uTouch User Manual 1.6x - Evidencija radnog vremena

snakesailboatSécurité

23 févr. 2014 (il y a 3 années et 5 mois)

889 vue(s)


uTouch User Manual

v1.6




Civintec
uTouch



Smart Multi
-
purpose terminal

with

BoneID Embedded




User manual

Based on BoneID Embedded

v
1.
6.168




uTouch User Manual

v1.6

Table of contents


1

Introduction

................................
................................
................................
.........................

1

2

Technical specifications

................................
................................
................................
.......

2

3

Unit description

................................
................................
................................
...................

3

3.1

Front side

................................
................................
................................
.....................

3

3.2

Back and side view

................................
................................
................................
......

4

3.3

Connections description

................................
................................
..............................

5

4

Mounting the unit

................................
................................
................................
...............

7

5

Getting started

................................
................................
................................
....................

8

5.1

Power up

................................
................................
................................
.....................

8

5.2

Activating the unit

................................
................................
................................
.......

9

6

Setting the unit

................................
................................
................................
..................

10

7

Users

................................
................................
................................
................................
..

11

7.1

Creating a new user

................................
................................
................................
...

12

7.1.1

About security
-

FAR and FRR

................................
................................
...............

12

7.1.2

Choosing proper FAR value

................................
................................
..................

12

7.2

Adding/managing fingerprint templates

................................
................................
...

15

7.3

Adding/managing cards

................................
................................
.............................

16

8

Settings

................................
................................
................................
..............................

17

8.1

General

................................
................................
................................
......................

17

8.2

Camera and appearance
................................
................................
............................

18

8.3

Job codes

................................
................................
................................
...................

19

8.4

Outputs and relays

................................
................................
................................
....

20

9

Date and time

................................
................................
................................
....................

21

10

Transactions

................................
................................
................................
..................

22

11

Network

................................
................................
................................
.........................

23

11.1

Ethernet

................................
................................
................................
.....................

23

11.2

Mobile connectivity

................................
................................
................................
...

24

11.3

Remote access

................................
................................
................................
...........

24

11.3.1

Setting up FreeDNS DDNS service

................................
................................
......

25

12

Tools

................................
................................
................................
..............................

26

12.1

Hardware

................................
................................
................................
...................

27

12.1.1

Card reader

................................
................................
................................
.........

27

12.1.2

Wiegand
................................
................................
................................
..............

29

12.1.3

Input / output states

................................
................................
..........................

29

12.2

Events

................................
................................
................................
........................

29

12.3

Manage

................................
................................
................................
......................

32


uTouch User Manual

v1.6

12.4

Anti
-
Passback

................................
................................
................................
............

33

12.4.1

Solo

................................
................................
................................
.....................

33

12.4.2

Card reader

................................
................................
................................
.........

33

12.4.3

Second device

................................
................................
................................
.....

33



uTouch User Manual

v1.6

1

1

Introduction


We congratulate You on your acquiring the
Civintec
uTouch

smart terminal
.


uTouch

unit is a multi
-
purpose RFID smart card and biometric terminal with 7 inch capacitive
touch sensitive screen for intuitive and comfortable user experience.


On the technical side, t
his terminal features powerful RFID options with NFC technology
supportin
g peer to peer mode, Mifare, DesFIRE EV1, Mifare Plus, HID I
-
Class, LEGIC compatible
standards, along with fast and accurate fingerprint technology by Suprema.


There are multiple check
-
in options for each user. Each user can check
-
in with his/her RFID
ca
rd only, with SmartCard which contains user’s finger template, check
-
in in 1:1 mode (with PIN) or
in 1:N (AFIS


automatic
fingerprint recognition) mode
, and also by using NFC
. Each user can have up
to 10 fingers enrolled for easier verification or authent
ication.


Standard network connections allow easy integration with existing 10
0MBit/1GBit networks,
while Wi
-
Fi

and GPRS allow for wireless communication where needed.
Also, RS232 or RS485 serial
network is supported by default.


With embedded Lin
ux operat
ing system
,
this unit presents itself as a great solution for time
and attendance and access control solution straight out of the box, and
also
as a terminal which can
be used for a whole array of other applications with its software development kit.







uTouch User Manual

v1.6

2

2

T
echnical specifications


Check
-
in technology

Mifare SmartCard + biometric (option)

RFID standard

ISO14443A 4(part 1
-
4), Mifare, Mifare Plus and DESFire EV1, ISO14443B,
Felica

NFC

ISO18092 NFC (peer to peer)

Supporte
d

RFID cards

ISO18092 NFC (peer to peer), Ultralight, Mifare 1K/4K, Mifare Pro/Prox,
Mifare Plus, DESFire EV1,SLE 55Rxx, SLE66CL160S and other ISO14443A/B
compatible cards, Sony Felica and HID I
-
Class, LEGIC compatible cards
(option)

CPU

ARM

v6
, up to 800 MHz

Memory


2GB Nand Flash + 256MB mobile DDR SDRAM

Operating system

Linux

Screen

7” LCD WVGA (800x480) touch screen

䍡C敲e

䕭b敤e敤e1,3⁍P楸
1280x1024)⁤楧楴慬⁣im敲e

䅵T楯⁦慣楬 瑩WV

2 PI8 佨m 獰敡步爠 睩Wh 捯n瑲o汬慢汥 vo汵me
Ⱐ m楣牯phone 慳 晵瑵牥
op瑩Wn

䥮晲慲敤⁳enVor

P敲eon⁡灰牯慣a楮g⁤整 捴con⁵獥搠 o爠慵rom慴楣⁳ re敮⁡捴iv慴aon

佰敲慴OonoT敳

䙩ng敲灲楮琠I⁓m慲瑃慲a I P慳獷o牤

䙩ng敲灲楮琠獥湳Vr

500⁤ 椠獥湳o爬rm慮u晡f瑵牥W⁢礠
卵p牥m愬⁳楺攠16x19 mm

䙩ng敲灲楮琠業慧e

272砳20⁰楸敬

䙩ng敲灲楮琠
楤敮瑩晩捡瑩cnoTe

1:1 moTe
睩瑨⁐䥎)r

1:N moTe

con晩fu牡r汥⁰敲⁵ler

呥mp污瑥 捡c慣楴y

1900 瑥mp污瑥猠批VT敦慵e琬W9500 on⁲敱e敳e

啳敲⁣慰a捩瑹

100‰00⁵獥牳

Log⁣慰慣楴a

1‰00‰00⁥v敮瑳

L䕄⁳楧 慬ang

䍯汯r⁣on瑲W汬慢l攠L䕄V
g
r敥nⰠ牥T)

