Top Banner
Access Control Sales Manual 1520 Dell Avenue Campbell, CA 95008 USA (408) 341-4100 (408) 341-4101 Fax www.handreader.com
24
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Hand Key Manual

Access Control

Sales Manual

1520 Dell Avenue Campbell, CA 95008 USA (408) 341-4100 (408) 341-4101 Fax www.handreader.com

Page 2: Hand Key Manual

Access Control Sales Manual 0602 Page 2 July 22, 2002

HandKey® Sales Manual

I. WHY HANDKEY? ................................................................................................3

II. WHAT IS HAND GEOMETRY? .....................................................................4

III. HANDKEY FREQUENTLY ASKED QUESTIONS....................................7

IV. OTHER BIOMETRICS......................................................................................9

V. HANDLING OBJECTIONS ...........................................................................11

VI. HANDKEY FEATURE COMPARISON BY MODEL...............................12

VII. HANDKEY II OR HANDKEY CR DEMONSTRATION ........................13

VIII. ID3D-R HANDKEY DEMONSTRATION.................................................15

IX. HANDKEY CM DEMONSTRATION ...........................................................17

X. PRODUCT SPECIFICATIONS.....................................................................21

Page 3: Hand Key Manual

Access Control Sales Manual 0602 Page 3 July 22, 2002

I. Why HandKey?

• HandKey ensures that access is granted to the right person – not just anyone who happens to have the right card or key. A hand can’t be lost, stolen, or loaned to a friend!

• HandKey uses a field-proven technology called hand geometry,

which verifies an individual’s identity based on the size and shape of the hand. It does not take fingerprints or handprints.

• HandKeys pay for themselves by eliminating the cost of cards

and keys.

• Customers also reduce labor costs, because administration is less time-consuming compared with card and key based systems.

• If a customer wants to use cards, HandKey can be configured to accept input from most magnetic

stripe, proximity, and bar code cards.

• HandKey is easily integrated into existing access control systems. The standard HandKey outputs a 26-bit Wiegand format for use with access control panels. Other formats can also be accommodated.

• HandKeys reduce productivity losses due to lost or misplaced cards and keys. You can’t forget to

bring your hand to work!

• Recognition Systems (RSI), manufacturer of the HandKey, has been in business since 1986 and is now owned by Ingersoll-Rand. Customers need not be concerned about purchasing unproven technology from a startup company that might not stay in business. RSI is a financially stable company and has been profitable for over 10 years.

• Over 60,000 HandReaders are currently in use throughout the world as of December 2001.

• RSI’s HandReaders have a reputation for reliability. They can be used in any type of work

environment, from corporate campuses to construction sites. HandKey user stories • The Northern Ireland Prison Service cut labor costs by installing

HandKeys at three of its prisons. They were able to re-assign guards who formerly were posted at the main entrances. (RSI Case Study #12)

• The University of Georgia uses HandKeys for access control - and in its dining halls, to ensure that only students who’ve paid for a meal plan can enter the dining area. (RSI Case Study #14)

• San Francisco Airport has over 150 HandKeys controlling access to secure areas for 34,000 employees. Roger Case, a technician supervisor at the airport, says they went with HandKeys because they found that “simple badges can be lost, stolen, or given to ‘cousins’ or friends.” (Case Study #16 – coming soon)

• Data centers use HandKeys to keep their facilities secure and user-friendly for their customers. They don’t have to issue cards that their customers will lose or forget. Customers can access the facility any time, without having to carry a card. (Case Study #19 – coming soon)

Page 4: Hand Key Manual

Access Control Sales Manual 0602 Page 4 July 22, 2002

II. What is Hand Geometry? Hand Geometry is a type of Biometric technology. � Biometrics are automated methods of identifying (or verifying

the identity of) an individual using a physical characteristic or behavioral trait.

� Biometrics may measure: o Things you do, such as speech and handwriting o Things you are, for example:

� Hand Geometry � Fingerprint � Facial geometry � Eye: characteristics of the iris or retina

Hand Geometry has been in use longer than any other biometric. � Two-dimensional hand geometry device in 1970’s � RSI uses 3-dimensional hand geometry � Over 60,000 units installed as of December 2001 � Major Applications:

o Access Control o Time and Attendance o Personal identification (passport control, cafeterias, health clubs)

How it works � Measures unique size and shape of the fingers and hand � Over 90 distinct measurements are made

o Length o Width o Thickness o Surface Area

When the hand is placed for verification: � Low-level infrared light source ensures crisp, clear image � CCD camera records 3D image of the hand � Algorithm converts this image to a mathematical value � This value is compared with the hand template stored in memory � If the two match, identity is confirmed (the door is opened).

