SlideShare a Scribd company logo
1 of 24
Download to read offline
Access Control

            Sales Manual




1520 Dell Avenue
Campbell, CA 95008 USA
(408) 341-4100
(408) 341-4101 Fax
www.handreader.com
HandKey® Sales Manual

I.     WHY HANDKEY? ................................................................................................3

II.      WHAT IS HAND GEOMETRY? .....................................................................4

III.     HANDKEY FREQUENTLY ASKED QUESTIONS ....................................7

IV. OTHER BIOMETRICS......................................................................................9

V.       HANDLING OBJECTIONS ...........................................................................11

VI. HANDKEY FEATURE COMPARISON BY MODEL ...............................12

VII.       HANDKEY II OR HANDKEY CR DEMONSTRATION ........................13

VIII.      ID3D-R HANDKEY DEMONSTRATION .................................................15

IX. HANDKEY CM DEMONSTRATION ...........................................................17

X.       PRODUCT SPECIFICATIONS .....................................................................21




Access Control Sales Manual 0602                        Page 2                                           July 22, 2002
I.       Why HandKey?
     •   HandKey ensures that access is granted to the right person –
         not just anyone who happens to have the right card or key. A
         hand can’t be lost, stolen, or loaned to a friend!

     •   HandKey uses a field-proven technology called hand geometry,
         which verifies an individual’s identity based on the size and
         shape of the hand. It does not take fingerprints or handprints.

     •   HandKeys pay for themselves by eliminating the cost of cards
         and keys.

     •   Customers also reduce labor costs, because administration is
         less time-consuming compared with card and key based
         systems.

     •   If a customer wants to use cards, HandKey can be configured to accept input from most magnetic
         stripe, proximity, and bar code cards.

     •   HandKey is easily integrated into existing access control systems. The standard HandKey
         outputs a 26-bit Wiegand format for use with access control panels. Other formats can also be
         accommodated.

     •   HandKeys reduce productivity losses due to lost or misplaced cards and keys. You can’t forget to
         bring your hand to work!

     •   Recognition Systems (RSI), manufacturer of the HandKey, has been in business since 1986 and
         is now owned by Ingersoll-Rand. Customers need not be concerned about purchasing unproven
         technology from a startup company that might not stay in business. RSI is a financially stable
         company and has been profitable for over 10 years.

     •   Over 60,000 HandReaders are currently in use throughout the world as of December 2001.

     •   RSI’s HandReaders have a reputation for reliability. They can be used in any type of work
         environment, from corporate campuses to construction sites.


HandKey user stories

•    The Northern Ireland Prison Service cut labor costs by installing
     HandKeys at three of its prisons. They were able to re-assign guards
     who formerly were posted at the main entrances. (RSI Case Study #12)
•    The University of Georgia uses HandKeys for access control - and in its
     dining halls, to ensure that only students who’ve paid for a meal plan
     can enter the dining area. (RSI Case Study #14)
•    San Francisco Airport has over 150 HandKeys controlling access to
     secure areas for 34,000 employees. Roger Case, a technician
     supervisor at the airport, says they went with HandKeys because they
     found that “simple badges can be lost, stolen, or given to ‘cousins’ or
     friends.” (Case Study #16 – coming soon)
•    Data centers use HandKeys to keep their facilities secure and user-friendly for their customers. They
     don’t have to issue cards that their customers will lose or forget. Customers can access the facility
     any time, without having to carry a card. (Case Study #19 – coming soon)



Access Control Sales Manual 0602                   Page 3                                       July 22, 2002
II.      What is Hand Geometry?
Hand Geometry is a type of Biometric technology.
         Biometrics are automated methods of identifying (or verifying
         the identity of) an individual using a physical characteristic or
         behavioral trait.
         Biometrics may measure:
              o Things you do, such as speech and handwriting
              o Things you are, for example:
                           Hand Geometry
                           Fingerprint
                           Facial geometry
                           Eye: characteristics of the iris or retina


Hand Geometry has been in use longer than any other biometric.
         Two-dimensional hand geometry device in 1970’s
         RSI uses 3-dimensional hand geometry
         Over 60,000 units installed as of December 2001
         Major Applications:
             o Access Control
             o Time and Attendance
             o Personal identification (passport control, cafeterias, health clubs)


How it works
         Measures unique size and shape of the fingers and hand
         Over 90 distinct measurements are made
            o Length
            o Width
            o Thickness
            o Surface Area


When the hand is placed for verification:
         Low-level infrared light source ensures crisp, clear image
         CCD camera records 3D image of the hand
         Algorithm converts this image to a mathematical value
         This value is compared with the hand template stored in memory
         If the two match, identity is confirmed (the door is opened).


Enrollment is the process of entering a new user in a HandKey.
         Supervisor accesses Enrollment menu
         User enters ID number
         HandKey prompts user to “Place Hand” three times
         Each of the three hand images is converted to a mathematical value
         These are combined to form the initial template.
         The template size is 9 bytes.


The template is updated with each successful verification – it “learns your hand.”
         Allows for changes due to weight gain or loss, aging, etc.
         Eliminates need to re-enroll users.



Access Control Sales Manual 0602                     Page 4                           July 22, 2002
Hand placement is key to successful use
         Slide hand into the unit
         Web between middle & index fingers must make contact with web
         finger pin
         Close all fingers towards center of the hand
         Finger pin lights on the top panel extinguish
         Once all finger-pin lights go out, camera will record a digital image
         of the hand.


Rings and Fingernails
         Jewelry may be worn
         Be consistent in the use of jewelry
         Stones should face upwards
         Long fingernails & false fingernails should have no adverse effects


Scores and Thresholds
         Current hand image is compared with stored template for verification
         Difference is expressed by a “Score” displayed on the LCD panel.
              o Lower score = closer to stored template
         Threshold - defined by end user/installer
              o “System reject threshold” - global
              o “User reject threshold” - individual
         If Score < Threshold, ID is verified
              o Low threshold reduces chance of false accept
              o High threshold reduces chance of false reject (less chance of “try again” message)
         The score is also used for troubleshooting. For example, if all users’ scores are going up, this
         may indicate that the hand reader needs cleaning.


Important Error Rates
         False Accept Rate (FAR): Rate at which an imposter is accepted by the biometric system
         False Reject Rate (FRR): Rate at which an enrolled user is rejected by the system
         HandKey error rates at default threshold setting:
             o False Accept Rate - 0.1%
             o False Reject Rate - 0.1%


Why is the False Reject Rate critical? An example:
         A company has 100 employees. Each person verifies 2 times per day.
             o That’s 200 transactions per day, 1000 per week.
             o A 1% error rate means there could be as many as 10 problems per week.
             o Our error rate of 0.1% means only 1 potential problem per week.
         Each False Reject means that someone will have to spend time troubleshooting the problem. It
         can also mean a loss of productivity when people are waiting to get in.
         A high false reject rate will frustrate users and give them an excuse for not using the biometric.




Access Control Sales Manual 0602                    Page 5                                        July 22, 2002
Verification vs. Identification
         Verification: Enter ID number, then present biometric (hand, finger, face, etc.) for comparison with
         stored template.
         Identification: Present biometric; database is searched for your template.
         Most biometric devices – including HandKey - do verification only.
         Identification
             o Some biometric vendors claim to do Identification
             o Has been successful only with small databases
             o Can be slow, requires powerful CPU to search database


Other Biometrics
         Fingerprint
              o BioScrypt
              o Visionics
              o Identix (OEM)
         Iris
              o Iridian
         Voice
         Signature
              o CIC
         Face
              o Visionics
              o Viisage
              o Miros
              o ZN
         Retina
              o EyeDentify
         2-Finger Geometry
              o BioMet Partners – Digi2




Access Control Sales Manual 0602                    Page 6                                        July 22, 2002
III.     HandKey Frequently Asked Questions
         Q:       Who is Recognition Systems?
         A:       1.)    In business since 1986
                  2.)    Division of Ingersoll-Rand
                  3.)    Profitable and growing
                  4.)    Over 60,000 units installed as of
                         December 2001.

         Q:       How new is this technology?
         A:       With the release of the HandKey II this is the fourth generation of hand geometry readers
                  from Recognition Systems. Each generation has meant an increase in accuracy and
                  functionality, and a reduction in price.

         Q:       How many hand templates can be stored?
         A:       Up to 32,512 in a HandKey II or HandKey CR. Up to 27,904 in an ID3D. Up to 1000 in a
                  HandKey CM.

         Q:       What is the template size?
         A:       9 bytes. This is important because other biometrics have much larger templates, so they
                  can’t handle as many users with a single device.

         Q:       Do rings or Band-Aids have an effect?
         A:       Not usually enough to reject a valid user. Just make sure the ring is in the upright
                  position and hand placement is proper.

         Q:       What happens if I injure my hand and have it bandaged or in a cast?
         A:       You can be enrolled with you left hand, palm up while the right hand is disabled. It’s not
                  as comfortable but will work fine.

         Q:       What is the false reject rate (authorized person can’t get in)?
         A:       Sandia National Laboratories has documented Recognition Systems’ products as having
                  a false reject rate of 0.1% (1 in 1000), the lowest of any biometric device. This is an
                  extremely important statistic. Rejecting authorized people creates unhappy users.