䍯mmun楣i瑩Wn

呃TI䥐I v楡i 削45 捯nn散eor ⠲ 捯nn散eo牳⤬r 剓232I剓㐸5Ⱐ 啓䈠 ⠲ po牴猩,
坉P䤬⁇I剓ⰠR䜠Gop瑩Wn)

坩敧慮T⁩湴敲晡捥

2砠坩敧慮T⁉ 
26
-
58b楴⤬‱砠坩敧慮T 併琠O26
-
58b楴)

䥮pu琠T敶楣i

4

楮pu瑳W


數i琠bu瑴onⰠ摯or⁳ 慴a⁳ nVo爬⁦楲攠V敮獯爬⁩n晲慲e
T⁳ nVor

䥏⁣Inne捴conV

4⁩湰u琬W4u瑰W琠conn散eionV
Ⱐ,u瑰W瑳⁲慴 T 25 m䅀5嘠VC

剥污R 捯nne捴conV

3 u獥爠con晩fu牡r汥l 牥污祳
, 睩瑨wN䌠慮T N传捯n瑡捴V
Ⱐ0ⰵ䅀125 嘠D䌠or
1䅀30⁖ DC

䕸N敲湡氠獴o牡re

1砠SD⁃慲 ⁳ oW

呡Tp敲⁳ i瑣W

奥Y

Po睥爠獵Vp汹

9
-
24 嘠D䌬CPo䔠(
䥅䕅802⸳慴

H楧h Pow敲e楮瑥牦r捥
Ⱐop瑩Wn慬



ov敲eJ䅃K2
捯nn散eor
)Ⱐ,i
-
Ion⁢慴 敲e⁢慣歵 
op瑩Wn

)

Po睥爠捯n獵mp瑩on

M慸a800 m䄠A12⁖⁄䌬⁡v敲慧攠500 m䄠A12⁖⁄C
6⁖䄩

䉡瑴Bry

4⸲嘬.2200 m䅨

D業敮獩潮e

230⁸ 160 砠45 mm

佰敲慴楮g
vo汴慧e

-
0끃⁾°⬵0끃

却S牡r攠瑥mp敲e瑵牥

-
10끃°縠+60끃

佰敲慴楮g⁈ m楤楴y

5╾90┠r敬慴楶攠hum楤楴i non
-
捯nT敮獩eg

䍥牴楦楣慴敳

䥓伹001,⁃ Ⱐ䙃䌬⁒oHS






uTouch User Manual

v1.6

3

3

Unit description

3.1

Front
side


Display


a big
and light
7 inch capacitive touch screen, used for entering user data via user
interface, and also to show
various messages to a user.

IR sensor


this device is used to automatically turn on the screen when the user approaches
the unit. After a certain period of user inactivity, the unit dims
or turns off
screen, which saves power
and also protects the screen.

When the user approaches the unit to check
-
in on it, the unit
automatically turns on the screen.

Camera


camera is used for storing images in the unit. Images can be stored during
enrolment process, so that the image can show on the screen whenever the u
ser checks in on the
unit. Camera can also be used to store the image with each transactions, so it is possible to compare
user photographs over time.

LED signal lights


additional signal to the user, along with the main display.

RFID card reader


Smart
card reader

and/or NFC module
(see specifications for supported
cards)
.

Fingerprint sensor


sensor for enrollment and verification of users when biometric system is
used. Up to 10 fingers can be enrolled for each user.

Speaker


used for sound playback

an
d communication, because the unit can be used as
intercom
.



Touchscreen display

IR sensor

Fingerprint sensor

Camera

LED signal light

Speaker

RFID card reader



uTouch User Manual

v1.6

4

3.2

Back and side

view


On
this picture you can see the mounting plate, along with the back
side
of the unit, on which
you can see
the communication connections, along with input and output
connections.


Here is the detailed view of the connections.









Side view shows power switch, SD Card slot, two USB 2.0 ports, slave connector, and a boot
(reset) button.

SD Card slot and USB ports are

used for service purposes only.

These can be used for
updating firmware to the unit.





SIM card slot

Power socket

LAN connectors

SAM
card slot

Relay status LEDs

Input/output
terminals



uTouch User Manual

v1.6

5


3.3

Connections
description


Back plate contains connections for all inputs and outputs, and also connectors for power
supply, network connector and slot for SIM card, used for 3G network.


Here is the detailed

layout of 2x18
-
way terminals, and a short description:




DC

+
12V


pow敲e獵Vp汹Ⱐ12嘠VC

P
G

-
D1


D1⁣onn散eion⁦ 爠坩敧慮T⁏u瑰WW‱

D䍟
䝎D


g牯unT⁦o爠灯w敲e獵Vp汹

P
G

-
D0


D0⁣onn散eion⁦ 爠坩敧慮T⁏u瑰WW‱

均P
-
2
-
䐱D


D1 捯nn.

fo爠r楥i慮T⁉ pu琠2

䝐O
-
1䈠
-

G敮敲慬ePu牰oV攠併瑰u琠1

均P
-
2
-
䐰D


D0 捯nn
.

fo爠
P楥i慮T⁉ pu琠2

䝐O
-
2䈠
-

G敮敲慬ePu牰oV攠併瑰u琠2

均P
-
1
-
䐱D


D0 捯nn
.

fo爠r楥i慮T⁉ pu琠1

䝐O
-
3䈠
-

G敮敲慬ePu牰oV攠併瑰u琠3

均P
-
1
-
䐱D


D0 捯nn
.

fo爠r楥i慮T⁉ pu琠1

䝐O
-
4䈠
-

G敮敲慬ePu牰oV攠併瑰u琠4

䝐I
-
1B


G敮敲慬ePu牰oV攠Inpu琠1

剓㈳2_
R堠


剥R敩e攠con
n
.