Enrollment is the process of entering a new user in a HandKey. � Supervisor accesses Enrollment menu � User enters ID number � HandKey prompts user to “Place Hand” three times � Each of the three hand images is converted to a mathematical value � These are combined to form the initial template. � The template size is 9 bytes.

The template is updated with each successful verification – it “learns your hand.” � Allows for changes due to weight gain or loss, aging, etc. � Eliminates need to re-enroll users.

Page 5: Hand Key Manual

Access Control Sales Manual 0602 Page 5 July 22, 2002

Hand placement is key to successful use � Slide hand into the unit � Web between middle & index fingers must make contact with web

finger pin � Close all fingers towards center of the hand � Finger pin lights on the top panel extinguish � Once all finger-pin lights go out, camera will record a digital image

of the hand. Rings and Fingernails � Jewelry may be worn � Be consistent in the use of jewelry � Stones should face upwards � Long fingernails & false fingernails should have no adverse effects

Scores and Thresholds � Current hand image is compared with stored template for verification � Difference is expressed by a “Score” displayed on the LCD panel.

o Lower score = closer to stored template � Threshold - defined by end user/installer

o “System reject threshold” - global o “User reject threshold” - individual

� If Score < Threshold, ID is verified o Low threshold reduces chance of false accept o High threshold reduces chance of false reject (less chance of “try again” message)

� The score is also used for troubleshooting. For example, if all users’ scores are going up, this may indicate that the hand reader needs cleaning.

Important Error Rates � False Accept Rate (FAR): Rate at which an imposter is accepted by the biometric system � False Reject Rate (FRR): Rate at which an enrolled user is rejected by the system � HandKey error rates at default threshold setting:

o False Accept Rate - 0.1% o False Reject Rate - 0.1%

Why is the False Reject Rate critical? An example: � A company has 100 employees. Each person verifies 2 times per day.

o That’s 200 transactions per day, 1000 per week. o A 1% error rate means there could be as many as 10 problems per week. o Our error rate of 0.1% means only 1 potential problem per week.

� Each False Reject means that someone will have to spend time troubleshooting the problem. It can also mean a loss of productivity when people are waiting to get in.

� A high false reject rate will frustrate users and give them an excuse for not using the biometric.

Page 6: Hand Key Manual

Access Control Sales Manual 0602 Page 6 July 22, 2002

Verification vs. Identification � Verification: Enter ID number, then present biometric (hand, finger, face, etc.) for comparison with

stored template. � Identification: Present biometric; database is searched for your template. � Most biometric devices – including HandKey - do verification only. � Identification

o Some biometric vendors claim to do Identification o Has been successful only with small databases o Can be slow, requires powerful CPU to search database

Other Biometrics � Fingerprint

o BioScrypt o Visionics o Identix (OEM)

� Iris o Iridian

� Voice � Signature

o CIC � Face

o Visionics o Viisage o Miros o ZN

� Retina o EyeDentify

� 2-Finger Geometry o BioMet Partners – Digi2

Page 7: Hand Key Manual

Access Control Sales Manual 0602 Page 7 July 22, 2002

III. HandKey Frequently Asked Questions

Q: Who is Recognition Systems? A: 1.) In business since 1986

2.) Division of Ingersoll-Rand 3.) Profitable and growing 4.) Over 60,000 units installed as of

December 2001. Q: How new is this technology? A: With the release of the HandKey II this is the fourth generation of hand geometry readers

from Recognition Systems. Each generation has meant an increase in accuracy and functionality, and a reduction in price.

Q: How many hand templates can be stored? A: Up to 32,512 in a HandKey II or HandKey CR. Up to 27,904 in an ID3D. Up to 1000 in a

HandKey CM. Q: What is the template size? A: 9 bytes. This is important because other biometrics have much larger templates, so they

can’t handle as many users with a single device. Q: Do rings or Band-Aids have an effect? A: Not usually enough to reject a valid user. Just make sure the ring is in the upright

position and hand placement is proper. Q: What happens if I injure my hand and have it bandaged or in a cast? A: You can be enrolled with you left hand, palm up while the right hand is disabled. It’s not

as comfortable but will work fine. Q: What is the false reject rate (authorized person can’t get in)? A: Sandia National Laboratories has documented Recognition Systems’ products as having

a false reject rate of 0.1% (1 in 1000), the lowest of any biometric device. This is an extremely important statistic. Rejecting authorized people creates unhappy users.

