BioStar 2 Administrator Guide 2.9.7 en 240823.1
BioStar 2 Administrator Guide 2.9.7 en 240823.1
ADMINISTRATOR GUIDE
Version 2.9.7
English
EN 102.00.BS2
Contents
Versions 4
Chapter 2 Installation 47
Minimum System Requirements 48
Installing BioStar 2 49
Chapter 3 Login 59
Changing server status of BioStar 2 61
Upgrading Firmware 85
Information 88
Network 89
Authentication 93
Advanced Settings 101
Thermal & Mask 111
SIP Intercom 114
RTSP 117
DM-20 118
2
Contents
OM-120 119
IM-120 119
CoreStation 122
Wiegand Device 128
Wireless Door Lock 129
Chapter 7 Door 130
Adding and Managing Door Groups 131
Information 132
Configuration 133
Option 134
Anti-passback 136
Timed Anti PassBack 137
Alarm 137
Editing Doors 138
Information 141
Detail 141
Option 143
Alarm 144
Editing Elevators 145
3
Contents
Enroll Face 166
Enroll Visual Face 168
Enroll Card 174
Enroll Mobile Access Card 182
Enroll QR/Barcode 187
1:1 Security Level 189
Biometric Credential Sync 190
Transferring User Information to Devices 190
4
Contents
Adding NVRs 229
Report 248
Settings 273
Card 280
Wiegand 281
Smart / Mobile Card 282
5
Contents
Server 285
Schedules 293
Alert 294
HTTPS 296
Cloud 296
Video 302
Security 304
License 325
6
1 BioStar 2 Overview
BioStar 2 is a web-based access control management system which is OS-independent and can be used
anywhere.
BioStar 2 expands its versatility even further with its support for access control and time & attendance
module, API, Mobile App, and Device SDK solutions.
License
Versions
Access Control
Items Details
1
1 BioStar 2 Overview
Items Details
Time Attendance
Items Details
Note
License
You can use more features by registering the activation key after purchasing the BioStar 2 license.
2
1 BioStar 2 Overview
For more information on license activation, refer to License.
Note
Note
3
1 BioStar 2 Overview
Items Starter (Free) Video License
Versions
BioStar 2.9.7
Category Functionality
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.10.2 or later
BioStation A2: 1.9.3 or later
BioStation L2: 1.6.1 or later
BioEntry W2: 1.8.0 or later
FaceStation 2: 1.5.4 or later
CoreStation: 1.7.1 or later
BioEntry P2: 1.5.2 or later
BioEntry R2: 1.4.1 or later
BioLite N2: 1.6.1 or later
XPass D2: 1.3.2 or later
XPass D2 (Rev 2): 1.7.2 or later
FaceLite: 1.3.4 or later
4
1 BioStar 2 Overview
XPass 2: 1.4.1 or later
FaceStation F2: 2.2.0 or later
X-Station 2: 1.3.0 or later
OM-120: 1.2.1 or later
Secure I/O 2: 1.3.1 or later
DM-20: 1.2.2 or later
IM-120: 1.0.0 or later
BioStation 3: 1.3.0 or later
BioStation 2a: 1.1.1 or later
BioEntry W3: 1.0.0 or later
BioStar 2.9.6
Category Functionality
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.10.1 or later
BioStation A2: 1.9.3 or later
BioStation L2: 1.6.1 or later
BioEntry W2: 1.8.0 or later
FaceStation 2: 1.5.4 or later
CoreStation: 1.7.1 or later
BioEntry P2: 1.5.1 or later
BioEntry R2: 1.4.1 or later
BioLite N2: 1.6.0 or later
XPass D2: 1.3.2 or later
XPass D2 (Rev 2): 1.7.2 or later
5
1 BioStar 2 Overview
FaceLite: 1.3.4 or later
XPass 2: 1.4.1 or later
FaceStation F2: 2.1.4 or later
X-Station 2: 1.3.0 or later
OM-120: 1.2.1 or later
Secure I/O 2: 1.3.1 or later
DM-20: 1.2.2 or later
IM-120: 1.0.0 or later
BioStation 3: 1.2.1 or later
BioStation 2a: 1.1.1 or later
BioStar 2.9.5
Category Functionality
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.10.1 or later
BioStation A2: 1.9.1 or later
BioStation L2: 1.6.1 or later
BioEntry W2: 1.8.0 or later
FaceStation 2: 1.5.4 or later
CoreStation: 1.6.1 or later
BioEntry P2: 1.5.1 or later
BioEntry R2: 1.4.1 or later
BioLite N2: 1.6.0 or later
6
1 BioStar 2 Overview
XPass D2: 1.3.2 or later
XPass D2 (Rev 2): 1.7.2 or later
FaceLite: 1.3.4 or later
XPass 2: 1.3.2 or later
FaceStation F2: 2.1.4 or later
X-Station 2: 1.2.3 or later
OM-120: 1.2.1 or later
Secure I/O 2: 1.3.1 or later
DM-20: 1.2.2 or later
IM-120: 1.0.0 or later
BioStation 3: 1.2.1 or later
BioStation 2a: 1.1.0 or later
BioStar 2.9.4
Category Functionality
Supports BioStaion 2a
Device
Supports Wireless Door Lock connection to CoreStation
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.10.1 or later
BioStation A2: 1.9.1 or later
BioStation L2: 1.6.1 or later
BioEntry W2: 1.7.1 or later
FaceStation 2: 1.5.3 or later
CoreStation: 1.6.1 or later
BioEntry P2: 1.4.4 or later
BioEntry R2: 1.4.1 or later
BioLite N2: 1.6.0 or later
XPass D2: 1.3.2 or later
7
1 BioStar 2 Overview
XPass D2 (Rev 2): 1.7.1 or later
FaceLite: 1.3.4 or later
XPass 2: 1.3.2 or later
FaceStation F2: 2.1.4 or later
X-Station 2: 1.2.2 or later
OM-120: 1.2.1 or later
Secure I/O 2: 1.3.1 or later
DM-20: 1.2.2 or later
IM-120: 1.0.0 or later
BioStation 3: 1.1.1 or later
BioStation 2a: 1.0.0 or later
BioStar 2.9.3
Category Functionality
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.10.1 or later
BioStation A2: 1.9.1 or later
BioStation L2: 1.6.1 or later
BioEntry W2: 1.7.1 or later
FaceStation 2: 1.5.3 or later
CoreStation: 1.6.1 or later
BioEntry P2: 1.4.4 or later
BioEntry R2: 1.4.1 or later
BioLite N2: 1.5.0 or later
8
1 BioStar 2 Overview
XPass D2: 1.3.2 or later
XPass D2 (Rev 2): 1.7.1 or later
FaceLite: 1.3.4 or later
XPass 2: 1.3.2 or later
FaceStation F2: 2.1.3 or later
X-Station 2: 1.2.2 or later
OM-120: 1.2.1 or later
Secure I/O 2: 1.3.1 or later
DM-20: 1.2.2 or later
IM-120: 1.0.0 or later
BioStation 3: 1.1.0 or later
BioStar 2.9.2
Category Functionality
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.10.1 or later
BioStation A2: 1.9.1 or later
BioStation L2: 1.6.1 or later
BioEntry W2: 1.7.1 or later
FaceStation 2: 1.5.3 or later
CoreStation: 1.5.3 or later
BioEntry P2: 1.4.4 or later
BioEntry R2: 1.4.1 or later
BioLite N2: 1.5.0 or later
XPass D2: 1.3.2 or later
XPass D2 (Rev 2): 1.7.0 or later
FaceLite: 1.3.4 or later
XPass 2: 1.3.2 or later
FaceStation F2: 2.1.2 or later
X-Station 2: 1.2.0 or later
OM-120: 1.2.1 or later
9
1 BioStar 2 Overview
Secure I/O 2: 1.3.1 or later
DM-20: 1.2.2 or later
IM-120: 1.0.0 or later
BioStation 3: 1.0.2 or later
BioStar 2.9.1
Category Functionality
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.10.1 or later
BioStation A2: 1.9.1 or later
BioStation L2: 1.6.1 or later
BioEntry W2: 1.7.1 or later
FaceStation 2: 1.5.3 or later
CoreStation: 1.5.3 or later
BioEntry P2: 1.4.4 or later
BioEntry R2: 1.4.1 or later
BioLite N2: 1.5.0 or later
XPass D2: 1.3.2 or later
XPass D2 (Rev 2): 1.7.0 or later
FaceLite: 1.3.4 or later
XPass 2: 1.3.2 or later
FaceStation F2: 2.1.2 or later
X-Station 2: 1.2.0 or later
OM-120: 1.2.1 or later
Secure I/O 2: 1.3.1 or later
DM-20: 1.2.2 or later
IM-120: 1.0.0 or later
10
1 BioStar 2 Overview
BioStation 3: 1.0.2 or later
BioStar 2.9.0
Category Functionality
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.10.1 or later
BioStation A2: 1.9.1 or later
BioStation L2: 1.6.1 or later
BioEntry W2: 1.7.0 or later
FaceStation 2: 1.5.2 or later
CoreStation: 1.5.2 or later
BioEntry P2: 1.4.3 or later
BioEntry R2: 1.4.1 or later
BioLite N2: 1.5.0 or later
XPass D2: 1.3.2 or later
XPass D2 (Rev 2): 1.6.0 or later
FaceLite: 1.3.2 or later
XPass 2: 1.3.1 or later
FaceStation F2: 2.0.3 or later
X-Station 2: 1.1.3 or later
OM-120: 1.2.1 or later
Secure I/O 2: 1.3.1 or later
DM-20: 1.2.2 or later
IM-120: 1.0.0 or later
11
1 BioStar 2 Overview
BioStar 2.8.17
Category Functionality
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.10.1 or later
BioStation A2: 1.9.1 or later
BioStation L2: 1.6.1 or later
BioEntry W2: 1.6.3 or later
FaceStation 2: 1.5.1 or later
CoreStation: 1.5.2 or later
BioEntry P2: 1.4.3 or later
BioEntry R2: 1.4.1 or later
BioLite N2: 1.4.1 or later
XPass D2: 1.3.2 or later
XPass D2 (Rev 2): 1.6.0 or later
FaceLite: 1.3.2 or later
XPass 2: 1.2.4 or later
FaceStation F2: 2.0.3 or later
X-Station 2: 1.1.3 or later
OM-120: 1.2.1 or later
Secure I/O 2: 1.3.1 or later
DM-20: 1.2.2 or later
IM-120: 1.0.0 or later
BioStar 2.8.16
12
1 BioStar 2 Overview
Category Functionality
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.10.1 or later
BioStation A2: 1.9.1 or later
BioStation L2: 1.6.1 or later
BioEntry W2: 1.6.3 or later
FaceStation 2: 1.5.1 or later
CoreStation: 1.5.2 or later
BioEntry P2: 1.4.3 or later
BioEntry R2: 1.4.1 or later
BioLite N2: 1.4.1 or later
XPass D2: 1.3.2 or later
13
1 BioStar 2 Overview
XPass D2 (Rev 2): 1.6.0 or later
FaceLite: 1.3.2 or later
XPass 2: 1.2.4 or later
FaceStation F2: 1.1.4 or later
X-Station 2: 1.1.3 or later
OM-120: 1.2.1 or later
Secure I/O 2: 1.3.1 or later
DM-20: 1.2.2 or later
IM-120: 1.0.0 or later
BioStar 2.8.15
Category Functionality
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.10.0 or later
BioStation A2: 1.9.0 or later
BioStation L2: 1.6.1 or later
BioEntry W2: 1.6.3 or later
FaceStation 2: 1.5.1 or later
CoreStation: 1.5.2 or later
BioEntry P2: 1.4.3 or later
BioEntry R2: 1.4.1 or later
BioLite N2: 1.4.1 or later
XPass D2: 1.3.2 or later
XPass D2 (Rev 2): 1.5.0 or later
FaceLite: 1.3.1 or later
XPass 2: 1.2.4 or later
FaceStation F2: 1.1.2 or later
X-Station 2: 1.1.2 or later
OM-120: 1.2.1 or later
14
1 BioStar 2 Overview
Secure I/O 2: 1.3.1 or later
DM-20: 1.2.2 or later
IM-120: 1.0.0 or later
BioStar 2.8.14
Category Functionality
Supports OpenJDK
Applied Log4j 2 v2.16.0
Improved security vulnerabilities
Updated APIs in Swagger
General
Improved the server performance
Improved the performance of processing data on the database
26 bit Wiegand card option support for BioStar 1.x to BioStar 2.x
Migration Tool
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.10.0 or later
BioStation A2: 1.9.0 or later
BioStation L2: 1.6.1 or later
BioEntry W2: 1.6.3 or later
FaceStation 2: 1.5.0 or later
CoreStation: 1.5.2 or later
15
1 BioStar 2 Overview
BioEntry P2: 1.4.2 or later
BioEntry R2: 1.4.1 or later
BioLite N2: 1.4.1 or later
XPass D2: 1.3.2 or later
XPass D2 (Rev 2): 1.5.0 or later
FaceLite: 1.3.0 or later
XPass 2: 1.2.4 or later
FaceStation F2: 1.1.2 or later
X-Station 2: 1.1.0 or later
OM-120: 1.2.0 or later
Secure I/O 2: 1.3.0 or later
DM-20: 1.2.1 or later
IM-120: 1.0.0 or later
BioStar 2.8.13
Category Functionality
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.10.0 or later
BioStation A2: 1.9.0 or later
BioStation L2: 1.6.1 or later
BioEntry W2: 1.6.3 or later
FaceStation 2: 1.5.0 or later
CoreStation: 1.5.1 or later
BioEntry P2: 1.4.1 or later
BioEntry R2: 1.4.1 or later
BioLite N2: 1.4.0 or later
XPass D2: 1.3.2 or later
16
1 BioStar 2 Overview
XPass D2 (Rev 2): 1.5.0 or later
FaceLite: 1.3.0 or later
XPass 2: 1.2.3 or later
FaceStation F2: 1.1.1 or later
X-Station 2: 1.1.0 or later
OM-120: 1.2.0 or later
Secure I/O 2: 1.3.0 or later
DM-20: 1.2.1 or later
BioStar 2.8.12
Category Functionality
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.10.0 or later
BioStation A2: 1.9.0 or later
BioStation L2: 1.6.1 or later
BioEntry W2: 1.6.3 or later
FaceStation 2: 1.5.0 or later
CoreStation: 1.5.1 or later
BioEntry P2: 1.4.1 or later
BioEntry R2: 1.4.1 or later
BioLite N2: 1.4.0 or later
XPass D2: 1.3.2 or later
XPass D2 (Rev 2): 1.5.0 or later
FaceLite: 1.3.0 or later
XPass 2: 1.2.3 or later
FaceStation F2: 1.1.1 or later
X-Station 2: 1.0.3 or later
OM-120: 1.2.0 or later
Secure I/O 2: 1.3.0 or later
DM-20: 1.2.1 or later
17
1 BioStar 2 Overview
BioStar 2.8.11
Category Functionality
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.9.0 or later
BioStation A2: 1.8.0 or later
BioStation L2: 1.6.1 or later
BioEntry W2: 1.6.3 or later
FaceStation 2: 1.4.2 or later
CoreStation: 1.5.1 or later
BioEntry P2: 1.4.1 or later
BioEntry R2: 1.4.1 or later
BioLite N2: 1.3.2 or later
XPass D2: 1.3.2 or later
XPass D2 (Rev 2): 1.5.0 or later
FaceLite: 1.2.0 or later
XPass 2: 1.2.3 or later
FaceStation F2: 1.0.5 or later
X-Station 2: 1.0.1 or later
OM-120: 1.2.0 or later
Secure I/O 2: 1.3.0 or later
DM-20: 1.2.1 or later
18
1 BioStar 2 Overview
BioStar 2.8.10
Category Functionality
Supports a drag & drop method when registering Visual Face with
'Upload Image'
User
Provides guidance on success or failure of Visual Face Mobile Enrollment
Supports new Date File Export/Import
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.9.0 or later
BioStation A2: 1.8.0 or later
BioStation L2: 1.6.0 or later
BioEntry W2: 1.6.2 or later
FaceStation 2: 1.4.0 or later
CoreStation: 1.4.1 or later
BioEntry P2: 1.4.0 or later
BioEntry R2: 1.4.0 or later
BioLite N2: 1.3.2 or later
XPass D2: 1.3.1 or later
XPass D2 (Rev 2): 1.4.2 or later
FaceLite: 1.2.0 or later
XPass 2: 1.2.2 or later
FaceStation F2: 1.0.2 or later
OM-120: 1.2.0 or later
Secure I/O 2: 1.3.0 or later
DM-20: 1.2.0 or later
19
1 BioStar 2 Overview
BioStar 2.8.9
Category Functionality
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.9.0 or later
BioStation A2: 1.8.0 or later
BioStation L2: 1.6.0 or later
BioEntry W2: 1.6.1 or later
FaceStation 2: 1.4.0 or later
CoreStation: 1.4.1 or later
BioEntry P2: 1.4.0 or later
BioEntry R2: 1.4.0 or later
BioLite N2: 1.3.2 or later
XPass D2: 1.3.1 or later
XPass D2 (Rev 2): 1.4.2 or later
FaceLite: 1.2.0 or later
XPass 2: 1.2.2 or later
FaceStation F2: 1.0.1 or later
OM-120: 1.2.0 or later
Secure I/O 2: 1.3.0 or later
DM-20: 1.2.0 or later
BioStar 2.8.8
20
1 BioStar 2 Overview
Category Functionality
Time & Attendance Fixed bugs of some features in the TIME ATTENDANCE menu
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.9.0 or later
BioStation A2: 1.7.1 or later
BioStation L2: 1.6.0 or later
BioEntry W2: 1.6.0 or later
FaceStation 2: 1.4.0 or later
CoreStation: 1.4.1 or later
BioEntry P2: 1.4.0 or later
BioEntry R2: 1.4.0 or later
BioLite N2: 1.3.2 or later
XPass D2: 1.3.1 or later
XPass D2 (Rev 2): 1.4.2 or later
FaceLite: 1.1.0 or later
XPass 2: 1.2.2 or later
FaceStation F2: 1.0.0 or later
OM-120: 1.2.0 or later
Secure I/O 2: 1.3.0 or later
DM-20: 1.2.0 or later
BioStar 2.8.6
21
1 BioStar 2 Overview
New and improved features
Category Functionality
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.8.0 or later
BioStation A2: 1.7.1 or later
BioStation L2: 1.6.0 or later
BioEntry W2: 1.5.0 or later
FaceStation 2: 1.3.1 or later
CoreStation: 1.4.0 or later
BioEntry P2: 1.4.0 or later
BioEntry R2: 1.4.0 or later
BioLite N2: 1.3.1 or later
XPass D2: 1.3.1 or later
XPass D2 (Rev 2): 1.4.1 or later
FaceLite: 1.1.0 or later
XPass 2: 1.2.1 or later
OM-120: 1.2.0 or later
Secure I/O 2: 1.3.0 or later
DM-20: 1.2.0 or later
BioStar 2.8.5
Category Functionality
Compatible firmware
BioLite Net: 2.3.5 or later
22
1 BioStar 2 Overview
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.8.0 or later
BioStation A2: 1.7.1 or later
BioStation L2: 1.6.0 or later
BioEntry W2: 1.5.0 or later
FaceStation 2: 1.3.1 or later
CoreStation: 1.4.0 or later
BioEntry P2: 1.4.0 or later
BioEntry R2: 1.4.0 or later
BioLite N2: 1.3.1 or later
XPass D2: 1.3.1 or later
XPass D2 (Rev 2): 1.4.1 or later
FaceLite: 1.1.0 or later
XPass 2: 1.2.1 or later
OM-120: 1.2.0 or later
Secure I/O 2: 1.3.0 or later
DM-20: 1.2.0 or later
BioStar 2.8.4
Category Functionality
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
23
1 BioStar 2 Overview
XPass S2: 2.4.4 or later
BioStation 2: 1.8.0 or later
BioStation A2: 1.7.1 or later
BioStation L2: 1.5.1 or later
BioEntry W2: 1.5.0 or later
FaceStation 2: 1.3.1 or later
CoreStation: 1.4.0 or later
BioEntry P2: 1.4.0 or later
BioEntry R2: 1.4.0 or later
BioLite N2: 1.3.1 or later
XPass D2: 1.3.1 or later
XPass D2 (Rev 2): 1.4.1 or later
FaceLite: 1.1.0 or later
XPass 2: 1.2.1 or later
OM-120: 1.2.0 or later
Secure I/O 2: 1.3.0 or later
DM-20: 1.2.0 or later
BioStar 2.8.3
Category Functionality
Setting Supports Zone in the Admin Item Settings of the custom level
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.8.0 or later
BioStation A2: 1.7.1 or later
BioStation L2: 1.5.1 or later
BioEntry W2: 1.4.1 or later
FaceStation 2: 1.3.1 or later
24
1 BioStar 2 Overview
CoreStation: 1.4.0 or later
BioEntry P2: 1.4.0 or later
BioEntry R2: 1.4.0 or later
BioLite N2: 1.3.0 or later
XPass D2: 1.3.0 or later
XPass D2 (Rev 2): 1.4.0 or later
FaceLite: 1.1.0 or later
XPass 2: 1.2.1 or later
OM-120: 1.1.0 or later
Secure I/O 2: 1.3.0 or later
DM-20: 1.2.0 or later
BioStar 2.8.2
Category Functionality
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.8.0 or later
BioStation A2: 1.7.1 or later
BioStation L2: 1.5.1 or later
BioEntry W2: 1.4.1 or later
FaceStation 2: 1.3.1 or later
CoreStation: 1.3.1 or later
BioEntry P2: 1.3.1 or later
BioEntry R2: 1.4.0 or later
BioLite N2: 1.2.0 or later
XPass D2: 1.3.0 or later
XPass D2 (Rev 2): 1.4.0 or later
FaceLite: 1.1.0 or later
XPass 2: 1.2.0 or later
OM-120: 1.1.0 or later
Secure I/O 2: 1.2.4 or later
DM-20: 1.1.5 or later
25
1 BioStar 2 Overview
BioStar 2.8.1
Category Functionality
Move the 'In/Out Only and 'All Punches' options in the Individual
Time & Attendance
Report
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.8.0 or later
BioStation A2: 1.7.1 or later
BioStation L2: 1.5.1 or later
BioEntry W2: 1.4.1 or later
FaceStation 2: 1.3.1 or later
CoreStation: 1.3.1 or later
BioEntry P2: 1.3.1 or later
BioEntry R2: 1.4.0 or later
BioLite N2: 1.2.0 or later
XPass D2: 1.3.0 or later
XPass D2 (Rev 2): 1.4.0 or later
FaceLite: 1.1.0 or later
XPass 2: 1.2.0 or later
OM-120: 1.1.0 or later
Secure I/O 2: 1.2.4 or later
DM-20: 1.1.5 or later
BioStar 2.8.0
Category Functionality
26
1 BioStar 2 Overview
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.8.0 or later
BioStation A2: 1.7.1 or later
BioStation L2: 1.5.1 or later
BioEntry W2: 1.4.1 or later
FaceStation 2: 1.3.0 or later
CoreStation: 1.3.1 or later
BioEntry P2: 1.3.1 or later
BioEntry R2: 1.3.1 or later
BioLite N2: 1.2.0 or later
XPass D2: 1.2.0 or later
XPass D2 (Rev 2): 1.4.0 or later
FaceLite: 1.1.0 or later
XPass 2: 1.1.0 or later
OM-120: 1.1.0 or later
Secure I/O 2: 1.2.4 or later
DM-20: 1.1.5 or later
BioStar 2.7.14
Category Functionality
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
27
1 BioStar 2 Overview
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.8.0 or later
BioStation A2: 1.7.1 or later
BioStation L2: 1.5.1 or later
BioEntry W2: 1.4.1 or later
FaceStation 2: 1.3.0 or later
CoreStation: 1.3.1 or later
BioEntry P2: 1.3.1 or later
BioEntry R2: 1.3.1 or later
BioLite N2: 1.2.0 or later
XPass D2: 1.2.0 or later
FaceLite: 1.1.0 or later
XPass 2: 1.1.0 or later
OM-120: 1.1.0 or later
Secure I/O 2: 1.2.4 or later
DM-20: 1.1.5 or later
BioStar 2.7.12
Category Functionality
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.8.0 or later
BioStation A2: 1.7.0 or later
BioStation L2: 1.5.1 or later
BioEntry W2: 1.4.1 or later
FaceStation 2: 1.3.0 or later
CoreStation: 1.3.1 or later
28
1 BioStar 2 Overview
BioEntry P2: 1.3.1 or later
BioEntry R2: 1.3.1 or later
BioLite N2: 1.2.0 or later
XPass D2: 1.2.0 or later
FaceLite: 1.1.0 or later
XPass 2: 1.1.0 or later
OM-120: 1.1.0 or later
Secure I/O 2: 1.2.4 or later
DM-20: 1.1.5 or later
BioStar 2.7.11
Category Functionality
Supports the sorting of lists for the User ID and User Group
Monitoring
column of the <Muster Status> page
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.8.0 or later
BioStation A2: 1.7.0 or later
BioStation L2: 1.5.1 or later
BioEntry W2: 1.4.1 or later
FaceStation 2: 1.3.0 or later
CoreStation: 1.3.0 or later
BioEntry P2: 1.3.1 or later
BioEntry R2: 1.3.1 or later
BioLite N2: 1.2.0 or later
XPass D2: 1.2.0 or later
29
1 BioStar 2 Overview
FaceLite: 1.1.0 or later
XPass 2: 1.1.0 or later
OM-120: 1.1.0 or later
Secure I/O 2: 1.2.4 or later
DM-20: 1.1.5 or later
BioStar 2.7.10
Category Functionality
Support FaceLite
Device
Support XPass 2
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.8.0 or later
BioStation A2: 1.7.0 or later
BioStation L2: 1.5.0 or later
BioEntry W2: 1.4.0 or later
FaceStation 2: 1.3.0 or later
CoreStation: 1.3.0 or later
BioEntry P2: 1.3.0 or later
BioEntry R2: 1.3.0 or later
BioLite N2: 1.2.0 or later
XPass D2: 1.2.0 or later
FaceLite: 1.1.0 or later
XPass 2: 1.0.1 or later
30
1 BioStar 2 Overview
OM-120: 1.1.0 or later
Secure I/O 2: 1.2.4 or later
DM-20: 1.1.5 or later
BioStar 2.7.8
Category Functionality
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.7.1 or later
BioStation A2: 1.6.0 or later
BioStation L2: 1.5.0 or later
BioEntry W2: 1.4.0 or later
FaceStation 2: 1.2.1 or later
CoreStation: 1.3.0 or later
BioEntry P2: 1.3.0 or later
BioEntry R2: 1.3.0 or later
BioLite N2: 1.1.0 or later
XPass D2: 1.2.0 or later
FaceLite: 1.0.0 or later
XPass 2: 1.0.0 or later
OM-120: 1.1.0 or later
Secure I/O 2: 1.2.4 or later
DM-20: 1.1.4 or later
31
1 BioStar 2 Overview
BioStar 2.7.7
Category Functionality
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.7.1 or later
BioStation A2: 1.6.0 or later
BioStation L2: 1.4.0 or later
BioEntry W2: 1.3.0 or later
FaceStation 2: 1.2.1 or later
CoreStation: 1.2.0 or later
BioEntry P2: 1.2.0 or later
BioEntry R2: 1.2.0 or later
BioLite N2: 1.1.0 or later
XPass D2: 1.1.0 or later
OM-120: 1.1.0 or later
Secure I/O 2: 1.2.4 or later
DM-20: 1.1.4 or later
BioStar 2.7.6
Category Functionality
32
1 BioStar 2 Overview
Category Functionality
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.7.1 or later
BioStation A2: 1.6.0 or later
BioStation L2: 1.4.0 or later
BioEntry W2: 1.3.0 or later
FaceStation 2: 1.2.1 or later
CoreStation: 1.2.0 or later
BioEntry P2: 1.2.0 or later
BioEntry R2: 1.2.0 or later
BioLite N2: 1.1.0 or later
XPass D2: 1.1.0 or later
OM-120: 1.1.0 or later
Secure I/O 2: 1.2.4 or later
DM-20: 1.1.4 or later
BioStar 2.7.5
Category Functionality
User Support to the list sorting for group and status column
33
1 BioStar 2 Overview
Category Functionality
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.7.1 or later
BioStation A2: 1.6.0 or later
BioStation L2: 1.4.0 or later
BioEntry W2: 1.3.0 or later
FaceStation 2: 1.2.1 or later
CoreStation: 1.2.0 or later
BioEntry P2: 1.2.0 or later
BioEntry R2: 1.2.0 or later
BioLite N2: 1.1.0 or later
XPass D2: 1.1.0 or later
OM-120: 1.1.0 or later
Secure I/O 2: 1.2.4 or later
DM-20: 1.1.4 or later
BioStar 2.7.4
Category Functionality
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
34
1 BioStar 2 Overview
XPass S2: 2.4.4 or later
BioStation 2: 1.7.1 or later
BioStation A2: 1.6.0 or later
BioStation L2: 1.4.0 or later
BioEntry W2: 1.3.0 or later
FaceStation 2: 1.2.1 or later
CoreStation: 1.2.0 or later
BioEntry P2: 1.2.0 or later
BioEntry R2: 1.2.0 or later
BioLite N2: 1.1.0 or later
XPass D2: 1.1.0 or later
OM-120: 1.1.0 or later
Secure I/O 2: 1.2.4 or later
DM-20: 1.1.4 or later
BioStar 2.7.3
Category Functionality
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.7.0 or later
BioStation A2: 1.6.0 or later
BioStation L2: 1.4.0 or later
BioEntry W2: 1.3.0 or later
FaceStation 2: 1.2.0 or later
CoreStation: 1.2.0 or later
BioEntry P2: 1.2.0 or later
BioEntry R2: 1.2.0 or later
BioLite N2: 1.1.0 or later
35
1 BioStar 2 Overview
XPass D2: 1.1.0 or later
OM-120: 1.1.0 or later
Secure I/O 2: 1.2.4 or later
DM-20: 1.1.4 or later
BioStar 2.7.2
Category Functionality
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.7.0 or later
BioStation A2: 1.6.0 or later
BioStation L2: 1.4.0 or later
BioEntry W2: 1.3.0 or later
FaceStation 2: 1.2.0 or later
CoreStation: 1.2.0 or later
BioEntry P2: 1.2.0 or later
BioEntry R2: 1.2.0 or later
BioLite N2: 1.1.0 or later
XPass D2: 1.1.0 or later
OM-120: 1.1.0 or later
Secure I/O 2: 1.2.4 or later
DM-20: 1.1.4 or later
36
1 BioStar 2 Overview
BioStar 2.7.1
Category Functionality
Provides the log about whether a user has been updated on the
Monitoring
device or the server
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.7.0 or later
BioStation A2: 1.6.0 or later
BioStation L2: 1.4.0 or later
BioEntry W2: 1.3.0 or later
FaceStation 2: 1.2.0 or later
CoreStation: 1.2.0 or later
BioEntry P2: 1.2.0 or later
BioEntry R2: 1.2.0 or later
BioLite N2: 1.1.0 or later
XPass D2: 1.1.0 or later
OM-120: 1.1.0 or later
Secure I/O 2: 1.2.4 or later
DM-20: 1.1.4 or later
BioStar 2.7.0
Category Functionality
37
1 BioStar 2 Overview
Support to the number of users, fingerprints, faces, and cards in
Device
Manage Users in Device
Access Control Support for a larger number of access groups and access groups
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.7.0 or later
BioStation A2: 1.6.0 or later
BioStation L2: 1.4.0 or later
BioEntry W2: 1.3.0 or later
FaceStation 2: 1.2.0 or later
CoreStation: 1.2.0 or later
BioEntry P2: 1.2.0 or later
BioEntry R2: 1.2.0 or later
BioLite N2: 1.1.0 or later
XPass D2: 1.1.0 or later
OM-120: 1.1.0 or later
Secure I/O 2: 1.2.4 or later
DM-20: 1.1.4 or later
BioStar 2.6.4
Category Functionality
38
1 BioStar 2 Overview
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.4 or later
BioEntry W: 2.3.4 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.6.2 or later
BioStation A2: 1.5.1 or later
BioStation L2: 1.3.2 or later
BioEntry W2: 1.2.3 or later
FaceStation 2: 1.1.1 or later
CoreStation: 1.1.2 or later
BioEntry P2: 1.1.2 or later
BioEntry R2: 1.1.1 or later
BioLite N2: 1.0.2 or later
XPass D2: 1.0.2 or later
OM-120: 1.0.0 or later
Secure I/O 2: 1.2.1 or later
DM-20: 1.1.2 or later
BioStar 2.6.3
Category Functionality
Setting Support Admin Item Settings when configuring Custom Account Level
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.3 or later
BioEntry W: 2.3.3 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.6.1 or later
BioStation A2: 1.5.1 or later
BioStation L2: 1.3.1 or later
BioEntry W2: 1.2.1 or later
FaceStation 2: 1.1.1 or later
CoreStation: 1.1.1 or later
BioEntry P2: 1.1.1 or later
39
1 BioStar 2 Overview
BioEntry R2: 1.1.0 or later
BioLite N2: 1.0.2 or later
XPass D2: 1.0.1 or later
OM-120: 1.0.0 or later
Secure I/O 2: 1.2.1 or later
DM-20: 1.1.2 or later
BioStar 2.6.2
Category Functionality
Monitoring Support the event log import by using the external storage (USB)
Compatible firmware
BioLite Net: 2.3.5 or later
BioEntry Plus: 2.3.3 or later
BioEntry W: 2.3.3 or later
XPass: 2.4.4 or later
XPass S2: 2.4.4 or later
BioStation 2: 1.6.1 or later
BioStation A2: 1.5.1 or later
BioStation L2: 1.3.1 or later
BioEntry W2: 1.2.1 or later
FaceStation 2: 1.1.1 or later
CoreStation: 1.1.1 or later
BioEntry P2: 1.1.1 or later
BioEntry R2: 1.1.0 or later
BioLite N2: 1.0.2 or later
XPass D2: 1.0.1 or later
OM-120: 1.0.0 or later
Secure I/O 2: 1.2.1 or later
DM-20: 1.1.2 or later
BioStar 2.6.0
40
1 BioStar 2 Overview
Category Functionality
Support BioLite N2
Support XPass D2
Support BioMini Plus 2
Device Support the user information and log deletion when a tamper event
occurs (secure tamper)
Device reset excluding network settings
Wiegand In/Out Support
Compatible firmware
BioLite Net: 2.3.3 or later
BioEntry Plus: 2.3.3 or later
BioEntry W: 2.3.3 or later
XPass: 2.4.3 or later
XPass S2: 2.4.3 or later
BioStation 2: 1.6.0 or later
BioStation A2: 1.5.0 or later
BioStation L2: 1.3.0 or later
BioEntry W2: 1.2.0 or later
FaceStation 2: 1.1.0 or later
41
1 BioStar 2 Overview
CoreStation: 1.1.0 or later
BioEntry P2: 1.1.0 or later
BioEntry R2: 1.1.0 or later
BioLite N2: 1.0.0 or later
XPass D2: 1.0.0 or later
OM-120: 1.0.0 or later
Secure I/O 2: 1.2.1 or later
DM-20: 1.1.2 or later
BioStar 2.5.0
Category Functionality
Supports CoreStation
Supports BioEntry P2
Device Supports BioEntry R2
Supports the enrollment of a fingerprint from the slave device(BioLite
Net does not support this feature)
Compatible firmware
BioLite Net: 2.3.3 or later
BioEntry Plus: 2.3.3 or later
BioEntry W: 2.3.3 or later
XPass: 2.4.3 or later
XPass S2: 2.4.3 or later
BioStation 2: 1.5.0 or later
BioStation A2: 1.4.0 or later
BioStation L2: 1.2.3 or later
BioEntry W2: 1.1.4 or later
42
1 BioStar 2 Overview
FaceStation 2: 1.0.3 or later
CoreStation: 1.0.0 or later
BioEntry P2: 1.0.0 or later
BioEntry R2: 1.0.0 or later
BioStar 2.4.1
Category Functionality
Enhanced UI/UX
Merge the time card with T&A report
Display of daily T&A records
Time & Attendance Time rate setting is excluded from the time code for leave management.