景爠剓232⁣ommun楣i瑩Wn

䝐I
-
2B


G敮敲慬ePu牰oV攠Inpu琠2

剓㈳2_
T堠


呲慮Vm楴i捯nn
.

景爠剓232⁣ommun楣慴ion

䝐I
-
3B


G敮敲慬ePu牰oV攠Inpu琠3

剓㐸5
-



䈠Bonn散瑩Wn⁦or⁒匴85⁣ommun楣慴ion

䝐I
-
4B


G敮敲慬ePu牰oV攠Inpu琠4

剓㐸5
-



A⁣onn散eion⁦or
剓㐸5⁣ommun楣慴ion

R
L
1
-
N䌠


No牭慬⁃汯V敤⁣on瑡捴⁦o爠r敬慹 1

卐SL⭟O啔U
-

po獩瑩v攠ou瑰u琠景爠數W敲湡氠獰敡步r

R
L
1
-
C位


Common⁣on瑡捴c景爠剥污y 1

卐SL
-
彏啔
-

n敧慴eveu瑰u琠景爠數W敲湡氠獰敡步r

R
L
1
-
NO


No牭慬⁏灥a 捯n瑡捴⁦o爠r敬慹 1

M䥃彉I


捯nn散eion⁦ 爠rx瑥牮慬am楣iophone

剌2
-
N䌠


No牭慬⁃汯V敤⁣on瑡捴⁦o爠r敬慹 2

剌3
-
N䌠


No牭慬⁃汯V敤⁣on瑡捴⁦o爠r敬慹 3

剌2
-
C位


Common⁣on瑡捴c景爠剥污y 2

剌3
-
C位


Common⁣on瑡捴c景爠剥污y 3

剌2
-
NO


No牭慬⁏灥a 捯n瑡捴⁦o爠r敬慹 2

剌3
-
NO


No牭慬a
佰敮 捯n瑡捴⁦o爠r敬慹 3




uTouch User Manual

v1.6

6

Along with these terminal connections, the unit also houses the following ports:

SIM1


GPRS SIMCARD SOCKET


socket for SIM card used for GPRS communication, where
no serial nor network connection is available

SIM2


RFID SAMCA
RD SOCKET


socket for SAM security card

RJ45_JACK1


connector used for TCP/IP communication

RJ45_JACK2


secondary TCP/IP connector

-

must be used when powering the unit with PoE

Power connector


standard connector (+ on the pin) for power supply, 12V


Right below the SIM2 slot there are 3 LED indicators showing status of 3 relays. If illuminated
red, the relays are in active state. If not illuminated, the relays are in their default state.



uTouch User Manual

v1.6

7

4

Mounting the unit


The
uTouch

unit is consisted of two parts


back plate and the main unit.

First y
ou need to mount the back plate.

Before actually mounting the back plate, put it on the surface and position it so that the
top

e
dge of the plate is at least 150

cm
(
5 ft
)
from the floo
r. Then mark the 4
holes for the screws.

The M2 screws and
anchors
are included in the package with the unit itself. If you lose them,
you can use M1,5 to M2,5 screws with bugle heads
, and with adequate anchors if needed
.

After mounting the back plate fir
mly on the mounting surface, connect all the cables needed
for installation to the respective terminals. Because of limited space between the unit and the
surface, make a bigger hole in the surface to house the needed cables in needed length.

After making
all the connections, position the unit on the back plate and slide it up into place.
If everything is properly done, the unit will slide approximately 1 cm

(1/2”)
.

The last move is to fasten the unit to the back plate
from below,
by using two supplied
scre
ws
.





uTouch User Manual

v1.6

8

5

Getting started


5.1

Power up

After mounting the unit on the surface, power it up by using the power switch on the left
side, and wait for the unit to boot.




Hello to the first screen which you will see after the booting process ends.


It shows
current date and time, along with the settings icon (the gear symbol in the top left
corner) and virtual keyboard used to enter pin and/or job code. Also, in the right mid part the unit
shows the picture that the camera is seeing at the moment.

Here the us
er can do the following:



Check in with card


by presenting the card to the RFID reader



Check in with template if 1:1 mode is selected


this is done by entering the PIN on the
virtual keyboard on the screen, and placing one of the enrolled fingers on the
fingerprint sensor



Check in with template if 1:N mode is selected


here the user just needs to press the
“checkmark” symbol, and places one of the enrolled fingers on the fingerprint sensor



Change unit settings


this is done by pressing the gear icon in the top left corner of
the screen.
Access to settings is allowed only to the authorized
personnel, and only to
a certain level (depending on the user level, which is described later in this manual)



Info button
-

User can check personal record history by pressing this button followed
by successful verification





IMPORTANT: If there is no user in the unit selected as “Administrator”,

a
ccess to the settings page is not
restricted

to authorized personnel!



uTouch User Manual

v1.6

9

5.2

Activ
ating

the unit

On first power
-
up,

the unit is working in DEMO mode. DEMO mode is intended for
demonstrational purposes

only
.

For the unit to be
fully
functional, it needs to be
activated
. Details on how to
activate

the unit
is
described in section

12 of t
his manual.