         Q:       I have a card system and want to add a biometric solution. Is this a problem?
         A:       No, it’s easily done. HandKey is easily integrated with into existing access control
                  systems. The standard HandKey outputs a 26-bit Wiegand format for use with access
                  control panels. Other formats can also be accommodated. Please contact RSI’s
                  applications engineer for additional information.

         Q:       How many digits can I use for an ID?
         A:       Up to 10.

         Q:       Can you interface to commonly used access control systems?
         A:       Yes, our system architecture allows us to interface to most commonly used access
                  control systems. We just need to know the format required. In some cases, there is an
                  additional charge.

         Q:       How is your throughput? We need to get a lot of people through the door quickly.
         A:       Typically the verification is less than 2 seconds. As people use the HandKey they
                  process faster. Typically, a HandKey will Process 15+ people per minute.

         Q:       My employees are concerned about hygiene issues. How do I address this concern?




Access Control Sales Manual 0602                    Page 7                                         July 22, 2002
A:       Compare hand placement on the platen to using a door knob/handle, money handling,
                  telephone use, or shaking hands.

         Q:       How often do I need to clean the HandKey, and how?
         A:       Typically, if the unit is so dirty that you don’t want to put your hand on it, it should be
                  cleaned. In most office environments the HandKey platen would need to be cleaned once
                  every two to three weeks. The HandKey should be cleaned with glass cleaner and a soft
                  cloth.

         Q:       Are there any privacy issues?
         A:       Hand geometry technology cannot be reverse-engineered to identify people. It does not
                  store the image of the hand, but instead stores a 9-byte template, which is a
                  mathematical representation of the hand image. This mathematical value is meaningless
                  to other devices. In addition, no fingerprint or palm print information is gathered.

         Q:       Is the HandKey safe?
         A:       The infrared lights used in the hand reader are similar to those used in remote controls
                  for TVs and VCRs. The light’s power level is 100 milliwatts – less than the amount
                  produced by natural sunlight or microwave ovens. Recognition Systems has been
                  contacted by the U.S. Occupational Safety and Health Administration (OSHA), and has
                  supplied all requested information. OSHA has generated no reports of hazard.




Access Control Sales Manual 0602                    Page 8                                        July 22, 2002
IV.       Other Biometrics
Competitive quick reference
 Technology        Defined              Where it is used     Perceived           Why not access control
                                                             Advantages
 Fingerprint       None necessary       Background           De-facto when       Higher False Reject Rate
                                        Checks               talking about       Higher Failure to Enroll Rate
                                        Low volume           biometrics. False   1 in 50 does not have
                                        access control       accept rate can     readable fingerprints
                                                             be lower            Criminal Connotation
                                                             Pricing may be      Privacy Perceptions
                                                             lower               Residue, dirt, dryness & injury
                                                                                 cause recognition problems

 Facial            Video camera         Surveillance –       It is cool          User can be identified without
                   looks at the size    However a            Non-contact         their knowledge. This may be
                   and shape of         human is the                             viewed as a privacy issue.
                   your face            ultimate decision                        Higher false reject rates
                                        maker                                    Higher false positives
                                                                                 People can change
                                                                                 appearance
                                                                                 Challenges with lighting
                                                                                 issues

 Iris scanning     Video camera         Access Control       Cool – High Tech    Low user acceptance
                   looks at the         and identity         Very high           Slower throughput –
                   colored doughnut     verification         security            positioning can be time
                   portion of your                                               consuming.
                   eye                                                           Problems with lighting,
                                                                                 eyeglasses, and contact
                                                                                 lenses.
                                                                                 Higher failure to enroll rate
                                                                                 Larger template (512 bytes
                                                                                 per eye)

 Retina            Infra-red light      Government           None really         Very low user acceptance
                   source used to       applications         Very high           Requires close proximity of
                   examine the                               security            eye to reader
                   retina (back wall)
                   of the eye
 Signature         A pen or stylus is   Logical access       Something we do     Writing on the wall just
                   used to measure      control              everyday            doesn’t make sense – slow
                   the speed,           Electronic                               Poor long term reliability
                   direction, and       Signature                                - Signature changes
                   pressure with                                                 - Stress affects signature
                   which one writes                                              Higher false reject rates
                   their signature
 Voice             Microphone or        Logical access       Inexpensive         No one likes to talk to a wall
                   telephone used       control                                  Background noise
                   to capture                                                    Higher false reject rate
                   speech and                                                    Digital recordings may be
                   compare it to a                                               accepted
                   database using                                                Variation in microphone gain
                   custom software                                               can cause problems



Access Control Sales Manual 0602                    Page 9                                        July 22, 2002
Competitive Selling Tips: Fingerprint and Two-Finger Geometry
         Two-Finger Geometry is most similar to Hand Geometry
            o ‘Digi2’ product manufactured by Biomet Partners and sold through OEMs
            o Typically only offered with low-end packages
            o Very little is known about this product (has not been included in independent research)
            o Competitive Selling Tip:
                        “Two-finger geometry measures only two fingers. Hand Geometry measures four
                        fingers and part of the hand. Which do you think would be more reliable?”

         Fingerprint readers are made by more than 80 different companies
             o Some access control business partners and competitors offer fingerprint as an option
             o Typically it is offered by low-end competitors, but not always.
             o Competitive Selling Tips:
                         Encourage prospect to ask the other vendor how many installations they have
                         with this particular fingerprint reader.
                         Use case studies and references. Encourage prospect to ask other vendor for
                         the same.
                         Ask prospect how their employees (or customers) might feel about using
                         fingerprint readers!


General tips
         Competitors may make extravagant claims regarding their False Accept and False Reject Rates.
         Don’t believe them! RSI’s error rates have been proven in the field.
         Most biometric manufacturers are not financially stable. Who wants to buy a product and then
         find out that the manufacturer has gone out of business? RSI is the rare exception in the
         biometrics industry. We are owned by Ingersoll-Rand, and have been a financially solid,
         profitable company for over 10 years.
         There are over 50,000 RSI HandReaders installed. Always encourage prospects to ask other
         vendors how many physical access control installations they have.
         Be careful not to be too negative about other biometric products; this could result in a negative
         impression of all biometrics. Emphasize RSI’s strong points, rather than the competitor’s weak
         points.
         Privacy issues: Hand geometry has many advantages in this area, including:
              o No law enforcement agency keeps a database of hand templates. Fingerprints and facial
                  geometry templates are used in law enforcement.
              o The nature of hand geometry ensures that every user is an active, willing participant and
                  cannot be identified without their knowledge.
                           Fingerprint technology causes concerns (not necessarily valid) that a user could
                           be identified by comparing “latent prints” with the stored template.
                           Some facial recognition applications “scan the crowd” to identify known criminals.




Access Control Sales Manual 0602                   Page 10                                        July 22, 2002
V.       Handling Objections
 Objection                                             How to overcome objection
 “It’s too expensive”                                  Payback in as little as 3-6 months
 “This seems really high-tech. I don’t want to take    Manufacturer in business since 1986; profitable
 chances on new, unproven technologies.”               since 1990
                                                       Over 60,000 units installed
 “Why does the ID number have to be entered?           The HandKey does verification, a one to one
 Why can’t the HandKey figure out who I am when        search based on the ID number. This process
 I place my hand on it?”                               takes less than one second. Some biometric
                                                       companies say they can do identification – a one
                                                       to many search. This is not common, and has only
                                                       been successful with small groups of users. It is a
                                                       slow process and requires a very powerful
                                                       computer to perform the search. It’s just not
                                                       practical or cost-effective for most applications.
 “What about privacy issues? Can the hand data         Emphasize that it doesn’t read finger or palm
 be used to identify someone for other purposes?”      prints.
                                                       Doesn’t store image of hand, only the 9 byte
                                                       template – a mathematical value that is
                                                       meaningless for any other purpose. No law
                                                       enforcement agency keeps a database of hand
                                                       templates.
                                                       With hand geometry, a user can’t be identified
                                                       without their knowledge.
 “Do my employees need to be concerned about           Infrared light = 100 milliwatts, similar to remote
 radiation from the HandKey?”                          controls for TVs, VCRs, etc.
 “My employees are worried they’ll get germs from      Compare to door knob/handle, shaking hands,
 the HandKey”                                          money.
                                                       If employees are still concerned, they can clean
                                                       the platen before using (leave Windex and cloth
                                                       next to HandKey).
 “I’m concerned that my employees will think of this   HandReaders are installed to increase security.
 as a ‘Big Brother’ type of thing – that we don’t      Using a HandReader guarantees that only the
 trust any of them.                                    credential owner has access. This ensures that
                                                       someone else cannot gain access using your
                                                       identity.
 “The error rates sound high. 1 in 1000 doesn’t        Adjustable Threshold can reduce FAR or FRR,
 seem like it’s very reliable.”                        depending on customer needs and preferences.
                                                       False reject only means that you have to try again
                                                       – just like you have to do, much more frequently,
                                                       with a card reader.
                                                       Other biometrics have lower FAR, but higher FRR