Q: I have a card system and want to add a biometric solution. Is this a problem? A: No, it’s easily done. HandKey is easily integrated with into existing access control

systems. The standard HandKey outputs a 26-bit Wiegand format for use with access control panels. Other formats can also be accommodated. Please contact RSI’s applications engineer for additional information.

Q: How many digits can I use for an ID? A: Up to 10. Q: Can you interface to commonly used access control systems? A: Yes, our system architecture allows us to interface to most commonly used access

control systems. We just need to know the format required. In some cases, there is an additional charge.

Q: How is your throughput? We need to get a lot of people through the door quickly. A: Typically the verification is less than 2 seconds. As people use the HandKey they

process faster. Typically, a HandKey will Process 15+ people per minute. Q: My employees are concerned about hygiene issues. How do I address this concern?

Page 8: Hand Key Manual

Access Control Sales Manual 0602 Page 8 July 22, 2002

A: Compare hand placement on the platen to using a door knob/handle, money handling, telephone use, or shaking hands.

Q: How often do I need to clean the HandKey, and how? A: Typically, if the unit is so dirty that you don’t want to put your hand on it, it should be

cleaned. In most office environments the HandKey platen would need to be cleaned once every two to three weeks. The HandKey should be cleaned with glass cleaner and a soft cloth.

Q: Are there any privacy issues? A: Hand geometry technology cannot be reverse-engineered to identify people. It does not

store the image of the hand, but instead stores a 9-byte template, which is a mathematical representation of the hand image. This mathematical value is meaningless to other devices. In addition, no fingerprint or palm print information is gathered.

Q: Is the HandKey safe? A: The infrared lights used in the hand reader are similar to those used in remote controls

for TVs and VCRs. The light’s power level is 100 milliwatts – less than the amount produced by natural sunlight or microwave ovens. Recognition Systems has been contacted by the U.S. Occupational Safety and Health Administration (OSHA), and has supplied all requested information. OSHA has generated no reports of hazard.

Page 9: Hand Key Manual

Access Control Sales Manual 0602 Page 9 July 22, 2002

IV. Other Biometrics Competitive quick reference Technology Defined Where it is used Perceived

Advantages Why not access control

Fingerprint

None necessary Background Checks Low volume access control

De-facto when talking about biometrics. False accept rate can be lower Pricing may be lower

Higher False Reject Rate Higher Failure to Enroll Rate 1 in 50 does not have readable fingerprints Criminal Connotation Privacy Perceptions Residue, dirt, dryness & injury cause recognition problems

Facial Video camera looks at the size and shape of your face

Surveillance – However a human is the ultimate decision maker

It is cool Non-contact

User can be identified without their knowledge. This may be viewed as a privacy issue. Higher false reject rates Higher false positives People can change appearance Challenges with lighting issues

Iris scanning Video camera looks at the colored doughnut portion of your eye

Access Control and identity verification

Cool – High Tech Very high security

Low user acceptance Slower throughput – positioning can be time consuming. Problems with lighting, eyeglasses, and contact lenses. Higher failure to enroll rate Larger template (512 bytes per eye)

Retina Infra-red light source used to examine the retina (back wall) of the eye

Government applications

None really Very high security

Very low user acceptance Requires close proximity of eye to reader

Signature A pen or stylus is used to measure the speed, direction, and pressure with which one writes their signature

Logical access control Electronic Signature

Something we do everyday

Writing on the wall just doesn’t make sense – slow Poor long term reliability - Signature changes - Stress affects signature Higher false reject rates

Voice Microphone or telephone used to capture speech and compare it to a database using custom software

Logical access control

Inexpensive No one likes to talk to a wall Background noise Higher false reject rate Digital recordings may be accepted Variation in microphone gain can cause problems

Page 10: Hand Key Manual

Access Control Sales Manual 0602 Page 10 July 22, 2002

Competitive Selling Tips: Fingerprint and Two-Finger Geometry � Two-Finger Geometry is most similar to Hand Geometry

o ‘Digi2’ product manufactured by Biomet Partners and sold through OEMs o Typically only offered with low-end packages o Very little is known about this product (has not been included in independent research) o Competitive Selling Tip:

� “Two-finger geometry measures only two fingers. Hand Geometry measures four fingers and part of the hand. Which do you think would be more reliable?”