When in demo mode, the unit is working with following limitations:



On each reboot, all data stored in the unit (users, settings, transactions) will be erased



If the unit is turned on for more than one day, the unit will reboot at midnight, res
ulting in
loss of all data



Upload of templates and cards from the PC will be disabled



Download of transactions to server PC will be disabled






uTouch User Manual

v1.6

10


6

Setting the unit


By choosing the settings icon, you enter the system menu, as shown in the picture below:


Here you can choose
one of
these options:



Users


here, the administrator can create, delete, enroll, add and remove cards for
the users of the unit.



Settings


this section is used to set up various parameters


including general
parameters, display param
eters, visual and input/output parameters.



Date and time


used to set up date and time setting and synchronization parameters.



Transactions


transactions reporter.



Network


set up communication parameters.



Tools


various system tools.

There is a set of

icons in the top row of the screen which are used in the user interface. Here
is the description of the icons:


Pen icon
-

E
dit the selected entry


Magnifying glass



search


Cancel


cancel all changes you have made

and restore to previous data


Back


go to the previous
screen



changes you made in the selected

screen

will

not
be
saved!


Plus



add date (depending on the working
screen
)


Trash


delete selected value


In addition to those icons, there are also icons that indicate state of network

connections
(red cross means no connection, green check mark means connection established):


Connection to BoneID Net server.


GPRS connection established


VPN connection established




uTouch User Manual

v1.6

11

7

Users

Here the administrator can create new users, delete them, and add/delete templates or
cards for existing users.




When choosing this option, the
user list

shows up in the right part of

the screen, and options
panel shows on the left part of the screen.

The list shows following data:



PIN


a unique numeric identifier for each user



Name


full name of the user, with last name stated first



Level


user level, which allows each user to
change certain settings on the unit



Type


user type


this shows the way the user checks in on the unit



T


this field shows if the user has enrolled fingerprint templates



C


this field shows if the user has an RFID card assigned

The list can be sorted b
y any key. For example,
the list shown in the figure below

is sorted by
PIN from smallest to largest, but by touching the “Name” label, list can be sorted by user name. This
allows unit manager to
easily check

the list of users
, no matter how big,

right on

the unit.







uTouch User Manual

v1.6

12

7.1

Creating a
new user

Creating a new user is plain simple


when the list of users is shown, just touch the plus (
“+”
)
label
. When you touch this symbol, a keyboard is shown, and this is where you are supposed to enter
the PIN of the person wh
ich will be added to the system. The PIN is a unique number of that person
in the system, and it can be the existing personal ID number of the person, or a custom number
defined by the installer.

After choosing the pin and touching the checkmark symbol, t
he following screen is shown:




In this screen you

also need to

choose level of security (FAR).

This is only important if the
“Fingerprint 1:1” type is used. When using “Fingerprint 1:N (AFIS)”, default security rating is used

by
default
.

7.1.1

About
security
-

FAR and FRR

FAR (False Acceptance Ratio) is a value stating probability of false acceptance of a fingerprint
template

presented on the sensor
. The lower the value, the higher the security.

The tradeoff here is the fact that, if you decrease FAR
, you also increase FRR (False Rejection
Ratio) which increases the probability of unit rejecting the fingerprint template of a person who is
actually authorized to access the unit. These two figures are directly connected, and choosing the
right value dep
ends on the person and the application of the unit.

If there is need for lower security (time and attendance, public k
iosks etc.) security level
can
be lower
(that means, FAR value needs to be higher)
to increase passage speed. If there is need for
higher

security (access control to server rooms, cash rooms, vaults, etc.) FAR value needs to be
lower.

7.1.2

Choosing proper FAR value

As already stated, choosing proper value depends on the application of the unit and the
person whose finger is enrolled to the unit.

If a certain person has problems enrolling (various skin
conditions like hands being too sweaty, too dry, cuts on fingertips, wrinkles, or some other condition)
or you need to enroll the person often, maybe it would be better to decrease security for that

person
alone. Of course, if the application allows you to lower the security.

There is not much to be concerned here, though


even in the most unsecure setting, there is
a 0,01%
chance (1/10.000)
that the unauthorized person will gain access.
The most s
ecure setting is
0,000000001% chance (1/100.000.000) of false acceptance, but be prepared for more common false
rejection of enrolled people.





uTouch User Manual

v1.6

13


After choosing the security value, it is time to choose the level for the user.

The levels are as following:



Us
er


user can only check
-
in on the unit. This user cannot enter settings page.



Enroller


user can enter settings page, but can only
manage users and their
parameters (managing templates/cards)
. This user can also only manage users with
authority level

Enr
oller or User

(not Supervisors nor Administrators)



Supervisor


the user with this management level can manage users
of his or lower
level (User, Enroller, Supervisor) and enter the Transactions
screen
.



Administrator


unrestricted access to all options on

the unit, with access to all
function parameters.

And once again, a word of caution


unless there is at least one Administrator in the system,
everyone can access Settings
screen

on the unit!



Also, you have to define the way each users checks in on the

unit.



Here is one
specific feature of this unit


you can have various types of check
-
in for various
users, and their meaning is

stated in the table below:

Type

Description

Fingerprint 1:1

User needs to enter his/her PIN, and present one of the enrolled fingers on
the sensor.

Maybe this way is a bit slower than just pressing your finger on the sensor,
but
the comparison process
is
much
faster, especially if there are many
(more than 1
0
,000)

templates in the system.

Fingerprint 1:N (AFIS)

With AFIS (Automated Fingerprint Identification System) enabled, the user
just needs to touch the checkmark symbol on the keyboard, and present
one of the enrolled fingers on the sensor. The unit then searc
hes for the
matching template in its database
.

Pin only

User can check in by only entering his/her PIN on the keyboard. Of course,
this type of check in is the least secure one.

Card ID

User is allowed to check in only by card.
The unit reads the
ID or
data block

of the
presented RFID card, depending on the
type of
card used.

Card with fingerprint

The unit reads the enrolled finger template from the card, and asks the user
to present the finger to the biometric sensor. The template is not stored
anywher
e in the system. This
option
can only be done with Smart cards.