Break time is displayed on the time slot when fixed work is used.
It is possible to set the Min. Duration and Punch in Time Limit when
flexible work is used.
Compatible firmware
BioLite Net: 2.4.0 or later
BioEntry Plus: 2.4.0 or later
BioEntry W: 2.4.0 or later
XPass: 2.4.1 or later
XPass S2: 2.4.0 or later
BioStation 2: 1.4.0 or later
BioStation A2: 1.3.0 or later
BioStation L2: 1.2.2 or later
BioEntry W2: 1.1.2 or later
FaceStation 2: 1.0.0 or later
BioStar 2.4.0
Category Functionality
43
1 BioStar 2 Overview
Supports elevator management
General
Supporting Oracle Database 11g, 12c
Supports OM-120
Device Supports card USB device (DUALi DE-620)
Supports secure communication between BioStar 2 and a device
Time & Attendance Supports time & attendance report PDF export
Compatible firmware
BioLite Net: 2.4.0 or later
BioEntry Plus: 2.4.0 or later
BioEntry W: 2.4.0 or later
XPass: 2.4.0 or later
XPass S2: 2.4.0 or later
BioStation 2: 1.4.0 or later
BioStation A2: 1.3.0 or later
BioStation L2: 1.2.2 or later
BioEntry W2: 1.1.2 or later
BioStar 2.3.0
Category Functionality
Compatible firmware
44
1 BioStar 2 Overview
BioLite Net: 2.3.0 or later
BioEntry Plus: 2.3.0 or later
BioEntry W: 2.3.0 or later
XPass: 2.3.0 or later
XPass S2: 2.3.0 or later
BioStation 2: 1.3.0 or later
BioStation A2: 1.2.0 or later
BioStation L2: 1.1.0 or later
BioEntry W2: 1.0.0 or later
BioStar 2.2.2
Compatible firmware
BioLite Net: 2.2.3 or later
BioEntry Plus: 2.2.3 or later
BioEntry W: 2.2.3 or later
XPass: 2.2.3 or later
XPass S2: 2.2.3 or later
BioStation 2: 1.3.0 or later
BioStation A2: 1.1.0 or later
BioStation L2: 1.0.0 or later
BioEntry W2: 1.0.0 or later
BioStar 2.2.1
Compatible firmware
BioLite Net: 2.2.3 or later
BioEntry Plus: 2.2.3 or later
45
1 BioStar 2 Overview
BioEntry W: 2.2.3 or later
XPass: 2.2.3 or later
XPass S2: 2.2.3 or later
BioStation 2: 1.3.0 or later
BioStation A2: 1.1.0 or later
BioStation L2: 1.0.0 or later
BioStar 2.2.0
Compatible firmware
BioLite Net: 2.2.3 or later
BioEntry Plus: 2.2.3 or later
BioEntry W: 2.2.3 or later
XPass: 2.2.3 or later
XPass S2: 2.2.3 or later
BioStation 2: 1.2.0 or later
BioStation A2: 1.0.0 or later
BioStar 2.1.0
Compatible firmware
BioLite Net: 2.0.4 or later
46
1 BioStar 2 Overview
BioEntry Plus: 2.0.4 or later
BioEntry W: 2.0.4 or later
XPass: 2.0.4 or later
XPass S2: 2.0.4 or later
BioStation 2: 1.0.1 or later
BioStar 2.0.1
Compatible firmware
BioLite Net: 2.0.0 or later
BioEntry Plus: 2.0.0 or later
BioEntry W: 2.0.0 or later
XPass: 2.0.0 or later
XPass S2: 2.0.0 or later
Before using BioStar 2 to implement an access control system, the BioStar 2 server must be installed on
the administrator PC.
The BioStar 2 server receives event logs, user information, etc. from connected devices and stores
them.
BioStar 2 can be installed easily. Before installation, please check the Minimum System Requirements.
The BioStar 2 installation file can be found on the Suprema's home page(https://
www.supremainc.com).
Installing BioStar 2
47
2 Installation
Minimum System Requirements
Total
Environment 1 to 50 51 to 100 101 to 1,000
Devices
RAM 8 GB 16 GB 32 GB
SSD 512 GB 1 TB 1 TB
RAM 8 GB 16 GB
HDD 2 TB 4 TB
Note
For the best performance, use only the 64-bit operating system.
BioStar 2 is optimized for Google Chrome.
To use the Video menu, use the 64bits MariaDB or MS SQL database.
BioStar 2 supports Windows 7, but Microsoft's technical support for Windows 7 has ended. Be
aware of the OS selection when installing the system.
If you are using Windows 8.1, install the KB2919355 update by referring to the following web
page.
48
2 Installation
https://support.microsoft.com/en-us/help/2919355/windows-rt-8-1--windows-8-1--and-
windows-server-2012-r2-update-april-2
If MS SQL Server and BioStar 2 are installed on different PCs, you should install the Native
Client on a PC with BioStar 2 installed.
https://www.microsoft.com/en-us/download/details.aspx?id=50402
Oracle Database is no longer supported. For details, please contact the Suprema Technical
Support.
Installing BioStar 2
BioStar 2 supports a 32-bit operating system and a 64-bit operating system. Check the system type of
your PC where BioStar 2 is to be installed and carry out its installation accordingly.
Note
Installation files for 32-bit operating systems are not provided from BioStar 2.9.2.
Do not install BioStar 2 on a PC where BioStar 1 is installed. This may cause performance
problems.
If BioStar 2.3.0 is installed on top of a BioStar 2.2.1 or 2.2.2 installation, all information stored
in the SQLite database is migrated to a new MariaDB database.
Upgrading directly from the existing version to the latest version is possible from BioStar 2.6.0
or higher. If the installed version is lower than 2.6.0, installing all versions in a correct
sequence until reaching version v2.6.0 is essential.
2 2.2.1 > 2.3 > 2.4 > 2.4.1 > 2.5.0 > 2.6.4 > Latest Version
2.2
2.2.1 2.3 > 2.4 > 2.4.1 > 2.5.0 > 2.6.4 > Latest Version
2.2.2
2.3 2.4 > 2.4.1 > 2.5.0 > 2.6.4 > Latest Version
2.5
2.6.4 > Latest Version
2.6
If you are using Windows 8.1 install, the KB2919355 update by referring to the following web
page.
https://support.microsoft.com/en-us/help/2919355/windows-rt-8-1--windows-8-1--and-
windows-server-2012-r2-update-april-2
If you are using MS SQL 2012 Express, install the Service Pack 3 by referring to the following
web page.
49
2 Installation
https://www.microsoft.com/en-us/download/details.aspx?id=49996
If you are using MS SQL 2014 Express, install the Service Pack 2 by referring to the following
web page.
https://www.microsoft.com/en-us/download/details.aspx?id=53168
If MS SQL Server and BioStar 2 are installed on different PCs, you should install the Native
Client on a PC with BioStar 2 installed.
https://www.microsoft.com/en-us/download/details.aspx?id=50402
If you are using MS SQL Server, set the Collation option of the server and each table to CI
(Case-insensitive).
When backing up a database from an older version of BioStar 2, disable all services and
procedures. Furthermore, if you do not back up and restore the AC database and the TA
database together, you will not be able to use the TA database.
If you want to back up the database of BioStar 2, be sure to also back up the enckey in the
Program Files BioStar 2 (x64) util folder and the system.conf and setting.conf file in the
Program Files BioStar 2(x64) folder. Otherwise, the database will be unavailable.
The default values for the ports used by BioStar 2 are as follows. If another program occupies
the same port, BioStar 2 may not work properly.
If you use a database configured by the user directly, check the following items before installing BioStar
2.
MariaDB
Open the my.cnf file and then change some configurations under
[mysqld] as shown below.
character-set-server=utf8
collation-server=utf8_unicode_ci
max_connections = 600
Open the my.cnf file and then add some configurations under [mysqld]
as shown below.
log_bin_trust_function_creators = 1
group_concat_max_len = 102400
50
2 Installation
Access MariaDB with the root permission and execute the following
command.
MS SQL Server
Note
51
2 Installation
account.
b) Right-click on Security and click New Login.
c) Select Windows Authentication and click Search.
d) In the Select a user or group window, click Location, then select the
Active Directory path and click OK.
e) Enter the user name in the object name field, then click Check Names
> OK.
f) Click Server Roles in the Select a page.
g) Select sysadmin and click OK.
h) Click User Mapping in the Select a page.
i) Select ac, master, ta, ve and set the Default Schema to dbo.
j) Click OK to save the settings.
52
2 Installation
3) To continue the installation, select I accept the agreement and click Next.
4) Enter the password for admin account and click Next. The password set in this step will be used
when you log in to BioStar 2.
53
2 Installation
5) Install the database to be used in BioStar 2. You can install a new MariaDB or connect it to the
already-installed MariaDB. Installing BioStar 2 for the first time, please select Express Installation
and click Next.
6) If Express Installation has been selected from Database Installation Type, enter the database
manager’s account password and click Next. If Custom Installation has been selected from
Database Installation Type, enter the detailed information on the already-configured database
and click Next.
54
2 Installation
Note
55
2 Installation
be set the same.
8) Click Next after setting a path for the encryption key to be stored.
Note
You can set a path for the encryption key to be stored. However, if the encryption key file is
modified or moved after selecting the path, a system error may occur.
If you delete BioStar 2, the encryption key files will be deleted.
9) Read the instructions on the responsibility for protecting personal information stored in the
database and click Next to continue the installation.
56
2 Installation
Note
When you install BioStar 2 on a PC where BioStar 1 is installed, the device port (51212) is not
available. In this case, we recommend that uninstall BioStar 1.
11) Select a component of BioStar 2 and click Next. If you select USB Device Agent, a USB-Agent and
a driver for using BioMini, BIoMini Plus 2, and DUALi DE-620 will be installed together.
57
2 Installation
13) Select whether to install additional program and click Finish. Follow on screen instructions to
complete.
58
2 Installation
Note
The USB Device Agent Certificate provided can be applied to a local network only.
When another program uses port 443, BioStar 2 Setting program will be launched
automatically and then you can change the port number. For more information, see Changing
port of BioStar 2.
For more information on Database setting changes, see Changing database of BioStar 2.
BioStar 2 is a web-based system which can be accessed from anywhere as long as you remember your
login ID and password.
2) Run BioStar 2.
If running from the PC installed with BioStar 2, enter ' https://127.0.0.1' in the address input
field of the web browser.
If BioStar 2 is installed on another PC, enter ' https://BioS tar 2 server IP address' in the address
input field of the web browser.
Do not use the 'Localhost' to access the BioStar 2.
Note
BioStar 2 uses port 443. If port 443 is used by a program, quit the program and try again. If
the program cannot be closed, run 'Biostar Setting' to change the port number. For more
59
3 Login
information, see Changing port of BioStar 2.
3) Log in with the administrator account. The administrator account ID is ‘admin’ and when you log in
for the first time, Not secure warning will be displayed in the address bar.
4) To use HTTPS properly, register the IP address of the PC where BioStar 2 is installed. Click
Download HTTPS certification install program.
5) Unzip the downloaded file and run cert-register.exe file. Enrollment Certification window will
appears.
6) Enter the IP address of the PC where BioStar 2 is installed and click Enrollment.
8) When you restart the web browser and enter the registered IP address, Secure will appear on the
address bar of the web browser.
60
3 Login
Changing server status of BioStar 2
You can check the status of the BioStar 2 server and stop or start the server.
61
3 Login
Note
If the time setting on the BioStar 2 server has changed, stop and restart the Core Web
Server. Otherwise, BioStar 2 may not work properly.
You can change the port used by BioStar 2. If BioStar 2 cannot use port 443, run BioStar 2 Setting to
change the port.
Note
If you use MS SQL as a database, when changes the port in BioStar 2, you must also change
the port manually in the database. Otherwise, BioStar 2 may be disconnected from the
database and may not work properly.
62
3 Login
2) Click the Stop button for all BioStar 2 services. HTTPS Port is activated.
3) Enter the port number in HTTPS port field.
63
3 Login
Note
The items may vary depending on the type of license that is activated.
1) Log in to BioStar 2 and click on the port. All ports in use in BioStar 2 are
displayed.
2) Click the of the port to change and enter the desired value.
3) Click Apply to save the settings.
You can change the execution port of BioStar 2 to the Unified Gateway.
Unified Gateway allows efficient processing of requests to the BioStar 2 server through the reverse proxy
method, improves security vulnerabilities in iframes, and minimizes SSL certificate errors.
Note
When installing or upgrading BioStar 2, the Unified Gateway is Inactive, and the default
port values are as follows.
- Unified Gateway HTTPS Port: 5002
- Unified Gateway HTTP Port: 5000
64
3 Login
2) Click the Start button in the Unified Gateway section. Unified Gateway
becomes active.
Note
3) If the HTTPS connection, the HTTPS Port field changes to 5002 and the
Unified Gateway's Port field changes to 443.
To change the port, click Stop to stop Unified Gateway and then change it.
65
3 Login
Note
66
3 Login
2) Click the Stop button for all BioStar 2 services. Database Server Configuration is activated.
67
3 Login
3) Edit the necessary fields. If you are not sure about the each information, contact your system
administrator.
4) Click Test Connection to check if the database has been set properly.
5) Click Save to save the settings.
BioStar 2 provides web-based services and various functions concerning access control.
Access groups configured in BioStar 2 refer to access privileges. An access group can be configured
using a combination of user, access level and door (device) information.
Below is a step-by-step guide on how to use BioStar 2.
You can use more features by registering the activation key after purchasing the BioStar 2 license.
Related Information
License
Add devices to connect to BioStar 2. You can set up an authentication mode for each device type or
assign an administrator to each device.
You can also configure actions to be performed according to various events (authentication failure,
duress fingerprint authentication, Anti-passback violation, etc.) occurring in the device.
Related Information
Add the information on the doors installed with devices. You can configure relay, Anti-passback, dual
authentication, alarm, etc.
Related Information
68
4 Before Using
Adding and Managing Door Groups
Add Door
You can create an access level by combining door and schedule information. Multiple doors and
schedules can be registered to a single access level.
Related Information
You can create an access group by combining access level (doors and schedules) and user information.
Multiple access levels and users can be registered to a single access group.
Related Information
Add the information to use for access control such as user information, fingerprints, etc. User
information can be registered directly on the device or on the PC running BioStar 2. You can also fetch
the user information registered within the device to BioStar 2 or transfer the user information registered
within BioStar to the device.
Related Information
You can configure anti-passback and fire alarm zone. The fire alarm can be set to local zone and global
zone. Only available when purchasing a standard license.
Related Information
Zone
69
4 Before Using
Zone Status
You can view event logs, device status, door status and alert history, or just view the real-time log
information.
Related Information
Event Log
Real-time Log
Device Status
Door Status
Alert History
The DASHBOARD gives you an overview of the major event status, usage status, notice, alarms, etc.
70
5 Dashboard
Note
The newly added dashboard can be customized as desired by selecting the desired
information for each user, adding widgets, and freely arranging the widgets. For more
information on New Dashboard, see How to Use the New Dashboard.
You can set what to display in "Alert Event Status by Period" in the Setting > Alert.
15 alarms that have been missed in the last 1 month displayed in 'Missed Alarm' in the latest
order.
You can view the list of monitored alerts and write notes by clicking the alert list icon.
Related Information
Alert History
You can use the DEVICE menu to add, delete or edit registered devices, fetch the user information
registered within the device to the server or upgrade the firmware.
Upgrading Firmware
71
6 Device
Editing Device Settings and Information
3 Page Navigation Buttons and Number of List Rows 7 Device and Group List
Note
When you select a device on the list, you can use the following functions.
Reconnect: Reconnects the selected device. This function is available when only one device
is selected.
Sync Device: Synchronizes the user and access control information from BioStar 2 with the
registered devices. The synchronization will occur based on the information on the server
database, and the users that exist on the devices only will be deleted. Click Manage Users in
Device to retrieve users from the device to the BioStar server.
Delete Data & Sync Device: You can delete user related data including users, access
groups and schedules on the device and transfer the data on the server to the device. On the
device list page, select the target devices, click the Function button ( ) and choose the
Delete Data & Sync Device.
Batch Edit: Edits the information on multiple devices at once. This function is available only
when multiple devices are selected.
Manage Users in Device: Uploads the user information registered with the device to BioStar
2 or deletes it.
Firmware Upgrade: Easily upgrades the firmware of the device.
Delete Device: Deletes the selected device from the list. You cannot delete a device that is
72
6 Device
set as a door or a zone.
You can register device groups for easy management of multiple devices. Name your device groups
according to installation locations of the devices for greater convenience.
1) Click DEVICE.
2) Right-click on All Devices and click Add Device Group.
3) Enter a name.
Note
1) Click DEVICE.
2) Right-click on the name of a group you wish to rename and click Rename
Device Group.
3) Enter a name.
Note
73
6 Device
Deleting Device Groups
1) Click DEVICE.
2) Right-click on the name of a group you wish to delete and click Delete Device
Group.
Note
You can automatically search for devices connected to BioStar 2 and register them. Before searching for
devices, check whether they are correctly connected. When adding multiple devices at once, it will be
more convenient to know the location, ID and IP address information of each device in advance.
3) To view newly found devices only, click and then click Show New Devices Only.
74
6 Device
Note
To hide devices which do not respond within a set period of time, click and then enter a
duration in Timeout(sec).
If the devices you are looking for are not shown on the list, click Search to search for the
devices again.
4) You may change the Name and Group of a device found to anything you like. If the IP address of
the device cannot be used or otherwise needs to be changed, click Set IP to change it.
5) To use a dynamic IP address, select Use DHCP. To manually enter the IP Address, Subnet Mask
and Gateway, deselect the option. To enter the BioStar 2 network information, select
Server Connection and enter the Server Address and Server Port.
Note
If you add a new device, the key of the device changed to the value of the data encryption key
75
6 Device
on the server. All user data on the device will be deleted when the key is changed.
If you want to delete user related data including users, access groups and schedules on the
device and transfer the data on the server to the device, click the Delete Data & Sync
Device. On the device list page, select the target devices, click the Function button ( ) and
choose the Delete Data & Sync Device.
After registering a device, you can edit its details by referring to Editing Device Settings and
Information.
To register all waiting devices in the Waiting Device group, right-click on the group name
and click Add All Waiting Devices. To register each device, right-click on the device name
and click Add Waiting Device.
If a different user ID type is set for BioStar 2 and a device, change the device setting
according to the user ID setting of BioStar 2.
If the user ID type of BioStar 2 is set with alphanumeric characters, some devices may not be
used and/or limitations may occur. For more details, refer to Server.
You can register a device by specifying its IP address and port number.
Note
After registering a device, you can edit its details by referring to Editing Device Settings and
Information.
76
6 Device
Wiegand Device Search and Registration
1) Click DEVICE.
2) Right-click on the name of a master/slave device to search for Wiegand devices and click Add
Wiegand Device.
3) The list of Wiegand devices connected to the master/slave device is shown.
You can easily expand your access control system network by adding slave devices to existing master
devices. Master devices and slave devices can be connected together via RS-485. Besides regular
devices, additional devices such as Secure I/O can be connected.
1) Click DEVICE.
2) Right-click on the name of a master device to search for slave devices and click Search Slave
Device.
3) The list of slave devices connected to the master device is shown. If the devices you are looking for
are not shown on the list, click Search to search for the devices again.
77
6 Device
Note
If the fingerprint authentication device is the master device, the face authentication device
cannot be added as a slave device.
If the face authentication device is the master device and a different slave device has been
added already, a face authentication device cannot be added as a slave device.
When you connect the face authentication device as a slave device while the face
authentication device is the master device, only one face authentication device can be added
as a slave device.
When the face authentication device is the master device and another face authentication
device is connected to it as a slave device, you can connect one additional Secure I/O 2 and
DM-20 each.
The maximum number of slave devices available to connect varies according to the
authentication method, number of users, and number of devices. Also note that the number of
slave devices affects the authentication speed.
1) Click DEVICE.
2) Right-click on the name of a CoreStation and click Add OSDP Device.
3) The Select OSDP Device Type window appears. Select OSDP Reader.
78
6 Device
4) A list of ports appears. Among the ports whose Port Status is Available,
select the port to add the OSDP reader.
Note
79
6 Device
Item Description
Note
80
6 Device
Item Description
Note
Set the LED/Buzzer behavior of the connected OSDP reader. For detailed
configuring of the OSDP Device LED/Buzzer, refer to OSDP Device LED/
Buzzer.
1) Click DEVICE.
2) Among the OSDP devices registered to CoreStation, right-click on the name of
the OSDP device to be replaced and click Replace OSDP Device.
3) Click Continue after reading the warning pop-up message, Replace OSDP
device process will proceed.
81
6 Device
Note
Note
1) Click DEVICE.
2) Right-click on the name of a CoreStation and click Add OSDP Device.
3) The Select OSDP Device Type window appears. Select OSDP Antenna.
82
6 Device
4) A list of ports appears. Among the ports whose Port Status is Available,
select the port to add the OSDP antenna.
6) Right-click the added OSDP antenna and click Auto Add Wireless Door Lock.
83
6 Device
Related Information
You can see the number of users, fingerprints, faces, and cards stored in the device.
You can compare the user information stored in the device with the user information registered in
BioStar 2, transfer the information to BioStar 2 or delete the information.
Note
The Manage Users in Device function is available only when one device is selected.
1) Click DEVICE.
2) Select a device and click Manage Users in Device. A comparison of the user information
registered within the device and the user information registered within BioStar 2 is displayed.
84
6 Device
Same: The user's information is the same as the information registered within BioStar 2.
Different: The user's information is different from the information registered with BioStar 2.
New User: The user has not been registered with BioStar 2.
3) After selecting user information, click Delete to delete it or click Upload to upload it to BioStar 2.
When you click Upload, if BioStar 2 contains user information of the same ID, it can be updated
with the information in the device.
Note
After registering a device, you can edit its details by referring to Editing Device Settings and
Information.
When you delete user information, it is only deleted from the device and the information in
BioStar 2 remains intact.
Upgrading Firmware
You can easily upgrade the firmware on any device connected to BioStar 2 without any additional
connection or action.
Copy the firmware files that you have downloaded to the following folder. If the folder does not exist,
you need to create it.
32-Bit Operating Systems: C: Program Files BioStar 2 firmware
85
6 Device
64-Bit Operating Systems: C: Program Files BioStar 2(x64) firmware
1) Click DEVICE.
2) Select a device and click Firmware Upgrade. Multiple devices of the same type can be batch
upgraded.
Note
It is possible to upgrade a number of devices with the same RS-485 mode simultaneously. For
example, a number of master devices can be upgraded simultaneously and a number of slave
devices can be upgraded simultaneously as well.
It is possible to upgrade a number of master devices or slave devices that have no master
device simultaneously.
It is not possible to upgrade a number of slave devices which is connected to the same
master device simultaneously.
Related Information
Information
You can edit detailed information of registered devices. For more information on registering devices,
see Basic Search and Registration or Advanced Search and Registration.
The details shown may vary depending on the RS-485 connection type or the device type.
1) Click DEVICE.
86
6 Device
2) Click a device on the device list to edit.
3) Edit the fields by referring to Information, Network, Authentication, Advanced Settings, Thermal &
Mask, SIP Intercom, RTSP, DM-20, OM-120, CoreStation and Wiegand Device.
4) To edit information of multiple devices, select multiple devices and click Batch Edit.
5) Click of the field you want to edit and edit the information.
6) After editing all information, click Apply.
Note
The fields displayed for Batch Edit may vary depending on the device type selected.
If you select both master devices and slave devices and click Batch Edit, only some of the
Authentication and Display/Sound fields can be edited.
Auth Mode can be batch edited only when devices with the same model name are selected.
87
6 Device
Information
You can enter or edit the name and the group of a device. If a new firmware version is available, you
can upgrade to it.
Firmware
3 Click Upgrade to install a new firmware version.
Version
Kernel
4 View the kernel version.
Version
Daylight Apply the daylight saving time to the device. To add a new daylight saving
7
Saving Time time rule, see Daylight Saving Time.
Change the device group. For more information on adding device groups,
8 Group
see Adding and Managing Device Groups.
Product
10 View the model name.
Name
88
6 Device
No. Item Description
Hardware
11 View the hardware version.
Version
12 Locked Unlock button will be available when the device is disabled via Trigger &
Action.
Time
Synchroniza Select the option to synchronize the time information of the device with the
13
tion with server.
Server
Click to manually set the date and time. If the Time Synchronization
Date and
14 with Server option is selected, the date and time cannot be selected
Time
manually.
15 Get Time Click the button to fetch the time set in the device.
16 Set Time Click the button to apply the time set in BioStar 2 to the device.
Note
Make sure to set the correct date and time as they are recorded in the Event Log and the
Real-time Log.
Network
You can configure various connection settings such as TCP/IP and RS-485, etc.
Note
89
6 Device
Use DHCP: Select this option to allow the device to use a dynamic IP
address. If this option is selected, network settings cannot be entered.
IP Address, Subnet Mask, Gateway: Enter network settings of the
device.
Device Port: Enter a port to be used by the device.
DNS Server Address: Enter a DNS server address.
Note
1 TCP/IP
The devices and the firmware versions where a DNS server address
can be entered are as follows.
- BioStation L2 FW 1.0.0 or later
- BioStation A2 FW 1.0.0 or later
- BioStation 2 FW 1.2.0 or later
- BioLite Net FW 2.2.0 or later
- BioEntry Plus FW 2.2.0 or later
- BioEntry W FW 2.2.0 or later
- XPass FW 2.2.0 or later
- XPass S2 FW 2.2.0 or later
- FaceStation 2 FW 1.0.0 or later
90
6 Device
No. Item Description
Turns on or off the wireless LAN. You can also configure the wireless LAN
related settings from the device menu. For the detailed information, refer to
the device's user guide.
2 WLAN
Note
Note
The devices and the firmware versions where a domain address can
be entered for the server address are as follows.
- BioStation L2 FW 1.0.0 or later
3 Server - BioStation A2 FW 1.0.0 or later
- BioStation 2 FW 1.2.0 or later
- BioEntry W2 FW 1.0.0 or later
- BioEntry P2 FW 1.0.0 or later
- FaceStation 2 FW 1.0.0 or later
- BioLite N2 FW 1.0.0 or later
- BioLite Net FW 2.2.0 or later
- BioEntry Plus FW 2.2.0 or later
- BioEntry W FW 2.2.0 or later
- XPass FW 2.2.0 or later
- XPass S2 FW 2.2.0 or later
- XPass 2 FW 1.0.0 or later
- X-Station 2 FW 1.0.0 or later
- BioStation 3 FW 1.0.0 or later
- BioEntry W3 FW 1.0.0 or later
4 Serial You can configure the connection mode, baud rate, and display
91
6 Device
No. Item Description
Note
Intelligent slave is activated only when the RS-485 option for Serial
is set as Default.
The devices and firmware versions that support Intelligent Slave are
as follows.
- BioEntry W2 FW 1.6.3 or later
- BioStation L2 FW 1.6.1 or later
- BioEntry P2 FW 1.4.1 or later
- XPass 2 FW 1.2.3 or later
- X-Station 2 FW 1.1.0 or later
- BioLite N2 FW 1.4.1 or later
- FaceStation F2 FW 1.1.2 or later
- BioStation 3 FW 1.0.0 or later
- BioEntry W3 FW 1.0.0 or later
92
6 Device
No. Item Description
Authentication
Note
93
6 Device
You can configure the authentication modes of the device. BioStar 2 can use
any combinations of fingerprint, ID, card, PIN and face as authentication
modes.
1 Auth Mode Click + Add and create an authentication mode by dragging and dropping
available options. Select a schedule and click OK to register the
authentication mode. If no desired schedule is available, click + Add
Schedule to create it.
For more information on configuring schedules, see Schedules.
94
6 Device
No. Item Description
You can grant full access to users registered within the device without
2 Full Access
setting any access groups.
Note
The devices and the firmware versions where server matching can
be used are as follows.
- CoreStation FW 1.0.0 or later
- BioEntry P2 FW 1.0.0 or later
- BioEntry W2 FW 1.0.0 or later
- BioStation L2 FW 1.0.0 or later
- BioStation A2 FW 1.0.0 or later
Server
3 - BioStation 2 FW 1.2.0 or later
Matching
- BioLite Net FW 2.2.0 or later
- BioEntry Plus FW 2.2.0 or later
- BioEntry W FW 2.2.0 or later
- XPass FW 2.2.0 or later
- XPass S2 FW 2.2.0 or later
- BioLite N2 FW 1.0.0 or later
- XPass D2 FW 1.0.0 or later
- XPass 2 FW 1.0.0 or later
- FaceStation 2 FW 1.4.0 or later
- FaceStation F2 FW 1.0.0 or later
- X-Station 2 FW 1.0.0 or later
- BioStation 3 FW 1.0.0 or later
- BioEntry W3 FW 1.0.0 or later
Server Matching is not available for FaceLite.
Server Matching of Visual Face is not available for FaceStation
F2, BioStation 3 and BioEntry W3.
You can set an algorithm step for recognizing a face with a camera built in a
Face device when a user tries to authenticate.
5
Detection If it is set to Normal, it can detect a face at an arm’s length. If it is set to
High, it can detect a face at a shorter distance. If it is set to Not Use, it
95
6 Device
No. Item Description
Note
1:N Security Level: You can set a security level to use for fingerprint
authentication. The higher the security level is set, the false rejection rate
(FRR) gets higher, but the false acceptance rate (FAR) gets lower.
Scan Timeout: You can set a fingerprint scan timeout period. If the
fingerprint is not scanned within the set time, the authentication fails.
Sensor Sensitivity: You can set a sensitivity level of the fingerprint
recognition sensor. Set the sensor sensitivity higher if you wish to use a
higher sensor sensitivity level and obtain more detailed fingerprint
information.
1:N Fast Mode: You can set the fingerprint authentication speed. Select
Auto to have the authentication speed configured according to the total
amount of fingerprint templates registered within the device.
Template Format: You can view the fingerprint template format.
Matching Timeout: You can set the matching timeout period. If the
8 Fingerprint authentication is not completed within the set time, the authentication
fails.
View Image: Displays the image of the fingerprint on the screen during
the authentication process.
Sensor Mode: If the option is set to Auto On, the sensor will
automatically go on when it detects a finger. If the option is set to Always
On, the sensor will always be on.
Advanced Enrollment: Checks the quality of the scanned fingerprint to
avoid the poor quality fingerprint template enrollment. The user will be
alerted when the quality of the fingerprint scanned is low and given
enrollment instructions.
Fingerprint LFD: It is possible to set the live fingerprint detection level. If
the live fingerprint detection level is higher, the false rejection rate on
actual human fingerprints will increase.
Duplicate Check: You can check for duplicates when registering
fingerprints.
96
6 Device
No. Item Description
Note
1:N Security Level: You can set a security level to use for face
authentication. The higher the security level is set, the false rejection rate
(FRR) gets higher, but the false acceptance rate (FAR) gets lower.
Enrollment Time: If a face is not registered during the set time when
registering a user's face, the face registration will be canceled.
Motion Sensor: Set the sensitivity for detecting motion near the device.
Ambient Brightness: Sense the brightness near the device and adjust
the intensity of IR LED.
Enhanced fake face enrollment block: It is possible to set the
Enhanced fake face enrollment block. If the live face detection level is
higher, the false rejection rate on actual faces will increase.
Light Brightness: Adjust the brightness level of IR LED manually. Select
Normal or High to change the level or select Not Use to turn off the light.
Quick Enrollment: Set whether or not to use a Quick Enrollment. When
you set this option to Enabled, the face registration procedure is set to 1
Face / step. If you set the option to Disabled, it is set to 3 steps. To register
9
Visual Face high-quality face templates, disable Quick Enrollment.
Face Detect Setting: Set the environment for recognizing the user's
face during face authentication.
- Maximum Head Pose Angle: Set maximum angle of head rotation.
- Detection Distance: Set the minimum and maximum detection
distance.
- Wide Search: Set to ON, search for a face in the entire camera image.
Operation Mode: Set the operation mode of the device when the face is
authenticated.
- Fusion Matching Mode: Use both visual and infrared cameras to
increase the face authentication accuracy.
- Fast Matching Mode: The device authenticates users who pass an
access point without a pause within the authentication distance.
Fake Detection: The device prevents user authentication using fake
faces, such as photos. It is available when Operation Mode is set to
Fusion Matching Mode.
Duplicate Check: You can check for duplicates when registering faces.
97
6 Device
No. Item Description
Note
Note
98
6 Device
No. Item Description
CSN Card: You can select the CSN card and format type and set the byte
order.
Note
If Format Type is set to Nornal, the device will read the card serial
number (CSN). If the option is set to Wiegand, the device will read
the card serial number in a Wiegand format that the user has
defined.
If Format Type is set to Wiegand, you can select the Wiegand
format to be used in the device. To set a new Wiegand format, refer
to Wiegand.
When Byte Order is set to MSB, the device reads a card ID from the
highest byte to the lowest byte. For example, the highest byte of the
card ID 0x12345678 is 0x12 and the device sequentially reads 0x12,
0x34, 0x56 and 0x78. When the option is set to LSB, the device
reads a card ID from the lowest byte to the highest byte.
Wiegand Card: You can select a Wiegand card type and set the Wiegand
format.
Note
You can select the Wiegand format to be used in the device. To set
a new Wiegand format, refer to Wiegand.
Note
Custom Smart Card: Select the type of Custom Smart Card issued by a
third party and set Custom Smart Card Layout and byte order. To set a
new smart card layout, refer to Smart / Mobile Card.
Note
The devices and the firmware versions that can use the Custom
Smart Card are as follows.
- XPass D2 FW 1.7.1 or later
99
6 Device
No. Item Description
CSN Mobile: Select the recognition method for the mobile card.
Note
The devices and the firmware versions that can use the Template on
Mobile are as follows.
- BioStation 3 FW 1.2.0 or later
- BioEntry W3 FW 1.0.0 or later
When ToM Output Byte Order is set to MSB, the device reads a
card ID from the highest byte to the lowest byte. When the option is
set to LSB, the device reads a card ID from the lowest byte to the
highest byte.
Note
Changing the fingerprint template format makes all previously stored fingerprints unusable. Be
sure to select the correct template format before registering user fingerprints.
If Full Access is set to Enable, the device cannot be added to an Access Level and Floor
Level.
Related Information
Server
100
6 Device
Advanced Settings
You can set the administrator, display/sound and trigger & action.
Note
Administrator
Note
You can add and manage up to 1,000 administrators. The number of administrators that can
be added depends on the device firmware version.
101
6 Device
No. Item Description
The assigned administrators can use all menu functions such as adding and
1 All
editing users.
The assigned administrators can manage the user information but cannot
2 User
change the display, sound, network and RS-485 settings of the device.
The assigned administrators can change the display, sound, network and
3 Configuration
RS-485 settings of the device but cannot manage the user information.
Note
T&A
You can change the device's name of the T&A event or configure the device's T&A Mode.
