1. Access Control
Sales Manual
1520 Dell Avenue
Campbell, CA 95008 USA
(408) 341-4100
(408) 341-4101 Fax
www.handreader.com
2. HandKey® Sales Manual
I. WHY HANDKEY? ................................................................................................3
II. WHAT IS HAND GEOMETRY? .....................................................................4
III. HANDKEY FREQUENTLY ASKED QUESTIONS ....................................7
IV. OTHER BIOMETRICS......................................................................................9
V. HANDLING OBJECTIONS ...........................................................................11
VI. HANDKEY FEATURE COMPARISON BY MODEL ...............................12
VII. HANDKEY II OR HANDKEY CR DEMONSTRATION ........................13
VIII. ID3D-R HANDKEY DEMONSTRATION .................................................15
IX. HANDKEY CM DEMONSTRATION ...........................................................17
X. PRODUCT SPECIFICATIONS .....................................................................21
Access Control Sales Manual 0602 Page 2 July 22, 2002
3. I. Why HandKey?
• HandKey ensures that access is granted to the right person –
not just anyone who happens to have the right card or key. A
hand can’t be lost, stolen, or loaned to a friend!
• HandKey uses a field-proven technology called hand geometry,
which verifies an individual’s identity based on the size and
shape of the hand. It does not take fingerprints or handprints.
• HandKeys pay for themselves by eliminating the cost of cards
and keys.
• Customers also reduce labor costs, because administration is
less time-consuming compared with card and key based
systems.
• If a customer wants to use cards, HandKey can be configured to accept input from most magnetic
stripe, proximity, and bar code cards.
• HandKey is easily integrated into existing access control systems. The standard HandKey
outputs a 26-bit Wiegand format for use with access control panels. Other formats can also be
accommodated.
• HandKeys reduce productivity losses due to lost or misplaced cards and keys. You can’t forget to
bring your hand to work!
• Recognition Systems (RSI), manufacturer of the HandKey, has been in business since 1986 and
is now owned by Ingersoll-Rand. Customers need not be concerned about purchasing unproven
technology from a startup company that might not stay in business. RSI is a financially stable
company and has been profitable for over 10 years.
• Over 60,000 HandReaders are currently in use throughout the world as of December 2001.
• RSI’s HandReaders have a reputation for reliability. They can be used in any type of work
environment, from corporate campuses to construction sites.
HandKey user stories
• The Northern Ireland Prison Service cut labor costs by installing
HandKeys at three of its prisons. They were able to re-assign guards
who formerly were posted at the main entrances. (RSI Case Study #12)
• The University of Georgia uses HandKeys for access control - and in its
dining halls, to ensure that only students who’ve paid for a meal plan
can enter the dining area. (RSI Case Study #14)
• San Francisco Airport has over 150 HandKeys controlling access to
secure areas for 34,000 employees. Roger Case, a technician
supervisor at the airport, says they went with HandKeys because they
found that “simple badges can be lost, stolen, or given to ‘cousins’ or
friends.” (Case Study #16 – coming soon)
• Data centers use HandKeys to keep their facilities secure and user-friendly for their customers. They
don’t have to issue cards that their customers will lose or forget. Customers can access the facility
any time, without having to carry a card. (Case Study #19 – coming soon)
Access Control Sales Manual 0602 Page 3 July 22, 2002
4. II. What is Hand Geometry?
Hand Geometry is a type of Biometric technology.
Biometrics are automated methods of identifying (or verifying
the identity of) an individual using a physical characteristic or
behavioral trait.
Biometrics may measure:
o Things you do, such as speech and handwriting
o Things you are, for example:
Hand Geometry
Fingerprint
Facial geometry
Eye: characteristics of the iris or retina
Hand Geometry has been in use longer than any other biometric.
Two-dimensional hand geometry device in 1970’s
RSI uses 3-dimensional hand geometry
Over 60,000 units installed as of December 2001
Major Applications:
o Access Control
o Time and Attendance
o Personal identification (passport control, cafeterias, health clubs)
How it works
Measures unique size and shape of the fingers and hand
Over 90 distinct measurements are made
o Length
o Width
o Thickness
o Surface Area
When the hand is placed for verification:
Low-level infrared light source ensures crisp, clear image
CCD camera records 3D image of the hand
Algorithm converts this image to a mathematical value
This value is compared with the hand template stored in memory
If the two match, identity is confirmed (the door is opened).
