SY 780A - 760 and Sub Models
SY 780A - 760 and Sub Models
All rights reserved. to Synel MLL Payway Ltd. Reproduction or use, without express permission of editorial or pictorial content,
in any manner is prohibited. No patent liability is assumed with respect to the use of the information contained herein. While
every precaution has been taken in the preparation of this manual, Synel MLL Payway Ltd. assumes no responsibility for errors or
omissions. Neither is any liability assumed for damages resulting from the use of the information contained herein. Pictures in
this manual are for illustration purposes only. SY-785, SY-745 are sub-models of SY-780A, SY-765 is a sub-model of SY-760 are
trademarks of Synel MLL Payway Ltd. All trade names referenced herein are either trademarks or registered trademarks of their
respective companies.
2
SY780A_760 and Sub-models
Table of Contents
Chapter 1 - Introduction3
Chapter 2 -Technical Specifications ........................................................................................ 4
2.Additional Technical and Interface Specifications ............................................................. 4
2.1Options ......................................................................................................................... 5
2.2Physical characteristics ................................................................................................ 6
2.3Power Requirements .................................................................................................... 6
2.4Communication and configurations ............................................................................. 6
2.5Selection of the data entry function.............................................................................. 8
Chapter 3 -Apparatus............................................................................................................... 9
3.Front panel .......................................................................................................................... 9
3.Bottom connection sockets ............................................................................................... 10
3.Internal components.......................................................................................................... 11
3.1Battery back-up modules............................................................................................ 11
3.2Memory ...................................................................................................................... 11
3.3RS-232/485 internal Card........................................................................................... 11
Chapter 4 - Unpacking ........................................................................................................... 12
Chapter 5 - Installation .......................................................................................................... 13
5.Selecting the Terminal Location
(Bluetooth and Wi-FI) .............................................................................................................. 13
5.Mounting the terminal on a wall ....................................................................................... 13
5.Communication connections............................................................................................. 15
Chapter 6 - Setting up the Terminal (Technician Mode) .................................................... 16
6.Entering Technician Mode ............................................................................................. 16
6.Entering SETUP mode...................................................................................................... 16
6.Resetting the Wi-Fi card ................................................................................................... 25
6.Hex table ........................................................................................................................... 25
Chapter 7 - Host Computer Interfacing ............................................................................... 27
7.Installing communication cables....................................................................................... 28
7.Connecting your PC to the SY-65 ..................................................................................... 29
7.Connecting the SY-65 to a connection box....................................................................... 29
7.1If communication problems occur.............................................................................. 30
7.Making a multi-drop connection....................................................................................... 30
7.1Cable from the terminal to the connection box .......................................................... 31
7.terminal to RS-232 port direct connection........................................................................ 32
Chapter 8 - Maintenance........................................................................................................ 33
8.Physical Maintenance ....................................................................................................... 33
8.1General ....................................................................................................................... 33
8.2Badge Readers............................................................................................................ 33
8.3Fingerprint sensor cleaning and care.......................................................................... 33
Chapter 1 - Introduction
Synel SY-780A/760 terminals and their sub-models offer the broadest range of effective time &
attendance monitoring, shop floor control, job costing, and access control applications.
The terminals have four mediums of access input: Fingerprint identification and verification, magnetic, bar
code, and proximity readers.
The terminal features online/offline modes of operation and communicates in real-time interface using
TCP/IP protocol, which makes it a comprehensive interactive system. It provides online system
management of employee reports as well as communication of current employees' data.
Terminal communication programming employs Synel's user-friendly interface provided by SYncomm or
other advanced applications. This wide range of compatible communication applications supported enable
easily customizing the terminal to your unique requirements, while Synel's SAL compiler enables flexible
programming. Firmware can be upgraded remotely to facilitate maintenance.
The SY-780A/SY-760 terminals' mechanical design offers easy programming, while the back light and 32
character display allow quick and easy reading. The solid plastic casing and overall structure make
installation in an industrial environment simple and safe.The SY-780A has two sub-models, the SY-785
AND SY-745. The SY-785 is offered with a variety of reader options, and supports 9,000 fingerprint
templates for identification or verification purposes, with fast 1:1 and 1:N matching speed, while the SY-
745 is identical except for the number of function keys.
• Printer support
2.1 Options
• Fingerprint reader
• FPU-S (optical sensor)
• Template size 384 Bytes (reducible to 256 bytes)
• Template capacity 9,000 at 4MB flash
• Encryption 256 bit AES (fingerprint data protection)
• Resolution 500 (dpi)
• Image size 280 x 320 (pixel)
• FPU-S (Capacitance) sensor
• Template size 384 Bytes (reducible to 256 bytes)
• Template capacity 9,000 at 4MB flash
• Encryption 256 bit AES (fingerprint data protection)
• Resolution 500 (dpi)
• Image size 280 x 320 (pixel)
• Reader Types:
• Bar-code slot reader model (Codes: 128, 2/5, 3/9, UPC-EAN)
• Magnetic (Track I, Track II, Track III)
• Proximity reader (125 KHz)
• Mifare reader (13.56 MHz)
• Wiegand 26/27/34/36/37/44/48bit (as of version 6.201)
• 14400 bps internal modem
• full compatibility to: v.32bis, v.32, v.23, v.22, v.21, Bell 212A and Bell 103
to use a modem JP1 of the modem card must be in set to default state (1-2) see
“Jumpers” on page 47 for additional information about setting the jumpers.