Access Control Sales Manual 0602                  Page 11                                       July 22, 2002
VI.      HandKey feature comparison by model
Access Control Product Line – Quick Reference
                                   HandKey CM            HandKey II          ID3D-R
                                                                            HandKey
  Standard User Memory                   512                  512               256
  Expandable User Memory              1000 max            32,512 max        27,904 max
  Transaction buffer size               1000                 5120              3400
  Door Control                           + WCM
  Power Input                      12-24VAC or VDC      12-24VAC or VDC   12-24VAC or VDC
  Construction                         Plastic              Plastic            Metal
  Surface Wall mount                  Integrated           Integrated           Option
  Recessed Wall mount                    No                   No                Option
  Table mount                            Option               Option         Standard
  CM Programming Ports                                        No                No

  RS 422 Communications                  No

  RS 232 Communications                  No                                     No

  Modem Communications                   No                   Option            Option
  Ethernet Communications                No                   Option            Option
  RS232 printer output                   No                                     No

  Auxiliary Inputs                        2                    2                 1
  Auxiliary Outputs                       2                    3                 1
  Auto Daylight Savings Time

  Operational Battery Backup             Option               Option            Option
  Red/Green light on top panel                                                  Option
  Outdoor Options Available           Hurricane            Hurricane          Blizzard
                                      Tsunami              Tsunami




Access Control Sales Manual 0602              Page 12                                 July 22, 2002
VII.     HandKey II or HandKey CR Demonstration
Before you start

         Bring your own extension cord.
         Turn dip switches #4 and 5 on. This will reset your reader and wipe out any hand templates
         currently stored when power is applied.
         Plug in your HandReader. There is a barrel power jack on the back of the reader.
         Turn dip switches #4 and 5 Off. Dip switches 1-3 should also be off. Dip switches are next to
         power jack connection on back of reader.
         Setup reader so platen is 40 inches above the ground, or on table top if user will be seated.
         Height is critical for verification.
         First enroll yourself, then you will be able to access menus to enroll others.
         Set Time and Date (if needed)
         Set ID length to 3


Enroll yourself
         To get entry to menus, press: Clear and Enter
         Enter password followed by # key:        4#
         Enroll:                              Press #
         Enter the ID, followed by the Enter key: XXX then Enter
         Place Hand 1/3 (remove hand)
         Place Hand 2/3 (remove hand)
         Place Hand 3/3 (remove hand)
         You are now enrolled


Enroll your prospects as users
         To get entry to password level Press:     Clear and Enter
         Enter your ID, followed by the Enter key: XXX then Enter
         Place your hand for verification
         Enter password followed by # key:         4#
         Enroll:                                   Press #
         Enter the user ID, followed by the Enter key: XXX then Enter
         Place Hand 1/3 (remove hand)
         Place Hand 2/3 (remove hand)
         Place Hand 3/3 (remove hand)
         The user is now enrolled




Demonstrating Tips
         Demonstrate verification prior to enrolling them.
             o This allows the person to see how the hand is placed into the reader, lowering errors and
                  frustration.
         Remember their ID number when you enroll them. Repeat their number to them before they try
         to verify, or enter their number in for them.
             o If they forget, so will their users. Make the first time as easy as possible.
         Try to cheat for them. If others are around, have them attempt to verify with your ID number.
         Explain the score. Explain why it aids employees in correct hand placement.


Access Control Sales Manual 0602                  Page 13                                       July 22, 2002
COMMAND MODE – HANDKEY II
   MENU                                               Management
                  Service Menu     Setup Menu                          Enrollment Menu   Security Menu
   NAME                                                  Menu
  Default
                         1               2                   3                 4               5
 Password
 Authority
   Level                 1               2                   3                 4               5
 Required
                    Calibrate      Set Language        List Users           Add User     Set User Data

                                     Set Date         * Data from
                 Status Display                                         Remove User      Set TZ Table
                                      Format            Network
                    * Network       Set Time &                                              Reject
                                                   * Data to Network
                      Status           Date                                                Threshold

                                   Set Address                                           Set Passwords

                                   Set ID Length                                         Clear Memory

                                    Set Output
                                                                                         Special Enroll
                                      Mode

                                    Set Facility

                                    Lock/Shunt
                                       Time
                                     Aux Out
                                     Control
                                    Set Reader
                                      Mode

                                    Set Serial

                                    Set Duress
                                      Code

                                   Print Options
                                    Set Beeper


* These menu items are only available in a reader configured as a Master.




Access Control Sales Manual 0602                   Page 14                                   July 22, 2002
VIII. ID3D-R HandKey Demonstration
Before you start

         Bring your own extension cord.
         Turn dipswitch #4 on. This will reset your reader and wipe out any hand templates currently
         stored when power is applied.
         Plug the terminal block with the power wires into the HandReader.
         Plug in your HandReader while compressing the white tamper switch on the back of the
         HandReader. If the back plate is on the HandReader, then the tamper should be pressed.
         Turn dipswitch #4 off. Dipswitches 1-3 should also be off.
         Setup reader so platen is 40 inches above the ground, or on tabletop if user will be seated.
         Height is critical for verification.
         First enroll yourself, then you will be able to access menus to enroll others.
         Set Time and Date if necessary
         Set ID length to 3 or 4 if desired


Enroll yourself
         To get entry to menus, press#:           #
         Enter password followed by # key:        4#
         Enroll:                              Press #
         Enter the ID, followed by the Enter key: XXX then #
         Place Hand 1/3 (remove hand)
         Place Hand 2/3 (remove hand)
         Place Hand 3/3 (remove hand)
         You are now enrolled


Enroll your prospects as users
         Enter your ID, followed by the # key: XXX then #
         Place your hand for verification
         Press # right after verification:        #
         Enter password followed by # key:        4#
         Enroll:                                  Press #
         Enter the user ID, followed by the # key: XXX then #
         Place Hand 1/3 (remove hand)
         Place Hand 2/3 (remove hand)
         Place Hand 3/3 (remove hand)
         The user is now enrolled




Demonstrating Tips
         Demonstrate verification prior to enrolling them.
             o This allows the person to see how the hand is placed into the reader, lowering errors and
                  frustration.
         Remember their ID number when you enroll them. Repeat their number to them before they try
         to verify, or enter their number in for them.
             o If they forget, so will their users. Make the first time as easy as possible.
         Try to cheat for them. If others are around, have them attempt to verify with your ID number.
         Explain the score. Explain why it aids employees in correct hand placement.



Access Control Sales Manual 0602                  Page 15                                       July 22, 2002
COMMAND MODE – ID3D-R HANDKEY
  MENU                                              Management
                Service Menu     Setup Menu                          Enrollment Menu   Security Menu
  NAME                                                 Menu
  Default
                     1                 2                   3                   4             5
 Password
 Authority
   Level             1                 2                   3                   4             5
 Required
                 Calibrate       Print Options    Set Time & Date           Add User   Set User Data

               Status Display   ID Entry Mode        List Users        Remove User      Set TZ Table

                 * Network        Set Reader                                              Reject
                                                     Save Data
                   Status           Mode                                                 Threshold
                                  Set Output
                                                   Restore Data                        Set Passwords
                                    Mode
                                  Lock/Shunt
                                                 * Data to Network                     Clear Memory
                                     Time
                                   Aux Out          * Data from
                                                                                       No Hand Enroll
                                   Control            Network

                                Set Site Code

                                  Set Serial

                                  Set Beeper


* These menu items are only available in a reader configured as a Master.




                                                 Page 16
IX.      HandKey CM Demonstration
Before you start

         Bring your own extension cord.
         Turn your reader so the back of the reader is facing you.
         Turn dip switches #4 and 5 on (away from you). Dipswitch 3 should be on.
         Dipswitches 1-2 should be off (towards you). Dipswitches are next to the power
         jack connection on back of the HandReader.
         Plug the barrel end of the power supply into the barrel connector located at J12.
         Turn your HandReader around so the front is facing towards you.
         Plug your power supply into the wall.
         The HandReader will begin its power-up cycle. The Front Panel Version will
         appear on the screen.
         Immediately after Front Panel Version disappears from the screen: press and
         hold 8.
         The reader will say Enter password: Press 5 and press enter
         The prompt will say SW4, SW5 both on Reboot? Press: # for YES
         This will reset your HandReader and wipe out any hand templates currently
         stored when power is applied. This will take a few seconds.
         When the HandReader prompt displays READY, turn dip switches #4 and 5 off.
         Setup reader so platen is 40 inches above the ground, or on the tabletop if user
         will be seated. Height is critical for verification.
         First enroll yourself, then you will be able to access menus to enroll others.
         Set Time and Date (if needed)
         Set ID length to 3 or 4 (if desired)


Enroll yourself

         To get entry to menus, press: Clear and Enter
         Enter password followed by # key:       4#
         Select Add User:                    Press #
         Enter an ID, then press Enter: XXX then Enter
         Place Hand 1/3 (remove hand)
         Place Hand 2/3 (remove hand)
         Place Hand 3/3 (remove hand)
         You are now enrolled
         Enroll yourself with a second ID number
         Then press Clear to exit command mode




Access Control Sales Manual 0602            Page 17                               July 22, 2002
Demonstrating Tips

         Before you begin, demonstrate verification.
            o This allows the person to see how the hand is placed into the reader,
                lowering errors and frustration.
         Explain the enrollment process and how they should place their hand.
         Explain that they should land their hand like a plane and close their fingers on the
         pins.
         Let the user practice hand placement before you enroll them. Watch to be sure
         that their fingers are touching the appropriate finger pins.
         Remember their ID number when you enroll them. Repeat their number to them
         before they try to verify.
            o If they forget so will their users. Make the first time as easy as possible.