� Fingerprint readers are made by more than 80 different companies

o Some access control business partners and competitors offer fingerprint as an option o Typically it is offered by low-end competitors, but not always. o Competitive Selling Tips:

� Encourage prospect to ask the other vendor how many installations they have with this particular fingerprint reader.

� Use case studies and references. Encourage prospect to ask other vendor for the same.

� Ask prospect how their employees (or customers) might feel about using fingerprint readers!

General tips � Competitors may make extravagant claims regarding their False Accept and False Reject Rates.

Don’t believe them! RSI’s error rates have been proven in the field. � Most biometric manufacturers are not financially stable. Who wants to buy a product and then

find out that the manufacturer has gone out of business? RSI is the rare exception in the biometrics industry. We are owned by Ingersoll-Rand, and have been a financially solid, profitable company for over 10 years.

� There are over 50,000 RSI HandReaders installed. Always encourage prospects to ask other vendors how many physical access control installations they have.

� Be careful not to be too negative about other biometric products; this could result in a negative impression of all biometrics. Emphasize RSI’s strong points, rather than the competitor’s weak points.

� Privacy issues: Hand geometry has many advantages in this area, including: o No law enforcement agency keeps a database of hand templates. Fingerprints and facial

geometry templates are used in law enforcement. o The nature of hand geometry ensures that every user is an active, willing participant and

cannot be identified without their knowledge. � Fingerprint technology causes concerns (not necessarily valid) that a user could

be identified by comparing “latent prints” with the stored template. � Some facial recognition applications “scan the crowd” to identify known criminals.

Page 11: Hand Key Manual

Access Control Sales Manual 0602 Page 11 July 22, 2002

V. Handling Objections Objection How to overcome objection “It’s too expensive” Payback in as little as 3-6 months “This seems really high-tech. I don’t want to take chances on new, unproven technologies.”

Manufacturer in business since 1986; profitable since 1990 Over 60,000 units installed

“Why does the ID number have to be entered? Why can’t the HandKey figure out who I am when I place my hand on it?”

The HandKey does verification, a one to one search based on the ID number. This process takes less than one second. Some biometric companies say they can do identification – a one to many search. This is not common, and has only been successful with small groups of users. It is a slow process and requires a very powerful computer to perform the search. It’s just not practical or cost-effective for most applications.

“What about privacy issues? Can the hand data be used to identify someone for other purposes?”

Emphasize that it doesn’t read finger or palm prints. Doesn’t store image of hand, only the 9 byte template – a mathematical value that is meaningless for any other purpose. No law enforcement agency keeps a database of hand templates. With hand geometry, a user can’t be identified without their knowledge.

“Do my employees need to be concerned about radiation from the HandKey?”

Infrared light = 100 milliwatts, similar to remote controls for TVs, VCRs, etc.

“My employees are worried they’ll get germs from the HandKey”

Compare to door knob/handle, shaking hands, money. If employees are still concerned, they can clean the platen before using (leave Windex and cloth next to HandKey).

“I’m concerned that my employees will think of this as a ‘Big Brother’ type of thing – that we don’t trust any of them.

HandReaders are installed to increase security. Using a HandReader guarantees that only the credential owner has access. This ensures that someone else cannot gain access using your identity.

“The error rates sound high. 1 in 1000 doesn’t seem like it’s very reliable.”