102
6 Device
No. Item Description
Mode to Fixed and select the event you want to use as fixed.
The user will be forced to select a T&A event during the authentication
2 T&A
process. The T&A Mode option must be set to By User in order to use the
Required
Require T&A option.
You can set the name of T&A events or you can add schedules which will be
used when you set the T&A Mode as By Schedule.
T&A Key: Lists the keys that you can use for T&A event selection. Choose
3 T&A Event one of the function keys that you want to edit.
Label: You can change the name of the T&A event for the T&A key.
Schedule: You can set a schedule for the By Schedule. The T&A mode
must be set to By Schedule in order to enable this option. For more
Information on configuring new schedules, see Schedules.
Note
For a device with no LCD screen, T&A Mode can set to Fixed or By Schedule. You can register
a fixed T&A event or a T&A event that changes according to the schedule.
Supported devices are BioEntry P2, BioEntry W2, BioEntry Plus, BioEntry W, XPass, XPass S2,
XPass D2 and XPass 2.
Display/Sound
You can edit display and sound settings of the device. You can configure LED or buzzer action for each
event.
Note
BioEntry P2, BioEntry W2, BioLite Net, BioEntry Plus, BioEntry W, XPass, XPass S2,
XPass D2, XPass 2
Note
103
6 Device
firmware 1.7.1 or higher.
Menu Sets the timeout period for changing from the menu screen
3
Timeout to the standby screen.
Backlight Sets the timeout period for the display backlight to turn off
4
Timeout automatically.
6 LED/ Selects an event and set LED or buzzer actions for the event.
Buzzer
104
6 Device
8 Backgroun
d Note
105
6 Device
No. Item Description
2.
N
o Item Description
.
Intercom
3 Speaker Sets the speaker volume when using the Intercom function.
Volume
Intercom Sets the microphone volume when using the Intercom
4 Microphone
function.
Volume
5 Menu Timeout Sets the timeout for the menu screen.
106
6 Device
N
o Item Description
.
Note
1
Home Screen Click Update to apply the configurations to the
0
device instantly.
Clicking Update will not apply when you change
the type of the Background. Click Apply to save
the configuration.
When you set Logo for Home Screen and set
Slide Show Enabled, you can display a slideshow
of maximum 10 images on the home screen. You
can upload an image by clicking Add.
You can configure triggers and actions for each situation. For instance, you can get all alarms to go off
when an authentication fails or disable the device when its RS-485 connection is lost. You can select an
event or you can configure the desired triggers and actions.
107
6 Device
Note
1 Trigger
If you set the trigger as an event, you can select only one event from
the event list.
When configuring a user defined condition by selecting Input or
Input(Event Name Change), if no desired schedule is available,
click + Add Schedule to create it. For more information on
configuring schedules, see Schedules.
When configuring a user defined condition by selecting Input(Event
Name Change), if no desired event name is available, click Add
Event Name to create it. When the event occurs, the event name is
displayed in the Event Log and Real-time Log.
Up to 64 characters may be entered for the event name.
2 Action
Note
108
6 Device
desired signal is available, click + Add Signal to create it.
If you set the trigger as Input(Event Name Change), you can set
the Action to None.
Image Log
You can set an image log event and schedule to be used in the device.
Note
Only for BioStation A2, FaceStation 2, FaceStation F2, X-Station 2 and BioStation 3.
1) Set Enabled for the image log. It is possible to set Preset from Setting > Image Log. For more
information, see Image Log.
2) Click + Add and set a desired event and schedule.
Wiegand
109
6 Device
Input/
1 You can select input/output mode.
Output
Wiegand
You can set a format for Wiegand. For more information on setting a
2 Input
Wiegand format, see Card Format.
Format
You can set the Wiegand signal output mode. If it is set to Normal, a card
will be scanned in the set Wiegand format. If it is set to ByPass, CSN will be
Output sent regardless of Wiegand authentication. ByPass should be set when
3
Mode using the device without an entrance door control function.
If it is set to Normal mode, it is possible to set Fail Code, and select a value
to be transmitted when Wiegand card authentication fails.
4 Pulse Width You can set the pulse width of the Wiegand signal.
Pulse
5 You can set the pulse interval of the Wiegand signal.
Interval
You can select the information output to the device when the user
6 Output info
authenticates.
Secure Tamper
If a tamper event occurs on the device, you can set to delete the entire user information, the entire log,
and the security key stored on the device.
Analog Interphone
Note
110
6 Device
Camera
It is possible to set the camera frequency. If you set the frequency incorrectly in the environment where
the fluorescent light is used, flickering on the image may occur.
Different camera frequencies are used depending on geographic location. 60 Hz is generally used in
U.S., and 50 Hz is used in all other areas.
For the camera frequency of a given area, contact a sales agent.
Note
You can set the detailed settings of thermal camera and mask detection.
Thermal camera with Suprema face authentication devices measures temperature of users passing the
access point and limit the access of users with higher temperature than preset threshold. And the face
authentication devices can also detect masks and restrict access to users without masks.
Note
111
6 Device
Mask Detection: You can set whether to use mask detection or not. If
Mask you select Use (Deny access when failed to detect mask), it refuses
1 Configuratio authentication of users who are not wearing a mask and saves event logs.
n If you select Use (Allow access after leaving log when failed to
detect mask) users who are not wearing a mask can authenticate but
event logs still be saved.
Mask Detect Level: You can set sensitivity for mask detection.
You can set options whether to use the thermal camera and edit the detailed
settings.
Thermal Camera Use: You can set whether to use thermal camera or
not. If you select Use (Deny access when exceeded threshold
temperature), it refuses authentication of users with elevated
temperature than the preset threshold and saves event logs. If you select
Use (Allow access after leaving log when exceeded threshold
temperature), users with elevated temperature than the preset
threshold can authenticate but event logs still be saved.
Celsius/Fahrenheit: Change the unit of temperature.
Thermal
2 Threshold Temp. (? /? ): You can set the minimum and maximum
Camera
temperature values to limit the access. The access of users with a lower
or higher skin temperature than threshold temperature will be restricted
depending on the Thermal Camera Use settings. It can be set in the
range of 1 °C to 45 °C, and the Low value cannot be set higher than the
High value.
Save Temp. Data: Save temperature data. When this mode is Enabled,
it saves both authentication and temperature logs. When this mode is
Disabled, it only saves authentication logs.
Temp. Fail Sound: Set the alerts to trigger when the temperature is
higher than the preset threshold.
Show Infrared Image: Display infrared imaging on the screen of the
112
6 Device
No. Item Description
devices.
Camera Configuration: Configure the thermal camera settings for
accurate measurement.
- Temp. Correction (? ): Depending on the device usage environment,
the temperature can be calibrated to measure as high or low as a certain
value. For example, in an environment where the temperature value is
always measured high by 0.1? , set the temperature compensation value
to -0.1? .
- Distance(cm): Set up the distance between the user and device.
- Emissivity: Set up the emissivity to precisely measure the temperature
of the user.
- Dynamic ROI: If there are lights in the device field of view, you can set
the thermal camera to automatically measure the user's temperature
rather than that light.
- ROI X(%), ROI Y(%), ROI Width(%), ROI Height(%): If you set
Dynamic ROI to Disabled, you can manually set the ROI(Region of
Interest). Set the temperature measurement area by adjusting the size
and position of ROI.
Note
Low and High value settings of Threshold Temp. can be used from
the firmware version below.
- FaceStation 2 FW 1.4.2 or later
- FaceStation F2 FW 1.0.2 or later
It is recommended to maintain the default values of the camera
configuration settings for the best performance. The default values ?
for each option per device are as follows:
FaceStation
Items FaceStation F2
2
Distance(cm) 100 100
Emissivity 0.98 0.98
ROI X(%) 47 30
ROI Y(%) 45 25
ROI Width(%) 15 50
ROI Height(%) 10 55
Set the thermal & mask check mode depending on the desired usage.
113
6 Device
No. Item Description
SIP Intercom
Note
114
6 Device
SIP Server
1 Enter SIP server address.
Address
SIP Server
2 Enter SIP server port.
Port
SIP
3 Note
Username
SIP Username can only enter alphanumeric (case sensitive), and
special characters (+, -, @, .).
Authorizatio
5 Note
n ID
Authorization ID can only enter alphanumeric (case sensitive),
and special characters (+, -, @, .).
115
6 Device
Note
Open Door
7 Button(DTM Set a button to open the door on the phone.
F)
When setting up the Intercom SIP server, it selects the SIP transmission
method.
UDP / TCP / SSL
SIP Server
8
Transport
Note
Outbound
9 Proxy If your SIP service has a separate (outbound) proxy server, set this to Use.
Server
Outbound
Proxy
10 Enter the outbound proxy server address.
Server
Address
Outbound
11 Proxy Enter the outbound proxy server port.
Server Port
If you mind the device displaying extension numbers on the screen, set this
to Not Use.
Display
13 Extension
Note
Number
If Display Name is not set, it will not be possible to distinguish
receivers.
Extension Send to Top: Selected extension number moves to the top of the list.
14
Number CSV Import: Import extension numbers from a CSV file.
CSV Export: Export extension numbers to a CSV file.
Add: Add an extension number
116
6 Device
Delete: Delete an extension number
Reorder: Reorder extension numbers by drag and drop.
Note
RTSP
Note
117
6 Device
Note
DM-20
1) Click DEVICE.
2) Click a DM-20 on the device list to edit.
You can modify the Supervised Input settings. The DM-20 can oversee the
2 Advanced On, Off, Open, and Short status of the device connected to the Supervised
Input port, and can set the terminating resistor as 1 , 2.2 , 4.7 , 10 .
118
6 Device
OM-120
1) Click DEVICE.
2) Click a OM-120 on the device list to edit.
Item Description
IM-120
IM-120 provides instant relay behavior by connecting to BioStar 2 for detected inputs in real-time and it
operates a relay or saves logs for detected inputs while it is disconnected from the master device. You
can edit detailed settings of registered OM-120.
1) Click DEVICE.
2) Click a IM-120 on the device list to edit.
3) Edit the necessary items.
Information
119
6 Device
Item Description
Input
Item Description
You can enter the name of each input port and set the resistance
value, switch, and duration.
120
6 Device
Item Description
input allows you to monitor the on, off, cut, and short status of
the device by detecting the voltage flowing through the device
circuit connected to that port. When Supervised Input
Resister is set to Unsupervised, the supervised input port is
used as a TTL input. 1 , 2.2 , 4.7 and 10 can be set
for the resistance value.
Note
Linkage
Item Description
You can set the action of relay for each input. You can set the
Linkage action of Relay 0 and Relay 1 respectively.
121
6 Device
Item Description
Common
- RS-485 disconnected: You can set whether to trigger an
alarm when the connection with the master device is lost.
- Tamper: You can set whether to trigger an alarm when a
tamper occurs.
AUX: You can set whether to trigger an alarm when an AUX
signal occurs. The AUX port can be used to connect a power
failure detector or a dry contact output from another device.
Input: You can set whether to operate an alarm or a fault when
an input signal occurs. Fault (cut and short) is only activated
when the supervised input is enabled by selecting a resistance
value in the Supervised Input Resister.
1) Click DEVICE.
2) Click a CoreStation on the device list to edit..
3) Edit the necessary items.
Information
Item Description
122
6 Device
Item Description
Display Date: Click to manually set the date and time. If the
Time Synchronization with Server option is selected, the date
and time cannot be selected manually.
System
Get Time: Click the button to fetch the time set in the device.
Set Time: Click the button to apply the time set in BioStar 2 to the
device.
Network
123
6 Device
Item Description
Use DHCP: Select this option to allow the device to use a dynamic
IP address. If this option is selected, network settings cannot be
entered.
IP Address, Subnet Mask, Gateway: To assign a fixed IP to
TCP/IP the device, enter the information of each network. Uncheck Use
DHCP and enter the information.
Device Port: Enter a port to be used by the device. This port is
used for the communication between BioStar 2 and the device.
DNS Server Address: Enter a DNS server address.
Note
Authentication
124
6 Device
Item Description
1:N Security Level: You can set a security level to use for
fingerprint or face authentication. The higher the security level is
set, the false rejection rate (FRR) gets higher, but the false
acceptance rate (FAR) gets lower.
Fingerpri 1:N Fast Mode: You can set the fingerprint authentication speed.
nt Select Auto to have the authentication speed configured
according to the total amount of fingerprint templates registered
within the device.
Template Format: You can view the fingerprint template
format.
Note
CSN Card: You can select the CSN card and format type and set
the byte order.
Note
125
6 Device
Advanced
Item Description
Tamper: You can set the AUX port where the tamper is
Advance connected.
d AC Fail: You can set the AUX port that monitors the power input
signal.
Trigger
& Action
126
6 Device
Item Description
signal.
If a tamper event occurs on the device, you can set to delete the
Secure
entire user information, the entire log, and the security key stored
Tamper
on the device.
Item Description
OSDP Reader
LED/Buzzer Note
127
6 Device
Item Description
Wiegand Device
1) Click DEVICE.
2) Click a Wiegand device on the device list to edit.
128
6 Device
No. Item Description
Tamper Port: Select the input port where the Wiegand device’s tamper
3 Advanced switch is connected.
Switch Type: Select the tamper switch type for the tamper operation.
Green LED Port: Select the control port for the green LED.
Buzzer Port: Select the control port for the buzzer.
You can set the Name, Status, and Authentication of registered wireless door lock.
1) Click DEVICE.
2) Click a wireless door lock on the device list to edit.
2 Authenticati Auth Mode: The wireless door lock can only use CSN card as an
129
6 Device
No. Item Description
authentication mode.
Note
Click + Add, then drag and drop the Card. Select a schedule and
click OK to register the authentication mode. If no desired schedule
on
is available, click + Add Schedule to create it.
For more information on configuring schedules, see Schedule.
You can use the DOOR menu to add the information on doors connected to devices.
You can configure relay, dual authentication, anti-passback, forced open and held open alarm settings of
the device. The door information is then used as a component of the access levels.
Add Door
Editing Doors
2 Page Navigation Buttons and Number of List Rows 6 Door and Group List
130
7 Door
Delete Door: Deletes the selected door from the list.
You can add groups for easy management of multiple doors. Name your door groups according to door
locations or office names for greater convenience.
1) Click DOOR.
2) Right-click on All Door Groups and click Add Door Group.
Note
1) Click DOOR.
2) Right-click on the name of a group you wish to rename and click Rename Door
Group.
3) Enter a name.
Note
131
7 Door
Up to 48 characters may be entered for a door group name.
1) Click DOOR.
2) Right-click on the name of a group you wish to delete and click Delete Door
Group.
Note
Adding Doors
You can configure the doors to use in your access control installation. You can select an entry device and
an exit device, configure Anti-passback settings for improved security, or configure alarms for each
door.
Related Information
Information
You can enter or edit the name, group and description of the door.
132
7 Door
Set a door group. For more information on adding door groups, see Adding
2 Group
and Managing Door Groups.
Configuration
You can configure various settings for the device, exit button, door sensor, etc.
Select a device to use for entry. You can select a device from the list of
registered devices. If no registered device is available, see Basic Search and
Registration, Advanced Search and Registration, Wiegand Device Search and
Registration, or Slave Device Search and Registration.
1 Entry device
Note
133
7 Door
No. Item Description
Note
If Wireless Door Lock is selected for Entry Device, the Door Relay
option does not appear.
3 Exit button The Switch can be set to Normally Closed or Normally Open.
Does not activate relay: You can set the door open request log to
occur but the relay not to operate when the exit button is pressed.
Select a device to use at exit. An exit device can only be used when there is
a slave device connected. If there is no registered slave device, see Basic
Search and Registration, Advanced Search and Registration, Wiegand Device
5 Exit device
Search and Registration, or Slave Device Search and Registration.
If no exit device is selected, the Anti Pass Back tab cannot be edited.
Note
Related Information
Anti Passback
Option
134
7 Door
Open Time: Set the duration for which the door will remain open after a
user authentication is completed. When the authentication is successful,
the relay will be activated for the set time. When this time elapses, the
relay no longer sends the signal to the door.
Note
1 Open Open Time may vary depending on the type of
door lock used.
Lock when door is closed: When the door sensor detects that the door
is closed, the door is locked. This option is not available if Use
Automatic Door is set to ON.
Use Automatic Door: When using an automatic door as an entrance
door, a relay can operate regardless of the status of a door sensor. This
option is not available if Lock when door is closed is set to ON.
You can configure the door to open only when authenticating credentials of
two persons (an ordinary user and an administrator).
Note
Dual
2 Authenticati If you want to use the Dual Authentication feature
on on the device previously set as either the Entry
Device or the Exit Device in Occupancy Limit Zone,
click Zone > Occupancy Limit and set the device
as either the Entry Device or the Exit device again.
For more information, refer to Occupancy Limit
Zone.
135
7 Door
No. Item Description
Anti-passback
You can use Anti-passback to manage the access history and enhance security.
Anti-passback can help prevent the users from using an access card to enter and then passing the card
over to another user. It can also prevent unauthorized persons who have entered by following users
with access privileges from getting out on their own. This feature is available when both an entry device
and an exit device are installed. If Exit Device is set to None, this feature is unavailable.
For more information on configuring exit devices, see Configuration.
Note
A master device and a slave device should be connected via the RS-485 interface in order to
activate the Anti-passback section on the Door page.
Anti PassBack is not available when Timed Anti PassBack is activated.
136
7 Door
No. Item Description
You can set a time period for resetting the Anti-passback feature. The
2 Reset Time maximum possible duration is 7 days (10080 min.). If set to 0, the feature is
not reset.
Timed Anti PassBack can limit frequent entry by setting the initialization time it takes for anti-
passback, which occurs when a user attempts to re-authenticate with the same device after access
authentication, until re-authentication is possible.
Note
For more information, please refer to How to Set Up the Timed Anti Passback.
Anti PassBack is not available when Timed Anti PassBack is activated.
Alarm
You can configure an alarm to go off or the device to lock when the door is opened by force, held open
or an anti-passback violation occurs.
1) Edit all fields of the Alarm tab. To add an action, click + Add.
You can configure alarm actions to be taken when the door is held open.
1 Held Open
Click + Add and select an action. Click OK to add the action.
137
7 Door
No. Item Description
Held Open
2 You can configure the maximum allowed time for the door to remain open.
Time
You can configure alarm actions to be taken when the door is opened by
Forced
3 force.
Open
Click + Add and select an action. Click OK to add the action.
Editing Doors
1) Click DOOR.
2) In the door list, click a door to edit.
3) Edit the details by referring to the instructions in Adding Doors .
4) To edit information on multiple doors, select multiple doors and click Batch Edit.
5) Click of the field you want to edit and edit the information.
6) After editing all information, click OK.
You can configure the elevator to control floors with the access control device and OM-120 by using the
ELEVATOR menu.
138
8 Elevator
Adding Elevators
Editing Elevatos
Note
The ELEVATOR menu will appear when the Advanced or higher license is activated.
2 Page Navigation Buttons and Number of List Rows 6 Elevator and Group List
You can add groups for easy management of multiple elevators. Name your elevator groups according to
elevator locations for greater convenience.
1) Click ELEVATOR.
2) Right-click on All Elevators and click Add Group.
139
8 Elevator
3) Enter a group name.
Note
1) Click ELEVATOR.
2) Right-click on the name of a group you wish to rename and click Rename
Group.
3) Enter a name.
Note
1) Click ELEVATOR.
2) Right-click on the name of a group you wish to delete and click Delete Group.
Note
140
8 Elevator
Adding Elevators
You can configure the elevators to use for the floor control.
Related Information
Information
You can enter or edit the name, group and description of the elevator.
Set an elevator group. For more information on adding door groups, see
2 Group
Adding and Managing Elevator Groups.
Detail
You can select a device to connect to the elevator and floor information.
141
8 Elevator
Note
Note
1 Controller
Only a master device can be selected.
You can select it from the list of registered devices. If there is no
registered device, refer to Basic Search and Registration.
Note
2 Reader
You can select a device among the master device, slave device, and
Wiegand device.
You can select up to 4 readers.
OM-120 cannot be set as the reader.
142
8 Elevator
No. Item Description
3 Module
Note
Enter the total number of floors that you can move using the elevator.
Total
4 Number of
Note
Floors
Up to 192 floors can be entered.
Floor
6 You can set the floor name and the relay number to control the floor.
Settings
Option
You can configure options concerning the activating of the relay of the floor.
Relay Open Time: Set the duration for which the floor button will remain
1
Control activate after a user authentication is completed. When the authentication
is successful, the relay will be activated for the set time. When this time
elapses, the relay no longer sends the signal to the relay of the floor.
143
8 Elevator
No. Item Description
You can configure the floor button to activate only when authenticating
credentials of two persons (an ordinary user and an administrator).
Note
Alarm
An action can be set to be performed when tamper input or a separate input signal is detected.
1) Edit all fields of the Alarm tab. To add an action, click + Add.
144
8 Elevator
1 Trigger Tamper input detection or separate input signal detection can be set.
Editing Elevators
1) Click ELEVATOR.
2) In the elevator list, click an elevator to edit.
3) Edit the details by referring to the instructions in Adding Elevators.
4) To edit information on multiple elevators, select multiple elevators and click Batch Edit.
5) Click of the field you want to edit and edit the information.
6) After editing all information, click OK.
You can use the ACCESS CONTROL menu to create access levels by configuring doors and access
schedules and to configure access groups using access levels and user group information.
The configured access groups are then used as components of the access control.
Note
The Floor Level tab and ADD FLOOR LEVEL button will appear when the Advanced or higher
license is activated.
145
9 Access Control
1
5 Registered Item Search Expand Button
0
After selecting an access group or an access level, you can perform the following actions.
Delete Access Group: Deletes the selected access group from the list.
Delete Access Level: Deletes the selected access level from the list.
Delete Floor Level: Deletes the selected floor level from the list.
You can configure a schedule during which users are allowed to access the door and add it to an access
level.
146
9 Access Control
Note
You can configure access privileges by using access levels and user group information.
147
9 Access Control
Note
You can configure the floor access privileges by using elevators and floor information.
Note
148
9 Access Control
The Floor Level tab and ADD FLOOR LEVEL button will appear when the AC standard
license is activated.
Note
On the Status page, you can view who has the right to access certain doors. You can use a filter or
149
9 Access Control
combine filters to narrow down the result. You can also export the result as a CSV file. There are two
types of the access privilege status view: by user and by door.
Function
Buttons
(Print, CSV You can print the list of logs or save it as a CSV file. Also, the column
3
Export, settings can be modified.
Column
Setting)
Access
4 Privilege Shows the access privilege status of users.
Status List
150
9 Access Control
You can use the USER menu to add users to BioStar 2 or to devices and manage their information.
You can also add users' fingerprints, manage their authentication credentials such as cards and PINs and
use them in access control, or grant administrator privileges.
Enroll Card
Tab buttons for the User and Long-term Idle User list
2 7 User List
pages
5 Advanced Search
151
10 Users
Note
When you select a user, you can perform the following functions.
Batch Edit: Batch edits the information on multiple users. This function is available only when
multiple users are selected.
Transfer to Device: Transfers user information registered with BioStar 2 to devices.
Delete User: Deletes the selected user from BioStar 2. User information registered in
devices is not deleted.
You can add groups for easy management of multiple users. Name your user groups according to users'
organizations for greater convenience.
1) Click USER.
2) Right-click on All User Groups and click Add User Group.
Note
1) Click USER.
2) Right-click on the name of a group you wish to rename and click Rename User
Group.
152
10 Users
Note
1) Click USER.
2) Right-click on the name of a group you wish to delete and click Delete User
Group.
Note
153
10 Users
The information with must be entered.
Add the user's photo. Click + Add Photo to take a photo with a webcam or
select a photo from a PC.
Note
1 Photo For more information about how to enroll profile photo using a
webcam, refer to How to Enroll Profile Photo & Visual Face Using a
Webcam.
Only an image file can be uploaded.
User's photo is required to display the user's image on the mobile
access card.
2 Name Note
Note
3 Department Department is required to display the user's department on the
mobile access card.
It is possible to enter up to 64 characters including spaces or
underbars(_) only.
Note
4 ID When Number is set for User ID Type in Setting > Server, a
number between 1 and 4294967294 can be entered.
When Alphanumeric is set for User ID Type in Setting >
Server, a combination of alphabetic characters and numbers can be
154
10 Users
No. Item Description
entered.
Do not use spaces when entering ID.
Numbers or Alphanumeric characters can be set for the user ID
type. For more details, refer to Server.
Note
8 Login ID Note
Enter the login password. You can change the password level by referring to
Security.
9 Password Note
155
10 Users
No. Item Description
Note
Note
11 Title
Title is required to display the user's title on the mobile access card.
It is possible to enter up to 64 characters including spaces or
underbars(_) only.
12 Telephone Note
Enter the user IP. If you register user IP, you can strengthen the security by
allowing access only when the IP information registered in the account and
the IP information of the PC match.
Note
15 USER IP The user IP can be entered in the format xxx.xxx.xxx.xxx. Each octet
can only be entered in numbers between 0 and 255.
Users whose user IP is not registered can log in regardless of the IP
information of the PC.
When using the cloud, the users can log in regardless of the IP
information of the PC.
3) Enter or select the necessary fields in the Credential tab and click Apply. For more information on
adding credentials, see Adding User Credentials.
Note
156
10 Users
You can refer to the User/Device Management on the Server to learn how to add custom
user fields for extra user information.
Related Information
Server
Export/Import CSV
You can export/import user data in CSV files. This feature is useful when you create users in bulk or
when you transfer users to another 3rd party systems.
Note
If a CSV file to import contains data for custom user fields and the fields do not exist on the
server, then the data for the fields will be ignored during the import process. You can refer to
the Server to learn how to add custom user fields.
If you enter the user information in a language other than English or Korean, save the CSV file
in UTF-8 format.
CSV Export
1) Select users from the user list you intend to save to a CSV file and click .
2) Click CSV Export.
157
10 Users
CSV Import
4) The user data field of the CSV file and the user data field of BioStar 2 are
mapped and displayed automatically. When you click Remap, the fields of the
same name will be remapped.
158
10 Users
5) Click Next after selecting whether to maintain the user data of which user ID
has been already registered to BioStar 2 or overwrite with the CSV file
information.
Note
You can issue Mobile Access Cards via CSV Import. When using Regular
site, 1 credit will be deducted per Mobile Access Card in the Airfob Portal
once CSV import is complete. Disable matching if you do not want to issue
Mobile Access Cards.
If the same data as the Mobile Access Card issued to the user who is
already registered in BioStar 2 exists in the CSV file, data can be
maintained or overwritten, and the existing Mobile Access Card is
maintained.
If there is data different from the mobile access card issued to the user
who is already registered in BioStar 2 in the CSV file, the existing Mobile
Access Card is maintained if the data is retained, and if overwritten, a
new Mobile Access Card is issued to the user.
159
10 Users
When using a dynamic site, if you issue a mobile access card to a user
using CSV import, mobile_start_datetime and
mobile_expiry_datetime fields must be entered.
You cannot issue BioStar 2 QR via CSV import.
You can enroll user's visual face via CSV Import. For more information,
see Enroll Visual Face.
You can enroll user's PIN via CSV Import. For more information, see
Adding PIN.
6) If an error occurs during the import of CSV file information, you can upload it
again after checking only the erroneous CSV data.
Note
If there are additional columns in the CSV file other than the basic user
columns, BioStar 2 will fail to import the CSV file.
You can store the data file on external storage (USB) and import to BioStar 2 or device. Up to 500,000
users can be moved from server to device or from device to device.
Note
The exported data file from devices using older firmware version cannot be imported into
BioStar 2. Make sure always use the latest version of firmware.
If you use BioStar 2.8.10 or later, data exported from the previous version of BioStar 2 cannot
be imported.
If you use BioStar 2 latest version, it is impossible to read data from a device using an older
firmware version. Upgrade the device’s firmware to a compatible version. Compatible devices
and firmware versions are as follows.
- BioStation 2 FW 1.9.0 or later
- BioStation A2 FW 1.8.0 or later
- FaceStation 2 FW 1.4.0 or later
- FaceStation F2 FW 2.2.0 or later
- X-Station 2 FW 1.0.0 or later
- BioStation 3 FW 1.3.1 or later
- BioStation 2a FW 1.0.0 or later
If the fingerprint template format is different, the data file cannot be imported. For example,
the data file exported from a device which uses the Suprema fingerprint template format
cannot be imported into a device which uses the ISO fingerprint template format.
When importing user data with visual faces enrolled from FaceStation F2, the existing data
160
10 Users
will be overwritten if there is already visual face data enrolled on BioStar 2 via Upload Image
or a mobile device.
1) Select users from the user list you intend to export to a data file and click .
2) Click Data File Export.
3) Select a device type to apply the exported data file. Only devices with USB port
is displayed.
161
10 Users
Note
The exported data file includes the profile photo, user ID, name, period,
access group, PIN, auth mode, credentials (face, fingerprint, card, mobile
access card, visual face, BioStar 2 QR, QR/Barcode), 1:1 security level.
Be sure that the device is selected correctly. Otherwise, the device cannot
recognize the data file.
You can add various user credentials such as PINs, fingerprints and cards.
Adding PIN
Auth Mode
Enroll Fingerprint
Enroll Face
Enroll Card
162
10 Users
Enroll QR/Barcode
Adding PIN
Add a PIN.
Note
Auth Mode
163
10 Users
Set whether to use Extended Auth Mode. When Extended Auth Mode is set to
Use, the auth mode can be combined including both face and fingerprint.
Extended
1
Auth Mode Note
Note
If Exclude Device Default Authentication Mode is set, only the personal authentication
mode set in BioStar 2 can be used. If Include Device Default Authentication Mode is set,
both the authentication mode set in the device and the personal authentication mode set in
BioStar 2 can be used.
164
10 Users
Enroll Fingerprint
You can add the user's fingerprints if the device supports fingerprint authentication. Fingerprints can be
scanned using a finger scanner or at the installation location.
Note
Select a fingerprint enrollment quality level. Any fingerprint which does not
2 Quality
meet the quality requirement will not be enrolled.
3 View Image Select this option to view the original image when a fingerprint is scanned.
Enroll
4 Click + Add to add a fingerprint. Up to 10 fingerprints can be added.
Fingerprint
165
10 Users
No. Item Description
Fingerprint
5
Image
Click Scan and then place a finger on the fingerprint scanner or the device
9 Scan
sensor.
Note
Fingerprints used for regular access should not be registered as duress fingerprints.
The View Image option shows the fingerprint image but does not store it on BioStar.
If the fingerprint authentication rate is low, delete the existing fingerprint information and add
a new fingerprint.
Use an adequate security level. If 1:1 Security Level is too high, the fingerprint
authentication rate may be too low or the false rejection rate (FRR) may be too high.
For best fingerprint scanning quality, make sure to cover the entire surface of the fingerprint
sensor with the finger. We recommend using the index finger or the middle finger.
Enroll Face
You can add the user's faces if the device supports face authentication.
166
10 Users
Note
When registering a face, maintain a distance of 40cm to 80cm between the device and the
face.
Be careful not to change the facial expression. (smiling face, drawn face, wink, etc.)
If you do not follow the instructions on the screen, the face registration may take longer or
may fail.
Be careful not to cover the eyes or eyebrows.
Do not wear hats, masks, sunglasses or eyeglasses.
Be careful not to display two faces on the screen. Register one person at a time.
It is recommended for a user wearing glasses to register both faces with and without glasses.
Set the sensitivity for the position, angle, and distance of a face when
Face Pose
2 registering the face. Set the sensitivity high if you wish to obtain a detailed
Variation
face template.
5 Use as Select the registered face you wish to use as your profile image.
167
10 Users
No. Item Description
Profile
Image
7 Scan Click Scan and then follow the instructions on the device screen to scan.
Note
If the face authentication rate is low, delete the existing face information and add a new face.
Use an adequate security level. If 1:1 Security Level is too high, the authentication rate may
be too low or the false rejection rate (FRR) may be too high.
Visual Face is a credential that captures the user's face with a visual camera. It is different from face
information captured with an infrared camera and is only available on devices that support Visual Face.
Visual Face can also be registered non-face-to-face using a user's mobile device.
Note
Enroll by Device
168
10 Users
You can enroll a visual face by FaceStation F2, BioStation 3 and BioEntry W3.
1) Click + Visual Face and configure the settings.
Enroll
Click + Add to add a visual face. Up to 2 visual faces can be
2 Visual
added.
Face
Visual
View the scanned or uploaded image. You can also upload
3 Face
image files by dragging and dropping.
Image
Upload
5 Note
Image
Supported image file size is up to 10MB.
Supported image file formats are JPG, JPEG and PNG.
Use as
Select the registered face you wish to use as your profile
7 Profile
image.
Image
169
10 Users
Note
It is recommended to use the same path for the CSV file and visual face
image files to be loaded.
Supported image file size is up to 10MB.
Supported image file formats are JPG, JPEG and PNG.
7) Click Next to complete the CSV import. If an error occurs during the import of
CSV file information, you can upload it again after checking only the erroneous
CSV data.
170
10 Users
You can enroll user’s visual face by importing face image files that match user ID.
1) Click Visual Face Import.
2) Click Browse, select the directory where face image files are stored, then click
Upload.
N
o Item Description
.
171
10 Users
N
o Item Description
.
Add new user by using file name as user ID: If the file
name matches the user ID registered in BioStar 2, the
image is imported, and if there is a file name that does not
match, a new user is added using the file name as the user
ID and the Visual Face is enrolled.
Use as
Check this option if you want to use an imported visual face
3 Profile
as a user's profile image.
Image
3) Click Start to complete the Visual Face Import. If an error occurs during
image file import, BioStar 2 will return a list of image files failed to import, you
can check which face image files are not suitable.
Note
You can send the visible face mobile enrollment link to users via email. Users can
access the link from their mobile device and enroll their visual face directly.
1) Select users from the user list you intend to enroll the visual face and click .
2) Select Send Visual Face Mobile Enrollment Link and then click Yes. The
visual face enrollment link will be sent to the email of the selected user. When
the user completes the upload, the visual face is enrolled in the user
172
10 Users
information.
Note
Complete the email settings including SMTP settings before using Visual
Face Mobile Enrollment. Refer to the Email Setting for more information.
You can check whether the email was successfully sent or not in the audit
trail. See the Audit Trail for more information.
If the user receiving the visual face mobile enrollment link uses an
external email application, the language of the email application must be
set to the language of their country. If the language does not support
Unicode, the text in the email may be broken.
When the user clicks on Visual Face Mobile Enrollment link, the Visual
Face Enrollment Service is executed as follows.
Follow the instructions on the screen to enroll the visual face.
173
10 Users
You can send the visible face mobile enrollment link to users via email. Users can
access the link from their mobile device and enroll their visual face directly.
See the How to Enroll Profile Photo & Visual Face Using a Webcam for more
information.
Enroll Card
You can assign access cards to users or manage the existing cards.
For the types of card supported by the device, refer to the device manual.
174
10 Users
Registering Smart / Mobile Cards
EM X X X
MIFARE O X O
DESFire O X O
FeliCa O X X
HID Prox X X X
HID iCLASS X X X
1) Click + Card.
2) Select CSN for Card Type.
You can register a card by scanning the card information with the device connected
to BioStar 2.
175
10 Users
a) Select Register by Card Reader for Registration Option.
b) Select the device to scan a card.
c) Click Read Card and scan a card with the device.
Assign Card
Enter Manually
Related Information
1) Click + Card.
2) Select Wiegand for Card Type.
176
10 Users
3) Set a Card Data Format. If no desired card data format is available, see Wiegand to set a
Wiegand format.