Enroll your prospects as users


         To get to the password level Press:                     Clear and Enter
         Enter your ID, followed by the Enter key:               XXX then Enter
         Place your hand for verification
         Enter password followed by # key:                       4#
         Select Add User:                                        Press #
         Have the user enter an ID number, then press Enter:     YYY then Enter
         Place Hand 1/3 (remove hand)
         Place Hand 2/3 (remove hand)
         Place Hand 3/3 (remove hand)
         The user is now enrolled
         Press Clear to exit command mode




Verification

         Allow the user to verify their hand.
         Have the user enter their ID, then press enter: YYY then Enter
         Have the user place their hand for verification: Place hand
         When the user successfully verifies the LCD will display the following
             o ID Verified
             o Score



Access Control Sales Manual 0602            Page 18                                July 22, 2002
The top panel will also show a green light.
         Explain the score. Explain how it aids in correct hand placement.


HINTS:

Entering Command Mode

Command Mode is the menu tree used in programming a HandReader.

    When NO users are enrolled:

                  1. Press Clear and then press Enter on the HandReader keypad.
                  2. The HandReader will prompt you to ENTER PASSWORD.
                  3. Here you would type in the password of the menu you need to
                     access.
                  4. Press Enter.

    When users are enrolled:

                  1. Press Clear and then press Enter on the HandReader keypad.
                  2. The HandReader will NOT prompt you to ENTER PASSWORD at this
                     time. Instead you will see the READY string on line one, and on line
                     two you will see :
                     This means that there are users already enrolled in the HandReader.
                     You must verify your identity before being allowed into Command
                     Mode.
                  3. At the : prompt, Type in your User ID number. Then press Enter.
                     Follow the directions on the screen and place your hand.
                  4. When your identity has been verified, the HandReader will prompt you
                     to ENTER PASSWORD.
                  5. Here you would type in the password of the menu you need to
                     access.
                  6. Press Enter.

Exiting Command Mode

                  1. To exit command mode, you can do one of two things:
                        a. If you are NOT in a menu item that requires a numerical input,
                            you can press any number key.
                        b. If you are NOT in a menu item that requires an input, you can
                            press Clear.
                  2. You may have to press Clear several times to return to the READY
                     prompt if you are more than one level deep in the menu tree.




Access Control Sales Manual 0602             Page 19                              July 22, 2002
COMMAND MODE – HANDKEY CM
   MENU                                               Management
                  Service Menu     Setup Menu                       Enrollment Menu   Security Menu
   NAME                                                  Menu
  Default
                         1              2                    3            4                 5
 Password
 Authority
   Level                 1              2                    3            4                 5
 Required
                    Calibrate      Set Language        List Users      Add User       Set User Data

                                     Set Date
                 Status Display                                      Remove User      Set TZ Table
                                      Format
                                    Set Time &                                           Reject
                                       Date                                             Threshold

                                   Set ID Length                                      Set Passwords

                                    Lock/Shunt
                                                                                      Clear Memory
                                       Time
                                     Aux Out
                                                                                      Special Enroll
                                     Control
                                    Set Duress
                                      Code

                                   Print Options
                                    Set Beeper

    NOTE: There are some menus that require an input. If you try to press CLEAR to
    get out of these menus, nothing will happen. If you want to get out of the menu
    without changing anything, press Enter to accept default values.




Access Control Sales Manual 0602                   Page 20                                July 22, 2002
X.       Product Specifications
                           HAND GEOMETRY READER SPECIFICATION
                             RECOGNITION SYSTEMS HANDKEY II


         Verification time          Less than 1 second
         Template size              9 bytes
         Power                      12-24 VDC
         Memory Retention           Up to 5 years via the standard Internal Lithium Battery
         Transaction Storage        5187 transactions, buffered
         Communications             RS-485 (4 wire and 2 wire)
                                    RS-232 Serial Printer Support or network communications
                                    Modem or Ethernet - optional
         Baud Rate                  300 to 28.8 bps
         User Capacity              512 Users standard
                                    Internally expandable to 32,512
         Door Control               Door Lock Output
                                    Alarm Monitoring
                                    Tamper, Door Switch
                                    Two Auxiliary Inputs
                                    Three Auxiliary Outputs
                                    Request to Exit
         Card Reader Input          Proximity, Wiegand, Magnetic Stripe, or Barcode
         Card Reader Emulation      Wiegand, Magnetic Stripe, or Barcode
         Output
         Duress Code                1 digit user definable
         Time Zones                 62 user definable
                                    Unlimited Holidays
         Size                       8.85in. wide 11.65in. high        8.55in. deep




Access Control Sales Manual 0602              Page 21                                         July 22, 2002
HAND GEOMETRY READER SPECIFICATION
                           RECOGNITION SYSTEMS HANDKEY ID3D-R


         Verification time          Less than 1 second
         Template size              9 bytes
         Power                      12-14 VDC
         Memory Retention           Up to 5 years via the standard Internal Lithium Battery
         Transaction Storage        3405 transactions, buffered
         Communications             RS-485 (4 wire and 2 wire)
                                    RS-232 Serial Printer Support
         User Capacity              256 Users standard
                                    Internally expandable to 27,904
         Door Control               Door Lock Output
                                    Alarm Monitoring
                                              Tamper, Door Switch
                                              Auxiliary Input
                                              Auxiliary Output
                                              Request to Exit
         Card Reader Input          Proximity, Wiegand, Magnetic Stripe, or Barcode
         Card Reader Emulation      Wiegand or Magnetic Stripe
         Output
         Duress Code                1 digit user definable
         Time Zones                 62 user definable
                                    Unlimited Holidays
         Size                       6.46 in. wide
                                    8.25 in. high
                                    7.29 in. deep




Access Control Sales Manual 0602              Page 22                                         July 22, 2002
HAND GEOMETRY READER SPECIFICATION
                  RECOGNITION SYSTEMS OUTDOOR HANDKEY ID3D-RW


         Temperature Range           0°F to 120°F
         Verification time           Less than 1 second
         Template size               9 bytes
         Power                       12-14 VDC
         Memory Retention            Up to 5 years via the standard Internal Lithium Battery
         Transaction Storage         3405 transactions, buffered
         Communications              RS-485 (4 wire and 2 wire)
                                     RS-232 Serial Printer Support
         User Capacity               256 Users standard
                                     Internally expandable to 27,904
         Door Control                Door Lock Output
                                     Alarm Monitoring
                                               Tamper, Door Switch
                                               Auxiliary Input
                                               Auxiliary Output
                                               Request to Exit
         Card Reader Input           Proximity, Wiegand, Magnetic Stripe, or Barcode
         Card Reader Emulation       Wiegand or Magnetic Stripe
         Output
         Duress Code                 1 digit user definable
         Time Zones                  62 user definable
                                     Unlimited Holidays
         Size                        8.0 in. wide
                                     12.0 in. high
                                     8.7 in. deep
         Weight                      20.6 lbs.
         Wall Mount                  Included
         Humidity Levels Permitted   Non-Condensing
         Heaters                     24VAC in addition to the 12-14VDC for the HandReader
                                     Maintain platen and LCD temperature at approx 70°F to 75°F
         Options                     120VAC – 24VAC Heater Transformer




Access Control Sales Manual 0602                 Page 23                                       July 22, 2002
HAND GEOMETRY READER SPECIFICATION
                             RECOGNITION SYSTEMS HANDKEY CM



         Measurements               90+ measurements, size and shape of the hand
         Verification time          Less than 1 second
         Template size              9 bytes
         Power                      12-24 VDC or VAC
         Operating Temperature      32ºF to 114ºF, at 0-85% relative humidity,
                                    non-condensing
         Memory Retention           Up to 5 years via the standard Internal Lithium Battery
         Transaction Storage        1000 transactions, buffered
         Communications             Communicates with LockLink Express via
                                    programming port
         Baud Rate                  9600 bps
         User Capacity              512 users standard, maximum 1,000 users
         Door Control               Door Lock Output
                                    Alarm Monitoring
                                    Tamper, Door Switch
                                    Auxiliary Inputs
                                    Auxiliary Output
                                    Request to Exit
         Card Reader Input          Proximity, Wiegand and magnetic stripe
         Duress Code                Defined in LockLink Express
         Time Zones                 Defined in LockLink Express
         Size                       8.85in. wide by 11.65in. high by 8.55in. deep
         Mounting                   Surface wall mountable, standard via key lock
                                    Table mount option available
         Display                    2 lines, 16 characters each
         Keypad                     Numerical keypad




Access Control Sales Manual 0602              Page 24                               July 22, 2002

More Related Content

What's hot

Money pad future wallet
Money pad future walletMoney pad future wallet
Money pad future walletAbbas Ambawala
 
