Cross Match® Technologies, Inc. D SCAN® AUTHENTICATOR CF™ Document Authentication Reader User Manual Version 2.
Second Edition (March 2009) Specifications are subject to change without prior notice. Cross Match Technologies GmbH assumes no liability for maloperation or improper use of products. Cross Match® and D SCAN® are registered trademarks, and the CROSS MATCH TECHNOLOGIES logo is a trademark of Cross Match Technologies, Inc. All other trademarks, brands and names are the property of their respective owners and are protected by US and international copyright and trademark laws.
Contents Introduction Appropriate Operation ...................................................................... 1-1 Who should read this book ................................................................ 1-1 How this book is arranged ................................................................. 1-1 Standards ....................................................................................... 1-2 FCC statement .................................................................................
Using the generated log .................................................................3-8 Creating background images ..............................................................3-9 Preparation ..................................................................................3-9 Procedure ....................................................................................3-9 How to use the Authenticator CF Applications and software levels .........................................................
Figures Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure 2.1: D SCAN AUTHENTICATOR CF front view ...................................... 2-2 2.2: D SCAN AUTHENTICATOR CF instruction label .............................. 2-2 2.3: Top view of the D SCAN AUTHENTICATOR CF ...............................................2-4 2.4: Ambient light cover positions ..................
iv D SCAN® AUTHENTICATOR CF™ User Manual V2.
Tables Table Table Table Table Table Table Table 1.1: 2.1: 2.2: 5.2: 7.1: 7.2: 7.3: Glossary of terms ............................................................ 1-4 D SCAN AUTHENTICATOR CF major components .......................... 2-3 D SCAN AUTHENTICATOR CF back view ....................................... 2-5 Product specifications ....................................................... 5-2 The Technical Support department addresses ......................
vi D SCAN® AUTHENTICATOR CF™ User Manual V2.
1 Introduction Chapter 0 Appropriate Operation The D SCAN® AUTHENTICATOR CF is a full color image and full page reader for the intended use of acquisition and transmission of personal and document data. The device has the capability to capture images of an entire data page of any ID document in different illuminations and to read RFID data contactless found on the RFID chip.
Introduction Standards The following standards are used in this book: • Bold UPPER/lower case and tilted text identify important information. • Special information can appear as a Note, Caution, Warning, or Danger. Note Caution Warning DANGER A Note contains additional information. To ignore a note can cause a delay, but not mechanical damage or personal injury. A Caution contains a method to prevent data loss or damage to equipment. To ignore the caution can cause damage or data loss.
Introduction Statement of Compliance Cross Match Technologies GmbH, hereby, declares that this device is in compliance with the essential requirements and other relevant provisions of Directives 89/336/EEC and 2006/95/EC. Declaration of Conformities may be directly obtained from Cross Match Technologies GmbH. Recycling information Cross Match Technologies recommends that customers dispose of their used computer hardware, monitors, printers and other peripherals in an environmentally sound manner.
Introduction Caution Do not open the device. Repairs are only allowed by Cross Match Technologies. Changes or modifications not expressly approved by Cross Match Technologies could void the user's authority to operate the equipment. • Whenever it is likely that the electrical protection has been compromised, the device and system must be made unplugged and secured against unauthorized use. • Do not apply mechanical stress to the document contact area. Do not throw heavy objects onto it.
Introduction Table 1.1 Glossary of terms Term Definition DSM D SCAN Master. Optional middleware software which supports: • High level document access (optical and RFID) including workflow support, cryptographic protocols, and OCR • Optional SDKs for both software levels • Optional document definitions for customer specific documents • Optional development support • Supports future upgrade of firmware and software DSX D SCAN Extensions.
Introduction Table 1.1 Glossary of terms Term Definition Kensington Also called a K-Slot or Kensington lock, is a small hole found on Security Slot almost all small or portable computer and electronics equipment, particularly on expensive and relatively light ones. It is used for attaching a lock, in particular those from Kensington Computer Products Group, who are its originators.
Introduction Table 1.1 Glossary of terms Term Definition Smart card A smart card, chip card, or integrated circuit card (ICC), is defined as any pocket-sized card with embedded integrated circuits which can process information. The card is made of plastic, generally PVC, but sometimes ABS or polycarbonate. The card may embed a hologram or other security features to avoid counterfeiting.
Introduction 1-8 D SCAN® AUTHENTICATOR CF™ User Manual V2.
2 Installation Chapter 0 THIS CHAPTER DESCRIBES THE D SCAN AUTHENTICATOR CF AND HOW TO INSTALL THE DOCUMENT AUTHENTICATION READER. D SCAN AUTHENTICATOR CF The compact single step full page document reader D SCAN AUTHENTICATOR CF (CF stands for Compact Full page) is the newest and smallest member of the D SCAN AUTHENTICATOR product family. Some of the following characteristics require additional software functions which might be contained in D SCAN Master or project specific.