4) Select a desired Registration Option.
You can register a card by scanning the card information with the device connected
to BioStar 2.
a) Select Register by Card Reader for Registration Option.
b) Select the device to scan a card. The available devices will be displayed on the
top of device list, if no device is available, see CSN Card Format of
Authentication.
c) Click Read Card and scan a card with the device.
Assign Card
Note
Only the cards with the set Card Data Format will be displayed on the
list.
Enter Manually
177
10 Users
Related Information
It is possible to enroll the Access on card, Secure credential card or Custom smart card.
Note
To set the mobile card, set Active for Mobile Card Enrollment on the User/Device
Management tab of Setting > SERVER.
To issue a smart card or a mobile card, the correct card type must be set. For detailed
contents regarding the card type, refer to Smart / Mobile Card.
1) Click + Card.
178
10 Users
Note
To use Face Template, activate Use Face Template in the Layout tab when
setting the smart card layout in Settings > CARD FORMAT. For detailed contents
regarding the card type, refer to Smart / Mobile Card.
Secure Credential Card: Allows you to save user information (Card ID, PIN, Fingerprint
templates, Face templates) on the card. To use user information stored in BioStar 2, server
matching must be activated.
179
10 Users
Note
To use Face Template, activate Use Face Template in the Layout tab when
setting the smart card layout in Settings > CARD FORMAT. For detailed contents
regarding the card type, refer to Smart / Mobile Card.
Custom Smart Card: You can enroll smart cards issued by third parties. Proceed with
registration based on the selected Registration Option.
Note
The devices and the firmware versions that can use the Custom Smart Card are as
follows.
- XPass D2 FW 1.7.1 or later
- BioEntry P2 FW 1.5.1 or later
- BioEntry W2 FW 1.8.0 or later
- BioStation 2a FW 1.1.0 or later
- X-Station 2 FW 1.3.0 or later
- BioStation 3 FW 1.3.0 or later
- BioEntry W3 FW 1.0.0 or later
To set a new smart card layout, refer to Smart / Mobile Card.
Note
If a mobile card has been issued, it can be used only after the issued card is activated through
the BioStar 2 Mobile app.
It is possible to set card ID for the Secure credential card directly.
The information stored in BioStar 2 is used for the user information to be stored in the smart
card. If the new user information is not stored, incorrect user information may be stored in
the smart card. Also, if the changed user information is not synchronized with the device, the
device may not be able to carry out authentication.
Related Information
180
10 Users
1) Click + Card.
Note
181
10 Users
Related Information
Card Format
You can assign the mobile access to users when using the mobile access in conjunction with Suprema
Airfob Portal.
Mobile Access Card supports registration either of each user individually or of multiple users at once via
CSV Import.
Depending on the issuance method of Mobile Access Card set in the Airfob Portal, the user's email or
phone number should be entered.
Note
For more information about using Suprema Airfob Portal and Mobile Access, see Mobile
Access.
Note
For more information about using Suprema Airfob Portal and Mobile Access, see Mobile
Access.
1) Click + Mobile.
2) Select the Card Type as CSN Mobile.
3) Select a desired Registration Option.
Assign Card
182
10 Users
b) Click the card to be assigned from the list or search for the card.
c) After setting Information and Period, click Enroll.
Note
If the user's photo, department, and title are set in User Information, the
corresponding information can be displayed on the user's mobile access
card. Activate the items to be displayed on the mobile access card.
The Expiry Period is only active when using the site type Dynamic. You
can set the user's mobile access card expiry period and usage period.
Enter Manually
CSN Mobile cards can be registered with a card ID entered manually or a random
card ID.
a) Select Enter Manually for Registration Option.
183
10 Users
Note
Note
If the activation code sent to you via email or text message is lost or deleted, you can reissue
184
10 Users
the activation code by clicking Resend. However, Mobile Access Cards activated in the Airfob
Portal cannot be reissued.
Related Information
Template on Mobile is a Mobile Access card in which the user's biometric templates can be stored so
you can still use biometric authentication although your biometric information is not stored in BioStar 2
server, Airfob Portal, or device.
Template on Mobile can be useful in an environment where you want to use biometrics as a
credential, but can't store biometric information on servers or devices due to privacy concerns.
Because the issuance of Templates on Mobile and the enrollment of biometric templates are separate
processes, users can enroll visual faces directly from a Template on Mobile support device without
facing an administrator.
Note
The devices and firmware versions that support Template on Mobile are as follows.
- BioStation 3 FW 1.2.0 or later
- BioEntry W3 FW 1.0.0 or later
For more information about using Suprema Airfob Portal and Mobile Access, see Mobile
Access.
Mobile access cards can only use either the CSN Mobile card or Template on Mobile.
Only one Template on Mobile can be issued per user.
1) Click + Mobile.
2) Select the Card Type as Template on Mobile.
185
10 Users
Note
If the user's photo, department, and title are set in User Information, the corresponding
information can be displayed on the user's mobile access card. Activate the items to be
displayed on the mobile access card.
The Expiry Period is only active when using the site type Dynamic. You can set the user's
mobile access card expiry period and usage period.
An issuance mail will be sent to the enrolled user's mail. To use it, need to install the Airfob
Pass application via the link in the mail, and then issue the Template on Mobile on the
smartphone.
186
10 Users
5) Tag the issued smartphone to the device and follow the on-screen instructions to enroll visual face
on Template on Mobile.
Note
Related Information
Enroll QR/Barcode
Note
The devices that can use Use QR/Barcode through Scanner are as follows.
- X-Station 2 (XS2-QDPB, XS2-QAPB)
The devices that can use Use QR/Barcode through Camera are as follows.
- X-Station 2 (XS2-ODPB, XS2-OAPB, XS2-DPB, XS2-APB) firmware 1.2.0 or higher
- BioStation 3 (BS3-DB, BS3-APWB) firmware 1.1.0 or higher
- Using Use QR/Barcode through Camera requires a separate device license. For more
information, refer to Device License.
1) Click + QR/Barcode.
2) Select the QR/Barcode Type.
BioStar 2 QR
You can directly issue a QR code that contains an encrypted PIN on BioStar 2.
A QR code will be sent via email registered in user information.
Note
187
10 Users
Note
QR/Barcode
You can register users with QR/Barcodes issued from 3rd party systems.
188
10 Users
Note
1:1 Security Level can set a separate security level for the user regardless of the biometric 1:N
Security Level set in the device.
If there are users who frequently fail authentication because the device's 1:N Security Level is set too
high, authentication failures can be mitigated by setting the 1:1 Security Level low.
Note
If Auth Mode starts with biometric, 1:1 Security Level cannot be applied because the
entered user is not known, and Auth Mode starts with Card or ID only 1:1 Security Level
is applied because user identification is possible.
189
10 Users
Use an adequate security level. If 1:1 Security Level is too high, the fingerprint
authentication rate may be too low or the false rejection rate (FRR) may be too high.
Note
If Automatic User Synchronization is set to Not Used in Setting > Server > User/
Device Management, Sync is not available.
1) Click Sync.
190
10 Users
2) Select the Overwrite users with different information option to overwrite duplicate user
information.
3) Select devices to transfer the information to. Click to search for a device.
4) Click Transfer to transfer the user information.
Related Information
1) Select a user to delete from the device and click Delete From Device.
191
10 Users
Note
The Delete From Device button is activated only when the Automatic User
Synchronization is set as Not Used. You can refer to the User/Device Management for
more detailed information on the Automatic User Synchronization.
Note
When you delete a user, it is only deleted from the device and the user in BioStar 2 remains
intact.
192
10 Users
Note
You can view, edit and delete the users who do not have access events for the recent months.
You can use a filter or combine filters to narrow down the result and export it as a CSV file.
Note
Only users with the operator level of Administrator or User Operator can use the Delete
User menu. You can refer to the Adding User Information for more detailed information on
the operator level.
Migrate all the visual faces from the previous version to the improved visual face algorithm.
193
10 Users
1) Click USER.
2) Click and then select the Visual Face Migration.
3) Click Continue after reading the warning pop-up message, Visual Face Migration process goes
on.
4) When Visual Face Migration is complete, a result popup appears. You can check the total number
of Visual Face enrolled in BioStar 2, and the number of migrations succeeded visual faces and the
migration failed visual faces.
5) If a migration error case occurs, the list of users who have failed migration will be provided as a
CSV file. You can delete the visual faces that have failed migration at once by clicking Delete.
On the ZONE page, you can add anti-passback, fire alarm, schedule lock and schedule unlock zones, and
configure the settings.
194
11 Zone
Anti-passback Zone
Interlock Zone
Muster Zone
Note
The ZONE menu will appear when the Advanced or higher license is activated.
Anti-passback Zone
Anti-passback zone provides an enhanced function than the door based anti-passback feature.
195
11 Zone
1 Information
Name: Enter an anti-passback name.
Type: View the zone type.
Mode: It is possible to set either Local or Global for the range of zone
application. If Local is set, the zone can be set only with the entry devices
and devices connected with RS-485, and if Global is set, the zone can be
set with all devices enrolled in BioStar 2.
Active/Inactive: You can disable the anti-passback zone. Select Active
to enable it.
Anti-passback Type: Select an Anti-passback type.
Reset Time: You can set a time period so that all anti-passback violations
can be deleted. This allows the user to be granted access after the time
Configuratio
2 period. The maximum possible duration is 7 days (10080 minutes). If set
n
to 0, anti-passpack violations will not be deleted and the users who have
previously violated the anti-passback rule will not be granted access.
Entry Confirmed APB: You can set the range to apply the anti-passback.
If Entry Confirmed APB is set to ON, the anti-passback is applied
according to the actual operation of the door that the entry and exit device
are configured. If this option is set to OFF, the rule is applied according to
the user's authentication regardless of the door operation. When set to
Follows door configuration, the anti-passback rule is applied according
to the setting of the Use sensor when Entry Confirmed APB enabled
option of the door.
Entry Devices: Select a device to use for entry. You can select a device
196
11 Zone
No. Item Description
Select an access level. Users who have the access level will not be restricted
4 APB Bypass
by the anti-passback rule.
Related Information
Anti-passback
197
11 Zone
1 Information
Name: Enter a fire alarm zone name.
Type: View the zone type.
Mode: You can set fire alarm in two different modes. Local mode will
allow the master device and slave devices that are connected via RS-485
to be selected. Global mode will allow selection of all devices added to
BioStar 2.
Active/Inactive: Disable the fire alarm zone. Select Active to enable
it.
Door: Select the door(s) to include in the fire alarm zone.
Configuratio Elevator: Select the elevators to include in the fire alarm zone. You can
2
n select multiple elevators.
Device/Input: Click + Add and configure the device to set off the fire
alarm signal.
Note
When Local is set for Mode, either Door or Elevator can be set as
the fire zone.
When Global is set for Mode, both Door and Elevator can be set
as the fire zone at the same time.
3 Alarm Choose the operation to be triggered when a fire alarm signal occurs.
198
11 Zone
Scheduled Lock Zone
You can configure the scheduled lock zone. The scheduled lock zone keeps the door locked based on the
schedule that has been set.
Note
1 Information
Name: Enter a scheduled lock zone name.
Type: View the zone type.
199
11 Zone
No. Item Description
Note
3 Alarm Choose the operation to be triggered when a scheduled lock signal occurs.
Scheduled Select an access level. Users who have the access level will not be restricted
4
Lock Bypass by the scheduled lock rule.
You can configure the scheduled unlock zone. The scheduled unlock zone keeps the door open based on
the schedule that has been set.
Note
1 Information
Name: Enter a scheduled unlock zone name.
Type: View the zone type.
200
11 Zone
No. Item Description
Note
Scheduled
Unlock You can select the access group where the user belongs who can start a
3
Authenticati scheduled unlock.
on
When intrusion alarm zone is used, you can detect trespassing of an unauthorized user to a designated
zone without permission.
201
11 Zone
1 Information
Name: Enter an intrusion alarm zone name.
Type: View the zone type.
Mode: You can check the application range of the zone. Only Local mode
Configuratio is supported for intrusion alarm zone, and the zone can be set only with
2
n devices connected to the entry device and RS-485.
Active/Inactive: You can disable the intrusion alarm zone. Select
Active to enable it.
Door: Select the doors to include in the intrusion alarm zone.
Delay Time: You can set the delay time to arm or disarm. Arm is the
delay time from the authentication to the arm, and Disarm is the delay
time from the intrusion detection to the alarm occurs.
Arm / Access Card: You can add a card with permission to arm or disarm. You
3 Disarm can register up to 128 access cards.
Setting Access Group: You can add an access group with permission to arm or
disarm. You can register up to 128 access groups.
Arm/Disarm Setting: You can set the arming and disarming by device
or input signal. Click + Add and set each item.
202
11 Zone
No. Item Description
Click Device to select a device to control the intrusion alarm zone among
the entry and exit devices of the door, and select Arm Type.
Card, Key, and Card or Key can be selected for the Input type. Only
Card is available as the input type for a device with no LCD screen.
203
11 Zone
No. Item Description
Note
You can set the intrusion detection signal. When you click + Add and set as
shown in the screen below, the device recognizes the detection of intrusion if
Intrusion
4 N/O sensor connected to input port 0 of BioStation L2 sends a signal for
Setting
100(ms).
204
11 Zone
No. Item Description
Note
Set the alarm action to carry out when a specific event occurs at the
intrusion alarm zone.
5 Alarm
Note
Interlock Zone
Interlock zone monitors the status of two or more doors by door sensor and relay state to control that
one door cannot be opened or close if other doors are open or unlocked. You can also disable access if
a user stays within the zone.
205
11 Zone
Note
1 Information
Name: Enter an interlock zone name.
Type: View the zone type.
Mode: You can check the application range of the zone. Only Local mode
is supported for interlock zone, and the zone can be set only with devices
Configuratio
2 connected to the CoreStation and RS-485.
n
Active/Inactive: You can disable the interlock zone. Select Active to
enable it.
Door: Select the doors to include in the interlock zone. You must select at
least two doors that are the door sensor is connected.
If a user stays in the zone, this option can prevent others from entering the
zone.
3 Option
Note
206
11 Zone
No. Item Description
Set the alarm action to carry out when a specific event occurs at the
interlock zone.
4 Alarm
Note
Muster Zone
The muster zone is used as a place where users gather when an emergency occurs. It can also be used
for the purpose of monitoring the number of users and list of users in a specific area, or for notifying the
manager of alarms and alerts when a user stays in a specific area for a long time.
1 Information
Name: Enter a muster zone name.
Type: View the zone type.
Configuratio Mode: You can check the application range of the zone. Only Global mode
2
n is supported for muster zone, and the zone can be set with all devices
added to BioStar 2.
Active/Inactive: You can disable the muster zone. Select Active to
207
11 Zone
No. Item Description
enable it.
Entry Devices: Select a device to use for entry. You can select a device
from the list of added devices. If no registered device is available, see
Basic Search and Registration, Advanced Search and Registration,
Wiegand Device Search and Registration, or Slave Device Search and
Registration.
Exit Devices: Select a device to use at exit. You can select a device from
the list of added devices. If there is no registered slave device, see Basic
Search and Registration, Advanced Search and Registration, Wiegand
Device Search and Registration, or Slave Device Search and Registration.
Access Group: Set the access group to which the user who will be
staying in the muster zone. Up to 16 access groups can be set.
Max Time Limit: Set the maximum amount of time that user can stay in
the zone. It can be set up to 4320 minutes, and an alarm occurs when the
user stays in the muster zone exceeding the specified time.
Set the alarm action to carry out when a specific event occurs at the muster
zone.
3 Alarm
Note
You can manage and control the population density of certain areas with Occupancy Limit Zone to
prevent overcrowding. You can also monitor the occupancy limit zone status or set an alert to get
notified when the zone has reached capacity.
Note
208
11 Zone
Note
Mode: Check the application range of the zone. It only supports Global
mode for the occupancy limit zone.
Active/Inactive: Deactivate the occupancy limit zone. If the zone is
deactivated, both Count that refers to the number of users in the zone and
Count Bypass settings will be initialized. Select Active to enable it.
Entry Devices: Select a device to use for entry. You can select a device
from the list of added devices. If no registered device is available, see
Basic Search and Registration or Advanced Search and Registration.
Exit Devices: Select a device to use at exit. You can select a device from
Configuratio the list of added devices. If there is no registered slave device, see Basic
2
n Search and Registration or Advanced Search and Registration.
Limit: Enter the number of users who will be restricted from entering the
zone. If the number of users in the zone reaches the limit, entry will be
restricted. You can enter a number from 0 to 10,000, and if it is set to 0,
people can enter the zone without limit.
Auto Count Reset: Set the time to automatically initialize Count. The
Count will be initialized at the time you set every day.
Count Alert: Set an alert to an administrator or set to save event logs
before Count reaches the occupancy limit. When Count Alert is activated,
the input field for Alert 1 appears. Click the to set Alert 2.
Network Failure Action: Set whether to allow users to enter or leave
when a network error occurs in the device set in the zone. If you set it to
209
11 Zone
No. Item Description
Allow Entry and Exit, it stops entry restrictions when the device loses
network connection, and people can enter the zone even if Count in the
zone exceeds the occupancy limit.
Note
Set Count Bypass by selecting bypass groups to allow users in the group to
enter the zone at any time without affecting the number of Count. The
Bypass Count column displays the number of people from Count Bypass in
the zone list.
Count
3
Bypass Note
It is not able to use the Count Bypass feature when you set Thermal
& Mask Check Mode as Check without authentication while
using the device with a thermal camera.
Up to 16 bypass groups can be added.
The list of the registered occupancy limit zones will be display and it shows the current status of zones.
210
11 Zone
No. Item Description
Initialize both Count and Bypass Count settings. After initialization, user's
2 Reset Count entry and exit logs will be deleted, and Count may be inaccurate depending
on the network status.
You can move a page or set the number of list rows to be displayed on one
page.
Page
: Go to the first page.
Navigation
3 Buttons and : Go to the previous page.
Number of : Enter the page number to move to.
List Rows : Go to the next page.
: Go to the last page.
Deactivate the occupancy limit zone. If the zone is deactivated, both Count
5 Deactivate
and Bypass Count settings will be initialized.
The list of the registered occupancy limit zones will be display and it shows
the current status of zones.
Note
211
11 Zone
No. Item Description
If you have set Limit, you can enter up to 50,000. If you have not
set Limit, you can enter up to 999,999. (numeral character only)
You cannot enter a number above the maximum input value. If the
actual number of people in the zone is greater than the maximum
input value, the value exceeded will not be saved in the database.
You can use the MONITORING menu to view lists of access control events, device and door status, zone
status and the alert history.
You can see and control the status of the doors in real-time in the graphic if you add a graphic map.
List View
Note
The Floor Status, Zone Status and Graphic Map View will appear when the AC standard
license is activated.
The Live Video Viewl menu will appear when the Video license is activated.
212
12 Monitoring
List View
You can see lists of access control events, device and door status, zone status and the alert history.
You can also apply filters to the collected monitoring data and view specific types of monitoring
information.
Event Log
Real-time Log
Device Status
Door Status
Floor Status
Zone Status
Alert History
Thermal Report
Note
The Floor Status and Zone Status menu will appear when the AC standard license is
activated.
The Live Video Viewl menu will appear when the Video license is activated.
Event Log
You can view all the logs of all past events. You can also apply various filters to sort the displayed data.
Note
Make sure to check the time and date setting of the device. For more information on
configuring device time, see Information.
When the image log is set, you can view or store a stored image in its actual size.
Use a separate storage media for the video log. Video logs might not be saved if the video
storage space is reduced by the external processing(such as copying files and creating files),
To change the path to save video logs, see Video.
213
12 Monitoring
2 Period You can set a desired period and sort event logs.
You can move a page or set the number of list rows to be displayed on one
page.
Page
Navigation
3 Buttons and : Go to the first page.
Number of
List Rows : Go to the previous page.
For more information about importing a data file, see Import Event
Logs.
Shows the event log. When an image log exists, it is displayed as and
5 Event Log
you can view or store a captured image in its actual size in PC.
Note
When Log Upload is set to Manual, the user can import the log manually by clicking Update
Log. For how to change log upload setting, refer to Server.
214
12 Monitoring
If Latest is set, the log saved after the date of the log saved last in BioStar 2 will be imported
from the device, and if All is set, all logs of the device will be imported to BioStar 2. You can
also set a date range within which to import logs.
You can view all the logs of all past events. You can also apply various filters to sort the displayed data.
Note
The exported data file from devices using older firmware version cannot be imported into
BioStar 2. Make sure always use the latest version of firmware.
Only data files exported from FacaStation F2, FaceStation 2, FaceLite, BioStation A2,
BioStation 2, X-Station 2 and BioStation 3 can be imported.
Some information of event log may appear as a blank if a door, elevator, or zone is not set by
the BioStar 2.
Real-time Log
Note
Make sure to check the time and date setting of the device. For more information on
configuring the device time, see Information.
The real-time log can only be viewed while the Real-time Log page is displayed. In other
words, when the administrator is viewing another page for changing device settings, etc., the
215
12 Monitoring
real-time log cannot be viewed.
If Log Upload is set to Manual in the Server, the real-time log cannot be viewed.
When the image log is set, you can view or store a stored image in its actual size.
Clears the collected log information. To view the entire event log, see Event
3 Clear Button
Log.
Function
4 Buttons Changes the column setting of the log.
(Column
Setting)
Shows the event log. When an image log occurs, a notification will pop up on
5 Event Log the left side of the browser screen and you can view a captured image in its
actual size of store in PC. You can also press to check.
You can see the screen of IP camera set in Video menu and event log set up in real time. In addition,
Open, Manual Unlock, Manual Lock, and Release functions are available for the door control function.
Note
The Live Video Viewl menu will appear when the Video license is activated.
For more information on registering the NVR and IP camera, see Video.
IP cameras that do not support the live streaming feature are displayed as "Disconnected".
216
12 Monitoring
PC-NVR does not support the live video view.
217
12 Monitoring
No. Item Description
6 Large size The live view screen can be viewed in a large size.
view
Device Status
You can view various device status information such as the device status, alarm and last event.
Function
2 Buttons Changes the column setting of the log.
(Column
Setting)
Door Status
You can view various door status information such as the door status, relay status, alarm and last
event.
You can also apply various filters to sort the displayed data.
218
12 Monitoring
Function
2 Buttons Changes the column setting of the log.
(Column
Setting)
Manual Lock: Click after selecting a door to lock the door manually. If you
set Manual Lock, the door will have remained inaccessible even if a user
authenticates.
Manual Unlock: Click after selecting a door to unlock the door manually.
If you set Manual Unlock, the door will have remained accessible even if a
3 Status List
user does not authenticate.
Release: Release the manual lock or manual unlock set by the
administrator.
Open: Click after selecting a door to open the door temporarily.
Clear Alarm: Clear alarms of all doors. If an alarm is set in the Zone, the
alarm may be continuously output even if the door alarm is released. Click
Clear Alarm on Zone Status.
Clear APB: Reset the anti-passback violation by selecting all or each user.
Note
219
12 Monitoring
Wireless Door Lock Status
1) Click MONITORING > List View > Wireless Door Lock Status.
2) To view log entries of a specific type only, click the of a column and apply a filter.
Function
2 Buttons Changes the column setting of the log.
(Column
Setting)
3 Empty battery: The battery level is almost empty. Please replace the
Status List
battery.
Note
In the Settings > ALERT menu, you can set alarms to occur at
Low battery level, Critical battery level, and Empty battery.
Floor Status
You can view various floor status information such as the floor status, relay status, alarm and last
event.
Note
The Floor Status menu will appear when the Advance or higher license is activated.
220
12 Monitoring
Function
2 Buttons Changes the column setting of the log.
(Column
Setting)
Manual Lock: Click after selecting a floor to lock the floor manually.
3 Status List
Manual Unlock: Click after selecting a floor to unlock the floor manually.
Release: Release the manual lock.
Open: Click after selecting a floor to open the floor temporarily.
Clear Alarm: Clears alarms of all floors.
Zone Status
View zone status information such as the zone active status, alarm status, and the last event that has
occurred.
Note
The Zone Status menu will appear when the Standard or higher license is activated.
To see the current status of Occupancy Limit Zone, click ZONE > Occupancy Limit.
221
12 Monitoring
Function
2 Button Changes the column setting of the log.
(Column
Setting)
Clear APB: Reset the anti-passback violation by selecting all or each user.
This can be only used when selecting an anti-passback zone.
Clear Alarm: Release the anti-passback violation alarm when selecting an
anti-passback zone, and closes the door relays that has been opened by
the fire alarm when selecting a fire alarm zone.
3 Status List
Note
If a muster zone is set, you can check the user's status by clicking
the Muster Status.
Alert History
You can view the history and status of various alerts. You can also apply various filters to sort the
displayed data.
222
12 Monitoring
You can move a page or set the number of list rows to be displayed on one
page.
Function
Buttons
3 (Print, Prints the log or changes the column setting.
Column
Setting)
Thermal Report
223
12 Monitoring
No. Item Description
Page page.
Navigation
4 Buttons and : Go to the first page.
Number of
List Rows : Go to the previous page.
Function You can use the additional features with thermal reports.
Buttons
5 (Print, CSV
Print the event log
Export,
Column Export to CSV file
Setting) Change the column setting
6 Reports Note
Related Information
If you add a graphic map, you can see and control the status of the doors in real-time in the graphic.
You can control the door and relay using the icons in the door status bar and see the alarm when an
event occurs at the door.
Note
The Graphic Map View will appear when the AC standard license is activated.
224
12 Monitoring
Adding and Managing Graphic Map Groups
You can register graphic map groups for easy management of multiple devices. Name your graphic map
groups according to door locations or office names for greater convenience.
Note
Note
225
12 Monitoring
Note
If you add a graphic map, you can see and control the status of the doors in real-time in the graphic.
Note
The max size of the images that can be used as a background is 5MB.
Supported image file formats are BMP, GIF, JPG, JPEG, PNG.
If you back up the BioStar 2 database, the image file registered in the
graphic map may be deleted. If you want to continue using images
registered as a background even after database backup, back up the
image files.
5) Select the door you want to display on the graphic map from the Door. The
door status bar appears.
226
12 Monitoring
N
Item Description
o.
Graphic
1 The uploaded background image appears.
Map
Door
2 You can see the door status and temporarily open the door.
Status
Door
3 You can lock or unlock the door manually.
Relay
You can see or clear the alarm that has occurred on the
5 Alarm
door.
6) Select the zone you want to display on the graphic map from the Zone. The
Zone status bar appears.
N
Item Description
o.
227
12 Monitoring
N
Item Description
o.
Note
You can see or clear the alarm that has occurred on the
2 Alarm
zone.
7) Drag the door and zone status bar to the location of the door and zone in the
graphic map.
8) When setting is finished, click Apply.
You can use the VIDEO menu to interlock an IP camera with an event of the door. You can set the IP
camera to record video or image logs when a set event occurs. Saved videos can be viewed in the
MONITORING menu.
228
13 Video
Adding NVRs
Adding IP Cameras
Note
The VIDEO menu will appear when the Video license is activated.
If you connect BioStar 2 using the Cloud, cannot access to the VIDEO and REPORT menus.
Set the Network Time Protocol (NTP) on a PC with BioStar 2 installed before using the Video
menu. Go to the Control Panel > Date and Time and then click Change setting on the
Internet Time to set up. Use tim e.w indow s.com for the server address.
If the network connection fails, video and image logs that occurred during that period may be
missing.
Adding NVRs
Note
ACTi, Dahua, and Hikvision products can be added for NVR. Before adding NVR, check its
manufacturer.
Set the Network Time Protocol (NTP) to synchronize the time between the BioStar 2 server
and the NVR. Use tim e.w indow s.com for the server address.
PC-NVR does not support the live video view.
NVR types that support the live video view are as follows.
- Dahua: DH-NVR4416-16P, DH-NVR608-32-4K
- Hikvision: DS-7616NI-E2 / 16P, DS-7608NI-E2 / 8P
229
13 Video
Select the manufacturer of NVR. ACTi, Dahua and Hikvision products are
2 Manufacturer
supported.
Note
5 ID
Enter the default administrator account information for the ID. If you
enter the ID after creating a custom administrator account in NVR
setting, the function may not work properly.
Note
Contact the system administrator for the detailed information of NVR (IP, Port, ID,
230
13 Video
Password).
Adding IP Cameras
Note
Before adding an IP camera, add NVR first. For more details, refer to Adding NVRs.
Set the Network Time Protocol (NTP) to synchronize the time between the BioStar 2 server
and the IP camera. Use tim e.w indow s.com for the server address.
3) The list of cameras connected to NVR will appear. Select a camera to add and click + Add. To
select a different NVR, click Prev.
4) After adding the camera, you can set the camera to record a video log according to an event
occurring at the door. For more details, refer to Editing IP Camera Settings.
231
13 Video
You can set the time interval to capture a video log or an image log and link the door and event type to
the IP camera.
Note
You can set Video Log Setting or Image Log Setting according
232
13 Video
No. Item Description
You can set the time to capture a video log or an image log.
Note
You can set Video Log Setting or Image Log Setting according
to the set Log Type.
Note
Recorded video/image logs does not mean the real-time log. It can
view after storing in in BioStar 2 database.
Select a pre-registered entrance door. Click + Add and set a desired event
and schedule.
Note
You can set the time code, shift, and schedule and/or view time card or report by using the TIME
ATTENDACE menu.
Shift
Schedule
Report
233
14 Time & Attendance
Setting
Set according to the following order when registering the schedule for the first time.
You can set the attendance and leave time code, overtime time code, and the go out/outside work/
vacation time code. You can also set the time rate and assign and display a color to make it easily
recognizable.
Related information
Time code
You can set the service rule on a daily basis (24 hours). The shift includes the time code setting, the
start time of day setting and the rounding rule.
Related information
Shift
You can set the schedule template with the shift on a daily basis. You can also set the weekly and daily
schedule template.
Related information
Schedule template
This can be used conveniently when the overtime time code has not been added to the shift. Overtime
set in the service rule has a start time and an end time, but Overtime rule calculates the total time
exceeding the range of regular service time. Overtime rule can be used conveniently for managing
total daily, weekly and monthly overtime hours, and when Overtime rule is set, it applies instead of the
overtime time code added to the shift.
234
14 Time & Attendance
Related information
Overtime Rule
You can set the period, user, overtime rule, and vacation schedule to apply to the schedule template set
in the previous step.
Related information
Schedule
Shift
You can set the time code, time segment for time code, schedule template, and overtime rule. These
are the main components of T&A management.
Time Code
Shift
Schedule Template
Overtime Rule
Time Code
You can set the time code to be used for worktime calculation. It can be set for T&A records, time code
for overtime, and time code for vacation management.
You can assign and use a different time rate for each time code.
235
14 Time & Attendance
No. Item Description
Attendance management: You can set the time code to be used for the
T&A record.
Overtime management: You can set the time code to be used for
overtime.
3 Type Leave management: You can set the time code to be used for go out,
outside work, business trip and vacation.
Note
Set the time rate according to the time code. 1 is the default time rate. If 2
4 Time Rate is set, it is calculated with twice the hourly pay when the set time code is
applied.
3) To save settings, click Apply. To add a shift, click Apply & Next. To save the settings and add
another time code, click Apply & Add New.
Related information
Shift
Shift
You can create a shift by applying a different time code for each hour based on a 24 hour cycle. You can
select either a fixed working shift , flexible working shift or floating working shift and you can set the
start time of day and rounding rule.
236
14 Time & Attendance
N
o Item Description
.
Descript
2 Enter a brief description of the shift.
ion
Set the shift type. The detailed setting varies according to the shift type.
Fixed: You can set the fixed service to attend and leave at a fixed time.
Flexible: You can set the flexible service with no fixed attendance and leave
3 Type
times.
Floating: You can set the floating service with no fixed attendance and leave
times. In this shift type, the shift is automatically applied according to the
attendance time.
237
14 Time & Attendance
N
o Item Description
.
Note
Allowed a day before/after time is activated only when you set the type
of Shift to Fixed.
When Yes is set, the first user authentication time is recorded as check-in time, and
First the last user authentication time is recorded as check-out time.
check-in
5 & Last
Note
check-
out If the First check-in & Last check-out is set to Yes, Break by Punch
should be set for recording the user’s break time.
Time
6 segmen
t
Select the salary code set as T&A record and then set Start time, End time and
Min. Duration.
You can also set Grace, Rounding, Meal deduction and Break Time. When
setting is finished, click Add.
Note
238
14 Time & Attendance
N
o Item Description
.
Set the working hours per day, and then select the time code.
You can also set Punch in Time limit, Punch out Time Limit, Meal deduction,
Rounding, Break Time.
Note
If Flexible is selected for Type, the time code for overtime cannot be
added.
239
14 Time & Attendance
N
o Item Description
.
Select the time code and set Start time, End time, Min. Duration, and Punch in
granted time range.
You can also set Grace, Rounding, Meal deduction, and Break time.
Note
You can set the time rounding rule. Unit is the time to round off to and Point is the
time to apply rounding off. For example, 10 minutes are set for Unit and 7 minutes
are set for Point, an event occurring at 8:05 is considered to have occurred at 8
Roundin and an event occurring at 8:08 is considered to have occurred at 8:10.
7
g Select the item which you intend to use, and then set Unit and Point.
Punch in: You can set the rounding rule to process the registered time when an
240
14 Time & Attendance
N
o Item Description
.
Note
By Punch: You can set it to be deducted according to the record registered in the
device, without a fixed meal deduction time.
Auto: You can set the meal deduction by setting Deduction time and Minimal
Meal hours before deduction.
deducti Fixed: You can set the fixed meal deduction by setting Start time and End time.
8
on
1, 2
Note
You can deduct two meal times from the shift if you use Meal deduction
2.
When using the meal deduction type as Auto or Fixed, Meal deduction 1
and Meal deduction 2 can be set only for the same type.
Break By Punch: You can set it to be confirmed according to the record registered in
9
Time the device, without a fixed break time. If you select By Punch, you can set Max.
allowed break time.
Fixed: You can set the fixed break time by setting Start time and End time.
3) To save settings, click Apply. To add a schedule template, click Apply & Next. To save the
settings and add another shift, click Apply & Add New.
Related information
Schedule Template
Schedule Template
You can create a weekly and daily schedule by using the set shift.
241
14 Time & Attendance
You can set either Weekly or Daily for the schedule template, and when
3 Type
Daily is selected, you can set the period to be used repeatedly.
Weekend
4 You can set the days of the week that you want to use as the weekend.
days
Set drag & drop for the set service rule. To apply all at once, click Copy All.
Note
6 Schedule
To apply a shift that setting the Allowed a day before/after
time, Allowed a day before/after time cannot be set 24 hours
before Day start time on Shift the day before.
3) To save settings, click Apply. To add a schedule, click Apply & Next. To save the settings and
add another schedule template, click Apply & Add New.
242
14 Time & Attendance
Related information
Overtime Rule
Rule
This can be used conveniently when the overtime time code has not been added to the shift. Overtime
set in the shift has a start time and an end time, but Rule calculates the total time exceeding the range
of regular working time. Rule can be used conveniently for managing total daily, weekly and monthly
overtime hours, and when Rule is set, it applies instead of the overtime time code added to the shift.
3 Overtime Daily overtime, Weekly overtime, Monthly overtime rules can set the
overtime time code to be applied after the regular working time, and a
different overtime time code can be applied after a certain time. You can
243
14 Time & Attendance
No. Item Description
also limit the overtime hours for an employee by setting the maximum
overtime hours.