Money pad future wallet
Money pad future walletMoney pad future wallet
Money pad future walletrmangal
 
MoneyPad:The Future Wallet
MoneyPad:The Future WalletMoneyPad:The Future Wallet
MoneyPad:The Future Walletjolly9293
 
Vein Recognition Method
Vein Recognition MethodVein Recognition Method
Vein Recognition MethodHafsa Tahir
 
Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future walletPalukuri Ashok
 
money pad the future wallet
money pad the future walletmoney pad the future wallet
money pad the future walletSabin Tripathi
 

What's hot (6)

Money pad future wallet
Money pad future walletMoney pad future wallet
Money pad future wallet
 
Money pad future wallet
Money pad future walletMoney pad future wallet
Money pad future wallet
 
MoneyPad:The Future Wallet
MoneyPad:The Future WalletMoneyPad:The Future Wallet
MoneyPad:The Future Wallet
 
Vein Recognition Method
Vein Recognition MethodVein Recognition Method
Vein Recognition Method
 
Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future wallet
 
money pad the future wallet
money pad the future walletmoney pad the future wallet
money pad the future wallet
 

Similar to Hand Key Manual

Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintSonuSawant
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsIOSR Journals
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bmbranjith
 
Biometric Sensors
Biometric SensorsBiometric Sensors
Biometric Sensorsparmsidhu
 
Alternatives to Paswords
Alternatives to PaswordsAlternatives to Paswords
Alternatives to PaswordsDeepanshu Saini
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPTsravya raju
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprintSagar Verma
 
How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology workAlisha Korpal
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technologylole2
 
Parts of body for biometric security systems
Parts of body for biometric security systemsParts of body for biometric security systems
Parts of body for biometric security systemsnishiyath
 

Similar to Hand Key Manual (20)

Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
Finger print ATM
Finger print ATMFinger print ATM
Finger print ATM
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using Biometrics
 
kiran's slide info
kiran's slide infokiran's slide info
kiran's slide info
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Biometric Sensors
Biometric SensorsBiometric Sensors
Biometric Sensors
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Alternatives to Paswords
Alternatives to PaswordsAlternatives to Paswords
Alternatives to Paswords
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
H029044050
H029044050H029044050
H029044050
 
How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology work
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Parts of body for biometric security systems
Parts of body for biometric security systemsParts of body for biometric security systems
Parts of body for biometric security systems
 

More from Hosea Kahiga

Accreditation Certificates Pdf
Accreditation Certificates PdfAccreditation Certificates Pdf
Accreditation Certificates PdfHosea Kahiga
 
Iso14001 Certificate
Iso14001 CertificateIso14001 Certificate
Iso14001 CertificateHosea Kahiga
 
Optimum Security Info Doc
Optimum Security Info DocOptimum Security Info Doc
Optimum Security Info DocHosea Kahiga
 
Optimum Client References
Optimum   Client ReferencesOptimum   Client References
Optimum Client ReferencesHosea Kahiga
 
Work Safe Contractor Cert.
Work Safe Contractor Cert.Work Safe Contractor Cert.
Work Safe Contractor Cert.Hosea Kahiga
 
British Safety Council
British Safety CouncilBritish Safety Council
British Safety CouncilHosea Kahiga
 
Accreditation Certificates Pdf
Accreditation Certificates PdfAccreditation Certificates Pdf
Accreditation Certificates PdfHosea Kahiga
 
British Safety Council
British Safety CouncilBritish Safety Council
British Safety CouncilHosea Kahiga
 
Work Safe Contractor Cert.
Work Safe Contractor Cert.Work Safe Contractor Cert.
Work Safe Contractor Cert.Hosea Kahiga
 
Optimum Security Information
Optimum Security InformationOptimum Security Information
Optimum Security InformationHosea Kahiga
 
Health &amp; Safety Policy
Health &amp; Safety PolicyHealth &amp; Safety Policy
Health &amp; Safety PolicyHosea Kahiga
 

More from Hosea Kahiga (20)

Worksafe(Smas)
Worksafe(Smas)Worksafe(Smas)
Worksafe(Smas)
 
Accreditations
AccreditationsAccreditations
Accreditations
 
Safe Contractor
Safe ContractorSafe Contractor
Safe Contractor
 
Accreditation Certificates Pdf
Accreditation Certificates PdfAccreditation Certificates Pdf
Accreditation Certificates Pdf
 
Link Up
Link UpLink Up
Link Up
 
Iso14001 Certificate
Iso14001 CertificateIso14001 Certificate
Iso14001 Certificate
 
Optimum Security Info Doc
Optimum Security Info DocOptimum Security Info Doc
Optimum Security Info Doc
 
Optimum Client References
Optimum   Client ReferencesOptimum   Client References
Optimum Client References
 
Pir 2012
Pir 2012Pir 2012
Pir 2012
 
Work Safe Contractor Cert.
Work Safe Contractor Cert.Work Safe Contractor Cert.
Work Safe Contractor Cert.
 
British Safety Council
British Safety CouncilBritish Safety Council
British Safety Council
 
Accreditation Certificates Pdf
Accreditation Certificates PdfAccreditation Certificates Pdf
Accreditation Certificates Pdf
 
British Safety Council
British Safety CouncilBritish Safety Council
British Safety Council
 
Work Safe Contractor Cert.
Work Safe Contractor Cert.Work Safe Contractor Cert.
Work Safe Contractor Cert.
 
Optimum Security Information
Optimum Security InformationOptimum Security Information
Optimum Security Information
 
Health &amp; Safety Policy
Health &amp; Safety PolicyHealth &amp; Safety Policy
Health &amp; Safety Policy
 