Installation Singapore in 2005, and in Germany in 2006, where they were able to read all presented passports. • The operation and display of results is controlled by a special software as well as all functions. Front view 1 2 3 4 Figure 2.1 D SCAN AUTHENTICATOR CF front view 5 Figure 2.2 2-2 D SCAN AUTHENTICATOR CF instruction label D SCAN® AUTHENTICATOR CF™ User Manual V2.
Installation Table 2.1 # D SCAN AUTHENTICATOR CF major components Description 1 Ambient light cover. The height adjustable cover is used as a mask to reduce outside light during operation and protects the document contact area when the device is not in use. 2 Document contact area. The glass bearing surface where documents are placed to be verified. It is divided into the optical scan area and the document support area. The entire document contact area is covered by the RFID antenna.
Installation 1 4 4 2 Figure 2.3 # 3 Top view of the D SCAN AUTHENTICATOR CF Description 1 Document positioning angle. The document positioning angle helps to guarantee the exact final position of the document for authentication. 2 Optical scan area. The glass bearing surface where documents are placed to be verified. A dotted line shows the area of optical reading. 3 Document support area. The part of the glass bearing surface which is not used for scanning.
Installation 1 Figure 2.4 2 3 Ambient light cover positions Back view 4 1 2 Figure 2.5 D SCAN AUTHENTICATOR CF back view Table 2.2 D SCAN AUTHENTICATOR CF back view # 3 Description 1 USB-A connector. The USB 2.0 high speed interface cable connects the Authenticator to the computer and delivers the reading data to the computer. 2 Power connector. Connects the power source to the computer and supplies 19 VDC to operate the document reader. 3 Kensington security slot.
Installation Product label A label on the back of the device contains information on Manufacture, Product Name, Model Number, Code Number, Serial Number, Connection Values, FCC Compliance, CE Compliance and other Certification Symbols. The field Code can contain the abbreviation UV4, which indicates that the optionally ultraviolet illumination is installed: Figure 2.6 D SCAN AUTHENTICATOR CF product label System requirements The D SCAN AUTHENTICATOR CF can be connected to a computer using the USB 2.
Installation Installation This section describes how to install the D SCAN AUTHENTICATOR CF. Remove the contents Note Keep all original materials in the event you return the document reader. Remove all the contents from the product package.
Installation 4 Insert the cable connectors into their related connectors in the connection box. 1 Figure 2.7 2 D SCAN AUTHENTICATOR CF connection box 5 Connect the power supply to the AC electrical outlet. • All LEDs should quickly flash on and off. The orange LED comes on again flashing indicating the standby mode. Note When the power is applied to the D SCAN AUTHENTICATOR CF, it is permanently powered on.
3 Starting the first time Chapter 0 THIS CHAPTER DESCRIBES A TOOL THAT HELPS TO PERFORM A COMPLETE INTERACTIVE DIAGNOSIS OF THE DOCUMENT AUTHENTICATION READER AND HOW TO CREATE BACKGROUND IMAGES. Separate software tools that support the identification and diagnosis of technical problems are provided as part of the D SCAN Essentials software packages.
Starting the first time Figure 3.1 D SCAN TestWizard start screen 3 Click Start Checks... to start the system configuration test sequence. Checking the system configuration The first step in the sequence is an automatic analysis of such system resources as: • CPU type and details, • PC main memory (RAM), • Operating system and File system • Screen resolution, color depth • and Current versions of the software components. Figure 3.
Starting the first time Caution This information is important to ensure the proper operation of the whole system. Especially when selecting and configuring a new PC, since incorrect resources can cause slow performance, wrong data and even crashes. 1 Clicking Next starts the Device List page. This page lists all detected devices connected to the PC and showing the Device Name, the Serial Number, and the available interfaces of the document reader. Figure 3.
Starting the first time Detailed document reader information After successful initialization, the Device Overview page appears, showing you the following information about the document reader connected to your computer. • The device type, serial number and initialization status, • Firmware and revision version, • Production date and last service, • Operating times and some more properties Figure 3.4 Device overview page 1 After reading this information click Next to start the User Controls page.
Starting the first time Figure 3.5 Note User controls page A physical defect LED or beeper cannot be detected automatically. It is necessary to observe the test patterns to identify any malfunction or defect manually. An observed malfunction should be added manually to the log file as a Comment at the Tests Completed Page. 3 Click Next to finish the test session. The RFID reader page appears.
Starting the first time 1 Figure 3.6 RFID reader test page 3 After completing click Next to continue the test session. The Image Acquisition page appears. Testing the reader unit The document reader contains a digital camera, which is able to work for capturing images with different illuminations. By examining the document reader properties you are able to test all supported image types.