Enrollment is the process of entering a new user in a HandKey.
Supervisor accesses Enrollment menu
User enters ID number
HandKey prompts user to “Place Hand” three times
Each of the three hand images is converted to a mathematical value
These are combined to form the initial template.
The template size is 9 bytes.
The template is updated with each successful verification – it “learns your hand.”
Allows for changes due to weight gain or loss, aging, etc.
Eliminates need to re-enroll users.
Access Control Sales Manual 0602 Page 4 July 22, 2002
5. Hand placement is key to successful use
Slide hand into the unit
Web between middle & index fingers must make contact with web
finger pin
Close all fingers towards center of the hand
Finger pin lights on the top panel extinguish
Once all finger-pin lights go out, camera will record a digital image
of the hand.
Rings and Fingernails
Jewelry may be worn
Be consistent in the use of jewelry
Stones should face upwards
Long fingernails & false fingernails should have no adverse effects
Scores and Thresholds
Current hand image is compared with stored template for verification
Difference is expressed by a “Score” displayed on the LCD panel.
o Lower score = closer to stored template
Threshold - defined by end user/installer
o “System reject threshold” - global
o “User reject threshold” - individual
If Score < Threshold, ID is verified
o Low threshold reduces chance of false accept
o High threshold reduces chance of false reject (less chance of “try again” message)
The score is also used for troubleshooting. For example, if all users’ scores are going up, this
may indicate that the hand reader needs cleaning.
Important Error Rates
False Accept Rate (FAR): Rate at which an imposter is accepted by the biometric system
False Reject Rate (FRR): Rate at which an enrolled user is rejected by the system
HandKey error rates at default threshold setting:
o False Accept Rate - 0.1%
o False Reject Rate - 0.1%
Why is the False Reject Rate critical? An example:
A company has 100 employees. Each person verifies 2 times per day.
o That’s 200 transactions per day, 1000 per week.
o A 1% error rate means there could be as many as 10 problems per week.
o Our error rate of 0.1% means only 1 potential problem per week.
Each False Reject means that someone will have to spend time troubleshooting the problem. It
can also mean a loss of productivity when people are waiting to get in.
A high false reject rate will frustrate users and give them an excuse for not using the biometric.
Access Control Sales Manual 0602 Page 5 July 22, 2002
6. Verification vs. Identification
Verification: Enter ID number, then present biometric (hand, finger, face, etc.) for comparison with
stored template.
Identification: Present biometric; database is searched for your template.
Most biometric devices – including HandKey - do verification only.
Identification
o Some biometric vendors claim to do Identification
o Has been successful only with small databases
o Can be slow, requires powerful CPU to search database
Other Biometrics
Fingerprint
o BioScrypt
o Visionics
o Identix (OEM)
Iris
o Iridian
Voice
Signature
o CIC
Face
o Visionics
o Viisage
o Miros
o ZN
Retina
o EyeDentify
2-Finger Geometry
o BioMet Partners – Digi2
Access Control Sales Manual 0602 Page 6 July 22, 2002
7. III. HandKey Frequently Asked Questions
Q: Who is Recognition Systems?
A: 1.) In business since 1986
2.) Division of Ingersoll-Rand
3.) Profitable and growing
4.) Over 60,000 units installed as of
December 2001.
Q: How new is this technology?
A: With the release of the HandKey II this is the fourth generation of hand geometry readers
from Recognition Systems. Each generation has meant an increase in accuracy and
functionality, and a reduction in price.
Q: How many hand templates can be stored?
A: Up to 32,512 in a HandKey II or HandKey CR. Up to 27,904 in an ID3D. Up to 1000 in a
HandKey CM.
Q: What is the template size?
A: 9 bytes. This is important because other biometrics have much larger templates, so they
can’t handle as many users with a single device.
Q: Do rings or Band-Aids have an effect?