When you set as follows, the 'Overtime management' time code applies from
5 PM to 11 PM if the normal working time is from 8 AM to 5 PM, and the
'Overtime management' time code applies from 11 PM to 2 AM. Also, the
maximum overtime hours for an employee for one day is limited to 9 hours,
and the daily payroll is calculated only using the record of providing work
until 2 AM.
Note
Total working time does not include break time or meal time.
For Weekend overtime and Holiday overtime rules, Time code and Day
start time can be set, and only First check-in & Last check-out can be
set.
3) To save settings, click Apply. To add a schedule, click Apply & Next. To save the settings and
add another rule, click Apply & Add New.
244
14 Time & Attendance
Related information
Schedule
Schedule
You can create a service schedule by assigning the set schedule template, overtime rule, period, and
holiday to a user.
You can also add a temporary schedule or personal vacation to the created service schedule.
Note
Before creating a schedule, check if the Time Code, Shift, Schedule Template, and Holiday
which you will use have been created correctly.
245
14 Time & Attendance
No. Item Description
Note
4 Schedule
Template
If there is no desired schedule template, set one by
referring to the Schedule Template.
Once schedule template is set, it cannot be changed.
Note
5 Period Once the start date is set, it cannot be changed. The
end date can be changed, and when it is changed to
a date which is earlier than the set date, leave events
for the changed period will be deleted.
Select the set vacation schedule. If you do not wish use it,
set None.
6 Holiday Note
Note
The number of users included in the entire schedule cannot exceed the
maximum number of users for the T&A license you chose. To learn more
about the maximum number of users per license, refer to License.
246
14 Time & Attendance
If you have already registered schedule. you can set a different service rule to a user
temporarily.
1) Select a user assigned to the schedule from the list and click a date on the
calendar.
2) Select Add Temporary Schedule and set each item. To apply it to other users
equally, add a user by clicking .
3) When you click Apply, the shift for the set period will be changed.
4) To delete a temporary schedule, click the service schedule of the set temporary
schedule, and then click Yes.
1) Select a user assigned to the schedule from the list and click a date on the
calendar.
247
14 Time & Attendance
2) Select Add Leave and set each item. To apply it to other users equally, add a
user by clicking .
3) When you click OK, the leave will be registered on the set period.
4) To delete a leave, click the registered leave and click Yes.
Note
Report
You can create a T&A report with T&A events of a user collected through the system, and edit or export
time records as a CSV file or a PDF file.
7 preset report filters can be used conveniently, or the administrator can set the filter manually.
BioStar 2 supports Korean and English language. To use multilingual report, please
check the following.
248
14 Time & Attendance
Font Setting
1. Go to [C: Program Files BioStar 2(x64) ta dist setup report_fonts].
2. Create a folder with the language name you want to use. Refer to the ISO 639-
1 standard for language name. For example, to use Spanish, create a folder
named "es".
3. Copy and paste the font file into the folder you created. Only one TrueType Font
is supported.
BioStar 2 uses MariaDB as the default database. If you are using MS SQL database,
please check the following.
When using BioStar 2 with MS SQL database, your PC's memory usage will
accumulate each time you update the report if there are a large number of
registered users. Reset Max Server Memory for the MS SQL database.
Note
249
14 Time & Attendance
Period: Set the period for creating a report to Daily, Weekly, Monthly,
or Custom.
In/Out Only: Select to output only the check-in and check-out logs of the
user to the report.
All Punches: Select to output all punches of the user to the report.
Report
2
Period Note
Update Report: Update the report table to the most recent information.
CSV Export: Save the created report as a CSV file.
PDF Export: Save the created report as a PDF file.
250
14 Time & Attendance
You can update the report for users who have reached their specified working
hours, or notify the administrator by email.
You can update the Working alarm time report weekly.
1) Click TIME ATTENDANCE > Report > Working alarm time Report.
2) Set each item in Filter Conditions and Report Period and then click Update
Report.
3) Set Automated Email if you want to send an email notification to the
administrator for users who have reached their specified working hours.
No
Item Description
.
Report
2 Period: Set the period for creating a report.
Period
Update Report: Update the report table to the most
recent information.
251
14 Time & Attendance
No
Item Description
.
You can notify about users who have reached their specified
working hours for the administrator by email.
Note
You can modify T&A records by clicking the created report table.
Note
In order to modify T&A records, a report must be created first. For details about the creation
of a report, refer to Report.
The attendance and leave record of a user whose T&A schedule has not been registered
cannot be modified.
1) Click a row to modify the record from the created report table.
2) Modify a T&A record or add a leave according to the desired method.
252
14 Time & Attendance
You can set the period for the T&A record to be displayed as
1 Period
a list.
Note
T&A
3 record You can view T&A records according to the set period.
summary
Refresh /
View in You can Refresh T&A records or view T&A records in a
4
calendar calendar.
button
253
14 Time & Attendance
Event You can click each event type to display or hide on the
1
Type calendar.
Note
T&A
4 record You can view monthly the T&A record.
summary
Refresh /
5 View in list You can Refresh T&A records or view T&A records in a list.
button
254
14 Time & Attendance
Setting
You can register a device used for T&A management or set the user list synchronization option.
This is the list of T&A management devices being used currently. To cancel
registration, select the desired device and click Unregister.
You can also change the T&A setting of a registered device by clicking
2 Registered Setting. For details, refer to the device's T&A.
Devices
T&A type is a setting to map the T&A Event Key and T&A event
type(Check In, Check Out, Break Start, Break End, Meal Time Start,
Meal Time End).
255
14 Time & Attendance
No. Item Description
Note
It is possible to edit the device's T&A settings only while the device
is connected.
Sender You can set the sender information to use when sending out notification
3
Information emails.
You can select the delimiter of the document when exporting T&A report to
4 Export
CSV export.
Punchlogs
5 storage You can set the period for storing the punch logs.
duration
Note
When a registered device is deleted in DEVICE menu, the registered T&A management
device will be also deleted automatically.
You can manage the access of visitors by using the VISITOR menu.
You can also set up a PC where visitors can apply for a visit.
Applying to Visit
Managing Visitors
Note
The VISITOR menu will appear when the Visitor license is activated.
256
15 Visitor
2 Page Navigation Buttons and Number of List Rows 7 List of Visitors by Status
Applying to Visit
Visitors can view and accept the terms and conditions or the privacy policy for access.
Visitors with a visit record can also apply for a visit by reusing previously registered information, such as
their name, telephone number, and fingerprint.
Note
You can access the visit application page on the visiting PC. If there is not the shortcut of the
visit application page on the visiting PC, create the shortcut by referring to Visit PC Settings.
If you are visiting for the first time, apply for a visit on the visit application page.
Note
You can access the visit application page on the visiting PC. If there is not the shortcut of the
visit application page on the visiting PC, create the shortcut by referring to Visit PC Settings.
257
15 Visitor
If you visit the site for the first time, apply to visit on the visit application page.
1) Run the visit application page on the visiting PC.
If the Custom Visitor Field is set in the VISITOR setting, that fields
are activated.
Up to 48 characters may be entered for a name.
258
15 Visitor
No. Item Description
Note
5) Click Next.
6) Set the credentials.
7) Click Next.
8) To apply for a visit, click Register.
Related Information
Visitor
Applying to Visit Using Existing Info
Visitors with a visit record can also apply for a visit by reusing previously registered information, such as
their name, telephone number, and fingerprint.
259
15 Visitor
If you have visited the site, you can use your existing visit information again to
request a visit.
2) Enter the name and telephone number and then click Search.
3) Check and accept the terms and conditions or the privacy policy for access and
then click Next.
4) Check the Registration Information. If there are items that need to be
modified, modify each item by referring to Applying to first visit and click Next.
5) Check the Credential. If there are items that need to be modified, modify each
item by referring to Applying to first visit and click Next.
6) To apply for a visit, click Register.
Search by fingerprint
If you have a fingerprint registered in the site of visit, you can search the
fingerprint and apply for a visit using the existing visit information.
260
15 Visitor
2) Click Search at the bottom of the fingerprint icon.
3) Scan your fingerprint to search the registered visitor.
4) If the visitor information is correct, click Yes.
5) Check and accept the terms and conditions or the privacy policy for access and
then click Next.
6) Check the Registration Information. If there are items that need to be
modified, modify each item by referring to Applying to first visit and click Next.
7) Check the Credential. If there are items that need to be modified, modify each
item by referring to Applying to first visit and click Next.
8) To apply for a visit, click Register.
Related Information
Visitor
Applying to First Visit
Managing Visitors
You can check the list of visitors and manage the check in and check out of them. You can also add,
delete, or modify visitor information.
Note
The VISITOR menu will appear when the Visitor license is activated.
261
15 Visitor
Managing Registered Visitors
You can approve a visit or edit the registration information. You can also add or delete visitors.
Note
If there are items that need to be modified, modify each item and click
Edit.
4) Check the Registration Information and then click Approve to approve the
visit.
262
15 Visitor
Note
The Approve button is deactivated for visitors who did not agree to the
terms and conditions when applying for a visit. Click View terms to
provide the visitor with the terms and conditions and request the
agreement. If a visitor does not accept the terms and conditions, the
visitor will be restricted from visiting.
If a card device is set on the visiting PC, the Approve and register
card button is activated. Click Approve and register card to approve
the visit and issue an access card.
263
15 Visitor
Enter Manually
Add Visitors
No
Item Description
.
264
15 Visitor
No
Item Description
.
2 Host Note
Delete Visitors
1) Click Visitor.
2) Click a visitor to delete in the Registered.
265
15 Visitor
Note
Related Information
Applying to Visit
Managing Check In Visitors
Managing Check Out Visitors
Visitor
You can check which visitors have been checked in and edit the registration information of them. And
you can also let the visitors check out.
1) Click VISITOR.
2) Click a visitor in the Checked In.
3) Check the information of the visitor and then click Check Out.
266
15 Visitor
Note
If there are items that need to be modified, modify each item and click Edit.
You can let the visitors check out in the list. The Check Out button is activated if you click
(check box).
You can check which visitors have been checked out and register the visit again using that visitor's
registration information.
1) Click VISITOR.
2) In the Checked Out list, click the visitor to re-register.
3) Click Edit.
267
15 Visitor
4) If there are items that need to be modified, modify each item and click Register.
You can view all visitors that have been registered, checked in, and checked out for the set period. You
can also add visitors.
1) Click VISITOR.
2) Click Total.
268
15 Visitor
Note
You can approve the visit and add visitors in Total. For more details, refer to Managing
Registered Visitors.
You can manage the checked in or checked out visitors in Total. For more details, refer to
Managing Check In Visitors or Managing Check Out Visitors.
You can delete the visitors that have the personal data expired.
Note
Only users with the operator level of Administrator can view the list of visitors who have
expired. You can refer to the Adding User Information for more detailed information on the
operator level.
1) Click VISITOR.
2) Click Personal Data Expired. The visitors that have personal data expired is displayed.
Note
269
15 Visitor
For more information on configuring the period for the credential, see Terms & Visitor
Settings.
In the REPORT menu, create and save user information or various events in BioStar 2 in the desired
format.
Automatically generate the desired reports periodically, and the generated reports can be exported or
printed as CSV or PDF.
Note
If you connect BioStar 2 using the Cloud, cannot access to the VIDEO and REPORT menus.
Generate Report
Settings
Generate Report
270
16 Report
Set a schedule to automatically generate custom reports created by setting the DYNAMIC period.
271
16 Report
Biostar 2 Admin Login is required to use Automatic Report Schedule. For more information, refer
to Biostar 2 Admin Login.
272
16 Report
No. Item Description
Note
Settings
Export report path: Export the report to the saved path. If not entered,
1 Report
it is created in "Documents BioStar2" of the user's PC.
You can use the Setting menu to configure user privileges, language, time, date, access card
management, server connection, doors, etc.
The modifiable items may differ depending on the user permission.
Account
273
17 BioStar 2 Settings
Preferences
Card
Card Format
Server
Schedules
Alert
HTTPS
Cloud
Image Log
USB Agent
Audit Trail
Video
Security
Active Directory
Visitor
Mobile Access
Email Setting
License
Card Printer
System Backup
Account
274
17 BioStar 2 Settings
USER menu.
User: The user can only view own information and T&A records.
Visitor Operator: The user can only use the VISITOR menu.
3) Click + Add and select a user or click to search for a user.
Admin Item
3 Show the group assigned the permission.
Settings
Admin Menu
4 Shows the assigned privileges.
Settings
Shows the list of users assigned with the privileges. Click + Add to add a
5 Add User user.
Click to delete the registered users.
Note
If privileges have already been assigned while adding or editing users, the assigned users are
shown on the list.
Unless a user with the privilege for Edit saves settings after changing the detailed settings of
each menu, the user with a Read privilege only can see the previous information yet to be
275
17 BioStar 2 Settings
modified.
Related Information
Note
The Admin Menu Settings may vary depending on the type of license that is activated.
276
17 BioStar 2 Settings
No. Item Description
Set the detailed permission for each item. You can select groups to assign
the edit and read permissions for each menu.
Admin Item Settings can be set for User Group, Device Group, Door
Group, Elevator Group, Access Group, Zone Type, Graphic Map Group
Admin Item and it can be set based on the already created group information.
3
Settings If there is no group you want, add a new group to that menu. For details
about the creation of a group, refer to Adding and Managing User Groups,
Adding and Managing Device Groups, Adding and Managing Door Groups,
Adding and Managing Elevator Groups, Adding and Managing Access Groups,
Adding and Managing Graphic Map Groups.
Set the edit and read permissions for the menu. A different permission can
be set according to each menu.
Edit: The permission to add, edit, and delete the items of the menu.
Read: The permission to read the items of the menu.
Admin Menu
4 Note
Settings
If you assign the edit permission to each menu, Add Button will
be enabled. However, there is no Add Button in Dashboard and
Setting menu, so it is displayed as N/A. And Add button in
Access Control menu is only enabled when Access Group is
set as All access groups in Admin Item Settings and the edit
permission is assigned.
You can add or view the users assigned with the privilege. If you want to add
5 Add User a user, click + Add to add a user.
Click to delete the registered users.
Note
Refer to the following example for configuring Admin Item Settings and Admin Menu
Settings.
277
17 BioStar 2 Settings
- User: You can see the user information in the 'User Group 01'. However, you cannot add a
new user or edit existing users.
- Device: You can see the device information in the 'Device Group 01'. However, you cannot
add a new device or edit existing devices.
- Door: The setting of doors included in the 'Door Group 01' can be edited or deleted. You
can edit the device of the door included in 'Door Group 01'. You can also add a new door to
'Door Group 01'.
- Elevator: You can see the setting of all the elevators. However, you cannot add a new
elevator or edit existing elevators.
- Zone: You do not have permission.
- Access Control: The setting of access groups included in the 'AC Group' can be deleted.
You can add or delete users and user groups to 'AC Group'.
- Monitoring: You can see the access control events of the devices included in 'Device Group
01'. And you can see the device and door status zone status and the alert history. You can
also see a graphic map of 'All Graphic Maps'. However, you cannot control each status.
If the configuring for Admin Item Settings and Admin Menu Settings do not match, the
permission will not be assigned for that item. If you select the item of the menu by the
account to which this custom permission was assigned, the 'Permission Denied' message is
displayed.
You can add an unlimited number of custom account levels.
Preference
You can change language, time zone, time/date format, and upload a sound file to be used as an alert.
278
17 BioStar 2 Settings
You can configure the BioStar 2 language and time zone settings.
You can configure the date and time format to use in BioStar 2.
Date/Time
2
Format Date Format: Changes the date format.
Time Format: Changes the time format.
a) Click + Add.
3 Sound
Note
279
17 BioStar 2 Settings
No. Item Description
Related Information
Alert
Card
You can view the card status, assigned users, blacklist, etc.
2) Click Unassigned Card, Assigned Card or Blacklist Card to view the list of corresponding cards.
Note
If a card is blocked, the card information will appear in Blacklist Card list. To unblock the
card, select a card and click Unblock.
You can change the Wiegand card data formats in use simultaneously.
Note
The data format of the card already assigned to the user will be changed.
280
17 BioStar 2 Settings
Card Format
It is possible to set the Wiegand type of the card or the website key and layout of the smart / mobile
card.
Wiegand
You can configure the format for reading card data. The card data is processed in the set Wiegand
format.
Note
The data format of the card already assigned to the user will be changed.
281
17 BioStar 2 Settings
Facility You can set whether or not to use a facility code. If you want to use a facility
4
Code Field code, click (check box) and enter a start bit and end bit.
5 ID Field Enter a start bit and end bit of the ID to use. Click + Add to add an ID field.
Note
It is possible to set the layout of smart cards such as MIFARE, iCLASS, DESFire, iCLASS Seos and
mobile.
Note
To set the mobile card, set Active for Mobile Card Enrollment on the User/Device
Management tab of Setting > SERVER.
282
17 BioStar 2 Settings
Smart Card
1 Turn on the option to set up a custom smart card layout.
Type
Note
Note
The Convert to HEX button can only be used when the Smart
283
17 BioStar 2 Settings
No. Item Description
Note
Primary Key: Key which encrypts the communication between the smart
key and the card reader.
Secondary Key: When a secondary key is set, authentication is carried
out using the secondary key when the primary key of the card does not
match. The Secondary Key can only be entered by activating the
Secondary Key at the top.
Start Block Index / Block Index: Select the start block where each
template will be saved. This block is the index of block where user
information will be saved. If the user already has the smart key, set
available block for saving. Setting is available only for MIFARE and iCLASS.
App ID: Set the application ID. This plays a role of directory which
includes file ID. Setting is available only for DESFire.
File ID: Set the file ID. Setting is available only for DESFire.
Encryption Type: It is possible to set the encryption type to DES/3DES or
AES. Setting is available only for DESFire.
ADF Address Value: ADF address where digital credential is stored and
only the iCLASS Seos card is available.
Skip Bytes: You can set the starting point for reading the card number.
Setting is available only for MIFARE, DESFire and FeliCa in Custom Smart
Card mode.
Data Size: (When the set Primary Key and Secondary Key are the
same as the set value of the card) You can set the data size of the card to
be read. Setting is available only for MIFARE, DESFire and FeliCa in
Custom Smart Card mode.
System Code: Please enter the system code for reading FeliCa cards in
hexadecimal, up to 4 digits. Setting is available only for FeliCa in Custom
Smart Card mode.
Service Code: Please enter the service code for reading FeliCa cards in
hexadecimal, up to 4 digits. Setting is available only for FeliCa in Custom
Smart Card mode.
ID Field: Set the card to read specific sectors. Press + Add to configure
up to 8 blocks you want to read. Setting is available only for FeliCa in
284
17 BioStar 2 Settings
No. Item Description
Note
Server
You can configure the BioStar 2 server information, user management, device management and
automatic upgrade settings.
General
Item Description
285
17 BioStar 2 Settings
Item Description
User/Device Management
Item Description
286
17 BioStar 2 Settings
Item Description
Note
287
17 BioStar 2 Settings
Item Description
288
17 BioStar 2 Settings
Item Description
For a combo box field, the items that have been set to the
field are displayed as item. If you want to configure a
combo box field as shown in the screenshot below, you
need to enter Option 1;Option 2;Option 3;Option 4 in the
data field.
Server Matching
289
17 BioStar 2 Settings
Item Description
You can configure server matching. If you use server matching, the
user’s fingerprint will be matched from BioStar 2, not the device.
The Server Matching will appear when the Advance or higher
license is activated.
Note
Item Description
You can set the duration and log level of the system log to be
stored in the database. The system log storage period can be set
System
up to 120 days, and logs is not deleted when setting to 0.
Log Level
Settings
System logs are managed according to pre-defined categories, and
the log level is divided into Trace, Debug, Info, Warning, and Error.
290
17 BioStar 2 Settings
Item Description
The high level contains all lower level logs. For example, when set
to Trace, you can store the logs including Debug, Info, Warning,
and Error logs.
Note
Please inquire your network administrator for any help necessary with the web server
protocol configuration.
Related Information
Real-time Log
You can set the device or BioStar to do a specific operation when a specific event has occurred at the
devices, doors and zones.
291
17 BioStar 2 Settings
N
o Item Description
.
Select a schedule.
Note
2 Schedule
When configuring a user defined condition by selecting Input, if no
desired schedule is available, click + Add Schedule to create it.
For more information on configuring schedules, refer to Schedules.
Setting the Quick Action, you gain the ability to conveniently control
Use as Quick multiple doors simultaneously. Simply click the Quick Action button on the
3
Action BioStar 2 main screen to initiate the command. For more information on
configuring Quick Action, refer to How to Use the Quick Action.
Triggering
5 Note
Event
Event lists may be activated differently depending on the options
selected in Device, Door, and Zone.
Device, Door, Select a device which performs the action. You can select a device, door, or
6
BioStar 2 BioStar 2 to perform an action.
Set a signal to send when the selected triggering event occurs. You can also
set an email to which the log will be sent from BioStar 2.
7 Action
Select BioStar 2 and click to configure the email server information.
To add an email address, click + Add and enter an email address. Click
OK to add the recipient.
Note
For more information on email server information, contact your system administrator.
292
17 BioStar 2 Settings
Schedules
Descripti
2 Enter a short description of the schedule.
on
Time Click on time slots to set a desired schedule and click OK.
4
Slots
293
17 BioStar 2 Settings
No. Item Description
Alert
You can set the alarm type and message to display when a specific event has occurred at the devices,
doors and zones. You can adjust settings so that BioStar 2 can play the uploaded sound file upon the
occurrence of alarms.
294
17 BioStar 2 Settings
Related Information
Preference
295
17 BioStar 2 Settings
HTTPS
In order to connect BioStar 2 through HTTPS, it is necessary to register the IP address where BioStar 2
is installed and install the certificate. For correct network connection, install the certificate before using
BioStar 2.
Note
4) Enter the IP address of the PC where BioStar 2 is installed and click Enrollment.
5) Check the security warning message and click Yes.
6) When you restart the web browser and enter the registered IP address, Secure will appear on the
address bar of the web browser.
Cloud
You need to configure the cloud settings in order to access your BioStar 2 server remotely (outside of
the local network). Additionally, the cloud settings should be done in order to use the BioStar 2 Mobile
app.
Note
The Cloud will available when the Standard or higher license is activated.
If you use BioStar 2 Cloud, cannot connect to BioStar 2 through Internet Explorer or Edge.
If you connect BioStar 2 using the Cloud, cannot access to the VIDEO and REPORT menus.
296
17 BioStar 2 Settings
To use the cloud set it as Use. If you set it as Not Use, it will be unable to
access BioStar 2 using BioStar 2 Mobile.
1 Cloud Use
Note
Enter the subdomain for usage. You can use the subdomain to access
Subdomain BioStar 2 using BioStar 2 Mobile.
2
Name The subdomain is a unique value for identification same as user ID, so use a
unique word such as company names.
Administrat
3 Enter the cloud administrator email.
or e-mail
Cloud
4 Server The Cloud server’s address. Normally set as default.
Address
This is the port number the cloud uses. Normally set as default (52000).
If the cloud does not operate normally, modify the inbound and outbound
rules from the firewall setting on the PC where BioStar 2 is installed. For
Port Used
6 more information, contact the system administrator.
By Cloud
Ports to be added to the inbound rule: BioStar 2 server port (Default
value: 80, user-specification), BioStar 2 cloud port (Default value: 52000,
user-specification)
Ports to be added to the outbound rule: 4443, all ports used by ngrok
Note
297
17 BioStar 2 Settings
For the cloud, BioStar server must always be turned on. If the server loses more than one
week of connection, you must proceed with a re-register process via email.
Image Log
It is possible to set the default value which can be added when using the delete option of image log and
an image log from the device.
It is possible to set the default setting to be used when adding an image log
to the device.
It is possible to add an event and schedule to delete by clicking + Add.
1 Preset
Note
298
17 BioStar 2 Settings
No. Item Description
If this option is on, the profile image registered for a user is displayed on
the Event Log and Real-time Log pages when there are user related
events. This option is particularly useful when you have devices that do not
User Profile have a built-in camera.
4 Image
Option Note
Even if the user profile image option is on, the image captured from
the device camera is displayed when there is an image log for the
event.
Note
The default setting set from Setting > Image Log does not apply to the device. To add or
change an image log of the device, refer to Image Log.
USB Agent
If you want to use the USB Device when logging into BioStar 2 from a client PC, installing the USB Device
Agent is required.
Note
If User Account Control is enabled in Windows, USB Agent cannot be run automatically.
Disable the User Account Control or run as administrator.
299
17 BioStar 2 Settings
Face group matching is the function used to specify a matching group based on the user groups set in
BioStar 2 and authenticate users in that manner.
Note
300
17 BioStar 2 Settings
Group
1 Note
Matching
To disable the group matching while it is being used, all devices set
previously and the group settings must be deleted.
Group
Matching
2 Set a device to use the group matching. Only FaceStation 2 can be added.
Device
Settings
Matching Note
3 Group
Up to 10 matching groups can be created.
Settings
A number of user groups can be set for one matching group.
If the number of face templates included in the user group exceeds
3,000, it cannot be set as a matching group.
Audit Trail
Audit trail tracks user access information as well as all the information changed in the system. You can
set a filter for each item for sorting.
301
17 BioStar 2 Settings
1 Period You can set the previous 1 month or 3 months conveniently for the period.
You can set conditions for each filter item. Click Save Filter to save the
2 Filter
filter.
You can move a page or set the number of list rows to be displayed on one
page.
Function
Buttons
4 (CSV Export, You can save the list of audit list as a CSV file or changes the column setting.
Column
Setting)
Video
You can set the path to save video files and the storage duration.
Note
The VIDEO menu will appear when the Video license is activated.
Use a separate storage media for the video log. Video logs might not be saved if the video
storage space is reduced by the external processing(such as copying files and creating files),
302
17 BioStar 2 Settings
Video
Recording
2 You can set the recording space to store video files.
space
settings
Recording
space
3 If there is insufficient storage space, you can set the file processing method.
managemen
t
Recording
4 Space You can view the video storage space status.
Status
Daylight Saving Time (DST) is a function that adjusts the time to better utilize natural daylight.
303
17 BioStar 2 Settings
Note
You cannot edit or delete a daylight saving time that is already in use.
Security
You can set the password level and the maximum password age. You can also set the maximum invalid
attempts and the maximum password change limit.
Login Password
Item Description
Set the policy for the password complexity for BioStar 2 login.
Password
Level
Low: You can enter up to 32 characters.
304
17 BioStar 2 Settings
Item Description
Note
You can set the period for which you want to use the password. If
the Maximum Password Age is exceeded, a password change
request message is displayed at login.
Maximum
Password
Age Note
You can set the Maximum Password Age from 1 day to 180
days.
You can set the Maximum Invalid Attempts and the time limit. If
you enter the wrong password more than the set number of times,
you will not be able to log in for the time limit.
Maximum
Invalid
Attempts Note
Item Description
305
17 BioStar 2 Settings
Item Description
Note
You can set the personal data encryption key. Click Change
and set a new encryption key. If changing the encryption
key, the existing data will be re-encrypted.
Personal Data
Encryption Key
Note
306
17 BioStar 2 Settings
Item Description
Note
Note
The Advanced Security Settings tab is only active when you log in as the initial
administrator.
Session Security
307
17 BioStar 2 Settings
Item Description
Item Description
Active Directory
You can synchronize user data stored in Microsoft Windows Active Directory to BioStar 2.
Note
The Active Directory setting will appear when the AC Advanced license is activated.
The Active Directory is available for a system environment with Windows Server 2008 R2 or
later.
To use the Active Directory, set the User ID Type to Alphanumeric by referring to User/
Device Management.
308
17 BioStar 2 Settings
You can use the encryption when communicating with a Windows Active
Secure Directory server.
1
transfer Install Active Directory Certificate Services and set the keystore password by
referring to Active Directory Encryption.
Enable logging into BioStar 2 using the Windows Active Directory account.
When this option is activated, the value of the sAMAccountName field in the
Windows Active Directory server is mapped to the BioStar 2 login ID.
Use for
2 BioStar 2
Login Note
Multi-Factor Auth for Login is not available when using the Use
for BioStar 2 Login.
Keystore Enter the Windows Active Directory server encryption key store password.
3
password This can be only used when activating the Secure transfer.
309
17 BioStar 2 Settings
No. Item Description
5 User Name Enter the user name used by Windows Active Directory.
You can find the base domain name in the following way.
a) Run the Active Directory Administrative Center.
7 Base DN
b) Right-click on the node where user data is stored, and then click
Property.
c) In the property window, click Expand and then click Attribute Editor.
d) View the value of distributedName.
User Group Enter the base domain name of the user group for Windows Active Directory.
9
Base DN This can be only used when activating the User Group Filter.
Select the user group to synchronize. This can be only used when activating
10 User Group
the User Group Filter.
You can map data fields in Windows Active Directory to user fields in BioStar
2.
The user fields to be mapped can be set as shown below.
11 User Field
Mapping
a) Click + Add to add a user field slot.
b) Set the BioStar 2 User Field and AD Server Field to map the correct data
to the user field in BioStar 2.
c) Click Update to apply user field mapping settings.
Note
Click Sync Now to synchronize the user data. The last synchronization time
12 Status
and date are displayed.
You can use the encryption when communicating with a Windows Active Directory server.
Set according to the following order when using the encryption for the first time.
310
17 BioStar 2 Settings
To use Windows Active Directory server encryption communication, you must install the Active Directory
Certificate Services.
The Active Directory Certificate Services can be installed as follows:
1) On the PC where the Windows Active Directory server is installed, run Server Manager, and then
click Manage > Add Roles and Features.
2) On Before You Begin, click Next.
3) On Select Installation Type, select Role-Based or feature-based installation and then click
Next.
4) On Select destination server, select Select a server from the server pool, check the server,
and click Next.
5) On Select Server Roles, select Active Directory Certificate Services and click Next.
6) When a pop-up window appears, view the details and click Add Features > Next.
7) View the details of Active Directory Certificate Services and click Next.
8) On Confirm installation selections, click Install. When installation is complete, click Configure
Active Directory Certificate Services on the destination server.
9) When AD CS Configuration wizard appears, view the details and click Next.
10) On Role Services, click Certification Authority > Next.
11) On the Setup Type page, select Enterprise CA and click Next.
12) On the Specify the type of the CA page, select Root CA and click Next.
13) On the Specify the type of the private key page, select Create a new private key and click
Next.
14) Set the Cryptography for CA, CA Name, and Validity Period, and then click Next.
15) On the CA Database page, set the folder location for the certificate database and the
certificate database log and then click Next.
16) On Confirmation page, view the details of Active Directory Certificate Services and click
Configure.
311
17 BioStar 2 Settings
1) Run Command Prompt on the PC where the Windows Active Directory server is installed.
2) Enter certutil -ca.cert client.crt command to copy the root certificate.
3) Enter keytool -import -keystore ad.jks -file client.crt command to convert the server
certificate to .jks format.
4) Save the .jks-formatted server certificate to the BioStar 2 installation path.
Visitor
You can configure visiting sites and PCs. You can also set the terms and conditions for visitors.
And You can create the information fields that you want to know from the visitors by using the Custom
Visitor Field.
Note
The VISITOR setting will appear when the Visitor license is activated.
Activate the Automatic User Synchronization or Use Server Matching option to use the
VISITOR.
Site Settings
Item Description
You can set the access group to use in the visiting PC and
managing PC of each site.
You can also set whether or not to use cards. If you are
using a card, you can also set Card Type and Card Data
Format.
312
17 BioStar 2 Settings
Item Description
Note
Visit PC Settings
No
Item Description
.
Note
313
17 BioStar 2 Settings
Visit PC Select
Item Description
You can select the PC set in Visit PC Setting and assign it to the
Visit PC current PC.
Select
Click Apply to save the setting.
No
Item Description
.
1 Terms and
Note
Conditions
Up to 65,535 characters may be entered for
the sentence of terms and conditions.
Up to 64 characters may be entered for the
sentence of accept terms and conditions.
314
17 BioStar 2 Settings
No
Item Description
.
Note
You can set the period for keeping personal data that
visitors provide when they visit.
315
17 BioStar 2 Settings
Item Description
You can add custom visitor fields for extra visitor information
and these fields appear on the visit application page.
Order: You can set the order of the Custom Visitor Field.
Name: You can set the name of the Custom Visitor Field.
Type: You can choose the Text Input Box, Number Input Box
or Combo Box.
Data: Enter the options to appear in the combo boxes. Each
item is separated by a semicolon (;). Data is only activated
when Type is set to Combo Box.
Note
For a Combo Box, the items that have been set to the
field are displayed as item. If you want to configure a
combo box field as shown in the screenshot below, you
need to enter Option 1;Option 2;Option 3;Option 4
in the data field.
Mobile Access
By linking BioStar 2 and Airfob Portal, you can issue the mobile access cards to users in BioStar 2.
Users can be issued mobile access cards through a link received by email or SMS without signing up for
Airfob Portal or registering mobile access cards separately.
Note
Mobile access cards can only use either the CSN Mobile card or Template on Mobile.
316
17 BioStar 2 Settings
The devices and the firmware versions that can use the CSN Mobile card are as follows.
- XPass 2 FW 1.1.0 or later
- XPass D2(Rev 2) FW 1.4.0 or later
- BioLite N2 FW 1.3.0 or later
- BioEntry W2(Rev 2) FW 1.6.0 or later
- FaceStation 2 FW 1.4.0 or later
- FaceStation F2 FW 1.0.0 or later
- BioStation 2 FW 1.9.0 or later (Only models with NFC features are compatible.)
- BioStation A2 FW 1.8.0 or later (Only models with NFC features are compatible.)
- FaceLite FW 1.2.0 or later
- X-Station 2 FW 1.0.0 or later
- BioStation 3 FW 1.0.0 or later
- BioEntry W3 FW 1.0.0 or later
The devices and the firmware versions that can use the Template on Mobile are as follows.
- BioStation 3 FW 1.2.0 or later
- BioEntry W3 FW 1.0.0 or later
In Airfob Portal, you can set up mobile access cards and registration devices, and manage sites and
credits.
Related information
Airfob Portal
You can set whether to use the mobile access and manage settings related to Airfob Portal.
You can also register devices to use mobile access cards.
Related information
Configuring Mobile Access
You can register devices to use mobile access directly from the Airfob Pass application or BioStar 2.
317
17 BioStar 2 Settings
Related information
Configuring Mobile Access
You can issue mobile access cards to users registered with BioStar 2.
To issue a mobile access card to a user, you must enter user information based on the messaging
option.
Related information
Adding User Information
Enroll Mobile Access Card
Airfob Portal
In Airfob Portal, you can set up mobile access cards and registration devices, and manage sites and
credits.
Note
Note
10) Set the name and country of the site, and then click Next.
318
17 BioStar 2 Settings
11) Select the site type.
Note
You can select types either Dynamic or Regular depending on the type of sites or situations.
- Dynamic: This type allows you to reissue, revoke, or stop mobile access cards or specify
the expiration date of it. It deducts credits according to the period of use or devices. Dynamic
can be used in gyms, libraries, or shared facilities where it provides membership services.
- Regular: This type can be used permanently until an administrator deletes the access
authority. It deducts credits according to the number of issuances. Regular can be used in
companies as employee ID cards or access cards.
BioStar 2 only supports regular card sites. Dynamic cards will be supported in the future.
Note
For more information on using the Airfob Portal, see the Airfob Portal(https://
portal.airfob.com/en).
Configuring Mobile Access
You can set whether to use the mobile access and manage settings related to Airfob Portal.
You can also register devices to use mobile access cards.
Item Description
Mobile Access Setting: You can set whether to use the mobile access. If you set
the Mobile Access Setting to Use, you can issue mobile access cards to users.