• Net connection
• Ethernet (10BASE-T/100BASE-T or AUI)
• POE (Power over Ethernet)
For information for using POE see “Setting the terminal for Using POE (Power over
Ethernet)” on page 53.
• Wireless Wi Fi (802.11b)
• Bluetooth Class II
Depth 9.5 cm
Width 25 cm
Chapter 3 -Apparatus
This terminal series is enclosed in a rugged plastic molded casing and is secured to the wall using four
screws and a removable panel.
32 character
Biometric
Alarm fingerprint
ON
Function
Numerical
Internal
3. Front panel
32 character LCD
32 character LCD with a back light display is located in the upper part of the front panel. Two
arrow keys are located to the right of the display panel for line up and line down maneuvering.
Alarm light
located to the left of the display. The alarm light is an LED that lights up when:
Half of the memory has been used up
If the terminal is defined as “On-Line” and has lost communication with the host (no pooling
command has been received from the host for more then the value of parameter 8 in SYS
table)
The light blinks when the memory is full or when the terminal has not been programmed.
ON button
The ON button enables a 15 seconds (modifiable using program) manual operation.
Function keys
Eight function keys are located on the left, below the display, and are marked as follows: IN-
,OUT- , F1, F2, F3, F4, F5, and F6.
Numerical keyboard
A numerical keyboard of fourteen keys, including Return, Escape, and Clear is located in the
lower center of the front panel.
Biometric fingerprint reader
A Biometric fingerprint reader of FPU-s or Mv1200 type which supports thousands finger-
print templates for verification and identification. FPU is minutia based and uses the follow-
ing technology:
• Optical sensor
• Capacitance sensor
• Authentec sensor
Internal reader
Internal badge reader/bar code/proximity reader.
The socket openings for external connections reside at the bottom of the panel from left to right:
• Power
• Reader 1
• Reader 2
• I2C – I/O Extension (SY-785 only)
• Network
• Serial – Serial port connection for printer
• Host – RS-232/RS-485
3. Internal components
3.1 Battery back-up modules
The terminal has two back-up battery modules, one for the real time clock memory and the other for
operation during a power failure.
The standard memory back-up module is a lithium battery, which will keep the internal clock running and
the memory intact, for 30 days during a power failure.
Warning!
There is a risk of explosion if the lithium battery is replaced by an incompatible battery. You must
dispose of used batteries as per manufacturer’s instructions.
The back-up battery provided (in addition to the standard memory back-up) is a self-recharging system
which allows the terminal to be operated during a power failure. The battery provides power for one and a
half net hours of use. A shutdown timeout feature enables the terminal to operate for more extended
periods of time.
There are two types of timeout shutdowns:
• The firmware default timeout of 15 seconds. This option is used if the terminal has not been otherwise
programmed (to a different timeout), if the application specifying otherwise has not been loaded or if
there is an error in the application.
• The user defined timeout shutdown defined by programming the terminal using the SY protocol. Once
this option is uploaded to the terminal it is used at starting the terminal at Power On.
The default firmware battery shutdown timeout is 15 seconds. This timeout is used unless a different
timeout has been programed to the terminal using the Synel Protocol and uploaded to the terminal.
During a power failure, the user presses the battery key to activate the terminal. Data can then be entered
and stored in the terminal memory. The timeout will cause the terminal to shut down automatically after
the last use of the terminal, until the battery key is pressed again.
3.2 Memory
As a standard feature, the terminal contains a 512 Kb user memory providing storage for data from more
than 50,000 simple operations. This number depends on the length of the programming tables contained in
the memory, and the complexity of the collected data.
Chapter 4 - Unpacking
Check the box and contents for signs of damage that may have occurred during shipment.
Note: Don’t throw away the box or any of the packing materials.Contents.
The terminal package contains:
Chapter 5 - Installation
5. Selecting the Terminal Location
(Bluetooth and Wi-FI)
When selecting a place to install a terminal with wireless network communication (Bluetooth and Wi-FI) you need to
consider environmental factors that effect the connection. The optimal location is where:
Note: When selecting a place to install a terminal with wireless network communication (Bluetooth
and Wi-FI) you need to consider environmental factors that effect the connection. The optimal
location is where:
• The connection to the terminal is not blocked by walls or metal obstacles. This can be done by standing
at the location where the terminal is to be installed and viewing the area where the terminal is to have a
connection with and make sure that it is clear.
• The antennas should are positioned so that they are parallel to one another. If there are obstacles
between the terminals. the antennas should be positioned for the best clear connection between them.
For example, at floor level below the obstacle or at ceiling level above the obstacle, especially with
metal obstacles.
• For Bluetooth, use the terminal Quality option to check the connection quality. See “Setting up the
Terminal (Technician Mode)” on page 16.
• Do not install the terminal in a location where people gather and linger since they, too, block the
connection and also as to not expose them to radiation.
Step 2: Remove the back mounting panel by sliding it to the side and pulling it out.
E
A
F
C
D
A - Screw holes - for screwing the mounting panel in place.
B - Entrance for cables wired from the wall.
C - Clasps for holding cables in place.
D - For cable entering terminal from below.
E - security fastener.
F - Electric socket.
Step 3: Prepare the wall for mounting by placing the panel on the wall as a template
and mark the place for drilling the holes (A).
Step 4: Drill holes using a 6 mm. (1/4”) drill bit.