Adjustable Threshold can reduce FAR or FRR, depending on customer needs and preferences. False reject only means that you have to try again – just like you have to do, much more frequently, with a card reader. Other biometrics have lower FAR, but higher FRR

Page 12: Hand Key Manual

Access Control Sales Manual 0602 Page 12 July 22, 2002

VI. HandKey feature comparison by model Access Control Product Line – Quick Reference

HandKey CM HandKey II ID3D-R HandKey

Standard User Memory 512 512 256

Expandable User Memory 1000 max 32,512 max 27,904 max

Transaction buffer size 1000 5120 3400

Door Control ���� + WCM ���� ���� Power Input 12-24VAC or VDC 12-24VAC or VDC 12-24VAC or VDC Construction Plastic Plastic Metal

Surface Wall mount Integrated Integrated �Option

Recessed Wall mount No No �Option

Table mount �Option �Option Standard

CM Programming Ports ���� No No

RS 422 Communications No ���� ���� RS 232 Communications No ���� No

Modem Communications No ���� Option ����Option Ethernet Communications No ����Option ���� Option RS232 printer output No ���� No

Auxiliary Inputs 2 2 1

Auxiliary Outputs 2 3 1

Auto Daylight Savings Time ���� ���� ���� Operational Battery Backup ����Option ����Option ���� Option Red/Green light on top panel ���� ���� ���� Option Outdoor Options Available Hurricane

Tsunami Hurricane Tsunami

Blizzard

Page 13: Hand Key Manual

Access Control Sales Manual 0602 Page 13 July 22, 2002

VII. HandKey II or HandKey CR Demonstration Before you start � Bring your own extension cord. � Turn dip switches #4 and 5 on. This will reset your reader and wipe out any hand templates

currently stored when power is applied. � Plug in your HandReader. There is a barrel power jack on the back of the reader. � Turn dip switches #4 and 5 Off. Dip switches 1-3 should also be off. Dip switches are next to

power jack connection on back of reader. � Setup reader so platen is 40 inches above the ground, or on table top if user will be seated.

Height is critical for verification. � First enroll yourself, then you will be able to access menus to enroll others. � Set Time and Date (if needed) � Set ID length to 3

Enroll yourself � To get entry to menus, press: Clear and Enter � Enter password followed by # key: 4# � Enroll: Press # � Enter the ID, followed by the Enter key: XXX then Enter � Place Hand 1/3 (remove hand) � Place Hand 2/3 (remove hand) � Place Hand 3/3 (remove hand) � You are now enrolled

Enroll your prospects as users � To get entry to password level Press: Clear and Enter � Enter your ID, followed by the Enter key: XXX then Enter � Place your hand for verification � Enter password followed by # key: 4# � Enroll: Press # � Enter the user ID, followed by the Enter key: XXX then Enter � Place Hand 1/3 (remove hand) � Place Hand 2/3 (remove hand) � Place Hand 3/3 (remove hand) � The user is now enrolled

Demonstrating Tips � Demonstrate verification prior to enrolling them.

o This allows the person to see how the hand is placed into the reader, lowering errors and frustration.

� Remember their ID number when you enroll them. Repeat their number to them before they try to verify, or enter their number in for them.

o If they forget, so will their users. Make the first time as easy as possible. � Try to cheat for them. If others are around, have them attempt to verify with your ID number. � Explain the score. Explain why it aids employees in correct hand placement.

Page 14: Hand Key Manual

Access Control Sales Manual 0602 Page 14 July 22, 2002

* These menu items are only available in a reader configured as a Master.

COMMAND MODE – HANDKEY II

MENU NAME Service Menu Setup Menu Management

Menu Enrollment Menu Security Menu

Default Password 1 2 3 4 5

Authority Level

Required 1 2 3 4 5

Calibrate Set Language List Users Add User Set User Data

Status Display Set Date Format

* Data from Network Remove User Set TZ Table

* Network Status

Set Time & Date * Data to Network Reject

Threshold

Set Address Set Passwords

Set ID Length Clear Memory

Set Output Mode Special Enroll

Set Facility

Lock/Shunt Time

Aux Out Control

Set Reader Mode

Set Serial

Set Duress Code

Print Options

Set Beeper

Page 15: Hand Key Manual

Access Control Sales Manual 0602 Page 15 July 22, 2002

VIII. ID3D-R HandKey Demonstration Before you start � Bring your own extension cord. � Turn dipswitch #4 on. This will reset your reader and wipe out any hand templates currently

stored when power is applied. � Plug the terminal block with the power wires into the HandReader. � Plug in your HandReader while compressing the white tamper switch on the back of the

HandReader. If the back plate is on the HandReader, then the tamper should be pressed. � Turn dipswitch #4 off. Dipswitches 1-3 should also be off. � Setup reader so platen is 40 inches above the ground, or on tabletop if user will be seated.