A: Not usually enough to reject a valid user. Just make sure the ring is in the upright
position and hand placement is proper.
Q: What happens if I injure my hand and have it bandaged or in a cast?
A: You can be enrolled with you left hand, palm up while the right hand is disabled. It’s not
as comfortable but will work fine.
Q: What is the false reject rate (authorized person can’t get in)?
A: Sandia National Laboratories has documented Recognition Systems’ products as having
a false reject rate of 0.1% (1 in 1000), the lowest of any biometric device. This is an
extremely important statistic. Rejecting authorized people creates unhappy users.
Q: I have a card system and want to add a biometric solution. Is this a problem?
A: No, it’s easily done. HandKey is easily integrated with into existing access control
systems. The standard HandKey outputs a 26-bit Wiegand format for use with access
control panels. Other formats can also be accommodated. Please contact RSI’s
applications engineer for additional information.
Q: How many digits can I use for an ID?
A: Up to 10.
Q: Can you interface to commonly used access control systems?
A: Yes, our system architecture allows us to interface to most commonly used access
control systems. We just need to know the format required. In some cases, there is an
additional charge.
Q: How is your throughput? We need to get a lot of people through the door quickly.
A: Typically the verification is less than 2 seconds. As people use the HandKey they
process faster. Typically, a HandKey will Process 15+ people per minute.
Q: My employees are concerned about hygiene issues. How do I address this concern?
Access Control Sales Manual 0602 Page 7 July 22, 2002
8. A: Compare hand placement on the platen to using a door knob/handle, money handling,
telephone use, or shaking hands.
Q: How often do I need to clean the HandKey, and how?
A: Typically, if the unit is so dirty that you don’t want to put your hand on it, it should be
cleaned. In most office environments the HandKey platen would need to be cleaned once
every two to three weeks. The HandKey should be cleaned with glass cleaner and a soft
cloth.
Q: Are there any privacy issues?
A: Hand geometry technology cannot be reverse-engineered to identify people. It does not
store the image of the hand, but instead stores a 9-byte template, which is a
mathematical representation of the hand image. This mathematical value is meaningless
to other devices. In addition, no fingerprint or palm print information is gathered.
Q: Is the HandKey safe?
A: The infrared lights used in the hand reader are similar to those used in remote controls
for TVs and VCRs. The light’s power level is 100 milliwatts – less than the amount
produced by natural sunlight or microwave ovens. Recognition Systems has been
contacted by the U.S. Occupational Safety and Health Administration (OSHA), and has
supplied all requested information. OSHA has generated no reports of hazard.
Access Control Sales Manual 0602 Page 8 July 22, 2002
9. IV. Other Biometrics
Competitive quick reference
Technology Defined Where it is used Perceived Why not access control
Advantages
Fingerprint None necessary Background De-facto when Higher False Reject Rate
Checks talking about Higher Failure to Enroll Rate
Low volume biometrics. False 1 in 50 does not have
access control accept rate can readable fingerprints
be lower Criminal Connotation
Pricing may be Privacy Perceptions
lower Residue, dirt, dryness & injury
cause recognition problems
Facial Video camera Surveillance – It is cool User can be identified without
looks at the size However a Non-contact their knowledge. This may be
and shape of human is the viewed as a privacy issue.
your face ultimate decision Higher false reject rates
maker Higher false positives
People can change
appearance
Challenges with lighting
issues
Iris scanning Video camera Access Control Cool – High Tech Low user acceptance
looks at the and identity Very high Slower throughput –
colored doughnut verification security positioning can be time
portion of your consuming.
eye Problems with lighting,
eyeglasses, and contact
lenses.