Note: Live wires in the vicinity may contain 115V or 220V.
Make sure not to drill into any live electric wires. Overlooking this warning may result in harm-
ful contact with an electrical current.
Step 5: The cables can be wired through the wall and positioned in the clasps (C) to
the bottom of the terminal where that are connected, or be wired directly from
the bottom of the terminal (D).
Step 6: Position the panel so that all of the wires are in place and screw the panel to
the wall.
Step 7: Wire all of the cables through the mounting panel and position the electric
socket in it’s place in the mounting panel (F).
Step 8: Connect the communication cables to the terminal.
Plug one end of the communication cable into the communication socket of the
terminal. If an internal modem has been added and the modem is used, plug
the RJ-45 connector of a standard telephone cable into the telephone line. Do
5. Communication connections
Step 1: Select a location for the connection box.
The box must be positioned where both the communication line and the termi-
nal can be connected to it. The terminal should be placed near the connection
box, and must be within the reach of the short RJ45 cable.
Step 2: Plug the communication cable from the terminal into the connection box.
Step 3: Wire an additional connection for Ethernet.
To enter Technician mode you can either swipe an authorized badge or press the up/down keys
simultaneously six times.
Use the Enter key to scroll between screens, and the line UP/DOWN keys for moving between
options within the selected screen.
To return to the previous screen use the C key. To exit technician mode double-click the Enter key.
Follow the steps in this chapter to set the terminal to your preferences
• N for no connection,
• B for 10/100Base
• D for Bluetooth card Class 1
• F 10/100Base for answering when the terminal has been addressed
• E for WIFI
Setting up Network Connection B or F = 10/100Base card:
Polling Y/N
For polling the user will be asked to choose between Y and N. Then, the terminal will send data to the
server as per the Polling sec. definition.
Polling Sec
Determines the frequency of data transmission to the SY-Server software. If your terminals are not in
online (query) mode, define the polling time as approximately 10-20 sec. Otherwise, raise polling time to
avoid network collisions. Use the numeric keys to define your required polling time.
MAC SEND (Y/N)
If you want to confirm sending your terminal’s network MAC address to the host. Then after exiting
technician mode the terminal will send the host a “Hardware configuration network” message informing it
of its MAC address, IP etc.
My MAC Address
Displays your MAC address on your terminal’s prompt. here your terminal’s MAC address will be
displayed.
My IP Address
Press line up/down to view the TCP/IP address of the terminal. Use the numeric keys to enter the IP
Address.
Gateway Address
Press line up/down and key-in the required gateway address.
Remote Address
Press line up/down to view the TCP/IP address of the personal computer on which the SY-Server runs. Use
the numeric keys.
Subnet Mask
The subnet mask is the network address plus the bits reserved for identifying the subnetwork. Use the
numeric keys to determine the terminal’s subnet mask affiliation within your local net.
My Port
TCP/IP enables connecting multiple applications via the same address. The port number selected here is
the application identification number used by the computer when communicating with the terminal. Synel
applications use the default port number = 3734 (a designated Synel port). However, you may change this
according to your specific needs.
Host Port
Synel applications use the default port number=3734. However, you may change this according to your
specific needs. Use the numeric keys to change the port number.
Disconct Sec
Disconnect seconds defines the number of waiting seconds before reverting to offline mode. Click 03 to
enable a fast disconnection.
DHCP (Y/N)
To automatically assign a dynamic IP address to your terminal choose Y.
Note: If no IP address was defined under My IP Address, then you must use DHCP, so the only option is
Y.
Network connection D = Bluetooth card Class 1:
The range of the card is up to 100m. It requires installation of the relevant drivers in your PC.
Set/Link Y/N:
Device name: SYNEL-xxxx, you must fill-in a unique number for this terminal
PIN code (Y/N): choose Y.
PIN code length (1-12): PIN CODE + Length of PIN CODE
PIN code: enter the pin code.
Discoverable: choose Y
Link:
Enables checking the communication between the terminal and the PC.
1. You must establish a connection via SYNCOMM
2. Than in your terminal under Link | Read Link Parm choose Y.
3. Quality of transmission will be displayed on your prompt as a
progress bar. As per the scale status you can relocate/readjust your terminals location.
Setting the WI Fi network connection is done by entering the parameters listed below to the terminal.
Some of the parameters are entered in HEX form. To enter the parameters in their HEX form locate the
needed character in the table below and enter it’s corresponding Hex value in the terminal. See “Hex
table” on page 25
The following diagram in the next page maps out technician mode setup for WIFI work flow.
After setting Authentication and Encryption you get content sensitive settings based on your previous
settings.
You can click the diagram nodes to jump to their explanation below.
Enter Password
Network settings
Password Reset Exit
A B C D F
Keyboard type SSID Encryption
Setting up the Terminal (Technician Mode)
CCMP Yes No
Gateway Address WEP Auth
B
TKIP Password
Remote Address WPA PSK
E
D
Subnet Mask WPA Auth
Context sensitive to Authentication and Encryption settings
E
LEAP WEP-Keys Pre-shared (PSK) User/Password
My Port
WEP Security PSK
Host Port User:
- NO Apha
<new user name>
- 64 Hex
Disconct Sec -OK
A - 128 Pswd:
WEP Key Default <new password>
DHCP
- Key1 -OK
- OK
• Click on the nodes to jump to their explanation - Key2
below. - OK
SY780A_760 and Sub-models
18
-... F
(up to key 4)
Press Enter key to
exit
Setting up the Terminal (Technician Mode) SY780A_760 and Sub-models
MAC
Back to WIFI diagram
MAC (Y/N) - If you want to confirm sending your terminal’s network MAC address to the host.
