User's Manual

MorphoAccess® SIGMA Extreme Series - Installation Guide
Identity & Security
Section 1 :Introduction
18
This document and the information therein are the property of Safran Identity & Security.
They must not be copied or communicated to a third party without the prior written authorization of Safran
2017_2000024418 - Draft
V0
January 2017
To secure properly an access, Safran Identity & Security recommends installing the
MorphoAccess® SIGMA Extreme Series terminal as a part of the typical Access Control
environment, described in the figure below.
Figure 1: Implementation Recommendations
This environment comprises:
The MorphoAccess® SIGMA Extreme Series terminal itself
Its role is to perform one-to-many biometric identification or one-to-one biometric
verification, i.e. to identify the individual who is presenting his finger on the terminal
sensor by comparing his biometric data with the references previously stored in the
terminal database (in the form of biometric templates) or to verify his identity using
the reference stored in a contactless card presented to the terminal.
An Access Controller (3rd party product)
The Controller is the element which controls the access rights of the individuals to the
secured area. For that reason, it must be located in the secured area.
ACCESS CONTROL
SYSTEM
(*) OR EQUIVALENT
NON SECURED
AREA
ACCESS
CONTROLLER
TCP/IP, Wiegand, Dataclock, RS485 or RS422
ELECTRIC
LATCH (*)
SECURED
AREA
Dry Contact
MorphoAccess
®
SIGMA Extreme
Terminal
Dry Contact
ALARM