Higher failure to enroll rate
Larger template (512 bytes
per eye)
Retina Infra-red light Government None really Very low user acceptance
source used to applications Very high Requires close proximity of
examine the security eye to reader
retina (back wall)
of the eye
Signature A pen or stylus is Logical access Something we do Writing on the wall just
used to measure control everyday doesn’t make sense – slow
the speed, Electronic Poor long term reliability
direction, and Signature - Signature changes
pressure with - Stress affects signature
which one writes Higher false reject rates
their signature
Voice Microphone or Logical access Inexpensive No one likes to talk to a wall
telephone used control Background noise
to capture Higher false reject rate
speech and Digital recordings may be
compare it to a accepted
database using Variation in microphone gain
custom software can cause problems
Access Control Sales Manual 0602 Page 9 July 22, 2002
10. Competitive Selling Tips: Fingerprint and Two-Finger Geometry
Two-Finger Geometry is most similar to Hand Geometry
o ‘Digi2’ product manufactured by Biomet Partners and sold through OEMs
o Typically only offered with low-end packages
o Very little is known about this product (has not been included in independent research)
o Competitive Selling Tip:
“Two-finger geometry measures only two fingers. Hand Geometry measures four
fingers and part of the hand. Which do you think would be more reliable?”
Fingerprint readers are made by more than 80 different companies
o Some access control business partners and competitors offer fingerprint as an option
o Typically it is offered by low-end competitors, but not always.
o Competitive Selling Tips:
Encourage prospect to ask the other vendor how many installations they have
with this particular fingerprint reader.
Use case studies and references. Encourage prospect to ask other vendor for
the same.
Ask prospect how their employees (or customers) might feel about using
fingerprint readers!
General tips
Competitors may make extravagant claims regarding their False Accept and False Reject Rates.
Don’t believe them! RSI’s error rates have been proven in the field.
Most biometric manufacturers are not financially stable. Who wants to buy a product and then
find out that the manufacturer has gone out of business? RSI is the rare exception in the
biometrics industry. We are owned by Ingersoll-Rand, and have been a financially solid,
profitable company for over 10 years.
There are over 50,000 RSI HandReaders installed. Always encourage prospects to ask other
vendors how many physical access control installations they have.
Be careful not to be too negative about other biometric products; this could result in a negative
impression of all biometrics. Emphasize RSI’s strong points, rather than the competitor’s weak
points.
Privacy issues: Hand geometry has many advantages in this area, including:
o No law enforcement agency keeps a database of hand templates. Fingerprints and facial
geometry templates are used in law enforcement.
o The nature of hand geometry ensures that every user is an active, willing participant and
cannot be identified without their knowledge.
Fingerprint technology causes concerns (not necessarily valid) that a user could
be identified by comparing “latent prints” with the stored template.
Some facial recognition applications “scan the crowd” to identify known criminals.
Access Control Sales Manual 0602 Page 10 July 22, 2002
11. V. Handling Objections
Objection How to overcome objection
“It’s too expensive” Payback in as little as 3-6 months
“This seems really high-tech. I don’t want to take Manufacturer in business since 1986; profitable
chances on new, unproven technologies.” since 1990
Over 60,000 units installed
“Why does the ID number have to be entered? The HandKey does verification, a one to one
Why can’t the HandKey figure out who I am when search based on the ID number. This process
I place my hand on it?” takes less than one second. Some biometric
companies say they can do identification – a one
to many search. This is not common, and has only
been successful with small groups of users. It is a
slow process and requires a very powerful
computer to perform the search. It’s just not
practical or cost-effective for most applications.
“What about privacy issues? Can the hand data Emphasize that it doesn’t read finger or palm
be used to identify someone for other purposes?” prints.
Doesn’t store image of hand, only the 9 byte
template – a mathematical value that is
meaningless for any other purpose. No law
enforcement agency keeps a database of hand
templates.
With hand geometry, a user can’t be identified
without their knowledge.
“Do my employees need to be concerned about Infrared light = 100 milliwatts, similar to remote
radiation from the HandKey?” controls for TVs, VCRs, etc.
“My employees are worried they’ll get germs from Compare to door knob/handle, shaking hands,
the HandKey” money.
If employees are still concerned, they can clean
the platen before using (leave Windex and cloth
next to HandKey).
“I’m concerned that my employees will think of this HandReaders are installed to increase security.
as a ‘Big Brother’ type of thing – that we don’t Using a HandReader guarantees that only the
trust any of them. credential owner has access. This ensures that
someone else cannot gain access using your
identity.
“The error rates sound high. 1 in 1000 doesn’t Adjustable Threshold can reduce FAR or FRR,
seem like it’s very reliable.” depending on customer needs and preferences.