SSIP
SSIPSSIP
SSIP
 
Achilles Link Up
Achilles Link UpAchilles Link Up
Achilles Link Up
 
PIR 2012
PIR  2012PIR  2012
PIR 2012
 
Handkey 2012
Handkey 2012Handkey 2012
Handkey 2012
 

Hand Key Manual

  • 1. Access Control Sales Manual 1520 Dell Avenue Campbell, CA 95008 USA (408) 341-4100 (408) 341-4101 Fax www.handreader.com
  • 2. HandKey® Sales Manual I. WHY HANDKEY? ................................................................................................3 II. WHAT IS HAND GEOMETRY? .....................................................................4 III. HANDKEY FREQUENTLY ASKED QUESTIONS ....................................7 IV. OTHER BIOMETRICS......................................................................................9 V. HANDLING OBJECTIONS ...........................................................................11 VI. HANDKEY FEATURE COMPARISON BY MODEL ...............................12 VII. HANDKEY II OR HANDKEY CR DEMONSTRATION ........................13 VIII. ID3D-R HANDKEY DEMONSTRATION .................................................15 IX. HANDKEY CM DEMONSTRATION ...........................................................17 X. PRODUCT SPECIFICATIONS .....................................................................21 Access Control Sales Manual 0602 Page 2 July 22, 2002
  • 3. I. Why HandKey? • HandKey ensures that access is granted to the right person – not just anyone who happens to have the right card or key. A hand can’t be lost, stolen, or loaned to a friend! • HandKey uses a field-proven technology called hand geometry, which verifies an individual’s identity based on the size and shape of the hand. It does not take fingerprints or handprints. • HandKeys pay for themselves by eliminating the cost of cards and keys. • Customers also reduce labor costs, because administration is less time-consuming compared with card and key based systems. • If a customer wants to use cards, HandKey can be configured to accept input from most magnetic stripe, proximity, and bar code cards. • HandKey is easily integrated into existing access control systems. The standard HandKey outputs a 26-bit Wiegand format for use with access control panels. Other formats can also be accommodated. • HandKeys reduce productivity losses due to lost or misplaced cards and keys. You can’t forget to bring your hand to work! • Recognition Systems (RSI), manufacturer of the HandKey, has been in business since 1986 and is now owned by Ingersoll-Rand. Customers need not be concerned about purchasing unproven technology from a startup company that might not stay in business. RSI is a financially stable company and has been profitable for over 10 years. • Over 60,000 HandReaders are currently in use throughout the world as of December 2001. • RSI’s HandReaders have a reputation for reliability. They can be used in any type of work environment, from corporate campuses to construction sites. HandKey user stories • The Northern Ireland Prison Service cut labor costs by installing HandKeys at three of its prisons. They were able to re-assign guards who formerly were posted at the main entrances. (RSI Case Study #12) • The University of Georgia uses HandKeys for access control - and in its dining halls, to ensure that only students who’ve paid for a meal plan can enter the dining area. (RSI Case Study #14) • San Francisco Airport has over 150 HandKeys controlling access to secure areas for 34,000 employees. Roger Case, a technician supervisor at the airport, says they went with HandKeys because they found that “simple badges can be lost, stolen, or given to ‘cousins’ or friends.” (Case Study #16 – coming soon) • Data centers use HandKeys to keep their facilities secure and user-friendly for their customers. They don’t have to issue cards that their customers will lose or forget. Customers can access the facility any time, without having to carry a card. (Case Study #19 – coming soon) Access Control Sales Manual 0602 Page 3 July 22, 2002
  • 4. II. What is Hand Geometry? Hand Geometry is a type of Biometric technology. Biometrics are automated methods of identifying (or verifying the identity of) an individual using a physical characteristic or behavioral trait. Biometrics may measure: o Things you do, such as speech and handwriting o Things you are, for example: Hand Geometry Fingerprint Facial geometry Eye: characteristics of the iris or retina Hand Geometry has been in use longer than any other biometric. Two-dimensional hand geometry device in 1970’s RSI uses 3-dimensional hand geometry Over 60,000 units installed as of December 2001 Major Applications: o Access Control o Time and Attendance o Personal identification (passport control, cafeterias, health clubs) How it works Measures unique size and shape of the fingers and hand Over 90 distinct measurements are made o Length o Width o Thickness o Surface Area When the hand is placed for verification: Low-level infrared light source ensures crisp, clear image CCD camera records 3D image of the hand Algorithm converts this image to a mathematical value This value is compared with the hand template stored in memory If the two match, identity is confirmed (the door is opened). Enrollment is the process of entering a new user in a HandKey. Supervisor accesses Enrollment menu User enters ID number HandKey prompts user to “Place Hand” three times Each of the three hand images is converted to a mathematical value These are combined to form the initial template. The template size is 9 bytes. The template is updated with each successful verification – it “learns your hand.” Allows for changes due to weight gain or loss, aging, etc. Eliminates need to re-enroll users. Access Control Sales Manual 0602 Page 4 July 22, 2002
  • 5. Hand placement is key to successful use Slide hand into the unit Web between middle & index fingers must make contact with web finger pin Close all fingers towards center of the hand Finger pin lights on the top panel extinguish Once all finger-pin lights go out, camera will record a digital image of the hand. Rings and Fingernails Jewelry may be worn Be consistent in the use of jewelry Stones should face upwards Long fingernails & false fingernails should have no adverse effects Scores and Thresholds Current hand image is compared with stored template for verification Difference is expressed by a “Score” displayed on the LCD panel. o Lower score = closer to stored template Threshold - defined by end user/installer o “System reject threshold” - global o “User reject threshold” - individual If Score < Threshold, ID is verified o Low threshold reduces chance of false accept o High threshold reduces chance of false reject (less chance of “try again” message) The score is also used for troubleshooting. For example, if all users’ scores are going up, this may indicate that the hand reader needs cleaning. Important Error Rates False Accept Rate (FAR): Rate at which an imposter is accepted by the biometric system False Reject Rate (FRR): Rate at which an enrolled user is rejected by the system HandKey error rates at default threshold setting: o False Accept Rate - 0.1% o False Reject Rate - 0.1% Why is the False Reject Rate critical? An example: A company has 100 employees. Each person verifies 2 times per day. o That’s 200 transactions per day, 1000 per week. o A 1% error rate means there could be as many as 10 problems per week. o Our error rate of 0.1% means only 1 potential problem per week. Each False Reject means that someone will have to spend time troubleshooting the problem. It can also mean a loss of productivity when people are waiting to get in. A high false reject rate will frustrate users and give them an excuse for not using the biometric. Access Control Sales Manual 0602 Page 5 July 22, 2002
  • 6. Verification vs. Identification Verification: Enter ID number, then present biometric (hand, finger, face, etc.) for comparison with stored template. Identification: Present biometric; database is searched for your template. Most biometric devices – including HandKey - do verification only. Identification o Some biometric vendors claim to do Identification o Has been successful only with small databases o Can be slow, requires powerful CPU to search database Other Biometrics Fingerprint o BioScrypt o Visionics o Identix (OEM) Iris o Iridian Voice Signature o CIC Face o Visionics o Viisage o Miros o ZN Retina o EyeDentify 2-Finger Geometry o BioMet Partners – Digi2 Access Control Sales Manual 0602 Page 6 July 22, 2002
  • 7. III. HandKey Frequently Asked Questions Q: Who is Recognition Systems? A: 1.) In business since 1986 2.) Division of Ingersoll-Rand 3.) Profitable and growing 4.) Over 60,000 units installed as of December 2001. Q: How new is this technology? A: With the release of the HandKey II this is the fourth generation of hand geometry readers from Recognition Systems. Each generation has meant an increase in accuracy and functionality, and a reduction in price. Q: How many hand templates can be stored? A: Up to 32,512 in a HandKey II or HandKey CR. Up to 27,904 in an ID3D. Up to 1000 in a HandKey CM. Q: What is the template size? A: 9 bytes. This is important because other biometrics have much larger templates, so they can’t handle as many users with a single device. Q: Do rings or Band-Aids have an effect? A: Not usually enough to reject a valid user. Just make sure the ring is in the upright position and hand placement is proper. Q: What happens if I injure my hand and have it bandaged or in a cast? A: You can be enrolled with you left hand, palm up while the right hand is disabled. It’s not as comfortable but will work fine. Q: What is the false reject rate (authorized person can’t get in)? A: Sandia National Laboratories has documented Recognition Systems’ products as having a false reject rate of 0.1% (1 in 1000), the lowest of any biometric device. This is an extremely important statistic. Rejecting authorized people creates unhappy users. Q: I have a card system and want to add a biometric solution. Is this a problem? A: No, it’s easily done. HandKey is easily integrated with into existing access control systems. The standard HandKey outputs a 26-bit Wiegand format for use with access control panels. Other formats can also be accommodated. Please contact RSI’s applications engineer for additional information. Q: How many digits can I use for an ID? A: Up to 10. Q: Can you interface to commonly used access control systems? A: Yes, our system architecture allows us to interface to most commonly used access control systems. We just need to know the format required. In some cases, there is an additional charge. Q: How is your throughput? We need to get a lot of people through the door quickly. A: Typically the verification is less than 2 seconds. As people use the HandKey they process faster. Typically, a HandKey will Process 15+ people per minute. Q: My employees are concerned about hygiene issues. How do I address this concern? Access Control Sales Manual 0602 Page 7 July 22, 2002