Then after exiting technician mode the terminal will send the host a “Hardware configuration
network” message informing it of its MAC address, IP etc.
Polling
Back to WIFI diagram
Polling (Y/N) -For polling the user will be asked to choose between Y and N. Then, the terminal
will send data to the server as per the Polling sec. definition.
Set NIC
Sets the content sensitive Network settings for WIFI.
TCP/IP Settings
Specifies the TCP/IP settings. Set by drilling down and selecting the parameters:
My MAC
Back to WIFI diagram
Confirms sending the terminal network MAC address to the host. After exiting
technician mode the terminal sends the host a “Hardware configuration network”
message informing it of its MAC address, IP etc.
My IP Address
Back to WIFI diagram
Press line up/down to view the TCP/IP address of the terminal. Use the numeric
keys to enter the IP Address.
Gateway Address
Back to WIFI diagram
Press line up/down and key-in the required gateway address.
Remote Address
Back to WIFI diagram
Press line up/down to view the TCP/IP address of the personal computer on which
the SY-Server runs. Use the numeric keys.
Subnet Mask
Back to WIFI diagram
The subnet mask is the network address plus the bits reserved for identifying the
subnetwork. Use the numeric keys to determine the terminal’s subnet mask affilia-
tion within your local net.
My Port
Back to WIFI diagram
enables connecting multiple applications via the same address. The port number
selected here is the application identification number used by the computer when
communicating with the terminal. Synel applications use the default port number =
3734 (a designated Synel port). However, you may change this according to your
specific needs.
Host Port
Back to WIFI diagram
Synel applications use the default port number=3734. However, you may change
this according to your specific needs. Use the numeric keys to change the port
number.
Disconct Sec
Back to WIFI diagram
Disconnect seconds defines the number of waiting seconds before reverting to
offline mode. Click 03 to enable a fast disconnection.
DHCP
Back to WIFI diagram
To automatically assign a dynamic IP address to your terminal choose Y.
Note: If no IP address is defined under My IP Address, you must use DHCP.
Keyboard type
Specifies if the input keyboard is an Alphanumeric or Hexidecimal
keyboard.
SSID
Back to WIFI diagram
(Service Set Identifier) - Entered in HEX form. Up to 26 characters.
The sequence of characters identifying the wireless local area network, allowing the stations to
connect to a specific network when multiple independent networks operate in the same physical
area.
Authentication
Back to WIFI diagram
Specifies the method of authentication. Set by drilling down and selecting the parameters:
Open
Open (Entered in HEX form.)
WiFi WEP
None
64 bit
128 bit
Shared Key
Back to WIFI diagram
Set by drilling down and selecting the parameters entered in HEX form.
Open
When chosen the following is later
WEP Security
choose:
None
64 bit (total allowed characters: in Hex 10 in Ascii 5)
128 bit (total allowed characters: Hex 26 in Ascii 13)
WEP Key
Specify the number of the key in the sequence of 4 keys.
WEP Auth
Back to WIFI diagram
WEP 802.1x authorization is set by drilling down and selecting the parameters.
Entered in HEX form.
WEP
Up to 26 characters.
User Name
User Name
User Password
Reset
Enter Password
Back to WIFI diagram
Used to change the password.
Password
Enter the current password. The default password is 0.
Enter Password
Enter the new password
Reset
Returns settings to the factory default You may need to wait a few seconds while this
happens. A “Please wait...” message appears.
User Field
Specify 4 digits which characterize the terminal. This data can also be sent to the terminal via a
system table. This value is sent to the host when the Status command is used.
FPU - Setting the fingerprint unit mode
Select the FPU Type of V- verify, I - identify U-universal S- FPU-S for version 35xx.
Specify the number of fingerprint templates.
Terminal mode
Specify whether the terminal works in master or slave mode.
Global threshold
Specify the global threshold level as: '0' -Very Low, '1' - Low, '2' - Medium, '3' - High, '4' -
Very High.
Enrollment mode
Set the enroll mode as follows:
0 – One Time - supported by all units
1 – Two Times FPU-S units only
A – Two Templates FPU-S units only
Where:
One time – Enrolls a scanned fingerprint to a fingerprint template.
Two times – Scans the fingerprint twice. The two images are compared to each other
and verified. If the fingerprint images do not match the user is rejected. If they match
the better quality fingerprint is enrolled in the template.
Two templates – Scans the user finger twice and saves the each fingerprint scan as a
template. The user has two templates stored. Then, each time the user is verified, the
module can decide whether to replace the existing template with a new one. This
update reflects the dynamic changes in the skin of the user's finger.
One time Two times Two templates
Scan 1 2 2
Save template 1 1 2
Modification - - +
Exit
Back to WIFI diagram
After setting the previous parameters you get the following options:
Save Param - Saves your specified setting.
Exit - Exits Technician mode.
Set - Returns to the beginning of the Technician mode parameters enabling you to change or
reset parameters.
Additional - Displays additional parameters according to the parameters selected before, such
as Network parameters if TCP or UDP, or Network mode of Server or Client.
On exiting Technician mode, all of the settings are saved into the terminals Flash protected
memory. In case of memory crash the terminal reloads the settings from the flash
memory (does not revert to the factory default), which enables quick communi-
cation after formatting the memory.