False reject only means that you have to try again
– just like you have to do, much more frequently,
with a card reader.
Other biometrics have lower FAR, but higher FRR
Access Control Sales Manual 0602 Page 11 July 22, 2002
12. VI. HandKey feature comparison by model
Access Control Product Line – Quick Reference
HandKey CM HandKey II ID3D-R
HandKey
Standard User Memory 512 512 256
Expandable User Memory 1000 max 32,512 max 27,904 max
Transaction buffer size 1000 5120 3400
Door Control + WCM
Power Input 12-24VAC or VDC 12-24VAC or VDC 12-24VAC or VDC
Construction Plastic Plastic Metal
Surface Wall mount Integrated Integrated Option
Recessed Wall mount No No Option
Table mount Option Option Standard
CM Programming Ports No No
RS 422 Communications No
RS 232 Communications No No
Modem Communications No Option Option
Ethernet Communications No Option Option
RS232 printer output No No
Auxiliary Inputs 2 2 1
Auxiliary Outputs 2 3 1
Auto Daylight Savings Time
Operational Battery Backup Option Option Option
Red/Green light on top panel Option
Outdoor Options Available Hurricane Hurricane Blizzard
Tsunami Tsunami
Access Control Sales Manual 0602 Page 12 July 22, 2002
13. VII. HandKey II or HandKey CR Demonstration
Before you start
Bring your own extension cord.
Turn dip switches #4 and 5 on. This will reset your reader and wipe out any hand templates
currently stored when power is applied.
Plug in your HandReader. There is a barrel power jack on the back of the reader.
Turn dip switches #4 and 5 Off. Dip switches 1-3 should also be off. Dip switches are next to
power jack connection on back of reader.
Setup reader so platen is 40 inches above the ground, or on table top if user will be seated.
Height is critical for verification.
First enroll yourself, then you will be able to access menus to enroll others.
Set Time and Date (if needed)
Set ID length to 3
Enroll yourself
To get entry to menus, press: Clear and Enter
Enter password followed by # key: 4#
Enroll: Press #
Enter the ID, followed by the Enter key: XXX then Enter
Place Hand 1/3 (remove hand)
Place Hand 2/3 (remove hand)
Place Hand 3/3 (remove hand)
You are now enrolled
Enroll your prospects as users
To get entry to password level Press: Clear and Enter
Enter your ID, followed by the Enter key: XXX then Enter
Place your hand for verification
Enter password followed by # key: 4#
Enroll: Press #
Enter the user ID, followed by the Enter key: XXX then Enter
Place Hand 1/3 (remove hand)
Place Hand 2/3 (remove hand)
Place Hand 3/3 (remove hand)
The user is now enrolled
Demonstrating Tips
Demonstrate verification prior to enrolling them.
o This allows the person to see how the hand is placed into the reader, lowering errors and
frustration.
Remember their ID number when you enroll them. Repeat their number to them before they try
to verify, or enter their number in for them.
o If they forget, so will their users. Make the first time as easy as possible.
Try to cheat for them. If others are around, have them attempt to verify with your ID number.
Explain the score. Explain why it aids employees in correct hand placement.
Access Control Sales Manual 0602 Page 13 July 22, 2002
14. COMMAND MODE – HANDKEY II
MENU Management
Service Menu Setup Menu Enrollment Menu Security Menu
NAME Menu
Default
1 2 3 4 5
Password
Authority
Level 1 2 3 4 5
Required
Calibrate Set Language List Users Add User Set User Data
Set Date * Data from
Status Display Remove User Set TZ Table
Format Network
* Network Set Time & Reject
* Data to Network
Status Date Threshold
Set Address Set Passwords
Set ID Length Clear Memory
Set Output
Special Enroll
Mode
Set Facility
Lock/Shunt
Time
Aux Out
Control
Set Reader
Mode
Set Serial
Set Duress
Code
Print Options
Set Beeper
* These menu items are only available in a reader configured as a Master.
Access Control Sales Manual 0602 Page 14 July 22, 2002
15. VIII. ID3D-R HandKey Demonstration
Before you start
Bring your own extension cord.