Note
General To use Mobile Access with BioStar 2, complete the Airfob Portal sign-up and
initial setup first.
319
17 BioStar 2 Settings
Item Description
Note
You can select types either Dynamic or Regular depending on the type of
sites or situations.
- Dynamic: This type allows you to reissue, revoke, or stop mobile access
cards or specify the expiration date of it. It deducts credits according to the
period of use or devices. Dynamic can be used in gyms, libraries, or shared
facilities where it provides membership services.
- Regular: This type can be used permanently until an administrator deletes
the access authority. It deducts credits according to the number of issuances.
Regular can be used in companies as employee ID cards or access cards.
Domain: You can see the domain address of the Airfob Portal.
Port: You can see the port number of the Airfob Portal.
Site ID: Enter the site ID that you created in the Airfob Portal. You can find the site
ID in Settings > Site menu of the Airfob Portal.
Email: Enter the email address of the mobile access administrator.
Password: Enter the password of the mobile access administrator.
Device Registration: You can register devices to use the mobile access. Device
Registration appears when you complete entering the Domain, Port, Site ID,
Email, and Password, and then click Connect to successfully connect to the
Airfob Portal.
Click + Add to add devices to use the mobile access. The list of devices registered
in BioStar 2 is displayed.
320
17 BioStar 2 Settings
Item Description
The devices that have been added to the list of devices are displayed. Click to
resend the mobile access certificate. Click to delete the registered device.
Note
The devices and the firmware versions that can use the mobile access are as
follows.
- XPass 2 FW 1.1.0 or later
- XPass D2(Rev 2) FW 1.4.0 or later
- BioLite N2 FW 1.3.0 or later
- BioEntry W2(Rev 2) FW 1.6.0 or later
- FaceStation 2 FW 1.4.0 or later
- FaceStation F2 FW 1.0.0 or later
- BioStation 2 FW 1.9.0 or later (Only models with NFC features are
compatible.)
- BioStation A2 FW 1.8.0 or later (Only models with NFC features are
compatible.)
- FaceLite FW 1.2.0 or later
- X-Station 2 FW 1.0.0 or later
- BioStation 3 FW 1.0.0 or later
- BioEntry W3 FW 1.0.0 or later
You can also register devices using the Airfob Pass application.
If you delete the registered device, the mobile access certificate sent to the
device will be deleted.
Email Setting
You can set contents such as title, company name, company logo, and contact of email that will send
users a visual face mobile enrollment link or issue a QR/barcode.
Note
Before setting an email contents, activate the Cloud. The Cloud will be available when the
Standard or higher license is activated.
Enter user's email address in the user information to use visual face mobile enrollment or
Secure QR.
The devices that can use Visual Face are as follows.
- FaceStation F2, BioStation 3, BioEntry W3
The devices that can use Use QR/Barcode through Scanner are as follows.
- X-Station 2 (XS2-QDPB, XS2-QAPB)
321
17 BioStar 2 Settings
The devices that can use Use QR/Barcode through Camera are as follows.
- X-Station 2 (XS2-ODPB, XS2-OAPB, XS2-DPB, XS2-APB) firmware 1.2.0 or higher
- BioStation 3 (BS3-DB, BS3-APWB) firmware 1.1.0 or higher
- Using Use QR/Barcode through Camera requires a separate device license. For more
information, refer to Device License.
No
Item Description
.
1 SMTP Setting
322
17 BioStar 2 Settings
No
Item Description
.
Note
Test Mail Enter an email address to receive the test email and
2 Recipient
click Send Email.
Address
No
Item Description
.
Visual Face To use the visual face mobile enrollment set it as Use. If
1 Mobile you set it as Not Use, it will be unable to send the visual
Enrollment face mobile enrollment link to users.
323
17 BioStar 2 Settings
No
Item Description
.
Note
4 Company Logo
Supported image file formats are GIF, JPG,
JPEG, JPE, JFIF, PNG.
Supported image file size is up to 5MB.
QR
No
Item Description
.
Note
4 Company Logo
Supported image file formats are GIF, JPG,
JPEG, JPE, JFIF, PNG.
Supported image file size is up to 5MB.
324
17 BioStar 2 Settings
No
Item Description
.
License
BioStar 2 License
Item Description
Device License
325
17 BioStar 2 Settings
Device license can be activated on the device using BioStar 2 and USB memory.
Note
No
Item Description
.
Click Browse to load the device license file from the path
License
1 where the device license is saved, and License Type,
File
Device Count, and Device List are displayed.
Camera QR
Note
Note
326
17 BioStar 2 Settings
No
Item Description
.
as below:
- U&Z OSDP Antenna: CX8936
- U&Z Wireless Door Lock: CX217x (Handle),
CX212x (Knob)
You can issue a device license for up to 12 devices
equal to the number of wireless door locks you want
to connect.
The maximum number of wireless door locks that
can be connected with a device license is 12. Even if
you activate multiple device licenses, you cannot
exceed 12 devices.
2) After checking the device list, click Activated to activate the device license. If
the license activation fails, an activation failed message is displayed and you
can try to activate the license again.
327
17 BioStar 2 Settings
Card Printer
In the CARD PRINTER menu, BioStar 2 and cardPresso can be linked to print a card with a design the
user wants from BioStar 2.
Note
To use the card printer feature, you must activate the license issued by cardPresso.
- License type: cardPresso XXL edition
Install cardPresso on the PC where BioStar 2 is installed.
Item Description
cardPresso
Set whether to use a card printer.
Setting
Password Enter your cardPresso login password. The default password is 'admin'.
IP Address Enter the IP address of the PC that runs the cardPresso web print server.
Port Enter the port number used by cardPresso to receive print operations.
Printer Enter the name of the printer to be used as a card printer. It can be found in the
Name Windows Control Panel > Devices and printers.
Click + Add to add a card template. For Name, enter the full path including the card
Card
template file name and extension.
Template
328
17 BioStar 2 Settings
Item Description
Note
The file name of the card template can be entered using alphanumeric, and
special characters.
Up to 20 card templates are supported.
Example path: C: template example.card
For details on how to create a card template, refer to the cardpresso
manual.
Card
Template Test print the card template.
Print Test
System Backup
The SYSTEM BACKUP menu backs up important information such as BioStar 2's database, various
settings, key values, etc.
Note
If the MSSQL database and BioStar 2 are installed on different PCs, BioStar 2 System Backup
and Restore cannot be used.
General Backup
Item Description
329
17 BioStar 2 Settings
Item Description
Backup
To back up manually, click Backup Now.
Now
Item Description
Date Note
330
17 BioStar 2 Settings
Item Description
Time
Note
Related Information
System Restore
System Restore
If BioStar 2 does not operate normally, it can use the BioStar 2 Restore program to restore backed up
files by selecting a restore point.
Note
If the MSSQL database and BioStar 2 are installed on different PCs, BioStar 2 System Backup
and Restore cannot be used.
331
17 BioStar 2 Settings
Note
If the BioStar 2 version at the time of backup is different from the current version, the
restoration will not proceed.
Custom Interface
Note
For any inquires or technical support concerning BioStar 2, please contact the Suprema Technical
Support Team (https://support.supremainc.com).
Company name, your name and job title, country information (regional information), contact
information and the best time to reach you
Current BioStar 2 version and device models (examples: BioStar 2 V1.0.233, BioLite Net)
Details of the error message
BioStar 2 system log
Description of your symptom and problem
This section provides the disclaimers, copyright notice, and software end user license agreement of
Suprema.
Disclaimers
Copyright Notice
332
19 Appendix
Disclaimers
The right to use is acknowledged only for Suprema products included in the terms and
conditions of use or sale for such products guaranteed by Suprema. No license, express or
implied, by estoppel or otherwise, to any intellectual property is granted by this document.
Except as expressly stated in an agreement between you and Suprema, Suprema assumes no
liability whatsoever, and Suprema disclaims all warranties, express or implied including,
without limitation, relating to fitness for a particular purpose, merchantability, or
noninfringement.
All warranties are VOID if Suprema products have been: 1) improperly installed or where the
serial numbers, warranty date or quality assurance decals on the hardware are altered or
removed; 2) used in a manner other than as authorized by Suprema; 3) modified, altered or
repaired by a party other than Suprema or a party authorized by Suprema; or 4) operated or
maintained in unsuitable environmental conditions.
Suprema products are not intended for use in medical, lifesaving, life-sustaining applications,
or other applications in which the failure of the Suprema product could create a situation
where personal injury or death may occur. Should you purchase or use Suprema products for
any such unintended or unauthorized application, you shall indemnify and hold Suprema and
its officers, employees, subsidiaries, affiliates, and distributors harmless against all claims,
costs, damages, and expenses, and reasonable attorney fees arising out of, directly or
indirectly, any claim of personal injury or death associated with such unintended or
unauthorized use, even if such claim alleges that Suprema was negligent regarding the design
or manufacture of the part.
Suprema reserves the right to make changes to specifications and product descriptions at any
time without notice to improve reliability, function, or design.
Personal information, in the form of authentication messages and other relative information,
may be stored within Suprema products during usage. Suprema does not take responsibility
for any information, including personal information, stored within Suprema’s products that are
not within Suprema’s direct control or as stated by the relevant terms and conditions. When
any stored information, including personal information, is used, it is the responsibility of the
product users to comply with national legislation (such as GDPR) and to ensure proper
handling and processing.
You must not rely on the absence or characteristics of any features or instructions marked
"reserved" or "undefined." Suprema reserves these for future definition and shall have no
333
19 Appendix
responsibility whatsoever for conflicts or incompatibilities arising from future changes to them.
Except as expressly set forth herein, to the maximum extent permitted by law, the Suprema
products are sold “as is”.
Contact your local Suprema sales office or your distributor to obtain the latest specifications
and before placing your product order.
Copyright Notice
Copyright of this documentation is reserved by Suprema. All other product names, trademarks,
registered trademarks are the property of their respective owners.
This product contains open-source software. To request the source code covered under GPL, LGPL, MPL,
and other open-source licenses which require distribution of the source code, please visit https://
support.supremainc.com.
You may obtain the source code for three years after our last shipment of this product on our website
(https://support.supremainc.com).
If you want to obtain the source code in the physical medium, the cost of performing such distribution
may be charged. This offer is valid to anyone in receipt of this information.
Open-source licenses and the corresponding license terms for open-source software contained in this
product are as follows:
[This is the first released version of the Lesser GPL. It also counts
334
19 Appendix
as the successor of the GNU Library Public License, version 2, hence
the version number 2.1.]
Preamble
The licenses for most software are designed to take away your freedom
to share and change it. By contrast, the GNU General Public Licenses
are intended to guarantee your freedom to share and change free
software--to make sure the software is free for all its users.
335
19 Appendix
To protect each distributor, we want to make it very clear that there
is no warranty for the free library. Also, if the library is modified
by someone else and passed on, the recipients should know that what
they have is not the original version, so that the original author's
reputation will not be affected by problems that might be introduced
by others.
336
19 Appendix
software only, so we use the Lesser General Public License.
"Source code" for a work means the preferred form of the work for
making modifications to it. For a library, complete source code means
all the source code for all modules it contains, plus any associated
interface definition files, plus the scripts used to control
337
19 Appendix
compilation and installation of the library.
You may charge a fee for the physical act of transferring a copy, and
you may at your option offer warranty protection in exchange for a
fee.
2. You may modify your copy or copies of the Library or any portion of
it, thus forming a work based on the Library, and copy and distribute
such modifications or work under the terms of Section 1 above,
provided that you also meet all of these conditions:
338
19 Appendix
(For example, a function in a library to compute square roots
has a purpose that is entirely well-defined independent of the
application. Therefore, Subsection 2d requires that any
application-supplied function or table used by this function
must be optional: if the application does not supply it, the
square root function must still compute square roots.)
3. You may opt to apply the terms of the ordinary GNU General Public
License instead of this License to a given copy of the Library. To do
this, you must alter all the notices that refer to this License, so
that they refer to the ordinary GNU General Public License, version 2,
instead of to this License. (If a newer version than version 2 of the
ordinary GNU General Public License has appeared, then you can specify
that version instead if you wish.) Do not make any other change in
these notices.
This option is useful when you wish to copy part of the code of the
Library into a program that is not a library.
339
19 Appendix
4. You may copy and distribute the Library (or a portion or derivative
of it, under Section 2) in object code or executable form under the
terms of Sections 1 and 2 above provided that you accompany it with
the complete corresponding machine-readable source code, which must be
distributed under the terms of Sections 1 and 2 above on a medium
customarily used for software interchange.
However, linking a "work that uses the Library" with the Library
creates an executable that is a derivative of the Library (because it
contains portions of the Library), rather than a "work that uses the
library". The executable is therefore covered by this License. Section
6 states terms for distribution of such executables.
When a "work that uses the Library" uses material from a header file
that is part of the Library, the object code for the work may be a
derivative work of the Library even though the source code is
not. Whether this is true is especially significant if the work can be
linked without the Library, or if the work is itself a library. The
threshold for this to be true is not precisely defined by law.
340
19 Appendix
whether or not they are linked directly with the Library itself.
You must give prominent notice with each copy of the work that the
Library is used in it and that the Library and its use are covered by
this License. You must supply a copy of this License. If the work
during execution displays copyright notices, you must include the
copyright notice for the Library among them, as well as a reference
directing the user to the copy of this License. Also, you must do one
of these things:
341
19 Appendix
the above specified materials from the same place.
* e) Verify that the user has already received a copy of these
materials or that you have already sent this user a copy.
For an executable, the required form of the "work that uses the
Library" must include any data and utility programs needed for
reproducing the executable from it. However, as a special exception,
the materials to be distributed need not include anything that is
normally distributed (in either source or binary form) with the major
components (compiler, kernel, and so on) of the operating system on
which the executable runs, unless that component itself accompanies
the executable.
7. You may place library facilities that are a work based on the
Library side-by-side in a single library together with other library
facilities not covered by this License, and distribute such a combined
library, provided that the separate distribution of the work based on
the Library and of the other library facilities is otherwise
permitted, and provided that you do these two things:
8. You may not copy, modify, sublicense, link with, or distribute the
Library except as expressly provided under this License. Any attempt
otherwise to copy, modify, sublicense, link with, or distribute the
Library is void, and will automatically terminate your rights under
this License. However, parties who have received copies, or rights,
from you under this License will not have their licenses terminated so
long as such parties remain in full compliance.
342
19 Appendix
9. You are not required to accept this License, since you have not
signed it. However, nothing else grants you permission to modify or
distribute the Library or its derivative works. These actions are
prohibited by law if you do not accept this License. Therefore, by
modifying or distributing the Library (or any work based on the
Library), you indicate your acceptance of this License to do so, and
all its terms and conditions for copying, distributing or modifying
the Library or works based on it.
10. Each time you redistribute the Library (or any work based on the
Library), the recipient automatically receives a license from the
original licensor to copy, distribute, link with or modify the Library
subject to these terms and conditions. You may not impose any further
restrictions on the recipients' exercise of the rights granted
herein. You are not responsible for enforcing compliance by third
parties with this License.
343
19 Appendix
to distribute software through any other system and a licensee cannot
impose that choice.
13. The Free Software Foundation may publish revised and/or new
versions of the Lesser General Public License from time to time. Such
new versions will be similar in spirit to the present version, but may
differ in detail to address new problems or concerns.
14. If you wish to incorporate parts of the Library into other free
programs whose distribution conditions are incompatible with these,
write to the author to ask for permission. For software which is
copyrighted by the Free Software Foundation, write to the Free
Software Foundation; we sometimes make exceptions for this. Our
decision will be guided by the two goals of preserving the free status
of all derivatives of our free software and of promoting the sharing
and reuse of software generally.
NO WARRANTY
344
19 Appendix
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE
LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME
THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
MariaDB Server
https://mariadb.com/kb/en/legal-documents-mariadb-license/
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
The GPL license
GNU GENERAL PUBLIC LICENSE
Version 2, June 1991
Preamble
========
The licenses for most software are designed to take away your freedom
to share and change it. By contrast, the GNU General Public License is
intended to guarantee your freedom to share and change free
software--to make sure the software is free for all its users. This
General Public License applies to most of the Free Software
Foundation's software and to any other program whose authors commit to
using it. (Some other Free Software Foundation software is covered by
the GNU Library General Public License instead.) You can apply it to
your programs, too.
345
19 Appendix
We protect your rights with two steps: (1) copyright the software, and
(2) offer you this license which gives you legal permission to copy,
distribute and/or modify the software.
Also, for each author's protection and ours, we want to make certain
that everyone understands that there is no warranty for this free
software. If the software is modified by someone else and passed on, we
want its recipients to know that what they have is not the original, so
that any problems introduced by others will not reflect on the original
authors' reputations.
346
19 Appendix
below, refers to any such program or work, and a "work based on
the Program" means either the Program or any derivative work under
copyright law: that is to say, a work containing the Program or a
portion of it, either verbatim or with modifications and/or
translated into another language. (Hereinafter, translation is
included without limitation in the term "modification".) Each
licensee is addressed as "you".
You may charge a fee for the physical act of transferring a copy,
and you may at your option offer warranty protection in exchange
for a fee.
2. You may modify your copy or copies of the Program or any portion
of it, thus forming a work based on the Program, and copy and
distribute such modifications or work under the terms of Section 1
above, provided that you also meet all of these conditions:
b. You must cause any work that you distribute or publish, that
in whole or in part contains or is derived from the Program
or any part thereof, to be licensed as a whole at no charge
to all third parties under the terms of this License.
347
19 Appendix
an announcement including an appropriate copyright notice and
a notice that there is no warranty (or else, saying that you
provide a warranty) and that users may redistribute the
program under these conditions, and telling the user how to
view a copy of this License. (Exception: if the Program
itself is interactive but does not normally print such an
announcement, your work based on the Program is not required
to print an announcement.)
3. You may copy and distribute the Program (or a work based on it,
under Section 2) in object code or executable form under the terms
of Sections 1 and 2 above provided that you also do one of the
following:
348
19 Appendix
machine-readable copy of the corresponding source code, to be
distributed under the terms of Sections 1 and 2 above on a
medium customarily used for software interchange; or,
The source code for a work means the preferred form of the work for
making modifications to it. For an executable work, complete
source code means all the source code for all modules it contains,
plus any associated interface definition files, plus the scripts
used to control compilation and installation of the executable.
However, as a special exception, the source code distributed need
not include anything that is normally distributed (in either
source or binary form) with the major components (compiler,
kernel, and so on) of the operating system on which the executable
runs, unless that component itself accompanies the executable.
5. You are not required to accept this License, since you have not
signed it. However, nothing else grants you permission to modify
or distribute the Program or its derivative works. These actions
are prohibited by law if you do not accept this License.
Therefore, by modifying or distributing the Program (or any work
based on the Program), you indicate your acceptance of this
License to do so, and all its terms and conditions for copying,
distributing or modifying the Program or works based on it.
349
19 Appendix
6. Each time you redistribute the Program (or any work based on the
Program), the recipient automatically receives a license from the
original licensor to copy, distribute or modify the Program
subject to these terms and conditions. You may not impose any
further restrictions on the recipients' exercise of the rights
granted herein. You are not responsible for enforcing compliance
by third parties to this License.
350
19 Appendix
certain countries either by patents or by copyrighted interfaces,
the original copyright holder who places the Program under this
License may add an explicit geographical distribution limitation
excluding those countries, so that distribution is permitted only
in or among countries not thus excluded. In such case, this
License incorporates the limitation as if written in the body of
this License.
10. If you wish to incorporate parts of the Program into other free
programs whose distribution conditions are different, write to the
author to ask for permission. For software which is copyrighted
by the Free Software Foundation, write to the Free Software
Foundation; we sometimes make exceptions for this. Our decision
will be guided by the two goals of preserving the free status of
all derivatives of our free software and of promoting the sharing
and reuse of software generally.
NO WARRANTY
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO
WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE
LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT
WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT
NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE
QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE
PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY
SERVICING, REPAIR OR CORRECTION.
351
19 Appendix
WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY
MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE
LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL,
INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR
INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU
OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY
OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
ONE LINE TO GIVE THE PROGRAM'S NAME AND A BRIEF IDEA OF WHAT IT DOES.
Copyright (C) YYYY NAME OF AUTHOR
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
Also add information on how to contact you by electronic and paper mail.
352
19 Appendix
The hypothetical commands `show w' and `show c' should show the
appropriate parts of the General Public License. Of course, the
commands you use may be called something other than `show w' and `show
c'; they could even be mouse-clicks or menu items--whatever suits your
program.
You should also get your employer (if you work as a programmer) or your
school, if any, to sign a "copyright disclaimer" for the program, if
necessary. Here is a sample; alter the names:
This General Public License does not permit incorporating your program
into proprietary programs. If your program is a subroutine library,
you may consider it more useful to permit linking proprietary
applications with the library. If this is what you want to do, use the
GNU Library General Public License instead of this License.
Node.js
https://nodejs.org/ko/
353
19 Appendix
rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
sell copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
IN THE SOFTWARE.
"""
"""
Copyright Joyent, Inc. and other Node contributors. All rights reserved.
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to
deal in the Software without restriction, including without limitation the
rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
sell copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
IN THE SOFTWARE.
"""
The Node.js license applies to all parts of Node.js that are not externally
maintained libraries.
354
19 Appendix
The externally maintained libraries used by Node.js are:
Additional changes are licensed under the same terms as NGINX and
copyright Joyent, Inc. and other Node contributors. All rights reserved.
The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
355
19 Appendix
FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
IN THE SOFTWARE.
"""
---------------------
356
19 Appendix
THE DATA FILES AND SOFTWARE ARE PROVIDED "AS IS", WITHOUT WARRANTY OF
ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
NONINFRINGEMENT OF THIRD PARTY RIGHTS.
IN NO EVENT SHALL THE COPYRIGHT HOLDER OR HOLDERS INCLUDED IN THIS
NOTICE BE LIABLE FOR ANY CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL
DAMAGES, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE,
DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER
TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
PERFORMANCE OF THE DATA FILES OR SOFTWARE.
357
19 Appendix
shall not be used in advertising or otherwise to promote the sale,
use or other dealings in these Data Files or Software without prior
written authorization of the copyright holder.
358
19 Appendix
#
# The word list in cjdict.txt are generated by combining three word lists
# listed below with further processing for compound word breaking. The
# frequency is generated with an iterative training against Google web
# corpora.
#
# * Libtabe (Chinese)
# - https://sourceforge.net/project/?group_id=1519
# - Its license terms and conditions are shown below.
#
# * IPADIC (Japanese)
# - http://chasen.aist-nara.ac.jp/chasen/distribution.html
# - Its license terms and conditions are shown below.
#
# ---------COPYING.libtabe ---- BEGIN--------------------
#
# /*
# * Copyrighy (c) 1999 TaBE Project.
# * Copyright (c) 1999 Pai-Hsiang Hsiao.
# * All rights reserved.
# *
# * Redistribution and use in source and binary forms, with or without
# * modification, are permitted provided that the following conditions
# * are met:
# *
# * . Redistributions of source code must retain the above copyright
# * notice, this list of conditions and the following disclaimer.
# * . Redistributions in binary form must reproduce the above copyright
# * notice, this list of conditions and the following disclaimer in
# * the documentation and/or other materials provided with the
# * distribution.
# * . Neither the name of the TaBE Project nor the names of its
# * contributors may be used to endorse or promote products derived
# * from this software without specific prior written permission.
# *
# * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
# * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
# * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
# * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
# * REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
# * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
# * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
# * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
359
19 Appendix
# * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
# * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
# * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
# * OF THE POSSIBILITY OF SUCH DAMAGE.
# */
#
# /*
# * Copyright (c) 1999 Computer Systems and Communication Lab,
# * Institute of Information Science, Academia
# * Sinica. All rights reserved.
# *
# * Redistribution and use in source and binary forms, with or without
# * modification, are permitted provided that the following conditions
# * are met:
# *
# * . Redistributions of source code must retain the above copyright
# * notice, this list of conditions and the following disclaimer.
# * . Redistributions in binary form must reproduce the above copyright
# * notice, this list of conditions and the following disclaimer in
# * the documentation and/or other materials provided with the
# * distribution.
# * . Neither the name of the Computer Systems and Communication Lab
# * nor the names of its contributors may be used to endorse or
# * promote products derived from this software without specific
# * prior written permission.
# *
# * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
# * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
# * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
# * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
# * REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
# * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
# * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
# * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
# * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
# * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
# * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
# * OF THE POSSIBILITY OF SUCH DAMAGE.
# */
#
# Copyright 1996 Chih-Hao Tsai @ Beckman Institute,
# University of Illinois
# c-tsai4@uiuc.edu http://casper.beckman.uiuc.edu/~c-tsai4
360
19 Appendix
#
# ---------------COPYING.libtabe-----END--------------------------------
#
#
# ---------------COPYING.ipadic-----BEGIN-------------------------------
#
# Copyright 2000, 2001, 2002, 2003 Nara Institute of Science
# and Technology. All Rights Reserved.
#
# Use, reproduction, and distribution of this software is permitted.
# Any copy of this software, whether in its original form or modified,
# must include both the above copyright notice and the following
# paragraphs.
#
# Nara Institute of Science and Technology (NAIST),
# the copyright holders, disclaims all warranties with regard to this
# software, including all implied warranties of merchantability and
# fitness, in no event shall NAIST be liable for
# any special, indirect or consequential damages or any damages
# whatsoever resulting from loss of use, data or profits, whether in an
# action of contract, negligence or other tortuous action, arising out
# of or in connection with the use or performance of this software.
#
# A large portion of the dictionary entries
# originate from ICOT Free Software. The following conditions for ICOT
# Free Software applies to the current dictionary as well.
#
# Each User may also freely distribute the Program, whether in its
# original form or modified, to any third party or parties, PROVIDED
# that the provisions of Section 3 ("NO WARRANTY") will ALWAYS appear
# on, or be attached to, the Program, which is distributed substantially
# in the same form as set out herein and that such intended
# distribution, if actually made, will neither violate or otherwise
# contravene any of the laws and regulations of the countries having
# jurisdiction over the User or the intended distribution itself.
#
# NO WARRANTY
#
# The program was produced on an experimental basis in the course of the
# research and development conducted during the project and is provided
# to users as so produced on an experimental basis. Accordingly, the
# program is provided without any warranty whatsoever, whether express,
# implied, statutory or otherwise. The term "warranty" used herein
361
19 Appendix
# includes, but is not limited to, any warranty of the quality,
# performance, merchantability and fitness for a particular purpose of
# the program and the nonexistence of any infringement or violation of
# any right of any third party.
#
# Each user of the program will agree and understand, and be deemed to
# have agreed and understood, that there is no warranty whatsoever for
# the program and, accordingly, the entire risk arising from or
# otherwise connected with the program is assumed by the user.
#
# Therefore, neither ICOT, the copyright holder, or any other
# organization that participated in or was otherwise related to the
# development of the program and their respective officials, directors,
# officers and other employees shall be held liable for any and all
# damages, including, without limitation, general, special, incidental
# and consequential damages, arising out of or otherwise in connection
# with the use or inability to use the program or any product, material
# or result produced or otherwise obtained by using the program,
# regardless of whether they have been advised of, or otherwise had
# knowledge of, the possibility of such damages at any time during the
# project or thereafter. Each user will be deemed to have agreed to the
# foregoing by his or her commencement of use of the program. The term
# "use" as used herein includes, but is not limited to, the use,
# modification, copying and distribution of the program and the
# production of secondary products from the program.
#
# In the case where the program, whether in its original form or
# modified, was distributed or delivered to or received by a user from
# any person, organization or entity other than ICOT, unless it makes or
# grants independently of ICOT any specific warranty to the user in
# writing, such person, organization or entity, will also be exempted
# from and not be held liable to the user for any such damages as noted
# above as far as the program is concerned.
#
# ---------------COPYING.ipadic-----END----------------------------------
362
19 Appendix
# License: http://lao-dictionary.googlecode.com/git/Lao-Dictionary-LICENSE.txt
# (copied below)
#
# This file is derived from the above dictionary, with slight
# modifications.
# ----------------------------------------------------------------------
# Copyright (C) 2013 Brian Eugene Wilson, Robert Martin Campbell.
# All rights reserved.
#
# Redistribution and use in source and binary forms, with or without
# modification,
# are permitted provided that the following conditions are met:
#
#
# Redistributions of source code must retain the above copyright notice, this
# list of conditions and the following disclaimer. Redistributions in
# binary form must reproduce the above copyright notice, this list of
# conditions and the following disclaimer in the documentation and/or
# other materials provided with the distribution.
#
#
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
# FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
# COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
# INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
# (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
# SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
# STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
# OF THE POSSIBILITY OF SUCH DAMAGE.
# --------------------------------------------------------------------------
363
19 Appendix
# --------------------------------------------------------------------------
# Copyright (c) 2013, LeRoy Benjamin Sharon
# All rights reserved.
#
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions
# are met: Redistributions of source code must retain the above
# copyright notice, this list of conditions and the following
# disclaimer. Redistributions in binary form must reproduce the
# above copyright notice, this list of conditions and the following
# disclaimer in the documentation and/or other materials provided
# with the distribution.
#
# Neither the name Myanmar Karen Word Lists, nor the names of its
# contributors may be used to endorse or promote products derived
# from this software without specific prior written permission.
#
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
# CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,
# INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
# MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
# DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS
# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
# EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
# TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
# ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR
# TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
# THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
# SUCH DAMAGE.
# --------------------------------------------------------------------------
ICU uses the public domain data and code derived from Time Zone
Database for its time zone support. The ownership of the TZ database
is explained in BCP 175: Procedure for Maintaining the Time Zone
Database section 7.
# 7. Database Ownership
#
# The TZ database itself is not an IETF Contribution or an IETF
# document. Rather it is a pre-existing and regularly updated work
364
19 Appendix
# that is in the public domain, and is intended to remain in the
# public domain. Therefore, BCPs 78 [RFC5378] and 79 [RFC3979] do
# not apply to the TZ Database or contributions that individuals make
# to it. Should any claims be made and substantiated against the TZ
# Database, the organization that is providing the IANA
# Considerations defined in this RFC, under the memorandum of
# understanding with the IETF, currently ICANN, may act in accordance
# with all competent court orders. No ownership claims will be made
# by ICANN or the IETF Trust on the database or the code. Any person
# making a contribution to the database or code waives all rights to
# future claims in that contribution or in the TZ Database.
"""
====
Copyright Joyent, Inc. and other Node contributors. All rights reserved.
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to
deal in the Software without restriction, including without limitation the
rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
sell copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
IN THE SOFTWARE.
====
This license applies to all parts of libuv that are not externally
maintained libraries.
365
19 Appendix
- tree.h (from FreeBSD), copyright Niels Provos. Two clause BSD license.
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
endorse or promote products derived from this software without
366
19 Appendix
prior written permission. For written permission, please contact
openssl-core@openssl.org.
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
OF THE POSSIBILITY OF SUCH DAMAGE.
================================================================
====
367
19 Appendix
These libraries have their own licenses; we recommend you read them,
as their terms may differ from the terms below.
368
19 Appendix
Further license information can be found in LICENSE files located in
sub-directories.
369
19 Appendix
including commercial applications, and to alter it and redistribute it
freely, subject to the following restrictions:
1. The origin of this software must not be misrepresented; you must not
claim that you wrote the original software. If you use this software
in a product, an acknowledgment in the product documentation would be
appreciated but is not required.
2. Altered source versions must be plainly marked as such, and must not be
misrepresented as being the original software.
3. This notice may not be removed or altered from any source distribution.
"Node.js"
Trademark Joyent, Inc., https://joyent.com
Neither npm nor npm, Inc. are affiliated with Joyent, Inc.
370
19 Appendix
--------
Preamble
This license establishes the terms under which a given free software
Package may be copied, modified, distributed, and/or redistributed.
The intent is that the Copyright Holder maintains some artistic
control over the development of that Package while still keeping the
Package available as open source and free software.
Definitions
"You" and "your" means any person who would like to copy,
distribute, or modify the Package.
371
19 Appendix
organization, to others outside of your company or organization.
"Distributor Fee" means any fee that you charge for Distributing
this Package or providing support for this Package to another
party. It does not mean licensing fees.
(1) You are permitted to use the Standard Version and create and use
Modified Versions for any purpose without restriction, provided that
you do not Distribute the Modified Version.
(2) You may Distribute verbatim copies of the Source form of the
Standard Version of this Package in any medium without restriction,
either gratis or for a Distributor Fee, provided that you duplicate
all of the original copyright notices and associated disclaimers. At
your discretion, such verbatim copies may or may not include a
Compiled form of the Package.
(3) You may apply any bug fixes, portability changes, and other
modifications made available from the Copyright Holder. The resulting
Package will still be considered the Standard Version, and as such
372
19 Appendix
will be subject to the Original License.
(4) You may Distribute your Modified Version as Source (either gratis
or for a Distributor Fee, and with or without a Compiled form of the
Modified Version) provided that you clearly document how it differs
from the Standard Version, including, but not limited to, documenting
any non-standard features, executables, or modules, and provided that
you do at least ONE of the following:
(5) You may Distribute Compiled forms of the Standard Version without
the Source, provided that you include complete instructions on how to
get the Source of the Standard Version. Such instructions must be
valid at the time of your distribution. If these instructions, at any
time while you are carrying out such distribution, become invalid, you
373
19 Appendix
must provide new instructions on demand or cease further distribution.
If you provide valid instructions or cease distribution within thirty
days after you become aware that the instructions are invalid, then
you do not forfeit any of your rights under this license.
(7) You may aggregate the Package (either the Standard Version or
Modified Version) with other packages and Distribute the resulting
aggregation provided that you do not charge a licensing fee for the
Package. Distributor Fees are permitted, and licensing fees for other
components in the aggregation are permitted. The terms of this license
apply to the use and Distribution of the Standard or Modified Versions
as included in the aggregation.
(8) You are permitted to link Modified and Standard Versions with
other works, to embed the Package in a larger work of your own, or to
build stand-alone binary or bytecode versions of applications that
include the Package, and Distribute the result without restriction,
provided the result does not expose a direct interface to the Package.
(9) Works (including, but not limited to, modules and scripts) that
merely extend or make use of the Package, do not, by themselves, cause
the Package to be a Modified Version. In addition, such works are not
considered parts of the Package itself, and are not subject to the
terms of this license.
General Provisions
374
19 Appendix
to ensure that your Modified Version complies with the requirements of
this license.
(12) This license does not grant you the right to use any trademark,
service mark, tradename, or logo of the Copyright Holder.
--------
"""
375
19 Appendix
* Neither the name of Google Inc. nor the names of its
contributors may be used to endorse or promote products derived from
this software without specific prior written permission.
The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
THE SOFTWARE.
"""
376
19 Appendix
The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software.
377
19 Appendix
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
THE SOFTWARE.
"""
378
19 Appendix
Copyright (c) 2011, Ben Noordhuis <info@bnoordhuis.nl>
Permission to use, copy, modify, and/or distribute this software for any
purpose with or without fee is hereby granted, provided that the above
copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
"""
Boost
https://www.boost.org/
Copyright Joe Coder 2004 - 2006.
Distributed under the Boost Software License, Version 1.0.
