Old revisions Add to book Export to PDF Fold/unfold all Table of Contents Version 1.6.0 (V1.6.0_190104) Release New Features and Improvements Main fixes Bug fixes Book Creator Add this page to your book Book Creator Remove this page from your book Manage book (0 page(s)) Help Version 1.6.0 (V1.6.0_190104) Release 2019-01-08 New Features and Improvements 1. Support to AES encryption type for DESFire card. 2. Support to DESFire/DESFire EV1 Advanced option. 3. Support to the creation of up to 2048 Access Levels and Access Groups. 4. If a user is registered, modified, or deleted, the event log shows whether the editing was done on the server or on the device. 5. If the data transmission fails when communicating with OSDP, it is transmitted again. 6. Improves the data protection. Increase the items to encrypt the data. Support to setting the period for storing the personal information. Support for additional features in Secure Tamper: Delete Users, Logs, Data Encryption Key, SSL certificate, and Smart Card Layout when a secure tamper event occurs. 7. Change the maximum value of the width for the Wiegand Input. 8. Support to the number of users, fingerprints, faces, and cards in Manage Users in Device. 9. Support for Individual Authentication Successful Messages and Working alarm time reports. 10. When using The bypass, The card ID is output as Wiegand even though a user authenticates with the AoC. Main fixes 1. When Micom is reset, the output does not restore to its previous status. 2. The device reboots when a user enrolls or edits a user on the device. 3. The device reboots when a user searches for a zone at the Event Log menu on the device. 4. Wiegand Out is not output when authenticating with blacklist card. 5. With Bypass enabled, authentication failure message is not displayed when unregistered ID is authenticated. 6. The user cannot issue a new File after the App and File are created when issuing the DESFire card. 7. A code is added to prevent the authentication fails because the cache memory is broken. 8. The device does not recognize EM card and HID Prox card. 9. When the server private message is activated on the device, the device does not operate normally if there is no registered authentication message. Bug fixes 1. The relays operate differently from the previous status if the slave device is reconnected. 2. Modified the firmware of that slave device so that it cannot be upgraded when a device not supported by the master device is connected as a slave. 3. The master device reboots if a user authenticates the fingerprint consecutively to the master device or slave device. 4. The Authentication success or failure setting in Trigger & Action does not work normally. 5. Change some special characters (\, /, :, *, ?, “, ', `, <, >, |, .) to be unavailable when setting a user name. 6. When the elevator is configured as a Fire Alarm Zone, if a user clears the alarm, the event log that has not been set is displayed. 7. Modified a user interface in USB memory menu. 8. With Bypass enabled, the device does not respond even if a user selects the Menu, T&A, or ID after authentication. 9. If a user authenticates the card to XPass D2 connected to as a slave device, the beep sounds twice. 10. 1:N authentication can also be added on the slave device even though the master device is only capable of 1:1 authentication. 11. If the user uses the BS_GetLogBlob command to get the door ID, the door ID is not output normally. 12. When the backlight is off, the device does not respond even if the user touches the screen. 13. The bit of the fingerprint image is broken.