Turn dipswitch #4 on. This will reset your reader and wipe out any hand templates currently
stored when power is applied.
Plug the terminal block with the power wires into the HandReader.
Plug in your HandReader while compressing the white tamper switch on the back of the
HandReader. If the back plate is on the HandReader, then the tamper should be pressed.
Turn dipswitch #4 off. Dipswitches 1-3 should also be off.
Setup reader so platen is 40 inches above the ground, or on tabletop if user will be seated.
Height is critical for verification.
First enroll yourself, then you will be able to access menus to enroll others.
Set Time and Date if necessary
Set ID length to 3 or 4 if desired
Enroll yourself
To get entry to menus, press#: #
Enter password followed by # key: 4#
Enroll: Press #
Enter the ID, followed by the Enter key: XXX then #
Place Hand 1/3 (remove hand)
Place Hand 2/3 (remove hand)
Place Hand 3/3 (remove hand)
You are now enrolled
Enroll your prospects as users
Enter your ID, followed by the # key: XXX then #
Place your hand for verification
Press # right after verification: #
Enter password followed by # key: 4#
Enroll: Press #
Enter the user ID, followed by the # key: XXX then #
Place Hand 1/3 (remove hand)
Place Hand 2/3 (remove hand)
Place Hand 3/3 (remove hand)
The user is now enrolled
Demonstrating Tips
Demonstrate verification prior to enrolling them.
o This allows the person to see how the hand is placed into the reader, lowering errors and
frustration.
Remember their ID number when you enroll them. Repeat their number to them before they try
to verify, or enter their number in for them.
o If they forget, so will their users. Make the first time as easy as possible.
Try to cheat for them. If others are around, have them attempt to verify with your ID number.
Explain the score. Explain why it aids employees in correct hand placement.
Access Control Sales Manual 0602 Page 15 July 22, 2002
16. COMMAND MODE – ID3D-R HANDKEY
MENU Management
Service Menu Setup Menu Enrollment Menu Security Menu
NAME Menu
Default
1 2 3 4 5
Password
Authority
Level 1 2 3 4 5
Required
Calibrate Print Options Set Time & Date Add User Set User Data
Status Display ID Entry Mode List Users Remove User Set TZ Table
* Network Set Reader Reject
Save Data
Status Mode Threshold
Set Output
Restore Data Set Passwords
Mode
Lock/Shunt
* Data to Network Clear Memory
Time
Aux Out * Data from
No Hand Enroll
Control Network
Set Site Code
Set Serial
Set Beeper
* These menu items are only available in a reader configured as a Master.
Page 16
17. IX. HandKey CM Demonstration
Before you start
Bring your own extension cord.
Turn your reader so the back of the reader is facing you.
Turn dip switches #4 and 5 on (away from you). Dipswitch 3 should be on.
Dipswitches 1-2 should be off (towards you). Dipswitches are next to the power
jack connection on back of the HandReader.
Plug the barrel end of the power supply into the barrel connector located at J12.
Turn your HandReader around so the front is facing towards you.
Plug your power supply into the wall.
The HandReader will begin its power-up cycle. The Front Panel Version will
appear on the screen.
Immediately after Front Panel Version disappears from the screen: press and
hold 8.
The reader will say Enter password: Press 5 and press enter
The prompt will say SW4, SW5 both on Reboot? Press: # for YES
This will reset your HandReader and wipe out any hand templates currently
stored when power is applied. This will take a few seconds.
When the HandReader prompt displays READY, turn dip switches #4 and 5 off.
Setup reader so platen is 40 inches above the ground, or on the tabletop if user
will be seated. Height is critical for verification.
First enroll yourself, then you will be able to access menus to enroll others.
Set Time and Date (if needed)
Set ID length to 3 or 4 (if desired)
Enroll yourself
To get entry to menus, press: Clear and Enter
Enter password followed by # key: 4#
Select Add User: Press #
Enter an ID, then press Enter: XXX then Enter
Place Hand 1/3 (remove hand)
Place Hand 2/3 (remove hand)
Place Hand 3/3 (remove hand)
You are now enrolled
Enroll yourself with a second ID number
Then press Clear to exit command mode
Access Control Sales Manual 0602 Page 17 July 22, 2002
18. Demonstrating Tips
Before you begin, demonstrate verification.
o This allows the person to see how the hand is placed into the reader,
lowering errors and frustration.