Once the technician mode settings are entered into the system and the user exits the Technician
menu, the settings are automatically saved to the terminals Flash memory. If a
“Mem Crash” occurs, the terminal loads the parameters saved in the Flash mem-
ory.
6. Hex table
In the terminal HEX alphabetic values are entered using the F keys. In the following table, characters
which have alphabetic values are listed with the F keys that are used to enter them in the terminal.
Char HEX Char HEX Char HEX Char HEX Char HEX Char HEX
0 30 @ 40 P 50 ` 60 p 70
! 21 1 31 A 41 Q 51 a 61 q 71
“ 22 2 32 B 42 R 52 b 62 r 72
# 23 3 33 C 43 S 53 c 63 s 73
$ 24 4 34 D 44 T 54 d 64 t 74
% 25 5 35 E 45 U 55 e 65 u 75
& 26 6 36 F 46 V 56 f 66 v 76
‘ 27 7 37 G 47 W 57 g 67 w 77
( 28 8 38 H 48 X 58 h 68 x 78
) 29 9 39 I 49 Y 59 i 69 y 79
* 2 F1 : 3 F1 J 4 F1 Z 5 F1 j 6 F1 z 7 F1
+ 2 F2 ; 3 F2 K 4 F2 [ 5 F2 k 6 F2 { 7 F2
, 2 F3 < 3 F3 L 4 F3 \ 5 F3 l 6 F3 | 7 F3
- 2 F4 = 3 F4 M 4 F4 ] 5 F4 m 6 F4 } 7 F4
. 2 F5 > 3 F5 N 4 F5 ^ 5 F5 n 6 F5 ~ 7 F5
/ 2 F6 ? 3 F6 O 4 F6 _ 5 F6 o 6 F6 7 F6
Most computers use DTE type connectors on their RS-232 ports. The terminal is equipped with an RJ45
(telephone jack) connector. Therefore, you will need a connection box intermediating the terminal and the
host.
Most computers use DTE type connectors on their RS-232 ports. The terminal is equipped with an RJ45
you will need a connection box intermediating the terminal and the host.
All terminals and their connection boxes are connected in exactly the same way, regardless of their
terminal IDs. The multi-drop line may be created in one of two ways: creating a chain of connection boxes,
using a junction box.
Method 1 Method 2
4 (Gnd) (Gnd) 4
5 (TxD) (TxD) 5
6 (RxD (RxD 6
7 7
8 8
The RJ45 connector on the terminal’s side must be a short (12.35mm) RJ45 connector to enable the
terminal connector case that hides the connectors to close.
RxD
GND TxD
Chapter 8 - Maintenance
This section gives instructions for maintaining good working order for the terminal. The issues described
are:
• Physical Maintenance
• Calibrating the Real Time Clock (RTC)
• How to cause the memory to crash
• Formatting the memory if a crash occurs
• Fingerprint sensor cleaning and care
8. Physical Maintenance
8.1 General
Once every six months:
• Check and tighten the screws in the terminal such as the screws holding the power cable to the CPU
card.
• Verify that all components connected to the sockets are well adjusted.
Alcohol is the preferred cleaning material because it dissolves oily residue and evaporates quickly.
The use of nylon brushes or scouring pads, abrasive cleaning fluids or powders, or steel wool is not
recommended.
For Optic Sensors
Use a clean cotton cloth or tissue paper dampened by water or window cleaning solution to remove oily
deposits.
• Do not place the fingerprint sensor close to a heat source, such as a radiator or hot plate.
• Do not subject the fingerprint sensor to heavy shocks/vibrations.
• Do not allow the sensor to come in contact with metallic objects.
Conditions.
The sensor can be stored in temperatures ranging from –60C to +150C, and can operate in
temperatures ranging from 0C to + 60C.
Sensors should not be exposed to rain or excessive humidity. A sensor can operate within a
range of 5% to 95% humidity (non-condensed).
Other than for cleaning, as instructed above in Cleaning for Fingerprint Sensors, do not
bring the sensor in contact with and liquids.
Authentec Sensors
Authentec sensors can be damaged by a discharge of static electricity from a human body.
However, the fingerprint sensor is typically encircled by conductive plastic, which is
connected, to a ground plane. You should always touch the conductive plastic before
touching the sensor in order to safely discharge any static electricity that may be present on
your skin or clothing.
Electric system
• Check the voltage of the UPS battery. If it has less than 7 volts, the batteries need to be changed.
• Visually check the battery for leakage.
Clean all of the electrical contacts inside the terminal with a contact cleaner.
Checking Backup battery:
Making sure that the backup battery is in good condition, according to the following steps:
1. Collect and clear all the data stored in the terminal.
2. Open the terminal.
3. Remove jumper JP7.
4. Check the voltage of the memory back-up battery and make sure it is between 2.8V and 3.1V.
5. Replace jumper JP7.
This operation must be performed by qualified and authorized personnel only! When
working with an open unit, make sure to unplug the unit wherever the instructions call for it.
Take extreme care during the stages where the terminal is plugged into a power source.
Failure to heed this warning may result in harmful contact with electrical current.
If your terminal gains or loses time, you will need to calibrate it using a Time Counter unit, which has at
least 5 places to the right of the decimal point (100,000ths of a millisecond).
1. Unplug the terminal and make sure that it is OFF. The backup battery automatically supplies power
for approximately 15 seconds.