When checking in with template stored on a card, the card must be held
near the reader for 5
-
6 seconds because template data must be transferred
from the card to the unit.



uTouch User Manual

v1.6

14


The next step is to enter name of the user.
Name is consisted of last name, middle name, and
first name.
Just touch the text box, and the virtual keyboard will open,
allowing you to enter desired
text. Please keep the length for each field below 50 charact
ers.


You can also add a photo

for each user.

After doing all the previously described steps, you can easily add a photo by touching the
“Open camera”

button. When you are satisfied with the picture, touch the same button, now with
“Get picture”

option. I
f you are not satisfied with the picture, touch the same button again, since
now it has
“Remove picture”

option. Repeat these steps until you are satisfied with the picture
taken. The picture is stored on the unit, and afterwards on the server in the main
database. The
picture is in 240x320 px resolution. This picture will be shown on the display every time the user
checks in on the unit.

Be aware that the picture is saved, and shown afterwards, as a mirror image of the picture
taken. This is because the pi
cture is shown as natural, and the picture shown while taking the picture
is actually shown in mirror.

When done, do not forget to save the data by touching the disk icon in the right upper
corner. If you exit by touching the left arrow icon, the data will

not be saved.





IMPORTANT:
If user type is "Fingerprint 1:1", "Fingerprint 1:N" or "Pin only", user
can check in also by Card ID if card is assigned to user



uTouch User Manual

v1.6

15

7.2

Adding/managing
fingerprint
templates


After successfully creating a user, it is time to enro
ll a finger template.

You can create templates in two ways, if you created a user before, or you can create a
template without previously created user.





If you want to create a template for an existing user, simply select a user from the list, and
touc
h the
“+”

symbol.

If you didn’t select a user before adding a template, you can simply enter the Pin of the
existing
user
.


After selecting the Pin,
the unit will turn on the fingerprint sensor, and the user being
enrolled needs to put his/her finger on t
he
sensor three times.

If a user has problems checking in on the unit, you can enroll more than one finger (up to 10
fingers per person can be enrolled) by using the same process. You can check if user’s fingers are
properly enrolled as many times as you wish, by touching the
“C
heck”

button and presenting user’s
finger to fingerprint sensor.

If the user needs to re
-
enroll the templates, first it is necessary to delete existing templates,
which can be done by using the
“Trashcan”

icon.

If Smart cards are used for template storage
,
template transfer to the card is done
by using
the
“+ to card
” button.
The process of transfer of template to the card can last 5
-
6 seconds, so hold
the card near the reader for needed period of time
.

If new template needs to be added to the card, it is

not necessary to delete existing
template.

Success of this process can be checked with
“Check card”

button.





uTouch User Manual

v1.6

16

7.3

Adding/managing cards


Of course, you might not use fingerprints at all

and use the unit as a card terminal
. The unit
allows the option to use
co
mpatible RFID cards.



After entering the user, simply touch the
“+”

button, and present the card to the reader. If
successful, the card code will be shown in the
“Card ID”

field under the
“Check card”
button on the
left side of the screen.
If the card is

already assigned to other user, the unit will show the warning
and will not assign the card until it is

unregistered from its previous user
.

It is even possible to register more than one card to each user.

Managing cards is otherwise done the same way as
managing templates.





uTouch User Manual

v1.6

17

8

Settings


This is a screen where you can configure the unit. Settings are split into four categories



G
eneral settings, Camera and
appearance
, Job codes, Outputs and Relays.

8.1

General



Watchdog
-

turn on or turn off watchdog
protection if system freezes (after deactivation,
device will reboot)

Cards


this option chooses if the cards are used in the system or not.

The card reader will be
ignored during the check
-
in process and it will not be possible to add new cards.

Pin/Mixe
d/AFIS


choice of checking in when fingerprint is used. With Pin selected, all users
must check in by using pin and presenting one of their enrolled fingers. With AFIS selected, the
keyboard during the check
-
in process will not show numbers, just one big
“Press here to START”
button.

Mixed mode combines Pin and AFIS mode where button check mark is used to initiate AFIS.

Pin length


defines the number of Pin digits. It is best to configure this depending on
number of people who are supposed to check in on the unit. If there is 50 workers in a company,
there is no
need to use
a 4
-
digit Pin.

Pin can contain maximum 9 digits
.

Verification screen timeout


defines time for how long will the screen with successful check
-
in message be shown. This time is defined in seconds.

Minutes between two check ins


keeps the users from accidentally checking in multiple
times in a row. Th
is parameter defines how much time must pass between two check ins of any user.

Inactivity timeout


defines for how long will the unit keep the screen turned on after the last
activity. This time is in seconds.

0 seconds means display will be always ON.

D
im display


the action which will happen after the inactivity timeout expires.

“Dim display”
will significantly lower the brightness of the screen, while “Turn off display” will turn it off
completely.





uTouch User Manual

v1.6

18

8.2

Camera and
appearance

These settings are used to se
t up visual appearance of the unit


wallpaper, skin and
language of all unit operations.




Show camera on main
screen



if this option is turned on, small picture from the unit camera
will always be shown on the main screen.

Add picture to transaction


chooses if the picture from the camera will be stored in the
database with a transaction, when that transaction occurs. This is useful if RFID cards are used to
check in, because it can easily be checked if a person swiped someone else’s card, or more tha
n one
card. You can select whether this option is inactive, active only on a successful check
-
in, or on all
transactions.

Background picture


selects one of the predefined wallpapers.
Custom wallpapers can be
uploaded to the unit by using CN8Tool Windows
application.

Skin (restart on change)


selects general skin of the interface. It is possible to choose either
white or dark skin. Skin affects button and menu appearance. The unit
will restart
after changing this
setting.

Language


choose language for th
e unit. The language can be uploaded to the unit by using
CN8Tool. Each language is a simple text file.