Explain the enrollment process and how they should place their hand.
Explain that they should land their hand like a plane and close their fingers on the
pins.
Let the user practice hand placement before you enroll them. Watch to be sure
that their fingers are touching the appropriate finger pins.
Remember their ID number when you enroll them. Repeat their number to them
before they try to verify.
o If they forget so will their users. Make the first time as easy as possible.
Enroll your prospects as users
To get to the password level Press: Clear and Enter
Enter your ID, followed by the Enter key: XXX then Enter
Place your hand for verification
Enter password followed by # key: 4#
Select Add User: Press #
Have the user enter an ID number, then press Enter: YYY then Enter
Place Hand 1/3 (remove hand)
Place Hand 2/3 (remove hand)
Place Hand 3/3 (remove hand)
The user is now enrolled
Press Clear to exit command mode
Verification
Allow the user to verify their hand.
Have the user enter their ID, then press enter: YYY then Enter
Have the user place their hand for verification: Place hand
When the user successfully verifies the LCD will display the following
o ID Verified
o Score
Access Control Sales Manual 0602 Page 18 July 22, 2002
19. The top panel will also show a green light.
Explain the score. Explain how it aids in correct hand placement.
HINTS:
Entering Command Mode
Command Mode is the menu tree used in programming a HandReader.
When NO users are enrolled:
1. Press Clear and then press Enter on the HandReader keypad.
2. The HandReader will prompt you to ENTER PASSWORD.
3. Here you would type in the password of the menu you need to
access.
4. Press Enter.
When users are enrolled:
1. Press Clear and then press Enter on the HandReader keypad.
2. The HandReader will NOT prompt you to ENTER PASSWORD at this
time. Instead you will see the READY string on line one, and on line
two you will see :
This means that there are users already enrolled in the HandReader.
You must verify your identity before being allowed into Command
Mode.
3. At the : prompt, Type in your User ID number. Then press Enter.
Follow the directions on the screen and place your hand.
4. When your identity has been verified, the HandReader will prompt you
to ENTER PASSWORD.
5. Here you would type in the password of the menu you need to
access.
6. Press Enter.
Exiting Command Mode
1. To exit command mode, you can do one of two things:
a. If you are NOT in a menu item that requires a numerical input,
you can press any number key.
b. If you are NOT in a menu item that requires an input, you can
press Clear.
2. You may have to press Clear several times to return to the READY
prompt if you are more than one level deep in the menu tree.
Access Control Sales Manual 0602 Page 19 July 22, 2002
20. COMMAND MODE – HANDKEY CM
MENU Management
Service Menu Setup Menu Enrollment Menu Security Menu
NAME Menu
Default
1 2 3 4 5
Password
Authority
Level 1 2 3 4 5
Required
Calibrate Set Language List Users Add User Set User Data
Set Date
Status Display Remove User Set TZ Table
Format
Set Time & Reject
Date Threshold
Set ID Length Set Passwords
Lock/Shunt
Clear Memory
Time
Aux Out
Special Enroll
Control
Set Duress
Code
Print Options
Set Beeper
NOTE: There are some menus that require an input. If you try to press CLEAR to
get out of these menus, nothing will happen. If you want to get out of the menu
without changing anything, press Enter to accept default values.