2. Unscrew and remove the front panel.
3. Remove the JP12 jumper. This disables the Watchdog utility.
4. Plug the terminal into a power source and enter the technician mode.
5. Make sure that the Time Counter is unplugged.
6. Connect the ground of the Time Counter unit to the ground pin at TP2 of the terminal’s CPU board.
7. Reposition JP13 to 2-3 (calibration).
8. Connect the input of the Time Counter unit to the pin in JP13 marked jumper 2.
9. Plug the Time Counter unit into a power source.
10. Set the Time Counter unit to test the period.
11. Press once on Enter; the message "Adjust RTC N/Y" appears.
12. Press once on Enter, for N (no). Use line up/down to scroll when selecting the Y (yes) option.
13. Calibrate the RTC of the terminal to 3.90625 milliseconds + 0.00003 by turning the screw on the
variable capacitor at C18.
14. Disconnect Jumper 2 pin at JP13.
15. Replace the JP13 jumper to 1-2 position.
16. Disconnect the connector from TP2 of the terminal’s CPU board.
17. Return the JP12 jumper to re-enable the Watchdog utility.
18. Unplug the terminal.
19. Replace the front panel.
20. Unplug the Time Counter.
This operation must be performed by qualified and authorized personnel only! When
working with an open unit, make sure to unplug the unit wherever the instructions call for it.
Take extreme care during the stages where the terminal is plugged into a power source.
Failure to heed this warning may result in harmful contact with electrical current.
DISPLAY CARD
Socket - P15
PIN number Signal Description
P15-1 NC
P15-2 -TRX1 RS-485
P15-3 +TRX1 RS-485
P15-4 RXD1 RS-232
P15-5 TXD1 RS-232
P15-6 PR-Busy TTL
Fingerprint
Connector P12 (Power)
PIN number Signal Description
P12-1 VCC
P12-2 GND
Connector P13
PIN number Signal Description
P13-1 T1 Out RS-232
P13-2 GND
P13-3 R1 Input RS-232
Connector P20
PIN number Signal Description
P20-1 CTSB/ CTSB- Clear To Send (TTL) for ISO-Modem
#INT-S2MI #INT-S2MI - Optional for SY-795 for managing graphic LCD board
The option to use is selected in JP107.
P20-2 #DSR-WIFI Optional for WIFI. When using this option JP125 needs to be ON.
Connector P4
PIN number Signal Description
P4-1 BAT+ Rechargeable BAT (+)
P4-2 BAT- Rechargeable BAT (-)
Connector PL1
PIN number Signal Description
Appendix C - Jumpers
PSD Programming
No. Jumper Description Value Default/Note
5 JP6 Jtag OPEN - Normal work OPEN
programming CLOSED - Programming
Miscellaneous
No. Jumper Description Value Default/Note
6 JP12 Watch Dog in OPEN WDI Disable CLOSED
CLOSED - Normal WORK
7 JP13 RTC 1-2 Normal work Normal work
2-3 Calibration
8 JP7 Battery OPEN Battery OFF CLOSED
CLOSED Battery ON
9 JP18 Reader 1 type Wiegand - CLOSED JP30 must be in (1-2) &
Other readers - OPEN JP31 must be CLOSED
10 JP19 Reader 2 type Wiegand - CLOSED JP30 must be in (1-2) &
Other readers - OPEN JP31 must be CLOSED
11 JP30/JP31 Reader selection JP30 [1-2]
JP31 [CLOSED]
12 JP5 Tamper switch [1-2] - Enabled
[2-3] - Disabled
13 JP21 Connect (R2 Input) to [1-2] - External FPU
the printer busy or to [2-3] - Printer busy
the external FPU
14 JP11 VCC CLOSED - VCC ON
OPEN - VCC OFF
15 JP10 Testing current CLOSED - Normal work
charging OPEN - Test current
16 JP14/15/16/ VART selection (1) (1-2)/(1-2)/(2-3)/(2-3) Default = value 1
17 u.CPU--> Host
u.URT --> Printer
(2) (2-3)/(2-3)/(1-2)/(1-2)
u.CPU--> Printer
u.URT --> Host
17 JP104 POE CLOSED when the POE Default OPEN
option is used
18 JP105 WIFI CLOSED when the WIFI Default OPEN
option is used
19 JP107 SY-795/Modem (1-2) managing the SY-795 Default OPEN
graphic LCD board.
(2-3) CTSB for modem
20 JP106 Rechargable battery for future use Default OPEN
Scanning an Image
When the FPU properly reads a fingerprint, it looks for image quality and fingerprint content. When a raw
image is collected from the sensor during enrollment, for verification or identification, the FPU searches
for the fingerprint core.
Content scores are based on the amount of unambiguous data in the region of the core. The higher the
content, the greater the degree of useful information.
See Using Content and Quality for Enrollments for a thorough description of content.
Quality scores are based on how well the ridge pattern is defined within the image. For best image quality,
be sure that the sensor window is clean of residue, or other material that can block the FPU from the best
fingerprint view. Once the image is scanned, the FPU creates and stores the resulting fingerprint template.
Verification is the operation of entering a PIN #, requesting the user to place their finger on the FPU,
scanning the finger, comparing the current scan against stored fingerprint templates for that user, and then
notification of a successful validation or a failure.
Identification is the operation of requesting the user to place their finger on the FPU, scanning the finger,
comparing the current scan against all stored fingerprint templates (regardless of user). If the user is in the
database, identifying the user. Identification is only available on a searching FPU units.