IMPORTANT:
Using option to store picture with transaction does NOT require to
show picture on main screen. It can be hidden.



uTouch User Manual

v1.6

19

8.3

Job codes

The
virtual keyboard

on the starting screen
, apart from the obvious numbers, offers four
more customizable buttons. Those buttons are used for job codes.

Job codes are the types of work absence which last only for a part of the day. This can be
private leave,
official leave, lunch break, visit to the doctor, etc.

as stated in the example below.



To set these up, just touch the appropriate box, enter needed text

and press Save button
.
When you exit settings screen, entered text will show in appropriate button
on the main screen.



uTouch User Manual

v1.6

20

8.4

Outputs and relays

On this screen it is possible to set up output and relay behavior.

First, you need to choose the
event

on the left side of the window, and then select the
output or relay which will activate if selected signal occur
s.

Saving is done automatically upon value
change. You don't have to press Save button.

Here is an example


how to set up Relay 1 to open for 5 seconds when the unit is tampered
with (tamper switch is activated):



You can set up output and relay behavio
r for following events:

SYS: Tamper

Tamper switch activation

SYS: Input 4

Activation of input 4

SYS: Input 3

Activation of input 3

SYS: Input 2

Activation of input 2

SYS: Input 1

Activation of input 1

SYS: Entry failed

Unsuccessful attempt to enter
system settings

SYS: Entry

System settings entered

SYS: Boot

Unit boot process finished

RDC: Verified 2

User verified with card on Wiegand input

RDC: Verified

User verified with card on built
-
in card reader

RDC: No access

User verified with card, but
access is denied

RDC: Error 2

Error reading card on Wiegand input

RDC: Error

Error reading card on built
-
in card reader

PIN: Verified

Access granted
for user
when using Pin only

PIN: No access

Invalid access
for user
when using Pin only

PIN: Error

User

does not exist / Non
-
existant Pin

FPM: Verified

User verified with enrolled finger

FPM: No access

Access denied for user using fingerprint

FPM: Error

Fingerprint not verified

There are more events like SYS: Alarm 1,2,3,4, SYS: Door forced, long, open,

etc. that can
occur if defined so in Events. (See section
12.2

of this manual)





uTouch User Manual

v1.6

21

9

D
ate and time

This screen allows you to set current date and time, along with time synchronization
parameters.

When setting a time zone, first you need to select a region,
and after that, in the field below,
select the exact location. For some locations, the region selection will be sufficient.




Let us show a couple of examples:

Wanted location

Selected region

Selected city

London, UK

Europe

London

Shanghai, China

Asia

Shanghai

New York, USA

America

New York

Sao Paolo, BRA

America

Sao Paolo

Hawaii

Pacific

Honolulu

Reykyavik, IS

Iceland

-


You can also set synchronization parameters. If you want to use automatic time
synchronization, there are two ways to do it.

One way is to select

BoneID Net time

,

which makes the unit synchronize its time with
BoneID Net application installed on a Windows computer.
The unit compares its time with BoneID
Net application
all the time
, and synchronization process is performed if
time difference is greater
than 15 seconds
.

This is way to synchronize the clock

if the unit is part of the network which does not
have access to Internet, or time servers are blocked.

Of course, this synchronization cannot be used if
the unit is working i
n standalone mode.

The other way to synchronize time on the unit is to set it to synchronize with one of the
numerous servers on the Internet. Simply select the
“Use time server”

option and enter the address
of the server. Default
well known time server

is

“time.nist.gov”.

Synchronization process is
performed every 8 hours.






uTouch User Manual

v1.6

22

10

Transactions

This screen shows the list of
last 300
transactions

which occurred on the unit
.

This is a great
way to quickly check unit events right on site without the need for a special software and a
computer.




Also, when you select a single transaction, you can see the details about that transaction.
Here you can also compare the pictures.








uTouch User Manual

v1.6

23

11

Network

This screen allows you to set up communication parameters.

Three

ways of communication are supported


Ethernet
, Mobile

connectivity
and
Remote
access
.

Ethernet is the default communication mode.


11.1

Ethernet

Ethernet
(LAN) communication is the

default communication protocol
, since nowadays it is
the most common one.





If you want to set up Ethernet communication, first choose network adapter in the
“Adapter”

filed. Value
“eth0


is the default one.
Depending on the model of the unit, you migh
t have
another
interface

"
wlan0
" representing Wi
-
Fi
.

If you choose Wi
-
Fi, small button for setting up Wi
-
Fi
connection will appear right next to

the

"
Adapter
" combo box.

Along with the value the MAC address is stated, in case it is needed for your network
administrator.

“Hostname”

is the name of the unit on the network. You can ping this unit from a network
PC, or connect to it from CN8Tool application by using this name.

“Server”

is the address or network name of the PC which will be
server to the unit. If

left
empty, you can
control
th
e unit from any PC

in the network
.
Only the IP address should be entered in
this field. Of course, this means that the server cannot have the address set up by DHCP


ie. it must
have static network address.


If network has a DHCP (Dynamic Host Configuration Protocol
) Server, with DHCP option
enabled, the unit will get its network address automa
tically.

But, if you connect the unit to a small network without DHCP, or you want to set up static
address out of DHCP scope, turn off
“Use DHCP
” option and enter the network parameters manually.

Also, if you are using VPN or DDNS connection, disable DHCP

and enter the network
parameters manually.

If DDNS (Dynamic DNS) service is used, full address must be entered.



Unless in demo

mode, Server should be entered for security reasons!




uTouch User Manual

v1.6

24

11.2

Mobile

connectivity

The unit also supports GPRS communication. If you want to use this way of communication,
just enable mobile network. For
this kind of communication, appropriate SIM card is needed.




If GPRS communication is needed, just tick the “Enable GPRS” button. Ethernet
communication will automatically be disabled.

For GPRS communication to be established, you also need to enter AP
N (Access Point Name),
u
sername and password for the GPRS connection which must be provided by mobile provider.

