended that you should get an agreement from a person to register his or her data.