Starting the first time • The column Status shows which capture mode will be tested and whether the test was successful. Not successfully tests displaying an alphanumerical information. 1 2 Figure 3.7 Image acquisition page • Clicking the button Capture and Save Background Images (2) at the right side below the list opens a separate page. This page allows capturing and saving background images. The list shows all supported image types and the status of the tests. Figure 3.
Starting the first time • Using the function buttons is similar to the procedures described above for the Test buttons. • For more details how to create background images see section “Creating background images” on page 3-9. • To close the Capture and Save page click OK. • After completing all tests click Next to finish the test session. The Tests Completed page appears.
Starting the first time 4 Click Exit to close the D SCAN TestWizard. The service technician must save this log file to send it to the responsible service or support center. This log file also contains the document reader serial number and the firmware version number. These two pieces of information are among the most important for tracking problems.
Starting the first time Figure 3.10 Prepare the white test chart 2 Put the test chart on the document contact area so that the white side faces down to the glass platen and position it along the left (L) and the back (B) part of the document positioning angle. The yellow back side of the test chart must pointing to the top. B L Figure 3.11 Placing the white test chart 3-10 D SCAN® AUTHENTICATOR CF™ User Manual V2.
Starting the first time 3 Move the ambient light cover in the operating position. 4 On the Image Acquisition page click Capture and Save Background Images (2). The appearing separate page allows capturing and saving background images. 2 Figure 3.12 Image acquisition page • The top of the page shows an information to remind you that the white test chart must be used.
Starting the first time 5 After completing click OK to close the page and close the TestWizard. 6 Remove the white test chart and store it on a save place for further use. Protect the unprotected side with a soft cloth to avoid dirt and damages. 7 You have completed the procedure. The created background images are stored on the computer connected to the D SCAN AUTHENTICATOR CF in the Folder \bin of the D SCAN Essentials root directory using the following syntax: S/N of the device (9 digits)_IMT_image typ
4 How to use the Authenticator CF Chapter 0 THIS CHAPTER DESCRIBES THE FIELDS OF APPLICATION, THE CHARACTERISTICS OF DOCUMENTS AND HOW TO READ A DOCUMENT WITH THE D SCAN AUTHENTICATOR CF USING THE D SCAN MASTER DEMO APPLICATION. Applications and software levels The D SCAN AUTHENTICATOR CF is available with two software levels, the D SCAN Essentials and D SCAN Master to allow easy integration into existing systems on different levels of completeness.
How to use the Authenticator CF Using the D SCAN Master software and/or additional customized functions the following main applications, without the demand of completeness are: Airports • Airline check-in and boarding, automated check-in • ID verification at the time of check-in • Creation of reference data for passenger tracking • Faster, more precise and more efficient passenger handling Rental car companies • Check-in • Verification of ID documents • Verification of driver’s licenses • Automated check-i
How to use the Authenticator CF The machine readable zone ICAO Doc 9303 requires that machine-readable data of a document be available within a specific zone. The MRZ is a defined rectangle situated exactly at the lower edge of the document: 23.2 (0.91) • 23.2 mm (0.91 in) height from the lower edge of the document • Over the total width of the document • It spans two lines and each line is 44 characters long document width The machine readable zone Figure 4.
How to use the Authenticator CF The procedure requires usually four steps: 1 Find the data page. 2 Rotate this page in such a manner that it faces down and the MRZ (M) is pointing left. 3 Put the page face down on the document contact area. 4 Move the document along the left part of the positioning angle until it stops. • The accurate final position must be along the left (L) and the back (B) part of the document positioning angle. B L M Figure 4.
How to use the Authenticator CF • Depending on the performance of your computer, starting up can take a short moment. • After successfully initialization the Overview window appears. Warning Do not look directly into the lights of the document contact area. Maintain a required minimum distance of not less than 11.8 inches (0.3 m). 5 Put the data page of the document to be read face down on the document contact area so that the MRZ is pointing left.
How to use the Authenticator CF • The left side shows both captured images. At the top the image taken with visible light (1) and below with infrared light (2). • The right side shows the captured visible data (3), which are printed on the document. • Additionally security information, error messages and processing information (4) are shown at the lower part on the right side. Errors or failed verifications are shown in red. • The Abort Scan button allows the operator to interrupt the scanning process.
How to use the Authenticator CF The RFID data page 1 Using the tab RFID Data provides the ability to show all data groups in the Hex-Format found on the RFID chip. • Click the down arrow in the Select box to see a list (6) containing all data groups. Chose the desired data group from the list using the mouse. If no RFID data available the Select box is grayed out. • Clicking the button Save, stores the chosen data group on your local disk. 6 Figure 4.
How to use the Authenticator CF 4-8 D SCAN® AUTHENTICATOR CF™ User Manual V2.