Fingerprint Template is the data stored on the FPU that mathematically represents the pattern of an
enrolled fingerprint. This data is not the raw image of the fingerprint, but the result of processing the raw
image through a unique algorithmic process, preparing the data for later comparisons, and compressing the
data for maximum storage. An image of the uncompressed template data does resemble the raw image, but
whereas a raw image is 90K bytes, the compressed template is only around 400 bytes.
Fingerprint Core is the term used to describe distinguishing print characteristics usually found in the area
of the print where the topography shows the tightest curvature. Although the entire fingerprint has
significant data, the “core” is the most data- intensive area and therefore very important.
Proper Finger Placement
The basics for successful operation of the FPU are important.
System performance improves dramatically with consistent finger placement. It is important to make sure
that the position of the finger allows the FPU to record the unique features of the print. Follow the steps
Common mistakes
Correct finger placement is a significant component for reliable fingerprint imaging. The following figures
illustrate some common mistakes to avoid.
• Sliding the fingertip into place instead of lowering it onto the sensor will
cause distortion of the fingerprint and will degrade image quality. Keep the
• Rotating the finger into position will also cause distortion of the fingerprint,
• Placing your finger as if punching a button will not provide adequate
information and will degrade system performance. Proper sensor height and
• Positioning the finger to one side and leaving a portion of the sensor exposed
will degrade image quality. This figure demonstrates how poor finger
placement degrades the image of the fingerprint. Notice how the core is well
off- centre and the sensor is not fully covered.
• Not using the Ridge- Lock may cause placing the finger in an incorrect
position. This figure illustrates the user neglecting the Ridge- Lock and
resulting fingerprint image. Notice how the core is well below centre and the
sensor is not fully covered.
PEO (Power over Ethernet) is a standard IEEE 802.3af. The standard provides the capability to deliver
both power and data over standard Ethernet cabling. The standard provides 48 volts DC over two pairs of a
four-pair cable at a maximum current of 350 mA for a maximum load power of 15.4 watts, although, after
counting losses, only about 13 watts are available. 802.3af -(PSEs) –”Power Source Equipments” can
deliver their power on two ways, the first is over the spare lines and the second is over the data lines. The
power will be connected to the (PDs) – “Powered Devices” just after an authentication process against the
PSEs passed and the maximum power consumption of the PDs that can be connected to these PSEs must
be less than ~12.9 - ~13Watt.
E. Using POE
When using POE on the terminal you will need to make the following changes:
CPU Board REV-D:
JP104 should be shorted / P101 should have 7 PINs.
Network cars type B:
V2 should be compatible with POE.
C6/R7/8/9/10 should be removed
P2 Should be 7 PIN
JP13 should be on (1-2)
Net Card Type F:
R1/R2 should be removed / P11 should be mounted /
P2 should have 7 PINs / JP13 should be on (1-2).
For more details please refer to the BOM & scheme file of these two boards.
When using POE use the additional POE-DC2DC board using the Ag90120-S DC2DC module. The
maximum output power is 9Watt, this means that the over-all power consumption of the POE-terminal
with this module is less than 9Watt. Other modules can be used if you need more power.
Terminal Programming
Programming Flow Chart
Syste
Firmware
Progra
Weekly Message
Fun Fun
Input Test
Data
Valid Emp Non Valid
There is an inter-dependency between the different *.jpr tables built by the SAL program which are the
body of the application.
SYncomm builds the tables as per SAL requirements. On the next page please find a brief outline of the
role of these tables.
The correct and logical order for building a project is to begin from the bottom of the flow chart as follows:
Mandatory
• Input
• Test
• Transaction (Test + Input)
• General (Transaction to Function Key)
• Weekly (General to day of week)
Optional
• Employee, Valid, Non valid - optional
• Messages
• Time Zone (to be linked to an employee)
• Printer notes (i.e.: for meal labels)
• Day Light Saving Time
• System
• Scheduler- for relay/modem activated function keys
Messages
Fixed system messages. These messages can be edited or re-written.
Input
Enables defining up to 4 Input sources that typify a reader/sensor. Input sources are as follows:
Magnetic track 1 (ANSI) Requires swiping of an employee card
Magnetic track 2 (ANSI) Requires swiping of an employee card
Proximity Requires placing the card upto a distance of 6-8 cm from the
reader
Touch memory
Bar code 3/9
Bar code 2/5
Bar code 128 A laser read identification code.
Codabar
Keyboard Using the terminals interface key-in card number.
Sensor 1
Sensor 2 A sensor can activate either a buzzer or a LED.
Date Validation of date format (input mask)
Time Validation of hour format (input mask)
Scroll in list A list to be displayed on the clock prompt from which the user
can choose the relevant data (without card) and scroll using the
arrow key.
Printer ready Printer signalling input.
FPU Auto-identification Enables defining fingerprint identification only (no card fixed 10
char.).
Valid
An list of IDs of authorized cards. See screen in the page below:
Please note that the IDs indicated in the Employee (see “Employees” on page 57) table and the valid table
must be identical!
The Valid screen is used for defining and determining access levels for each employee:
Step 1: Fill-in the Valid table header row:
Header Table name
ID
Record size These constitute the header (structure) of the valid
table. The data will be filled-in on the right.
Type
Key length
Step 2: On the right fill-in all authorized employee numbers.