Boost Software License - Version 1.0 - August 17th, 2003
The copyright notices in the Software and this entire statement, including
the above license grant, this restriction and the following disclaimer,
must be included in all copies of the Software, in whole or in part, and
all derivative works of the Software, unless such copies or derivative
works are solely in the form of machine-executable object code generated by
a source language processor.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. IN NO EVENT
SHALL THE COPYRIGHT HOLDERS OR ANYONE DISTRIBUTING THE SOFTWARE BE LIABLE
FOR ANY DAMAGES OR OTHER LIABILITY, WHETHER IN CONTRACT, TORT OR OTHERWISE,
ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
379
19 Appendix
DEALINGS IN THE SOFTWARE.
glog
https://github.com/google/glog
Copyright (c) 2008, Google Inc. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
* Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
* Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
* Neither the name of Google Inc. nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
gtest
https://github.com/google/googletest
Copyright 2008, Google Inc. All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are
met:
380
19 Appendix
Iconv
http://www.gnu.org/licenses/lgpl.html
Copyright © 2007 Free Software Foundation, Inc. https://fsf.org/
GNU LESSER GENERAL PUBLIC LICENSE
Version 3, 29 June 2007
Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is
not allowed.
This version of the GNU Lesser General Public License incorporates the terms and conditions of version 3
of the GNU General Public License, supplemented by the additional permissions listed below.
0. Additional Definitions.
As used herein, “this License” refers to version 3 of the GNU Lesser General Public License, and the “GNU
GPL” refers to version 3 of the GNU General Public License.
“The Library” refers to a covered work governed by this License, other than an Application or a
Combined Work as defined below.
An “Application” is any work that makes use of an interface provided by the Library, but which is not
otherwise based on the Library. Defining a subclass of a class defined by the Library is deemed a mode
of using an interface provided by the Library.
A “Combined Work” is a work produced by combining or linking an Application with the Library. The
particular version of the Library with which the Combined Work was made is also called the “Linked
Version”.
The “Minimal Corresponding Source” for a Combined Work means the Corresponding Source for the
Combined Work, excluding any source code for portions of the Combined Work that, considered in
isolation, are based on the Application, and not on the Linked Version.
The “Corresponding Application Code” for a Combined Work means the object code and/or source code
for the Application, including any data and utility programs needed for reproducing the Combined Work
from the Application, but excluding the System Libraries of the Combined Work.
1. Exception to Section 3 of the GNU GPL.
You may convey a covered work under sections 3 and 4 of this License without being bound by section 3
381
19 Appendix
of the GNU GPL.
2. Conveying Modified Versions.
If you modify a copy of the Library, and, in your modifications, a facility refers to a function or data to be
supplied by an Application that uses the facility (other than as an argument passed when the facility is
invoked), then you may convey a copy of the modified version:
a) under this License, provided that you make a good faith effort to ensure that, in the event an
Application does not supply the function or data, the facility still operates, and performs whatever part of
its purpose remains meaningful, or
b) under the GNU GPL, with none of the additional permissions of this License applicable to that copy.
3. Object Code Incorporating Material from Library Header Files.
The object code form of an Application may incorporate material from a header file that is part of the
Library. You may convey such object code under terms of your choice, provided that, if the incorporated
material is not limited to numerical parameters, data structure layouts and accessors, or small macros,
inline functions and templates (ten or fewer lines in length), you do both of the following:
a) Give prominent notice with each copy of the object code that the Library is used in it and that the
Library and its use are covered by this License.
b) Accompany the object code with a copy of the GNU GPL and this license document.
4. Combined Works.
You may convey a Combined Work under terms of your choice that, taken together, effectively do not
restrict modification of the portions of the Library contained in the Combined Work and reverse
engineering for debugging such modifications, if you also do each of the following:
a) Give prominent notice with each copy of the Combined Work that the Library is used in it and that the
Library and its use are covered by this License.
b) Accompany the Combined Work with a copy of the GNU GPL and this license document.
c) For a Combined Work that displays copyright notices during execution, include the copyright notice for
the Library among these notices, as well as a reference directing the user to the copies of the GNU GPL
and this license document.
d) Do one of the following:
0) Convey the Minimal Corresponding Source under the terms of this License, and the Corresponding
Application Code in a form suitable for, and under terms that permit, the user to recombine or relink the
Application with a modified version of the Linked Version to produce a modified Combined Work, in the
manner specified by section 6 of the GNU GPL for conveying Corresponding Source.
1) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that
(a) uses at run time a copy of the Library already present on the user's computer system, and (b) will
operate properly with a modified version of the Library that is interface-compatible with the Linked
Version.
e) Provide Installation Information, but only if you would otherwise be required to provide such
information under section 6 of the GNU GPL, and only to the extent that such information is necessary to
install and execute a modified version of the Combined Work produced by recombining or relinking the
Application with a modified version of the Linked Version. (If you use option 4d0, the Installation
Information must accompany the Minimal Corresponding Source and Corresponding Application Code. If
you use option 4d1, you must provide the Installation Information in the manner specified by section 6 of
the GNU GPL for conveying Corresponding Source.)
382
19 Appendix
5. Combined Libraries.
You may place library facilities that are a work based on the Library side by side in a single library
together with other library facilities that are not Applications and are not covered by this License, and
convey such a combined library under terms of your choice, if you do both of the following:
a) Accompany the combined library with a copy of the same work based on the Library, uncombined
with any other library facilities, conveyed under the terms of this License.
b) Give prominent notice with the combined library that part of it is a work based on the Library, and
explaining where to find the accompanying uncombined form of the same work.
6. Revised Versions of the GNU Lesser General Public License.
The Free Software Foundation may publish revised and/or new versions of the GNU Lesser General
Public License from time to time. Such new versions will be similar in spirit to the present version, but
may differ in detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Library as you received it specifies that a
certain numbered version of the GNU Lesser General Public License “or any later version” applies to it,
you have the option of following the terms and conditions either of that published version or of any later
version published by the Free Software Foundation. If the Library as you received it does not specify a
version number of the GNU Lesser General Public License, you may choose any version of the GNU
Lesser General Public License ever published by the Free Software Foundation.
If the Library as you received it specifies that a proxy can decide whether future versions of the GNU
Lesser General Public License shall apply, that proxy's public statement of acceptance of any version is
permanent authorization for you to choose that version for the Library.
libfcgi
https://directory.fsf.org/wiki/Libfcgi
Copyright © 1996 Open Market, Inc.
This FastCGI application library source and object code (the
"Software") and its documentation (the "Documentation") are
copyrighted by Open Market, Inc ("Open Market"). The following terms
apply to all files associated with the Software and Documentation
unless explicitly disclaimed in individual files.
Open Market permits you to use, copy, modify, distribute, and license
this Software and the Documentation for any purpose, provided that
existing copyright notices are retained in all copies and that this
notice is included verbatim in any distributions. No written
agreement, license, or royalty fee is required for any of the
authorized uses. Modifications to this Software and Documentation may
be copyrighted by their authors and need not follow the licensing
terms described here. If modifications to this Software and
Documentation have new licensing terms, the new terms must be clearly
indicated on the first page of each file where they apply.
OPEN MARKET MAKES NO EXPRESS OR IMPLIED WARRANTY WITH RESPECT TO THE
383
19 Appendix
SOFTWARE OR THE DOCUMENTATION, INCLUDING WITHOUT LIMITATION ANY
WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. IN
NO EVENT SHALL OPEN MARKET BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY
DAMAGES ARISING FROM OR RELATING TO THIS SOFTWARE OR THE
DOCUMENTATION, INCLUDING, WITHOUT LIMITATION, ANY INDIRECT, SPECIAL OR
CONSEQUENTIAL DAMAGES OR SIMILAR DAMAGES, INCLUDING LOST PROFITS OR
LOST DATA, EVEN IF OPEN MARKET HAS BEEN ADVISED OF THE POSSIBILITY OF
SUCH DAMAGES. THE SOFTWARE AND DOCUMENTATION ARE PROVIDED "AS IS".
OPEN MARKET HAS NO LIABILITY IN CONTRACT, TORT, NEGLIGENCE OR
OTHERWISE ARISING OUT OF THIS SOFTWARE OR THE DOCUMENTATION.
libjpeg
http://libjpeg.sourceforge.net/
This package contains C software to implement JPEG image encoding, decoding,and transcoding. JPEG
is a standardized compression method for full-color and gray-scale images.
The distributed programs provide conversion between JPEG "JFIF" format and image files in PBMPLUS
PPM/PGM, GIF, BMP, and Targa file formats.
The core compression and decompression library can easily be reused in other programs, such as
image viewers. The package is highly portable C code;
we have tested it on many machines ranging from PCs to Crays.
We are releasing this software for both noncommercial and commercial use.
Companies are welcome to use it as the basis for JPEG-related products.
We do not ask a royalty, although we do ask for an acknowledgement in product literature (see the
README file in the distribution for details).
We hope to make this software industrial-quality --- although, as with anything that's free, we offer no
warranty and accept no liability.
microzip
http://www.gnu.org/licenses/lgpl-3.0.html
Copyright © 2007 Free Software Foundation, Inc. <https://fsf.org/>
GNU LESSER GENERAL PUBLIC LICENSE
Version 3, 29 June 2007
Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is
not allowed.
This version of the GNU Lesser General Public License incorporates the terms and conditions of version 3
of the GNU General Public License, supplemented by the additional permissions listed below.
0. Additional Definitions.
384
19 Appendix
As used herein, “this License” refers to version 3 of the GNU Lesser General Public License, and the “GNU
GPL” refers to version 3 of the GNU General Public License.
“The Library” refers to a covered work governed by this License, other than an Application or a
Combined Work as defined below.
An “Application” is any work that makes use of an interface provided by the Library, but which is not
otherwise based on the Library. Defining a subclass of a class defined by the Library is deemed a mode
of using an interface provided by the Library.
A “Combined Work” is a work produced by combining or linking an Application with the Library. The
particular version of the Library with which the Combined Work was made is also called the “Linked
Version”.
The “Minimal Corresponding Source” for a Combined Work means the Corresponding Source for the
Combined Work, excluding any source code for portions of the Combined Work that, considered in
isolation, are based on the Application, and not on the Linked Version.
The “Corresponding Application Code” for a Combined Work means the object code and/or source code
for the Application, including any data and utility programs needed for reproducing the Combined Work
from the Application, but excluding the System Libraries of the Combined Work.
1. Exception to Section 3 of the GNU GPL.
You may convey a covered work under sections 3 and 4 of this License without being bound by section 3
of the GNU GPL.
2. Conveying Modified Versions.
If you modify a copy of the Library, and, in your modifications, a facility refers to a function or data to be
supplied by an Application that uses the facility (other than as an argument passed when the facility is
invoked), then you may convey a copy of the modified version:
a) under this License, provided that you make a good faith effort to ensure that, in the event an
Application does not supply the function or data, the facility still operates, and performs whatever part of
its purpose remains meaningful, or
b) under the GNU GPL, with none of the additional permissions of this License applicable to that copy.
3. Object Code Incorporating Material from Library Header Files.
The object code form of an Application may incorporate material from a header file that is part of the
Library. You may convey such object code under terms of your choice, provided that, if the incorporated
material is not limited to numerical parameters, data structure layouts and accessors, or small macros,
inline functions and templates (ten or fewer lines in length), you do both of the following:
a) Give prominent notice with each copy of the object code that the Library is used in it and that the
Library and its use are covered by this License.
b) Accompany the object code with a copy of the GNU GPL and this license document.
4. Combined Works.
You may convey a Combined Work under terms of your choice that, taken together, effectively do not
restrict modification of the portions of the Library contained in the Combined Work and reverse
engineering for debugging such modifications, if you also do each of the following:
a) Give prominent notice with each copy of the Combined Work that the Library is used in it and that the
Library and its use are covered by this License.
b) Accompany the Combined Work with a copy of the GNU GPL and this license document.
c) For a Combined Work that displays copyright notices during execution, include the copyright notice for
385
19 Appendix
the Library among these notices, as well as a reference directing the user to the copies of the GNU GPL
and this license document.
d) Do one of the following:
0) Convey the Minimal Corresponding Source under the terms of this License, and the Corresponding
Application Code in a form suitable for, and under terms that permit, the user to recombine or relink the
Application with a modified version of the Linked Version to produce a modified Combined Work, in the
manner specified by section 6 of the GNU GPL for conveying Corresponding Source.
1) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that
(a) uses at run time a copy of the Library already present on the user's computer system, and (b) will
operate properly with a modified version of the Library that is interface-compatible with the Linked
Version.
e) Provide Installation Information, but only if you would otherwise be required to provide such
information under section 6 of the GNU GPL, and only to the extent that such information is necessary to
install and execute a modified version of the Combined Work produced by recombining or relinking the
Application with a modified version of the Linked Version. (If you use option 4d0, the Installation
Information must accompany the Minimal Corresponding Source and Corresponding Application Code. If
you use option 4d1, you must provide the Installation Information in the manner specified by section 6 of
the GNU GPL for conveying Corresponding Source.)
5. Combined Libraries.
You may place library facilities that are a work based on the Library side by side in a single library
together with other library facilities that are not Applications and are not covered by this License, and
convey such a combined library under terms of your choice, if you do both of the following:
a) Accompany the combined library with a copy of the same work based on the Library, uncombined
with any other library facilities, conveyed under the terms of this License.
b) Give prominent notice with the combined library that part of it is a work based on the Library, and
explaining where to find the accompanying uncombined form of the same work.
6. Revised Versions of the GNU Lesser General Public License.
The Free Software Foundation may publish revised and/or new versions of the GNU Lesser General
Public License from time to time. Such new versions will be similar in spirit to the present version, but
may differ in detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Library as you received it specifies that a
certain numbered version of the GNU Lesser General Public License “or any later version” applies to it,
you have the option of following the terms and conditions either of that published version or of any later
version published by the Free Software Foundation. If the Library as you received it does not specify a
version number of the GNU Lesser General Public License, you may choose any version of the GNU
Lesser General Public License ever published by the Free Software Foundation.
If the Library as you received it specifies that a proxy can decide whether future versions of the GNU
Lesser General Public License shall apply, that proxy's public statement of acceptance of any version is
permanent authorization for you to choose that version for the Library.
minizip
386
19 Appendix
https://github.com/danieleggert/minizip
MiniZip - Copyright (c) 1998-2010 - by Gilles Vollant - version 1.1 64 bits from Mathias Svensson
Credits
Gilles Vollant - Original MiniZip author
Even Rouault - ZIP64 unzip Support
Daniel Borca - BZip Compression method support in unzip
Mathias Svensson - ZIP64 zip support
Mathias Svensson - BZip Compression method support in zip
License
----------------------------------------------------------
Condition of use and distribution are the same than zlib :
This software is provided 'as-is', without any express or implied
warranty. In no event will the authors be held liable for any damages
arising from the use of this software.
nginx
https://www.nginx.com/
Copyright (C) 2002-2014 Igor Sysoev
Copyright (C) 2011-2014 Nginx, Inc.
All rights reserved.
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
387
19 Appendix
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*/
OpenSSL
https://www.openssl.org/
Copyright (c) 1998-2011 The OpenSSL Project
Copyright (c) 1995-1998 Eric Young
The OpenSSL toolkit stays under a dual license, i.e. both the conditions of
the OpenSSL License and the original SSLeay license apply to the toolkit.
See below for the actual license texts. Actually both licenses are BSD-style
Open Source licenses. In case of any license issues related to OpenSSL
please contact openssl-core@openssl.org.
388
19 Appendix
* openssl-core@openssl.org.
* 5. Products derived from this software may not be called "OpenSSL"
* nor may "OpenSSL" appear in their names without prior written
* permission of the OpenSSL Project.
* 6. Redistributions of any form whatsoever must retain the following
* acknowledgment:
* "This product includes software developed by the OpenSSL Project
* for use in the OpenSSL Toolkit (http://www.openssl.org/)"
*
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
* OF THE POSSIBILITY OF SUCH DAMAGE.
*
==================================================================
==
*
* This product includes cryptographic software written by Eric Young
* (eay@cryptsoft.com). This product includes software written by Tim
* Hudson (tjh@cryptsoft.com).
389
19 Appendix
* the code are not to be removed.
* If this package is used in a product, Eric Young should be given attribution
* as the author of the parts of the library used.
* This can be in the form of a textual message at program startup or
* in documentation (online or textual) provided with the package.
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgement:
* "This product includes cryptographic software written by
* Eric Young (eay@cryptsoft.com)"
* The word 'cryptographic' can be left out if the rouines from the library
* being used are not cryptographic related :-).
* 4. If you include any Windows specific code (or a derivative thereof) from
* the apps directory (application code) you must include an acknowledgement:
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
*
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
* The licence and distribution terms for any publically available version or
* derivative of this code cannot be changed. i.e. this code cannot simply be
* copied and put under another distribution licence
* [including the GNU Public Licence.]
*/
390
19 Appendix
PCRE
https://www.pcre.org/
PCRE LICENSE
PCRE is a library of functions to support regular expressions whose syntax
and semantics are as close as possible to those of the Perl 5 language.
The basic library functions are written in C and are freestanding. Also
included in the distribution is a set of C++ wrapper functions, and a
just-in-time compiler that can be used to optimize pattern matching. These
are both optional features that can be omitted when the library is built.
391
19 Appendix
Copyright(c) 2009-2014 Zoltan Herczeg
All rights reserved.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
End
Sqlcipher
392
19 Appendix
https://www.zetetic.net/sqlcipher/
Copyright (c) 2008, ZETETIC LLC All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are met:
* Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
* Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
* Neither the name of the ZETETIC LLC nor the
names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
sqlite
https://www.sqlite.org/index.html
Anyone is free to copy, modify, publish, use, compile, sell, or distribute the original SQLite code, either
in source code form or as a compiled binary, for any purpose, commercial or non-commercial, and by
any means.
TiddlyWiki
https://tiddlywiki.com/
Copyright (c) UnaMesa Association 2004-2007
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
393
19 Appendix
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILIT
Websocketpp
https://www.zaphoyd.com/projects/websocketpp/
WebSocket++ is an open source (BSD license)
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and
the following disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED.
IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
SUCH DAMAGE.
zlib
https://zlib.net/zlib_license.html
(C) 1995-2013 Jean-loup Gailly and Mark Adler
This software is provided 'as-is', without any express or implied
warranty. In no event will the authors be held liable for any damages
arising from the use of this software.
394
19 Appendix
1. The origin of this software must not be misrepresented; you must not
claim that you wrote the original software. If you use this software
in a product, an acknowledgment in the product documentation would be
appreciated but is not required.
2. Altered source versions must be plainly marked as such, and must not be
misrepresented as being the original software.
3. This notice may not be removed or altered from any source distribution.
SIL
http://www.sil.org
Copyright (c) 1994-2008, SIL International (http://www.sil.org/).
This Font Software is licensed under the SIL Open Font License, Version 1.1,
with Reserved Font Names "Lateef" and "SIL".
This license is copied below, and is also available with an FAQ at:
http://scripts.sil.org/OFL
----------------------------------------------------
SIL OPEN FONT LICENSE Version 1.1 - 26 February 2007
----------------------------------------------------
PREAMBLE
The goals of the Open Font License (OFL) are to stimulate worldwide
development of collaborative font projects, to support the font creation
efforts of academic and linguistic communities, and to provide a free and
open framework in which fonts may be shared and improved in partnership
with others.
The OFL allows the licensed fonts to be used, studied, modified and
redistributed freely as long as they are not sold by themselves. The
fonts, including any derivative works, can be bundled, embedded,
redistributed and/or sold with any software provided that any reserved
names are not used by derivative works. The fonts and derivatives,
however, cannot be released under any other type of license. The
requirement for fonts to remain under this license does not apply
to any document created using the fonts or their derivatives.
DEFINITIONS
395
19 Appendix
"Font Software" refers to the set of files released by the Copyright
Holder(s) under this license and clearly marked as such. This may
include source files, build scripts and documentation.
"Reserved Font Name" refers to any names specified as such after the
copyright statement(s).
"Original Version" refers to the collection of Font Software components as
distributed by the Copyright Holder(s).
"Modified Version" refers to any derivative made by adding to, deleting,
or substituting -- in part or in whole -- any of the components of the
Original Version, by changing formats or by porting the Font Software to a
new environment.
"Author" refers to any designer, engineer, programmer, technical
writer or other person who contributed to the Font Software.
PERMISSION & CONDITIONS
Permission is hereby granted, free of charge, to any person obtaining
a copy of the Font Software, to use, study, copy, merge, embed, modify,
redistribute, and sell modified and unmodified copies of the Font
Software, subject to the following conditions:
1) Neither the Font Software nor any of its individual components,
in Original or Modified Versions, may be sold by itself.
2) Original or Modified Versions of the Font Software may be bundled,
redistributed and/or sold with any software, provided that each copy
contains the above copyright notice and this license. These can be
included either as stand-alone text files, human-readable headers or
in the appropriate machine-readable metadata fields within text or
binary files as long as those fields can be easily viewed by the user.
3) No Modified Version of the Font Software may use the Reserved Font
Name(s) unless explicit written permission is granted by the corresponding
Copyright Holder. This restriction only applies to the primary font name as
presented to the users.
4) The name(s) of the Copyright Holder(s) or the Author(s) of the Font
Software shall not be used to promote, endorse or advertise any
Modified Version, except to acknowledge the contribution(s) of the
Copyright Holder(s) and the Author(s) or with their explicit written
permission.
5) The Font Software, modified or unmodified, in part or in whole,
must be distributed entirely under this license, and must not be
distributed under any other license. The requirement for fonts to
remain under this license does not apply to any document created
using the Font Software.
TERMINATION
This license becomes null and void if any of the above conditions are
not met.
396
19 Appendix
DISCLAIMER
THE FONT SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT
OF COPYRIGHT, PATENT, TRADEMARK, OR OTHER RIGHT. IN NO EVENT SHALL THE
COPYRIGHT HOLDER BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,
INCLUDING ANY GENERAL, SPECIAL, INDIRECT, INCIDENTAL, OR CONSEQUENTIAL
DAMAGES, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
FROM, OUT OF THE USE OR INABILITY TO USE THE FONT SOFTWARE OR FROM
OTHER DEALINGS IN THE FONT SOFTWARE.
# Attribution
Attribution is required by MIT, SIL OFL, and CC BY licenses. Downloaded Font
Awesome Free files already contain embedded comments with sufficient
attribution, so you shouldn't need to do anything additional when using these
files normally.
We've kept attribution comments terse, so we ask that you do not actively work
to remove them from files, especially code. They're a great way for folks to
learn about Font Awesome.
# Brand Icons
All brand icons are trademarks of their respective owners. The use of these
397
19 Appendix
trademarks does not indicate endorsement of the trademark holder by Font
Awesome, nor vice versa. **Please do not use brand logos for any purpose except
to represent the company, product, or service to which they refer.**
material-ui
https://material-ui.com/
The MIT License (MIT)
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
Redux Toolkit
https://redux-toolkit.js.org/
Copyright (c) 2018 Mark Erikson
MIT License
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
398
19 Appendix
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
Autoprefixer
https://github.com/postcss/autoprefixer
Copyright 2013 Andrey Sitnik andrey@sitnik.ru
The MIT License (MIT)
Permission is hereby granted, free of charge, to any person obtaining a copy of
this software and associated documentation files (the "Software"), to deal in
the Software without restriction, including without limitation the rights to
use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of
the Software, and to permit persons to whom the Software is furnished to do so,
subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER
IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Axios
https://xn--xy1bk56a.run/axios/guide/api.html
Copyright (c) 2014-present Matt Zabriskie
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
399
19 Appendix
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
THE SOFTWARE.
Classnames
https://www.npmjs.com/package/classnames
Copyright (c) 2017 Jed Watson
The MIT License (MIT)
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
Day.js
https://day.js.org/
Copyright (c) 2018-present, iamkun
MIT License
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
400
19 Appendix
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
I18next
https://www.i18next.com/
Copyright (c) 2017 i18next
The MIT License (MIT)
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
i18next-http-backend
https://www.npmjs.com/package/i18next-http-backend
Copyright (c) 2020 i18next
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
401
19 Appendix
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
THE SOFTWARE.
Immer
https://immerjs.github.io/immer/
Copyright (c) 2017 Michel Weststrate
MIT License
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
prop-types
https://www.npmjs.com/package/prop-types
Copyright (c) 2013-present, Facebook, Inc.
MIT License
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
402
19 Appendix
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
React
https://ko.reactjs.org/
Copyright (c) Facebook, Inc. and its affiliates.
MIT License
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
403
19 Appendix
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
React-dom
https://ko.reactjs.org/
Copyright (c) Facebook, Inc. and its affiliates.
MIT License
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
REACT ROUTER
https://reactrouter.com/
Copyright (c) React Training 2016-2018
MIT License
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
404
19 Appendix
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
REACT ROUTER-dom
https://reactrouter.com/
Copyright (c) React Training 2016-2018
MIT License
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
react-i18next
https://react.i18next.com/
Copyright (c) 2015 i18next
The MIT License (MIT)
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
405
19 Appendix
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
react-number-format
https://www.npmjs.com/package/react-number-format
Copyright (c) 2020 Sudhanshu Yadav
MIT License
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
React Redux
https://react-redux.js.org/
Copyright (c) 2015-present Dan Abramov
The MIT License (MIT)
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
406
19 Appendix
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
redux-persist
https://github.com/rt2zz/redux-persist
Copyright (c) 2017 Zack Story
MIT License
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
Opencv
https://opencv.org/
Copyright (C) 2000-2020, Intel Corporation, all rights reserved.
Copyright (C) 2009-2011, Willow Garage Inc., all rights reserved.
Copyright (C) 2009-2016, NVIDIA Corporation, all rights reserved.
Copyright (C) 2010-2013, Advanced Micro Devices, Inc., all rights reserved.
Copyright (C) 2015-2016, OpenCV Foundation, all rights reserved.
Copyright (C) 2015-2016, Itseez Inc., all rights reserved.
407
19 Appendix
Copyright (C) 2019-2020, Xperience AI, all rights reserved.
Third party copyrights are property of their respective owners.
License Agreement
For Open Source Computer Vision Library
(3-clause BSD License)
By downloading, copying, installing or using the software you agree to this license.
If you do not agree to this license, do not download, install,
copy or use the software.
Redistribution and use in source and binary forms, with or without modification,
are permitted provided that the following conditions are met:
* Neither the names of the copyright holders nor the names of the contributors
may be used to endorse or promote products derived from this software
without specific prior written permission.
This software is provided by the copyright holders and contributors "as is" and
any express or implied warranties, including, but not limited to, the implied
warranties of merchantability and fitness for a particular purpose are disclaimed.
In no event shall copyright holders or contributors be liable for any direct,
indirect, incidental, special, exemplary, or consequential damages
(including, but not limited to, procurement of substitute goods or services;
loss of use, data, or profits; or business interruption) however caused
and on any theory of liability, whether in contract, strict liability,
or tort (including negligence or otherwise) arising in any way out of
the use of this software, even if advised of the possibility of such damage.
jquery
https://jquery.org
Copyright OpenJS Foundation and other contributors, https://openjsf.org/
Permission is hereby granted, free of charge, to any person obtaining
a copy of this software and associated documentation files (the
"Software"), to deal in the Software without restriction, including
without limitation the rights to use, copy, modify, merge, publish,
408
19 Appendix
distribute, sublicense, and/or sell copies of the Software, and to
permit persons to whom the Software is furnished to do so, subject to
the following conditions:
angular.js
https://angularjs.org
Copyright (c) 2020 Google LLC. https://angularjs.org
The MIT License
The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
THE SOFTWARE.
ngStorage
409
19 Appendix
https://github.com/gsklee/ngStorage
Copyright (c) 2015 Gias Kay Lee
The MIT License (MIT)
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
THE SOFTWARE.
moment.js
https://github.com/moment/moment
Copyright (c) JS Foundation and other contributors
Permission is hereby granted, free of charge, to any person
obtaining a copy of this software and associated documentation
files (the "Software"), to deal in the Software without
restriction, including without limitation the rights to use,
copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the
Software is furnished to do so, subject to the following
conditions:
410
19 Appendix
WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
OTHER DEALINGS IN THE SOFTWARE.
async.min.js
https://github.com/caolan/async
Copyright 2010 Elijah Grey, who also goes by Eli Grey.
This software is licensed under the MIT license.
MIT license
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and
associated documentation files (the "Software"), to deal in the Software without restriction, including
without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to
the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial
portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT
HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF
CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
ngDraggable.js
https://github.com/fatlinesofcode/ngDraggable
Copyright (c) 2014 philippd
The MIT License (MIT)
411
19 Appendix
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
konva.js
https://konvajs.org
Original work Copyright (C) 2011 - 2013 by Eric Rowell (KineticJS)
Modified work Copyright (C) 2014 - present by Anton Lavrenov (Konva)
MIT License
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
springBoot
https://spring.io/projects/spring-boot
Apache License
412
19 Appendix
Version 2.0, January 2004
https://www.apache.org/licenses/
1. Definitions.
"License" shall mean the terms and conditions for use, reproduction,
and distribution as defined by Sections 1 through 9 of this document.
"Legal Entity" shall mean the union of the acting entity and all
other entities that control, are controlled by, or are under common
control with that entity. For the purposes of this definition,
"control" means (i) the power, direct or indirect, to cause the
direction or management of such entity, whether by contract or
otherwise, or (ii) ownership of fifty percent (50%) or more of the
outstanding shares, or (iii) beneficial ownership of such entity.
"Source" form shall mean the preferred form for making modifications,
including but not limited to software source code, documentation
source, and configuration files.
413
19 Appendix
separable from, or merely link (or bind by name) to the interfaces of,
the Work and Derivative Works thereof.
414
19 Appendix
(b) You must cause any modified files to carry prominent notices
stating that You changed the files; and
(c) You must retain, in the Source form of any Derivative Works
that You distribute, all copyright, patent, trademark, and
attribution notices from the Source form of the Work,
excluding those notices that do not pertain to any part of
the Derivative Works; and
You may add Your own copyright statement to Your modifications and
may provide additional or different license terms and conditions
for use, reproduction, or distribution of Your modifications, or
for any such Derivative Works as a whole, provided Your use,
reproduction, and distribution of the Work otherwise complies with
the conditions stated in this License.
415
19 Appendix
any Contribution intentionally submitted for inclusion in the Work
by You to the Licensor shall be under the terms and conditions of
this License, without any additional terms or conditions.
Notwithstanding the above, nothing herein shall supersede or modify
the terms of any separate license agreement you may have executed
with Licensor regarding such Contributions.
6. Trademarks. This License does not grant permission to use the trade
names, trademarks, service marks, or product names of the Licensor,
except as required for reasonable and customary use in describing the
origin of the Work and reproducing the content of the NOTICE file.
416
19 Appendix
of your accepting any such warranty or additional liability.
https://www.apache.org/licenses/LICENSE-2.0
log4j
https://logging.apache.org/log4j
Apache License
Version 2.0, January 2004
http://www.apache.org/licenses/
1. Definitions.
"License" shall mean the terms and conditions for use, reproduction,
417
19 Appendix
and distribution as defined by Sections 1 through 9 of this document.
"Legal Entity" shall mean the union of the acting entity and all
other entities that control, are controlled by, or are under common
control with that entity. For the purposes of this definition,
"control" means (i) the power, direct or indirect, to cause the
direction or management of such entity, whether by contract or
otherwise, or (ii) ownership of fifty percent (50%) or more of the
outstanding shares, or (iii) beneficial ownership of such entity.
"Source" form shall mean the preferred form for making modifications,
including but not limited to software source code, documentation
source, and configuration files.
418
19 Appendix
the copyright owner. For the purposes of this definition, "submitted"
means any form of electronic, verbal, or written communication sent
to the Licensor or its representatives, including but not limited to
communication on electronic mailing lists, source code control systems,
and issue tracking systems that are managed by, or on behalf of, the
Licensor for the purpose of discussing and improving the Work, but
excluding communication that is conspicuously marked or otherwise
designated in writing by the copyright owner as "Not a Contribution."
419
19 Appendix
(b) You must cause any modified files to carry prominent notices
stating that You changed the files; and
(c) You must retain, in the Source form of any Derivative Works
that You distribute, all copyright, patent, trademark, and
attribution notices from the Source form of the Work,
excluding those notices that do not pertain to any part of
the Derivative Works; and
You may add Your own copyright statement to Your modifications and
may provide additional or different license terms and conditions
for use, reproduction, or distribution of Your modifications, or
for any such Derivative Works as a whole, provided Your use,
reproduction, and distribution of the Work otherwise complies with
the conditions stated in this License.
6. Trademarks. This License does not grant permission to use the trade
420
19 Appendix
names, trademarks, service marks, or product names of the Licensor,
except as required for reasonable and customary use in describing the
origin of the Work and reproducing the content of the NOTICE file.
421
19 Appendix
replaced with your own identifying information. (Don't include
the brackets!) The text should be enclosed in the appropriate
comment syntax for the file format. We also recommend that a
file or class name and description of purpose be included on the
same "printed page" as the copyright notice for easier
identification within third-party archives.
http://www.apache.org/licenses/LICENSE-2.0
mssqlJdbc
https://github.com/microsoft/mssql-jdbc
Copyright(c) 2020 Microsoft Corporation
All rights reserved.
MIT License
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and
associated documentation files(the "Software"),
to deal in the Software without restriction, including without limitation the rights to use, copy, modify,
merge, publish, distribute, sublicense,
and / or sell copies of the Software, and to permit persons to whom the Software is furnished to do so,
subject to the following conditions :
The above copyright notice and this permission notice shall be included in all copies or substantial
portions of the Software.
THE SOFTWARE IS PROVIDED *AS IS*, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS
OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
422
19 Appendix
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR
IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
IN THE SOFTWARE.
hibernate
https://hibernate.org
LGPL 2.1
Most Hibernate projects are released under LGPL v2.1.
The maintainers of Hibernate have consistently understood the LGPL to simply allow Hibernate to be
used by both open source and proprietary code without any impact on the licensing or distribution of
such independent code. This interpretation applies regardless of whether a binary that includes
Hibernate code is designed to run on the JVM or is a native image generated through use of tools and
frameworks like GraalVM and Quarkus.
By the 2000s, the LGPL had become one of the most widely used and best known open source licenses.
At this time, some Java developers naturally began to adopt the LGPL for their projects as a more
permissive and flexible alternative to the GPL. For projects like Hibernate, the LGPL had a simple
interpretation in the Java setting, which can be summarized as follows:
LGPL requirements are triggered only if there is distribution; internal use is not restricted.
Distributors of binaries built from LGPL-licensed source code must comply with the LGPL by providing
source code corresponding only to the LGPL-covered parts of the binary.
There is no requirement to publish independent code that, for example, merely imports LGPL-covered
packages or classes. Such independent code can be under different licensing terms, including
proprietary licensing terms or other open source licenses.
Modifications of LGPL-licensed source code, if distributed, must be licensed under the LGPL.
This has been the consistent interpretation of the LGPL by the maintainers of Hibernate ever since the
423
19 Appendix
project adopted LGPL.
ASL 2.0
Some Hibernate projects are released under ASL 2.0.
This is mostly due to our work with the Java Community Process: implementing a reference
implementation in practice requires such a liberal license (or a fully proprietary one strangely enough).
lombok
https://projectlombok.org
Copyright (C) 2009-2021 The Project Lombok Authors.
The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
THE SOFTWARE.
==================================================================
============
Licenses for included components:
424
19 Appendix
org.ow2.asm:asm
org.ow2.asm:asm-analysis
org.ow2.asm:asm-commons
org.ow2.asm:asm-tree
org.ow2.asm:asm-util
ASM: a very small and fast Java bytecode manipulation framework
Copyright (c) 2000-2011 INRIA, France Telecom
All rights reserved.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
------------------------------------------------------------------------------
rzwitserloot/com.zwitserloot.cmdreader
425
19 Appendix
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
THE SOFTWARE.
------------------------------------------------------------------------------
projectlombok/lombok.patcher
The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
THE SOFTWARE.