Access Control Sales Manual 0602 Page 20 July 22, 2002
21. X. Product Specifications
HAND GEOMETRY READER SPECIFICATION
RECOGNITION SYSTEMS HANDKEY II
Verification time Less than 1 second
Template size 9 bytes
Power 12-24 VDC
Memory Retention Up to 5 years via the standard Internal Lithium Battery
Transaction Storage 5187 transactions, buffered
Communications RS-485 (4 wire and 2 wire)
RS-232 Serial Printer Support or network communications
Modem or Ethernet - optional
Baud Rate 300 to 28.8 bps
User Capacity 512 Users standard
Internally expandable to 32,512
Door Control Door Lock Output
Alarm Monitoring
Tamper, Door Switch
Two Auxiliary Inputs
Three Auxiliary Outputs
Request to Exit
Card Reader Input Proximity, Wiegand, Magnetic Stripe, or Barcode
Card Reader Emulation Wiegand, Magnetic Stripe, or Barcode
Output
Duress Code 1 digit user definable
Time Zones 62 user definable
Unlimited Holidays
Size 8.85in. wide 11.65in. high 8.55in. deep
Access Control Sales Manual 0602 Page 21 July 22, 2002
22. HAND GEOMETRY READER SPECIFICATION
RECOGNITION SYSTEMS HANDKEY ID3D-R
Verification time Less than 1 second
Template size 9 bytes
Power 12-14 VDC
Memory Retention Up to 5 years via the standard Internal Lithium Battery
Transaction Storage 3405 transactions, buffered
Communications RS-485 (4 wire and 2 wire)
RS-232 Serial Printer Support
User Capacity 256 Users standard
Internally expandable to 27,904
Door Control Door Lock Output
Alarm Monitoring
Tamper, Door Switch
Auxiliary Input
Auxiliary Output
Request to Exit
Card Reader Input Proximity, Wiegand, Magnetic Stripe, or Barcode
Card Reader Emulation Wiegand or Magnetic Stripe
Output
Duress Code 1 digit user definable
Time Zones 62 user definable
Unlimited Holidays
Size 6.46 in. wide
8.25 in. high
7.29 in. deep
Access Control Sales Manual 0602 Page 22 July 22, 2002
23. HAND GEOMETRY READER SPECIFICATION
RECOGNITION SYSTEMS OUTDOOR HANDKEY ID3D-RW
Temperature Range 0°F to 120°F
Verification time Less than 1 second
Template size 9 bytes
Power 12-14 VDC
Memory Retention Up to 5 years via the standard Internal Lithium Battery
Transaction Storage 3405 transactions, buffered
Communications RS-485 (4 wire and 2 wire)
RS-232 Serial Printer Support
User Capacity 256 Users standard
Internally expandable to 27,904
Door Control Door Lock Output
Alarm Monitoring
Tamper, Door Switch
Auxiliary Input
Auxiliary Output
Request to Exit
Card Reader Input Proximity, Wiegand, Magnetic Stripe, or Barcode
Card Reader Emulation Wiegand or Magnetic Stripe
Output
Duress Code 1 digit user definable
Time Zones 62 user definable
Unlimited Holidays
Size 8.0 in. wide
12.0 in. high
8.7 in. deep
Weight 20.6 lbs.
Wall Mount Included
Humidity Levels Permitted Non-Condensing
Heaters 24VAC in addition to the 12-14VDC for the HandReader
Maintain platen and LCD temperature at approx 70°F to 75°F
Options 120VAC – 24VAC Heater Transformer
Access Control Sales Manual 0602 Page 23 July 22, 2002
24. HAND GEOMETRY READER SPECIFICATION
RECOGNITION SYSTEMS HANDKEY CM
Measurements 90+ measurements, size and shape of the hand
Verification time Less than 1 second
Template size 9 bytes
Power 12-24 VDC or VAC
Operating Temperature 32ºF to 114ºF, at 0-85% relative humidity,
non-condensing
Memory Retention Up to 5 years via the standard Internal Lithium Battery
Transaction Storage 1000 transactions, buffered
Communications Communicates with LockLink Express via
programming port
Baud Rate 9600 bps
User Capacity 512 users standard, maximum 1,000 users
Door Control Door Lock Output
Alarm Monitoring
Tamper, Door Switch
Auxiliary Inputs
Auxiliary Output
Request to Exit
Card Reader Input Proximity, Wiegand and magnetic stripe
Duress Code Defined in LockLink Express
Time Zones Defined in LockLink Express
Size 8.85in. wide by 11.65in. high by 8.55in. deep
Mounting Surface wall mountable, standard via key lock
Table mount option available
Display 2 lines, 16 characters each
Keypad Numerical keypad
Access Control Sales Manual 0602 Page 24 July 22, 2002