Step 3: On the bottom the user can allocate permitted terminals to each employee.
The Valid table ID SHOULD NOT be identical to the Employee table ID.
Not Valid
Parameters identical to those of the valid table but used for denying access to specified employee cards.
Employees
Here you can assign an employee list/employee to a terminal. More than one authorized employee table
1
3
2 4
5
6
1 Employee table header (name). It is possible to import various employee tables from an external text file.
2 The updated terminal list into which updated employee files will be sent.
3 Employee authorized list layout. Here, employees can also be added manually!
4 A list of the terminals to which authorized employees can be assigned and thus allowed access.
5 Additional features that can be used or disregarded:
Create message table/Create scheduler table/Create total hours table- these are employee specific messag
displayed for the eyes of that employee only!
Add employee name/Assign Terminals/Security group - these fields that can optionally be used in this scree
6 A series of editing buttons and a few functional buttons as follows:
Fingerprint - Enables fingerprint management: enrolling a fingerprint, determining the threshold etc. For furth
refer to “Biometric concepts” on page 49.
Time Zone Groups - Defines a time-frame in which access is permitted. Time Zones are defined day types for
year.
FPU management
Enables enrolling employee fingerprint (using PRintX/H which is a device connected to your PC’s COMM
port) and setting-up fingerprint security threshold per template. For further information refer to “Biometric
concepts” on page 49.
Printer Notes
This feature is used for printing labels (For example.: meals). First you must go to Set-up | Program
Configuration | Printer and define the printer type you are using in your organization. There are several
predefined default printer definitions. If none match your specific printer brand, you should define printer
parameters.
Test
This is a mini set-up table for activities and terms to be performed on the transactions. It is possible to
perform one activity or a sequence of several activities. Some of the relatively simple activities are: saving
transactions, employee access/other validation, displaying specific timed messages. Some of the more
complex activities are: calculation activities (sum, subtract, multiply, compare etc.), variable to variable,
inter-buffer activities.
The Test table is divided into 2 parts:
1. The header is the test name, it is recommended that the given name will portray the purpose of the test,
see above screen. A new header can be created by either clicking the New button or the key.
2. The base part is where actual definitions are set, when double clicking a row the following screen appear
:
Step 1: Fill-in a test name and number.
Step 2: The templates are comprised of different activities:
Most templates are divided into 3 parts:
Operation- A check to be performed, different from template to template.
OK- Further to the operation how to confirm or what other activities will follow.
Similar for most templates.
Fail- Further to the operation how to indicate that the operation has failed. Sim-
Display message Enables choosing a constant message from the system messages list.
Display end Enables displaying variables of input data.
Relay Enables activating a relay.
Buzzer alert Enables activating an alert buzzer.
Buzzer OK Enables activating an OK buzzer.
Buzzer error Enables activating an error buzzer.
Wait Waiting time between transactions.
Write last transaction Transmits data that was stored in a designated directory, to be displayed a later
stage.
Store transaction Determine what data will be stored.
Write transaction Transmits data that was stored to the terminal’s memory. Cannot be displayed.
Go to module Enables a cyclic flow to the same transaction.
End The terminal reverts to the defined default function.
Buffers: What data will be displayed on the terminal’s prompt:
Defines the input length limitation (KB, card number, identification ID etc.) and the
offset of that input number.
Check value Enables comparing field variables.
Query A query is sent to the software that is performing an online scan - using SYServer.
Write last Enables saving the last transaction setup in a temporary file for later display as t he
transaction employee’s last transaction.
Store transaction Enables adding transaction data to a buffer.
Write transaction Enables saving all transaction steps (see Transaction folder) in the terminal’s
memory. Later this data can be collected by the host.
Transaction
In this screen the user can define a multi-step transaction, combining Test, Input and prompt message
definitions. The screen shot below demonstrates the enrolment procedure that requires a supervisor card to
be swiped first.
General
Combines the transaction definitions with a function key on the terminal’s panel
.
Define all hardware parameters:
Key function- Determine function allocation to terminal keys.
Display parameters- What error message will be displayed on the prompt. Also you must choose a date/
Algorithm 3:
Input: 1 (Even Parity bit) - 10 bits - 20 bits - 1 (Odd Parity bit)
Output - Card number 6 bytes (only 20 bits are decoded)
Algorithm 4:
Input: 1 (Even Parity bit) - 6 bits - 24 bits - 1 (Odd Parity bit)
Output - Card number 8 bytes (only 24 bits are decoded)
33 bit
Algorithm 0
Input: 1 (Even Parity bit) - 7 bits - 24 bits - 1 (Odd Parity bit)
Output - Facility code 2 bytes (7 bits)
Card Number 8 bytes (24 bits)
Algorithm 1
Input: 1 (Even Parity bit) - 10 bits - 21 bits - 1 (Odd Parity bit)
Output - Facility code 4 bytes (10 bits)
Card Number 7 bytes (21 bits)
Algorithm 2
Input: 1 (Do not check parity bit) - 10 bits - 21 bits - 1 (Do not check parity bit)
Output - Facility code 4 bytes (10 bits)
Card Number 7 bytes (21 bits)
36 bit
Algorithm 4
Input: 1 (Even Parity bit) - 6 bits - 12 bits - 16 bits - 1 (Odd Parity bit)
Output - Factory code 2 bytes (6 bits)
Facility code 4 bytes (12 bits)
Card number 5 bytes (16 bits)
69