------------------------------------------------------------------------------
annotationApi
https://github.com/javaee/javax.annotation
426
19 Appendix
COMMON DEVELOPMENT AND DISTRIBUTION LICENSE (CDDL) Version 1.1
1. Definitions.
1.4. "Executable" means the Covered Software in any form other than
Source Code.
B. Any new file that contains any part of the Original Software or
previous Modification; or
427
19 Appendix
1.10. "Original Software" means the Source Code and Executable form
of computer software code that is originally released under this
License.
1.12. "Source Code" means (a) the common form of computer software
code in which modifications are made and (b) associated
documentation included in or with such code.
2. License Grants.
Conditioned upon Your compliance with Section 3.1 below and subject
to third party intellectual property claims, the Initial Developer
hereby grants You a world-wide, royalty-free, non-exclusive license:
(c) The licenses granted in Sections 2.1(a) and (b) are effective on
428
19 Appendix
the date Initial Developer first distributes or otherwise makes the
Original Software available to a third party under the terms of this
License.
Conditioned upon Your compliance with Section 3.1 below and subject
to third party intellectual property claims, each Contributor hereby
grants You a world-wide, royalty-free, non-exclusive license:
(c) The licenses granted in Sections 2.2(a) and 2.2(b) are effective
on the date Contributor first distributes or otherwise makes the
Modifications available to a third party.
429
19 Appendix
Modifications made by that Contributor.
3. Distribution Obligations.
3.2. Modifications.
You may not offer or impose any terms on any Covered Software in
Source Code form that alters or restricts the applicable version of
this License or the recipients' rights hereunder. You may choose to
offer, and to charge a fee for, warranty, support, indemnity or
liability obligations to one or more recipients of Covered Software.
However, you may do so only on Your own behalf, and not on behalf of
the Initial Developer or any Contributor. You must make it
absolutely clear that any such warranty, support, indemnity or
liability obligation is offered by You alone, and You hereby agree
430
19 Appendix
to indemnify the Initial Developer and every Contributor for any
liability incurred by the Initial Developer or such Contributor as a
result of warranty, support, indemnity or liability terms You offer.
You may distribute the Executable form of the Covered Software under
the terms of this License or under the terms of a license of Your
choice, which may contain terms different from this License,
provided that You are in compliance with the terms of this License
and that the license for the Executable form does not attempt to
limit or alter the recipient's rights in the Source Code form from
the rights set forth in this License. If You distribute the Covered
Software in Executable form under a different license, You must make
it absolutely clear that any terms which differ from this License
are offered by You alone, not by the Initial Developer or
Contributor. You hereby agree to indemnify the Initial Developer and
every Contributor for any liability incurred by the Initial
Developer or such Contributor as a result of any such terms You offer.
Oracle is the initial license steward and may publish revised and/or
new versions of this License from time to time. Each version will be
given a distinguishing version number. Except as provided in Section
4.3, no one other than the license steward has the right to modify
this License.
431
19 Appendix
the Initial Developer includes a notice in the Original Software
prohibiting it from being distributed or otherwise made available
under any subsequent version of the License, You must distribute and
make the Covered Software available under the terms of the version
of the License under which You originally received the Covered
Software. Otherwise, You may also choose to use, distribute or
otherwise make the Covered Software available under the terms of any
subsequent version of the License published by the license steward.
When You are an Initial Developer and You want to create a new
license for Your Original Software, You may create and use a
modified version of this License if You: (a) rename the license and
remove any references to the name of the license steward (except to
note that the license differs from this License); and (b) otherwise
make it clear that the license contains terms which differ from this
License.
5. DISCLAIMER OF WARRANTY.
6. TERMINATION.
6.1. This License and the rights granted hereunder will terminate
automatically if You fail to comply with terms herein and fail to
cure such breach within 30 days of becoming aware of the breach.
Provisions which, by their nature, must remain in effect beyond the
termination of this License shall survive.
432
19 Appendix
Contributor (the Initial Developer or Contributor against whom You
assert such claim is referred to as "Participant") alleging that the
Participant Software (meaning the Contributor Version where the
Participant is a Contributor or the Original Software where the
Participant is the Initial Developer) directly or indirectly
infringes any patent, then any and all rights granted directly or
indirectly to You by such Participant, the Initial Developer (if the
Initial Developer is not the Participant) and all Contributors under
Sections 2.1 and/or 2.2 of this License shall, upon 60 days notice
from Participant terminate prospectively and automatically at the
expiration of such 60 day notice period, unless if within such 60
day period You withdraw Your claim with respect to the Participant
Software against such Participant either unilaterally or pursuant to
a written agreement with Participant.
7. LIMITATION OF LIABILITY.
433
19 Appendix
LIMITATION. SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR
LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS EXCLUSION
AND LIMITATION MAY NOT APPLY TO YOU.
9. MISCELLANEOUS.
434
19 Appendix
As between Initial Developer and the Contributors, each party is
responsible for claims and damages arising, directly or indirectly,
out of its utilization of rights under this License and You agree to
work with Initial Developer and Contributors to distribute such
responsibility on an equitable basis. Nothing herein is intended or
shall be deemed to constitute any admission of liability.
------------------------------------------------------------------------
The code released under the CDDL shall be governed by the laws of the
State of California (excluding conflict-of-law provisions). Any
litigation relating to this License shall be subject to the jurisdiction
of the Federal Courts of the Northern District of California and the
state courts of the State of California, with venue lying in Santa Clara
County, California.
Preamble
The licenses for most software are designed to take away your freedom to
share and change it. By contrast, the GNU General Public License is
intended to guarantee your freedom to share and change free software--to
make sure the software is free for all its users. This General Public
License applies to most of the Free Software Foundation's software and
to any other program whose authors commit to using it. (Some other Free
Software Foundation software is covered by the GNU Library General
Public License instead.) You can apply it to your programs, too.
435
19 Appendix
Our General Public Licenses are designed to make sure that you have the
freedom to distribute copies of free software (and charge for this
service if you wish), that you receive source code or can get it if you
want it, that you can change the software or use pieces of it in new
free programs; and that you know you can do these things.
We protect your rights with two steps: (1) copyright the software, and
(2) offer you this license which gives you legal permission to copy,
distribute and/or modify the software.
Also, for each author's protection and ours, we want to make certain
that everyone understands that there is no warranty for this free
software. If the software is modified by someone else and passed on, we
want its recipients to know that what they have is not the original, so
that any problems introduced by others will not reflect on the original
authors' reputations.
436
19 Appendix
to say, a work containing the Program or a portion of it, either
verbatim or with modifications and/or translated into another language.
(Hereinafter, translation is included without limitation in the term
"modification".) Each licensee is addressed as "you".
1. You may copy and distribute verbatim copies of the Program's source
code as you receive it, in any medium, provided that you conspicuously
and appropriately publish on each copy an appropriate copyright notice
and disclaimer of warranty; keep intact all the notices that refer to
this License and to the absence of any warranty; and give any other
recipients of the Program a copy of this License along with the Program.
You may charge a fee for the physical act of transferring a copy, and
you may at your option offer warranty protection in exchange for a fee.
2. You may modify your copy or copies of the Program or any portion of
it, thus forming a work based on the Program, and copy and distribute
such modifications or work under the terms of Section 1 above, provided
that you also meet all of these conditions:
b) You must cause any work that you distribute or publish, that in
whole or in part contains or is derived from the Program or any part
thereof, to be licensed as a whole at no charge to all third parties
under the terms of this License.
437
19 Appendix
normally print such an announcement, your work based on the Program
is not required to print an announcement.)
3. You may copy and distribute the Program (or a work based on it,
under Section 2) in object code or executable form under the terms of
Sections 1 and 2 above provided that you also do one of the following:
438
19 Appendix
The source code for a work means the preferred form of the work for
making modifications to it. For an executable work, complete source code
means all the source code for all modules it contains, plus any
associated interface definition files, plus the scripts used to control
compilation and installation of the executable. However, as a special
exception, the source code distributed need not include anything that is
normally distributed (in either source or binary form) with the major
components (compiler, kernel, and so on) of the operating system on
which the executable runs, unless that component itself accompanies the
executable.
5. You are not required to accept this License, since you have not
signed it. However, nothing else grants you permission to modify or
distribute the Program or its derivative works. These actions are
prohibited by law if you do not accept this License. Therefore, by
modifying or distributing the Program (or any work based on the
Program), you indicate your acceptance of this License to do so, and all
its terms and conditions for copying, distributing or modifying the
Program or works based on it.
6. Each time you redistribute the Program (or any work based on the
Program), the recipient automatically receives a license from the
original licensor to copy, distribute or modify the Program subject to
these terms and conditions. You may not impose any further restrictions
on the recipients' exercise of the rights granted herein. You are not
responsible for enforcing compliance by third parties to this License.
439
19 Appendix
infringement or for any other reason (not limited to patent issues),
conditions are imposed on you (whether by court order, agreement or
otherwise) that contradict the conditions of this License, they do not
excuse you from the conditions of this License. If you cannot distribute
so as to satisfy simultaneously your obligations under this License and
any other pertinent obligations, then as a consequence you may not
distribute the Program at all. For example, if a patent license would
not permit royalty-free redistribution of the Program by all those who
receive copies directly or indirectly through you, then the only way you
could satisfy both it and this License would be to refrain entirely from
distribution of the Program.
440
19 Appendix
Each version is given a distinguishing version number. If the Program
specifies a version number of this License which applies to it and "any
later version", you have the option of following the terms and
conditions either of that version or of any later version published by
the Free Software Foundation. If the Program does not specify a version
number of this License, you may choose any version ever published by the
Free Software Foundation.
10. If you wish to incorporate parts of the Program into other free
programs whose distribution conditions are different, write to the
author to ask for permission. For software which is copyrighted by the
Free Software Foundation, write to the Free Software Foundation; we
sometimes make exceptions for this. Our decision will be guided by the
two goals of preserving the free status of all derivatives of our free
software and of promoting the sharing and reuse of software generally.
NO WARRANTY
441
19 Appendix
possible use to the public, the best way to achieve this is to make it
free software which everyone can redistribute and change under these terms.
One line to give the program's name and a brief idea of what it does.
Copyright (C) <year> <name of author>
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335 USA
Also add information on how to contact you by electronic and paper mail.
The hypothetical commands `show w' and `show c' should show the
appropriate parts of the General Public License. Of course, the commands
you use may be called something other than `show w' and `show c'; they
could even be mouse-clicks or menu items--whatever suits your program.
You should also get your employer (if you work as a programmer) or your
school, if any, to sign a "copyright disclaimer" for the program, if
necessary. Here is a sample; alter the names:
442
19 Appendix
This General Public License does not permit incorporating your program
into proprietary programs. If your program is a subroutine library, you
may consider it more useful to permit linking proprietary applications
with the library. If this is what you want to do, use the GNU Library
General Public License instead of this License.
443
19 Appendix
since the GPLv2 is incompatible with the license terms of some items
included in the distribution by Oracle, removing the Classpath
Exception could therefore effectively compromise your ability to
further distribute the package.
Proceed with caution and we recommend that you obtain the advice of a
lawyer skilled in open source matters before removing the Classpath
Exception or making modifications to this package which may
subsequently be redistributed and/or involve the use of third party
software.
CLASSPATH EXCEPTION
Linking this library statically or dynamically with other modules is
making a combined work based on this library. Thus, the terms and
conditions of the GNU General Public License version 2 cover the whole
combination.
thrift
https://thrift.apache.org
Apache License
Version 2.0, January 2004
http://www.apache.org/licenses/
1. Definitions.
"License" shall mean the terms and conditions for use, reproduction,
444
19 Appendix
and distribution as defined by Sections 1 through 9 of this document.
"Legal Entity" shall mean the union of the acting entity and all
other entities that control, are controlled by, or are under common
control with that entity. For the purposes of this definition,
"control" means (i) the power, direct or indirect, to cause the
direction or management of such entity, whether by contract or
otherwise, or (ii) ownership of fifty percent (50%) or more of the
outstanding shares, or (iii) beneficial ownership of such entity.
"Source" form shall mean the preferred form for making modifications,
including but not limited to software source code, documentation
source, and configuration files.
445
19 Appendix
the copyright owner. For the purposes of this definition, "submitted"
means any form of electronic, verbal, or written communication sent
to the Licensor or its representatives, including but not limited to
communication on electronic mailing lists, source code control systems,
and issue tracking systems that are managed by, or on behalf of, the
Licensor for the purpose of discussing and improving the Work, but
excluding communication that is conspicuously marked or otherwise
designated in writing by the copyright owner as "Not a Contribution."
446
19 Appendix
(b) You must cause any modified files to carry prominent notices
stating that You changed the files; and
(c) You must retain, in the Source form of any Derivative Works
that You distribute, all copyright, patent, trademark, and
attribution notices from the Source form of the Work,
excluding those notices that do not pertain to any part of
the Derivative Works; and
You may add Your own copyright statement to Your modifications and
may provide additional or different license terms and conditions
for use, reproduction, or distribution of Your modifications, or
for any such Derivative Works as a whole, provided Your use,
reproduction, and distribution of the Work otherwise complies with
the conditions stated in this License.
6. Trademarks. This License does not grant permission to use the trade
447
19 Appendix
names, trademarks, service marks, or product names of the Licensor,
except as required for reasonable and customary use in describing the
origin of the Work and reproducing the content of the NOTICE file.
448
19 Appendix
replaced with your own identifying information. (Don't include
the brackets!) The text should be enclosed in the appropriate
comment syntax for the file format. We also recommend that a
file or class name and description of purpose be included on the
same "printed page" as the copyright notice for easier
identification within third-party archives.
http://www.apache.org/licenses/LICENSE-2.0
--------------------------------------------------
SOFTWARE DISTRIBUTED WITH THRIFT:
--------------------------------------------------
Portions of the following files are licensed under the MIT License:
lib/erl/src/Makefile.am
--------------------------------------------------
For the aclocal/ax_boost_base.m4 and contrib/fb303/aclocal/ax_boost_base.m4 components:
449
19 Appendix
# the copyright notice and this notice are preserved.
--------------------------------------------------
For the lib/nodejs/lib/thrift/json_parse.js:
/*
json_parse.js
2015-05-02
Public Domain.
NO WARRANTY EXPRESSED OR IMPLIED. USE AT YOUR OWN RISK.
*/
(By Douglas Crockford <douglas@crockford.com>)
--------------------------------------------------
For lib/cpp/src/thrift/windows/SocketPair.cpp
/* socketpair.c
* Copyright 2007 by Nathan C. Myers <ncm@cantrip.org>; some rights reserved.
* This code is Free Software. It may be copied freely, in original or
* modified form, subject only to the restrictions that (1) the author is
* relieved from all responsibilities for any use for any purpose, and (2)
* this copyright notice must be retained, unchanged, in its entirety. If
* for any reason the author might be held responsible for any consequences
* of copying or use, license is withheld.
*/
--------------------------------------------------
For lib/py/compat/win32/stdint.h
450
19 Appendix
// notice, this list of conditions and the following disclaimer in the
// documentation and/or other materials provided with the distribution.
//
// 3. The name of the author may be used to endorse or promote products
// derived from this software without specific prior written permission.
//
// THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED
// WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
// EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
// OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
// WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
// OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
// ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
//
///////////////////////////////////////////////////////////////////////////////
--------------------------------------------------
Codegen template in t_html_generator.h
* Bootstrap v2.0.3
*
* Copyright 2012 Twitter, Inc
* Licensed under the Apache License v2.0
* http://www.apache.org/licenses/LICENSE-2.0
*
* Designed and built with all the love in the world @twitter by @mdo and @fat.
---------------------------------------------------
For t_cl_generator.cc
---------------------------------------------------
queryDsl
http://querydsl.com
451
19 Appendix
Apache License
Version 2.0, January 2004
http://www.apache.org/licenses/
1. Definitions.
"License" shall mean the terms and conditions for use, reproduction,
and distribution as defined by Sections 1 through 9 of this document.
"Legal Entity" shall mean the union of the acting entity and all
other entities that control, are controlled by, or are under common
control with that entity. For the purposes of this definition,
"control" means (i) the power, direct or indirect, to cause the
direction or management of such entity, whether by contract or
otherwise, or (ii) ownership of fifty percent (50%) or more of the
outstanding shares, or (iii) beneficial ownership of such entity.
"Source" form shall mean the preferred form for making modifications,
including but not limited to software source code, documentation
source, and configuration files.
452
19 Appendix
of this License, Derivative Works shall not include works that remain
separable from, or merely link (or bind by name) to the interfaces of,
the Work and Derivative Works thereof.
453
19 Appendix
as of the date such litigation is filed.
(b) You must cause any modified files to carry prominent notices
stating that You changed the files; and
(c) You must retain, in the Source form of any Derivative Works
that You distribute, all copyright, patent, trademark, and
attribution notices from the Source form of the Work,
excluding those notices that do not pertain to any part of
the Derivative Works; and
You may add Your own copyright statement to Your modifications and
may provide additional or different license terms and conditions
for use, reproduction, or distribution of Your modifications, or
for any such Derivative Works as a whole, provided Your use,
reproduction, and distribution of the Work otherwise complies with
the conditions stated in this License.
454
19 Appendix
5. Submission of Contributions. Unless You explicitly state otherwise,
any Contribution intentionally submitted for inclusion in the Work
by You to the Licensor shall be under the terms and conditions of
this License, without any additional terms or conditions.
Notwithstanding the above, nothing herein shall supersede or modify
the terms of any separate license agreement you may have executed
with Licensor regarding such Contributions.
6. Trademarks. This License does not grant permission to use the trade
names, trademarks, service marks, or product names of the Licensor,
except as required for reasonable and customary use in describing the
origin of the Work and reproducing the content of the NOTICE file.
455
19 Appendix
incurred by, or claims asserted against, such Contributor by reason
of your accepting any such warranty or additional liability.
http://www.apache.org/licenses/LICENSE-2.0
libevent
https://libevent.org
Copyright (c) 2000-2007 Niels Provos <provos@citi.umich.edu>
Copyright (c) 2007-2010 Niels Provos and Nick Mathewson
Libevent is available for use under the following license, commonly known
as the 3-clause (or "modified") BSD license:
==============================
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions
are met:
456
19 Appendix
1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
3. The name of the author may not be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
==============================
log.c:
Copyright (c) 2000 Dug Song <dugsong@monkey.org>
Copyright (c) 1993 The Regents of the University of California.
strlcpy.c:
Copyright (c) 1998 Todd C. Miller <Todd.Miller@courtesan.com>
win32select.c:
Copyright (c) 2003 Michael A. Davis <mike@datanerds.net>
evport.c:
Copyright (c) 2007 Sun Microsystems
ht-internal.h:
Copyright (c) 2002 Christopher Clark
minheap-internal.h:
Copyright (c) 2006 Maxim Yegorushkin <maxim.yegorushkin@gmail.com>
457
19 Appendix
==============================
Permission to use, copy, modify, and distribute this software for any
purpose with or without fee is hereby granted, provided that the above
copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
rapidjson
https://rapidjson.org
Tencent is pleased to support the open source community by making RapidJSON available.
Copyright (C) 2015 THL A29 Limited, a Tencent company, and Milo Yip. All rights reserved.
If you have downloaded a copy of the RapidJSON binary from Tencent, please note that the RapidJSON
binary is licensed under the MIT License.
If you have downloaded a copy of the RapidJSON source code from Tencent, please note that
RapidJSON source code is licensed under the MIT License, except for the third-party components listed
below which are subject to different license terms. Your integration of RapidJSON into your own
projects may require compliance with the MIT License, as well as the other licenses applicable to the
third-party components included within RapidJSON. To avoid the problematic JSON license in your own
projects, it's sufficient to exclude the bin/jsonchecker/ directory, as it's the only code under the JSON
license.
A copy of the MIT License is included in this file.
458
19 Appendix
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
* Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
* Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
* Neither the name of copyright holder nor the names of its contributors may be used to endorse or
promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE REGENTS AND CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
json.org
Copyright (c) 2002 JSON.org
All Rights Reserved.
JSON_checker
Copyright (c) 2002 JSON.org
All Rights Reserved.
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and
associated documentation files (the "Software"), to deal in the Software without restriction, including
without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
459
19 Appendix
copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to
the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial
portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT
HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF
CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and
associated documentation files (the "Software"), to deal in the Software without restriction, including
without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to
the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial
portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT
HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF
CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
SUPREMA INC.
SOFTWARE LICENSE AGREEMENT
PLEASE READ THE FOLLOWING TERMS AND CONDITIONS CAREFULLY BEFORE INSTALLING OR
USING THE SOFTWARE OR ANY ACCOMPANYING DOCUMENTATION (COLLECTIVELY, THE
“SOFTWARE”).
460
19 Appendix
THE TERMS AND CONDITIONS OF THIS SOFTWARE LICENSE AGREEMENT (“AGREEMENT”) GOVERN
YOUR USE OF THE SOFTWARE UNLESS YOU AND SUPREMA INC (“COMPANY”) HAVE EXECUTED A
SEPARATE AGREEMENT GOVERNING THE USE OF THE SOFTWARE.
Company is willing to license the Software to you only upon the condition that you accept all the terms
contained in this Agreement. By clicking “I accept the agreement” or by installing or using the Software,
you indicate that you understand this Agreement and agree to be bound by all of its terms. If you are
accepting the terms of this Agreement on behalf of a company or other legal entity, you represent and
warrant that you have the authority to bind that company or other legal entity to the terms of this
Agreement, and, in such event, “you” and “your” will refer to that company or other legal entity. If you
do not accept all the terms of this Agreement, Company is unwilling to license the Software to you, you
must click “I do not accept the agreement” or otherwise may not install or use the Software, and you
must ask your local authorized distributor (“Local Distributor”) for a full refund of the license fee paid (if
any) within 30 days after the date of purchase. If you click “I accept the agreement” or otherwise install
or use the Software, any license fee paid will not be refundable.
1. Grant of License.
Conditioned upon your compliance with the terms and conditions of this Agreement, Company grants
you a non-exclusive, non-transferable, revocable license to Execute (as defined herein) one copy of the
Software on a computer (“Computer”) in connection with your compatible hardware products
(“Hardware Product”), solely for your internal business purposes. Company reserves all rights in the
Software not expressly granted to you in this Agreement. For purposes of this Agreement, “Execute”
and “Execution” means to load, install, and run the Software in order to benefit from its functionality as
designed by Company.
2. Restrictions.
Without prior written approval from Company, you may not: (a) copy (except in the course of loading or
installing) or modify the Software, including but not limited to adding new features or otherwise making
adaptations that alter the functioning of the Software; (b) transfer, sublicense, lease, lend, rent or
otherwise distribute the Software to any third party; (c) make the functionality of the Software available
to multiple users through any means, including but not limited to by uploading the Software to a network
or file-sharing service or through any hosting, application services provider, service bureau, software-
as-a-service (SaaS) or any other type of services; or (d) disassemble, decompile or reverse engineer
the Software, in whole or in part, or permit or authorize a third party to do so, except to the extent such
a restriction is unenforceable by law.
3. Open Source.
You acknowledge that the Software may include Open Source Software (“OSS”) that is subject to OSS
licenses of third parties. Nothing in this Agreement limits your rights under, or grants you rights that
supersede, the terms and conditions of any applicable license for the OSS. After completion of the
installation, please click “HELP” link that points to the page including the OSS list and the terms and
conditions thereof. Any listed OSS is listed only for your convenience and solely for information
461
19 Appendix
purposes, and, if licensed, is licensed to you only under the terms set forth in the corresponding Open
Source License.
4. Ownership.
The Software is licensed, not sold. Company retains ownership of all proprietary rights in the Software,
including all intellectual property rights therein. The Software is protected by copyright and other
intellectual property laws and international treaties. You will not delete or in any manner alter the
copyright, trademark, and other proprietary rights notices or markings appearing on the Software as
delivered to you.
6. Term.
The license granted under this Agreement remains in effect indefinitely, unless earlier terminated in
accordance with this Agreement. You may terminate the license at any time by destroying the Software
in your possession or control. The license granted under this Agreement will automatically terminate,
with or without notice from Company, if you breach any term of this Agreement. Upon termination, you
must immediately cease using the Software and destroy the Software in your possession or control.
Either party’s rights and obligations under this Agreement that by their nature are intended to survive
termination of this Agreement shall do so.
7. Limited Warranty.
Company warrants that, for one (1) year following the date of purchase, the Software will be free from
material defects in materials and workmanship, and will perform in all material respects in accordance
with any accompanying documentation. As your sole and exclusive remedy and Company’s entire liability
for any breach of this limited warranty, Company will at its option and expense promptly correct or
replace the Software so that it conforms to this limited warranty. Company does not warrant that the
Software will meet your requirements, that the Software will operate in the combinations that you may
select for Execution, that the operation of the Software will be error-free or uninterrupted, or that all
Software errors will be corrected. The warranty set forth in this Section 7 does not apply to the extent
462
19 Appendix
that Company provides you with the Software free of charge. This warranty is VOID if failure of the
Software is due to accident, negligence, abuse, improper installation or misuse of the Software.
8. DISCLAIMER.
THE SOFTWARE IS PROVIDED “AS IS.” THE LIMITED WARRANTY SET FORTH IN SECTION 7 IS IN LIEU
OF AND COMPANY EXPRESSLY DISCLAIMS ALL OTHER WARRANTIES AND CONDITIONS, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO ANY IMPLIED WARRANTIES AND CONDITIONS OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT, AND ANY
WARRANTIES AND CONDITIONS ARISING OUT OF COURSE OF DEALING OR USAGE OF TRADE. NO
ADVICE OR INFORMATION, WHETHER ORAL OR WRITTEN, OBTAINED FROM COMPANY OR ELSEWHERE
WILL CREATE ANY WARRANTY OR CONDITION NOT EXPRESSLY STATED IN THIS AGREEMENT.
THE SOFTWARE MAY COLLECT PERSONAL DATA OF YOUR COMPANY’S EMPLOYEES WITHIN YOUR
HARDWARE. THESE PERSONAL DATA IS NOT COLLECTED OR STORED BY COMPANY, AND IT SHALL BE
YOUR SOLE RESPONSIBILITY TO PROCESS THESE INFORMATION IN ACCORDANCE WITH THE LAWS OF
YOUR JURISDICTION.
9. Limitation of Liability.
NOTWITHSTANDING ANYTHING TO THE CONTRARY CONTAINED IN THIS AGREEMENT, COMPANY’S
TOTAL LIABILITY TO YOU FROM ALL CAUSES OF ACTION AND UNDER ALL THEORIES OF LIABILITY WILL
BE LIMITED TO ANY REFUND THE LOCAL DISTRIBUTOR MAY PROVIDE TO YOU IN REGARDS TO THE
DIRECT DAMAGES UP TO THE AMOUNT PAID BY YOU TO THE LOCAL DISTRIBUTOR FOR THE
SOFTWARE.
IN NO EVENT WILL COMPANY BE LIABLE TO YOU FOR ANY SPECIAL, INCIDENTAL, EXEMPLARY, PUNITIVE
OR CONSEQUENTIAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF DATA,
LOSS OF BUSINESS PROFITS OR ANY OTHER PECUNIARY LOSS) OR FOR THE COST OF PROCURING
SUBSTITUTE PRODUCTS ARISING OUT OF OR IN CONNECTION WITH THIS AGREEMENT OR THE
EXECUTION OF OR INABILITY TO EXECUTE THE SOFTWARE, WHETHER SUCH LIABILITY ARISES FROM
ANY CLAIM BASED UPON CONTRACT, WARRANTY, TORT (INCLUDING NEGLIGENCE), STRICT LIABILITY
OR OTHERWISE, AND WHETHER OR NOT COMPANY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH
LOSS OR DAMAGE. THE FOREGOING LIMITATIONS WILL SURVIVE AND APPLY EVEN IF ANY LIMITED
REMEDY SPECIFIED IN THIS AGREEMENT IS FOUND TO HAVE FAILED OF ITS ESSENTIAL PURPOSE.
11. Indemnities.
You shall indemnify, defend and hold Company and its affiliates and subsidiaries harmless from and
463
19 Appendix
against any and all claims, including, but not limited to, the claim in relation to: (a) your infringement of
any intellectual property, privacy or other rights of any third party; (b) injury to or death of any
person(s) or damage to or loss of property; (c) your breach of any term in this Agreement; and/or (d)
your violation of applicable law. In such a case, Company will provide you with written notice of such
claim, suit or action.
14. Arbitration.
In the event of any dispute controversy or claim arising out of, or in connection with, or relating to this
Agreement, or the breach, termination or invalidity of this Agreement, all attempts shall be made to
solve it through mutual consultation in a spirit of confidence and integrity. If all attempts so made
through mutual consultations have proved to be of no help within a reasonable time, arbitration rather
than legal proceedings shall solve it. The matter shall be finally settled by arbitration in Seoul, Korea in
accordance with the Domestic(International) Arbitration Rules of the Korean Commercial Arbitration
Board and under the Law of Korea.
15. General.
You may not assign or transfer this Agreement or any rights granted hereunder, by operation of law or
otherwise, without Company’s prior written consent, and any attempt by you to do so, without such
consent, will be void. Except as expressly set forth in this Agreement, the exercise by either party of any
of its remedies under this Agreement will be without prejudice to its other remedies under this
Agreement or otherwise. All notices or approvals required or permitted under this Agreement will be in
writing and delivered by electronic mail, confirmed facsimile transmission, by overnight delivery service,
or by certified mail, and in each instance will be deemed given upon receipt. All notices or approvals
will be sent to the addresses set forth in the applicable ordering document or invoice or to such other
address as may be specified by either party to the other in accordance with this section. The failure by
either party to enforce any provision of this Agreement will not constitute a waiver of future enforcement
of that or any other provision. Any waiver, modification or amendment of any provision of this
Agreement will be effective only if in writing and signed by authorized representatives of both parties. If
any provision of this Agreement is held to be unenforceable or invalid, that provision will be enforced to
the maximum extent possible, and the other provisions will remain in full force and effect. This
Agreement is the complete and exclusive understanding and agreement between the parties regarding
464
19 Appendix
its subject matter, and supersedes all proposals, understandings or communications between the
parties, oral or written, regarding its subject matter, unless you and Company have executed a separate
agreement. Any terms or conditions contained in your purchase order or other ordering document that
are inconsistent with or in addition to the terms and conditions of this Agreement are hereby rejected by
Company and will be deemed null.
Starting with BioStar v2.9.5, Feature Guide is provided separately by topic on how to use new or
improved features.
Click on the desired guide below to view it in PDF format.
BioStar 2.9.7
BioStar 2.9.5
465
Index
1 C
1:N fast mode 93 Camera Frequency 111
1:N Security Level 93 Card Format 281
Card list 280
Changing database of BioStar 2 66
A Changing port of BioStar 2 62, 64
Access Group 147 Changing server status of BioStar 2 61
Access Group Status 149 Cloud 296
Access level 146 CoreStation 122
Access on Card 178 Count Alert 208
Activate the purchased license 285 CSN Card 175
Adding Custom Account Level 276 CSV 157
Adding holiday 293 Custom User Field 285
Adding PIN 163
Adding schedule 293
Adding User Information 153 D
Advanced device search 76 Dashboard 70
Advanced Enrollment 93 Database Backup 285
Alert 294 Daylight Saving Time 303
Alert History 222 Delete Data & Sync Device 74
Alert List 70 DESFire 178, 180, 282
All log 213 Device - administrator 101
Analog Interphone 110 Device - authentication 93
Anti passback 137 Device - display/sound 103
Anti-passback 136 Device - information 88
Anti-passback Bypass 195 Device - network 89
Anti-passback Zone 195 Device - trigger & action 107
Assigning CSN Card 175 Device administrator setting 101
Assigning Wiegand Card 176 Device auth mode 93
Audit Trail 301 Device configuration 86
Auth Tieout 93 Device language setting 103
Automatic meal deduction 236 Device Status 218
Automatic user information syncing setting 285 Device volume 103
DM-20 118
Door - configuration 133
B Door - information 132
Background setting 103 Door - option 134
Basic device search 74 Door alarm 137
Batch editing device information 86 Door Group 131
Batch editing doors 138 Door relay 133
Batch editing user information 192 Door sensor 133
Before using 68 Door Status 218
BioMini Enrollment Package 299 Dual authentication mode 134
BioStar 2 date/time setting 278 Duress 165
BioStar 2 language setting 278
BioStar 2 Mobile app 296
BioStar 2 preferences 278 E
Elevator 138
Elevator - Alarm 144
Elevator - Detail 141
466
Index
Elevator - Information 141 Long-term Idle User 193
Elevator - Option 143
Elevator Group 139
Enroll Fingerprint 165 M
Enrollment Device 285 Managing Users Registered with Devices 84
Entry device 133 Mask 111
Event Log 213 Matching Tiimeout 93
Event Status by Period 70 MIFARE 178, 180, 282
Exit button 133 Missed Alarm 70
Exit device 133 Mobile Card 282
Mobile Credential 316
Mobile Credential Partal 316
F Muster Zone 207
Face Detection Level 93
Fingerprint LFD 93
Fire Alarm Zone 197 N
First check-in & Last check-out 236 Notice 70
Fixed Shift 236 NVR 229
Flexible Shift 236
Floating Shift 236
Floor Status 220 O
Format Smart Card 180 Occupancy Limit Zone 208
OM-120 119
Output Module 119
G Overtime Rule 243
General server setting 285
Grace 236
Graphic Map 224, 225, 226 P
Group 73, 152 password level 304
Personal auth mode 163
H
Hard APB 136 R
HTTPS 296 Read Smart Card 180
Real-time Log 215
Registering CSN Card 175
I Registering Wiegand Card 176
iCLASS 178, 180, 282 Report 248
IM-120 119 Rounding 236
Image Log 109, 298 RS-485 settings 89
Input Module 119
Installing BioStar 2 49
Intelligent Slave 89 S
Interlock Zone 205 Scan Timeout 93
Intrustion Alarm Zone 201 Schedule Template 241
IP Camera 231 Scheduled Lock 199
Scheduled Unlock 200
Secure communication with device 285
L Secure Credential Card 178
Log upload method setting 285 Secure Tamper 110
Login 59 Sensor Mode 93
login password 304 Sensor Sensitivity 93
467
Index
Seos 282
Server Matching 93, 285
session security 304 Z
Session timeout setting 285 Zone Status 221
Shift 236
SIP Interphone 114
Slave device search 77
Slave devices 77
Smart Card 178, 282
Soft APB 136
Supported card list 174
Sync Device 74
System Requirements 48
system security 304
T
T&A 233
T&A Device 255
T&A Schedule 245
TCP/IP settings 89
Template format 93
Thermal Camera 111
thermal report 223
Time Card 252
Time Code 235
Transferring User Information to Devices 190
Trigger & Action 291
Troubleshooting 332
U
Upgrading Firmware 85
User - BioStar privilege setting 153
User account privilege setting 274
V
Version Information 4
Video Setting 302
W
Wiegand 109, 281
Wiegand Card 176
Wiegand Card Data Format 280
Wiegand Device 128
Wiegand Device Search and Registration 77
Wireless Door Lock 129
Wireless Door Lock Status 220
WLAN 89
468
Suprema Inc.
17F Parkview Tower, 248, Jeongjail-ro, Bundang-gu, Seongnam-si, Gyeonggi-do, 13554, Rep. of KOREA
Tel: +82 31 783 4502 | Fax: +82 31 783 4503 | Inquiry: sales_sys@supremainc.com
© 2024 Suprema Inc. Suprema and identifying product names and numbers herein are registered trade marks of Suprema, Inc.
All non-Suprema brands and product names are trademarks or registered trademarks of their respective companies.
Product appearance, build status and/or specifications are subject to change without notice.