11.3

Remote access

You can also connect the unit to a network over Internet by using VPN

connection over PPTP
protocol, or by using a DDNS (Dynamic DNS) service.





If you want to establish
a VPN connection, simply

enable PPTP, enter address of the server
with which you need to establish VPN connection, and username and password provided by VPN
manager.

After entering needed parameters, switch to Ethernet section and set up the address for the
host PC.


If you want
to use DDNS Service, each unit needs to be registered and must have a Fully
Qualified Domain Name (for example cn8
-
demo.dyndns.com)
.

There are numerous services offering
DDNS functionality. Currently supported services are freedns.afraid.org, dyndns.org an
d no
-
ip.com.





uTouch User Manual

v1.6

25

11.3.1

Setting up

FreeDNS DDNS service


First, open the
http://freedns.org

and create your account. After logging in into account, visit
the link
http://freedns.afrai
d.org/api/

and click on the link to ASCII.

In the address bar, a link looking similar to this will show up:


cn8.test.com|31.45.217.161|http://freedns.afraid.org/dynamic/update.php
?
VU1UalM2MzF
VMVVBQUtaYkpPb0FBQUFUOjg3MzU5Nzg=


In the unit, enter the
token,

underlined
red text (after the update.php? string) as username,
and leave the password field empty.






IMPORTANT: If
for some reason you decide to use option "Rotate Authentication
Token" on FreeDNS web site, you will have to change it in every unit too
.



uTouch User Manual

v1.6

26

12

Tools

This screen
allows you to perform following maintenance procedures:



Hardware
-

set various settings related to hardware



Events
-

define input/output scenarios in access control environment



Manage
-

some maintenance functions you will rarely use



License



Until you
activate

your unit, it will be in demo mode (for testing

and
demonstrational

purposes only)
, as described in section 5.2
. This is required for normal
unit operation.



Anti
-
Passback



settings for anti
-
passback functionality
.



Reboot the
unit








uTouch User Manual

v1.6

27

12.1

Hardware

Here you can set various non standard hardware settings:

1.

Card reader

2.

Wiegand interface

3.

Input / output states from GPIO interface


12.1.1

Card reader

At this version of BoneID Embedded two types of cards are supported.

1.

Mifare Classic

2.

DESFire

EV1

Notice that below first row of combo boxes are two boxes containing hexadecimal key values
needed for successful card operation. Left box is KEY
-
A in Mifare mode, while in DESFire EV1 mode
left box is Master key and right box is Application key.

"
Chec
k
" means you can check with your card if settings are OK.

"
Set
" will reprogram card from default settings to your settings.

"
Reset
" will return card to factory state (for Mifare will set KEY
-
A to default for all selected
blocks, while for DESFire EV1 will
delete application and reset master key to default, if specified)




12.1.1.1

Mifare Classic

Mifare classic cards can be used in three different ways:

1.

Read only card ID

a.

Block and Template combo box must be on "
-
"

b.

KEY has no effect

2.

Read data from specific data bloc
k

a.

Choose Block from 1 to 62

b.

Leave Template on "
-
"

3.

Read template

a.

Leave block on "
-
"

b.

Chose one of offered block ranges. Template will use all blocks in selected
range.

c.

Templates can be added to cards from menu "Users" (section 7.2)






uTouch User Manual

v1.6

28

12.1.1.2

DESFire EV1

This type
of cards supports following data structure on card:

1.

File ID

represents number of file in your application. You can choose any file between
0 and 27. We recommend using 0 to 17

because if you are going to use templates on
card, they must follow in files imm
ediately after this file
.
D
ata
of this first file are
stored
in format aa
aabbc

a.

4 bytes containing value of some unique identification for current card.

b.

2 bytes containing value for card password (0
-

9999)

c.

1 byte using last 4 bits indicating number of temp
lates on card (0
-

10)

d.

Size of template files are 384 bytes, each. You can have up to 10 templates
on card.

2.

Key

is application key needed for reading needed files starting from
File ID
. That is
the key in
right key box
.

3.

Cryptography

is recommended
AES

4.

Comm
unication settings

is recommended
Cryptography

5.

Application ID

is number of application between 1 and 0xFFFFFF in hexadecimal


uTouch can be used not just for reading cards, but also to program cards. If you want to
program DESFire EV1 card and /or add temp
lates on card using uTouch, you must supply Master card
key (left key box).


In order to use DESFire EV1 cards with uTouch you must use option "Set" on every card you
want to use. That option will create file 7 bytes long (0x00000000000000).

Now you can assign that
card to some user using menu "Users" (section 7.2).


In contrast to Mifare cards, uTouch is not accepting DESFire EV1 card UID, but it writes users
pin into previously created 7 bytes long file. That means when you press "+" button

you won't be
able to see that card in list of cards, because the same value is written into card.


If you want to store users template on card, just use button "+ to card" in "Users" menu.
(section 7.2). We recommend storing up to two templates on card. A
lthough you can store 10
templates on card, it is not convenient because it takes more than 10 seconds to read all 10
templates from card.








IMPORTANT:

Supplying master card key and / or application card key to uTouch
can be security issue if device is n
ot configured properly! (access to uTouch must
be restricted from "Manage" menu)



uTouch User Manual

v1.6

29


12.1.2

Wiegand

Configure Wiegand options. uTouch has two wiegand inputs. Supports following wiegand
input
formats:

1.

26 (24 bits of data + star and stop bit)

2.

32 (30 bits of dat
a + start and stop bit)

3.

32e (32 bits of data only)

4.

34 (32 bit of data + start and stop bit)

5.

40 (40 bits of data only)

6.

42 (40 bits of data + start and stop bit)

7.

50 (48 bits of data + start and stop bit)

8.

56 (56 bits of data only)

9.

58 (56 bits of data + start
and stop bit)


Wiegand output is supported only as standard 26 bits Wiegand. For type of data transferred
through Wiegand, you can choose between card ID and user PIN.


