3M Cogent MID2-E Cogent Multifunction Fingerprint Scanner User Manual User Man ZYFMID2 E

3M Cogent, Inc. Cogent Multifunction Fingerprint Scanner User Man ZYFMID2 E

User Man_ZYFMID2-E

MobileIdentTMII‐E 2011 13MCogent,IncInstructionofMobileIdentTMII‐E
MobileIdentTMII‐E 2011 2TableofContent1. PowerOn………………………………………………………………………………………………………………………..32. LogintheMobileIdentTMII‐E……………………………………………………………………………………….33. HomePage……………………………………………………………………………………………………………………..44. Settings…………………………………………………………………………………………………………………………..44.1. Volume…………………………………………………………………………………………………………………….54.2. Date………………………………………………………………………………………………………………………….54.3. Users…………………………………………………………………………………………………………………………65. Wireless…………………………………………………………………………………………………………………………..66. Identify…………………………………………………………………………………………………………………………….76.1. Search……………………………………………………………………………………………………………………….76.2. Enroll…………………………………………………………………………………………………………………………86.2.1. Demographics………………………………………………………………………………………………86.2.2. Fingerprints…………………………………………………………………………………………………..86.2.3. Photo…………………………………………………………………………………………………………….96.2.4. Database……………………………………………………………………………………………………….9
MobileIdentTMII‐E 2011 31. PowerOnToturnonandshutdownthedevice,presspowerbuttonfor2‐3seconds(Figure1).Figure12. LogintheMobileIdentTMII‐EInordertoaccessthesystems,youhavetogetavalidusernameandpassword.Enteryourusernameandpasswordandthentap‘Login’.,asFigure2shownbelow.Administratorscreateuseraccountsusing‘Users’.Fordetails,pleasereferto4‘Users’.Figure2PowerbuttonCapsLock
MobileIdentTMII‐E 2011 43. HomePageAfterlogin,youwillgetintothemainpageofMI2asFigure3shownbelow.AllfunctionofMI2willdisplayinthispage.Taptheicon(function)youwishtooperate.Figure34. SettingsSelectandenter‘Settings’,youcansetthedatabeyourself(Figure4).Figure4
MobileIdentTMII‐E 2011 54.1. VolumeTap‘Save’tosaveyoursetting(Figure5).Figure54.2. DateSetthetime,dateandtimezone,thentapsave(Figure6).Figure6
MobileIdentTMII‐E 2011 64.3. UsersTap‘New’toadduser.Entertheinformationinthepage,thentapsavetosaveyoursetting(Figure7). Figure75. WirelessSelect‘Wireless’andgetintothepowercontrol.TaptheOn‐Offbuttontocontrolthewirelessfunction(Figure8). Figure8
MobileIdentTMII‐E 2011 76. Identify‘Identify’isthemainfunctionofMI2.Itisusetoenrollfingerprint,editandsearchthedemographics(Figure9).Figure96.1. Search‘Search’isforsearchingthedatainthedatabase.Youcansearchbyfingerandfacial(Figure10).Ifitfindsamatchinthedatabase,theinformationwillbedisplayed.Figure10
MobileIdentTMII‐E 2011 86.2. Enroll6.2.1. DemographicsTap‘Enroll’andgetintothedemographics.Taptheinformationyouwishtoenterandeditit.Aftereditingdemographics,tap‘OK’gototheneststep(Figure11).Figure116.2.2. FingerprintsTenprintsisrequired.Followtheinstructiontoenrolltenprints(fromRThumbtoLLittle)(Figure12).Selectthefingeryouwishtoenroll.Ifthequalityoffingerprintispoor,thesystemwillaskforcaptureagain.Ifthequalityoftheimageisgood,thenitwillgotocapturethenextfinger.
MobileIdentTMII‐E 2011 9Figure126.2.3. PhotoAftercapturingthefingerprint,itwillgotothenextstep‘Photo’automatically.Itwilltake5photosfor5differentfaceangles.Onephotocapturedatfront,twocapturedat90degree(leftandright),twocapturedat45degree(leftandright)(Figure13).Figure136.3. DatabaseCheckthedatayouentered(Figure14).Youcanedittheinformationyouenteredpreviously.Figure14
 FCC INFORMATION  This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.  Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment.  This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. End users must follow the specific operating instructions for satisfying RF exposure compliance. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.

Navigation menu