Height is critical for verification. � First enroll yourself, then you will be able to access menus to enroll others. � Set Time and Date if necessary � Set ID length to 3 or 4 if desired

Enroll yourself � To get entry to menus, press#: # � Enter password followed by # key: 4# � Enroll: Press # � Enter the ID, followed by the Enter key: XXX then # � Place Hand 1/3 (remove hand) � Place Hand 2/3 (remove hand) � Place Hand 3/3 (remove hand) � You are now enrolled

Enroll your prospects as users � Enter your ID, followed by the # key: XXX then # � Place your hand for verification � Press # right after verification: # � Enter password followed by # key: 4# � Enroll: Press # � Enter the user ID, followed by the # key: XXX then # � Place Hand 1/3 (remove hand) � Place Hand 2/3 (remove hand) � Place Hand 3/3 (remove hand) � The user is now enrolled

Demonstrating Tips � Demonstrate verification prior to enrolling them.

o This allows the person to see how the hand is placed into the reader, lowering errors and frustration.

� Remember their ID number when you enroll them. Repeat their number to them before they try to verify, or enter their number in for them.

o If they forget, so will their users. Make the first time as easy as possible. � Try to cheat for them. If others are around, have them attempt to verify with your ID number. � Explain the score. Explain why it aids employees in correct hand placement.

Page 16: Hand Key Manual

Page 16

* These menu items are only available in a reader configured as a Master.

COMMAND MODE – ID3D-R HANDKEY

MENU NAME Service Menu Setup Menu Management

Menu Enrollment Menu Security Menu

Default Password 1 2 3 4 5

Authority Level

Required 1 2 3 4 5

Calibrate Print Options Set Time & Date Add User Set User Data

Status Display ID Entry Mode List Users Remove User Set TZ Table

* Network Status

Set Reader Mode Save Data Reject

Threshold

Set Output Mode Restore Data Set Passwords

Lock/Shunt Time * Data to Network Clear Memory

Aux Out Control

* Data from Network No Hand Enroll

Set Site Code

Set Serial

Set Beeper

Page 17: Hand Key Manual

Access Control Sales Manual 0602 Page 17 July 22, 2002

IX. HandKey CM Demonstration Before you start � Bring your own extension cord. � Turn your reader so the back of the reader is facing you. � Turn dip switches #4 and 5 on (away from you). Dipswitch 3 should be on.

Dipswitches 1-2 should be off (towards you). Dipswitches are next to the power jack connection on back of the HandReader.

� Plug the barrel end of the power supply into the barrel connector located at J12. � Turn your HandReader around so the front is facing towards you. � Plug your power supply into the wall. � The HandReader will begin its power-up cycle. The Front Panel Version will

appear on the screen. � Immediately after Front Panel Version disappears from the screen: press and

hold 8. � The reader will say Enter password: Press 5 and press enter � The prompt will say SW4, SW5 both on Reboot? Press: # for YES � This will reset your HandReader and wipe out any hand templates currently

stored when power is applied. This will take a few seconds. � When the HandReader prompt displays READY, turn dip switches #4 and 5 off.

Setup reader so platen is 40 inches above the ground, or on the tabletop if user will be seated. Height is critical for verification.

� First enroll yourself, then you will be able to access menus to enroll others. � Set Time and Date (if needed) � Set ID length to 3 or 4 (if desired)

Enroll yourself � To get entry to menus, press: Clear and Enter � Enter password followed by # key: 4# � Select Add User: Press # � Enter an ID, then press Enter: XXX then Enter � Place Hand 1/3 (remove hand) � Place Hand 2/3 (remove hand) � Place Hand 3/3 (remove hand) � You are now enrolled � Enroll yourself with a second ID number � Then press Clear to exit command mode

Page 18: Hand Key Manual

Access Control Sales Manual 0602 Page 18 July 22, 2002

Demonstrating Tips

� Before you begin, demonstrate verification. o This allows the person to see how the hand is placed into the reader,

lowering errors and frustration. � Explain the enrollment process and how they should place their hand. � Explain that they should land their hand like a plane and close their fingers on the

pins. � Let the user practice hand placement before you enroll them. Watch to be sure

that their fingers are touching the appropriate finger pins. � Remember their ID number when you enroll them. Repeat their number to them

before they try to verify. o If they forget so will their users. Make the first time as easy as possible.