5 Maintenance Chapter 0 THIS CHAPTER DESCRIBES MAINTENANCE PROCEDURES THAT INCREASE THE LIFE OF THE DOCUMENT READER. Cleaning This section shows and describes how to clean the document contact area and the case. A clean document contact area is required for proper operation. It prevents dirt from reducing the image quality of the processed document.Clean the platen with normal glass cleaner and make sure that no dirt, fluids or skin oils remain. Warning Caution Do not pour liquids (water etc.
Maintenance Cleaning the case Warning Before you clean the case, disconnect the D SCAN AUTHENTICATOR CF from the grounded outlet. To remove smudges, laminate glue, finger prints or other dirt, and grime: 1 Take a soft, lint free cloth and put a small amount of glass cleaner on it. 2 Carefully wipe the case in a direction AWAY from the document contact area. Caution Do not use acetone, oil-based, abrasive or other unauthorized cleaners. This may damage the device and render it inoperable.
Maintenance Table 5.2 Product specifications Item Specification Humidity range 10 - 90% relative humidity, non condensing, no direct sunlight exposure Dimensions 10.36” x 8.35” x 5.89” (W x D x H) (263 x 212 x 150 mm) Weight approximately 6.6 lbs (3 kg), excluding cables and power pack Interface USB 2.0 High Speed, shielded cable Power supply Rated input: 21 ±3 V DC / min. 1 A and max.
Maintenance 5-4 D SCAN® AUTHENTICATOR CF™ User Manual V2.
6 Problems and Corrections Chapter 0 THIS CHAPTER CONTAINS COMMON PROBLEMS AND STEPS TO CORRECT THEM. Do the procedures in this section before you contact the Cross Match Technical Support department. The Authenticator does not work The error messages displayed: None. However the yellow processing light is flashing. First actions to correct the problem 1 Test the electrical outlet to ensure that the electrical outlet is working. 2 Check the correct installation of the power supply.
Problems and Corrections 4 Initialize the Authenticator again. More actions to correct the problem Contact the Technical Support department. Initialization failed The error messages displayed: None. However the yellow processing light is on. First actions to correct the problem 1 Verify USB cable is firmly connected to the computer or hub. 2 Initialize the Authenticator again. More actions to correct the problem 1 Open the Windows Task Manager and close the AU_HAL Server.exe.
Problems and Corrections Creating a problem report If the steps mentioned before were unsuccessful, please use the D SCAN TestWizard to perform a complete interactive diagnostic of the system. 1 2 3 4 5 Start the D SCAN TestWizard. Perform a complete system test. Create a log file. Save the log file. Send the log file to the responsible Service Center.
Problems and Corrections 6-4 D SCAN® AUTHENTICATOR CF™ User Manual V2.
7 Customer Care and Contact Information Chapter 0 THIS CHAPTER CONTAINS TECHNICAL SUPPORT INFORMATION FOR THE PRODUCT AND CONTACT INFORMATION FOR THE COMPANY. Technical Support The Technical Support department is available for the D SCAN AUTHENTICATOR CF. E-mail Cross Match Customer Care offers free technical hardware support on-line during the warranty period, in the order that the requests are received. Table 7.
Customer Care and Contact Information Free technical support is available by telephone or facsimile for the D SCAN AUTHENTICATOR CF under the warranty. After the warranty has expired, technical support is available at a given cost per hour. Contact Technical Support for complete information. The Technical Support for the software products and the services purchased from Cross Match Technologies is not included under the warranty.
Customer Care and Contact Information • Cross Match accepts all charges to return the product to the customer. The product is not in the warranty period The customer accepts all charges. Note You must return a product in the original boxes. If the original boxes are not available, contact the Technical Support department for instructions. Contact information Corporate Headquarters Cross Match Technologies, Inc.
Customer Care and Contact Information 7-4 D SCAN® AUTHENTICATOR CF™ User Manual V2.
Index A appropriate operation 1 -1 Authenticator CF before using 2 -7 packing list 2 -7 unpacking 2 -7 Authenticator CF major components 2 -3 B barcode 1 -4 before using the Authenticator CF 2 -7 C clean the processing surface 5 -1 cleaning 5 -1 common problems 7 -1 company telephone number 7 -3 connect the Authenticator CF 2 -7 connecting cables 2 -7 contact information 7 -3 corporate headquarters 7 -3 Germany 7 -3 corporate headquarters 7 -3 corporate web page 7 -3 D D SCAN Master Demo software E
telephone and fax 7 -1 terms 1 -4 troubleshooting U see problems under warranty 7 -2 unpack the Authenticator CF 2 -7 Index-2 unpacking the Authenticator CF 2 -7 W web page 7 -3 WEEE directive 1 -3 wipe off the case 5 -2 wipe off the processing surface 5 -1 D SCAN® AUTHENTICATOR CF™ User Manual V2.