  • 8. A: Compare hand placement on the platen to using a door knob/handle, money handling, telephone use, or shaking hands. Q: How often do I need to clean the HandKey, and how? A: Typically, if the unit is so dirty that you don’t want to put your hand on it, it should be cleaned. In most office environments the HandKey platen would need to be cleaned once every two to three weeks. The HandKey should be cleaned with glass cleaner and a soft cloth. Q: Are there any privacy issues? A: Hand geometry technology cannot be reverse-engineered to identify people. It does not store the image of the hand, but instead stores a 9-byte template, which is a mathematical representation of the hand image. This mathematical value is meaningless to other devices. In addition, no fingerprint or palm print information is gathered. Q: Is the HandKey safe? A: The infrared lights used in the hand reader are similar to those used in remote controls for TVs and VCRs. The light’s power level is 100 milliwatts – less than the amount produced by natural sunlight or microwave ovens. Recognition Systems has been contacted by the U.S. Occupational Safety and Health Administration (OSHA), and has supplied all requested information. OSHA has generated no reports of hazard. Access Control Sales Manual 0602 Page 8 July 22, 2002
  • 9. IV. Other Biometrics Competitive quick reference Technology Defined Where it is used Perceived Why not access control Advantages Fingerprint None necessary Background De-facto when Higher False Reject Rate Checks talking about Higher Failure to Enroll Rate Low volume biometrics. False 1 in 50 does not have access control accept rate can readable fingerprints be lower Criminal Connotation Pricing may be Privacy Perceptions lower Residue, dirt, dryness & injury cause recognition problems Facial Video camera Surveillance – It is cool User can be identified without looks at the size However a Non-contact their knowledge. This may be and shape of human is the viewed as a privacy issue. your face ultimate decision Higher false reject rates maker Higher false positives People can change appearance Challenges with lighting issues Iris scanning Video camera Access Control Cool – High Tech Low user acceptance looks at the and identity Very high Slower throughput – colored doughnut verification security positioning can be time portion of your consuming. eye Problems with lighting, eyeglasses, and contact lenses. Higher failure to enroll rate Larger template (512 bytes per eye) Retina Infra-red light Government None really Very low user acceptance source used to applications Very high Requires close proximity of examine the security eye to reader retina (back wall) of the eye Signature A pen or stylus is Logical access Something we do Writing on the wall just used to measure control everyday doesn’t make sense – slow the speed, Electronic Poor long term reliability direction, and Signature - Signature changes pressure with - Stress affects signature which one writes Higher false reject rates their signature Voice Microphone or Logical access Inexpensive No one likes to talk to a wall telephone used control Background noise to capture Higher false reject rate speech and Digital recordings may be compare it to a accepted database using Variation in microphone gain custom software can cause problems Access Control Sales Manual 0602 Page 9 July 22, 2002
  • 10. Competitive Selling Tips: Fingerprint and Two-Finger Geometry Two-Finger Geometry is most similar to Hand Geometry o ‘Digi2’ product manufactured by Biomet Partners and sold through OEMs o Typically only offered with low-end packages o Very little is known about this product (has not been included in independent research) o Competitive Selling Tip: “Two-finger geometry measures only two fingers. Hand Geometry measures four fingers and part of the hand. Which do you think would be more reliable?” Fingerprint readers are made by more than 80 different companies o Some access control business partners and competitors offer fingerprint as an option o Typically it is offered by low-end competitors, but not always. o Competitive Selling Tips: Encourage prospect to ask the other vendor how many installations they have with this particular fingerprint reader. Use case studies and references. Encourage prospect to ask other vendor for the same. Ask prospect how their employees (or customers) might feel about using fingerprint readers! General tips Competitors may make extravagant claims regarding their False Accept and False Reject Rates. Don’t believe them! RSI’s error rates have been proven in the field. Most biometric manufacturers are not financially stable. Who wants to buy a product and then find out that the manufacturer has gone out of business? RSI is the rare exception in the biometrics industry. We are owned by Ingersoll-Rand, and have been a financially solid, profitable company for over 10 years. There are over 50,000 RSI HandReaders installed. Always encourage prospects to ask other vendors how many physical access control installations they have. Be careful not to be too negative about other biometric products; this could result in a negative impression of all biometrics. Emphasize RSI’s strong points, rather than the competitor’s weak points. Privacy issues: Hand geometry has many advantages in this area, including: o No law enforcement agency keeps a database of hand templates. Fingerprints and facial geometry templates are used in law enforcement. o The nature of hand geometry ensures that every user is an active, willing participant and cannot be identified without their knowledge. Fingerprint technology causes concerns (not necessarily valid) that a user could be identified by comparing “latent prints” with the stored template. Some facial recognition applications “scan the crowd” to identify known criminals. Access Control Sales Manual 0602 Page 10 July 22, 2002
  • 11. V. Handling Objections Objection How to overcome objection “It’s too expensive” Payback in as little as 3-6 months “This seems really high-tech. I don’t want to take Manufacturer in business since 1986; profitable chances on new, unproven technologies.” since 1990 Over 60,000 units installed “Why does the ID number have to be entered? The HandKey does verification, a one to one Why can’t the HandKey figure out who I am when search based on the ID number. This process I place my hand on it?” takes less than one second. Some biometric companies say they can do identification – a one to many search. This is not common, and has only been successful with small groups of users. It is a slow process and requires a very powerful computer to perform the search. It’s just not practical or cost-effective for most applications. “What about privacy issues? Can the hand data Emphasize that it doesn’t read finger or palm be used to identify someone for other purposes?” prints. Doesn’t store image of hand, only the 9 byte template – a mathematical value that is meaningless for any other purpose. No law enforcement agency keeps a database of hand templates. With hand geometry, a user can’t be identified without their knowledge. “Do my employees need to be concerned about Infrared light = 100 milliwatts, similar to remote radiation from the HandKey?” controls for TVs, VCRs, etc. “My employees are worried they’ll get germs from Compare to door knob/handle, shaking hands, the HandKey” money. If employees are still concerned, they can clean the platen before using (leave Windex and cloth next to HandKey). “I’m concerned that my employees will think of this HandReaders are installed to increase security. as a ‘Big Brother’ type of thing – that we don’t Using a HandReader guarantees that only the trust any of them. credential owner has access. This ensures that someone else cannot gain access using your identity. “The error rates sound high. 1 in 1000 doesn’t Adjustable Threshold can reduce FAR or FRR, seem like it’s very reliable.” depending on customer needs and preferences. False reject only means that you have to try again – just like you have to do, much more frequently, with a card reader. Other biometrics have lower FAR, but higher FRR Access Control Sales Manual 0602 Page 11 July 22, 2002
  • 12. VI. HandKey feature comparison by model Access Control Product Line – Quick Reference HandKey CM HandKey II ID3D-R HandKey Standard User Memory 512 512 256 Expandable User Memory 1000 max 32,512 max 27,904 max Transaction buffer size 1000 5120 3400 Door Control + WCM Power Input 12-24VAC or VDC 12-24VAC or VDC 12-24VAC or VDC Construction Plastic Plastic Metal Surface Wall mount Integrated Integrated Option Recessed Wall mount No No Option Table mount Option Option Standard CM Programming Ports No No RS 422 Communications No RS 232 Communications No No Modem Communications No Option Option Ethernet Communications No Option Option RS232 printer output No No Auxiliary Inputs 2 2 1 Auxiliary Outputs 2 3 1 Auto Daylight Savings Time Operational Battery Backup Option Option Option Red/Green light on top panel Option Outdoor Options Available Hurricane Hurricane Blizzard Tsunami Tsunami Access Control Sales Manual 0602 Page 12 July 22, 2002
  • 13. VII. HandKey II or HandKey CR Demonstration Before you start Bring your own extension cord. Turn dip switches #4 and 5 on. This will reset your reader and wipe out any hand templates currently stored when power is applied. Plug in your HandReader. There is a barrel power jack on the back of the reader. Turn dip switches #4 and 5 Off. Dip switches 1-3 should also be off. Dip switches are next to power jack connection on back of reader. Setup reader so platen is 40 inches above the ground, or on table top if user will be seated. Height is critical for verification. First enroll yourself, then you will be able to access menus to enroll others. Set Time and Date (if needed) Set ID length to 3 Enroll yourself To get entry to menus, press: Clear and Enter Enter password followed by # key: 4# Enroll: Press # Enter the ID, followed by the Enter key: XXX then Enter Place Hand 1/3 (remove hand) Place Hand 2/3 (remove hand) Place Hand 3/3 (remove hand) You are now enrolled Enroll your prospects as users To get entry to password level Press: Clear and Enter Enter your ID, followed by the Enter key: XXX then Enter Place your hand for verification Enter password followed by # key: 4# Enroll: Press # Enter the user ID, followed by the Enter key: XXX then Enter Place Hand 1/3 (remove hand) Place Hand 2/3 (remove hand) Place Hand 3/3 (remove hand) The user is now enrolled Demonstrating Tips Demonstrate verification prior to enrolling them. o This allows the person to see how the hand is placed into the reader, lowering errors and frustration. Remember their ID number when you enroll them. Repeat their number to them before they try to verify, or enter their number in for them. o If they forget, so will their users. Make the first time as easy as possible. Try to cheat for them. If others are around, have them attempt to verify with your ID number. Explain the score. Explain why it aids employees in correct hand placement. Access Control Sales Manual 0602 Page 13 July 22, 2002
  • 14. COMMAND MODE – HANDKEY II MENU Management Service Menu Setup Menu Enrollment Menu Security Menu NAME Menu Default 1 2 3 4 5 Password Authority Level 1 2 3 4 5 Required Calibrate Set Language List Users Add User Set User Data Set Date * Data from Status Display Remove User Set TZ Table Format Network * Network Set Time & Reject * Data to Network Status Date Threshold Set Address Set Passwords Set ID Length Clear Memory Set Output Special Enroll Mode Set Facility Lock/Shunt Time Aux Out Control Set Reader Mode Set Serial Set Duress Code Print Options Set Beeper * These menu items are only available in a reader configured as a Master. Access Control Sales Manual 0602 Page 14 July 22, 2002
