Advertisement

Table of Contents
  • About this guide

    1
  • Environmental considerations

    5
  • How fingerprint recognition technology works

    7
  • Getting good fingerprint images

    9
  • Proper finger placement

    11
  • Fingerprint matching

    12
  • Password matching

    13
  • Basic concepts

    14
  • Match threshold levels

    15
  • Enrollment and verification procedures

    17
  • User management

    19
  • Advanced settings

    89
  • Power management

    140
  • Communication options

    165
  • Log options

    175
  • Access control

    179
  • System information

    225