12.1.3

Input / output states

Configure default v
alues of input,
output
and relay
states
.

By
default inputs 1 and 3 are at low state, while 2 and 4 are at high state. All outputs are at
low state.

12.2

Events

Events are powerful access control scenarios that may occur in various situations. uTouch has
predefined 5 most common scenarios. By selecting on
e of scenario from left side you will be able to
see definition. On the first picture we have selected scenario for unsuccessfu
l entry into uTouch
system menu
s.



Here is how to read
the
diagram:

On unsuccessful
attempt to enter system menus on device (
I
nitial event
)
, start timer. After 30
seconds
(
Timeout
)
uTouch will raise Alarm 1

(
Event after timeout
)
. If inside time window of 30
seconds successful system entry occurs

(
Timeout deactivation event
)
,
Alarm 1 (
Event after timeout
)
will
NOT

be raised.

It's
canceled.

Event after timeout can be connected to output or relay on uTouch. (
See section
8.4

of this
manual on
how to connect event to output.
)





uTouch User Manual

v1.6

30


Next predefined event is for situation when successful authentication occurs, person opens
the door controll
ed with relay from uTouch, but door remains open for more than 30 seconds.




Diagram explanation:

After
R
elay 1

is activated, door sensor on I
nput 3
(
GPI
)
detected that door is open. If door
remains open for more than
30 seconds
,
Door long

event is raised.

Door long event can be connected to output or relay if defined so in Settings menu (
section
8.4

of this manual
)


On following picture we have third possible scenario, when uTouch
receives

signal on input

and at the same time relay event o
ccurs. Common scenario for this is when you want to have control
of door even when person is exiting from protected area.





Diagram explanation:

Relay 1

event and
I
nput 4

activated
at the same time
.
Button

event is generated
immediately.

This one can be

tricky to understand, but always have in mind that Initial event that occurs at
the same time
when Input is activated,
must be initiated by some source. In this ca
se door button.
Connection of
Input 4

and
Relay 1

must be set in Settings menu (
section
8.4
)






uTouch User Manual

v1.6

31

Fourth picture represents typical scenario when door is open

by force. Meaning uTouch did
not open the door. They were opened by key or burglary.




Diagram explanation:

On door sensor at
Input 3

we wait for
1 second

(
!
) before
Door forced

alarm is raised. If inside
that
1 second

device detects event on
Input 4
,
Door forced

alarm will
NOT

be raised.


This scenario is connected
to scenario described above (third one). The logic is following:

1.

In situation where you want to have
total control
of door by uTouch, it is not enough
to control just entrance, but you must also control exit through the same door. That
means you have to have
Door button

that will open door on the other side.

2.


If
Door button

is pressed, we don't want to raise
Door force
d

event, but only
Button

event
.

3.

To avoid generation of
Door forced

event we added deactivation event that must
occur at last second after sensor on
Input 3

detects that door is open
.

4.

So if
Door button

was NOT pressed, but door is still open, that means it
was open by
force
.



Those explained scenarios are basics of events. You can change existing events, delete them
or add new one. There is no limit in number of Event scenarios.

What you have to take care of is not to define loopback events. Once you start
loopback
events the only way to stop them is to restart device.





uTouch User Manual

v1.6

32

12.3

Manage

This section is used in rare situations.






"
Initialize
"
-

reset device to factory state (deletes all user data and configuration
parameters)



"
Update from USB
"
-

to update from USB firstly you need to insert USB stick with
pkg.tar.zip package loaded into root of file system, and then press once this button. If
USB stick is recognized you will see list of files in combo box below. Select package and
click once m
ore on this button.



Spin box indicates volume of speaker.



"
Disable network access to uTouch
"
-

this disables access to file system of device
through telnet or FTP. Set this unchecked only if you need to enter file system. As soon
as you are finished, set t
his option to checked for security reasons.



Text below is debug log text which can indicate if there are some problems with file
system or network. Because of nature how this log file

is created, it will grow from
boot time to midnight and then it will be
erased to save space. If you need to diagnose
something using debug log, you must reboot device.






uTouch User Manual

v1.6

33

12.4

Anti
-
Passback

For advanced access control you will use anti
-
passback.



There are three
types

of anti
-
passback that uTouch can perform.

1.

Solo

2.

Card reader

3.

Second device


Input

defines which Wiegand input we are going to use for anti
-
passback. You can choose
one or both of Wiegand inputs.
Position

describes where is connected device positioned; on
entrance (
outside
) or exit (
inside
).

Latest state of user (in
or out) may be
valid

from 15 minutes to infinite time. After validity
period is elapsed, user is by default outside.


12.4.1

Solo

In Solo mode single device decides if user is coming in or going out.

This is usually used for
Time and Attendance purposes or

some b
asic wear access control
.

IN

transactions are recognized as
Verified

transaction types, while
OUT

transactions are of
Verified Out

types.


12.4.2

Card reader

This type defines that card reader is connected to uTouch. All logic operations are performed
inside uTou
ch. This is commonly used with uTouch without fingerprint module.

IN

transaction type is
RDC: Verified
, while
OUT

transaction types are
RDC: 1 Verified

or
RDC: 2 Verfied


12.4.3

Second device

In this mode you can connect second uTouch using one of Wiegand

inputs. Wiegand is used
for communication between two uTouch devices so both can have updated user statuses. In order to
use this option following must be performed:

1.

Both uTouch devices must have enabled one of Wiegand inputs and Wiegand output

2.

Wiegand ou
tput must be set to PIN

3.

Wiegand output from one device must be connected to Wiegand input on the other
device, and vice versa (you must have communication in both ways)

4.

One uTouch device must be configured as
Outside
, the othre one must be as
I
nside

IN

transactions are recognized as
Verified

transaction types, while
OUT

transactions are of
Verified Out

types. In this mode, each device records transactions separetly.