  • 15. VIII. ID3D-R HandKey Demonstration Before you start Bring your own extension cord. Turn dipswitch #4 on. This will reset your reader and wipe out any hand templates currently stored when power is applied. Plug the terminal block with the power wires into the HandReader. Plug in your HandReader while compressing the white tamper switch on the back of the HandReader. If the back plate is on the HandReader, then the tamper should be pressed. Turn dipswitch #4 off. Dipswitches 1-3 should also be off. Setup reader so platen is 40 inches above the ground, or on tabletop if user will be seated. Height is critical for verification. First enroll yourself, then you will be able to access menus to enroll others. Set Time and Date if necessary Set ID length to 3 or 4 if desired Enroll yourself To get entry to menus, press#: # Enter password followed by # key: 4# Enroll: Press # Enter the ID, followed by the Enter key: XXX then # Place Hand 1/3 (remove hand) Place Hand 2/3 (remove hand) Place Hand 3/3 (remove hand) You are now enrolled Enroll your prospects as users Enter your ID, followed by the # key: XXX then # Place your hand for verification Press # right after verification: # Enter password followed by # key: 4# Enroll: Press # Enter the user ID, followed by the # key: XXX then # Place Hand 1/3 (remove hand) Place Hand 2/3 (remove hand) Place Hand 3/3 (remove hand) The user is now enrolled Demonstrating Tips Demonstrate verification prior to enrolling them. o This allows the person to see how the hand is placed into the reader, lowering errors and frustration. Remember their ID number when you enroll them. Repeat their number to them before they try to verify, or enter their number in for them. o If they forget, so will their users. Make the first time as easy as possible. Try to cheat for them. If others are around, have them attempt to verify with your ID number. Explain the score. Explain why it aids employees in correct hand placement. Access Control Sales Manual 0602 Page 15 July 22, 2002
  • 16. COMMAND MODE – ID3D-R HANDKEY MENU Management Service Menu Setup Menu Enrollment Menu Security Menu NAME Menu Default 1 2 3 4 5 Password Authority Level 1 2 3 4 5 Required Calibrate Print Options Set Time & Date Add User Set User Data Status Display ID Entry Mode List Users Remove User Set TZ Table * Network Set Reader Reject Save Data Status Mode Threshold Set Output Restore Data Set Passwords Mode Lock/Shunt * Data to Network Clear Memory Time Aux Out * Data from No Hand Enroll Control Network Set Site Code Set Serial Set Beeper * These menu items are only available in a reader configured as a Master. Page 16
  • 17. IX. HandKey CM Demonstration Before you start Bring your own extension cord. Turn your reader so the back of the reader is facing you. Turn dip switches #4 and 5 on (away from you). Dipswitch 3 should be on. Dipswitches 1-2 should be off (towards you). Dipswitches are next to the power jack connection on back of the HandReader. Plug the barrel end of the power supply into the barrel connector located at J12. Turn your HandReader around so the front is facing towards you. Plug your power supply into the wall. The HandReader will begin its power-up cycle. The Front Panel Version will appear on the screen. Immediately after Front Panel Version disappears from the screen: press and hold 8. The reader will say Enter password: Press 5 and press enter The prompt will say SW4, SW5 both on Reboot? Press: # for YES This will reset your HandReader and wipe out any hand templates currently stored when power is applied. This will take a few seconds. When the HandReader prompt displays READY, turn dip switches #4 and 5 off. Setup reader so platen is 40 inches above the ground, or on the tabletop if user will be seated. Height is critical for verification. First enroll yourself, then you will be able to access menus to enroll others. Set Time and Date (if needed) Set ID length to 3 or 4 (if desired) Enroll yourself To get entry to menus, press: Clear and Enter Enter password followed by # key: 4# Select Add User: Press # Enter an ID, then press Enter: XXX then Enter Place Hand 1/3 (remove hand) Place Hand 2/3 (remove hand) Place Hand 3/3 (remove hand) You are now enrolled Enroll yourself with a second ID number Then press Clear to exit command mode Access Control Sales Manual 0602 Page 17 July 22, 2002
  • 18. Demonstrating Tips Before you begin, demonstrate verification. o This allows the person to see how the hand is placed into the reader, lowering errors and frustration. Explain the enrollment process and how they should place their hand. Explain that they should land their hand like a plane and close their fingers on the pins. Let the user practice hand placement before you enroll them. Watch to be sure that their fingers are touching the appropriate finger pins. Remember their ID number when you enroll them. Repeat their number to them before they try to verify. o If they forget so will their users. Make the first time as easy as possible. Enroll your prospects as users To get to the password level Press: Clear and Enter Enter your ID, followed by the Enter key: XXX then Enter Place your hand for verification Enter password followed by # key: 4# Select Add User: Press # Have the user enter an ID number, then press Enter: YYY then Enter Place Hand 1/3 (remove hand) Place Hand 2/3 (remove hand) Place Hand 3/3 (remove hand) The user is now enrolled Press Clear to exit command mode Verification Allow the user to verify their hand. Have the user enter their ID, then press enter: YYY then Enter Have the user place their hand for verification: Place hand When the user successfully verifies the LCD will display the following o ID Verified o Score Access Control Sales Manual 0602 Page 18 July 22, 2002
  • 19. The top panel will also show a green light. Explain the score. Explain how it aids in correct hand placement. HINTS: Entering Command Mode Command Mode is the menu tree used in programming a HandReader. When NO users are enrolled: 1. Press Clear and then press Enter on the HandReader keypad. 2. The HandReader will prompt you to ENTER PASSWORD. 3. Here you would type in the password of the menu you need to access. 4. Press Enter. When users are enrolled: 1. Press Clear and then press Enter on the HandReader keypad. 2. The HandReader will NOT prompt you to ENTER PASSWORD at this time. Instead you will see the READY string on line one, and on line two you will see : This means that there are users already enrolled in the HandReader. You must verify your identity before being allowed into Command Mode. 3. At the : prompt, Type in your User ID number. Then press Enter. Follow the directions on the screen and place your hand. 4. When your identity has been verified, the HandReader will prompt you to ENTER PASSWORD. 5. Here you would type in the password of the menu you need to access. 6. Press Enter. Exiting Command Mode 1. To exit command mode, you can do one of two things: a. If you are NOT in a menu item that requires a numerical input, you can press any number key. b. If you are NOT in a menu item that requires an input, you can press Clear. 2. You may have to press Clear several times to return to the READY prompt if you are more than one level deep in the menu tree. Access Control Sales Manual 0602 Page 19 July 22, 2002
  • 20. COMMAND MODE – HANDKEY CM MENU Management Service Menu Setup Menu Enrollment Menu Security Menu NAME Menu Default 1 2 3 4 5 Password Authority Level 1 2 3 4 5 Required Calibrate Set Language List Users Add User Set User Data Set Date Status Display Remove User Set TZ Table Format Set Time & Reject Date Threshold Set ID Length Set Passwords Lock/Shunt Clear Memory Time Aux Out Special Enroll Control Set Duress Code Print Options Set Beeper NOTE: There are some menus that require an input. If you try to press CLEAR to get out of these menus, nothing will happen. If you want to get out of the menu without changing anything, press Enter to accept default values. Access Control Sales Manual 0602 Page 20 July 22, 2002
  • 21. X. Product Specifications HAND GEOMETRY READER SPECIFICATION RECOGNITION SYSTEMS HANDKEY II Verification time Less than 1 second Template size 9 bytes Power 12-24 VDC Memory Retention Up to 5 years via the standard Internal Lithium Battery Transaction Storage 5187 transactions, buffered Communications RS-485 (4 wire and 2 wire) RS-232 Serial Printer Support or network communications Modem or Ethernet - optional Baud Rate 300 to 28.8 bps User Capacity 512 Users standard Internally expandable to 32,512 Door Control Door Lock Output Alarm Monitoring Tamper, Door Switch Two Auxiliary Inputs Three Auxiliary Outputs Request to Exit Card Reader Input Proximity, Wiegand, Magnetic Stripe, or Barcode Card Reader Emulation Wiegand, Magnetic Stripe, or Barcode Output Duress Code 1 digit user definable Time Zones 62 user definable Unlimited Holidays Size 8.85in. wide 11.65in. high 8.55in. deep Access Control Sales Manual 0602 Page 21 July 22, 2002
  • 22. HAND GEOMETRY READER SPECIFICATION RECOGNITION SYSTEMS HANDKEY ID3D-R Verification time Less than 1 second Template size 9 bytes Power 12-14 VDC Memory Retention Up to 5 years via the standard Internal Lithium Battery Transaction Storage 3405 transactions, buffered Communications RS-485 (4 wire and 2 wire) RS-232 Serial Printer Support User Capacity 256 Users standard Internally expandable to 27,904 Door Control Door Lock Output Alarm Monitoring Tamper, Door Switch Auxiliary Input Auxiliary Output Request to Exit Card Reader Input Proximity, Wiegand, Magnetic Stripe, or Barcode Card Reader Emulation Wiegand or Magnetic Stripe Output Duress Code 1 digit user definable Time Zones 62 user definable Unlimited Holidays Size 6.46 in. wide 8.25 in. high 7.29 in. deep Access Control Sales Manual 0602 Page 22 July 22, 2002
  • 23. HAND GEOMETRY READER SPECIFICATION RECOGNITION SYSTEMS OUTDOOR HANDKEY ID3D-RW Temperature Range 0°F to 120°F Verification time Less than 1 second Template size 9 bytes Power 12-14 VDC Memory Retention Up to 5 years via the standard Internal Lithium Battery Transaction Storage 3405 transactions, buffered Communications RS-485 (4 wire and 2 wire) RS-232 Serial Printer Support User Capacity 256 Users standard Internally expandable to 27,904 Door Control Door Lock Output Alarm Monitoring Tamper, Door Switch Auxiliary Input Auxiliary Output Request to Exit Card Reader Input Proximity, Wiegand, Magnetic Stripe, or Barcode Card Reader Emulation Wiegand or Magnetic Stripe Output Duress Code 1 digit user definable Time Zones 62 user definable Unlimited Holidays Size 8.0 in. wide 12.0 in. high 8.7 in. deep Weight 20.6 lbs. Wall Mount Included Humidity Levels Permitted Non-Condensing Heaters 24VAC in addition to the 12-14VDC for the HandReader Maintain platen and LCD temperature at approx 70°F to 75°F Options 120VAC – 24VAC Heater Transformer Access Control Sales Manual 0602 Page 23 July 22, 2002
  • 24. HAND GEOMETRY READER SPECIFICATION RECOGNITION SYSTEMS HANDKEY CM Measurements 90+ measurements, size and shape of the hand Verification time Less than 1 second Template size 9 bytes Power 12-24 VDC or VAC Operating Temperature 32ºF to 114ºF, at 0-85% relative humidity, non-condensing Memory Retention Up to 5 years via the standard Internal Lithium Battery Transaction Storage 1000 transactions, buffered Communications Communicates with LockLink Express via programming port Baud Rate 9600 bps User Capacity 512 users standard, maximum 1,000 users Door Control Door Lock Output Alarm Monitoring Tamper, Door Switch Auxiliary Inputs Auxiliary Output Request to Exit Card Reader Input Proximity, Wiegand and magnetic stripe Duress Code Defined in LockLink Express Time Zones Defined in LockLink Express Size 8.85in. wide by 11.65in. high by 8.55in. deep Mounting Surface wall mountable, standard via key lock Table mount option available Display 2 lines, 16 characters each Keypad Numerical keypad Access Control Sales Manual 0602 Page 24 July 22, 2002