Enroll your prospects as users � To get to the password level Press: Clear and Enter � Enter your ID, followed by the Enter key: XXX then Enter � Place your hand for verification � Enter password followed by # key: 4# � Select Add User: Press # � Have the user enter an ID number, then press Enter: YYY then Enter � Place Hand 1/3 (remove hand) � Place Hand 2/3 (remove hand) � Place Hand 3/3 (remove hand) � The user is now enrolled � Press Clear to exit command mode

Verification � Allow the user to verify their hand. � Have the user enter their ID, then press enter: YYY then Enter � Have the user place their hand for verification: Place hand � When the user successfully verifies the LCD will display the following

o ID Verified o Score

Page 19: Hand Key Manual

Access Control Sales Manual 0602 Page 19 July 22, 2002

� The top panel will also show a green light. � Explain the score. Explain how it aids in correct hand placement.

HINTS: Entering Command Mode Command Mode is the menu tree used in programming a HandReader.

When NO users are enrolled:

1. Press Clear and then press Enter on the HandReader keypad. 2. The HandReader will prompt you to ENTER PASSWORD. 3. Here you would type in the password of the menu you need to

access. 4. Press Enter.

When users are enrolled:

1. Press Clear and then press Enter on the HandReader keypad. 2. The HandReader will NOT prompt you to ENTER PASSWORD at this

time. Instead you will see the READY string on line one, and on line two you will see �: This means that there are users already enrolled in the HandReader. You must verify your identity before being allowed into Command Mode.

3. At the �: prompt, Type in your User ID number. Then press Enter. Follow the directions on the screen and place your hand.

4. When your identity has been verified, the HandReader will prompt you to ENTER PASSWORD.

5. Here you would type in the password of the menu you need to access.

6. Press Enter.

Exiting Command Mode

1. To exit command mode, you can do one of two things: a. If you are NOT in a menu item that requires a numerical input,

you can press any number key. b. If you are NOT in a menu item that requires an input, you can

press Clear. 2. You may have to press Clear several times to return to the READY

prompt if you are more than one level deep in the menu tree.

Page 20: Hand Key Manual

Access Control Sales Manual 0602 Page 20 July 22, 2002

NOTE: There are some menus that require an input. If you try to press CLEAR to get out of these menus, nothing will happen. If you want to get out of the menu without changing anything, press Enter to accept default values.

COMMAND MODE – HANDKEY CM

MENU NAME Service Menu Setup Menu Management

Menu Enrollment Menu Security Menu

Default Password 1 2 3 4 5

Authority Level

Required 1 2 3 4 5

Calibrate Set Language List Users Add User Set User Data

Status Display Set Date Format Remove User Set TZ Table

Set Time & Date Reject

Threshold

Set ID Length Set Passwords

Lock/Shunt Time Clear Memory

Aux Out Control Special Enroll

Set Duress Code

Print Options

Set Beeper

COMMAND MODE – HANDKEY CM

MENU NAME Service Menu Setup Menu Management

Menu Enrollment Menu Security Menu

Default Password 1 2 3 4 5

Authority Level

Required 1 2 3 4 5

Calibrate Set Language List Users Add User Set User Data

Status Display Set Date Format Remove User Set TZ Table

Set Time & Date Reject

Threshold

Set ID Length Set Passwords

Lock/Shunt Time Clear Memory

Aux Out Control Special Enroll

Set Duress Code

Print Options

Set Beeper

COMMAND MODE – HANDKEY CM

MENU NAME Service Menu Setup Menu Management

Menu Enrollment Menu Security Menu

Default Password 1 2 3 4 5

Authority Level

Required 1 2 3 4 5

Calibrate Set Language List Users Add User Set User Data

Status Display Set Date Format Remove User Set TZ Table

Set Time & Date Reject

Threshold

Set ID Length Set Passwords

Lock/Shunt Time Clear Memory

Aux Out Control Special Enroll

Set Duress Code

Print Options

Set Beeper

Page 21: Hand Key Manual

Access Control Sales Manual 0602 Page 21 July 22, 2002

X. Product Specifications

HAND GEOMETRY READER SPECIFICATION RECOGNITION SYSTEMS HANDKEY II

Verification time Less than 1 second

Template size 9 bytes

Power 12-24 VDC

Memory Retention Up to 5 years via the standard Internal Lithium Battery

Transaction Storage 5187 transactions, buffered

Communications RS-485 (4 wire and 2 wire)

RS-232 Serial Printer Support or network communications

Modem or Ethernet - optional

Baud Rate 300 to 28.8 bps

User Capacity 512 Users standard

Internally expandable to 32,512

Door Control Door Lock Output

Alarm Monitoring

Tamper, Door Switch

Two Auxiliary Inputs

Three Auxiliary Outputs

Request to Exit

Card Reader Input Proximity, Wiegand, Magnetic Stripe, or Barcode

Card Reader Emulation Wiegand, Magnetic Stripe, or Barcode

Output

Duress Code 1 digit user definable

Time Zones 62 user definable

Unlimited Holidays

Size 8.85in. wide 11.65in. high 8.55in. deep

Page 22: Hand Key Manual

Access Control Sales Manual 0602 Page 22 July 22, 2002

HAND GEOMETRY READER SPECIFICATION RECOGNITION SYSTEMS HANDKEY ID3D-R

Verification time Less than 1 second

Template size 9 bytes

Power 12-14 VDC

Memory Retention Up to 5 years via the standard Internal Lithium Battery

Transaction Storage 3405 transactions, buffered

Communications RS-485 (4 wire and 2 wire)

RS-232 Serial Printer Support

User Capacity 256 Users standard

Internally expandable to 27,904

Door Control Door Lock Output

Alarm Monitoring

Tamper, Door Switch

Auxiliary Input

Auxiliary Output

Request to Exit

Card Reader Input Proximity, Wiegand, Magnetic Stripe, or Barcode

Card Reader Emulation Wiegand or Magnetic Stripe

Output

Duress Code 1 digit user definable

Time Zones 62 user definable

Unlimited Holidays

Size 6.46 in. wide

8.25 in. high

7.29 in. deep

Page 23: Hand Key Manual

Access Control Sales Manual 0602 Page 23 July 22, 2002

HAND GEOMETRY READER SPECIFICATION RECOGNITION SYSTEMS OUTDOOR HANDKEY ID3D-RW

Temperature Range 0°F to 120°F

Verification time Less than 1 second

Template size 9 bytes

Power 12-14 VDC

Memory Retention Up to 5 years via the standard Internal Lithium Battery

Transaction Storage 3405 transactions, buffered

Communications RS-485 (4 wire and 2 wire)

RS-232 Serial Printer Support

User Capacity 256 Users standard

Internally expandable to 27,904

Door Control Door Lock Output

Alarm Monitoring

Tamper, Door Switch

Auxiliary Input

Auxiliary Output

Request to Exit

Card Reader Input Proximity, Wiegand, Magnetic Stripe, or Barcode

Card Reader Emulation Wiegand or Magnetic Stripe

Output

Duress Code 1 digit user definable

Time Zones 62 user definable

Unlimited Holidays

Size 8.0 in. wide

12.0 in. high

8.7 in. deep

Weight 20.6 lbs.

Wall Mount Included

Humidity Levels Permitted Non-Condensing

Heaters 24VAC in addition to the 12-14VDC for the HandReader

Maintain platen and LCD temperature at approx 70°F to 75°F

Options 120VAC – 24VAC Heater Transformer

Page 24: Hand Key Manual

Access Control Sales Manual 0602 Page 24 July 22, 2002

HAND GEOMETRY READER SPECIFICATION RECOGNITION SYSTEMS HANDKEY CM

Measurements 90+ measurements, size and shape of the hand

Verification time Less than 1 second Template size 9 bytes Power 12-24 VDC or VAC Operating Temperature 32ºF to 114ºF, at 0-85% relative humidity,

non-condensing Memory Retention Up to 5 years via the standard Internal Lithium Battery

Transaction Storage 1000 transactions, buffered Communications Communicates with LockLink Express via

programming port Baud Rate 9600 bps User Capacity 512 users standard, maximum 1,000 users Door Control Door Lock Output Alarm Monitoring Tamper, Door Switch Auxiliary Inputs Auxiliary Output Request to Exit Card Reader Input Proximity, Wiegand and magnetic stripe Duress Code Defined in LockLink Express Time Zones Defined in LockLink Express Size 8.85in. wide by 11.65in. high by 8.55in. deep Mounting Surface wall mountable, standard via key lock Table mount option available Display 2 lines, 16 characters each

Keypad Numerical keypad